A New Design of Private Information Retrieval for Storage Constrained Databases
|
|
- Maximilian Baker
- 5 years ago
- Views:
Transcription
1 A ew Design of Privae Informaion Rerieval for Sorage Consrained Daabases icholas Woolsey, Rong-Rong Chen, and Mingyue Ji Deparmen of Elecrical and Compuer Engineering, Universiy of Uah Sal Lake Ciy, UT, USA arxiv: v [cs.it] 22 Jan 209 Absrac Privae informaion rerieval PIR) allows a user o download one of K messages from daabases wihou revealing o any daabase which of he K messages is being downloaded. In general, he daabases can be sorage consrained where each daabase can only sore up o µkl bis where µ and L is he size of each message in bis. Le = µ, a recen work showed ha he capaciy of Sorage Consrained PIR SC-PIR) is + + ) + +, which is achieved by a sorage 2 K placemen scheme inspired by he conen placemen scheme in he lieraure of coded caching and he original PIR scheme. o surprisingly, his achievable scheme requires ha each message is L = ) K bis in lengh, which can be impracical. In his paper, wihou rying o make he connecion beween SC-PIR and coded caching problems, based on a general connecion beween he ull Sorage PIR S-PIR) problem µ = ) and SC- PIR problem, we propose a new SC-PIR design idea using novel sorage placemen schemes. The proposed schemes significanly reduce he message size requiremen while sill meeing he capaciy of SC-PIR. In paricular, he proposed SC-PIR schemes require he size of each file o be only L = K compared o he sae-of-he-ar L = ) K. Hence, we conclude ha PIR may no mee coded caching when he size of L is consrained. I. ITRODUCTIO Recen works have aken an informaion heoreic approach o solve he privae informaion rerieval PIR) problem [], [2] originally inroduced by Chor e al. [3], [4]. In he PIR problem, a user desires o privaely download one of K messages from non-colluding daabases. In his conex, privacy means ha he ideniy of he message desired by he user is no revealed o any daabase. Ensuring privacy relies on he concep ha a user will reques sub-messages from all K messages as opposed o jus he message ha he user desires. To efficienly download he desired message, he user sraegically generaes daabase queries ha uilize undesired bu downloaded sub-messages for coding opporuniies. The rae of a PIR scheme is defined as he raio of desired bis, L, or he size of each message, o he oal number of downloaded bis, D. The capaciy C opimal rae) is defined as he maximum achievable rae. Previously, Sun and Jafar [] derived he capaciy of he ull Sorage PIR S-PIR) problem where a user privaely downloads one of K messages from daabases ha each sores all K messages. In his case, he capaciy is C = + + ), which was achieved by a K PIR scheme requiring L = K. This resul was furher generalized by Aia e al. [2] for he Sorage Consrained PIR SC-PIR) problem where each daabase can only sore µkl uncoded bis where µ. In his case, boh a sorage placemen scheme and a PIR scheme querying and decoding) need o be designed. Le = µ, he capaciy of SC-PIR is + + ) under an uncoded K sorage placemen consrain and was achieved by a sorage placemen scheme inspired by he coded caching problem [5] and a PIR scheme based on []. One of he limiaions of his scheme is he requiremen of a large message size, L = ) K [2], which is due o he fac ha he sorage placemen is designed based on he cache placemen in coded caching problem [5]. Hence, he proposed PIR scheme of [2] can be impracical for a large number of daabases. This achievable scheme was generalized o he decenralized sorage placemen in [6]. urhermore, Tian e al. [7] use Shannon heoreic approach o analyze he SC-PIR problem for he canonical case of K = 2 and = 2 and proposed he opimal linear scheme. More ineresingly, hey also showed ha non-linear scheme can use less sorage han he opimal linear scheme. In his paper, we aim o find SC-PIR schemes ha achieve he capaciy of SC-PIR while requiring a significanly smaller message size L. In order o achieve his goal, for he sorage placemen, we abandon he idea of using he cache placemen of coded caching problem and design i from scrach. In fac, our proposed SC-PIR schemes achieve he capaciy and require only L = K, which is significanly less han L = ) K in [2]. More specifically, our conribuions are as follows. Our Conribuions: ) We provide a general design mehodology for he SC- PIR problem by esablishing a generic connecion beween he S-PIR and SC-PIR problems. Based on his connecion, a SC-PIR scheme can be readily designed from any given S-PIR scheme. 2) We propose a simple sorage placemen when is an ineger. By adoping he achievable scheme based on [], he capaciy of SC-PIR can be achieved and L = K. This serves as a base case for he more general scenario when is no an ineger. 3) When is no an ineger, we propose a novel sorage placemen, which in conjuncion wih he S-PIR scheme of [8], achieves he capaciy of SC-PIR and only
2 requires L = K. The key o he reducion in L is achieved using he proposed novel sorage placemen. 4) We presen a se of sufficien condiions under which he proposed SC-PIR schemes are capaciy-achieving. oaion Convenion: We use o represen he cardinaliy of a se or he lengh of a vecor and [n] := [,2,...,n]. II. PROBLEM ORMULATIO There are K independen messages, W,...,W K, each of size L bis. The messages are collecively sored in an uncoded fashion among non-colluding daabases ha each has a sorage capaciy of µkl bis, where µ. We define Z n as he sorage conens of daabase n []. Also, we define µ as he average number of imes each bi of he messages is sored among he daabases. A user makes a reques W k and sends a query Q [k] n, which is independen of he messages, o each daabase n [] which hen sends an answer A [k] n such ha HA [k] n Z n,q [k] ) = 0, k [K]. ) n urhermore, given he answers from all he daabases, he user mus be able o recover he requesed message wih a small probabiliy of error. Therefore, HW k A [k],...,a[k] n,q [k],...,q[k] n ) = 0. 2) The user generaes queries in a manner o ensure privacy such ha no daabase has insigh ino which message he user desires, i.e., Ik;Q [k] n,a[k] n,w,...,w K,Z,...,Z ) = 0. 3) Le D be he oal number of downloaded bis. Given µ, we say ha a pair D,L) is achievable if here exiss a SC-PIR scheme wih rae L/D ha saisfies )-3). The SC-PIR capaciy is defined as C µ) = max{r : D,L) is achievable. 