Prediction Efficiency in Predictive p-csma/cd
|
|
- Deborah Pierce
- 6 years ago
- Views:
Transcription
1 Prediction Efficiency in Predictive -CSMA/CD Mare Miśowicz AGH University of Science and Technology, Deartment of Electronics al. Miciewicza 30, Kraów, Poland Abstract. Predictive -ersistent CSMA rotocol is an imortant MAC solution develoed for networed sensor/control alications and used in Local Oerating Networs (LonWors) technology. The rotocol uses a built-in networ load rediction to suort collision avoidance. The aer resents an analytical study of rediction efficiency for a channel with collision detection. The aroach based on Marov chains is alied. The rocedure of erformance analysis includes the definition of transition robabilities of Marov chain for a secified load scenario, calculation of stationary distribution of contention window, and the robabilities of successful/unsuccessful transmission. It is shown that the redictive -CSMA rotocol manages to control the size of a cometition window in order to guarantee the sustained robability of a successful transmission. The simulative validation of analytical results is rovided. Keywords: MAC rotocols, sensor networs, erformance analysis, Marov chains. 1 Introduction Predictive -ersistent CSMA rotocol is the heart of LonTal/EIA rotocol used for communication between smart devices in Local Oerating Networs (LON, LonWors). LON has become a classic solution in building automation, and home networing, but is also used in a wide range of alications including, among others, semiconductor manufacturing, etrochemical industry, and wastewater treatment. In the redictive -CSMA the collision avoidance is alied for resolving uncoordinated access to the networ. In order to coe with overload situations, the redictive -ersistent CSMA has been designed as an adative version of ure -CSMA. In -ersistent CSMA, a node transmits with a fixed robability if the channel is idle, and defers the transmission with the robability (1-), when the channel is busy [10]. In the redictive -CSMA, the robability is variable and dynamically adjusted to exected traffic load using bacoff scheme. The advantage of the redictive -CSMA erformance is the throughut otimization, which consists in eeing a high throughut even if a networ is overloaded. Consequently, although the redictive -CSMA is a random access scheme, LonWors networs offer guaranteed bandwidth regardless of the offered traffic rate [3]. Under light traffic load, the redictive CSMA is reduced to the ure ersistent CSMA regardless of the structure of the traffic in a channel [3]. However, the destiny of rotocol oeration is to coe with high traffic corresonding to the
2 maximum load of a networ. This is when a user derives benefits from load rediction built in the rotocol. Indeed, transient overload situations occur in LonWors networed systems since the LON architecture is event-triggered and data are transmitted in resonse to external events [11,12]. The send-on-delta concet rather than the uniform samling is a natural sensor reorting aradigm in event-triggered alications [5,11]. Thus, the traffic in the channel is non-uniform and might be bursty. Moreover, the event-triggered architecture is rone to event showers, i.e. burst of correlated events, often released by a single hysical event that causes congestion of the system [9]. Such an effect occurs, e.g. when a fire is detected in a building by a number of redundant temerature and smoe sensors which begin to reort the event. The resent study addresses the issue of the asymtotic characteristics of redictive CSMA and the efficiency of rotocol redictability. Both roblems have not been quantitatively dislayed in the scientific literature. To recognize ability of the rotocol to coe with congestion, the channel must be stimulated by heavy load. We choose the saturation conditions for the rotocol analysis where each node has always a acet to send. The saturation condition reresents the largest ossible load offered to the networ by a given number of nodes, and constitutes the worst-case channel load. It is intuitively comrehensible that due to the negative feedbac, the size of the contention window grows with the number of cometing nodes. However, there is still no answer to the questions what is the relationshi between the mean size of cometition window and the number of nodes trying to access the channel. Several aers deal with the erformance analysis of redictive -ersistent CSMA rotocol [1-4, 6-8]. Main benefits of the redictive -CSMA scheme have been dislayed in [2]. Simulation analyses have been carried out in [3,7]. Analytical aroaches are resented in [6,8]. The former is the first comlex analysis of the redictive -CSMA based on the queuing theory. The latter follows a classical aroach develoed for the -CSMA in 70s [10]. The saturation throughut analysis for the redictive -CSMA without collision detection is resented in [4]. The resent study deals with the redictive -CSMA with collision detection, i.e. the redictive -CSMA/CD. With the collision detection the rotocol behavior is quite different from the one when a detection is absent since the contention window increase due to collisions is activated. Load scenario, where the acnowledged service (ACK) is used and all the transactions are unicast, is assumed. The aer is organized as follows. In Sect. 2, we resent the rotocol secification and the baclog counting rinciles. In Sect. 3, the framewor of the analytical aroach is described. Sect. 4 resents the analysis of results for the saturation erformance. In Sect. 5, the simulative validation of the analytical results is given. 2 Protocol Secification The LonTal/EIA acet cycle consists of two hases (Fig. 1). The first hase is otional and dedicated to riority messages. During the other hase nodes randomize their access to the medium. Since the goal of our analysis is the redictive - CSMA, we assume that there are no riority slots in the acet cycle.
3 2.1 LonTal/EIA Pacet Cycle The redictive -CSMA belongs to the slotted-csma algorithms where the time axis is slit into segments called slots with the duration equal to β 2. β β 1 2 Pacet Fig. 1. LonTal acet cycle Priority slots (0-127) Randomizing window ( slots) Pacet The algorithm oerates in the following way. A node attemting to transmit monitors the state of the channel. If the channel is busy the node continues sensing. When the node detects no transmission during the β 1 eriod, it delays a random number of time slots of β 2 duration. If the channel is still idle when the random delay exires, the node transmits. Otherwise, the node receives an incoming acet and cometes for the channel access again. If more than one node choose the same slot, and when that slot is the earliest one among the slots selected by all the contending nodes, then a collision haens. All the acets involved in a collision are corruted. The time by which the cometing node defers the transmission is exressed as a seudorandom number of time slots β 2 drawn from the uniform distribution between 0 and W, where W is the size of the randomizing (cometition) window. The size of the randomizing window is dynamically adjusted to the current channel load. If the channel is idle, the randomizing window consists of 16 time slots. When the channel load increases, the number of slots grows by factor BL, called the estimated channel baclog. The baclog BL can range from 1 to 63 and the size of the window varies from 16 to 1008 time slots since the following relationshi is met: W = BL (1) W base where W base is the size of the basic randomizing window (16 slots). Thus, the level of the ersistence of the redictive -CSMA has either the lower (1/16=0.0625), or the uer bound (1/1008=0.0009). 2.2 Baclog Switching Rules The baclog estimation is based on the calculation of the number of acets exected in the cometition for the channel during the next acet cycle [1]. The baclog concet relies on monitoring the information included in the header of each acet transmitted in the channel. This information, encoded in 6-bit long field Delta _ BL, reresents the number of acnowledgements that will be generated by receiver(s) as a result of acet recetion. Thus, Delta _ BL = 1 for unicast and 1 < Delta _ BL 63 for multicast messages.
