A New Design of Private Information Retrieval for Storage Constrained Databases

Size: px
Start display at page:

Download "A New Design of Private Information Retrieval for Storage Constrained Databases"

Transcription

1 A ew Design of Privae Informaion Rerieval for Sorage Consrained Daabases icholas Woolsey, Rong-Rong Chen, and Mingyue Ji Deparmen of Elecrical and Compuer Engineering, Universiy of Uah Sal Lake Ciy, UT, USA arxiv: v [cs.it] 22 Jan 209 Absrac Privae informaion rerieval PIR) allows a user o download one of K messages from daabases wihou revealing o any daabase which of he K messages is being downloaded. In general, he daabases can be sorage consrained where each daabase can only sore up o µkl bis where µ and L is he size of each message in bis. Le = µ, a recen work showed ha he capaciy of Sorage Consrained PIR SC-PIR) is + + ) + +, which is achieved by a sorage 2 K placemen scheme inspired by he conen placemen scheme in he lieraure of coded caching and he original PIR scheme. o surprisingly, his achievable scheme requires ha each message is L = ) K bis in lengh, which can be impracical. In his paper, wihou rying o make he connecion beween SC-PIR and coded caching problems, based on a general connecion beween he ull Sorage PIR S-PIR) problem µ = ) and SC- PIR problem, we propose a new SC-PIR design idea using novel sorage placemen schemes. The proposed schemes significanly reduce he message size requiremen while sill meeing he capaciy of SC-PIR. In paricular, he proposed SC-PIR schemes require he size of each file o be only L = K compared o he sae-of-he-ar L = ) K. Hence, we conclude ha PIR may no mee coded caching when he size of L is consrained. I. ITRODUCTIO Recen works have aken an informaion heoreic approach o solve he privae informaion rerieval PIR) problem [], [2] originally inroduced by Chor e al. [3], [4]. In he PIR problem, a user desires o privaely download one of K messages from non-colluding daabases. In his conex, privacy means ha he ideniy of he message desired by he user is no revealed o any daabase. Ensuring privacy relies on he concep ha a user will reques sub-messages from all K messages as opposed o jus he message ha he user desires. To efficienly download he desired message, he user sraegically generaes daabase queries ha uilize undesired bu downloaded sub-messages for coding opporuniies. The rae of a PIR scheme is defined as he raio of desired bis, L, or he size of each message, o he oal number of downloaded bis, D. The capaciy C opimal rae) is defined as he maximum achievable rae. Previously, Sun and Jafar [] derived he capaciy of he ull Sorage PIR S-PIR) problem where a user privaely downloads one of K messages from daabases ha each sores all K messages. In his case, he capaciy is C = + + ), which was achieved by a K PIR scheme requiring L = K. This resul was furher generalized by Aia e al. [2] for he Sorage Consrained PIR SC-PIR) problem where each daabase can only sore µkl uncoded bis where µ. In his case, boh a sorage placemen scheme and a PIR scheme querying and decoding) need o be designed. Le = µ, he capaciy of SC-PIR is + + ) under an uncoded K sorage placemen consrain and was achieved by a sorage placemen scheme inspired by he coded caching problem [5] and a PIR scheme based on []. One of he limiaions of his scheme is he requiremen of a large message size, L = ) K [2], which is due o he fac ha he sorage placemen is designed based on he cache placemen in coded caching problem [5]. Hence, he proposed PIR scheme of [2] can be impracical for a large number of daabases. This achievable scheme was generalized o he decenralized sorage placemen in [6]. urhermore, Tian e al. [7] use Shannon heoreic approach o analyze he SC-PIR problem for he canonical case of K = 2 and = 2 and proposed he opimal linear scheme. More ineresingly, hey also showed ha non-linear scheme can use less sorage han he opimal linear scheme. In his paper, we aim o find SC-PIR schemes ha achieve he capaciy of SC-PIR while requiring a significanly smaller message size L. In order o achieve his goal, for he sorage placemen, we abandon he idea of using he cache placemen of coded caching problem and design i from scrach. In fac, our proposed SC-PIR schemes achieve he capaciy and require only L = K, which is significanly less han L = ) K in [2]. More specifically, our conribuions are as follows. Our Conribuions: ) We provide a general design mehodology for he SC- PIR problem by esablishing a generic connecion beween he S-PIR and SC-PIR problems. Based on his connecion, a SC-PIR scheme can be readily designed from any given S-PIR scheme. 2) We propose a simple sorage placemen when is an ineger. By adoping he achievable scheme based on [], he capaciy of SC-PIR can be achieved and L = K. This serves as a base case for he more general scenario when is no an ineger. 3) When is no an ineger, we propose a novel sorage placemen, which in conjuncion wih he S-PIR scheme of [8], achieves he capaciy of SC-PIR and only

2 requires L = K. The key o he reducion in L is achieved using he proposed novel sorage placemen. 4) We presen a se of sufficien condiions under which he proposed SC-PIR schemes are capaciy-achieving. oaion Convenion: We use o represen he cardinaliy of a se or he lengh of a vecor and [n] := [,2,...,n]. II. PROBLEM ORMULATIO There are K independen messages, W,...,W K, each of size L bis. The messages are collecively sored in an uncoded fashion among non-colluding daabases ha each has a sorage capaciy of µkl bis, where µ. We define Z n as he sorage conens of daabase n []. Also, we define µ as he average number of imes each bi of he messages is sored among he daabases. A user makes a reques W k and sends a query Q [k] n, which is independen of he messages, o each daabase n [] which hen sends an answer A [k] n such ha HA [k] n Z n,q [k] ) = 0, k [K]. ) n urhermore, given he answers from all he daabases, he user mus be able o recover he requesed message wih a small probabiliy of error. Therefore, HW k A [k],...,a[k] n,q [k],...,q[k] n ) = 0. 2) The user generaes queries in a manner o ensure privacy such ha no daabase has insigh ino which message he user desires, i.e., Ik;Q [k] n,a[k] n,w,...,w K,Z,...,Z ) = 0. 3) Le D be he oal number of downloaded bis. Given µ, we say ha a pair D,L) is achievable if here exiss a SC-PIR scheme wih rae L/D ha saisfies )-3). The SC-PIR capaciy is defined as C µ) = max{r : D,L) is achievable. 4) III. THE PROPOSED SC-PIR SCHEME WHE Z+ In order o presen he proposed scheme, we need o esablish a connecion beween S-PIR and SC-PIR problems. This connecion is vial o reduce he required minimum size of messages from ) K, as in he sae-of-he-ar scheme of [2], o K wihou affecing he opimal rae. We show ha an achievable SC-PIR scheme can be derived from any general achievable scheme for he S-PIR problem. Hence, by using he proposed sorage placemen, he achievable scheme in [] can be used o obain a new SC-PIR scheme. To illusrae our idea, we firs presen an example as follows. A. A Sorage Consrained PIR Example when Z+ Consider = 4 daabases labeled as DB hrough DB4. Collecively he daabases sore K = 3 messages, denoed by A, B and C. Each message is comprised of L = 6 bis. ) Sorage placemen scheme: We spli each message as follows. A = {a j i : i [2],j [8] 5) B = {b j i : i [2],j [8] 6) C = {c j i : i [2],j [8]. 7) Each daabase has he sorage capaciy of up o 24 bis, or half of all 3 messages µ = 2). The sorage conens of he daabases are defined o be Z = Z 2 = Z 3 = Z 4 = {a j : j [8] {b j : j [8] {c j : j [8] {a j 2 : j [8] {b j 2 : j [8] 8) {c j 2 : j [8]. 2) PIR Scheme: Each daabase sores 8 ou of 6 bis of each message. Daabases and 2 have he same sorage conens, bu do no have any sorage conens in common wih daabases 3 and 4. Likewise, daabases 3 and 4 have he same sorage conens. In his way, we essenially reduce a SC-PIR problem ino wo independen S-PIR problems; one consiss of daabases and 2, and he oher consiss of daabases 3 and 4. Subsequenly, we can simply adop he achievable S- PIR scheme of [] o generae he queries for each pair of he daabases separaely. The queries of a user ha desires message A are shown in Table I. TABLE I STORAGE COSTRAIED PIR, = 4, K = 3, µ = 2 DB DB2 DB3 DB4 a 5 b 8 c 6 a b 3 c a 5 2 b 7 2 c 4 2 a 2 2 b 6 2 c 2 2 a 6 +b 3 a 3 +b 8 a 2 +b 6 2 a 7 2 +b 7 2 a 7 +c a 8 +c 6 a 6 2 +c 2 2 a 8 2 +c 4 2 b 6 +c 5 b 7 +c 3 b 3 2 +c 6 2 b 8 2 +c 7 2 a 2 +b 7 +c 3 a 4 +b 6 +c 5 a 3 2 +b 8 2 +c 7 2 a 4 2 +b 3 2 +c 6 2 3) Achievable Rae: The oal number of downloaded bis is D = 28. Thus, we have for his scheme L D = 6 4 9) 28 = 7, which achieves he capaciy of + + ) = ) = Compared o he SC-PIR scheme of [2] ha requires L = ) K = 4 2) 2 3 = 48 bis, he proposed SC-PIR requires only L = 6 bis. 4) Privacy Consrain: Privacy is ensured since he S-PIR scheme of [] is used o privaely download half of message A from DB and DB2 and he oher half from DB3 and DB4. The query o each daabase is symmeric such ha for each bi of A ha is requesed, a bi each from B and C are also requesed. All coded pairs of bis from he 3 messages are requesed an equal number of imes. Ulimaely, he user can decode all bis of message A, because downloaded bis of B andc can be used for decoding see Table I). In he following, we will firs formalize he connecion beween he S-PIR and SC-PIR problems and hen generalize his example.

