Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes

Size: px
Start display at page:

Download "Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes"

Transcription

1 22 IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes Amy Fu and Parastoo Sadeghi The Australian National University, Canberra, 2, Australia s: Muriel Médard Massachusetts Institute of Technology, MA, USA Abstract In this aer we study in-order acket delivery delay of two recently roosed network coded transmission schemes with alications in wireless broadcast. Unlike revious works where asymtotic behaviour of decoding or delivery delay was resented, we rovide a general analysis of the three conditions under which in-order acket delivery is ossible at a receiver: by ) catching u with the sender, 2) receiving while a leader, and 3) chance decoding. We use a Markov model to reresent the difference between the knowledge sace of the sender and a receiver. For the first condition, we calculate the exected distribution of decoding cycle lengths under the Markov model. For the second condition, we roose to use a simlifying indeendent Markov model among receivers to shed light on the factors that determine the robability of receiving while a leader. Finally, we comare the chance decoding robabilities of two transmission schemes and a baseline random transmission algorithm to show that surrisingly (and fortunately) the robability of chance decoding is significant in one of the transmission schemes. We verify our analysis by extensive simulations and discuss the usefulness of our study for understanding and design of better transmission algorithms. I. INTRODUCTION With the advent of efficient high bandwidth wireless systems, it is likely that the demand for broadcast streaming alications will raidly increase in the future. In order for users to enjoy a high uality exerience, the service rovider must meet the often conflicting reuirements of high throughut and low delay []. For streaming alications ackets are reuired to be used in the correct order, to ensure continuity of layback. To rovide wireless broadcast streaming, a sender broadcasts ackets of data to a set of receivers. All receivers wish to receive the same set of information, but they exerience indeendent channel erasures. This means that in general, different receivers will simultaneously reuire different subsets of the ackets available for transmission. In order to satisfy the reuirements of different receivers, a sender can make use of network coding [2]. Rather than sending ackets one by one, multile ackets are combined into a single transmission using Galois field arithmetic [3]. This is more bandwidth efficient, but the tradeoff is that coded ackets must first be decoded before use. The time difference between when a acket arrives at the sender and when it is decoded at a receiver, the decoding delay [4], can often be uite significant. Since streaming alications reuire that ackets are used in the correct order, erformance can be measured by the delivery delay [5], the time between when a acket is sent and when it and all receding ackets have been decoded. The study of throughut-delay tradeoff has been aroached in a number of ways. Works such as [6] [8] minimise the decoding delay by otimising the number of instantaneously decodable ackets. However this method sacrifices throughut and may not be suitable for streaming alications. By comarison [4], [5], [9], [] rioritise throughut otimality, attemting to reduce delay under this constraint. In [] the exected decoding ( delay ) of these schemes was asymtotically ρ found to be O, where ρ is the load factor. However no results are available on the distribution of delays. An exact characterisation of the delay erformance using random walks was attemted in [9], but this was found to be a mathematically difficult roblem for even a moderate number of receivers. In this aer we rovide a framework for estimating the delivery delay of three wireless broadcast network-coded transmission schemes with the innovation guarantee roerty, where the sender ensures that all receivers who have less ackets than the sender are rovided with new information with every recetion. Under this framework, robability-based estimates of the delivery delay can be made even in nonasymtotic cases. We use an indeendent receiver model to analyse the behaviour of the transmission schemes, and shed light on how the decoding rocess works. For the first time we do detailed analysis of the chance decoding robability, where urely by chance a receiver can decode their next needed acket. Previous studies [9], [] have assumed that these effects are negligible, but we show that a significant fraction of ackets can enjoy chance decoding. Our roosed framework will be useful in imroving current transmission schemes to adatively serve users in dynamic and heterogeneous networks. II. MODEL We base our model on that of [4], [5]. A single sender aims to transmit the uncoded ackets, 2,... to a set of R receivers. It achieves this by broadcasting coded combinations of these ackets at the rate of one acket transmission er time slot. Each receiver r {,..., R} exeriences indeendent channel erasures, and successfully receives each acket with the same robability µ. Although our analysis is also alicable to heterogeneous networks, for clarity of exlanation we assume a homogeneous system. Receivers send an /2/$3. 22 IEEE 2236