4 The channel baclog BL is increased by Delta _ BL as a result of sending or successful receiving the message. Next, the baclog counter BL is decreased by one: (i) at the end of each successful acet cycle or (ii) if no node occuies the channel. If the collision detection is enabled, the baclog is increased by one in the case of collision. On a basis of the baclog counting algorithm we can conclude that after a successful transmission of the message, the baclog BL grows by ( Delta _ BL 1). Each node calculates the baclog autonomously basing on the baclog counter imlemented in the LonWors node firmware. To ee the consistency of baclog states, all nodes in the networ should modify their baclog counters in the same way. We assume that both Physical Layer and Lin Layer of rotocol do not introduce the baclog inconsistency, i.e. the channel might be assumed to be noise-free and all transceivers are able to detect collisions even if they are not senders of colliding acets. Then, the baclog is a global channel arameter. 3 System Modeling Following the definition, the saturated status of a networ is reached if each node has a acet to send. We assume that the networ consists of a fixed number of n nodes and the baclog consistency between the nodes is et. 3.1 Analytical Model of Channel Baclog Let BL n ( l) be a stochastic rocess reresenting the baclog stage at the lth acet cycle in a networ consisting of n nodes, where BL n ( l) = 1,..., 63. As it was stated, we assume that the rocess BL n ( l) is a global measure of the channel. BL n ( l) is the Marov chain with transition robabilities n i, j, i, j = 1,...,63. The first goal of our analysis is to find a stationary distribution of baclog π = [ π ], = 1,..., 63. Next, the saturation baclog BL is calculated as the exected baclog in the long term: BLmax BL = E[ BL ( l )] = π = 1 where E[ ] is the exectation oerator. The saturation window is defined as the mean size of the randomizing window in the saturation conditions: W = 16BL We assume the load scenario called ACK/unicast in short, where all the acets sent through the networ use the acnowledged service and unicast addressing. Thus, after each acet recetion, a receiving node generates a single acnowledgement. In such a scenario we distinguish three tyes of acet cycles (see Sect. 2.2): (1) an (2) (3)
5 unsuccessful transmission due to the collision, which causes the channel baclog BL to increase by one in the next acet cycle: BL ( l + 1) = BL ( l) + 1, (2) a successful transmission of the unicast message, when the channel baclog BL does not change: BL ( l + 1) = BL ( l), and (3) a successful transmission of the acnowledgement which decreases the baclog BL by one: BL ( l + 1) = BL ( l) 1. The ey assumtion in our model is that robabilities of the successful transmission of the acnowledgement and the message are the same. The validity of this assumtion will be checed in Sect. 5. According to this assumtion, if the robability ( of a collision at a certain baclog stage BL n ) ( l) = with n cometing nodes amounts to, then both the robabilities of a successful transmission of a message and an acnowledgement equal (1 ) 2. Suose that the baclog enters the stage at the lth acet cycle, i.e. ( BL n ) ( l) =. Let Pr { BL ( l + 1) = + s BL ( l) = } =, + s be the transition robability that the baclog enters the stage ( + s) in the (l+1)th acet cycle from the stage in the lth cycle. Taing the secification of the acet cycle tyes (1)-(3) into account and baclog limits we calculate the robabilities of switching between baclog stages:, 1 = Pr { BL ( l + 1) = + 1 BL ( l) = } + =, =1,..., 62 1, = Pr { BL ( l + 1) = BL ( l) = } = (1 ) 2, (1 + ) 2, = BL min = 2,...62 = BL 1 = Pr { BL ( l + 1) = 1 BL ( l) = } = (1 ) 2, = 2,..., 63 max = 1 = 63, + s = Pr { BL ( l + 1) = + s BL ( l) = } = 0, s > 1, = 1,..., 63 The diagram of the Marov chain for a given scenario is shown in Fig. 2. (1) coll 1 2 (1 (2) ) 2 (1 (2) coll (3) (61) coll (62) ) 2 (1 ) 2 (1 ) 2 (62) (63) (4) (1) 1 coll (1 (2) ) 2 (1 (62) Fig.2. The state transition diagram of the Marov chain for ACK/unicast scenario ) 2 (1 + (63) ) 2
6 3.2 Baclog Stationary Distribution In order to find the saturation baclog, the steady-state vector, or the stationary distribution π = [ π ], = 1,...,63 of the Marov chain has to be calculated. The stationary distribution π is an eigenvector of the transition matrix P, associated with the eigenvalue equal to one. The vector π = π ] includes the long-term robabilities [ π that the channel baclog will be at the stage in the steady state, that is: π = lim Pr{ BL( l) } (5) = l Using the direct method of the steady-state vector π linear equation has to be solved: i, j comutation, the following T [ G e] π = b (6) i, j where P = [ ] is a transition matrix 63 x 63; the elements are given by (4), G = P I, I is an identity matrix 63 x 63; e = e ] is a vector, where e i = 1 ; i = 1,...,63; [ G e] is 63 x 64 matrix, where the last column of this matrix is a vector e ; b = b ] is a vector, where b = 0, b + 1 = 1; i = 1,..., 63 [ i i i. [ i 3.3 Probabilities of Successful and Unsuccessful Transmission i, j In order to find we have to calculate, i.e. the robability that the transmission is in a collision if n nodes comete for the channel, and the current window consists of 16, = 1,...,63 time slots. To be recise, is the robability that more than one node selects the same time slot and all the other nodes choose later slots: n s = 1 ( ) (7) s where ( ) is the robability of a successful transmission for the window containing 16 time slots, i.e. the oosite event to collision occurrence. The robability n s ( ) describes the drawing when there is a single winner of a channel cometition and is exressed as the sum (according to all the 1,...,16 slots and 1,...,n nodes) of the following: (i) the robability that a winner selects a certain slot s = 1,..., 16 which equals 1 16, (ii) the robability that all the other ( n 1) nodes draw one from ( 16 s) later slots, which equals n 1 ((16 s) 16). Finally: s ( ) 16 n s = n s= (8)
7 Basing on the ditribution of the contention window π = π ], we can estimate the saturation robability of collision [ as the following exectation: BLmax 16 n 1 = = 1 16 s coll = 1 n π s (9) succ Hence,, the saturation robability of the successful transmission succ coll equals: = 1. 4 Saturation Channel Baclog and Probabilities Using the analytical aroach outlined in Sect. 3 we obtained the following results. The grahs resenting BL and vs. the number of nodes n for a secified load scenario (ACK/unicast) are shown in Fig. 3. Each oint on the saturation baclog grah is found as a solution of the linear system given by Eq. (6) for a articular number of nodes and the exectation (Eq. (2)). is calculated according to (9). Saturation channel baclog Saturation collision robability Saturation channel baclog Number of nodes Saturation collision robability [%] Fig.3. The saturation baclog and the saturation collision robability for ACK/unicast scenario At the lower range the saturation baclog increases almost linearly as the number of nodes grows and the sloe of the curve is about 0.06 er node. In articular, this means that adding a new node to the existing networ causes the increase of the saturation window by about 0.06*16 1 time slot of β 2 duration. For networs larger than about 700 nodes, the influence of the uer bound of the channel baclog revents a further extension of the cometition window. If a networ contains more than 1000 nodes, then the saturation baclog is close to its maximum value 63, and the redictive rotocol is reduced to the ersistent CSMA. Summing u, the rediction is effective for the networ sizes u to 700 nodes.