3 B. The general connecion beween he S-PIR and SC-PIR Define a vecor α = [α,...,α ], where Z +, i= α i =, and α f, f [] is raional number such ha α f L Z +. or all k [K], we divide message W k ino disjoin sub-messages W k = W k,,...,w k, such ha for all f [], W k,f = α f L bis. or all f [], le M f W k,f, 0) k [K] and f [] be a non-empy subse of daabases which have he sub-messages in M f locally available o hem. The sorage conens of daabase n [] is Z n = {M f : f [],n f, ) where we have he requiremen ha for any n [], α f µ. 2) {f:f [],n f Given ha a user requess file W θ for some θ [K], we do he following. or all f [], using a S-PIR scheme, he user generaes a query o privaely downloadw θ,f from he daabases in f. In oher words, a SC-PIR scheme can be found by applying a S-PIR scheme o each se of daabases f. Changing he choice of he S-PIR scheme or he definiions of f will resul in new SC-PIR schemes. The rae of he SC-PIR scheme as a funcion of he rae of he implemened S-PIR scheme is given in he following heorem. Theorem : Given,K, Z + and α, spli each of he L-bi messages W,...,W K ino sub-messages of size α L,...,α L and sore hem a ses of daabases,..., [], respecively. Given a se of S-PIR schemes wih achievable raesr,...,r, he achievable rae of privaely downloading W θ, θ [K], from he sorage consrained daabases is α + α α ). 3) R R 2 R Proof: We firs coun he number of downloaded bis. or all f [], R f = α fl D f where D f is he number of downloaded bis necessary o privaely download W θ,f of size α f L bis from he daabases in f. Therefore, he oal number of bis required o privaely download he enirey of W θ is α D = D +D 2 + +D = L + α α ). R R 2 R Since L D, we obain 3). C. General Achievable Sorage Consrained PIR Scheme When Z+ ) Sorage Placemen Scheme: Given Z + and [] such ha Z +, le = and for each k [K], spli message W k ino disjoin, equal-size sub-messages, W k,,...,w k,. urhermore, spli he daabases ino disjoin groups of size labeled as,...,. or each f [ ], he sub-messages of M f = W k,f 4) k [K] are sored a every daabase of f. 2) PIR Scheme: A user desires o privaely download message W θ for some θ [K]. or each f [ ], he user generaes a query using he scheme of [], o privaely downloadw θ,f from hedaabases in f. The user combines he downloaded sub-messages, W θ,,...,w θ, o recover he desired message W θ. To implemen his SC-PIR scheme, each message is spli ino equal-size, disjoin sub-messages. urhermore, he adapaion of he S-PIR scheme of [] requires ha each sub-message is furher spli ino K equal-size, disjoin submessages. The resuling SC-PIR requires a oal of L = K = K bis. An example of his SC-PIR scheme is described in Secion III-A. 3) Achievable Rae: The achievable rae of his scheme is summarized as follows. Theorem 2: Given,K, and µ [,], such ha = µ [], Z + and L = K, for a user o privaely download one of K L-bi messages from daabases wih a sorage capaciy of µkl bis, he achievable rae is ) K. 5) Moreover, i was shown in [2] ha 5) is he capaciy of SC-PIR for Z +. While we do no direcly prove Theorem 2 here, in Secion V we presen a se of sufficien condiions, which his scheme saisfies, for an SC-PIR scheme o mee he capaciy. IV. THE PROPOSED SC-PIR SCHEME WHE In Secion III, we esablished a general connecion beween SC-PIR and S-PIR problems. We showed ha by properly spliing messages and allocaing sub-messages o differen groups of daabases, a SC-PIR scheme can be derived by applying a separaely designed S-PIR scheme o each group of daabases. In paricular, when choosing he S-PIR scheme o be he one in [], we obain a SC-PIR scheme ha achieves capaciy while requiring Z +. In order o remove his resricion, in his secion, we propose a new sorage placemen and use i in conjuncion wih he achievable S-PIR scheme of [8] o obain a new SC-PIR scheme. This scheme achieves capaciy while requiring only L = K, which is he same as he scheme of Secion III-C when Z+. A. A Sorage Consrained PIR Example when In his example, = 5 daabases, labeled DB hrough DB5, collecively sore K = 2 messages, A and B, and each has a size of L = 5 bis. Each daabase sores an µ = 3 5 fracion of he 2-message library = µ = 3).

4 ) Sorage Placemen Scheme: Each message is spli as follows. A = {a j i : i [5],j [3], B = {b j i : i [5],j [3]. 6) By his labeling, we have essenially spli he messages in wo phases. The firs spliing phase, denoed by he subscrip, deermines which daabases sore hese bis. The second spliing, denoed by he superscrip, is necessary o perform he S-PIR scheme. or all f [5], define M f = ) a j f bj f 7) j [3] and le he se of daabases f = [ 2 : 0] f locally sore he bis of M f. oe ha as opposed o he SC-PIR scheme described in Secion III-A where he ses of daabases { f,f =,, are muually exclusive, here we allow hem o overlap and hence removing he ineger consrain of Z+. As a resul, he bis of message A sored a DB n [5] are { Z n = a j i : i {[0 : 2] n,j [3]. 8) Message B is sored among he daabases in a similar manner. or insance, DB2 sores all bis a j i and bj i such ha i [2 : 4] and DB5 sores all bis a j i and bj i such ha i {5,,2. TABLE II STORAGE COSTRAIED PIR, = 5, K = 2, µ = 3 5 DB DB2 DB3 DB4 DB5,2,3) 2,3,4) 3,4,5) 4,5,) 5,,2) a 3 b 2 a 3 2 b 2 2 a 3 b 3 3 a 2 4 b 3 4 a 2 5 b 5 a 2 +b 2 2 a 3 3 +b 3 3 a 3 4 +b 3 4 a 5 +b 5 a 2 +b 2 a 2 3 +b 3 3 a 4 +b 3 4 a 3 5 +b 5 a +b 2 a 2 2 +b 2 2 2) PIR Scheme: The queries of a user ha desires o privaely download message A are shown in Table II. The op row of he able conains daabase labels and he 3-uple below each daabase label defines he subscrips of he bis ha are locally available o ha daabase. The remaining hree rows of he able show he queries of he user. The user adops he S-PIR scheme of [8] o design queries. or insance, o obain bis {a j,j [3], he user applies he S-PIR o DB, DB4, and DB5. In he firs round, he user obains a 3 from DB. In he second round, he user can decode a from DB4 s ransmission of a + b 2 because he user had already received b 2 from he firs round ransmission of DB in round. Similarly, he user decodes a 2 from DB5 s ransmission of a 2 + b 2. These ransmissions are highlighed in red in Table II. To ensure privacy, he queries are symmeric and no bi is requesed more han once from any one daabase. In his example, D = 20 bis are downloaded and he rae is 3 4. Comparing o he sae-of-he-ar SC-PIR scheme We impose he following noaion: a b = a+b mod )+ and [a : a 2 ] b = {a b : a [a : a 2 ]. of [2], he rae is he same, bu L has been reduced from ) K = 5 3) 3 2 = 90 o K = = 5. B. General Achievable SC-PIR Scheme When ) Sorage Placemen Scheme: or each k [K], message W k is spli ino disjoin equal-size sub-messages W k,,...,w k,. or all f [], define a se of sub-messages M f = k [K] W k,f which is locally sored a he se of daabases f = [ ) : 0] f. 2) PIR Scheme: A user desires o privaely download message W θ for some θ [K]. or each f [], he user generaes a query using he scheme of [8], o privaely downloadw θ,f from hedaabases in f. The user combines he downloaded sub-messages, W θ,,...,w θ, o recover he desired message W θ. urhermore, if desired, o obain symmery across he daabases, i.e., each daabase sends he same amoun of coded bi combinaions from each file, he user can choose daabase f o sar he query process when privaely downloading W θ,f. or more deails on he query generaion process, see [8]. 3) Achievable Rae: The achievable rae of his SC-PIR scheme is summarized in he following heorem. Theorem 3: Given,K, and µ [,], such ha = µ [] and L = K, for a user o privaely download one of K L-bi messages from daabases, each wih a sorage capaciy of µkl bis, he rae is K ). 9) The resuls of Secion V demonsrae ha his SC-PIR scheme saisfies he sufficien condiions o mee he capaciy. This proves Theorem 3. V. SUICIET CODITIOS TO ACHIEVE CAPACITY OR SC-PIR In his secion, we provide wo sufficien condiions for a sorage placemen scheme o achieve he SC-PIR capaciy. Theorem 4: Given,K, Z + and α, spli each of he L-bi messages W,...,W K ino sub-messages of size α L,...,α L and sore hem a ses of daabases,..., [] according o equaions 0)-2). Each daabase has a sorage capaciy of µkl bis, µ, where = µ [,]. Assume ha a user requess file W θ for some θ [K]. A SC-PIR scheme is obained if for all f [], he user generaes a query o privaely download W θ,f from he daabases in f using a capaciy-achieving S-PIR scheme. The resuling SC-PIR scheme is capaciyachieving if he sub-message sorage placemen saisfies one of he following wo condiions: ) If Z +, f = for all f [] 2) If, f {, for all f [] such ha α f = 20) and f: f = f: f = α f =. 2)

