Prediction Efficiency in Predictive p-csma/cd

Size: px
Start display at page:

Download "Prediction Efficiency in Predictive p-csma/cd"

Transcription

1 Prediction Efficiency in Predictive -CSMA/CD Mare Miśowicz AGH University of Science and Technology, Deartment of Electronics al. Miciewicza 30, Kraów, Poland Abstract. Predictive -ersistent CSMA rotocol is an imortant MAC solution develoed for networed sensor/control alications and used in Local Oerating Networs (LonWors) technology. The rotocol uses a built-in networ load rediction to suort collision avoidance. The aer resents an analytical study of rediction efficiency for a channel with collision detection. The aroach based on Marov chains is alied. The rocedure of erformance analysis includes the definition of transition robabilities of Marov chain for a secified load scenario, calculation of stationary distribution of contention window, and the robabilities of successful/unsuccessful transmission. It is shown that the redictive -CSMA rotocol manages to control the size of a cometition window in order to guarantee the sustained robability of a successful transmission. The simulative validation of analytical results is rovided. Keywords: MAC rotocols, sensor networs, erformance analysis, Marov chains. 1 Introduction Predictive -ersistent CSMA rotocol is the heart of LonTal/EIA rotocol used for communication between smart devices in Local Oerating Networs (LON, LonWors). LON has become a classic solution in building automation, and home networing, but is also used in a wide range of alications including, among others, semiconductor manufacturing, etrochemical industry, and wastewater treatment. In the redictive -CSMA the collision avoidance is alied for resolving uncoordinated access to the networ. In order to coe with overload situations, the redictive -ersistent CSMA has been designed as an adative version of ure -CSMA. In -ersistent CSMA, a node transmits with a fixed robability if the channel is idle, and defers the transmission with the robability (1-), when the channel is busy [10]. In the redictive -CSMA, the robability is variable and dynamically adjusted to exected traffic load using bacoff scheme. The advantage of the redictive -CSMA erformance is the throughut otimization, which consists in eeing a high throughut even if a networ is overloaded. Consequently, although the redictive -CSMA is a random access scheme, LonWors networs offer guaranteed bandwidth regardless of the offered traffic rate [3]. Under light traffic load, the redictive CSMA is reduced to the ure ersistent CSMA regardless of the structure of the traffic in a channel [3]. However, the destiny of rotocol oeration is to coe with high traffic corresonding to the

2 maximum load of a networ. This is when a user derives benefits from load rediction built in the rotocol. Indeed, transient overload situations occur in LonWors networed systems since the LON architecture is event-triggered and data are transmitted in resonse to external events [11,12]. The send-on-delta concet rather than the uniform samling is a natural sensor reorting aradigm in event-triggered alications [5,11]. Thus, the traffic in the channel is non-uniform and might be bursty. Moreover, the event-triggered architecture is rone to event showers, i.e. burst of correlated events, often released by a single hysical event that causes congestion of the system [9]. Such an effect occurs, e.g. when a fire is detected in a building by a number of redundant temerature and smoe sensors which begin to reort the event. The resent study addresses the issue of the asymtotic characteristics of redictive CSMA and the efficiency of rotocol redictability. Both roblems have not been quantitatively dislayed in the scientific literature. To recognize ability of the rotocol to coe with congestion, the channel must be stimulated by heavy load. We choose the saturation conditions for the rotocol analysis where each node has always a acet to send. The saturation condition reresents the largest ossible load offered to the networ by a given number of nodes, and constitutes the worst-case channel load. It is intuitively comrehensible that due to the negative feedbac, the size of the contention window grows with the number of cometing nodes. However, there is still no answer to the questions what is the relationshi between the mean size of cometition window and the number of nodes trying to access the channel. Several aers deal with the erformance analysis of redictive -ersistent CSMA rotocol [1-4, 6-8]. Main benefits of the redictive -CSMA scheme have been dislayed in [2]. Simulation analyses have been carried out in [3,7]. Analytical aroaches are resented in [6,8]. The former is the first comlex analysis of the redictive -CSMA based on the queuing theory. The latter follows a classical aroach develoed for the -CSMA in 70s [10]. The saturation throughut analysis for the redictive -CSMA without collision detection is resented in [4]. The resent study deals with the redictive -CSMA with collision detection, i.e. the redictive -CSMA/CD. With the collision detection the rotocol behavior is quite different from the one when a detection is absent since the contention window increase due to collisions is activated. Load scenario, where the acnowledged service (ACK) is used and all the transactions are unicast, is assumed. The aer is organized as follows. In Sect. 2, we resent the rotocol secification and the baclog counting rinciles. In Sect. 3, the framewor of the analytical aroach is described. Sect. 4 resents the analysis of results for the saturation erformance. In Sect. 5, the simulative validation of the analytical results is given. 2 Protocol Secification The LonTal/EIA acet cycle consists of two hases (Fig. 1). The first hase is otional and dedicated to riority messages. During the other hase nodes randomize their access to the medium. Since the goal of our analysis is the redictive - CSMA, we assume that there are no riority slots in the acet cycle.

3 2.1 LonTal/EIA Pacet Cycle The redictive -CSMA belongs to the slotted-csma algorithms where the time axis is slit into segments called slots with the duration equal to β 2. β β 1 2 Pacet Fig. 1. LonTal acet cycle Priority slots (0-127) Randomizing window ( slots) Pacet The algorithm oerates in the following way. A node attemting to transmit monitors the state of the channel. If the channel is busy the node continues sensing. When the node detects no transmission during the β 1 eriod, it delays a random number of time slots of β 2 duration. If the channel is still idle when the random delay exires, the node transmits. Otherwise, the node receives an incoming acet and cometes for the channel access again. If more than one node choose the same slot, and when that slot is the earliest one among the slots selected by all the contending nodes, then a collision haens. All the acets involved in a collision are corruted. The time by which the cometing node defers the transmission is exressed as a seudorandom number of time slots β 2 drawn from the uniform distribution between 0 and W, where W is the size of the randomizing (cometition) window. The size of the randomizing window is dynamically adjusted to the current channel load. If the channel is idle, the randomizing window consists of 16 time slots. When the channel load increases, the number of slots grows by factor BL, called the estimated channel baclog. The baclog BL can range from 1 to 63 and the size of the window varies from 16 to 1008 time slots since the following relationshi is met: W = BL (1) W base where W base is the size of the basic randomizing window (16 slots). Thus, the level of the ersistence of the redictive -CSMA has either the lower (1/16=0.0625), or the uer bound (1/1008=0.0009). 2.2 Baclog Switching Rules The baclog estimation is based on the calculation of the number of acets exected in the cometition for the channel during the next acet cycle [1]. The baclog concet relies on monitoring the information included in the header of each acet transmitted in the channel. This information, encoded in 6-bit long field Delta _ BL, reresents the number of acnowledgements that will be generated by receiver(s) as a result of acet recetion. Thus, Delta _ BL = 1 for unicast and 1 < Delta _ BL 63 for multicast messages.