4) III. THE PROPOSED SC-PIR SCHEME WHE Z+ In order o presen he proposed scheme, we need o esablish a connecion beween S-PIR and SC-PIR problems. This connecion is vial o reduce he required minimum size of messages from ) K, as in he sae-of-he-ar scheme of [2], o K wihou affecing he opimal rae. We show ha an achievable SC-PIR scheme can be derived from any general achievable scheme for he S-PIR problem. Hence, by using he proposed sorage placemen, he achievable scheme in [] can be used o obain a new SC-PIR scheme. To illusrae our idea, we firs presen an example as follows. A. A Sorage Consrained PIR Example when Z+ Consider = 4 daabases labeled as DB hrough DB4. Collecively he daabases sore K = 3 messages, denoed by A, B and C. Each message is comprised of L = 6 bis. ) Sorage placemen scheme: We spli each message as follows. A = {a j i : i [2],j [8] 5) B = {b j i : i [2],j [8] 6) C = {c j i : i [2],j [8]. 7) Each daabase has he sorage capaciy of up o 24 bis, or half of all 3 messages µ = 2). The sorage conens of he daabases are defined o be Z = Z 2 = Z 3 = Z 4 = {a j : j [8] {b j : j [8] {c j : j [8] {a j 2 : j [8] {b j 2 : j [8] 8) {c j 2 : j [8]. 2) PIR Scheme: Each daabase sores 8 ou of 6 bis of each message. Daabases and 2 have he same sorage conens, bu do no have any sorage conens in common wih daabases 3 and 4. Likewise, daabases 3 and 4 have he same sorage conens. In his way, we essenially reduce a SC-PIR problem ino wo independen S-PIR problems; one consiss of daabases and 2, and he oher consiss of daabases 3 and 4. Subsequenly, we can simply adop he achievable S- PIR scheme of [] o generae he queries for each pair of he daabases separaely. The queries of a user ha desires message A are shown in Table I. TABLE I STORAGE COSTRAIED PIR, = 4, K = 3, µ = 2 DB DB2 DB3 DB4 a 5 b 8 c 6 a b 3 c a 5 2 b 7 2 c 4 2 a 2 2 b 6 2 c 2 2 a 6 +b 3 a 3 +b 8 a 2 +b 6 2 a 7 2 +b 7 2 a 7 +c a 8 +c 6 a 6 2 +c 2 2 a 8 2 +c 4 2 b 6 +c 5 b 7 +c 3 b 3 2 +c 6 2 b 8 2 +c 7 2 a 2 +b 7 +c 3 a 4 +b 6 +c 5 a 3 2 +b 8 2 +c 7 2 a 4 2 +b 3 2 +c 6 2 3) Achievable Rae: The oal number of downloaded bis is D = 28. Thus, we have for his scheme L D = 6 4 9) 28 = 7, which achieves he capaciy of + + ) = ) = Compared o he SC-PIR scheme of [2] ha requires L = ) K = 4 2) 2 3 = 48 bis, he proposed SC-PIR requires only L = 6 bis. 4) Privacy Consrain: Privacy is ensured since he S-PIR scheme of [] is used o privaely download half of message A from DB and DB2 and he oher half from DB3 and DB4. The query o each daabase is symmeric such ha for each bi of A ha is requesed, a bi each from B and C are also requesed. All coded pairs of bis from he 3 messages are requesed an equal number of imes. Ulimaely, he user can decode all bis of message A, because downloaded bis of B andc can be used for decoding see Table I). In he following, we will firs formalize he connecion beween he S-PIR and SC-PIR problems and hen generalize his example.
3 B. The general connecion beween he S-PIR and SC-PIR Define a vecor α = [α,...,α ], where Z +, i= α i =, and α f, f [] is raional number such ha α f L Z +. or all k [K], we divide message W k ino disjoin sub-messages W k = W k,,...,w k, such ha for all f [], W k,f = α f L bis. or all f [], le M f W k,f, 0) k [K] and f [] be a non-empy subse of daabases which have he sub-messages in M f locally available o hem. The sorage conens of daabase n [] is Z n = {M f : f [],n f, ) where we have he requiremen ha for any n [], α f µ. 2) {f:f [],n f Given ha a user requess file W θ for some θ [K], we do he following. or all f [], using a S-PIR scheme, he user generaes a query o privaely downloadw θ,f from he daabases in f. In oher words, a SC-PIR scheme can be found by applying a S-PIR scheme o each se of daabases f. Changing he choice of he S-PIR scheme or he definiions of f will resul in new SC-PIR schemes. The rae of he SC-PIR scheme as a funcion of he rae of he implemened S-PIR scheme is given in he following heorem. Theorem : Given,K, Z + and α, spli each of he L-bi messages W,...,W K ino sub-messages of size α L,...,α L and sore hem a ses of daabases,..., [], respecively. Given a se of S-PIR schemes wih achievable raesr,...,r, he achievable rae of privaely downloading W θ, θ [K], from he sorage consrained daabases is α + α α ). 3) R R 2 R Proof: We firs coun he number of downloaded bis. or all f [], R f = α fl D f where D f is he number of downloaded bis necessary o privaely download W θ,f of size α f L bis from he daabases in f. Therefore, he oal number of bis required o privaely download he enirey of W θ is α D = D +D 2 + +D = L + α α ). R R 2 R Since L D, we obain 3). C. General Achievable Sorage Consrained PIR Scheme When Z+ ) Sorage Placemen Scheme: Given Z + and [] such ha Z +, le = and for each k [K], spli message W k ino disjoin, equal-size sub-messages, W k,,...,w k,. urhermore, spli he daabases ino disjoin groups of size labeled as,...,. or each f [ ], he sub-messages of M f = W k,f 4) k [K] are sored a every daabase of f. 2) PIR Scheme: A user desires o privaely download message W θ for some θ [K]. or each f [ ], he user generaes a query using he scheme of [], o privaely downloadw θ,f from hedaabases in f. The user combines he downloaded sub-messages, W θ,,...,w θ, o recover he desired message W θ. To implemen his SC-PIR scheme, each message is spli ino equal-size, disjoin sub-messages. urhermore, he adapaion of he S-PIR scheme of [] requires ha each sub-message is furher spli ino K equal-size, disjoin submessages. The resuling SC-PIR requires a oal of L = K = K bis. An example of his SC-PIR scheme is described in Secion III-A. 3) Achievable Rae: The achievable rae of his scheme is summarized as follows. Theorem 2: Given,K, and µ [,], such ha = µ [], Z + and L = K, for a user o privaely download one of K L-bi messages from daabases wih a sorage capaciy of µkl bis, he achievable rae is ) K. 5) Moreover, i was shown in [2] ha 5) is he capaciy of SC-PIR for Z +. While we do no direcly prove Theorem 2 here, in Secion V we presen a se of sufficien condiions, which his scheme saisfies, for an SC-PIR scheme o mee he capaciy. IV. THE PROPOSED SC-PIR SCHEME WHE In Secion III, we esablished a general connecion beween SC-PIR and S-PIR problems. We showed ha by properly spliing messages and allocaing sub-messages o differen groups of daabases, a SC-PIR scheme can be derived by applying a separaely designed S-PIR scheme o each group of daabases. In paricular, when choosing he S-PIR scheme o be he one in [], we obain a SC-PIR scheme ha achieves capaciy while requiring Z +. In order o remove his resricion, in his secion, we propose a new sorage placemen and use i in conjuncion wih he achievable S-PIR scheme of [8] o obain a new SC-PIR scheme. This scheme achieves capaciy while requiring only L = K, which is he same as he scheme of Secion III-C when Z+. A. A Sorage Consrained PIR Example when In his example, = 5 daabases, labeled DB hrough DB5, collecively sore K = 2 messages, A and B, and each has a size of L = 5 bis. Each daabase sores an µ = 3 5 fracion of he 2-message library = µ = 3).
