Location-based Access Control. Outline. Why do we need location in WSN? SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

Size: px
Start display at page:

Download "Location-based Access Control. Outline. Why do we need location in WSN? SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks"

Transcription

1 SeRLoc: Secure Range-Independent Localization for Wirele Senor Network Louka Lazo Advior: Radha Poovendran Network Security Lab Univerity of Wahington Outline Motivation Secure Localization Problem SeRLoc Threat and defene Performance Evaluation Concluion 2 Why do we need location in WSN? Network function Location-dependent ervice Acce Control Location-baed Acce Control Microphone uername Databae query Monitoring App 3 Acce i decided baed on the location of the uer. Different privilege for variou area 4 1

2 Geographical Routing Report Monitoring Information Accelerometer 3 8 A B A want to end a meage to B Each node forward the meage to the neighbor cloet to the detination. Monitor the tructural health of the bridge Senor aociate their location with the reporting data 5 6 Localization Problem Localization: Senor Location Etimation How do enor become aware of their poition when they are randomly deployed or mobile? Algorithm Deign conideration What type of localization i required? Coare or Fine Grain? Where i the WSN deployed? Indoor or Outdoor What are the capabilitie of the enor? Hardware and Power Contraint Claification of Loc. Scheme Indoor v. Outdoor: GPS, VOR, Centroid (outdoor), RADAR, Active Bat, AhLo, (indoor). Infratructurele (I-L) v. Infratructure baed (I-B): AhLo, Amorphou, DV-Hop (I-L), RADAR, Active Bat, AVL (I-B). Range-baed (R-B) v. Range-Independent (R-I): Radar, Ahlo, GPS, Active Bat, VOR (R-B), APIT, DV-Hop, Amorphou, Centroid (R-I)

3 Localization in un-truted environment Previou cheme aumed truted node and no external attack, but WSN may be deployed in hotile environment Several threat in WSN localization: Replay attack, Node Imperonation attack, Compromie of network entitie. Secure Localization Problem Secure Localization: Enure robut location etimation even in the preence of adverarie. Related work: An Aymmetric Security Mechanim for navigation ignal [Kuhn 2004]. Secure Poitioning of Wirele Device with Application to Senor Network (SPINE) [Capkun et al, Infocom 2004] Outline Motivation Problem Decription SeRLoc Threat and defene Performance Concluion Our Approach: SeRLoc SeRLoc: SEcure Range-independent LOCalization SeRLoc feature Paive Localization, Robut againt ource of error, Decentralized Implementation, Scalable. Robut againt attack - Lightweight ecurity

4 Network Model Aumption (1) Two-tier network architecture Locator: Known Directional Location, Randomly deployed Orientation Antenna Senor range r r (X 2, Y 2 ) Senor: Omnidirectional Randomly deployed, Antenna unknown location (X 4, Y 4 ) Network Model Aumption (2) Locator deployment: Homogeneou Poion point proce of rate ρ L Random patial ditribution. Beamwidth θ (X 1, Y 1 ) θ R (X 3, Y 3 ) (X 5, Y 5 ) Senor deployment: Poion point proce of rate ρ independent of locator deployment Or can be een a Random ampling with rate ρ. Locator Senor Locator range R W N S E P ρ πr k! 2 k ( ) ( ) 2 L ρlπr LH = k = e LH : Locator heard at a enor The Idea of SeRLoc L 2 Locator Senor ROI ROI = Each locator L i tranmit information that define the ector S i, covered by each tranmiion. Senor define the region of interection (ROI), from all locator it hear. LH I S i i=1 SeRLoc Step 1: Beacon reception (0, 0) Locator Senor θ 2,2 L 2: (X 2, Y 2 ) θ 2,1 Locator : L 2 : : : The enor collect information from all the locator that it can hear. Coordinate (X 1, Y 1 ) (X 2, Y 2 ) (X 3, Y 3 ) (X 4, Y 4 ) Slope [θ 1,1, θ 1,2 ] [θ 2,1, θ 2,2 ] [θ 3,1, θ 3,2 ] [θ 4,1, θ 4,2 ]

5 SeRLoc Step 2: Search area Locator (X (X max -R, Y min +R) 1, Y 1 ) L 2 R R (X max -R, Y max -R) (X 2, Y 2 ) 2R+X min -X max Senor Search Area (X (X min +R, Y min +R) 4, Y 4 ) X min = min { X i i LH } (X R 3, Y 3 ) Y min = min { Y i i LH } Define: X max = max { Y i i LH } Locator heard by the enor Y max = max { Y i i LH } (X min +R, Y max -R) Senor place a grid of equally paced point into the earch area SeRLoc Step 3: Grid-ector tet Locator Senor R: Locator Range Senor hold a Grid Score Table (GST) initialized at zero. θ 1,2 θ For every point in the grid θ 1,1 R g: (xg,y g ) and every ector heard, perform Grid ector tet: C1 : g Li R, C 2 : θ1,1 θ θ1,2 If tet poitive increae core value by one SeRLoc Step 4: ROI computation Senor ROI Search Area GRID Score Table (GST) Outline Motivation Problem SeRLoc Threat and defene Performance High reolution localization: HiRLoc Concluion Majority vote: Point with highet core define the ROI. Error introduction due to dicrete computation. Accuracy v. Complexity tradeoff

6 Attacker Model Attacker aim at diplacing the enor. Attacker mut remain undetected. No DoS attack. SeRLoc - Security mechanim Meage Encryption: Meage encrypted with a ymmetric key K 0. ID authentication Beacon Format: L i : { (X i, Y i ) (θ i,1, θ i,2 ) (H n-j (PW i )), j } K0 No jamming of the communication medium. Locator coordinate Slope of the ector Shared ymmetric key H PW i H 0 (Pw i ) H H 1 (Pw i ) H H H n (Pw i ) Jamming f Hah chain one-way Every hah enor function tore the value H n (PW i ) for all the locator. A enor can authenticate all locator that are within it range (one-hop authentication) SeRLoc Wormhole Attack L 2 enor Locator Attacker THREAT MODEL The attacker record beacon information at region A, Region B tunnel it via the wormhole link at region B, and replay the beacon Senor i miled to believe it hear the et of locator LH : { -L 8 }. Wormhole link L L 7 Region A No compromie of integrity, L 5 8 authenticity of the communication or crypto protocol. Record beacon Direct link allow replay of the beacon in a timely fahion. L 6 23 Wormhole attack detection (1) P Accept only ingle meage per locator enor obtacle Locator A c Wormhole link ρ L Ac ( SG) = P( LH A 1) = 1 e c Attacker Multiple meage from the ame locator are heard due to: Multi-path effect Imperfect ectorization Replay attack 24 6