4 The channel baclog BL is increased by Delta _ BL as a result of sending or successful receiving the message. Next, the baclog counter BL is decreased by one: (i) at the end of each successful acet cycle or (ii) if no node occuies the channel. If the collision detection is enabled, the baclog is increased by one in the case of collision. On a basis of the baclog counting algorithm we can conclude that after a successful transmission of the message, the baclog BL grows by ( Delta _ BL 1). Each node calculates the baclog autonomously basing on the baclog counter imlemented in the LonWors node firmware. To ee the consistency of baclog states, all nodes in the networ should modify their baclog counters in the same way. We assume that both Physical Layer and Lin Layer of rotocol do not introduce the baclog inconsistency, i.e. the channel might be assumed to be noise-free and all transceivers are able to detect collisions even if they are not senders of colliding acets. Then, the baclog is a global channel arameter. 3 System Modeling Following the definition, the saturated status of a networ is reached if each node has a acet to send. We assume that the networ consists of a fixed number of n nodes and the baclog consistency between the nodes is et. 3.1 Analytical Model of Channel Baclog Let BL n ( l) be a stochastic rocess reresenting the baclog stage at the lth acet cycle in a networ consisting of n nodes, where BL n ( l) = 1,..., 63. As it was stated, we assume that the rocess BL n ( l) is a global measure of the channel. BL n ( l) is the Marov chain with transition robabilities n i, j, i, j = 1,...,63. The first goal of our analysis is to find a stationary distribution of baclog π = [ π ], = 1,..., 63. Next, the saturation baclog BL is calculated as the exected baclog in the long term: BLmax BL = E[ BL ( l )] = π = 1 where E[ ] is the exectation oerator. The saturation window is defined as the mean size of the randomizing window in the saturation conditions: W = 16BL We assume the load scenario called ACK/unicast in short, where all the acets sent through the networ use the acnowledged service and unicast addressing. Thus, after each acet recetion, a receiving node generates a single acnowledgement. In such a scenario we distinguish three tyes of acet cycles (see Sect. 2.2): (1) an (2) (3)

5 unsuccessful transmission due to the collision, which causes the channel baclog BL to increase by one in the next acet cycle: BL ( l + 1) = BL ( l) + 1, (2) a successful transmission of the unicast message, when the channel baclog BL does not change: BL ( l + 1) = BL ( l), and (3) a successful transmission of the acnowledgement which decreases the baclog BL by one: BL ( l + 1) = BL ( l) 1. The ey assumtion in our model is that robabilities of the successful transmission of the acnowledgement and the message are the same. The validity of this assumtion will be checed in Sect. 5. According to this assumtion, if the robability ( of a collision at a certain baclog stage BL n ) ( l) = with n cometing nodes amounts to, then both the robabilities of a successful transmission of a message and an acnowledgement equal (1 ) 2. Suose that the baclog enters the stage at the lth acet cycle, i.e. ( BL n ) ( l) =. Let Pr { BL ( l + 1) = + s BL ( l) = } =, + s be the transition robability that the baclog enters the stage ( + s) in the (l+1)th acet cycle from the stage in the lth cycle. Taing the secification of the acet cycle tyes (1)-(3) into account and baclog limits we calculate the robabilities of switching between baclog stages:, 1 = Pr { BL ( l + 1) = + 1 BL ( l) = } + =, =1,..., 62 1, = Pr { BL ( l + 1) = BL ( l) = } = (1 ) 2, (1 + ) 2, = BL min = 2,...62 = BL 1 = Pr { BL ( l + 1) = 1 BL ( l) = } = (1 ) 2, = 2,..., 63 max = 1 = 63, + s = Pr { BL ( l + 1) = + s BL ( l) = } = 0, s > 1, = 1,..., 63 The diagram of the Marov chain for a given scenario is shown in Fig. 2. (1) coll 1 2 (1 (2) ) 2 (1 (2) coll (3) (61) coll (62) ) 2 (1 ) 2 (1 ) 2 (62) (63) (4) (1) 1 coll (1 (2) ) 2 (1 (62) Fig.2. The state transition diagram of the Marov chain for ACK/unicast scenario ) 2 (1 + (63) ) 2

6 3.2 Baclog Stationary Distribution In order to find the saturation baclog, the steady-state vector, or the stationary distribution π = [ π ], = 1,...,63 of the Marov chain has to be calculated. The stationary distribution π is an eigenvector of the transition matrix P, associated with the eigenvalue equal to one. The vector π = π ] includes the long-term robabilities [ π that the channel baclog will be at the stage in the steady state, that is: π = lim Pr{ BL( l) } (5) = l Using the direct method of the steady-state vector π linear equation has to be solved: i, j comutation, the following T [ G e] π = b (6) i, j where P = [ ] is a transition matrix 63 x 63; the elements are given by (4), G = P I, I is an identity matrix 63 x 63; e = e ] is a vector, where e i = 1 ; i = 1,...,63; [ G e] is 63 x 64 matrix, where the last column of this matrix is a vector e ; b = b ] is a vector, where b = 0, b + 1 = 1; i = 1,..., 63 [ i i i. [ i 3.3 Probabilities of Successful and Unsuccessful Transmission i, j In order to find we have to calculate, i.e. the robability that the transmission is in a collision if n nodes comete for the channel, and the current window consists of 16, = 1,...,63 time slots. To be recise, is the robability that more than one node selects the same time slot and all the other nodes choose later slots: n s = 1 ( ) (7) s where ( ) is the robability of a successful transmission for the window containing 16 time slots, i.e. the oosite event to collision occurrence. The robability n s ( ) describes the drawing when there is a single winner of a channel cometition and is exressed as the sum (according to all the 1,...,16 slots and 1,...,n nodes) of the following: (i) the robability that a winner selects a certain slot s = 1,..., 16 which equals 1 16, (ii) the robability that all the other ( n 1) nodes draw one from ( 16 s) later slots, which equals n 1 ((16 s) 16). Finally: s ( ) 16 n s = n s= (8)

7 Basing on the ditribution of the contention window π = π ], we can estimate the saturation robability of collision [ as the following exectation: BLmax 16 n 1 = = 1 16 s coll = 1 n π s (9) succ Hence,, the saturation robability of the successful transmission succ coll equals: = 1. 4 Saturation Channel Baclog and Probabilities Using the analytical aroach outlined in Sect. 3 we obtained the following results. The grahs resenting BL and vs. the number of nodes n for a secified load scenario (ACK/unicast) are shown in Fig. 3. Each oint on the saturation baclog grah is found as a solution of the linear system given by Eq. (6) for a articular number of nodes and the exectation (Eq. (2)). is calculated according to (9). Saturation channel baclog Saturation collision robability Saturation channel baclog Number of nodes Saturation collision robability [%] Fig.3. The saturation baclog and the saturation collision robability for ACK/unicast scenario At the lower range the saturation baclog increases almost linearly as the number of nodes grows and the sloe of the curve is about 0.06 er node. In articular, this means that adding a new node to the existing networ causes the increase of the saturation window by about 0.06*16 1 time slot of β 2 duration. For networs larger than about 700 nodes, the influence of the uer bound of the channel baclog revents a further extension of the cometition window. If a networ contains more than 1000 nodes, then the saturation baclog is close to its maximum value 63, and the redictive rotocol is reduced to the ersistent CSMA. Summing u, the rediction is effective for the networ sizes u to 700 nodes.