8 As regards the saturation collision robability, the robability grows in roortion to the number of nodes for a networ containing dozens of devices (Fig. 3). Next, becomes steady at 33,3 % for the networ sizes larger than 100 nodes. Thus, succ is et at 66,7 %. This is an imortant result for the redictive CSMA erformance. It shows that the rotocol manages to control the size of a cometition window in order to guarantee the sustained robability of successful transmission, which in the analyzed scenario equals 66,7%. The successful transmission sustained robability is the worst-case robability of successful transmission for the redictive CSMA if the rediction if effective, i.e. the current baclog is not limited by BL max = 63. Although, the effect of eeing the high throughut of the redictive CSMA has been nown [2,3,7], there has been no exlicit quantitative evaluation of sustained robability of successful/unsuccessful transmission. Note that sustained robabilities succ = 66,7% and = 33,3% are established at the equilibrium oint, when the robabilities of the baclog increase succ ( 2 ) and decrease are equal. Finally, for networs greater than 700 nodes, the influence of the maximum size of a cometition window aears, and the shae of both measures is close to that of ersistent CSMA. 5 Validation of Analytical Aroach In order to verify the analytical aroach we have erformed the simulations for a selected number of nodes in the networ saturation status. The simulation starts when the channel is idle. Next, the transient zone aears, when the nodes ermanently try to access the channel and the mean channel baclog grows, but does not reach the steady-state value. Since the simulation model belongs to non-terminating systems and the steady state theoretically is never reached, we detect it with a finite accuracy. The detection relies on the search of the constant value of the mean baclog rather than the constant value of the current baclog. Therefore, we used the moving averages defined on a window of observations (i.e. a certain number of acet cycles). Moving averages filter the higher frequency comonents in the mean baclog, arisen from the random behavior of the CSMA algorithm on the one hand, and remove also the influence of the transient zone on the estimation of the saturation baclog on the other. The saturation baclog is found under quasi steady-state conditions when the moving average of the channel baclog is et inside of 5% wide confidence interval. 5.1 Validation of Transition Probabilities The transition robabilities in the Marov model have been derived basing on the equality of the robabilities of the successful transmission of a message and an acnowledgement (see Sect. 3.1). This assumtion is true if the mean number of nodes having a message waiting for the transmission (i.e. message sources) equals the mean
9 number of nodes that ossesses an acnowledgement ready for sending (i.e. acnowledgement sources). Fig. 4 resents simulation results showing the mean relative number of message and acnowledgement sources in the networ steady state. It is clear that both numbers are equal to 50% with finite simulation accuracy. Percentage of acnowledgement and message sources [%] Mean relative number of sources of acnowledgements and messages Sources of messages Sources of acnowledgements Number of nodes Fig. 4. Simulation results of the mean relative number of message and acnowledgement sources in the steady state 5.2 Simulation versus analytical results The comarison of simulation and analytical results for the saturation baclog and the robability of collision and its exerimental equivalent (i.e. collision ercentage ' n ), is resented in Table 1. Since both results are very close to each other and the corresonding grahs overla, they are not shown in figures together. The comarison shows a good conformity of simulation and the Marov-based analytical aroach. The difference between both results stems from (i) the finite accuracy of the steady state detection in the simulation, (ii) the inaccuracy of the seudorandom generators, (iii) the finite recision of analytical calculations. Table 1. The comarison of analytical and simulation results for saturation baclog and saturation robability of collision for the ACK/unicast load scenario n BL (Marov model) BL (simulation) [%] (Marov model) ' ( n ) [%] (simulation) succ [%] (Marov model) ' ( n ) succ [%] (simulation) 2 1,128 1,124 5,56 5,77 94,44 94,23 6 1,390 1,387 13,12 13,68 86,88 86, ,663 1,661 17,49 17,98 82,51 82, ,9476 4,028 28,48 28,96 71,52 71, ,8567 8,889 31,15 31,97 68,75 68, ,634 42,160 32,89 33,3 67,11 67, ,194 61,428 42,53 42,72 57,47 57,28
10 6 Conclusions The aer resents the analytical study of the efficiency of networ load rediction built in the redictive -CSMA/CD that is used as a MAC rotocol in Lon- Wors/EIA-709 sensor/control networing technology. The aroach based on the Marov chains is alied. The rocedure of erformance analysis includes the definition of transition robabilities of the Marov chain for a secified load scenario, the calculation of stationary distribution of contention window, and the robabilities of successful/unsuccessful transmission. The analysis is exemlified on the load scenario where the acnowledged message service and unicast transactions are used. The resented results allow to recognize the redictability of the rotocol behavior in heavy load conditions. In articular, it is shown that the redictive -CSMA rotocol manages to control the size of a cometition window in order to guarantee the sustained robability of successful transmission. The simulative validation of analytical results is rovided. Further research should generalize the erformance analysis for general case load scenario. References 1. LonTal Protocol Secification, Version 3.0, Echelon Cororation (1995) 2. Enhanced Media Access Control with LonTal Protocol, LON Eng. Bull. (1995) 3. Miśowicz, M., Saor, M., Latawiec, W., Zych, M.: Performance analysis of redictive -ersistent CSMA rotocol for control networs. Proceedings of IEEE International Worsho on Factory Communication Systems WFCS'2002 (2002) Miśowicz, M.: Saturation erformance of redictive -CSMA without collision detection. Proceedings of IEEE International Conference on Emerging Technologies and Factory Automation ETFA'2005 (2005) Miśowicz M.: Send-on-delta concet: an event-based data reorting strategy. Sensors, Secial Issue: Wireless Sensor Networs and Platforms, Vol. 6 (2006) Buchholz, P., Plönnigs, J.: Analytical analysis of access-schemes of the CSMA tye. Proceedings of IEEE International Worsho on Factory Communication Systems WFCS'2004 (2004) Chen, X., Hong, G.