5 Proof: Define R S x) as he rae of a capaciy achieving S-PIR scheme o privaely download one of K messages from x nodes. urhermore, R S x) = + x + + ) x K 22) as was shown in []. or Z +, i follows from Theorem ha he rae of he SC-PIR scheme is α R S ) + + α ) = R S) 23) R S ) = ) K 24) which is he capaciy of SC-PIR [2]. or, i follows from Theorem ha α f + R S ) R S ) = and hus f: f = f: f = α f 25) R S ) + ) 26) R S ) R = )R S )+ )R S ). 27) oe ha he poin,r ) is simply an linear inerpolaion of he wo poins,r S )) and,r S )) where he capaciy of SC-PIR for = x is precisely R S x). Moreover, i was shown in [2] ha he se of achievable poins,r ), is he lower convex hull of he se poins {,C ) : []. Therefore, 26) mees he SC-PIR capaciy. VI. DISCUSSIO AD UTURE WORK Recen works on SC-PIR sugges ha coded caching mees PIR [2], [9]; ha is, he file placemen soluions of coded caching [5] are useful for he SC-PIR sub-message placemen problem. In his work, we show ha coded caching placemen echniques are no necessary for SC-PIR by proposing wo novel sub-message placemen schemes which achieve he capaciy. In he coded caching problem, assigning differen files o an exponenially large number of overlapping user groups is necessary o creae mulicasing opporuniies such ha a user can cancel inerference from a received coded ransmission which also serves oher users. The SC-PIR problem is less complex in ha only one user is being served. In fac, as was demonsraed wih our firs proposed scheme, i is no necessary for he sub-message placemen groups o overlap a all. Moreover, he file or sub-message) placemen paradigms of coded caching and SC-PIR are inherenly differen. In coded caching, files are being placed among users ha wish o download conen, while in SC-PIR, sub-messages are being placed among daabases which are serving one user s reques. Therefore, i is no surprising he wo problems could have differen soluions for he sorage/file placemen problem. The resuls of Secion V show ha here exiss simple SC- PIR soluions for non-ineger. or example, he daabases could be spli ino wo disjoin groups, one in which submessages are assigned o sub-groups of size daabases, and anoher where sub-messages are assigned o sub-groups of size daabases. This is conrary o he soluion for non-ineger of he coded caching problem where he sorage of every user is spli ino wo pars o essenially creae wo coded caching neworks ha boh span across all users [5]. While his coded caching mehod was proposed o solve he non-ineger SC- PIR problem in [2], we have shown ha his is no necessary. This work presens several ineresing direcions for fuure work. irs, i remains an open problem o deermine he minimum message size L for a given se of SC-PIR parameers. Using a definiion of he rerieval rae ha is slighly differen from ha of [8], i was shown in [0] ha he minimum L of an S-PIR problem can be reduced significanly from K in [8] o. The new S-PIR scheme [0] can be readily adaped o our proposed SC-PIR o reduce he message size. urhermore, he proof echniques herein may be useful o derive he minimum L for a SC-PIR problem. Second, anoher work [6] has considered random placemen among daabases where a daabase sores a bi of a given message wih probabiliy µ. Ineresingly, his placemen mehod was also used in [] for he coded caching problem. I will be meaningful o examine alernaive random placemen sraegies for he SC-PIR problem where messages are spli ino a finie number of sub-messages. REERECES [] H. Sun and S. A. Jafar, The capaciy of privae informaion rerieval, IEEE Transacions on Informaion Theory, vol. 63, no. 7, pp , 207. [2] M. A. Aia, D. Kumar, and R. Tandon, The capaciy of privae informaion rerieval from uncoded sorage consrained daabases, arxiv preprin arxiv: , 208. [3] B. Chor, O. Goldreich, E. Kushileviz, and M. Sudan, Privae informaion rerieval, in oundaions of Compuer Science, 995. Proceedings., 36h Annual Symposium on. IEEE, 995, pp [4] B. Chor, E. Kushileviz, O. Goldreich, and M. Sudan, Privae informaion rerieval, J. ACM, vol. 45, no. 6, pp , 998. [5] M. A. Maddah-Ali and U. iesen, undamenal limis of caching, Informaion Theory, IEEE Transacions on, vol. 60, no. 5, pp , 204. [6] Y.-P. Wei, B. Arasli, K. Banawan, and S. Ulukus, The capaciy of privae informaion rerieval from decenralized uncoded caching daabases, arxiv preprin arxiv:8.60, 208. [7] C. Tian, H. Sun, and J. Chen, A shannon-heoreic approach o he sorage-rerieval radeoff in pir sysems, in 208 IEEE Inernaional Symposium on Informaion Theory ISIT), June 208, pp [8] H. Sun and S. A. Jafar, Opimal download cos of privae informaion rerieval for arbirary message lengh, IEEE Transacions on Informaion orensics and Securiy, vol. 2, no. 2, pp , 207. [9] R. Tandon, M. Abdul-Wahid,. Almoualem, and D. Kumar, PIR from sorage consrained daabases-coded caching mees PIR, in 208 IEEE Inernaional Conference on Communicaions ICC). IEEE, 208, pp. 7. [0] C. Tian, H. Sun, and J. Chen, Capaciy-achieving privae informaion rerieval codes wih opimal message size and upload cos, arxiv preprin arxiv: , 208. [] M. A. Maddah-Ali and U. iesen, Decenralized coded caching aains order-opimal memory-rae radeoff, eworking, IEEE/ACM Transacions on, vol. 23, no. 4, pp , Aug 205.