7 Wormhole attack detection (2) Communication range contraint property. enor Locator Attacker A i P L i 2R Wormhole link A j ρl A ρl A i j ( CR) ( 1 e )( 1 e ) L j Locator heard by a enor cannot be more than 2R apart. Li L j 2R R: locator-to-enor communication range. Wormhole attack detection (3) Probability of wormhole detection enor A i Wormhole link Pdet = U 2R A c Locator A j Attacker P( SG CR) = P( SG) + P( CR) ρ ( 1 ) ( 1 ) 2 L Ac ρl Ac ρl Ai e + e e The event of a locator being within any region A i, A j, A c are independent (Region do not overlap). P( SG) P( CR) Wormhole attack detection (4) Probability of wormhole detection 99.48% Reolution of location ambiguity A enor need to ditinguih the valid et of locator from the replayed one. Attach to Cloet Locator Algorithm (ACLA) Region B L 2 Cloet Locator 1. Senor : Broadcat a nonce η. 2. Locator L i : Reply with a beacon + the nonce η, encrypted with the pairwie key K,Li. 3. Senor : Identify the locator L c with the firt authentic reply. 4. Senor : A locator L i belong to the valid et, only if it overlap with the ector defined by the beacon of L c. L 5 L 8 L Wormhole link Region A L 6 L

8 SeRLoc Sybil Attack THREAT MODEL The attacker imperonate multiple locator (compromie of the globally hared key K 0 ). L L 2 3 Collect hah value Imperonator Attacker can fabricate arbitrary beacon. Hence, compromie the majority-baed cheme, if more than LH locator imperonated. 29 Sybil Attack detection(1) In a Sybil attack, the enor hear at leat twice the number of locator. Define a threhold L max a the maximum allowable number of locator heard, uch that: Lmax P( LH > Lmax ) = ε, P( LH > ) = 1 δ 2 Probability of fale alarm Probability of Sybil attack detection Deign goal: Given ecurity requirement δ, minimize fale alarm probability ε. 30 Sybil Attack detection - Defene Random locator deployment we can derive the L max value: 99% Detection probability 26 locator 5% Fale alarm P k 2 i ( ) ( ρlπr ) LH > k = 1 i= 1 i! e 2 ρ LπR Once the Sybil Attack i detected: Execute ACLA 52 locator 31 SeRLoc Compromied entitie THREAT MODEL Compromied network entitie: Attacker gain: 1. Knowledge of all cryptographic quantitie 2. Full control over the behavior of the entity. Compromie of a enor reveal the globally hared key K 0. Compromie of a locator reveal K 0, mater key K Li, and the hah chain of the locator. Imperonate the Cloet Locator Compromie the ACLA algorithm Diplace any enor 32 8

9 Enhanced location determination algorithm 1. The enor tranmit a nonce with hi ID 2. Locator within r from and et LH the enor relay the nonce. L7 3. Locator within R reply with a beacon + the nonce. L 2. Senor accept 9 L firt L max replie. 6 Outline Motivation Secure Localization Problem SeRLoc Threat and defene Performance Evaluation Concluion L 5 L 8 Attacker ha to compromie more than L max /2 locator, AND Replay before authentic replie arrive at Performance Evaluation Simulation etup: Random locator ditribution with denity ρ L. Random enor ditribution with denity 0.5. Performance evaluation metric: Localization Error v. LH Each locator i equivalent to M reference point, LE = 1 S S i= 1 et i r i M number of antenna ector et i : Senor location etimation. i : Senor actual location. r : Senor-to-enor communication range. S : Number of enor. SeRLoc outperform current cheme for any LH value

10 Localization error v. antenna ector Localization error v. ector error Higher number of directional antenna (narrower ector) reduce LH. Sector error: Fraction of ector falely etimated at each enor. More expenive hardware at each locator. SeRLoc i reilient againt ector error due to the majority vote cheme. Even when 50% of the ector are falely etimated, LE < r for LH Localization error v. GPS error Communication Cot GPS Error (GPSE): Error in the locator coordinate. For GPSE = 1.8r and LH = 3, LE = 1.1r. DV-hop/Amorphou: LE = 1.1r require LH = 5 with no GPSE. APIT: LE = 1.1r require LH = 12 with no GPSE. Communication cot i independent of the number of enor Communication cot increae with the locator denity, or number of directional antenna at each locator

11 Performance Summary Increaing number of ector Reduction in error and power needed but increaed complexity Senitivity to GPSE error GPSE=1.8r; Avg. LE=1.1r; require SeRLoc need LH=3; Dv-Hop need LH=5, no GPSE; APIT need LH=12, no GPSE; Communication cot; APIT require S + L SeRLoc require L *M S: Set of enor, L: Set of locator, M: # of antenna 41 Concluion We need to ecure location etimation to claim ecure location-dependent function/app. SeRLoc: SEcure Range-independent LOCalization Robutly compute the location even in the preence of attack Better performance than up-to-date range independent localization cheme Decentralized implementation, reilient to ource of error Current development Reitance to jamming attack Analytical evaluation of error bound 42 Thank you for your time! Any Quetion 43 11

HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks

HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks Loukas Lazos and Radha Poovendran Network Security Lab, Dept. of EE, University of Washington, Seattle, WA 98195-2500 {l lazos,

More information

HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks

HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks HiRLoc: High-resolution Robust Localization for Wireless Sensor Networks Loukas Lazos and Radha Poovendran Network Security Lab, Dept. of EE, University of Washington, Seattle, WA 98195-2500 {l lazos,

More information

Locali ation z For For Wireless S ensor Sensor Networks Univ of Alabama F, all Fall

Locali ation z For For Wireless S ensor Sensor Networks Univ of Alabama F, all Fall Localization ation For Wireless Sensor Networks Univ of Alabama, Fall 2011 1 Introduction - Wireless Sensor Network Power Management WSN Challenges Positioning of Sensors and Events (Localization) Coverage

More information

Secure Localization in Wireless Sensor Networks: A Survey

Secure Localization in Wireless Sensor Networks: A Survey Secure Localization in Wireless Sensor Networks: A Survey arxiv:1004.3164v1 [cs.cr] 19 Apr 2010 Waleed Ammar, Ahmed ElDawy, and Moustafa Youssef {ammar.w, aseldawy, moustafa}@alex.edu.eg Computer and Systems