8 As regards the saturation collision robability, the robability grows in roortion to the number of nodes for a networ containing dozens of devices (Fig. 3). Next, becomes steady at 33,3 % for the networ sizes larger than 100 nodes. Thus, succ is et at 66,7 %. This is an imortant result for the redictive CSMA erformance. It shows that the rotocol manages to control the size of a cometition window in order to guarantee the sustained robability of successful transmission, which in the analyzed scenario equals 66,7%. The successful transmission sustained robability is the worst-case robability of successful transmission for the redictive CSMA if the rediction if effective, i.e. the current baclog is not limited by BL max = 63. Although, the effect of eeing the high throughut of the redictive CSMA has been nown [2,3,7], there has been no exlicit quantitative evaluation of sustained robability of successful/unsuccessful transmission. Note that sustained robabilities succ = 66,7% and = 33,3% are established at the equilibrium oint, when the robabilities of the baclog increase succ ( 2 ) and decrease are equal. Finally, for networs greater than 700 nodes, the influence of the maximum size of a cometition window aears, and the shae of both measures is close to that of ersistent CSMA. 5 Validation of Analytical Aroach In order to verify the analytical aroach we have erformed the simulations for a selected number of nodes in the networ saturation status. The simulation starts when the channel is idle. Next, the transient zone aears, when the nodes ermanently try to access the channel and the mean channel baclog grows, but does not reach the steady-state value. Since the simulation model belongs to non-terminating systems and the steady state theoretically is never reached, we detect it with a finite accuracy. The detection relies on the search of the constant value of the mean baclog rather than the constant value of the current baclog. Therefore, we used the moving averages defined on a window of observations (i.e. a certain number of acet cycles). Moving averages filter the higher frequency comonents in the mean baclog, arisen from the random behavior of the CSMA algorithm on the one hand, and remove also the influence of the transient zone on the estimation of the saturation baclog on the other. The saturation baclog is found under quasi steady-state conditions when the moving average of the channel baclog is et inside of 5% wide confidence interval. 5.1 Validation of Transition Probabilities The transition robabilities in the Marov model have been derived basing on the equality of the robabilities of the successful transmission of a message and an acnowledgement (see Sect. 3.1). This assumtion is true if the mean number of nodes having a message waiting for the transmission (i.e. message sources) equals the mean

9 number of nodes that ossesses an acnowledgement ready for sending (i.e. acnowledgement sources). Fig. 4 resents simulation results showing the mean relative number of message and acnowledgement sources in the networ steady state. It is clear that both numbers are equal to 50% with finite simulation accuracy. Percentage of acnowledgement and message sources [%] Mean relative number of sources of acnowledgements and messages Sources of messages Sources of acnowledgements Number of nodes Fig. 4. Simulation results of the mean relative number of message and acnowledgement sources in the steady state 5.2 Simulation versus analytical results The comarison of simulation and analytical results for the saturation baclog and the robability of collision and its exerimental equivalent (i.e. collision ercentage ' n ), is resented in Table 1. Since both results are very close to each other and the corresonding grahs overla, they are not shown in figures together. The comarison shows a good conformity of simulation and the Marov-based analytical aroach. The difference between both results stems from (i) the finite accuracy of the steady state detection in the simulation, (ii) the inaccuracy of the seudorandom generators, (iii) the finite recision of analytical calculations. Table 1. The comarison of analytical and simulation results for saturation baclog and saturation robability of collision for the ACK/unicast load scenario n BL (Marov model) BL (simulation) [%] (Marov model) ' ( n ) [%] (simulation) succ [%] (Marov model) ' ( n ) succ [%] (simulation) 2 1,128 1,124 5,56 5,77 94,44 94,23 6 1,390 1,387 13,12 13,68 86,88 86, ,663 1,661 17,49 17,98 82,51 82, ,9476 4,028 28,48 28,96 71,52 71, ,8567 8,889 31,15 31,97 68,75 68, ,634 42,160 32,89 33,3 67,11 67, ,194 61,428 42,53 42,72 57,47 57,28

10 6 Conclusions The aer resents the analytical study of the efficiency of networ load rediction built in the redictive -CSMA/CD that is used as a MAC rotocol in Lon- Wors/EIA-709 sensor/control networing technology. The aroach based on the Marov chains is alied. The rocedure of erformance analysis includes the definition of transition robabilities of the Marov chain for a secified load scenario, the calculation of stationary distribution of contention window, and the robabilities of successful/unsuccessful transmission. The analysis is exemlified on the load scenario where the acnowledged message service and unicast transactions are used. The resented results allow to recognize the redictability of the rotocol behavior in heavy load conditions. In articular, it is shown that the redictive -CSMA rotocol manages to control the size of a cometition window in order to guarantee the sustained robability of successful transmission. The simulative validation of analytical results is rovided. Further research should generalize the erformance analysis for general case load scenario. References 1. LonTal Protocol Secification, Version 3.0, Echelon Cororation (1995) 2. Enhanced Media Access Control with LonTal Protocol, LON Eng. Bull. (1995) 3. Miśowicz, M., Saor, M., Latawiec, W., Zych, M.: Performance analysis of redictive -ersistent CSMA rotocol for control networs. Proceedings of IEEE International Worsho on Factory Communication Systems WFCS'2002 (2002) Miśowicz, M.: Saturation erformance of redictive -CSMA without collision detection. Proceedings of IEEE International Conference on Emerging Technologies and Factory Automation ETFA'2005 (2005) Miśowicz M.: Send-on-delta concet: an event-based data reorting strategy. Sensors, Secial Issue: Wireless Sensor Networs and Platforms, Vol. 6 (2006) Buchholz, P., Plönnigs, J.: Analytical analysis of access-schemes of the CSMA tye. Proceedings of IEEE International Worsho on Factory Communication Systems WFCS'2004 (2004) Chen, X., Hong, G.-S.: A simulation study of the redictive -ersistent CSMA rotocol. Proceedings of 35th Annual Simulation Symosium (2002) Chen, X., Hong, G.-S.: Real-time erformance analysis of a fieldbus-based networ. Proceedings of Information, Decision and Control Conference (2002) Koetz, H.: Real-Time Systems. Design Princiles for Distributed Embedded Alications. Kluwer Academic Publications (1997) 10. Kleinroc, L., Tobagi, F. A.: Pacet switching in radio channels. I. Carrier sense multile-access modes and their throughut-delay characteristics, IEEE Transactions on Communications, Vol. COM-23, no. 12. (1975) Layer 7 LonMar Interoerability Guidelines, Version 3.2, LonMar (2002) 12. Neuron C Reference Guide, Echelon Cororation (1995)

Analysis of Mean Access Delay in Variable-Window CSMA

Analysis of Mean Access Delay in Variable-Window CSMA Sensors 007, 7, 3535-3559 sensors ISSN 44-80 007 by MDPI www.mdi.org/sensors Full Research Paer Analysis of Mean Access Delay in Variable-Window CSMA Marek Miśkowicz AGH University of Science and Technology,

More information

EXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER

EXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER YEDITEPE UNIVERSITY ENGINEERING & ARCHITECTURE FACULTY INDUSTRIAL ELECTRONICS LABORATORY EE 432 INDUSTRIAL ELECTRONICS EXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER Introduction:

More information

and assigned priority levels in accordance with the QoS requirements of their applications.

and assigned priority levels in accordance with the QoS requirements of their applications. Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm Vasco Quintyne *, Adrian Als Deartment of Comuter Science, Physics and Mathematics University of the West Indies

More information

LAB IX. LOW FREQUENCY CHARACTERISTICS OF JFETS

LAB IX. LOW FREQUENCY CHARACTERISTICS OF JFETS LAB X. LOW FREQUENCY CHARACTERSTCS OF JFETS 1. OBJECTVE n this lab, you will study the -V characteristics and small-signal model of Junction Field Effect Transistors (JFET).. OVERVEW n this lab, we will