2 acknowledgement after each successful recetion, which the sender detects without error. Packets are added to the sender ueue by a Bernoulli rocess with robability λ < µ at each time slot. At each time t the sender uses network coding to combine the ackets in its ueue for transmission. These ackets are multilied by coefficents chosen from the field F M of an aroriate size, then summed together. This combination is transmitted along with a vector v s (t) whose i-th entry is the coefficient used for i. Receivers collect the ackets they detect and decode them using Gauss-Jordan elimination [3]. If we define e i as a vector whose i-th entry is and all others, decoding i at a receiver is euivalent to erforming Gauss-Jordan elimination on the received vectors to obtain e i. A. Knowledge sace and virtual ueue At timetthe sender ueue list is defined as the set of vectors V s (t) = {e,e 2,...,e Vs(t) } corresonding to the ackets in the ueue so far, where the notation X reresents the size of the set X. The sender chooses ackets for transmission from its knowledge sace K s (t) = san(v s (t)) () the set of all linear combinations the sender can comute. The size of the knowledge sace is given by K s (t) = M Vs(t). (2) A receiver r obtains innovative coded ackets corresonding to a set of vectors V r (t) which we call the recetion list of receiver r. Likewise the knowledge sace of the receiver is then given by K r (t) = san(v r (t)). The virtual ueue [4] of a receiver can now be defined as the number of ackets the receiver lags behind the sender: B. Markov chains s r (t) = V s (t) V r (t), (3) We can study changes in the virtual ueue length as a traversal on the Markov chain of Fig. whose states,,2,... corresond to the values of s r (t). Therefore we will refer to the virtual ueue length as the Markov state of a receiver. Whether s r (t) increases, decreases or remains the same in the next time slot deends on whether a acket is added to the sender ueue and whether the receiver successfully detects the next acket sent. The allowable state transitions for states > and their robabilities are given in the following table, where the notation x = x is used. State transition Probability Shorthand notation s r (t+) = s r (t)+ λµ s r (t+) = s r (t) λµ s r (t+) = s r (t) λµ+λµ Fig.. C. Transmission schemes A Markov chain describing the virtual ueue length. Here we study three transmission schemes with the innovation guarantee roerty. We use two existing schemes, the dro-when-seen transmission scheme of [4], [] and the asymtotically otimal delivery scheme of [5], which we call schemes A and B resectively. As a means of comarison we also consider a baseline coding scheme, where feedback is used only to ensure the innovation guarantee roerty. The method for selecting coding coefficients in each scheme is summarised below: more details can be found in [5], []. Baseline scheme The sender transmits a random combination of all ackets added to its ueue so far. Coding coefficients are selected randomly from F M, conditioned uon the final acket being innovative to all receivers who have not decoded all ackets in the sender ueue. Scheme A Scheme A relies on the concet of seen ackets. A acket i is seen by a receiver r if K r (t) contains a vector of the form e i + f(e >i ), where f(e >i ) is some linear combination of the vectors e i+,e i+2,... If no such vector exists, then i is unseen. Scheme A ensures that with each successful recetion, a receiver sees their next unseen acket. To determine what acket to send next, the sender lists the oldest unseen acket from each receiver. Moving from oldest to newest unseen acket, it adds an aroriate multile of each acket such that it is innovative to all the corresonding receivers. Scheme B Under scheme B, the sender transmits a minimal combination based on the oldest undecoded acket of each receiver. The sender lists these oldest undecoded ackets and their corresonding receivers, then beginning with the newest acket in the list, it adds in older ackets only if the receiver(s) that corresond to them would not otherwise receive innovative information. It should be noted that since schemes A and B only code the oldest unseen or undecoded acket of each user, the sender will never code a acket i until at least one of the receivers has decoded all {,..., i }. D. Conditions for decoding For the schemes described above, we can categorise the ways in which the next acket can be delivered to a receiver. ) Reach the zero state Receiver r catches u to the sender when its Markov state s r (t) =. At this oint, the number of coded ackets stored at the receiver euals the number of 2237