4 ) Sorage Placemen Scheme: Each message is spli as follows. A = {a j i : i [5],j [3], B = {b j i : i [5],j [3]. 6) By his labeling, we have essenially spli he messages in wo phases. The firs spliing phase, denoed by he subscrip, deermines which daabases sore hese bis. The second spliing, denoed by he superscrip, is necessary o perform he S-PIR scheme. or all f [5], define M f = ) a j f bj f 7) j [3] and le he se of daabases f = [ 2 : 0] f locally sore he bis of M f. oe ha as opposed o he SC-PIR scheme described in Secion III-A where he ses of daabases { f,f =,, are muually exclusive, here we allow hem o overlap and hence removing he ineger consrain of Z+. As a resul, he bis of message A sored a DB n [5] are { Z n = a j i : i {[0 : 2] n,j [3]. 8) Message B is sored among he daabases in a similar manner. or insance, DB2 sores all bis a j i and bj i such ha i [2 : 4] and DB5 sores all bis a j i and bj i such ha i {5,,2. TABLE II STORAGE COSTRAIED PIR, = 5, K = 2, µ = 3 5 DB DB2 DB3 DB4 DB5,2,3) 2,3,4) 3,4,5) 4,5,) 5,,2) a 3 b 2 a 3 2 b 2 2 a 3 b 3 3 a 2 4 b 3 4 a 2 5 b 5 a 2 +b 2 2 a 3 3 +b 3 3 a 3 4 +b 3 4 a 5 +b 5 a 2 +b 2 a 2 3 +b 3 3 a 4 +b 3 4 a 3 5 +b 5 a +b 2 a 2 2 +b 2 2 2) PIR Scheme: The queries of a user ha desires o privaely download message A are shown in Table II. The op row of he able conains daabase labels and he 3-uple below each daabase label defines he subscrips of he bis ha are locally available o ha daabase. The remaining hree rows of he able show he queries of he user. The user adops he S-PIR scheme of [8] o design queries. or insance, o obain bis {a j,j [3], he user applies he S-PIR o DB, DB4, and DB5. In he firs round, he user obains a 3 from DB. In he second round, he user can decode a from DB4 s ransmission of a + b 2 because he user had already received b 2 from he firs round ransmission of DB in round. Similarly, he user decodes a 2 from DB5 s ransmission of a 2 + b 2. These ransmissions are highlighed in red in Table II. To ensure privacy, he queries are symmeric and no bi is requesed more han once from any one daabase. In his example, D = 20 bis are downloaded and he rae is 3 4. Comparing o he sae-of-he-ar SC-PIR scheme We impose he following noaion: a b = a+b mod )+ and [a : a 2 ] b = {a b : a [a : a 2 ]. of [2], he rae is he same, bu L has been reduced from ) K = 5 3) 3 2 = 90 o K = = 5. B. General Achievable SC-PIR Scheme When ) Sorage Placemen Scheme: or each k [K], message W k is spli ino disjoin equal-size sub-messages W k,,...,w k,. or all f [], define a se of sub-messages M f = k [K] W k,f which is locally sored a he se of daabases f = [ ) : 0] f. 2) PIR Scheme: A user desires o privaely download message W θ for some θ [K]. or each f [], he user generaes a query using he scheme of [8], o privaely downloadw θ,f from hedaabases in f. The user combines he downloaded sub-messages, W θ,,...,w θ, o recover he desired message W θ. urhermore, if desired, o obain symmery across he daabases, i.e., each daabase sends he same amoun of coded bi combinaions from each file, he user can choose daabase f o sar he query process when privaely downloading W θ,f. or more deails on he query generaion process, see [8]. 3) Achievable Rae: The achievable rae of his SC-PIR scheme is summarized in he following heorem. Theorem 3: Given,K, and µ [,], such ha = µ [] and L = K, for a user o privaely download one of K L-bi messages from daabases, each wih a sorage capaciy of µkl bis, he rae is K ). 9) The resuls of Secion V demonsrae ha his SC-PIR scheme saisfies he sufficien condiions o mee he capaciy. This proves Theorem 3. V. SUICIET CODITIOS TO ACHIEVE CAPACITY OR SC-PIR In his secion, we provide wo sufficien condiions for a sorage placemen scheme o achieve he SC-PIR capaciy. Theorem 4: Given,K, Z + and α, spli each of he L-bi messages W,...,W K ino sub-messages of size α L,...,α L and sore hem a ses of daabases,..., [] according o equaions 0)-2). Each daabase has a sorage capaciy of µkl bis, µ, where = µ [,]. Assume ha a user requess file W θ for some θ [K]. A SC-PIR scheme is obained if for all f [], he user generaes a query o privaely download W θ,f from he daabases in f using a capaciy-achieving S-PIR scheme. The resuling SC-PIR scheme is capaciyachieving if he sub-message sorage placemen saisfies one of he following wo condiions: ) If Z +, f = for all f [] 2) If, f {, for all f [] such ha α f = 20) and f: f = f: f = α f =. 2)
5 Proof: Define R S x) as he rae of a capaciy achieving S-PIR scheme o privaely download one of K messages from x nodes. urhermore, R S x) = + x + + ) x K 22) as was shown in []. or Z +, i follows from Theorem ha he rae of he SC-PIR scheme is α R S ) + + α ) = R S) 23) R S ) = ) K 24) which is he capaciy of SC-PIR [2]. or, i follows from Theorem ha α f + R S ) R S ) = and hus f: f = f: f = α f 25) R S ) + ) 26) R S ) R = )R S )+ )R S ). 27) oe ha he poin,r ) is simply an linear inerpolaion of he wo poins,r S )) and,r S )) where he capaciy of SC-PIR for = x is precisely R S x). Moreover, i was shown in [2] ha he se of achievable poins,r ), is he lower convex hull of he se poins {,C ) : []. Therefore, 26) mees he SC-PIR capaciy. VI. DISCUSSIO AD UTURE WORK Recen works on SC-PIR sugges ha coded caching mees PIR [2], [9]; ha is, he file placemen soluions of coded caching [5] are useful for he SC-PIR sub-message placemen problem. In his work, we show ha coded caching placemen echniques are no necessary for SC-PIR by proposing wo novel sub-message placemen schemes which achieve he capaciy. In he coded caching problem, assigning differen files o an exponenially large number of overlapping user groups is necessary o creae mulicasing opporuniies such ha a user can cancel inerference from a received coded ransmission which also serves oher users. The SC-PIR problem is less complex in ha only one user is being served. In fac, as was demonsraed wih our firs proposed scheme, i is no necessary for he sub-message placemen groups o overlap a all. Moreover, he file or sub-message) placemen paradigms of coded caching and SC-PIR are inherenly differen. In coded caching, files are being placed among users ha wish o download conen, while in SC-PIR, sub-messages are being placed among daabases which are serving one user s reques. Therefore, i is no surprising he wo problems could have differen soluions for he sorage/file placemen problem. The resuls