-S.: A simulation study of the redictive -ersistent CSMA rotocol. Proceedings of 35th Annual Simulation Symosium (2002) Chen, X., Hong, G.-S.: Real-time erformance analysis of a fieldbus-based networ. Proceedings of Information, Decision and Control Conference (2002) Koetz, H.: Real-Time Systems. Design Princiles for Distributed Embedded Alications. Kluwer Academic Publications (1997) 10. Kleinroc, L., Tobagi, F. A.: Pacet switching in radio channels. I. Carrier sense multile-access modes and their throughut-delay characteristics, IEEE Transactions on Communications, Vol. COM-23, no. 12. (1975) Layer 7 LonMar Interoerability Guidelines, Version 3.2, LonMar (2002) 12. Neuron C Reference Guide, Echelon Cororation (1995)
Analysis of Mean Access Delay in Variable-Window CSMA
Sensors 007, 7, 3535-3559 sensors ISSN 44-80 007 by MDPI www.mdi.org/sensors Full Research Paer Analysis of Mean Access Delay in Variable-Window CSMA Marek Miśkowicz AGH University of Science and Technology,
More informationEXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER
YEDITEPE UNIVERSITY ENGINEERING & ARCHITECTURE FACULTY INDUSTRIAL ELECTRONICS LABORATORY EE 432 INDUSTRIAL ELECTRONICS EXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER Introduction:
More informationand assigned priority levels in accordance with the QoS requirements of their applications.
Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm Vasco Quintyne *, Adrian Als Deartment of Comuter Science, Physics and Mathematics University of the West Indies
More informationLAB IX. LOW FREQUENCY CHARACTERISTICS OF JFETS
LAB X. LOW FREQUENCY CHARACTERSTCS OF JFETS 1. OBJECTVE n this lab, you will study the -V characteristics and small-signal model of Junction Field Effect Transistors (JFET).. OVERVEW n this lab, we will
More informationServo Mechanism Technique based Anti-Reset Windup PI Controller for Pressure Process Station
Indian Journal of Science and Technology, Vol 9(11), DOI: 10.17485/ijst/2016/v9i11/89298, March 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Servo Mechanism Technique based Anti-Reset Windu
More informationDelivery Delay Analysis of Network Coded Wireless Broadcast Schemes
22 IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes Amy Fu and Parastoo Sadeghi The Australian National
More informationEconomics of Strategy (ECON 4550) Maymester 2015 Foundations of Game Theory
Economics of Strategy (ECON 4550) Maymester 05 Foundations of Game Theory Reading: Game Theory (ECON 4550 Courseak, Page 95) Definitions and Concets: Game Theory study of decision making settings in which
More informationPerformance Analysis of Battery Power Management Schemes in Wireless Mobile. Devices
Performance Analysis of Battery Power Management Schemes in Wireless Mobile Devices Balakrishna J Prabhu, A Chockalingam and Vinod Sharma Det of ECE, Indian Institute of Science, Bangalore, INDIA Abstract
More informationOptimal p-persistent MAC algorithm for event-driven Wireless Sensor Networks
Otimal -ersistent MAC algorithm for event-driven Wireless Sensor Networks J. Vales-Alonso,E.Egea-Lóez, M. V. Bueno-Delgado, J. L. Sieiro-Lomba, J. García-Haro Deartment of Information Technologies and
More informationEfficient Importance Sampling for Monte Carlo Simulation of Multicast Networks
Efficient Imortance Samling for Monte Carlo Simulation of Multicast Networks P. Lassila, J. Karvo and J. Virtamo Laboratory of Telecommunications Technology Helsinki University of Technology P.O.Box 3000,
More informationPerformance Analysis of 100 Mbps PACE Technology Ethernet Networks
Reprint erformance Analysis of Mbps ACE Technology Ethernet Networs A. antazi and T. Antonaopoulos The th EEE Symposium on Computers and Communications-SCC TUNSA, ULY Copyright Notice: This material is
More informationRandom Access Compressed Sensing in Underwater Sensor Networks
Random Access Comressed Sensing in Underwater Sensor Networks Fatemeh Fazel Northeastern University Boston, MA 2115 Email: ffazel@ece.neu.edu Maryam Fazel University of Washington Seattle, WA 98195 Email:
More informationINTERNET PID CONTROLLER DESIGN: M. Schlegel, M. Čech
INTERNET PID CONTROLLER DESIGN: WWW.PIDLAB.COM M. Schlegel, M. Čech Deartment of Cybernetics, University of West Bohemia in Pilsen fax : + 0403776350, e-mail : schlegel@kky.zcu.cz, mcech@kky.zcu.cz Abstract:
More informationDesign of PID Controller Based on an Expert System
International Journal of Comuter, Consumer and Control (IJ3C), Vol. 3, No.1 (014) 31 Design of PID Controller Based on an Exert System Wei Li Abstract For the instability of traditional control systems,
More informationPERFORMANCE IMPROVEMENT OF MANETS
PERFORMANCE IMPROVEMENT OF MANETS WITH LINK LIFETIME Merlinda Drini, Queensborough Community College/CUNY; Tare Saadawi, City College of New Yor Abstract There are many different factors in the hysical
More informationChapter 7 Local Navigation: Obstacle Avoidance
Chater 7 Local Navigation: Obstacle Avoidance A mobile robot must navigate from one oint to another in its environment. This can be a simle task, for examle, if a robot can follow an unobstructed line
More informationCircular Dynamic Stereo and Its Image Processing
Circular Dynamic Stereo and Its Image Processing Kikuhito KAWASUE *1 and Yuichiro Oya *2 *1 Deartment of Mechanical Systems Engineering Miyazaki University 1-1, Gakuen Kibanadai Nishi, Miyazaki 889-2192
More informationProperties of Mobile Tactical Radio Networks on VHF Bands