Lecture September 6, 2011

Lecture September 6, 2011 cs294-p29 Seminar on Algorihmic Game heory Sepember 6, 2011 Lecure Sepember 6, 2011 Lecurer: Chrisos H. Papadimiriou Scribes: Aloni Cohen and James Andrews 1 Game Represenaion 1.1 abular Form and he Problem

More information

Negative frequency communication

Negative frequency communication Negaive frequency communicaion Fanping DU Email: dufanping@homail.com Qing Huo Liu arxiv:2.43v5 [cs.it] 26 Sep 2 Deparmen of Elecrical and Compuer Engineering Duke Universiy Email: Qing.Liu@duke.edu Absrac

More information

March 13, 2009 CHAPTER 3: PARTIAL DERIVATIVES AND DIFFERENTIATION

March 13, 2009 CHAPTER 3: PARTIAL DERIVATIVES AND DIFFERENTIATION March 13, 2009 CHAPTER 3: PARTIAL DERIVATIVES AND DIFFERENTIATION 1. Parial Derivaives and Differeniable funcions In all his chaper, D will denoe an open subse of R n. Definiion 1.1. Consider a funcion

More information

Performance Analysis of High-Rate Full-Diversity Space Time Frequency/Space Frequency Codes for Multiuser MIMO-OFDM

Performance Analysis of High-Rate Full-Diversity Space Time Frequency/Space Frequency Codes for Multiuser MIMO-OFDM Performance Analysis of High-Rae Full-Diversiy Space Time Frequency/Space Frequency Codes for Muliuser MIMO-OFDM R. SHELIM, M.A. MATIN AND A.U.ALAM Deparmen of Elecrical Engineering and Compuer Science

More information

EE201 Circuit Theory I Fall

EE201 Circuit Theory I Fall EE1 Circui Theory I 17 Fall 1. Basic Conceps Chaper 1 of Nilsson - 3 Hrs. Inroducion, Curren and Volage, Power and Energy. Basic Laws Chaper &3 of Nilsson - 6 Hrs. Volage and Curren Sources, Ohm s Law,

More information

Lecture #7: Discrete-time Signals and Sampling

Lecture #7: Discrete-time Signals and Sampling EEL335: Discree-Time Signals and Sysems Lecure #7: Discree-ime Signals and Sampling. Inroducion Lecure #7: Discree-ime Signals and Sampling Unlike coninuous-ime signals, discree-ime signals have defined

More information

Transmit Beamforming with Reduced Feedback Information in OFDM Based Wireless Systems

Transmit Beamforming with Reduced Feedback Information in OFDM Based Wireless Systems Transmi Beamforming wih educed Feedback Informaion in OFDM Based Wireless Sysems Seung-Hyeon Yang, Jae-Yun Ko, and Yong-Hwan Lee School of Elecrical Engineering and INMC, Seoul Naional Universiy Kwanak

More information

BOUNCER CIRCUIT FOR A 120 MW/370 KV SOLID STATE MODULATOR

BOUNCER CIRCUIT FOR A 120 MW/370 KV SOLID STATE MODULATOR BOUNCER CIRCUIT FOR A 120 MW/370 KV SOLID STATE MODULATOR D. Gerber, J. Biela Laboraory for High Power Elecronic Sysems ETH Zurich, Physiksrasse 3, CH-8092 Zurich, Swizerland Email: gerberdo@ehz.ch This

More information

ECMA st Edition / June Near Field Communication Wired Interface (NFC-WI)

ECMA st Edition / June Near Field Communication Wired Interface (NFC-WI) ECMA-373 1 s Ediion / June 2006 Near Field Communicaion Wired Inerface (NFC-WI) Sandard ECMA-373 1 s Ediion / June 2006 Near Field Communicaion Wired Inerface (NFC-WI) Ecma Inernaional Rue du Rhône 114

More information

4.5 Biasing in BJT Amplifier Circuits

4.5 Biasing in BJT Amplifier Circuits 4/5/011 secion 4_5 Biasing in MOS Amplifier Circuis 1/ 4.5 Biasing in BJT Amplifier Circuis eading Assignmen: 8086 Now le s examine how we C bias MOSFETs amplifiers! f we don bias properly, disorion can

More information

EE 330 Lecture 24. Amplification with Transistor Circuits Small Signal Modelling

EE 330 Lecture 24. Amplification with Transistor Circuits Small Signal Modelling EE 330 Lecure 24 Amplificaion wih Transisor Circuis Small Signal Modelling Review from las ime Area Comparison beween BJT and MOSFET BJT Area = 3600 l 2 n-channel MOSFET Area = 168 l 2 Area Raio = 21:1

More information

P. Bruschi: Project guidelines PSM Project guidelines.

P. Bruschi: Project guidelines PSM Project guidelines. Projec guidelines. 1. Rules for he execuion of he projecs Projecs are opional. Their aim is o improve he sudens knowledge of he basic full-cusom design flow. The final score of he exam is no affeced by

More information

Notes on the Fourier Transform

Notes on the Fourier Transform Noes on he Fourier Transform The Fourier ransform is a mahemaical mehod for describing a coninuous funcion as a series of sine and cosine funcions. The Fourier Transform is produced by applying a series

More information

Receiver-Initiated vs. Short-Preamble Burst MAC Approaches for Multi-channel Wireless Sensor Networks

Receiver-Initiated vs. Short-Preamble Burst MAC Approaches for Multi-channel Wireless Sensor Networks Receiver-Iniiaed vs. Shor-Preamble Burs MAC Approaches for Muli-channel Wireless Sensor Neworks Crisina Cano, Boris Bellala, and Miquel Oliver Universia Pompeu Fabra, C/ Tànger 122-140, 08018 Barcelona,

More information

Variation Aware Cross-Talk Aggressor Alignment by Mixed Integer Linear Programming

Variation Aware Cross-Talk Aggressor Alignment by Mixed Integer Linear Programming ariaion Aware Cross-alk Aggressor Alignmen by Mixed Ineger Linear Programming ladimir Zoloov IBM. J. Wason Research Cener, Yorkown Heighs, NY zoloov@us.ibm.com Peer Feldmann D. E. Shaw Research, New York,

More information

5 Spatial Relations on Lines

5 Spatial Relations on Lines 5 Spaial Relaions on Lines There are number of useful problems ha can be solved wih he basic consrucion echniques developed hus far. We now look a cerain problems, which involve spaial relaionships beween

More information

I. Introduction APLETHORA of real-time multimedia streaming applications

I. Introduction APLETHORA of real-time multimedia streaming applications IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 20, NO. 2, FEBRUARY 2010 297 Fairness Sraegies for Wireless Resource Allocaion Among Auonomous Mulimedia Users Hyunggon Park, Member,

More information

ECMA-373. Near Field Communication Wired Interface (NFC-WI) 2 nd Edition / June Reference number ECMA-123:2009

ECMA-373. Near Field Communication Wired Interface (NFC-WI) 2 nd Edition / June Reference number ECMA-123:2009 ECMA-373 2 nd Ediion / June 2012 Near Field Communicaion Wired Inerface (NFC-WI) Reference number ECMA-123:2009 Ecma Inernaional 2009 COPYRIGHT PROTECTED DOCUMENT Ecma Inernaional 2012 Conens Page 1 Scope...

More information

A WIDEBAND RADIO CHANNEL MODEL FOR SIMULATION OF CHAOTIC COMMUNICATION SYSTEMS

A WIDEBAND RADIO CHANNEL MODEL FOR SIMULATION OF CHAOTIC COMMUNICATION SYSTEMS A WIDEBAND RADIO CHANNEL MODEL FOR SIMULATION OF CHAOTIC COMMUNICATION SYSTEMS Kalle Rui, Mauri Honanen, Michael Hall, Timo Korhonen, Veio Porra Insiue of Radio Communicaions, Helsini Universiy of Technology

More information

Revision: June 11, E Main Suite D Pullman, WA (509) Voice and Fax

Revision: June 11, E Main Suite D Pullman, WA (509) Voice and Fax 2.5.3: Sinusoidal Signals and Complex Exponenials Revision: June 11, 2010 215 E Main Suie D Pullman, W 99163 (509) 334 6306 Voice and Fax Overview Sinusoidal signals and complex exponenials are exremely

More information

Investigation and Simulation Model Results of High Density Wireless Power Harvesting and Transfer Method

Investigation and Simulation Model Results of High Density Wireless Power Harvesting and Transfer Method Invesigaion and Simulaion Model Resuls of High Densiy Wireless Power Harvesing and Transfer Mehod Jaber A. Abu Qahouq, Senior Member, IEEE, and Zhigang Dang The Universiy of Alabama Deparmen of Elecrical