More information

Localization in WSN. Marco Avvenuti. University of Pisa. Pervasive Computing & Networking Lab. (PerLab) Dept. of Information Engineering

Localization in WSN. Marco Avvenuti. University of Pisa. Pervasive Computing & Networking Lab. (PerLab) Dept. of Information Engineering Localization in WSN Marco Avvenuti Pervasive Computing & Networking Lab. () Dept. of Information Engineering University of Pisa m.avvenuti@iet.unipi.it Introduction Location systems provide a new layer

More information

SeRLoc: Robust Localization for Wireless Sensor Networks

SeRLoc: Robust Localization for Wireless Sensor Networks SeRLoc: Robust Localization for Wireless Sensor Networks LOUKAS LAZOS and RADHA POOVENDRAN University of Washington Many distributed monitoring applications of Wireless Sensor Networks (WSNs) require the

More information

MIMO Systems: Multiple Antenna Techniques

MIMO Systems: Multiple Antenna Techniques ADVANCED MIMO SYSTEMS MIMO Sytem: Multiple Antenna Technique Yiqing ZOU, Zhengang PAN, Kai-Kit WONG Dr, Senior Member of IEEE, Aociate Editor, IEEE TWirele, IEEE CL, and JoC (AP), Senior Lecturer, Department

More information

II. SYSTEM MODEL. A. Link and path model

II. SYSTEM MODEL. A. Link and path model HARQ I. INTRODUCTION ARQ (automatic repeat-requet i a link layer protocol ued for packet error detection and retranmiion. Errordetection bit (uch a CRC bit are attached and tranmitted along with the meage

More information

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Stability Analyi in a Cognitive Radio Sytem with Cooperative Beamforming Mohammed Karmooe, Ahmed Sultan, Moutafa Youef Department of Electrical Engineering, Alexandria Univerity, Alexandria, Egypt Wirele

More information

Securing Wireless Localization: Living with Bad Guys. Zang Li, Yanyong Zhang, Wade Trappe Badri Nath

Securing Wireless Localization: Living with Bad Guys. Zang Li, Yanyong Zhang, Wade Trappe Badri Nath Securing Wireless Localization: Living with Bad Guys Zang Li, Yanyong Zhang, Wade Trappe Badri Nath Talk Overview Wireless Localization Background Attacks on Wireless Localization Time of Flight Signal

More information

Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004

Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004 Secure Localization Services Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 24 badri@cs.rutgers.edu Importance of localization

More information

Adaptive Space/Frequency Processing for Distributed Aperture Radars

Adaptive Space/Frequency Processing for Distributed Aperture Radars Adaptive Space/Frequency Proceing for Ditributed Aperture Radar Raviraj Adve a, Richard Schneible b, Robert McMillan c a Univerity of Toronto Department of Electrical and Computer Engineering 10 King College

More information

RESEARCH ON NEAR FIELD PASSIVE LOCALIZATION BASED ON PHASE MEASUREMENT TECHNOLOGY BY TWO TIMES FREQUENCY DIFFERENCE

RESEARCH ON NEAR FIELD PASSIVE LOCALIZATION BASED ON PHASE MEASUREMENT TECHNOLOGY BY TWO TIMES FREQUENCY DIFFERENCE RESEARCH ON NEAR FIED PASSIVE OCAIZATION BASED ON PHASE MEASUREMENT TECHNOOGY BY TWO TIMES FREQUENCY DIFFERENCE Xuezhi Yan, Shuxun Wang, Zhongheng Ma and Yukuan Ma College of Communication Engineering

More information

Automatic Target Recognition with Unknown Orientation and Adaptive Waveforms

Automatic Target Recognition with Unknown Orientation and Adaptive Waveforms Automatic Target Recognition wi Unknown Orientation and Adaptive Waveform Junhyeong Bae Department of Electrical and Computer Engineering Univerity of Arizona 13 E. Speedway Blvd, Tucon, Arizona 8571 dolbit@email.arizona.edu

More information

Internet Routing Games

Internet Routing Games Internet Routing Game João P. Hepanha Center for Control Dynamical Sytem an Computation Univerity of California Santa Barbara In collaboration with: S. Bohacek (Univ. Delaware), K. Obraczka (UC Santa Cruz)

More information

The Performance Analysis of MIMO OFDM System with Different M-QAM Modulation and Convolution Channel Coding

The Performance Analysis of MIMO OFDM System with Different M-QAM Modulation and Convolution Channel Coding The Performance Analyi of MIMO OFDM Sytem with Different M-QAM Modulation and Convolution Channel Coding H. S. Shwetha M.tech, Digital Communication Engineering Siddaganga Intitute of Technology Tumakuru,

More information

Synthetic aperture radar raw signal simulator for both pulsed and FM-CW modes

Synthetic aperture radar raw signal simulator for both pulsed and FM-CW modes Computational Method and Experimental Meaurement XV 43 Synthetic aperture radar raw ignal imulator for both puled and FM-CW mode P. Serafi C. Lenik & A. Kawalec Intitute of adioelectronic, Military Univerity

More information

Sloppy Addition and Multiplication

Sloppy Addition and Multiplication Sloppy Addition and Multiplication IMM-Technical Report-2011-14 Alberto Nannarelli Dept. Informatic and Mathematical Modelling Technical Univerity of Denmark Kongen Lyngby, Denmark Email: an@imm.dtu.dk

More information

Wireless Link SNR Mapping Onto An Indoor Testbed

Wireless Link SNR Mapping Onto An Indoor Testbed Wirele Link SNR Mapping Onto An Indoor Tetbed Jing Lei, Roy Yate, Larry Greentein, Hang Liu WINLAB Rutger Univerity 73 Brett Road, Picataway, NJ 8854, USA {michelle, ryate, ljg, hliu}@winlab.rutger.edu

More information

ASSISTING PERSONAL POSITIONING IN INDOOR ENVIRONMENTS USING MAP MATCHING

ASSISTING PERSONAL POSITIONING IN INDOOR ENVIRONMENTS USING MAP MATCHING Archive of Photogrammetry, Cartography and Remote Sening, Vol., 0, pp. 39-49 ISSN 083-4 ASSISTING PERSONAL POSITIONING IN INDOOR ENVIRONMENTS USING MAP MATCHING Mohamed Attia, Adel Moua, ing Zhao 3, Naer