More information

Servo Mechanism Technique based Anti-Reset Windup PI Controller for Pressure Process Station

Servo Mechanism Technique based Anti-Reset Windup PI Controller for Pressure Process Station Indian Journal of Science and Technology, Vol 9(11), DOI: 10.17485/ijst/2016/v9i11/89298, March 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Servo Mechanism Technique based Anti-Reset Windu

More information

Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes

Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes 22 IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes Amy Fu and Parastoo Sadeghi The Australian National

More information

Economics of Strategy (ECON 4550) Maymester 2015 Foundations of Game Theory

Economics of Strategy (ECON 4550) Maymester 2015 Foundations of Game Theory Economics of Strategy (ECON 4550) Maymester 05 Foundations of Game Theory Reading: Game Theory (ECON 4550 Courseak, Page 95) Definitions and Concets: Game Theory study of decision making settings in which

More information

Performance Analysis of Battery Power Management Schemes in Wireless Mobile. Devices

Performance Analysis of Battery Power Management Schemes in Wireless Mobile. Devices Performance Analysis of Battery Power Management Schemes in Wireless Mobile Devices Balakrishna J Prabhu, A Chockalingam and Vinod Sharma Det of ECE, Indian Institute of Science, Bangalore, INDIA Abstract

More information

Optimal p-persistent MAC algorithm for event-driven Wireless Sensor Networks

Optimal p-persistent MAC algorithm for event-driven Wireless Sensor Networks Otimal -ersistent MAC algorithm for event-driven Wireless Sensor Networks J. Vales-Alonso,E.Egea-Lóez, M. V. Bueno-Delgado, J. L. Sieiro-Lomba, J. García-Haro Deartment of Information Technologies and

More information

Efficient Importance Sampling for Monte Carlo Simulation of Multicast Networks

Efficient Importance Sampling for Monte Carlo Simulation of Multicast Networks Efficient Imortance Samling for Monte Carlo Simulation of Multicast Networks P. Lassila, J. Karvo and J. Virtamo Laboratory of Telecommunications Technology Helsinki University of Technology P.O.Box 3000,

More information

Performance Analysis of 100 Mbps PACE Technology Ethernet Networks

Performance Analysis of 100 Mbps PACE Technology Ethernet Networks Reprint erformance Analysis of Mbps ACE Technology Ethernet Networs A. antazi and T. Antonaopoulos The th EEE Symposium on Computers and Communications-SCC TUNSA, ULY Copyright Notice: This material is

More information

Random Access Compressed Sensing in Underwater Sensor Networks

Random Access Compressed Sensing in Underwater Sensor Networks Random Access Comressed Sensing in Underwater Sensor Networks Fatemeh Fazel Northeastern University Boston, MA 2115 Email: ffazel@ece.neu.edu Maryam Fazel University of Washington Seattle, WA 98195 Email:

More information

INTERNET PID CONTROLLER DESIGN: M. Schlegel, M. Čech

INTERNET PID CONTROLLER DESIGN:  M. Schlegel, M. Čech INTERNET PID CONTROLLER DESIGN: WWW.PIDLAB.COM M. Schlegel, M. Čech Deartment of Cybernetics, University of West Bohemia in Pilsen fax : + 0403776350, e-mail : schlegel@kky.zcu.cz, mcech@kky.zcu.cz Abstract:

More information

Design of PID Controller Based on an Expert System

Design of PID Controller Based on an Expert System International Journal of Comuter, Consumer and Control (IJ3C), Vol. 3, No.1 (014) 31 Design of PID Controller Based on an Exert System Wei Li Abstract For the instability of traditional control systems,

More information

PERFORMANCE IMPROVEMENT OF MANETS

PERFORMANCE IMPROVEMENT OF MANETS PERFORMANCE IMPROVEMENT OF MANETS WITH LINK LIFETIME Merlinda Drini, Queensborough Community College/CUNY; Tare Saadawi, City College of New Yor Abstract There are many different factors in the hysical

More information

Chapter 7 Local Navigation: Obstacle Avoidance

Chapter 7 Local Navigation: Obstacle Avoidance Chater 7 Local Navigation: Obstacle Avoidance A mobile robot must navigate from one oint to another in its environment. This can be a simle task, for examle, if a robot can follow an unobstructed line

More information

Circular Dynamic Stereo and Its Image Processing

Circular Dynamic Stereo and Its Image Processing Circular Dynamic Stereo and Its Image Processing Kikuhito KAWASUE *1 and Yuichiro Oya *2 *1 Deartment of Mechanical Systems Engineering Miyazaki University 1-1, Gakuen Kibanadai Nishi, Miyazaki 889-2192

More information

Properties of Mobile Tactical Radio Networks on VHF Bands

Properties of Mobile Tactical Radio Networks on VHF Bands Proerties of Mobile Tactical Radio Networks on VHF Bands Li Li, Phil Vigneron Communications Research Centre Canada Ottawa, Canada li.li@crc.gc.ca / hil.vigneron@crc.gc.ca ABSTRACT This work extends a

More information

Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional Spread-Spectrum Systems

Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional Spread-Spectrum Systems I TRANSACTIONS ON CIRCUITS AND SYTMS I: FUNDAMNTAL THORY AND APPLICATIONS, VOL. 50, NO., NOVMBR 2003 475 Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional

More information

Application Note D. Dynamic Torque Measurement

Application Note D. Dynamic Torque Measurement Page 1 of 9 Alication Note 221101D Dynamic Torque Measurement Background Rotary ower sources and absorbers have discrete oles and/or istons and/or gear meshes, etc. As a result, they develo and absorb

More information

The Optimization Model and Algorithm for Train Connection at Transfer Stations in Urban Rail Transit Network

The Optimization Model and Algorithm for Train Connection at Transfer Stations in Urban Rail Transit Network Send Orders for Rerints to rerints@benthamscienceae 690 The Oen Cybernetics & Systemics Journal, 05, 9, 690-698 Oen Access The Otimization Model and Algorithm for Train Connection at Transfer Stations

More information

High resolution radar signal detection based on feature analysis

High resolution radar signal detection based on feature analysis Available online www.jocr.com Journal of Chemical and Pharmaceutical Research, 4, 6(6):73-77 Research Article ISSN : 975-7384 CODEN(USA) : JCPRC5 High resolution radar signal detection based on feature

More information

Influence of Earth Conductivity and Permittivity Frequency Dependence in Electromagnetic Transient Phenomena

Influence of Earth Conductivity and Permittivity Frequency Dependence in Electromagnetic Transient Phenomena Influence of Earth Conductivity and Permittivity Frequency Deendence in Electromagnetic Transient Phenomena C. M. Portela M. C. Tavares J. Pissolato ortelac@ism.com.br cristina@sel.eesc.sc.us.br isso@dt.fee.unicam.br

More information

Mathematical and Computer Modelling. On the characterization of Aloha in underwater wireless networks

Mathematical and Computer Modelling. On the characterization of Aloha in underwater wireless networks Mathematical and Comuter Modelling 53 (2011) 2093 2107 Contents lists available at ScienceDirect Mathematical and Comuter Modelling journal homeage: www.elsevier.com/locate/mcm On the characterization

More information

Optimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm

Optimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm o Otimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm Nirvana S. Antonio, Cícero F. F. Costa Filho, Marly G. F. Costa, Rafael Padilla Abstract In 4-sided dominoes,

More information

Application of Notch Filtering under Low Sampling Rate for Broken Rotor Bar Detection with DTFT and AR based Spectrum Methods

Application of Notch Filtering under Low Sampling Rate for Broken Rotor Bar Detection with DTFT and AR based Spectrum Methods Alication of Notch Filtering under Low Samling Rate for Broken Rotor Bar Detection with DTFT and AR based Sectrum Methods B. Ayhan H. J. Trussell M.-Y. Chow M.-H. Song IEEE Student Member IEEE Fellow IEEE

More information

There are two basic types of FET s: The junction field effect transistor or JFET the metal oxide FET or MOSFET.