More information

Analysis of Low Density Codes and Improved Designs Using Irregular Graphs

Analysis of Low Density Codes and Improved Designs Using Irregular Graphs Analysis of Low Densiy Codes and Improved Designs Using Irregular Graphs Michael G. Luby Michael Mizenmacher M. Amin Shokrollahi Daniel A. Spielman Absrac In [6], Gallager inroduces a family of codes based

More information

weight: amplitude of sine curve

weight: amplitude of sine curve Joseph Fourier s claim: all signals are sums of sinusoids of differen frequencies. weighed sine curves weigh: ampliude of sine curve all : no exacly bu doesn maer for us in pracice Example: 3 sin() + sin(*)

More information

Distributed Coordinated Signal Timing Optimization in Connected Transportation Networks

Distributed Coordinated Signal Timing Optimization in Connected Transportation Networks Disribued Coordinaed Signal Timing Opimizaion in Conneced Transporaion Neworks Link o he paper: hps://urldefense.proofpoin.com/v2/url?u=hps-3a auhors.elsevier.com_a_1v3f6-2cm0mr5bao&d=dwifaq&c=c3yme8gmkxg_ihjnxs06zywk4ejm8ldrrvxqb-

More information

DAGSTUHL SEMINAR EPIDEMIC ALGORITHMS AND PROCESSES: FROM THEORY TO APPLICATIONS

DAGSTUHL SEMINAR EPIDEMIC ALGORITHMS AND PROCESSES: FROM THEORY TO APPLICATIONS DAGSTUHL SEMINAR 342 EPIDEMIC ALGORITHMS AND PROCESSES: FROM THEORY TO APPLICATIONS A Sysems Perspecive Pascal Felber Pascal.Felber@unine.ch hp://iiun.unine.ch/! Gossip proocols Inroducion! Decenralized

More information

UNIT IV DIGITAL MODULATION SCHEME

UNIT IV DIGITAL MODULATION SCHEME UNI IV DIGIAL MODULAION SCHEME Geomeric Represenaion of Signals Ojecive: o represen any se of M energy signals {s i (} as linear cominaions of N orhogonal asis funcions, where N M Real value energy signals

More information

EXPERIMENT #9 FIBER OPTIC COMMUNICATIONS LINK

EXPERIMENT #9 FIBER OPTIC COMMUNICATIONS LINK EXPERIMENT #9 FIBER OPTIC COMMUNICATIONS LINK INTRODUCTION: Much of daa communicaions is concerned wih sending digial informaion hrough sysems ha normally only pass analog signals. A elephone line is such

More information

Pulse Train Controlled PCCM Buck-Boost Converter Ming Qina, Fangfang Lib

Pulse Train Controlled PCCM Buck-Boost Converter Ming Qina, Fangfang Lib 5h Inernaional Conference on Environmen, Maerials, Chemisry and Power Elecronics (EMCPE 016 Pulse Train Conrolled PCCM Buck-Boos Converer Ming Qina, Fangfang ib School of Elecrical Engineering, Zhengzhou

More information

OpenStax-CNX module: m Elemental Signals. Don Johnson. Perhaps the most common real-valued signal is the sinusoid.

OpenStax-CNX module: m Elemental Signals. Don Johnson. Perhaps the most common real-valued signal is the sinusoid. OpenSax-CNX module: m0004 Elemenal Signals Don Johnson This work is produced by OpenSax-CNX and licensed under he Creaive Commons Aribuion License.0 Absrac Complex signals can be buil from elemenal signals,

More information

Digital Communications - Overview

Digital Communications - Overview EE573 : Advanced Digial Communicaions Digial Communicaions - Overview Lecurer: Assoc. Prof. Dr Noor M Khan Deparmen of Elecronic Engineering, Muhammad Ali Jinnah Universiy, Islamabad Campus, Islamabad,

More information

Surveillance System with Object-Aware Video Transcoder

Surveillance System with Object-Aware Video Transcoder MITSUBISHI ELECTRIC RESEARCH LABORATORIES hp://www.merl.com Surveillance Sysem wih Objec-Aware Video Transcoder Toshihiko Haa, Naoki Kuwahara, Toshiharu Nozawa, Derek Schwenke, Anhony Vero TR2005-115 April

More information

Lab 3 Acceleration. What You Need To Know: Physics 211 Lab

Lab 3 Acceleration. What You Need To Know: Physics 211 Lab b Lab 3 Acceleraion Wha You Need To Know: The Physics In he previous lab you learned ha he velociy of an objec can be deermined by finding he slope of he objec s posiion vs. ime graph. x v ave. = v ave.

More information

Foreign Fiber Image Segmentation Based on Maximum Entropy and Genetic Algorithm

Foreign Fiber Image Segmentation Based on Maximum Entropy and Genetic Algorithm Journal of Compuer and Communicaions, 215, 3, 1-7 Published Online November 215 in SciRes. hp://www.scirp.org/journal/jcc hp://dx.doi.org/1.4236/jcc.215.3111 Foreign Fiber Image Segmenaion Based on Maximum

More information

Anti-Jamming Schedules for Wireless Data Broadcast Systems

Anti-Jamming Schedules for Wireless Data Broadcast Systems Ani-Jamming Schedules for Wireless Daa Broadcas Sysems Paolo Codenoi 1, Alexander Sprinson, and Jehoshua Bruck Absrac Modern sociey is heavily dependen on wireless neworks for providing voice and daa communicaions.

More information

The University of Melbourne Department of Mathematics and Statistics School Mathematics Competition, 2013 JUNIOR DIVISION Time allowed: Two hours

The University of Melbourne Department of Mathematics and Statistics School Mathematics Competition, 2013 JUNIOR DIVISION Time allowed: Two hours The Universiy of Melbourne Deparmen of Mahemaics and Saisics School Mahemaics Compeiion, 203 JUNIOR DIVISION Time allowed: Two hours These quesions are designed o es your abiliy o analyse a problem and

More information

Deblurring Images via Partial Differential Equations

Deblurring Images via Partial Differential Equations Deblurring Images via Parial Dierenial Equaions Sirisha L. Kala Mississippi Sae Universiy slk3@mssae.edu Advisor: Seh F. Oppenheimer Absrac: Image deblurring is one o he undamenal problems in he ield o

More information

A Harmonic Circulation Current Reduction Method for Parallel Operation of UPS with a Three-Phase PWM Inverter

A Harmonic Circulation Current Reduction Method for Parallel Operation of UPS with a Three-Phase PWM Inverter 160 Journal of Power Elecronics, Vol. 5, No. 2, April 2005 JPE 5-2-9 A Harmonic Circulaion Curren Reducion Mehod for Parallel Operaion of U wih a Three-Phase Inverer Kyung-Hwan Kim, Wook-Dong Kim * and

More information

WIRELESS networks are growing rapidly as demand for

WIRELESS networks are growing rapidly as demand for IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL XX, NO XX, MONTH 009 Amplify-and-Forward Relay Neworks Under Received Power Consrain Alireza Shahan Behbahani, Suden Member, IEEE and A M Elawil, Member,

More information

Context-Aware Self-Organized Resource Allocation In Intelligent Water Informatics

Context-Aware Self-Organized Resource Allocation In Intelligent Water Informatics Ciy Universiy of ew York (CUY) CUY Academic Works Inernaional Conference on Hydroinformaics 8-1-2014 Conex-Aware Self-Organized Resource Allocaion In Inelligen Waer Informaics Kyung Sup Kwak Qinghai Yang

More information

Lecture 4. EITN Chapter 12, 13 Modulation and diversity. Antenna noise is usually given as a noise temperature!