More information

Raising Cavity Q for Microwave-Pulse Compression by Reducing Aperture Skin-Effect Losses

Raising Cavity Q for Microwave-Pulse Compression by Reducing Aperture Skin-Effect Losses Circuit and Electromagnetic Sytem Deign Note Note 6 8 June 9 Raiing Cavity Q for Microwave-Pule Compreion by Reducing Aperture Skin-Effect Loe Carl E. Baum Univerity of New Meico Department of Electrical

More information

Pre- and Post-DFT Combining Space Diversity Receiver for Wideband Multi-Carrier Systems

Pre- and Post-DFT Combining Space Diversity Receiver for Wideband Multi-Carrier Systems Pre- and Pot- Combining Space Receiver for Wideband Multi-Carrier Sytem Muhammad Imadur Rahman, Suvra Sekhar Da, Frank HP Fitzek, Ramjee Praad Center for TeleInFratruktur (CTiF), Aalborg Univerity, Denmark

More information

Alternating Opportunistic Large Arrays in Broadcasting for Network Lifetime Extension

Alternating Opportunistic Large Arrays in Broadcasting for Network Lifetime Extension IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL 8, NO 6, JUNE 009 831 Alternating Opportunitic Large Array in Broadcating for Network Lifetime Extenion Aravind Kaila and Mary Ann Ingram Abtract We propoe

More information

Comm 502: Communication Theory. Lecture 5. Intersymbol Interference FDM TDM

Comm 502: Communication Theory. Lecture 5. Intersymbol Interference FDM TDM Lecture 5 Interymbol Interference FDM TDM 1 Time Limited Waveform Time-Limited Signal = Frequency Unlimited Spectrum Square Pule i a Time-Limited Signal Fourier Tranform 0 T S -3/T S -2/T S -1/T S 0 1/T

More information

MIMO Enabled Efficient Mapping of Data in WiMAX Networks

MIMO Enabled Efficient Mapping of Data in WiMAX Networks MIMO Enabled Efficient Mapping of Data in WiMAX Network Penumarthi Phani Krihna, R. Saravana Manickam, and C. Siva Ram Murthy Department of Computer Science and Engineering Indian Intitute of Technology

More information

A Proportional Fair Resource Allocation Algorithm for Hybrid Hierarchical Backhaul Networks

A Proportional Fair Resource Allocation Algorithm for Hybrid Hierarchical Backhaul Networks A Proportional Fair Reource Allocation Algorithm for Hybrid Hierarchical Backhaul Network Intitute of Communication and Information Sytem, Hohai Univerity, Nanjing, 211100, China E-mail: 498807912@qq.com

More information

GPS signal Rician fading model for precise navigation in urban environment

GPS signal Rician fading model for precise navigation in urban environment Indian Journal of Radio & Space Phyic Vol 42, June 203, pp 92-96 GPS ignal Rician fading model for precie navigation in urban environment G Sai Bhuhana Rao, G Sateeh Kumar $,* & M N V S S Kumar Department

More information

APPLICATION OF PHASOR MEASUREMENT UNIT IN SMART GRID

APPLICATION OF PHASOR MEASUREMENT UNIT IN SMART GRID APPLICATION OF PHASOR MEASUREMENT UNIT IN SMART GRID 1 Chandarani Sutar, 2 Dr. K. S. Verma 1 RRSIMT Amethi (U.P.), 2 KNIT Sultapur (U.P.) Email: 1 Chandarani_t@yahoo.com, 2 kv211@rediffmail.com, Abtract-A

More information

Performance Analysis of DV-Hop Localization Using Voronoi Approach

Performance Analysis of DV-Hop Localization Using Voronoi Approach Vol.3, Issue.4, Jul - Aug. 2013 pp-1958-1964 ISSN: 2249-6645 Performance Analysis of DV-Hop Localization Using Voronoi Approach Mrs. P. D.Patil 1, Dr. (Smt). R. S. Patil 2 *(Department of Electronics and

More information

Reinforcement Learning Based Anti-jamming with Wideband Autonomous Cognitive Radios

Reinforcement Learning Based Anti-jamming with Wideband Autonomous Cognitive Radios 1 Reinforcement Learning Baed Anti-jamming with Wideband Autonomou Cognitive Radio Stephen Machuzak, Student Member, IEEE, and Sudharman K. Jayaweera, Senior Member, IEEE Communication and Information

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS SIMULATION PERFORMANCE OF MULTIPLE-INPUT MULTIPLE-OUTPUT SYSTEMS EMPLOYING SINGLE- CARRIER MODULATION AND ORTHOGONAL FRE- QUENCY DIVISION MULTIPLEXING

More information

Pulse Interval Modulation Dual Header (PIM-DH)

Pulse Interval Modulation Dual Header (PIM-DH) Pule Interval Modulation Dual Header () N. Aldiiat, Z. Ghaemlooy, and R. Saatchi Electronic Reearch Group, School of Engineering Sheffield Hallam Univerity Sheaf Building, Pond Street Sheffield S WB United

More information

Massachusetts Institute of Technology Haystack Observatory WESTFORD, MASSACHUSETTS DATE 07/15/2009

Massachusetts Institute of Technology Haystack Observatory WESTFORD, MASSACHUSETTS DATE 07/15/2009 BBD Memo #033 Maachuett Intitute of Technolog Hatack Obervator WESTFORD, MASSACHUSETTS 0886 DATE 07/5/2009 To: Broadband Development Group From: C. J. Beaudoin Subject: Holographic Proceing and Conideration

More information

Making Use Of What You Don t See: Negative Information In Markov Localization

Making Use Of What You Don t See: Negative Information In Markov Localization Making Ue Of What You Don t See: Negative Information In Markov Localization Jan Hoffmann, Michael Spranger, Daniel Göhring, and Matthia Jüngel Department of Computer Science Artificial Intelligence Laboratory

More information

Simultaneous usage of TV spectrum for mobile broadband and TV broadcast transmission. Joachim Sachs Ericsson Research AAchen, Germany

Simultaneous usage of TV spectrum for mobile broadband and TV broadcast transmission. Joachim Sachs Ericsson Research AAchen, Germany Simultaneou uage of TV pectrum for mobile broadband and TV broadcat tranmiion Joachim Sach Ericon Reearch AAchen, Germany OUtline Background and motivation Spectrum haring between TV and mobile network

More information

Deterministic Deployment for Wireless Image Sensor Nodes

Deterministic Deployment for Wireless Image Sensor Nodes Send Order for Reprint to reprint@benthamcience.ae 668 The Open Electrical & Electronic Engineering Journal, 04, 8, 668-674 Determinitic Deployment for Wirele Image Senor Node Open Acce Junguo Zhang *,

More information

A Secant Location Estimation Algorithm for Wireless Sensor Networks

A Secant Location Estimation Algorithm for Wireless Sensor Networks A Secant Location Etimation Algorithm for Wirele Senor Network Tung-Han Lee, Yu-Jhong Fu, Lin-huang Chang Department of Computer an Information Science National Taichung Univerity Taichung, Taiwan, R.O.C.