3 undecoded ackets. Therefore any time that s r (t) =, all ackets stored are decoded. 2) Receive while a leader This method of decoding alies to schemes A and B only. The receiver r is called a leader when no other receivers have a lower Markov state, i.e. s r (t) = min{s i (t)}. Receiving while a leader is shown in [] to result in the decoding of all stored ackets. 3) Chance decoding This accounts for any ackets delivered at times the receiver is not either leading or in the zero state. By chance or design a combination is sent that allows the receiver to decode the earliest missing acket. In this case, some fraction of the stored ackets are delivered. The remainder of this aer will analyse when and how often these three situations arise. III. ZERO STATE DECODING In this section we calculate what roortion of time is sent in the zero state, and the time between returns to the zero state. A. Time sent in zero state We wish to find the robability S r (k) that at a randomly selected time, the receiver r is in state k. To do this, we find the stationary distribution of a receiver s Markov chain. For the Markov chain of Fig., if λ < µ a stationary distribution exists such that S r (k) = S r (k +). (4) Solving for k= S r(k) =, we obtain ( S r (k) = )( ) k. (5) For examle if λ =.7 and µ =.8, the robability a receiver is at the zero state is 4.7%. B. Decoding cycles Knowing what roortion of time a receiver sends at the zero state does not give comlete information about the delay. Long times between returns to the zero state can mean excessive delay. Therefore we calculate the distribution of return times. A receiver starting at state is said to exerience a decoding cycle of length T if it first returns to the state in the Markov chain after exactly T time slots. We calculate P, (T), the robability of obtaining a decoding cycle of length T. We can solve this roblem in two stes. First, we characterise a ath through the Markov chain that consists of only moving stes where s r (t + ) = s r (t) ±. Then we add in the ause stes, where s r (t+) = s r (t). In the first time ste there are two ossibilities. The receiver can remain at with robability, which gives us P, () =. If it instead moves to state, it must return to in T > time stes. For a ath of fixed length T, the ath must consist of 2k moving stes, k u and k down, and T 2k ause stes, where k T/2. The number of Probability µ=.8 µ=.9 µ= Return to zero time λ=µ λ=.9µ λ=.8µ Fig. 2. The robability of a receiver taking T time stes to return to the zero state. aths that first return to the state in exactly 2k stes without auses is given by the (k )-th Catalan number [] ( ) 2k 2. (6) k k Now we factor in the T 2k auses. These auses cannot occur in the first or last time ste, otherwise the decoding cycle length would not be T. For a given ath of 2k moving stes, there are ( T 2 2k 2) choices for ause locations. Therefore the robability of taking exactly T > timeslots to return to the origin is given by P, (T) = T/2 k= k ( 2k 2 k )( T 2 2k 2 ) k k ( ) T 2k. (7) The cumulative decoding cycle length robabilities are given for a number of transmission and recetion rates in Fig. 2. The greater the load factor ρ = λ/µ, the more slowly the robability converges to. IV. LEADING In this section we investigate the amount of time receivers send leading from a nonzero state. Firstly we calculate the amount of time the leader is in state k, then use this to make some estimations of the average time a receiver sends as a leader. The robability of a receiver r being in a state k is ( ) k S r ( k) = S r (i) =. (8) i=k Were receivers Markov states indeendent, the robability of the leader being in state k would be ( ( ) ) R ( ) Rk L(k) =. (9) However since the sender is common to all receivers, there is a noticeable amount of correlation between receivers Markov states. This is illustrated in Fig. 3, which comares the joint 2238

4 λµµ λµµ λµ 2 i,j λµ 2 λµµ λµµ (--) 2 (--) i,j (--) 2 (--) Fig. 3. Two-receiver state transition robabilities (a) in ractice, and (b) under the indeendent receiver model. The horizontal and vertical axes corresond to the Markov states of receivers and 2 resectively, where s (t) = i and s 2 (t) = j. Since the sender is common to both receivers, it is not ossible that s (t+) = i± while s 2 (t+) = j. Probability Leader state receiver Indeendent Simulation Fig. 4. The roortion of time the leader is in each state, under the indeendent receiver model and in ractice. λ =.7,µ =.8. Markov state transition robabilities for two receivers under each model. In ractice the correlated transition robabilities result in the receivers being more closely groued together than redicted by the indeendent receiver model. Fig. 4 shows that the robability of leading from states k > is higher in ractice than under indeendent receiver model. Desite the discreancies of the indeendent receiver model, it can still be used to make some general observations about the leader state robabilities. The robability that a receiver r is leading is /R, since at least one receiver must lead at each time slot. The robability of the leader being in state k is bounded between the values in the single receiver case and the indeendent receiver model. By (5) as /, or λ µ, the state robability distribution becomes more evenly sread. This increases the robability that the leader will be in a higher state. The more receivers there are, the less likely it is for a receiver r to lead from states k >. If is sufficiently smaller than and the number of receivers is large, leader(s) will often be at state k =. V. CHANCE DECODING Even when a receiver is not leading, it is ossible that a acket it receives haens to be a linear combination which will result in the decoding of its earliest undelivered acket. Say that at time t the sender transmits the coded acket v s (t). Then chance decoding occurs under the following condition. Lemma : At time t, a receiver can decode the next needed acket n iff it receives a transmission v s (t) san(k r (t ) e n )\K r (t ). Proof: A acket k is decoded iff e k K r (t). Say that e n / K r (t ). Then for n to be decoded at time t, e n san(k r (t ) v s (t)). To satisfy the innovation guarantee roerty, v s (t) / K r (t ). Therefore to decode acket n at time t, v s (t) san(k r (t ) e n )\K r (t ). As we will show, the robability of chance decoding deends on both the transmission scheme used and the effective Markov state, which we now define. A. Effective Markov state The effective sender ueue Vs (t) is defined as the set of vectors corresonding to all ackets the sender has transmitted in time slots,...,t. In the baseline scheme, usually Vs (t) = V s (t) unless the coefficient selected for the newest acket haens to be. In contrast, the sending rate of schemes A and B is also limited by the leader s recetion rate. Therefore V s (t) = {e,e 2...,e V s (t) }, where V s (t) = min( max r,...,r ( V r(t ) +), V s (t) ). () The effective Markov state of a receiver r is then defined as s r(t) = V s (t) V r (t ). () This differs from (3) in that it comares the effective sender ueue and the recetion list rior to the current time slot. B. Oortunities for chance decoding It is imortant to note that a receiver cannot chance decode in every time slot. Firstly it must have received a acket, and secondly the effective sender ueue size must not increase. Lemma 2: A receiver r can only chance decode its next needed acket n when its effective Markov state decreases, i.e. s r(t) = s r(t ). Proof: It is always true that K r (t ) Ks(t ). If the receiver is not a leader, then they have not decoded all ackets in Ks(t ), and e n Ks(t ). Therefore by Lemma chance decoding can only occur if v s (t) Ks(t ), so that V s (t) = V s (t ). Receiving an innovative acket means that V r (t) = V r (t ) +, so by () s r(t) = s r(t ). Therefore of the time slots a receiver is neither in the zero state or a leader, aroximately λµ of these allow chance decoding to occur. These chance decodable time slots are the only ones considered in this section, so all chance decoding robabilities calculated are relative robabilities. C. Baseline scheme To gain some insight into the robability of chance decoding, we first study our baseline scheme. Here we will show how the effective Markov state affects the robability of chance decoding. 2239