Proerties of Mobile Tactical Radio Networks on VHF Bands Li Li, Phil Vigneron Communications Research Centre Canada Ottawa, Canada li.li@crc.gc.ca / hil.vigneron@crc.gc.ca ABSTRACT This work extends a
More informationPerformance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional Spread-Spectrum Systems
I TRANSACTIONS ON CIRCUITS AND SYTMS I: FUNDAMNTAL THORY AND APPLICATIONS, VOL. 50, NO., NOVMBR 2003 475 Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional
More informationApplication Note D. Dynamic Torque Measurement
Page 1 of 9 Alication Note 221101D Dynamic Torque Measurement Background Rotary ower sources and absorbers have discrete oles and/or istons and/or gear meshes, etc. As a result, they develo and absorb
More informationThe Optimization Model and Algorithm for Train Connection at Transfer Stations in Urban Rail Transit Network
Send Orders for Rerints to rerints@benthamscienceae 690 The Oen Cybernetics & Systemics Journal, 05, 9, 690-698 Oen Access The Otimization Model and Algorithm for Train Connection at Transfer Stations
More informationHigh resolution radar signal detection based on feature analysis
Available online www.jocr.com Journal of Chemical and Pharmaceutical Research, 4, 6(6):73-77 Research Article ISSN : 975-7384 CODEN(USA) : JCPRC5 High resolution radar signal detection based on feature
More informationInfluence of Earth Conductivity and Permittivity Frequency Dependence in Electromagnetic Transient Phenomena
Influence of Earth Conductivity and Permittivity Frequency Deendence in Electromagnetic Transient Phenomena C. M. Portela M. C. Tavares J. Pissolato ortelac@ism.com.br cristina@sel.eesc.sc.us.br isso@dt.fee.unicam.br
More informationMathematical and Computer Modelling. On the characterization of Aloha in underwater wireless networks
Mathematical and Comuter Modelling 53 (2011) 2093 2107 Contents lists available at ScienceDirect Mathematical and Comuter Modelling journal homeage: www.elsevier.com/locate/mcm On the characterization
More informationOptimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm
o Otimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm Nirvana S. Antonio, Cícero F. F. Costa Filho, Marly G. F. Costa, Rafael Padilla Abstract In 4-sided dominoes,
More informationApplication of Notch Filtering under Low Sampling Rate for Broken Rotor Bar Detection with DTFT and AR based Spectrum Methods
Alication of Notch Filtering under Low Samling Rate for Broken Rotor Bar Detection with DTFT and AR based Sectrum Methods B. Ayhan H. J. Trussell M.-Y. Chow M.-H. Song IEEE Student Member IEEE Fellow IEEE
More informationThere are two basic types of FET s: The junction field effect transistor or JFET the metal oxide FET or MOSFET.
Page 61 Field Effect Transistors The Fieldeffect transistor (FET) We know that the biolar junction transistor or BJT is a current controlled device. The FET or field effect transistor is a voltage controlled
More informationEvolutionary Circuit Design: Information Theory Perspective on Signal Propagation
Evolutionary Circuit Design: Theory Persective on Signal Proagation Denis Poel Deartment of Comuter Science, Baker University, P.O. 65, Baldwin City, KS 66006, E-mail: oel@ieee.org Nawar Hakeem Deartment
More informationUplink Scheduling in Wireless Networks with Successive Interference Cancellation
1 Ulink Scheduling in Wireless Networks with Successive Interference Cancellation Majid Ghaderi, Member, IEEE, and Mohsen Mollanoori, Student Member, IEEE, Abstract In this aer, we study the roblem of
More informationSelf-Driven Phase Shifted Full Bridge Converter for Telecom Applications
Self-Driven Phase Shifted Full Bridge Converter for Telecom Alications SEVILAY CETIN Technology Faculty Pamukkale University 7 Kinikli Denizli TURKEY scetin@au.edu.tr Abstract: - For medium ower alications,
More informationAn Overview of Substrate Noise Reduction Techniques
An Overview of Substrate Noise Reduction Techniques Shahab Ardalan, and Manoj Sachdev ardalan@ieee.org, msachdev@ece.uwaterloo.ca Deartment of Electrical and Comuter Engineering University of Waterloo
More informationAnalysis of Pseudorange-Based DGPS after Multipath Mitigation
International Journal of Scientific and Research Publications, Volume 7, Issue 11, November 2017 77 Analysis of Pseudorange-Based DGPS after Multiath Mitigation ThilanthaDammalage Deartment of Remote Sensing
More informationDetecting Content Adaptive Scaling of Images for Forensic Applications
Detecting Content Adative Scaling of Images for Forensic Alications Claude Fillion 1,2, Gaurav Sharma 1,3 1 Deartment of Electrical and Comuter Engineering, University of Rochester, Rochester, NY 2 Xerox
More informationA Genetic Algorithm Approach for Sensorless Speed Estimation by using Rotor Slot Harmonics
A Genetic Algorithm Aroach for Sensorless Seed Estimation by using Rotor Slot Harmonics Hayri Arabaci Abstract In this aer a sensorless seed estimation method with genetic algorithm for squirrel cage induction
More informationTransmitter Antenna Diversity and Adaptive Signaling Using Long Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1
Transmitter Antenna Diversity and Adative Signaling Using ong Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1 Shengquan Hu, Tugay Eyceoz, Alexandra Duel-Hallen North Carolina State University
More informationJoint Tx/Rx Energy-Efficient Scheduling in Multi-Radio Networks: A Divide-and-Conquer Approach
Joint Tx/Rx Energy-Efficient Scheduling in Multi-Radio Networs: A Divide-and-Conquer Aroach Qingqing Wu, Meixia Tao, and Wen Chen Deartment of Electronic Engineering, Shanghai Jiao Tong University, Shanghai,
More informationPerformance Analysis of MIMO System using Space Division Multiplexing Algorithms
Performance Analysis of MIMO System using Sace Division Multilexing Algorithms Dr.C.Poongodi 1, Dr D Deea, M. Renuga Devi 3 and N Sasireka 3 1, Professor, Deartment of ECE 3 Assistant Professor, Deartment
More informationInitial Ranging for WiMAX (802.16e) OFDMA