More information

Formatting and Baseband. Formatting & Baseband. Page 1. Formatting and Baseband Modulation. CSE4214 Digital Communications

Formatting and Baseband. Formatting & Baseband. Page 1. Formatting and Baseband Modulation. CSE4214 Digital Communications CSE4214 Digital Communication CSE4214 Digital Communication Chapter 2 Formatting Formatting and Baeband Modulation Formatting & Baeband Formatting and Baeband 3 4 Page 1 1 What i Formatting? Information

More information

Subcarrier exclusion techniques

Subcarrier exclusion techniques Subcarrier excluion technique for coded OFDM ytem Kai-Uwe Schmidt, Jochen Ertel, Michael Benedix, and Adolf Finger Communication Laboratory, Dreden Univerity of Technology, 62 Dreden, Germany email: {chmidtk,

More information

ECE 6640 Digital Communications

ECE 6640 Digital Communications ECE 6640 Digital Communication Dr. Bradley J. Bazuin Aitant Profeor Department of Electrical and Computer Engineering College of Engineering and Applied Science Chapter 2 2. Formatting and Baeband Modulation.

More information

DIGITAL COMMUNICATION

DIGITAL COMMUNICATION DEPARTMENT OF ELECTRICAL &ELECTRONICS ENGINEERING DIGITAL COMMUNICATION Spring 2010 Yrd. Doç. Dr. Burak Kelleci OUTLINE Line Code Differential Encoding Regeneration, Decoding and Filtering Delta Modulation

More information

Ad hoc and Sensor Networks Chapter 9: Localization & positioning

Ad hoc and Sensor Networks Chapter 9: Localization & positioning Ad hoc and Sensor Networks Chapter 9: Localization & positioning Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Means for a node to determine its physical position (with

More information

Trimble s ubiquitous approach to cadastre throughout the World

Trimble s ubiquitous approach to cadastre throughout the World u-trimble Trimble ubiquitou approach to cadatre throughout the World Keith Hofgartner Project Manager Worldwide (Ubiquitou) Trimble Navigation Limited Oct 2009 Opening Statement Trimble i.. Ubiqitou. -

More information

KAIROS Base Station/Repeater. Professional infrastructure for Digital Mobile Radios

KAIROS Base Station/Repeater. Professional infrastructure for Digital Mobile Radios IROS Bae Station/Repeater Profeional infratructure for Digital Mobile Radio IROS Bae Station/Repeater Deigned and manufactured in Italy Kairo i an ancient Greek word meaning the right moment in which everything

More information

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1

Introduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1 ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,

More information

/09/$ IEEE 472

/09/$ IEEE 472 Bai Puruit for Robut Paive Acoutic Beamforming Ben Shapo and Chri Kreucher Integrity Application Incorporated 900 Victor Way, Suite 220 Ann Arbor, MI 48108 bhapo@integrity-app.com, ckreuche@umich.edu Abtract

More information

Two Novel Handover Algorithms with Load Balancing for Heterogeneous Network

Two Novel Handover Algorithms with Load Balancing for Heterogeneous Network Two Novel Handover Algorithm Load Balancing for Heterogeneou Network Rintaro Yoneya, Abolfazl Mehbodniya and Fumiyuki Adachi Dept. of Communication Engineering, Graduate School of Engineering, Tohoku Univerity,

More information

CSS: Conditional State-based Scheduling for Networked Control Systems

CSS: Conditional State-based Scheduling for Networked Control Systems In Proc. of the IEEE International Conference on Embedded and Real-Time Computing Sytem and Application (RTCSA), Seoul, South Korea, Augut 2012. Revied verion. CSS: Conditional State-baed Scheduling for

More information

Relay Selection and Resource Allocation in LTE-Advanced Cognitive Relay Networks

Relay Selection and Resource Allocation in LTE-Advanced Cognitive Relay Networks International Journal on Communication Antenna and Propagation (I.Re.C.A.P.), Vol. 1, N. 4 Augut 2011 Relay Selection and Reource Allocation in LTE-Advanced Cognitive Relay Network Ardalan Alizadeh, Seyed

More information

A New Technique to TEC Regional Modeling using a Neural Network.

A New Technique to TEC Regional Modeling using a Neural Network. A New Technique to TEC Regional Modeling uing a Neural Network. Rodrigo F. Leandro Geodetic Reearch Laboratory, Department of Geodey and Geomatic Engineering, Univerity of New Brunwick, Fredericton, Canada

More information

Australian Journal of Basic and Applied Sciences. Advanced Heterogeneous Vehicular Network for Emerging Vehicular Services

Australian Journal of Basic and Applied Sciences. Advanced Heterogeneous Vehicular Network for Emerging Vehicular Services AENSI Journal Autralian Journal of Baic and Applied Science Journal home page: www.ajbaweb.com Advanced Heterogeneou Vehicular Network for Emerging Vehicular Service 1 Saied M. Abd El-atty and KontantinoLizo

More information

One interesting embedded system

One interesting embedded system One interesting embedded system Intel Vaunt small glass Key: AR over devices that look normal https://www.youtube.com/watch?v=bnfwclghef More details at: https://www.theverge.com/8//5/696653/intelvaunt-smart-glasses-announced-ar-video

More information

KAIROS Base Station/Repeater. Professional infrastructure for Digital Mobile Radios

KAIROS Base Station/Repeater. Professional infrastructure for Digital Mobile Radios IROS Bae Station/Repeater Profeional infratructure for Digital Mobile Radio Key Feature Dual mode It perform the automatic witching between analog and digital modulation, according to the type of incoming