of Secion V show ha here exiss simple SC- PIR soluions for non-ineger. or example, he daabases could be spli ino wo disjoin groups, one in which submessages are assigned o sub-groups of size daabases, and anoher where sub-messages are assigned o sub-groups of size daabases. This is conrary o he soluion for non-ineger of he coded caching problem where he sorage of every user is spli ino wo pars o essenially creae wo coded caching neworks ha boh span across all users [5]. While his coded caching mehod was proposed o solve he non-ineger SC- PIR problem in [2], we have shown ha his is no necessary. This work presens several ineresing direcions for fuure work. irs, i remains an open problem o deermine he minimum message size L for a given se of SC-PIR parameers. Using a definiion of he rerieval rae ha is slighly differen from ha of [8], i was shown in [0] ha he minimum L of an S-PIR problem can be reduced significanly from K in [8] o. The new S-PIR scheme [0] can be readily adaped o our proposed SC-PIR o reduce he message size. urhermore, he proof echniques herein may be useful o derive he minimum L for a SC-PIR problem. Second, anoher work [6] has considered random placemen among daabases where a daabase sores a bi of a given message wih probabiliy µ. Ineresingly, his placemen mehod was also used in [] for he coded caching problem. I will be meaningful o examine alernaive random placemen sraegies for he SC-PIR problem where messages are spli ino a finie number of sub-messages. REERECES [] H. Sun and S. A. Jafar, The capaciy of privae informaion rerieval, IEEE Transacions on Informaion Theory, vol. 63, no. 7, pp , 207. [2] M. A. Aia, D. Kumar, and R. Tandon, The capaciy of privae informaion rerieval from uncoded sorage consrained daabases, arxiv preprin arxiv: , 208. [3] B. Chor, O. Goldreich, E. Kushileviz, and M. Sudan, Privae informaion rerieval, in oundaions of Compuer Science, 995. Proceedings., 36h Annual Symposium on. IEEE, 995, pp [4] B. Chor, E. Kushileviz, O. Goldreich, and M. Sudan, Privae informaion rerieval, J. ACM, vol. 45, no. 6, pp , 998. [5] M. A. Maddah-Ali and U. iesen, undamenal limis of caching, Informaion Theory, IEEE Transacions on, vol. 60, no. 5, pp , 204. [6] Y.-P. Wei, B. Arasli, K. Banawan, and S. Ulukus, The capaciy of privae informaion rerieval from decenralized uncoded caching daabases, arxiv preprin arxiv:8.60, 208. [7] C. Tian, H. Sun, and J. Chen, A shannon-heoreic approach o he sorage-rerieval radeoff in pir sysems, in 208 IEEE Inernaional Symposium on Informaion Theory ISIT), June 208, pp [8] H. Sun and S. A. Jafar, Opimal download cos of privae informaion rerieval for arbirary message lengh, IEEE Transacions on Informaion orensics and Securiy, vol. 2, no. 2, pp , 207. [9] R. Tandon, M. Abdul-Wahid,. Almoualem, and D. Kumar, PIR from sorage consrained daabases-coded caching mees PIR, in 208 IEEE Inernaional Conference on Communicaions ICC). IEEE, 208, pp. 7. [0] C. Tian, H. Sun, and J. Chen, Capaciy-achieving privae informaion rerieval codes wih opimal message size and upload cos, arxiv preprin arxiv: , 208. [] M. A. Maddah-Ali and U. iesen, Decenralized coded caching aains order-opimal memory-rae radeoff, eworking, IEEE/ACM Transacions on, vol. 23, no. 4, pp , Aug 205.
Lecture September 6, 2011
cs294-p29 Seminar on Algorihmic Game heory Sepember 6, 2011 Lecure Sepember 6, 2011 Lecurer: Chrisos H. Papadimiriou Scribes: Aloni Cohen and James Andrews 1 Game Represenaion 1.1 abular Form and he Problem
More informationNegative frequency communication
Negaive frequency communicaion Fanping DU Email: dufanping@homail.com Qing Huo Liu arxiv:2.43v5 [cs.it] 26 Sep 2 Deparmen of Elecrical and Compuer Engineering Duke Universiy Email: Qing.Liu@duke.edu Absrac
More informationMarch 13, 2009 CHAPTER 3: PARTIAL DERIVATIVES AND DIFFERENTIATION
March 13, 2009 CHAPTER 3: PARTIAL DERIVATIVES AND DIFFERENTIATION 1. Parial Derivaives and Differeniable funcions In all his chaper, D will denoe an open subse of R n. Definiion 1.1. Consider a funcion
More informationPerformance Analysis of High-Rate Full-Diversity Space Time Frequency/Space Frequency Codes for Multiuser MIMO-OFDM
Performance Analysis of High-Rae Full-Diversiy Space Time Frequency/Space Frequency Codes for Muliuser MIMO-OFDM R. SHELIM, M.A. MATIN AND A.U.ALAM Deparmen of Elecrical Engineering and Compuer Science
More informationEE201 Circuit Theory I Fall
EE1 Circui Theory I 17 Fall 1. Basic Conceps Chaper 1 of Nilsson - 3 Hrs. Inroducion, Curren and Volage, Power and Energy. Basic Laws Chaper &3 of Nilsson - 6 Hrs. Volage and Curren Sources, Ohm s Law,
More informationLecture #7: Discrete-time Signals and Sampling
EEL335: Discree-Time Signals and Sysems Lecure #7: Discree-ime Signals and Sampling. Inroducion Lecure #7: Discree-ime Signals and Sampling Unlike coninuous-ime signals, discree-ime signals have defined
More informationTransmit Beamforming with Reduced Feedback Information in OFDM Based Wireless Systems
Transmi Beamforming wih educed Feedback Informaion in OFDM Based Wireless Sysems Seung-Hyeon Yang, Jae-Yun Ko, and Yong-Hwan Lee School of Elecrical Engineering and INMC, Seoul Naional Universiy Kwanak
More informationBOUNCER CIRCUIT FOR A 120 MW/370 KV SOLID STATE MODULATOR
BOUNCER CIRCUIT FOR A 120 MW/370 KV SOLID STATE MODULATOR D. Gerber, J. Biela Laboraory for High Power Elecronic Sysems ETH Zurich, Physiksrasse 3, CH-8092 Zurich, Swizerland Email: gerberdo@ehz.ch This
More informationECMA st Edition / June Near Field Communication Wired Interface (NFC-WI)
ECMA-373 1 s Ediion / June 2006 Near Field Communicaion Wired Inerface (NFC-WI) Sandard ECMA-373 1 s Ediion / June 2006 Near Field Communicaion Wired Inerface (NFC-WI) Ecma Inernaional Rue du Rhône 114
More information4.5 Biasing in BJT Amplifier Circuits
4/5/011 secion 4_5 Biasing in MOS Amplifier Circuis 1/ 4.5 Biasing in BJT Amplifier Circuis eading Assignmen: 8086 Now le s examine how we C bias MOSFETs amplifiers! f we don bias properly, disorion can
More informationEE 330 Lecture 24. Amplification with Transistor Circuits Small Signal Modelling
EE 330 Lecure 24 Amplificaion wih Transisor Circuis Small Signal Modelling Review from las ime Area Comparison beween BJT and MOSFET BJT Area = 3600 l 2 n-channel MOSFET Area = 168 l 2 Area Raio = 21:1
More informationP. Bruschi: Project guidelines PSM Project guidelines.