Initial Ranging for WiMAX (80.16e) OFDMA Hisham A. Mahmoud, Huseyin Arslan Mehmet Kemal Ozdemir Electrical Engineering Det., Univ. of South Florida Logus Broadband Wireless Solutions 40 E. Fowler Ave.,
More informationUltra Wideband System Performance Studies in AWGN Channel with Intentional Interference
Ultra Wideband System Performance Studies in AWGN Channel with Intentional Interference Matti Hämäläinen, Raffaello Tesi, Veikko Hovinen, Niina Laine, Jari Iinatti Centre for Wireless Communications, University
More informationModeling of power autotransformer
Modeling of ower autotransformer VLADMÍR VOLČKO, ŽAETA ELEHOVÁ, ATO BELÁŇ, PETER JAGA, DOMK VGLAŠ, MROLAVA MTKOVÁ Deartment of Electrical Power Engineering lovak niversity of Technology in Bratislava lkovičova,
More informationState-of-the-Art Verification of the Hard Driven GTO Inverter Development for a 100 MVA Intertie
State-of-the-Art Verification of the Hard Driven GTO Inverter Develoment for a 100 MVA Intertie P. K. Steimer, H. Grüning, J. Werninger R&D Drives and Power Electronics ABB Industrie AG CH-5300 Turgi,
More informationControl of Grid Integrated Voltage Source Converters under Unbalanced Conditions
Jon Are Suul Control of Grid Integrated Voltage Source Converters under Unbalanced Conditions Develoment of an On-line Frequency-adative Virtual Flux-based Aroach Thesis for the degree of Philosohiae Doctor
More informationFOUNTAIN codes [1], [2] have been introduced to achieve
Controlled Flooding of Fountain Codes Waqas bin Abbas, Paolo Casari, Senior Member, IEEE, Michele Zorzi, Fellow, IEEE Abstract We consider a multiho network where a source node must reliably deliver a
More informationOrigins of Stator Current Spectra in DFIGs with Winding Faults and Excitation Asymmetries
Origins of Stator Current Sectra in DFIGs with Wing Faults and Excitation Asymmetries S. Williamson * and S. Djurović * University of Surrey, Guildford, Surrey GU2 7XH, United Kingdom School of Electrical
More informationTHE USE OF INSULATED WIRES MILLIKEN CONDUCTORS IN HIGH VOLTAGE POWER TRANSMISSION UNDERGROUND AC LINES. x y s ABSTRACT
THE USE OF INSULATED WIRES MILLIKEN CONDUCTORS IN HIGH VOLTAGE POWER TRANSMISSION UNDERGROUND AC LINES David DUBOIS, NEXANS, (France), david.dubois@nexans.com Pierre MIREBEAU, NEXANS, (France), ierre.mirebeau@nexans.com
More informationTO IMPROVE BIT ERROR RATE OF TURBO CODED OFDM TRANSMISSION OVER NOISY CHANNEL
TO IMPROVE BIT ERROR RATE OF TURBO CODED TRANSMISSION OVER NOISY CHANNEL 1 M. K. GUPTA, 2 VISHWAS SHARMA. 1 Deartment of Electronic Instrumentation and Control Engineering, Jagannath Guta Institute of
More informationUniversity of Twente
University of Twente Faculty of Electrical Engineering, Mathematics & Comuter Science Design of an audio ower amlifier with a notch in the outut imedance Remco Twelkemeijer MSc. Thesis May 008 Suervisors:
More informationEntropy Coding. Outline. Entropy. Definitions. log. A = {a, b, c, d, e}
Outline efinition of ntroy Three ntroy coding techniques: Huffman coding rithmetic coding Lemel-Ziv coding ntroy oding (taken from the Technion) ntroy ntroy of a set of elements e,,e n with robabilities,
More informationA Multi-View Nonlinear Active Shape Model Using Kernel PCA
A Multi-View Nonlinear Active Shae Model Using Kernel PCA Sami Romdhani y, Shaogang Gong z and Alexandra Psarrou y y Harrow School of Comuter Science, University of Westminster, Harrow HA1 3TP, UK [rodhams
More informationA Game Theoretic Analysis of Distributed Power Control for Spread Spectrum Ad Hoc Networks
A Game Theoretic Analysis of Distributed ower Control for Sread Sectrum Ad Hoc Networs Jianwei Huang, Randall A. Berry, Michael L. Honig Deartment of Electrical & Comuter Engineering, Northwestern University,
More informationRandom Access Compressed Sensing for Energy-Efficient Underwater Sensor Networks
Random Access Comressed Sensing for Energy-Efficient Underwater Sensor Networks Fatemeh Fazel, Maryam Fazel and Milica Stojanovic Abstract Insired by the theory of comressed sensing and emloying random
More informationMatching Book-Spine Images for Library Shelf-Reading Process Automation
4th IEEE Conference on Automation Science and Engineering Key Bridge Marriott, Washington DC, USA August 23-26, 2008 Matching Book-Sine Images for Library Shelf-Reading Process Automation D. J. Lee, Senior
More informationReliability and Criticality Analysis of Communication Networks by Stochastic Computation
> EPLACE HIS LINE WIH YOU PAPE IDENIFICAION NUMBE (DOUBLE-CLICK HEE O EDI) < 1 eliability and Criticality Analysis of Communication Networks by Stochastic Comutation Peican Zhu, Jie Han, Yangming Guo and
More informationMulti-period Channel Assignment
Multi-eriod Channel Assignment Hakim Mabed, Alexandre Caminada and Jin-Kao Hao 2 France Télécom R&D, 6 Avenue des Usines, BP 382, 97 Belfort, France {hakim.mabed,alexandre.caminada}@francetelecm.com Tel:
More informationDynamic Gambling under Loss Aversion
Dynamic Gambling under Loss Aversion Yair Antler University of Essex November 22, 2017 Abstract A loss-averse gambler faces an infinite sequence of identical unfair lotteries and decides in which of these
More informationThe Impact of Random Waypoint Mobility on Infrastructure Wireless Networks
The Imact of Random Wayoint Mobility on Infrastructure Wireless Networks Dennis Pong and Tim Moors School of Electrical Engineering and Telecommunications The University of New South Wales, NSW 5 Australia
More informationUnderwater acoustic channel model and variations due to changes in node and buoy positions
Volume 24 htt://acousticalsociety.org/ 5th Pacific Rim Underwater Acoustics Conference Vladivostok, Russia 23-26 Setember 2015 Underwater acoustic channel model and variations due to changes in node and
More informationAdaptive Packet Level Redundancy Mechanisms for Reliable Mobile Multicast: Proposed Architecture and Performance Analysis
Adative Pacet Level edundanc echanisms for eliable obile ulticast: Proosed Architecture and Performance Analsis Prawit Chumchu *, **, and Aruna Seneviratne** ember, IEEE *Det. of Telecommunications Engineering