Lecture 4. EITN Chapter 12, 13 Modulation and diversity. Antenna noise is usually given as a noise temperature! Lecure 4 EITN75 2018 Chaper 12, 13 Modulaion and diversiy Receiver noise: repeiion Anenna noise is usually given as a noise emperaure! Noise facors or noise figures of differen sysem componens are deermined

More information

Direct Analysis of Wave Digital Network of Microstrip Structure with Step Discontinuities

Direct Analysis of Wave Digital Network of Microstrip Structure with Step Discontinuities Direc Analysis of Wave Digial Nework of Microsrip Srucure wih Sep Disconinuiies BILJANA P. SOŠIĆ Faculy of Elecronic Engineering Universiy of Niš Aleksandra Medvedeva 4, Niš SERBIA MIODRAG V. GMIROVIĆ

More information

Base Station Sleeping and Resource. Allocation in Renewable Energy Powered. Cellular Networks

Base Station Sleeping and Resource. Allocation in Renewable Energy Powered. Cellular Networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Base Saion Sleeping and Resource Allocaion in Renewable Energy Powered Cellular Neworks arxiv:1305.4996v1 [cs.it] 22 May 2013 Jie Gong, Suden Member, IEEE,

More information

Lecture 11. Digital Transmission Fundamentals

Lecture 11. Digital Transmission Fundamentals CS4/MSc Compuer Neworking Lecure 11 Digial Transmission Fundamenals Compuer Neworking, Copyrigh Universiy of Edinburgh 2005 Digial Transmission Fundamenals Neworks consruced ou of Links or ransmission

More information

An off-line multiprocessor real-time scheduling algorithm to reduce static energy consumption

An off-line multiprocessor real-time scheduling algorithm to reduce static energy consumption An off-line muliprocessor real-ime scheduling algorihm o reduce saic energy consumpion Firs Workshop on Highly-Reliable Power-Efficien Embedded Designs Shenzhen, China Vincen Legou, Mahieu Jan, Lauren

More information

University of Maryland, College Park, MD 20742, USA. San Diego, CA 92121, USA.

University of Maryland, College Park, MD 20742, USA. San Diego, CA 92121, USA. On Specrum Sharing in Cooperaive Muliple Access Neworks Amr El-Sherif, Ahmed K. Sadek 2,andK.J.RayLiu Deparmen of Elecrical and Compuer Engineering, 2 Corporae R&D Qualcomm Inc., Universiy of Maryland,

More information

Modulation exercises. Chapter 3

Modulation exercises. Chapter 3 Chaper 3 Modulaion exercises Each problem is annoaed wih he leer E, T, C which sands for exercise, requires some hough, requires some concepualizaion. Problems labeled E are usually mechanical, hose labeled

More information

A Bidirectional Three-Phase Push-Pull Converter With Dual Asymmetrical PWM Method

A Bidirectional Three-Phase Push-Pull Converter With Dual Asymmetrical PWM Method A Bidirecional Three-Phase Push-Pull Converer Wih Dual Asymmeral PWM Mehod Minho Kwon, Junsung Par, Sewan Choi, IEEE Senior Member Deparmen of Elecral and Informaion Engineering Seoul Naional Universiy

More information

On the Security of Angle of Arrival Estimation

On the Security of Angle of Arrival Estimation On he Securiy of Angle of Arrival Esimaion Amr Abdelaziz, C. Emre Koksal and Hesham El Gamal Deparmen of Elecrical and Compuer Engineering The Ohio Sae Universiy Columbus, Ohio 43201 arxiv:1607.00467v1

More information

A Segmentation Method for Uneven Illumination Particle Images

A Segmentation Method for Uneven Illumination Particle Images Research Journal of Applied Sciences, Engineering and Technology 5(4): 1284-1289, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scienific Organizaion, 2013 Submied: July 17, 2012 Acceped: Augus 15, 2012

More information

Analysis of Low Density Codes. and. Improved Designs Using Irregular Graphs. 1 Introduction. codes. As the codes that Gallager builds are derived

Analysis of Low Density Codes. and. Improved Designs Using Irregular Graphs. 1 Introduction. codes. As the codes that Gallager builds are derived Analysis of Low Densiy Codes and Improved Designs Using Irregular Graphs Michael G. Luby Michael Mizenmacher y M. Amin Shokrollahi z Daniel A. Spielman x Absrac In [6], Gallager inroduces a family of codes

More information

7 th International Conference on DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a n i a, M a y 27 29,

7 th International Conference on DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a n i a, M a y 27 29, 7 h Inernaional Conference on DEVEOPMENT AND APPICATION SYSTEMS S u c e a v a, o m a n i a, M a y 27 29, 2 0 0 4 THEE-PHASE AC CHOPPE WITH IGBT s Ovidiu USAU 1, Mihai UCANU, Crisian AGHION, iviu TIGAEU

More information

Parameters Affecting Lightning Backflash Over Pattern at 132kV Double Circuit Transmission Lines

Parameters Affecting Lightning Backflash Over Pattern at 132kV Double Circuit Transmission Lines Parameers Affecing Lighning Backflash Over Paern a 132kV Double Circui Transmission Lines Dian Najihah Abu Talib 1,a, Ab. Halim Abu Bakar 2,b, Hazlie Mokhlis 1 1 Deparmen of Elecrical Engineering, Faculy

More information

THE Cisco visual network index report predicts a drastic

THE Cisco visual network index report predicts a drastic IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 18, NO. 7, JULY 2016 1401 Qualiy of Experience Driven Muli-User Video Sreaming in Cellular Cogniive Radio Neworks Wih Single Channel Access Zhifeng He, Shiwen Mao,

More information

Comparitive Analysis of Image Segmentation Techniques

Comparitive Analysis of Image Segmentation Techniques ISSN: 78 33 Volume, Issue 9, Sepember 3 Compariive Analysis of Image Segmenaion echniques Rohi Sardana Pursuing Maser of echnology (Compuer Science and Engineering) GJU S& Hissar, Haryana Absrac Image

More information

ECE-517 Reinforcement Learning in Artificial Intelligence

ECE-517 Reinforcement Learning in Artificial Intelligence ECE-517 Reinforcemen Learning in Arificial Inelligence Lecure 11: Temporal Difference Learning (con.), Eligibiliy Traces Ocober 8, 2015 Dr. Iamar Arel College of Engineering Deparmen of Elecrical Engineering

More information

A Flexible Contention Resolution Scheme for QoS Provisioning in Optical Burst Switching Networks

A Flexible Contention Resolution Scheme for QoS Provisioning in Optical Burst Switching Networks A Flexible Conenion Resoluion Scheme for QoS Provisioning in Opical Burs Swiching Neworks Ashok K. Turuk a, Rajeev Kumar b,,1 a Deparmen of Compuer Science and Engineering, Naional Insiue of Technology,

More information

Multiple Load-Source Integration in a Multilevel Modular Capacitor Clamped DC-DC Converter Featuring Fault Tolerant Capability

Multiple Load-Source Integration in a Multilevel Modular Capacitor Clamped DC-DC Converter Featuring Fault Tolerant Capability Muliple Load-Source Inegraion in a Mulilevel Modular Capacior Clamped DC-DC Converer Feauring Faul Toleran Capabiliy Faisal H. Khan, Leon M. Tolber The Universiy of Tennessee Elecrical and Compuer Engineering

More information

Performance Evaluation of a MAC Protocol for Radio over Fiber Wireless LAN operating in the 60-GHz band

Performance Evaluation of a MAC Protocol for Radio over Fiber Wireless LAN operating in the 60-GHz band Performance Evaluaion of a Proocol for Radio over Fiber Wireless LAN operaing in he -GHz band Hong Bong Kim, Adam Wolisz Telecommunicaion Neworks Group Deparmen of Elecrical and Compuer Engineering Technical

More information

Joint Watermarking and Compression for Images in Transform Domain

Joint Watermarking and Compression for Images in Transform Domain Vol.2, Issue.4, July-Aug. 2012 pp-2341-2351 ISSN: 2249-6645 Join Waermarking and Compression for Images in Transform Domain Gamal Fahmy Elecrical Engineering Dep., Assiu Universiy, Egyp, Absrac: Image

More information

On the Scalability of Ad Hoc Routing Protocols

On the Scalability of Ad Hoc Routing Protocols On he Scalabiliy of Ad Hoc Rouing Proocols César A. Saniváñez Bruce McDonald Ioannis Savrakakis Ram Ramanahan Inerne. Research Dep. Elec. & Comp. Eng. Dep. Dep. of Informaics Inerne. Research Dep. BBN

More information

Social-aware Dynamic Router Node Placement in Wireless Mesh Networks

Social-aware Dynamic Router Node Placement in Wireless Mesh Networks Social-aware Dynamic Rouer Node Placemen in Wireless Mesh Neworks Chun-Cheng Lin Pei-Tsung Tseng Ting-Yu Wu Der-Jiunn Deng ** Absrac The problem of dynamic rouer node placemen (dynrnp) in wireless mesh

More information

Evaluation of Instantaneous Reliability Measures for a Gradual Deteriorating System