Projec guidelines. 1. Rules for he execuion of he projecs Projecs are opional. Their aim is o improve he sudens knowledge of he basic full-cusom design flow. The final score of he exam is no affeced by
More informationNotes on the Fourier Transform
Noes on he Fourier Transform The Fourier ransform is a mahemaical mehod for describing a coninuous funcion as a series of sine and cosine funcions. The Fourier Transform is produced by applying a series
More informationReceiver-Initiated vs. Short-Preamble Burst MAC Approaches for Multi-channel Wireless Sensor Networks
Receiver-Iniiaed vs. Shor-Preamble Burs MAC Approaches for Muli-channel Wireless Sensor Neworks Crisina Cano, Boris Bellala, and Miquel Oliver Universia Pompeu Fabra, C/ Tànger 122-140, 08018 Barcelona,
More informationVariation Aware Cross-Talk Aggressor Alignment by Mixed Integer Linear Programming
ariaion Aware Cross-alk Aggressor Alignmen by Mixed Ineger Linear Programming ladimir Zoloov IBM. J. Wason Research Cener, Yorkown Heighs, NY zoloov@us.ibm.com Peer Feldmann D. E. Shaw Research, New York,
More information5 Spatial Relations on Lines
5 Spaial Relaions on Lines There are number of useful problems ha can be solved wih he basic consrucion echniques developed hus far. We now look a cerain problems, which involve spaial relaionships beween
More informationI. Introduction APLETHORA of real-time multimedia streaming applications
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 20, NO. 2, FEBRUARY 2010 297 Fairness Sraegies for Wireless Resource Allocaion Among Auonomous Mulimedia Users Hyunggon Park, Member,
More informationECMA-373. Near Field Communication Wired Interface (NFC-WI) 2 nd Edition / June Reference number ECMA-123:2009
ECMA-373 2 nd Ediion / June 2012 Near Field Communicaion Wired Inerface (NFC-WI) Reference number ECMA-123:2009 Ecma Inernaional 2009 COPYRIGHT PROTECTED DOCUMENT Ecma Inernaional 2012 Conens Page 1 Scope...
More informationA WIDEBAND RADIO CHANNEL MODEL FOR SIMULATION OF CHAOTIC COMMUNICATION SYSTEMS
A WIDEBAND RADIO CHANNEL MODEL FOR SIMULATION OF CHAOTIC COMMUNICATION SYSTEMS Kalle Rui, Mauri Honanen, Michael Hall, Timo Korhonen, Veio Porra Insiue of Radio Communicaions, Helsini Universiy of Technology
More informationRevision: June 11, E Main Suite D Pullman, WA (509) Voice and Fax
2.5.3: Sinusoidal Signals and Complex Exponenials Revision: June 11, 2010 215 E Main Suie D Pullman, W 99163 (509) 334 6306 Voice and Fax Overview Sinusoidal signals and complex exponenials are exremely
More informationInvestigation and Simulation Model Results of High Density Wireless Power Harvesting and Transfer Method
Invesigaion and Simulaion Model Resuls of High Densiy Wireless Power Harvesing and Transfer Mehod Jaber A. Abu Qahouq, Senior Member, IEEE, and Zhigang Dang The Universiy of Alabama Deparmen of Elecrical
More informationAnalysis of Low Density Codes and Improved Designs Using Irregular Graphs
Analysis of Low Densiy Codes and Improved Designs Using Irregular Graphs Michael G. Luby Michael Mizenmacher M. Amin Shokrollahi Daniel A. Spielman Absrac In [6], Gallager inroduces a family of codes based
More informationweight: amplitude of sine curve
Joseph Fourier s claim: all signals are sums of sinusoids of differen frequencies. weighed sine curves weigh: ampliude of sine curve all : no exacly bu doesn maer for us in pracice Example: 3 sin() + sin(*)
More informationDistributed Coordinated Signal Timing Optimization in Connected Transportation Networks
Disribued Coordinaed Signal Timing Opimizaion in Conneced Transporaion Neworks Link o he paper: hps://urldefense.proofpoin.com/v2/url?u=hps-3a auhors.elsevier.com_a_1v3f6-2cm0mr5bao&d=dwifaq&c=c3yme8gmkxg_ihjnxs06zywk4ejm8ldrrvxqb-
More informationDAGSTUHL SEMINAR EPIDEMIC ALGORITHMS AND PROCESSES: FROM THEORY TO APPLICATIONS
DAGSTUHL SEMINAR 342 EPIDEMIC ALGORITHMS AND PROCESSES: FROM THEORY TO APPLICATIONS A Sysems Perspecive Pascal Felber Pascal.Felber@unine.ch hp://iiun.unine.ch/! Gossip proocols Inroducion! Decenralized
More informationUNIT IV DIGITAL MODULATION SCHEME
UNI IV DIGIAL MODULAION SCHEME Geomeric Represenaion of Signals Ojecive: o represen any se of M energy signals {s i (} as linear cominaions of N orhogonal asis funcions, where N M Real value energy signals
More informationEXPERIMENT #9 FIBER OPTIC COMMUNICATIONS LINK
EXPERIMENT #9 FIBER OPTIC COMMUNICATIONS LINK INTRODUCTION: Much of daa communicaions is concerned wih sending digial informaion hrough sysems ha normally only pass analog signals. A elephone line is such
More informationPulse Train Controlled PCCM Buck-Boost Converter Ming Qina, Fangfang Lib
5h Inernaional Conference on Environmen, Maerials, Chemisry and Power Elecronics (EMCPE 016 Pulse Train Conrolled PCCM Buck-Boos Converer Ming Qina, Fangfang ib School of Elecrical Engineering, Zhengzhou
More informationOpenStax-CNX module: m Elemental Signals. Don Johnson. Perhaps the most common real-valued signal is the sinusoid.
OpenSax-CNX module: m0004 Elemenal Signals Don Johnson This work is produced by OpenSax-CNX and licensed under he Creaive Commons Aribuion License.0 Absrac Complex signals can be buil from elemenal signals,
More informationDigital Communications - Overview
EE573 : Advanced Digial Communicaions Digial Communicaions - Overview Lecurer: Assoc. Prof. Dr Noor M Khan Deparmen of Elecronic Engineering, Muhammad Ali Jinnah Universiy, Islamabad Campus, Islamabad,
More informationSurveillance System with Object-Aware Video Transcoder
MITSUBISHI ELECTRIC RESEARCH LABORATORIES hp://www.merl.com Surveillance Sysem wih Objec-Aware Video Transcoder Toshihiko Haa, Naoki Kuwahara, Toshiharu Nozawa, Derek Schwenke, Anhony Vero TR2005-115 April
More informationLab 3 Acceleration. What You Need To Know: Physics 211 Lab
b Lab 3 Acceleraion Wha You Need To Know: The Physics In he previous lab you learned ha he velociy of an objec can be deermined by finding he slope of he objec s posiion vs. ime graph. x v ave. = v ave.
More informationForeign Fiber Image Segmentation Based on Maximum Entropy and Genetic Algorithm
Journal of Compuer and Communicaions, 215, 3, 1-7 Published Online November 215 in SciRes. hp://www.scirp.org/journal/jcc hp://dx.doi.org/1.4236/jcc.215.3111 Foreign Fiber Image Segmenaion Based on Maximum
More informationAnti-Jamming Schedules for Wireless Data Broadcast Systems
Ani-Jamming Schedules for Wireless Daa Broadcas Sysems Paolo Codenoi 1, Alexander Sprinson, and Jehoshua Bruck Absrac Modern sociey is heavily dependen on wireless neworks for providing voice and daa communicaions.