More informationPostprocessed time-delay interferometry for LISA
PHYSICAL REVIEW D, VOLUME 70, 081101(R) Postrocessed time-delay interferometry for LISA D. A. Shaddock,* B. Ware, R. E. Sero, and M. Vallisneri Jet Proulsion Laboratory, California Institute of Technology,
More information802.11b White Paper. Table of Contents. VOCAL Technologies, Ltd. Home page
VOCAL Technologies, Ltd. Home age 802.b White Paer Table of Contents Page. 802.b Glossary... 2 2. Introduction to 802.b... 3 3. 802.b Overview... 6 4. CCK used in 802.b... 7 5. Walsh and Comlementary Codes
More informationA Novel Image Component Transmission Approach to Improve Image Quality and Energy Efficiency in Wireless Sensor Networks
Journal of Comuter Science 3 (5: 353-360, 2007 ISSN 1549-3636 2007 Science Publications A Novel Image Comonent Transmission Aroach to Imrove Image Quality and nergy fficiency in Wireless Sensor Networks
More informationA Novel, Robust DSP-Based Indirect Rotor Position Estimation for Permanent Magnet AC Motors Without Rotor Saliency
IEEE TANSACTIONS ON POWE EECTONICS, VO. 18, NO. 2, MACH 2003 539 A Novel, obust DSP-Based Indirect otor Position Estimation for Permanent Magnet AC Motors Without otor Saliency i Ying and Nesimi Ertugrul,
More informationAn Alternative Single Parameter Functional Form for Lorenz Curve
Crawford School of Public Policy Crawford School working aers An Alternative Single Parameter Functional Form for Lorenz Curve Crawford School Working Paer 7 Setember 07 Satya Paul Amrita University, India
More informationAdaptive Switching between Spatial Diversity and Multiplexing: a Cross-layer Approach
Adative Switching between Satial Diversity and ultilexing: a Cross-layer Aroach José Lóez Vicario and Carles Antón-Haro Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) c/ Gran Caità -4, 08034
More informationFull Bridge Single Stage Electronic Ballast for a 250 W High Pressure Sodium Lamp
Full Bridge Single Stage Electronic Ballast for a 50 W High Pressure Sodium am Abstract In this aer will be reorted the study and imlementation of a single stage High Power Factor (HPF) electronic ballast
More informationInvestigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation
International Journal Of Comutational Engineering Research (ijceronline.com) Vol. 2 Issue. Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation Rajbir Kaur 1, Charanjit
More informationAn Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ
An Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ Rong Lin y Koji Nakano z Stehan Olariu x Albert Y. Zomaya Abstract We roose an efficient reconfigurable arallel refix counting
More informationMulti-TOA Based Position Estimation for IR-UWB
Multi-TOA Based Position Estimation for IR-UWB Genís Floriach, Montse Nájar and Monica Navarro Deartment of Signal Theory and Communications Universitat Politècnica de Catalunya (UPC), Barcelona, Sain
More informationSPACE-FREQUENCY CODED OFDM FOR UNDERWATER ACOUSTIC COMMUNICATIONS
SPACE-FREQUENCY CODED OFDM FOR UNDERWATER ACOUSTIC COMMUNICATIONS E. V. Zorita and M. Stojanovic MITSG 12-35 Sea Grant College Program Massachusetts Institute of Technology Cambridge, Massachusetts 02139
More informationCalculation of the Duty Cycle for BECA
Volume 2 No.4, July 205 Calculation of the uty Cycle for BECA Chiranjib atra Calcutta Institute of Engineering and Mangement, Kolata Sourish Mullic Calcutta Institute of Engineering and Mangement, Kolata
More informationChapter 7: Passive Filters
EETOMAGNETI OMPATIBIITY HANDBOOK 1 hater 7: Passive Filters 7.1 eeat the analytical analysis given in this chater for the low-ass filter for an filter in shunt with the load. The and for this filter are
More informationAntenna Selection Scheme for Wireless Channels Utilizing Differential Space-Time Modulation
Antenna Selection Scheme for Wireless Channels Utilizing Differential Sace-Time Modulation Le Chung Tran and Tadeusz A. Wysocki School of Electrical, Comuter and Telecommunications Engineering Wollongong
More informationResearch and concepts Inertial tolerancing
Research and concets Inertial tolerancing The author is a Professor in the Deartment of Industrial Engineering at the Université de Savoie, Annecy le Vieux, France Keywords Taguchi methods, Statistical
More informationA Pricing-Based Cooperative Spectrum Sharing Stackelberg Game
A Pricing-Based Cooerative Sectrum Sharing Stackelberg Game Ramy E. Ali, Karim G. Seddik, Mohammed Nafie, and Fadel F. Digham? Wireless Intelligent Networks Center (WINC), Nile University, Smart Village,
More informationTHE HELMHOLTZ RESONATOR TREE
THE HELMHOLTZ RESONATOR TREE Rafael C. D. Paiva and Vesa Välimäki Deartment of Signal Processing and Acoustics Aalto University, School of Electrical Engineering Esoo, Finland rafael.dias.de.aiva@aalto.fi
More informationA New Method for Design of Robust Digital Circuits
A New Method for Design of Robust Digital Circuits Dinesh Patil, Sunghee Yun, Seung-Jean Kim, Alvin Cheung, Mark Horowitz and Stehen oyd Deartment of Electrical Engineering, Stanford University, Stanford,
More informationA toy-model for the regulation of cognitive radios
A toy-model for the regulation of cognitive radios Kristen Woyach and Anant Sahai Wireless Foundations Deartment of EECS University of California at Berkeley Email: {kwoyach, sahai}@eecs.berkeley.edu Abstract
More informationA Printed, Broadband Luneburg Lens Antenna
IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. 58, NO. 9, SEPTEMBER 010 3055 A Printed, Broadband Luneburg Lens Antenna Carl Pfeiffer and Anthony Grbic Abstract The design of a D broadband, Luneburg
More informationThe Gini Coefficient: An Application to Greece
International Journal of Economics and Finance; Vol. 10, No. 3; 2018 ISSN 1916-971X E-ISSN 1916-9728 Published by Canadian Center of Science and Education The Gini Coefficient: An Alication to Greece Augustine
More informationAn Overview of PAPR Reduction Optimization Algorithm for MC-CDMA System