There are two basic types of FET s: The junction field effect transistor or JFET the metal oxide FET or MOSFET. Page 61 Field Effect Transistors The Fieldeffect transistor (FET) We know that the biolar junction transistor or BJT is a current controlled device. The FET or field effect transistor is a voltage controlled

More information

Evolutionary Circuit Design: Information Theory Perspective on Signal Propagation

Evolutionary Circuit Design: Information Theory Perspective on Signal Propagation Evolutionary Circuit Design: Theory Persective on Signal Proagation Denis Poel Deartment of Comuter Science, Baker University, P.O. 65, Baldwin City, KS 66006, E-mail: oel@ieee.org Nawar Hakeem Deartment

More information

Uplink Scheduling in Wireless Networks with Successive Interference Cancellation

Uplink Scheduling in Wireless Networks with Successive Interference Cancellation 1 Ulink Scheduling in Wireless Networks with Successive Interference Cancellation Majid Ghaderi, Member, IEEE, and Mohsen Mollanoori, Student Member, IEEE, Abstract In this aer, we study the roblem of

More information

Self-Driven Phase Shifted Full Bridge Converter for Telecom Applications

Self-Driven Phase Shifted Full Bridge Converter for Telecom Applications Self-Driven Phase Shifted Full Bridge Converter for Telecom Alications SEVILAY CETIN Technology Faculty Pamukkale University 7 Kinikli Denizli TURKEY scetin@au.edu.tr Abstract: - For medium ower alications,

More information

An Overview of Substrate Noise Reduction Techniques

An Overview of Substrate Noise Reduction Techniques An Overview of Substrate Noise Reduction Techniques Shahab Ardalan, and Manoj Sachdev ardalan@ieee.org, msachdev@ece.uwaterloo.ca Deartment of Electrical and Comuter Engineering University of Waterloo

More information

Analysis of Pseudorange-Based DGPS after Multipath Mitigation

Analysis of Pseudorange-Based DGPS after Multipath Mitigation International Journal of Scientific and Research Publications, Volume 7, Issue 11, November 2017 77 Analysis of Pseudorange-Based DGPS after Multiath Mitigation ThilanthaDammalage Deartment of Remote Sensing

More information

Detecting Content Adaptive Scaling of Images for Forensic Applications

Detecting Content Adaptive Scaling of Images for Forensic Applications Detecting Content Adative Scaling of Images for Forensic Alications Claude Fillion 1,2, Gaurav Sharma 1,3 1 Deartment of Electrical and Comuter Engineering, University of Rochester, Rochester, NY 2 Xerox

More information

A Genetic Algorithm Approach for Sensorless Speed Estimation by using Rotor Slot Harmonics

A Genetic Algorithm Approach for Sensorless Speed Estimation by using Rotor Slot Harmonics A Genetic Algorithm Aroach for Sensorless Seed Estimation by using Rotor Slot Harmonics Hayri Arabaci Abstract In this aer a sensorless seed estimation method with genetic algorithm for squirrel cage induction

More information

Transmitter Antenna Diversity and Adaptive Signaling Using Long Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1

Transmitter Antenna Diversity and Adaptive Signaling Using Long Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1 Transmitter Antenna Diversity and Adative Signaling Using ong Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1 Shengquan Hu, Tugay Eyceoz, Alexandra Duel-Hallen North Carolina State University

More information

Joint Tx/Rx Energy-Efficient Scheduling in Multi-Radio Networks: A Divide-and-Conquer Approach

Joint Tx/Rx Energy-Efficient Scheduling in Multi-Radio Networks: A Divide-and-Conquer Approach Joint Tx/Rx Energy-Efficient Scheduling in Multi-Radio Networs: A Divide-and-Conquer Aroach Qingqing Wu, Meixia Tao, and Wen Chen Deartment of Electronic Engineering, Shanghai Jiao Tong University, Shanghai,

More information

Performance Analysis of MIMO System using Space Division Multiplexing Algorithms

Performance Analysis of MIMO System using Space Division Multiplexing Algorithms Performance Analysis of MIMO System using Sace Division Multilexing Algorithms Dr.C.Poongodi 1, Dr D Deea, M. Renuga Devi 3 and N Sasireka 3 1, Professor, Deartment of ECE 3 Assistant Professor, Deartment

More information

Initial Ranging for WiMAX (802.16e) OFDMA

Initial Ranging for WiMAX (802.16e) OFDMA Initial Ranging for WiMAX (80.16e) OFDMA Hisham A. Mahmoud, Huseyin Arslan Mehmet Kemal Ozdemir Electrical Engineering Det., Univ. of South Florida Logus Broadband Wireless Solutions 40 E. Fowler Ave.,

More information

Ultra Wideband System Performance Studies in AWGN Channel with Intentional Interference

Ultra Wideband System Performance Studies in AWGN Channel with Intentional Interference Ultra Wideband System Performance Studies in AWGN Channel with Intentional Interference Matti Hämäläinen, Raffaello Tesi, Veikko Hovinen, Niina Laine, Jari Iinatti Centre for Wireless Communications, University

More information

Modeling of power autotransformer

Modeling of power autotransformer Modeling of ower autotransformer VLADMÍR VOLČKO, ŽAETA ELEHOVÁ, ATO BELÁŇ, PETER JAGA, DOMK VGLAŠ, MROLAVA MTKOVÁ Deartment of Electrical Power Engineering lovak niversity of Technology in Bratislava lkovičova,

More information

State-of-the-Art Verification of the Hard Driven GTO Inverter Development for a 100 MVA Intertie

State-of-the-Art Verification of the Hard Driven GTO Inverter Development for a 100 MVA Intertie State-of-the-Art Verification of the Hard Driven GTO Inverter Develoment for a 100 MVA Intertie P. K. Steimer, H. Grüning, J. Werninger R&D Drives and Power Electronics ABB Industrie AG CH-5300 Turgi,

More information

Control of Grid Integrated Voltage Source Converters under Unbalanced Conditions

Control of Grid Integrated Voltage Source Converters under Unbalanced Conditions Jon Are Suul Control of Grid Integrated Voltage Source Converters under Unbalanced Conditions Develoment of an On-line Frequency-adative Virtual Flux-based Aroach Thesis for the degree of Philosohiae Doctor

More information

FOUNTAIN codes [1], [2] have been introduced to achieve

FOUNTAIN codes [1], [2] have been introduced to achieve Controlled Flooding of Fountain Codes Waqas bin Abbas, Paolo Casari, Senior Member, IEEE, Michele Zorzi, Fellow, IEEE Abstract We consider a multiho network where a source node must reliably deliver a