More information

Internet Routing Protocols Lecture 02 Intra-domain Routing

Internet Routing Protocols Lecture 02 Intra-domain Routing Internet Routing Protocol Lecture Intra-domain Routing dvanced Sytem Topic Lent Term, 8 Timothy G. Griffin Computer Lab Cambridge UK Shortet Path Generalize ditance to weighted etting igraph G = (V,E)

More information

Control of Electromechanical Systems using Sliding Mode Techniques

Control of Electromechanical Systems using Sliding Mode Techniques Proceeding of the 44th IEEE Conference on Deciion and Control, and the European Control Conference 25 Seville, Spain, December 2-5, 25 MoC7. Control of Electromechanical Sytem uing Sliding Mode Technique

More information

Chapter Introduction

Chapter Introduction Chapter-6 Performance Analyi of Cuk Converter uing Optimal Controller 6.1 Introduction In thi chapter two control trategie Proportional Integral controller and Linear Quadratic Regulator for a non-iolated

More information

Research on Direct Torque Control of Induction Motor Based on TMS320LF2407A

Research on Direct Torque Control of Induction Motor Based on TMS320LF2407A Available online at www.ciencedirect.com Phyic Procedia 5 ( ) 53 59 International Conference on Solid State Device and Material Science Reearch on Direct Torque Control of Induction Motor Baed on TMS3LF47A

More information

Artificial Intersymbol Interference (ISI) to Exploit Receiver Imperfections for Secrecy

Artificial Intersymbol Interference (ISI) to Exploit Receiver Imperfections for Secrecy Artificial Interymbol Interference ISI to Exploit Receiver Imperfection for Secrecy Azadeh Sheikholelami, Denni Goeckel and Hoein ihro-nik Electrical and Computer Engineering Department, Univerity of Maachuett,

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /VETECS.2009.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /VETECS.2009. Nordin, R., Armour, S. M. D., & McGeehan, J. P. (9). Overcoming elfinterference in SM-OFDMA with and dynamic ubcarrier allocation. In IEEE 69th Vehicular Technology Conference 9 (VTC Spring 9), Barcelona

More information

Indoor Localization in Wireless Sensor Networks

Indoor Localization in Wireless Sensor Networks International Journal of Engineering Inventions e-issn: 2278-7461, p-issn: 2319-6491 Volume 4, Issue 03 (August 2014) PP: 39-44 Indoor Localization in Wireless Sensor Networks Farhat M. A. Zargoun 1, Nesreen

More information

SCK LAB MANUAL SAMPLE

SCK LAB MANUAL SAMPLE SCK LAB MANUAL SAMPLE VERSION 1.2 THIS SAMPLE INCLUDES: TABLE OF CONTENTS TWO SELECTED LABS FULL VERSION IS PROVIDED FREE WITH KITS Phone: +92 51 8356095, Fax: +92 51 8311056 Email: info@renzym.com, URL:www.renzym.com

More information

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Security in Sensor Networks Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Mobile Ad-hoc Networks (MANET) Mobile Random and perhaps constantly changing

More information

An FM signal in the region of 4.2 to 4.6

An FM signal in the region of 4.2 to 4.6 A LOW COST, HIGH ACCURACY RADAR ALTIMETER Thi article decribe the development of a frequency modulated (FM) radar altimeter for meauring the height of flying object. The entire tructure comprie two part:

More information

A COMPARISON OF METHODS FOR EVALUATING THE TEST ZONE PERFORMANCE OF ANECHOIC CHAMBERS DESIGNED FOR TESTING WIRELESS DEVICES

A COMPARISON OF METHODS FOR EVALUATING THE TEST ZONE PERFORMANCE OF ANECHOIC CHAMBERS DESIGNED FOR TESTING WIRELESS DEVICES A COMPARISON OF METHODS FOR EVALUATING THE TEST ZONE PERFORMANCE OF ANECHOIC CHAMBERS DESIGNED FOR TESTING WIRELESS DEVICES Jame D. Huff John C. Mantovani Carl W. Sirle The Howland Company, Inc. 4540 Atwater

More information

Before the beginning of the Q wave At the top of the R wave After the end of the S wave

Before the beginning of the Q wave At the top of the R wave After the end of the S wave 334 AcqKnowledge 4 Software Guide Detect and Claify Heartbeat Thi robut QRS detector i tuned for human ECG Lead II ignal. It attempt to locate QRS complexe and place an event near the center of each QRS

More information

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous

More information

A Programmable Compensation Circuit for System-on- Chip Application

A Programmable Compensation Circuit for System-on- Chip Application http://dx.doi.org/0.5573/jsts.0..3.98 JOURAL OF SEMICODUCTOR TECHOLOGY AD SCIECE, VOL., O.3, SEPTEMBER, 0 A Programmable Compenation Circuit for Sytem-on- Chip Application Woo-Chang Choi* and Jee-Youl

More information

A Real-Time Wireless Channel Emulator For MIMO Systems

A Real-Time Wireless Channel Emulator For MIMO Systems A eal-time Wirele Channel Emulator For MIMO Sytem Hamid Elami, Ahmed M. Eltawil {helami,aeltawil}@uci.edu Abtract: The improvement in channel capacity hailed by MIMO ytem i directly related to intricate

More information

IMPROVED SPATIAL MODULATION FOR HIGH SPECTRAL EFFICIENCY

IMPROVED SPATIAL MODULATION FOR HIGH SPECTRAL EFFICIENCY IMPOVED SPIL MODULION FO HIGH SPECL EFFICIENCY ajab M. Legnain, ohdy H.M. Hafez 1 and bdelgader M. Legnain 2 1 Department of Sytem and Computer Eng., Carleton Univerity, Ottawa, Canada {rlegnain, hafez}@ce.carleton.ca

More information

Frequency Calibration of A/D Converter in Software GPS Receivers

Frequency Calibration of A/D Converter in Software GPS Receivers Frequency Calibration of A/D Converter in Software GPS Receiver L. L. Liou, D. M. Lin, J. B. Tui J. Schamu Senor Directorate Air Force Reearch Laboratory Abtract--- Thi paper preent a oftware-baed method

More information

Network Coding for Multi-Resolution Multicast

Network Coding for Multi-Resolution Multicast Network Coding for Multi-Reolution Multicat MinJi Kim, Daniel Lucani, Xiaomeng Shi, Fang Zhao, Muriel Médard Maachuett Intitute of Technology, Cambridge, MA 02139, USA Email: {minjikim, dlucani, xhi, zhaof,