More informationThe University of Melbourne Department of Mathematics and Statistics School Mathematics Competition, 2013 JUNIOR DIVISION Time allowed: Two hours
The Universiy of Melbourne Deparmen of Mahemaics and Saisics School Mahemaics Compeiion, 203 JUNIOR DIVISION Time allowed: Two hours These quesions are designed o es your abiliy o analyse a problem and
More informationDeblurring Images via Partial Differential Equations
Deblurring Images via Parial Dierenial Equaions Sirisha L. Kala Mississippi Sae Universiy slk3@mssae.edu Advisor: Seh F. Oppenheimer Absrac: Image deblurring is one o he undamenal problems in he ield o
More informationA Harmonic Circulation Current Reduction Method for Parallel Operation of UPS with a Three-Phase PWM Inverter
160 Journal of Power Elecronics, Vol. 5, No. 2, April 2005 JPE 5-2-9 A Harmonic Circulaion Curren Reducion Mehod for Parallel Operaion of U wih a Three-Phase Inverer Kyung-Hwan Kim, Wook-Dong Kim * and
More informationWIRELESS networks are growing rapidly as demand for
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL XX, NO XX, MONTH 009 Amplify-and-Forward Relay Neworks Under Received Power Consrain Alireza Shahan Behbahani, Suden Member, IEEE and A M Elawil, Member,
More informationContext-Aware Self-Organized Resource Allocation In Intelligent Water Informatics
Ciy Universiy of ew York (CUY) CUY Academic Works Inernaional Conference on Hydroinformaics 8-1-2014 Conex-Aware Self-Organized Resource Allocaion In Inelligen Waer Informaics Kyung Sup Kwak Qinghai Yang
More informationLecture 4. EITN Chapter 12, 13 Modulation and diversity. Antenna noise is usually given as a noise temperature!
Lecure 4 EITN75 2018 Chaper 12, 13 Modulaion and diversiy Receiver noise: repeiion Anenna noise is usually given as a noise emperaure! Noise facors or noise figures of differen sysem componens are deermined
More informationDirect Analysis of Wave Digital Network of Microstrip Structure with Step Discontinuities
Direc Analysis of Wave Digial Nework of Microsrip Srucure wih Sep Disconinuiies BILJANA P. SOŠIĆ Faculy of Elecronic Engineering Universiy of Niš Aleksandra Medvedeva 4, Niš SERBIA MIODRAG V. GMIROVIĆ
More informationBase Station Sleeping and Resource. Allocation in Renewable Energy Powered. Cellular Networks
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Base Saion Sleeping and Resource Allocaion in Renewable Energy Powered Cellular Neworks arxiv:1305.4996v1 [cs.it] 22 May 2013 Jie Gong, Suden Member, IEEE,
More informationLecture 11. Digital Transmission Fundamentals
CS4/MSc Compuer Neworking Lecure 11 Digial Transmission Fundamenals Compuer Neworking, Copyrigh Universiy of Edinburgh 2005 Digial Transmission Fundamenals Neworks consruced ou of Links or ransmission
More informationAn off-line multiprocessor real-time scheduling algorithm to reduce static energy consumption
An off-line muliprocessor real-ime scheduling algorihm o reduce saic energy consumpion Firs Workshop on Highly-Reliable Power-Efficien Embedded Designs Shenzhen, China Vincen Legou, Mahieu Jan, Lauren
More informationUniversity of Maryland, College Park, MD 20742, USA. San Diego, CA 92121, USA.
On Specrum Sharing in Cooperaive Muliple Access Neworks Amr El-Sherif, Ahmed K. Sadek 2,andK.J.RayLiu Deparmen of Elecrical and Compuer Engineering, 2 Corporae R&D Qualcomm Inc., Universiy of Maryland,
More informationModulation exercises. Chapter 3
Chaper 3 Modulaion exercises Each problem is annoaed wih he leer E, T, C which sands for exercise, requires some hough, requires some concepualizaion. Problems labeled E are usually mechanical, hose labeled
More informationA Bidirectional Three-Phase Push-Pull Converter With Dual Asymmetrical PWM Method
A Bidirecional Three-Phase Push-Pull Converer Wih Dual Asymmeral PWM Mehod Minho Kwon, Junsung Par, Sewan Choi, IEEE Senior Member Deparmen of Elecral and Informaion Engineering Seoul Naional Universiy
More informationOn the Security of Angle of Arrival Estimation
On he Securiy of Angle of Arrival Esimaion Amr Abdelaziz, C. Emre Koksal and Hesham El Gamal Deparmen of Elecrical and Compuer Engineering The Ohio Sae Universiy Columbus, Ohio 43201 arxiv:1607.00467v1
More informationA Segmentation Method for Uneven Illumination Particle Images
Research Journal of Applied Sciences, Engineering and Technology 5(4): 1284-1289, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scienific Organizaion, 2013 Submied: July 17, 2012 Acceped: Augus 15, 2012
More informationAnalysis of Low Density Codes. and. Improved Designs Using Irregular Graphs. 1 Introduction. codes. As the codes that Gallager builds are derived
Analysis of Low Densiy Codes and Improved Designs Using Irregular Graphs Michael G. Luby Michael Mizenmacher y M. Amin Shokrollahi z Daniel A. Spielman x Absrac In [6], Gallager inroduces a family of codes
More information7 th International Conference on DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a n i a, M a y 27 29,
7 h Inernaional Conference on DEVEOPMENT AND APPICATION SYSTEMS S u c e a v a, o m a n i a, M a y 27 29, 2 0 0 4 THEE-PHASE AC CHOPPE WITH IGBT s Ovidiu USAU 1, Mihai UCANU, Crisian AGHION, iviu TIGAEU
More informationParameters Affecting Lightning Backflash Over Pattern at 132kV Double Circuit Transmission Lines
Parameers Affecing Lighning Backflash Over Paern a 132kV Double Circui Transmission Lines Dian Najihah Abu Talib 1,a, Ab. Halim Abu Bakar 2,b, Hazlie Mokhlis 1 1 Deparmen of Elecrical Engineering, Faculy
More informationTHE Cisco visual network index report predicts a drastic
IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 18, NO. 7, JULY 2016 1401 Qualiy of Experience Driven Muli-User Video Sreaming in Cellular Cogniive Radio Neworks Wih Single Channel Access Zhifeng He, Shiwen Mao,
More informationComparitive Analysis of Image Segmentation Techniques
ISSN: 78 33 Volume, Issue 9, Sepember 3 Compariive Analysis of Image Segmenaion echniques Rohi Sardana Pursuing Maser of echnology (Compuer Science and Engineering) GJU S& Hissar, Haryana Absrac Image
More informationECE-517 Reinforcement Learning in Artificial Intelligence
ECE-517 Reinforcemen Learning in Arificial Inelligence Lecure 11: Temporal Difference Learning (con.), Eligibiliy Traces Ocober 8, 2015 Dr. Iamar Arel College of Engineering Deparmen of Elecrical Engineering
More informationA Flexible Contention Resolution Scheme for QoS Provisioning in Optical Burst Switching Networks
A Flexible Conenion Resoluion Scheme for QoS Provisioning in Opical Burs Swiching Neworks Ashok K. Turuk a, Rajeev Kumar b,,1 a Deparmen of Compuer Science and Engineering, Naional Insiue of Technology,
More informationMultiple Load-Source Integration in a Multilevel Modular Capacitor Clamped DC-DC Converter Featuring Fault Tolerant Capability
Muliple Load-Source Inegraion in a Mulilevel Modular Capacior Clamped DC-DC Converer Feauring Faul Toleran Capabiliy Faisal H. Khan, Leon M. Tolber The Universiy of Tennessee Elecrical and Compuer Engineering
More informationPerformance Evaluation of a MAC Protocol for Radio over Fiber Wireless LAN operating in the 60-GHz band
Performance Evaluaion of a Proocol for Radio over Fiber Wireless LAN operaing in he -GHz band Hong Bong Kim, Adam Wolisz Telecommunicaion Neworks Group Deparmen of Elecrical and Compuer Engineering Technical