RESEARCH ARTICLE OPEN ACCESS An Overview of PAPR Reduction Otimization Algorithm for MC-CDMA System Kanchan Singla*, Rajbir Kaur**, Gagandee Kaur*** *(Deartment of Electronics and Communication, Punjabi
More informationA Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast
ISSN 746-7659, England, U Journal of Information and Computing Science Vol. 4, No., 9, pp. 4-3 A Random Networ Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast in Yang,, +, Gang
More informationPerformance Analysis of the IEEE n Block-ACK Mechanism in an Error-Prone Channel Xue-ping CHEN, Wen-da LI and Hong-yuan CHEN*
2016 International Conerence on ustainable nergy, nvironment and Inormation ngineering (I 2016) IBN: 978-1-60595-337-3 Perormance Analysis o the I 802.11n Block- Mechanism in an rror-prone Channel Xue-ing
More informationRevisiting Weighted Stego-Image Steganalysis
Revisiting Weighted Stego-Image Steganalysis Andrew D. Ker a and Rainer Böhme b a Oxford University Comuting Laboratory, Parks Road, Oxford OX 3QD, England; b Technische Universität Dresden, Institute
More informationRECOMMENDATION ITU-R SF
Rec. ITU-R SF.1649-1 1 RECOMMENDATION ITU-R SF.1649-1 Guidance for determination of interference from earth stations on board vessels to stations in the fixed service when the earth station on board vessels
More informationParameter Controlled by Contrast Enhancement Using Color Image
Parameter Controlled by Contrast Enhancement Using Color Image Raguathi.S and Santhi.K Abstract -The arameter-controlled virtual histogram distribution (PCVHD) method is roosed in this roject to enhance
More informationThe Use of Helmholtz Resonance for Measuring the Volume of Liquids and Solids
Sensors 2010, 10, 10663-10672; doi:10.3390/s101210663 OPEN ACCESS sensors ISSN 1424-8220 www.mdi.com/journal/sensors Article The Use of Helmholtz Resonance for Measuring the Volume of Liquids and Solids
More informationCOMPARISON OF DIFFERENT CDGPS SOLUTIONS FOR ON-THE-FLY INTEGER AMBIGUITY RESOLUTION IN LONG BASELINE LEO FORMATIONS
COMPARISON OF DIFFERENT CDGPS SOLUTIONS FOR ON-THE-FLY INTEGER AMBIGUITY RESOLUTION IN LONG BASELINE LEO FORMATIONS Urbano Tancredi (1), Alfredo Renga (2), and Michele Grassi (3) (1) Deartment for Technologies,
More informationComparison of image-based functional monitoring through resampling and compression Steven J. Simske, Margaret Sturgill, Jason S.
Comarison of image-based functional monitoring through resamling and comression Steven J. Simse, Margaret Sturgill, Jason S. Aronoff HP Laboratories HPL-2009-145 Keyword(s): Image forensics, counterfeit
More informationElectronic Ballast with Wide Dimming Range: Matlab-Simulink Implementation of a Double Exponential Fluorescent-Lamp Model
Electronic Ballast with Wide Dimming ange: Matlab-Simulink Imlementation of a Double Exonential Fluorescent-Lam Model Marina Perdigão and E. S. Saraiva Deartamento de Engenharia Electrotécnica Instituto
More informationIMPROVED POLYNOMIAL TRANSITION REGIONS ALGORITHM FOR ALIAS-SUPPRESSED SIGNAL SYNTHESIS
IMPROVED POLYNOMIAL TRANSITION REGIONS ALGORITHM FOR ALIAS-SUPPRESSED SIGNAL SYNTHESIS Dániel Ambrits and Balázs Bank Budaest University of Technology and Economics, Det. of Measurement and Information
More informationCHAPTER 5 INTERNAL MODEL CONTROL STRATEGY. The Internal Model Control (IMC) based approach for PID controller
CHAPTER 5 INTERNAL MODEL CONTROL STRATEGY 5. INTRODUCTION The Internal Model Control (IMC) based aroach for PID controller design can be used to control alications in industries. It is because, for ractical
More informationSoftware for Modeling Estimated Respiratory Waveform
Software for Modeling Estimated Resiratory Waveform Aleksei E. Zhdanov, Leonid G. Dorosinsky Abstract In the imaging of chest or abdomen, motion artifact is an unavoidable roblem. In the radiation treatment,
More informationThe online muon identification with the ATLAS experiment at the LHC
32 he online muon identification with the ALAS exeriment at the LHC Abstract he Large Hadron Collider (LHC) at CERN is a roton-roton collider roviding the highest energy and the highest instantaneous luminosity
More informationLaboratory Essay with Online Back-calculation Anti-windup Scheme for a MTG System
PID' Brescia (Italy), March 8-, WeB. Laboratory Essay with Online Back-calculation Anti-windu Scheme for a MTG System Antônio M. S. Neto, Thaise P. Damo, Antonio A. R. Coelho Federal University of Santa
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationTechnical and Economic Feasibility of Passive Shielding Used to Mitigate Power Lines Magnetic Fields
Technical and Economic Feasibility of Passive Shielding Used to Mitigate Power Lines Magnetic Fields AHMED R. SAYED, HUSSEIN I. ANIS Electrical Power and Machine Deartment Cairo University Giza EGYPT eng_ahmed.rabee@eng.cu.edu.eg,
More informationUsable speech detection using a context dependent Gaussian mixture model classifier
From the SelectedWorks of Ananth N Iyer May, 2004 Usable seech detection using a context deendent Gaussian mixture model classifier Robert E Yantorno, Temle University Brett Y Smolenski Ananth N Iyer Jashmin
More informationNonlinear MSM Photodetector Model for High Resolution Laser Impulse Radar Imaging
Nonlinear MSM Photodetector Model for High Resolution Laser Imulse Radar Imaging M. DJEBARI *, M. BENSEBTI *, A. ANOU *, M. MEHDI * AND G. KOMPA ** * Deartment of electronic University Saad Dahlab of Blida
More informationA new approach to bit error rate reduction and its impact on telecom performance
Journal of Scientific AHUJA & Industrial & CHAKKA: ResearchA NEW APPROACH TO BIT ERROR RATE REDUCTION ON TELECOM Vol. 72, March 23,. 49-59 49 A new aroach to bit error rate reduction and its imact on telecom
More informationApproximated fast estimator for the shape parameter of generalized Gaussian distribution for a small sample size
BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES, Vol. 63, No. 2, 2015 DOI: 10.1515/basts-2015-0046 Aroximated fast estimator for the shae arameter of generalized Gaussian distribution for
More information