More information

GPS WIRELESS SENSOR NETWORK FOR MONITORING QUASI-STATIC DISPLACEMENT

GPS WIRELESS SENSOR NETWORK FOR MONITORING QUASI-STATIC DISPLACEMENT GPS WIRELESS SENSOR NETWORK FOR MONITORING QUASI-STATIC DISPLACEMENT Maayuki SAEKI 1, Mai SAWADA 2, Yukio SHIBA 3 and Kenji OGUNI 4 1 Member of JSCE, Aociate Profeor, Dept. of Civil Eng., Tokyo Univerity

More information

A Study for Finding Location of Nodes in Wireless Sensor Networks

A Study for Finding Location of Nodes in Wireless Sensor Networks A Study for Finding Location of Nodes in Wireless Sensor Networks Shikha Department of Computer Science, Maharishi Markandeshwar University, Sadopur, Ambala. Shikha.vrgo@gmail.com Abstract The popularity

More information

Downlink Small-cell Base Station Cooperation Strategy in Fractal Small-cell Networks

Downlink Small-cell Base Station Cooperation Strategy in Fractal Small-cell Networks Downlink Small-cell Bae Station Cooperation Strategy in Fractal Small-cell Network Fen Bin, Jiaqi Chen, Xiaohu Ge, and Wei Xiang, School of Electronic Information and Communication Huazhong Univerity of

More information

Implementation and Testing of a Low-Overhead Network Synchronization Protocol

Implementation and Testing of a Low-Overhead Network Synchronization Protocol Implementation and Teting of a Low-Overhead Network Synchronization Protocol Skye R. Kowalki, Timothy M. Chritman, Andrew G. Klein Department of Engineering and Deign, Wetern Wahington Univerity Bellingham,

More information

ECE 6640 Digital Communications

ECE 6640 Digital Communications ECE 6640 Digital Communication Dr. Bradley J. Bazuin Aitant Profeor Department of Electrical and Computer Engineering College of Engineering and Applied Science Chapter. Formatting and Baeband Modulation.

More information

LOCALIZATION SCHEME FOR THREE DIMENSIONAL WIRELESS SENSOR NETWORKS USING GPS ENABLED MOBILE SENSOR NODES

LOCALIZATION SCHEME FOR THREE DIMENSIONAL WIRELESS SENSOR NETWORKS USING GPS ENABLED MOBILE SENSOR NODES LOCALIZATION SCHEME FOR THREE DIMENSIONAL WIRELESS SENSOR NETWORKS USING GPS ENABLED MOBILE SENSOR NODES Vibha Yadav, Manas Kumar Mishra, A.K. Sngh and M. M. Gore Department of Computer Science & Engineering,

More information

Published in: Proceedings of 2018 IEEE 19th Workshop on Control and Modeling for Power Electronics (COMPEL)

Published in: Proceedings of 2018 IEEE 19th Workshop on Control and Modeling for Power Electronics (COMPEL) Aalborg Univeritet A Synchronization Method for Grid Converter with Enhanced Small-Signal and Tranient Dynamic Steinkohl, Joachim; Taul, Mad Graungaard; Wang, Xiongfei; Blåbjerg, Frede; Haler, Jean- Philippe

More information

Resilient Large-Scale Cognitive Radio Ad Hoc Networking Using Path-Time Codes

Resilient Large-Scale Cognitive Radio Ad Hoc Networking Using Path-Time Codes IEEE ICC 2017 Cognitive Radio and Network Sympoium Reilient Large-Scale Cognitive Radio Ad Hoc Networking Uing Path-Time Code Yi-Chi Chen 1, I-Wei Lai 2 and Kwang-Cheng Chen 3 Graduate Intitute of Communication

More information

PPP-RTK: Results of CORS Network-Based PPP with Integer Ambiguity Resolution

PPP-RTK: Results of CORS Network-Based PPP with Integer Ambiguity Resolution 2 International Sympoium on GPS/GNSS October 26-28, 2. PPP-RTK: Reult of CORS Network-Baed PPP with Integer Ambiguity Reolution P.J.G. Teunien,2, D Odik, and B Zhang,3* GNSS Reearch Centre, Curtin Univerity

More information

105 SERIES REMOTE RECEIVER DECODERS

105 SERIES REMOTE RECEIVER DECODERS Remote Decoder; Radio, Infra-Red, Pager 4 Channel Expandable To 15 Radio ; 433 / 458 / 868 MHz IP65 Rated Encloure Eay Intallation Via Screw Terminal 230Vac Or 12-30Vdc Supply 15 CMOS/TTL Channel O/P'

More information

Active Harmonic Elimination in Multilevel Converters Using FPGA Control

Active Harmonic Elimination in Multilevel Converters Using FPGA Control Active Harmonic Elimination in Multilevel Converter Uing FPGA Control Zhong Du, Leon M. Tolbert, John N. Chiaon Electrical and Computer Engineering The Univerity of Tenneee Knoxville, TN 7996- E-mail:

More information

AN EVALUATION OF DIGILTAL ANTI-ALIASING FILTER FOR SPACE TELEMETRY SYSTEMS

AN EVALUATION OF DIGILTAL ANTI-ALIASING FILTER FOR SPACE TELEMETRY SYSTEMS AN EVALUATION OF DIGILTAL ANTI-ALIASING FILTER FOR SPACE TELEMETRY SYSTEMS Alion de Oliveira Morae (1), Joé Antonio Azevedo Duarte (1), Sergio Fugivara (1) (1) Comando-Geral de Tecnologia Aeroepacial,

More information

PHASE FUNCTION MEASUREMENT FOR MODELLING RADIOWAVE ATTENUATION AND SCATTER IN VEGETATION BASED ON THE THEORY OF RADIATIVE ENERGY TRANSFER

PHASE FUNCTION MEASUREMENT FOR MODELLING RADIOWAVE ATTENUATION AND SCATTER IN VEGETATION BASED ON THE THEORY OF RADIATIVE ENERGY TRANSFER PHASE FUNCTION MEASUREMENT FOR MODELLING RADIOWAVE ATTENUATION AND SCATTER IN VEGETATION BASED ON THE THEORY OF RADIATIVE ENERGY TRANSFER Jürgen Richter 1, Miqdad Al-Nuaimi 1, Rafael Caldeirinha 1 Univerity

More information

Range-Free Localization

Range-Free Localization Range-Free Localization Radu Stoleru 1, Tian He 2 and John A. Stankovic 3 1 Department of Computer Science, University of Virginia, stoleru@cs.virginia.edu 2 Department of Computer Science and Engineering,