More informationJoint Watermarking and Compression for Images in Transform Domain
Vol.2, Issue.4, July-Aug. 2012 pp-2341-2351 ISSN: 2249-6645 Join Waermarking and Compression for Images in Transform Domain Gamal Fahmy Elecrical Engineering Dep., Assiu Universiy, Egyp, Absrac: Image
More informationOn the Scalability of Ad Hoc Routing Protocols
On he Scalabiliy of Ad Hoc Rouing Proocols César A. Saniváñez Bruce McDonald Ioannis Savrakakis Ram Ramanahan Inerne. Research Dep. Elec. & Comp. Eng. Dep. Dep. of Informaics Inerne. Research Dep. BBN
More informationSocial-aware Dynamic Router Node Placement in Wireless Mesh Networks
Social-aware Dynamic Rouer Node Placemen in Wireless Mesh Neworks Chun-Cheng Lin Pei-Tsung Tseng Ting-Yu Wu Der-Jiunn Deng ** Absrac The problem of dynamic rouer node placemen (dynrnp) in wireless mesh
More informationEvaluation of Instantaneous Reliability Measures for a Gradual Deteriorating System
General Leers in Mahemaic, Vol. 3, No.3, Dec 27, pp. 77-85 e-issn 259-9277, p-issn 259-9269 Available online a hp:\\ www.refaad.com Evaluaion of Insananeous Reliabiliy Measures for a Gradual Deerioraing
More informationChapter 14: Bandpass Digital Transmission. A. Bruce Carlson Paul B. Crilly 2010 The McGraw-Hill Companies
Communicaion Sysems, 5e Chaper 4: Bandpass Digial Transmission A. Bruce Carlson Paul B. Crilly The McGraw-Hill Companies Chaper 4: Bandpass Digial Transmission Digial CW modulaion Coheren binary sysems
More informationNetwork Design and Optimization for Quality of Services in Wireless Local Area Networks using Multi-Objective Approach
Chuima Prommak and Naruemon Waanapongsakorn Nework Design and Opimizaion for Qualiy of Services in Wireless Local Area Neworks using Muli-Objecive Approach CHUTIMA PROMMAK, NARUEMON WATTANAPONGSAKORN *
More informationExamination Mobile & Wireless Networking ( ) April 12,
Page 1 of 5 Examinaion Mobile & Wireless Neworking (192620010) April 12, 2017 13.45 16.45 Noes: Only he overhead shees used in he course, 2 double-sided shees of noes (any fon size/densiy!), and a dicionary
More informationArchitectures for Resource Reservation Modules for Optical Burst Switching Core Nodes *
4. ITG-Fachagung Phoonic Neworks, May 5. - 6., 2003, Leipzig, Germany Archiecures for Resource Reservaion Modules for Opical Burs Swiching Core Nodes * Sascha Junghans, Chrisoph M. Gauger Universiy of
More informationPILOT SYMBOL DESIGN FOR CHANNEL ESTIMATION IN MIMO-OFDM SYSTEMS WITH NULL SUBCARRIERS
h European Signal Processing Conference (EUSIPCO- Aalborg, Denmark, Augus -7, PILOT SYMBOL DESIGN FOR CHANNEL ESTIMATION IN MIMO-OFDM SYSTEMS WITH NULL SUBCARRIERS Emmanuel Manasseh, Shuichi Ohno, Masayoshi
More informationSquare Waves, Sinusoids and Gaussian White Noise: A Matching Pursuit Conundrum? Don Percival
Square Waves, Sinusoids and Gaussian Whie Noise: A Maching Pursui Conundrum? Don Percival Applied Physics Laboraory Deparmen of Saisics Universiy of Washingon Seale, Washingon, USA hp://faculy.washingon.edu/dbp
More informationWrap Up. Fourier Transform Sampling, Modulation, Filtering Noise and the Digital Abstraction Binary signaling model and Shannon Capacity
Wrap Up Fourier ransorm Sampling, Modulaion, Filering Noise and he Digial Absracion Binary signaling model and Shannon Capaciy Copyrigh 27 by M.H. Perro All righs reserved. M.H. Perro 27 Wrap Up, Slide
More informationTeacher Supplement to Operation Comics, Issue #5
eacher Supplemen o Operaion Comics, Issue #5 he purpose of his supplemen is o provide conen suppor for he mahemaics embedded ino he fifh issue of Operaion Comics, and o show how he mahemaics addresses
More informationOptical Short Pulse Generation and Measurement Based on Fiber Polarization Effects
Opical Shor Pulse Generaion and Measuremen Based on Fiber Polarizaion Effecs Changyuan Yu Deparmen of Elecrical & Compuer Engineering, Naional Universiy of Singapore, Singapore, 117576 A*STAR Insiue for
More informationBounded Iterative Thresholding for Lumen Region Detection in Endoscopic Images
Bounded Ieraive Thresholding for Lumen Region Deecion in Endoscopic Images Pon Nidhya Elango School of Compuer Science and Engineering Nanyang Technological Universiy Nanyang Avenue, Singapore Email: ponnihya88@gmail.com
More informationA New Antenna Selection Algorithm in Cognitive MIMO Systems
Cyber Journals: Mulidisciplinary Journals in Science and echnology, Journal of Seleced Areas in elecommunicaions (JSA), ovember Ediion, 11 A ew Anenna Selecion Algorihm in Cogniive MIMO Sysems Zhang an,
More informationTELE4652 Mobile and Satellite Communications
TELE465 Mobile and Saellie Communicaions Assignmen (Due: 4pm, Monday 7 h Ocober) To be submied o he lecurer before he beginning of he final lecure o be held a his ime.. This quesion considers Minimum Shif
More informationf t 2cos 2 Modulator Figure 21: DSB-SC modulation.
4.5 Ampliude modulaion: AM 4.55. DSB-SC ampliude modulaion (which is summarized in Figure 21) is easy o undersand and analyze in boh ime and frequency domains. However, analyical simpliciy is no always
More informationTraffic. analysis. The general setting. Example: buffer. Arrival Curves. Cumulative #bits: R(t), R*(t) Instantaneous speeds: r(t), r*(t)
The general seing Traffic Cumulaive #bis: R(), R*() Insananeous speeds: r(), r*() analysis R(): arrivals sysem R*(): deparures Lecure 7 2 Lecure 7 3 Example: buffer R() R*() bi rae c R() = #bis ha arrived
More informationAnalysis ofthe Effects ofduty Cycle Constraints in Multiple-Input Converters for Photovoltaic Applications
Analysis ofhe Effecs ofduy Cycle Consrains in Muliple-Inpu Converers for Phoovolaic Applicaions Junseok Song and Alexis Kwasinski Deparmen ofelecrical and Compuer Engineering The Universiy oftexas a Ausin
More informationChannel Estimation for Wired MIMO Communication Systems
Channel Esimaion for Wired MIMO Communicaion Sysems Final Repor Mulidimensional DSP Projec, Spring 2005 Daifeng Wang Absrac This repor addresses raining-based channel modeling and esimaion for a wired
More informationOn the Efficiency of Shaping Live Video Streams
On he Efficiency of Shaping Live Video Sreams György Dán and Vikoria Fodor KTH, Royal Insiue of Technology Elecrum 9, 6440 Kisa, Sweden gyuri,vikoria @i.kh.se Absrac In his work he efficiency of shaping
More informationPerformance Analysis of A Burst-Frame-Based MAC Protocol for Ultra-Wideband Ad Hoc Networks
Performance Analysis of A Burs-Frame-Based MAC Proocol for Ulra-Wideband Ad Hoc Neworks Kejie Lu, Dapeng Wu, Yuguang Fang Deparmen of Elecrical and Compuer Engineering Universiy Of Florida Gainesville,
More informationDead Zone Compensation Method of H-Bridge Inverter Series Structure
nd Inernaional Conference on Elecrical, Auomaion and Mechanical Engineering (EAME 7) Dead Zone Compensaion Mehod of H-Bridge Inverer Series Srucure Wei Li Insiue of Elecrical Engineering and Informaion
More informationDURING last decade, many communication technologies
1 TeamPhone: Neworking Smarphones for isaser Recovery Zongqing Lu, Guohong ao, and Thomas La Pora and suppors daa communicaions among rescue workers in infrasrucure-consrained and infrasrucure-less scenarios.