Evaluation of Instantaneous Reliability Measures for a Gradual Deteriorating System General Leers in Mahemaic, Vol. 3, No.3, Dec 27, pp. 77-85 e-issn 259-9277, p-issn 259-9269 Available online a hp:\\ www.refaad.com Evaluaion of Insananeous Reliabiliy Measures for a Gradual Deerioraing

More information

Chapter 14: Bandpass Digital Transmission. A. Bruce Carlson Paul B. Crilly 2010 The McGraw-Hill Companies

Chapter 14: Bandpass Digital Transmission. A. Bruce Carlson Paul B. Crilly 2010 The McGraw-Hill Companies Communicaion Sysems, 5e Chaper 4: Bandpass Digial Transmission A. Bruce Carlson Paul B. Crilly The McGraw-Hill Companies Chaper 4: Bandpass Digial Transmission Digial CW modulaion Coheren binary sysems

More information

Network Design and Optimization for Quality of Services in Wireless Local Area Networks using Multi-Objective Approach

Network Design and Optimization for Quality of Services in Wireless Local Area Networks using Multi-Objective Approach Chuima Prommak and Naruemon Waanapongsakorn Nework Design and Opimizaion for Qualiy of Services in Wireless Local Area Neworks using Muli-Objecive Approach CHUTIMA PROMMAK, NARUEMON WATTANAPONGSAKORN *

More information

Examination Mobile & Wireless Networking ( ) April 12,

Examination Mobile & Wireless Networking ( ) April 12, Page 1 of 5 Examinaion Mobile & Wireless Neworking (192620010) April 12, 2017 13.45 16.45 Noes: Only he overhead shees used in he course, 2 double-sided shees of noes (any fon size/densiy!), and a dicionary

More information

Architectures for Resource Reservation Modules for Optical Burst Switching Core Nodes *

Architectures for Resource Reservation Modules for Optical Burst Switching Core Nodes * 4. ITG-Fachagung Phoonic Neworks, May 5. - 6., 2003, Leipzig, Germany Archiecures for Resource Reservaion Modules for Opical Burs Swiching Core Nodes * Sascha Junghans, Chrisoph M. Gauger Universiy of

More information

PILOT SYMBOL DESIGN FOR CHANNEL ESTIMATION IN MIMO-OFDM SYSTEMS WITH NULL SUBCARRIERS

PILOT SYMBOL DESIGN FOR CHANNEL ESTIMATION IN MIMO-OFDM SYSTEMS WITH NULL SUBCARRIERS h European Signal Processing Conference (EUSIPCO- Aalborg, Denmark, Augus -7, PILOT SYMBOL DESIGN FOR CHANNEL ESTIMATION IN MIMO-OFDM SYSTEMS WITH NULL SUBCARRIERS Emmanuel Manasseh, Shuichi Ohno, Masayoshi

More information

Square Waves, Sinusoids and Gaussian White Noise: A Matching Pursuit Conundrum? Don Percival

Square Waves, Sinusoids and Gaussian White Noise: A Matching Pursuit Conundrum? Don Percival Square Waves, Sinusoids and Gaussian Whie Noise: A Maching Pursui Conundrum? Don Percival Applied Physics Laboraory Deparmen of Saisics Universiy of Washingon Seale, Washingon, USA hp://faculy.washingon.edu/dbp

More information

Wrap Up. Fourier Transform Sampling, Modulation, Filtering Noise and the Digital Abstraction Binary signaling model and Shannon Capacity

Wrap Up. Fourier Transform Sampling, Modulation, Filtering Noise and the Digital Abstraction Binary signaling model and Shannon Capacity Wrap Up Fourier ransorm Sampling, Modulaion, Filering Noise and he Digial Absracion Binary signaling model and Shannon Capaciy Copyrigh 27 by M.H. Perro All righs reserved. M.H. Perro 27 Wrap Up, Slide

More information

Teacher Supplement to Operation Comics, Issue #5

Teacher Supplement to Operation Comics, Issue #5 eacher Supplemen o Operaion Comics, Issue #5 he purpose of his supplemen is o provide conen suppor for he mahemaics embedded ino he fifh issue of Operaion Comics, and o show how he mahemaics addresses

More information

Optical Short Pulse Generation and Measurement Based on Fiber Polarization Effects

Optical Short Pulse Generation and Measurement Based on Fiber Polarization Effects Opical Shor Pulse Generaion and Measuremen Based on Fiber Polarizaion Effecs Changyuan Yu Deparmen of Elecrical & Compuer Engineering, Naional Universiy of Singapore, Singapore, 117576 A*STAR Insiue for

More information

Bounded Iterative Thresholding for Lumen Region Detection in Endoscopic Images

Bounded Iterative Thresholding for Lumen Region Detection in Endoscopic Images Bounded Ieraive Thresholding for Lumen Region Deecion in Endoscopic Images Pon Nidhya Elango School of Compuer Science and Engineering Nanyang Technological Universiy Nanyang Avenue, Singapore Email: ponnihya88@gmail.com

More information

A New Antenna Selection Algorithm in Cognitive MIMO Systems

A New Antenna Selection Algorithm in Cognitive MIMO Systems Cyber Journals: Mulidisciplinary Journals in Science and echnology, Journal of Seleced Areas in elecommunicaions (JSA), ovember Ediion, 11 A ew Anenna Selecion Algorihm in Cogniive MIMO Sysems Zhang an,

More information

TELE4652 Mobile and Satellite Communications

TELE4652 Mobile and Satellite Communications TELE465 Mobile and Saellie Communicaions Assignmen (Due: 4pm, Monday 7 h Ocober) To be submied o he lecurer before he beginning of he final lecure o be held a his ime.. This quesion considers Minimum Shif

More information

f t 2cos 2 Modulator Figure 21: DSB-SC modulation.

f t 2cos 2 Modulator Figure 21: DSB-SC modulation. 4.5 Ampliude modulaion: AM 4.55. DSB-SC ampliude modulaion (which is summarized in Figure 21) is easy o undersand and analyze in boh ime and frequency domains. However, analyical simpliciy is no always

More information

Traffic. analysis. The general setting. Example: buffer. Arrival Curves. Cumulative #bits: R(t), R*(t) Instantaneous speeds: r(t), r*(t)

Traffic. analysis. The general setting. Example: buffer. Arrival Curves. Cumulative #bits: R(t), R*(t) Instantaneous speeds: r(t), r*(t) The general seing Traffic Cumulaive #bis: R(), R*() Insananeous speeds: r(), r*() analysis R(): arrivals sysem R*(): deparures Lecure 7 2 Lecure 7 3 Example: buffer R() R*() bi rae c R() = #bis ha arrived

More information

Analysis ofthe Effects ofduty Cycle Constraints in Multiple-Input Converters for Photovoltaic Applications

Analysis ofthe Effects ofduty Cycle Constraints in Multiple-Input Converters for Photovoltaic Applications Analysis ofhe Effecs ofduy Cycle Consrains in Muliple-Inpu Converers for Phoovolaic Applicaions Junseok Song and Alexis Kwasinski Deparmen ofelecrical and Compuer Engineering The Universiy oftexas a Ausin

More information

Channel Estimation for Wired MIMO Communication Systems

Channel Estimation for Wired MIMO Communication Systems Channel Esimaion for Wired MIMO Communicaion Sysems Final Repor Mulidimensional DSP Projec, Spring 2005 Daifeng Wang Absrac This repor addresses raining-based channel modeling and esimaion for a wired

More information

On the Efficiency of Shaping Live Video Streams

On the Efficiency of Shaping Live Video Streams On he Efficiency of Shaping Live Video Sreams György Dán and Vikoria Fodor KTH, Royal Insiue of Technology Elecrum 9, 6440 Kisa, Sweden gyuri,vikoria @i.kh.se Absrac In his work he efficiency of shaping

More information

Performance Analysis of A Burst-Frame-Based MAC Protocol for Ultra-Wideband Ad Hoc Networks

Performance Analysis of A Burst-Frame-Based MAC Protocol for Ultra-Wideband Ad Hoc Networks Performance Analysis of A Burs-Frame-Based MAC Proocol for Ulra-Wideband Ad Hoc Neworks Kejie Lu, Dapeng Wu, Yuguang Fang Deparmen of Elecrical and Compuer Engineering Universiy Of Florida Gainesville,

More information

Dead Zone Compensation Method of H-Bridge Inverter Series Structure

Dead Zone Compensation Method of H-Bridge Inverter Series Structure nd Inernaional Conference on Elecrical, Auomaion and Mechanical Engineering (EAME 7) Dead Zone Compensaion Mehod of H-Bridge Inverer Series Srucure Wei Li Insiue of Elecrical Engineering and Informaion

More information

DURING last decade, many communication technologies

DURING last decade, many communication technologies 1 TeamPhone: Neworking Smarphones for isaser Recovery Zongqing Lu, Guohong ao, and Thomas La Pora and suppors daa communicaions among rescue workers in infrasrucure-consrained and infrasrucure-less scenarios.