More information

Origins of Stator Current Spectra in DFIGs with Winding Faults and Excitation Asymmetries

Origins of Stator Current Spectra in DFIGs with Winding Faults and Excitation Asymmetries Origins of Stator Current Sectra in DFIGs with Wing Faults and Excitation Asymmetries S. Williamson * and S. Djurović * University of Surrey, Guildford, Surrey GU2 7XH, United Kingdom School of Electrical

More information

THE USE OF INSULATED WIRES MILLIKEN CONDUCTORS IN HIGH VOLTAGE POWER TRANSMISSION UNDERGROUND AC LINES. x y s ABSTRACT

THE USE OF INSULATED WIRES MILLIKEN CONDUCTORS IN HIGH VOLTAGE POWER TRANSMISSION UNDERGROUND AC LINES. x y s ABSTRACT THE USE OF INSULATED WIRES MILLIKEN CONDUCTORS IN HIGH VOLTAGE POWER TRANSMISSION UNDERGROUND AC LINES David DUBOIS, NEXANS, (France), david.dubois@nexans.com Pierre MIREBEAU, NEXANS, (France), ierre.mirebeau@nexans.com

More information

TO IMPROVE BIT ERROR RATE OF TURBO CODED OFDM TRANSMISSION OVER NOISY CHANNEL

TO IMPROVE BIT ERROR RATE OF TURBO CODED OFDM TRANSMISSION OVER NOISY CHANNEL TO IMPROVE BIT ERROR RATE OF TURBO CODED TRANSMISSION OVER NOISY CHANNEL 1 M. K. GUPTA, 2 VISHWAS SHARMA. 1 Deartment of Electronic Instrumentation and Control Engineering, Jagannath Guta Institute of

More information

University of Twente

University of Twente University of Twente Faculty of Electrical Engineering, Mathematics & Comuter Science Design of an audio ower amlifier with a notch in the outut imedance Remco Twelkemeijer MSc. Thesis May 008 Suervisors:

More information

Entropy Coding. Outline. Entropy. Definitions. log. A = {a, b, c, d, e}

Entropy Coding. Outline. Entropy. Definitions. log. A = {a, b, c, d, e} Outline efinition of ntroy Three ntroy coding techniques: Huffman coding rithmetic coding Lemel-Ziv coding ntroy oding (taken from the Technion) ntroy ntroy of a set of elements e,,e n with robabilities,

More information

A Multi-View Nonlinear Active Shape Model Using Kernel PCA

A Multi-View Nonlinear Active Shape Model Using Kernel PCA A Multi-View Nonlinear Active Shae Model Using Kernel PCA Sami Romdhani y, Shaogang Gong z and Alexandra Psarrou y y Harrow School of Comuter Science, University of Westminster, Harrow HA1 3TP, UK [rodhams

More information

A Game Theoretic Analysis of Distributed Power Control for Spread Spectrum Ad Hoc Networks

A Game Theoretic Analysis of Distributed Power Control for Spread Spectrum Ad Hoc Networks A Game Theoretic Analysis of Distributed ower Control for Sread Sectrum Ad Hoc Networs Jianwei Huang, Randall A. Berry, Michael L. Honig Deartment of Electrical & Comuter Engineering, Northwestern University,

More information

Random Access Compressed Sensing for Energy-Efficient Underwater Sensor Networks

Random Access Compressed Sensing for Energy-Efficient Underwater Sensor Networks Random Access Comressed Sensing for Energy-Efficient Underwater Sensor Networks Fatemeh Fazel, Maryam Fazel and Milica Stojanovic Abstract Insired by the theory of comressed sensing and emloying random

More information

Matching Book-Spine Images for Library Shelf-Reading Process Automation

Matching Book-Spine Images for Library Shelf-Reading Process Automation 4th IEEE Conference on Automation Science and Engineering Key Bridge Marriott, Washington DC, USA August 23-26, 2008 Matching Book-Sine Images for Library Shelf-Reading Process Automation D. J. Lee, Senior

More information

Reliability and Criticality Analysis of Communication Networks by Stochastic Computation

Reliability and Criticality Analysis of Communication Networks by Stochastic Computation > EPLACE HIS LINE WIH YOU PAPE IDENIFICAION NUMBE (DOUBLE-CLICK HEE O EDI) < 1 eliability and Criticality Analysis of Communication Networks by Stochastic Comutation Peican Zhu, Jie Han, Yangming Guo and

More information

Multi-period Channel Assignment

Multi-period Channel Assignment Multi-eriod Channel Assignment Hakim Mabed, Alexandre Caminada and Jin-Kao Hao 2 France Télécom R&D, 6 Avenue des Usines, BP 382, 97 Belfort, France {hakim.mabed,alexandre.caminada}@francetelecm.com Tel:

More information

Dynamic Gambling under Loss Aversion

Dynamic Gambling under Loss Aversion Dynamic Gambling under Loss Aversion Yair Antler University of Essex November 22, 2017 Abstract A loss-averse gambler faces an infinite sequence of identical unfair lotteries and decides in which of these

More information

The Impact of Random Waypoint Mobility on Infrastructure Wireless Networks

The Impact of Random Waypoint Mobility on Infrastructure Wireless Networks The Imact of Random Wayoint Mobility on Infrastructure Wireless Networks Dennis Pong and Tim Moors School of Electrical Engineering and Telecommunications The University of New South Wales, NSW 5 Australia

More information

Underwater acoustic channel model and variations due to changes in node and buoy positions

Underwater acoustic channel model and variations due to changes in node and buoy positions Volume 24 htt://acousticalsociety.org/ 5th Pacific Rim Underwater Acoustics Conference Vladivostok, Russia 23-26 Setember 2015 Underwater acoustic channel model and variations due to changes in node and

More information

Adaptive Packet Level Redundancy Mechanisms for Reliable Mobile Multicast: Proposed Architecture and Performance Analysis

Adaptive Packet Level Redundancy Mechanisms for Reliable Mobile Multicast: Proposed Architecture and Performance Analysis Adative Pacet Level edundanc echanisms for eliable obile ulticast: Proosed Architecture and Performance Analsis Prawit Chumchu *, **, and Aruna Seneviratne** ember, IEEE *Det. of Telecommunications Engineering

More information

Postprocessed time-delay interferometry for LISA

Postprocessed time-delay interferometry for LISA PHYSICAL REVIEW D, VOLUME 70, 081101(R) Postrocessed time-delay interferometry for LISA D. A. Shaddock,* B. Ware, R. E. Sero, and M. Vallisneri Jet Proulsion Laboratory, California Institute of Technology,

More information

802.11b White Paper. Table of Contents. VOCAL Technologies, Ltd. Home page

802.11b White Paper. Table of Contents. VOCAL Technologies, Ltd. Home page VOCAL Technologies, Ltd. Home age 802.b White Paer Table of Contents Page. 802.b Glossary... 2 2. Introduction to 802.b... 3 3. 802.b Overview... 6 4. CCK used in 802.b... 7 5. Walsh and Comlementary Codes

More information

A Novel Image Component Transmission Approach to Improve Image Quality and Energy Efficiency in Wireless Sensor Networks

A Novel Image Component Transmission Approach to Improve Image Quality and Energy Efficiency in Wireless Sensor Networks Journal of Comuter Science 3 (5: 353-360, 2007 ISSN 1549-3636 2007 Science Publications A Novel Image Comonent Transmission Aroach to Imrove Image Quality and nergy fficiency in Wireless Sensor Networks