More informationFigure A linear pair? Explain. No, because vertical angles are not adjacent angles, and linear pairs are.
Geomery Review of PIL KEY Name: Parallel and Inersecing Lines Dae: Per.: PIL01: Use complemenary supplemenary and congruen o compare wo angles. 1) Complee he following definiion: Two angles are Complemenary
More informationExperiment 6: Transmission Line Pulse Response
Eperimen 6: Transmission Line Pulse Response Lossless Disribued Neworks When he ime required for a pulse signal o raverse a circui is on he order of he rise or fall ime of he pulse, i is no longer possible
More informationErrata and Updates for ASM Exam MLC (Fourteenth Edition) Sorted by Page
Erraa for ASM Exam MLC Sudy Manual (Foureenh Ediion) Sored by Page 1 Erraa and Updaes for ASM Exam MLC (Foureenh Ediion) Sored by Page Pracice Exam 7:25 (page 1386) is defecive, Pracice Exam 5:21 (page
More informationTechnology Trends & Issues in High-Speed Digital Systems
Deailed comparison of dynamic range beween a vecor nework analyzer and sampling oscilloscope based ime domain reflecomeer by normalizing measuremen ime Sho Okuyama Technology Trends & Issues in High-Speed
More informationMotion-blurred star image acquisition and restoration method based on the separable kernel Honglin Yuana, Fan Lib and Tao Yuc
5h Inernaional Conference on Advanced Maerials and Compuer Science (ICAMCS 206) Moion-blurred sar image acquisiion and resoraion mehod based on he separable kernel Honglin Yuana, Fan Lib and Tao Yuc Beihang
More informationTable of Contents. 3.0 SMPS Topologies. For Further Research. 3.1 Basic Components. 3.2 Buck (Step Down) 3.3 Boost (Step Up) 3.4 Inverter (Buck/Boost)
Table of Conens 3.0 SMPS Topologies 3.1 Basic Componens 3.2 Buck (Sep Down) 3.3 Boos (Sep Up) 3.4 nverer (Buck/Boos) 3.5 Flyback Converer 3.6 Curren Boosed Boos 3.7 Curren Boosed Buck 3.8 Forward Converer
More informationMobile Robot Localization Using Fusion of Object Recognition and Range Information
007 IEEE Inernaional Conference on Roboics and Auomaion Roma, Ialy, 10-14 April 007 FrB1.3 Mobile Robo Localizaion Using Fusion of Objec Recogniion and Range Informaion Byung-Doo Yim, Yong-Ju Lee, Jae-Bok
More informationMemorandum on Impulse Winding Tester
Memorandum on Impulse Winding Teser. Esimaion of Inducance by Impulse Response When he volage response is observed afer connecing an elecric charge sored up in he capaciy C o he coil L (including he inside
More informationMobile Communications Chapter 3 : Media Access
Moivaion Can we apply media access mehods from fixed neworks? Mobile Communicaions Chaper 3 : Media Access Moivaion SDMA, FDMA, TDMA Aloha Reservaion schemes Collision avoidance, MACA Polling CDMA SAMA
More informationHow to Shorten First Order Unit Testing Time. Piotr Mróz 1
How o Shoren Firs Order Uni Tesing Time Pior Mróz 1 1 Universiy of Zielona Góra, Faculy of Elecrical Engineering, Compuer Science and Telecommunicaions, ul. Podgórna 5, 65-246, Zielona Góra, Poland, phone
More informationModeling and Prediction of the Wireless Vector Channel Encountered by Smart Antenna Systems
Modeling and Predicion of he Wireless Vecor Channel Encounered by Smar Anenna Sysems Kapil R. Dandekar, Albero Arredondo, Hao Ling and Guanghan Xu A Kalman-filer based, vecor auoregressive (VAR) model
More informationResearch Article The RSU Access Problem Based on Evolutionary Game Theory for VANET
Disribued Sensor Neworks Volume 203, Aricle ID 43024, 7 pages hp://dx.doi.org/0.55/203/43024 esearch Aricle The SU Access Problem Based on Evoluionary Game Theory for VANET Di Wu, Yan Ling, Hongsong Zhu,
More informationWhen answering the following 25 questions, always remember that there is someone who has to grade them. So please use legible handwriting.
38963, VU Mobile Kommunikaion Miderm Exam: Insiu für Nachrichenechnik und Hochfrequenzechnik When answering he following 5 quesions, always remember ha here is someone who has o grade hem So please use
More informationELEG 3124 SYSTEMS AND SIGNALS Ch. 1 Continuous-Time Signals
Deparmen of Elecrical Engineering Universiy of Arkansas ELEG 3124 SYSTEMS AND SIGNALS Ch. 1 Coninuous-Time Signals Dr. Jingxian Wu wuj@uark.edu OUTLINE 2 Inroducion: wha are signals and sysems? Signals
More informationPhase-Shifting Control of Double Pulse in Harmonic Elimination Wei Peng1, a*, Junhong Zhang1, Jianxin gao1, b, Guangyi Li1, c
Inernaional Symposium on Mechanical Engineering and Maerial Science (ISMEMS 016 Phase-Shifing Conrol of Double Pulse in Harmonic Eliminaion Wei Peng1, a*, Junhong Zhang1, Jianxin gao1, b, Guangyi i1, c
More informationACTIVITY BASED COSTING FOR MARITIME ENTERPRISES
ACTIVITY BASED COSTING FOR MARITIME ENTERPRISES 1, a 2, b 3, c 4, c Sualp Omer Urkmez David Sockon Reza Ziarai Erdem Bilgili a, b De Monfor Universiy, UK, c TUDEV, Insiue of Mariime Sudies, Turkey 1 sualp@furrans.com.r
More informationEfficient Data Encoding and Decoding for Network-On-Chip Application
Inernaional Journal of Curren Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Righs Reserved Available a hp://inpressco.com/caegory/ijce Research Aricle Efficien Daa Encoding
More informationFree and Forced Vibrations of Two Degree of Systems
ree and orced Vibraions of Two Degree of Syses Inroducion: The siple single degree-of-freedo syse can be coupled o anoher of is ind, producing a echanical syse described by wo coupled differenial equaions;
More information