More information

Cooperative Diversity in Interference Limited Wireless Networks

Cooperative Diversity in Interference Limited Wireless Networks Cooperative Diverity in Interference Limited Wirele Network Sam Vakil, Student Member, IEEE, and Ben Liang, Senior Member, IEEE Abtract Uing relay in wirele network can potentially lead to ignificant capacity

More information

We are IntechOpen, the first native scientific publisher of Open Access books. International authors and editors. Our authors are among the TOP 1%

We are IntechOpen, the first native scientific publisher of Open Access books. International authors and editors. Our authors are among the TOP 1% We are IntechOpen, the firt native cientific publiher of Open Acce book 3,350 108,000 1.7 M Open acce book available International author and editor Download Our author are among the 151 Countrie delivered

More information

Decision-Making Level Fusion Based on DSmT for Multi-Sensor Life Detection Platform

Decision-Making Level Fusion Based on DSmT for Multi-Sensor Life Detection Platform enor & Tranducer 204 by IFA Publihing,. L. http://www.enorportal.com Deciion-Making Level Fuion Baed on DmT for Multi-enor Life Detection Platform Jingong YANG, Xun CHEN Department of Diater Prevention

More information

DESIGN OF SECOND ORDER SIGMA-DELTA MODULATOR FOR AUDIO APPLICATIONS

DESIGN OF SECOND ORDER SIGMA-DELTA MODULATOR FOR AUDIO APPLICATIONS DESIGN OF SECOND ORDER SIGMA-DELTA MODULATOR FOR AUDIO APPLICATIONS 1 DHANABAL R, 2 BHARATHI V, 3 NAAMATHEERTHAM R SAMHITHA, 4 G.SRI CHANDRAKIRAN, 5 SAI PRAMOD KOLLI 1 Aitant Profeor (Senior Grade), VLSI

More information

On Practical Selective Jamming of Bluetooth Low Energy Advertising

On Practical Selective Jamming of Bluetooth Low Energy Advertising On Practical Selective Jamming of Bluetooth Low Energy Advertising S. Brauer, A. Zubow, S. Zehl, M. Roshandel, S. M. Sohi Technical University Berlin & Deutsche Telekom Labs Germany Outline Motivation,

More information

On-Demand Spectrum Sharing By Flexible Time-Slotted Cognitive Radio Networks

On-Demand Spectrum Sharing By Flexible Time-Slotted Cognitive Radio Networks On-Demand Spectrum Sharing By Flexible Time-Slotted Cognitive Radio Network Shimin Gong, Xu Chen, Jianwei Huang, and Ping Wang Centre for Multimedia and Network Technology, Nanyang Technological Univerity

More information

Mobile Communications TCS 455

Mobile Communications TCS 455 Mobile Communication TCS 455 Dr. Prapun Sukompong prapun@iit.tu.ac.th Lecture 23 1 Office Hour: BKD 3601-7 Tueday 14:00-16:00 Thurday 9:30-11:30 Announcement Read Chapter 9: 9.1 9.5 Section 1.2 from [Bahai,

More information

Optimal Control for Single-Phase Brushless DC Motor with Hall Sensor

Optimal Control for Single-Phase Brushless DC Motor with Hall Sensor Reearch Journal of Applied Science, Engineering and Technology 5(4): 87-92, 23 ISSN: 24-7459; e-issn: 24-7467 Maxwell Scientific Organization, 23 Submitted: June 22, 22 Accepted: Augut 7, 22 Publihed:

More information

Double Directional Channel Characterization on Board Ships

Double Directional Channel Characterization on Board Ships Double Directional Channel Characterization on Board Ship H. Kdouh, H. Farhat, C. Broueau, G. Zaharia, G. Grunfelder, G. El Zein Intitut d Electronique et de Télécommunication de Renne Renne, France huein.kdouh@ina-renne.fr

More information

Online Adaptive Fuzzy Logic Controller Using Genetic Algorithm and Neural Network for Networked Control Systems

Online Adaptive Fuzzy Logic Controller Using Genetic Algorithm and Neural Network for Networked Control Systems 1 Online Adaptive Fuzzy Logic Controller Uing Genetic Algorithm and Neural Network for Networked Control Sytem Pooya Hajebi*, Seyed Mohammad Taghi AlModarrei* *Electrical and Computer Engineering Department,

More information

ELG4139: Passive Filters

ELG4139: Passive Filters EG439: Paive Filter A ilter i a ytem that procee a ignal in ome deired ahion. There are two broad categorie o ilter: An analog ilter procee continuou-time ignal A digital ilter procee dicrete-time ignal.

More information

Reliable Local Broadcast in a Wireless Network Prone to Byzantine Failures

Reliable Local Broadcast in a Wireless Network Prone to Byzantine Failures Reliable Local Broadcat in a Wirele Network Prone to Byzantine Failure ABSTRACT Vartika Bhandari Dept. of Computer Science, and Coordinated Science Laboratory Univerity of Illinoi at Urbana-Champaign vbhandar@uiuc.edu

More information

Position Control of a Large Antenna System

Position Control of a Large Antenna System Poition Control of a Large Antenna Sytem uldip S. Rattan Department of Electrical Engineering Wright State Univerity Dayton, OH 45435 krattan@c.wright.edu ABSTRACT Thi report decribe the deign of a poition

More information

Parallel DCMs APPLICATION NOTE AN:030. Introduction. Sample Circuit

Parallel DCMs APPLICATION NOTE AN:030. Introduction. Sample Circuit APPLICATION NOTE AN:030 Parallel DCM Ugo Ghila Application Engineering Content Page Introduction 1 Sample Circuit 1 Output Voltage Regulation 2 Load Sharing 4 Startup 5 Special Application: Optimizing

More information

AN UNSUPERVISED BAYESIAN CLASSIFIER FOR MULTIPLE SPEAKER DETECTION AND LOCALIZATION

AN UNSUPERVISED BAYESIAN CLASSIFIER FOR MULTIPLE SPEAKER DETECTION AND LOCALIZATION AN UNSUPERVISED BAYESIAN CLASSIFIER FOR MULTIPLE SPEAKER DETECTION AND LOCALIZATION Youef Oualil, Friedrich Faubel, Dietrich Klakow Spoken Language Sytem, Saarland Univerity, Saarbrücken, Germany youef.oualil@lv.uni-aarland.de

More information