More information

A Novel, Robust DSP-Based Indirect Rotor Position Estimation for Permanent Magnet AC Motors Without Rotor Saliency

A Novel, Robust DSP-Based Indirect Rotor Position Estimation for Permanent Magnet AC Motors Without Rotor Saliency IEEE TANSACTIONS ON POWE EECTONICS, VO. 18, NO. 2, MACH 2003 539 A Novel, obust DSP-Based Indirect otor Position Estimation for Permanent Magnet AC Motors Without otor Saliency i Ying and Nesimi Ertugrul,

More information

An Alternative Single Parameter Functional Form for Lorenz Curve

An Alternative Single Parameter Functional Form for Lorenz Curve Crawford School of Public Policy Crawford School working aers An Alternative Single Parameter Functional Form for Lorenz Curve Crawford School Working Paer 7 Setember 07 Satya Paul Amrita University, India

More information

Adaptive Switching between Spatial Diversity and Multiplexing: a Cross-layer Approach

Adaptive Switching between Spatial Diversity and Multiplexing: a Cross-layer Approach Adative Switching between Satial Diversity and ultilexing: a Cross-layer Aroach José Lóez Vicario and Carles Antón-Haro Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) c/ Gran Caità -4, 08034

More information

Full Bridge Single Stage Electronic Ballast for a 250 W High Pressure Sodium Lamp

Full Bridge Single Stage Electronic Ballast for a 250 W High Pressure Sodium Lamp Full Bridge Single Stage Electronic Ballast for a 50 W High Pressure Sodium am Abstract In this aer will be reorted the study and imlementation of a single stage High Power Factor (HPF) electronic ballast

More information

Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation

Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation International Journal Of Comutational Engineering Research (ijceronline.com) Vol. 2 Issue. Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation Rajbir Kaur 1, Charanjit

More information

An Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ

An Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ An Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ Rong Lin y Koji Nakano z Stehan Olariu x Albert Y. Zomaya Abstract We roose an efficient reconfigurable arallel refix counting

More information

Multi-TOA Based Position Estimation for IR-UWB

Multi-TOA Based Position Estimation for IR-UWB Multi-TOA Based Position Estimation for IR-UWB Genís Floriach, Montse Nájar and Monica Navarro Deartment of Signal Theory and Communications Universitat Politècnica de Catalunya (UPC), Barcelona, Sain

More information

SPACE-FREQUENCY CODED OFDM FOR UNDERWATER ACOUSTIC COMMUNICATIONS

SPACE-FREQUENCY CODED OFDM FOR UNDERWATER ACOUSTIC COMMUNICATIONS SPACE-FREQUENCY CODED OFDM FOR UNDERWATER ACOUSTIC COMMUNICATIONS E. V. Zorita and M. Stojanovic MITSG 12-35 Sea Grant College Program Massachusetts Institute of Technology Cambridge, Massachusetts 02139

More information

Calculation of the Duty Cycle for BECA

Calculation of the Duty Cycle for BECA Volume 2 No.4, July 205 Calculation of the uty Cycle for BECA Chiranjib atra Calcutta Institute of Engineering and Mangement, Kolata Sourish Mullic Calcutta Institute of Engineering and Mangement, Kolata

More information

Chapter 7: Passive Filters

Chapter 7: Passive Filters EETOMAGNETI OMPATIBIITY HANDBOOK 1 hater 7: Passive Filters 7.1 eeat the analytical analysis given in this chater for the low-ass filter for an filter in shunt with the load. The and for this filter are

More information

Antenna Selection Scheme for Wireless Channels Utilizing Differential Space-Time Modulation

Antenna Selection Scheme for Wireless Channels Utilizing Differential Space-Time Modulation Antenna Selection Scheme for Wireless Channels Utilizing Differential Sace-Time Modulation Le Chung Tran and Tadeusz A. Wysocki School of Electrical, Comuter and Telecommunications Engineering Wollongong

More information

Research and concepts Inertial tolerancing

Research and concepts Inertial tolerancing Research and concets Inertial tolerancing The author is a Professor in the Deartment of Industrial Engineering at the Université de Savoie, Annecy le Vieux, France Keywords Taguchi methods, Statistical

More information

A Pricing-Based Cooperative Spectrum Sharing Stackelberg Game

A Pricing-Based Cooperative Spectrum Sharing Stackelberg Game A Pricing-Based Cooerative Sectrum Sharing Stackelberg Game Ramy E. Ali, Karim G. Seddik, Mohammed Nafie, and Fadel F. Digham? Wireless Intelligent Networks Center (WINC), Nile University, Smart Village,

More information

THE HELMHOLTZ RESONATOR TREE

THE HELMHOLTZ RESONATOR TREE THE HELMHOLTZ RESONATOR TREE Rafael C. D. Paiva and Vesa Välimäki Deartment of Signal Processing and Acoustics Aalto University, School of Electrical Engineering Esoo, Finland rafael.dias.de.aiva@aalto.fi

More information

A New Method for Design of Robust Digital Circuits

A New Method for Design of Robust Digital Circuits A New Method for Design of Robust Digital Circuits Dinesh Patil, Sunghee Yun, Seung-Jean Kim, Alvin Cheung, Mark Horowitz and Stehen oyd Deartment of Electrical Engineering, Stanford University, Stanford,

More information

A toy-model for the regulation of cognitive radios

A toy-model for the regulation of cognitive radios A toy-model for the regulation of cognitive radios Kristen Woyach and Anant Sahai Wireless Foundations Deartment of EECS University of California at Berkeley Email: {kwoyach, sahai}@eecs.berkeley.edu Abstract

More information

A Printed, Broadband Luneburg Lens Antenna

A Printed, Broadband Luneburg Lens Antenna IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. 58, NO. 9, SEPTEMBER 010 3055 A Printed, Broadband Luneburg Lens Antenna Carl Pfeiffer and Anthony Grbic Abstract The design of a D broadband, Luneburg

More information

The Gini Coefficient: An Application to Greece

The Gini Coefficient: An Application to Greece International Journal of Economics and Finance; Vol. 10, No. 3; 2018 ISSN 1916-971X E-ISSN 1916-9728 Published by Canadian Center of Science and Education The Gini Coefficient: An Alication to Greece Augustine

More information

An Overview of PAPR Reduction Optimization Algorithm for MC-CDMA System

An Overview of PAPR Reduction Optimization Algorithm for MC-CDMA System RESEARCH ARTICLE OPEN ACCESS An Overview of PAPR Reduction Otimization Algorithm for MC-CDMA System Kanchan Singla*, Rajbir Kaur**, Gagandee Kaur*** *(Deartment of Electronics and Communication, Punjabi

More information

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast ISSN 746-7659, England, U Journal of Information and Computing Science Vol. 4, No., 9, pp. 4-3 A Random Networ Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast in Yang,, +, Gang

More information

Performance Analysis of the IEEE n Block-ACK Mechanism in an Error-Prone Channel Xue-ping CHEN, Wen-da LI and Hong-yuan CHEN*

Performance Analysis of the IEEE n Block-ACK Mechanism in an Error-Prone Channel Xue-ping CHEN, Wen-da LI and Hong-yuan CHEN* 2016 International Conerence on ustainable nergy, nvironment and Inormation ngineering (I 2016) IBN: 978-1-60595-337-3 Perormance Analysis o the I 802.11n Block- Mechanism in an rror-prone Channel Xue-ing