More information

Figure A linear pair? Explain. No, because vertical angles are not adjacent angles, and linear pairs are.

Figure A linear pair? Explain. No, because vertical angles are not adjacent angles, and linear pairs are. Geomery Review of PIL KEY Name: Parallel and Inersecing Lines Dae: Per.: PIL01: Use complemenary supplemenary and congruen o compare wo angles. 1) Complee he following definiion: Two angles are Complemenary

More information

Experiment 6: Transmission Line Pulse Response

Experiment 6: Transmission Line Pulse Response Eperimen 6: Transmission Line Pulse Response Lossless Disribued Neworks When he ime required for a pulse signal o raverse a circui is on he order of he rise or fall ime of he pulse, i is no longer possible

More information

Errata and Updates for ASM Exam MLC (Fourteenth Edition) Sorted by Page

Errata and Updates for ASM Exam MLC (Fourteenth Edition) Sorted by Page Erraa for ASM Exam MLC Sudy Manual (Foureenh Ediion) Sored by Page 1 Erraa and Updaes for ASM Exam MLC (Foureenh Ediion) Sored by Page Pracice Exam 7:25 (page 1386) is defecive, Pracice Exam 5:21 (page

More information

Technology Trends & Issues in High-Speed Digital Systems

Technology Trends & Issues in High-Speed Digital Systems Deailed comparison of dynamic range beween a vecor nework analyzer and sampling oscilloscope based ime domain reflecomeer by normalizing measuremen ime Sho Okuyama Technology Trends & Issues in High-Speed

More information

Motion-blurred star image acquisition and restoration method based on the separable kernel Honglin Yuana, Fan Lib and Tao Yuc

Motion-blurred star image acquisition and restoration method based on the separable kernel Honglin Yuana, Fan Lib and Tao Yuc 5h Inernaional Conference on Advanced Maerials and Compuer Science (ICAMCS 206) Moion-blurred sar image acquisiion and resoraion mehod based on he separable kernel Honglin Yuana, Fan Lib and Tao Yuc Beihang

More information

Table of Contents. 3.0 SMPS Topologies. For Further Research. 3.1 Basic Components. 3.2 Buck (Step Down) 3.3 Boost (Step Up) 3.4 Inverter (Buck/Boost)

Table of Contents. 3.0 SMPS Topologies. For Further Research. 3.1 Basic Components. 3.2 Buck (Step Down) 3.3 Boost (Step Up) 3.4 Inverter (Buck/Boost) Table of Conens 3.0 SMPS Topologies 3.1 Basic Componens 3.2 Buck (Sep Down) 3.3 Boos (Sep Up) 3.4 nverer (Buck/Boos) 3.5 Flyback Converer 3.6 Curren Boosed Boos 3.7 Curren Boosed Buck 3.8 Forward Converer

More information

Mobile Robot Localization Using Fusion of Object Recognition and Range Information

Mobile Robot Localization Using Fusion of Object Recognition and Range Information 007 IEEE Inernaional Conference on Roboics and Auomaion Roma, Ialy, 10-14 April 007 FrB1.3 Mobile Robo Localizaion Using Fusion of Objec Recogniion and Range Informaion Byung-Doo Yim, Yong-Ju Lee, Jae-Bok

More information

Memorandum on Impulse Winding Tester

Memorandum on Impulse Winding Tester Memorandum on Impulse Winding Teser. Esimaion of Inducance by Impulse Response When he volage response is observed afer connecing an elecric charge sored up in he capaciy C o he coil L (including he inside

More information

Mobile Communications Chapter 3 : Media Access

Mobile Communications Chapter 3 : Media Access Moivaion Can we apply media access mehods from fixed neworks? Mobile Communicaions Chaper 3 : Media Access Moivaion SDMA, FDMA, TDMA Aloha Reservaion schemes Collision avoidance, MACA Polling CDMA SAMA

More information

How to Shorten First Order Unit Testing Time. Piotr Mróz 1

How to Shorten First Order Unit Testing Time. Piotr Mróz 1 How o Shoren Firs Order Uni Tesing Time Pior Mróz 1 1 Universiy of Zielona Góra, Faculy of Elecrical Engineering, Compuer Science and Telecommunicaions, ul. Podgórna 5, 65-246, Zielona Góra, Poland, phone

More information

Modeling and Prediction of the Wireless Vector Channel Encountered by Smart Antenna Systems

Modeling and Prediction of the Wireless Vector Channel Encountered by Smart Antenna Systems Modeling and Predicion of he Wireless Vecor Channel Encounered by Smar Anenna Sysems Kapil R. Dandekar, Albero Arredondo, Hao Ling and Guanghan Xu A Kalman-filer based, vecor auoregressive (VAR) model

More information

Research Article The RSU Access Problem Based on Evolutionary Game Theory for VANET

Research Article The RSU Access Problem Based on Evolutionary Game Theory for VANET Disribued Sensor Neworks Volume 203, Aricle ID 43024, 7 pages hp://dx.doi.org/0.55/203/43024 esearch Aricle The SU Access Problem Based on Evoluionary Game Theory for VANET Di Wu, Yan Ling, Hongsong Zhu,

More information

When answering the following 25 questions, always remember that there is someone who has to grade them. So please use legible handwriting.

When answering the following 25 questions, always remember that there is someone who has to grade them. So please use legible handwriting. 38963, VU Mobile Kommunikaion Miderm Exam: Insiu für Nachrichenechnik und Hochfrequenzechnik When answering he following 5 quesions, always remember ha here is someone who has o grade hem So please use

More information

ELEG 3124 SYSTEMS AND SIGNALS Ch. 1 Continuous-Time Signals

ELEG 3124 SYSTEMS AND SIGNALS Ch. 1 Continuous-Time Signals Deparmen of Elecrical Engineering Universiy of Arkansas ELEG 3124 SYSTEMS AND SIGNALS Ch. 1 Coninuous-Time Signals Dr. Jingxian Wu wuj@uark.edu OUTLINE 2 Inroducion: wha are signals and sysems? Signals

More information

Phase-Shifting Control of Double Pulse in Harmonic Elimination Wei Peng1, a*, Junhong Zhang1, Jianxin gao1, b, Guangyi Li1, c

Phase-Shifting Control of Double Pulse in Harmonic Elimination Wei Peng1, a*, Junhong Zhang1, Jianxin gao1, b, Guangyi Li1, c Inernaional Symposium on Mechanical Engineering and Maerial Science (ISMEMS 016 Phase-Shifing Conrol of Double Pulse in Harmonic Eliminaion Wei Peng1, a*, Junhong Zhang1, Jianxin gao1, b, Guangyi i1, c

More information

ACTIVITY BASED COSTING FOR MARITIME ENTERPRISES

ACTIVITY BASED COSTING FOR MARITIME ENTERPRISES ACTIVITY BASED COSTING FOR MARITIME ENTERPRISES 1, a 2, b 3, c 4, c Sualp Omer Urkmez David Sockon Reza Ziarai Erdem Bilgili a, b De Monfor Universiy, UK, c TUDEV, Insiue of Mariime Sudies, Turkey 1 sualp@furrans.com.r

More information

Efficient Data Encoding and Decoding for Network-On-Chip Application

Efficient Data Encoding and Decoding for Network-On-Chip Application Inernaional Journal of Curren Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Righs Reserved Available a hp://inpressco.com/caegory/ijce Research Aricle Efficien Daa Encoding

More information

Free and Forced Vibrations of Two Degree of Systems

Free and Forced Vibrations of Two Degree of Systems ree and orced Vibraions of Two Degree of Syses Inroducion: The siple single degree-of-freedo syse can be coupled o anoher of is ind, producing a echanical syse described by wo coupled differenial equaions;

More information