More information

Revisiting Weighted Stego-Image Steganalysis

Revisiting Weighted Stego-Image Steganalysis Revisiting Weighted Stego-Image Steganalysis Andrew D. Ker a and Rainer Böhme b a Oxford University Comuting Laboratory, Parks Road, Oxford OX 3QD, England; b Technische Universität Dresden, Institute

More information

RECOMMENDATION ITU-R SF

RECOMMENDATION ITU-R SF Rec. ITU-R SF.1649-1 1 RECOMMENDATION ITU-R SF.1649-1 Guidance for determination of interference from earth stations on board vessels to stations in the fixed service when the earth station on board vessels

More information

Parameter Controlled by Contrast Enhancement Using Color Image

Parameter Controlled by Contrast Enhancement Using Color Image Parameter Controlled by Contrast Enhancement Using Color Image Raguathi.S and Santhi.K Abstract -The arameter-controlled virtual histogram distribution (PCVHD) method is roosed in this roject to enhance

More information

The Use of Helmholtz Resonance for Measuring the Volume of Liquids and Solids

The Use of Helmholtz Resonance for Measuring the Volume of Liquids and Solids Sensors 2010, 10, 10663-10672; doi:10.3390/s101210663 OPEN ACCESS sensors ISSN 1424-8220 www.mdi.com/journal/sensors Article The Use of Helmholtz Resonance for Measuring the Volume of Liquids and Solids

More information

COMPARISON OF DIFFERENT CDGPS SOLUTIONS FOR ON-THE-FLY INTEGER AMBIGUITY RESOLUTION IN LONG BASELINE LEO FORMATIONS

COMPARISON OF DIFFERENT CDGPS SOLUTIONS FOR ON-THE-FLY INTEGER AMBIGUITY RESOLUTION IN LONG BASELINE LEO FORMATIONS COMPARISON OF DIFFERENT CDGPS SOLUTIONS FOR ON-THE-FLY INTEGER AMBIGUITY RESOLUTION IN LONG BASELINE LEO FORMATIONS Urbano Tancredi (1), Alfredo Renga (2), and Michele Grassi (3) (1) Deartment for Technologies,

More information

Comparison of image-based functional monitoring through resampling and compression Steven J. Simske, Margaret Sturgill, Jason S.

Comparison of image-based functional monitoring through resampling and compression Steven J. Simske, Margaret Sturgill, Jason S. Comarison of image-based functional monitoring through resamling and comression Steven J. Simse, Margaret Sturgill, Jason S. Aronoff HP Laboratories HPL-2009-145 Keyword(s): Image forensics, counterfeit

More information

Electronic Ballast with Wide Dimming Range: Matlab-Simulink Implementation of a Double Exponential Fluorescent-Lamp Model

Electronic Ballast with Wide Dimming Range: Matlab-Simulink Implementation of a Double Exponential Fluorescent-Lamp Model Electronic Ballast with Wide Dimming ange: Matlab-Simulink Imlementation of a Double Exonential Fluorescent-Lam Model Marina Perdigão and E. S. Saraiva Deartamento de Engenharia Electrotécnica Instituto

More information

IMPROVED POLYNOMIAL TRANSITION REGIONS ALGORITHM FOR ALIAS-SUPPRESSED SIGNAL SYNTHESIS

IMPROVED POLYNOMIAL TRANSITION REGIONS ALGORITHM FOR ALIAS-SUPPRESSED SIGNAL SYNTHESIS IMPROVED POLYNOMIAL TRANSITION REGIONS ALGORITHM FOR ALIAS-SUPPRESSED SIGNAL SYNTHESIS Dániel Ambrits and Balázs Bank Budaest University of Technology and Economics, Det. of Measurement and Information

More information

CHAPTER 5 INTERNAL MODEL CONTROL STRATEGY. The Internal Model Control (IMC) based approach for PID controller

CHAPTER 5 INTERNAL MODEL CONTROL STRATEGY. The Internal Model Control (IMC) based approach for PID controller CHAPTER 5 INTERNAL MODEL CONTROL STRATEGY 5. INTRODUCTION The Internal Model Control (IMC) based aroach for PID controller design can be used to control alications in industries. It is because, for ractical

More information

Software for Modeling Estimated Respiratory Waveform

Software for Modeling Estimated Respiratory Waveform Software for Modeling Estimated Resiratory Waveform Aleksei E. Zhdanov, Leonid G. Dorosinsky Abstract In the imaging of chest or abdomen, motion artifact is an unavoidable roblem. In the radiation treatment,

More information

The online muon identification with the ATLAS experiment at the LHC

The online muon identification with the ATLAS experiment at the LHC 32 he online muon identification with the ALAS exeriment at the LHC Abstract he Large Hadron Collider (LHC) at CERN is a roton-roton collider roviding the highest energy and the highest instantaneous luminosity

More information

Laboratory Essay with Online Back-calculation Anti-windup Scheme for a MTG System

Laboratory Essay with Online Back-calculation Anti-windup Scheme for a MTG System PID' Brescia (Italy), March 8-, WeB. Laboratory Essay with Online Back-calculation Anti-windu Scheme for a MTG System Antônio M. S. Neto, Thaise P. Damo, Antonio A. R. Coelho Federal University of Santa

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Technical and Economic Feasibility of Passive Shielding Used to Mitigate Power Lines Magnetic Fields

Technical and Economic Feasibility of Passive Shielding Used to Mitigate Power Lines Magnetic Fields Technical and Economic Feasibility of Passive Shielding Used to Mitigate Power Lines Magnetic Fields AHMED R. SAYED, HUSSEIN I. ANIS Electrical Power and Machine Deartment Cairo University Giza EGYPT eng_ahmed.rabee@eng.cu.edu.eg,

More information

Usable speech detection using a context dependent Gaussian mixture model classifier

Usable speech detection using a context dependent Gaussian mixture model classifier From the SelectedWorks of Ananth N Iyer May, 2004 Usable seech detection using a context deendent Gaussian mixture model classifier Robert E Yantorno, Temle University Brett Y Smolenski Ananth N Iyer Jashmin

More information

Nonlinear MSM Photodetector Model for High Resolution Laser Impulse Radar Imaging

Nonlinear MSM Photodetector Model for High Resolution Laser Impulse Radar Imaging Nonlinear MSM Photodetector Model for High Resolution Laser Imulse Radar Imaging M. DJEBARI *, M. BENSEBTI *, A. ANOU *, M. MEHDI * AND G. KOMPA ** * Deartment of electronic University Saad Dahlab of Blida

More information

A new approach to bit error rate reduction and its impact on telecom performance

A new approach to bit error rate reduction and its impact on telecom performance Journal of Scientific AHUJA & Industrial & CHAKKA: ResearchA NEW APPROACH TO BIT ERROR RATE REDUCTION ON TELECOM Vol. 72, March 23,. 49-59 49 A new aroach to bit error rate reduction and its imact on telecom

More information

Approximated fast estimator for the shape parameter of generalized Gaussian distribution for a small sample size

Approximated fast estimator for the shape parameter of generalized Gaussian distribution for a small sample size BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES, Vol. 63, No. 2, 2015 DOI: 10.1515/basts-2015-0046 Aroximated fast estimator for the shae arameter of generalized Gaussian distribution for

More information