5 Probability of chance decoding Theoretical receiver Effective Markov state Fig. 5. Baseline coding scheme single and four-receiver chance decoding robabilities for F 4. λ =.7,µ =.8. ) Single receiver: We calculate the robability the next needed acket n will be delivered. The total number of ossible transmissions is given by the size of the sender s knowledge sace K s (t) minus that of the receiver, K r (t). Therefore by Lemma, the robability of selecting a acket under the baseline scheme which allows n to be decoded is san(k r (t ) e n )\K r (t ) K s (t)\k r (t ) = M M s r (t) (2) Therefore the robability of chance decoding deends only on the Markov state of the receiver. The exonential deendence on the Markov state and field size means that there is a very small chance decoding robability for higher states. 2) Multile receivers: There is a negligible difference between the baseline chance decoding robabilities for the single and multile receiver cases, rovided they are coded using the same field size. Fig. 5 comares the redicted and measured baseline chance decoding robabilities for one and four receivers over F 4. D. Scheme A We comare the erformance of scheme A against the baseline scheme. Under scheme A, the sender codes only the first unseen acket of each receiver. Furthermore the coefficient chosen is the smallest that will satisfy the innovative guarantee roerty. Although a field size M R is necessary to guarantee innovation, the majority of the time a much smaller coefficient, usually, will be sufficient. In Fig. 6 the chance decoding erformance of Scheme A is comared against the single receiver baseline scheme. The erformance of Scheme A with four receivers and F 4 is in fact closer to that of the baseline scheme under F 2. Since most of the time the sender effectively transmits binary field combinations, Scheme A chance decoding robabilities are only marginally worse than the F 2 baseline scheme. With 8 receivers and a field F 8, the robability of sending ackets Chance decoding robability Baseline M=2 Baseline M= Effective Markov state Fig. 6. Scheme A four and eight-receiver chance decoding robabilities comared with baseline F 2 and F 4 redictions. λ =.7,µ =.8. Chance decoding robability Effective Markov state Fig. 7. Scheme B four and eight-receiver chance decoding robabilities over fields F 4 and F 8 resectively. λ =.7,µ =.8. containing coefficients greater than is higher. This results in decoding robabilities closer to the baseline F 4 case. E. Scheme B Scheme B is shown in Fig. 7 to have a chance decoding robability that is relatively unaffected by the effective Markov state, but still significantly higher than Scheme A. This can be attributed to the coding scheme, which more or less minimises the number of ackets coded into each transmission. It is observed in Fig. 8 that even with eight receivers, most ackets are transmitted uncoded. Receivers are even more likely to have uncoded ackets in their buffer, since they erform Gaussian elimination. Fig. 8 shows that the receiver buffer usually contains decoded ackets only. To demonstrate the effect of this, say we have a receiver r who at time t has U r (t) undelivered ackets stored in its buffer. If the effective sender ueue contains B r (t) ackets which this receiver has not delivered, we can also exress the receiver s effective Markov state as s r(t) = B r (t) U r (t ). (3) The coding scheme takes receivers for which s r(t) >, and 224

6 Probability Sender transmissions Receiver buffer Number of ackets Fig. 8. For Scheme B with four and eight receivers, the roortion of time that (a) a given number of ackets are coded together in sender transmissions, and (b) a given number of undecoded ackets are resent in the receivers buffers. λ =.7,µ =.8. Chance decoding robability (t)=2 bounds (t)=3 bounds (t)=2 simulation (t)=3 simulation Number of stored undelivered ackets Fig. 9. Scheme B four-receiver chance decoding robabilities as a function of s r(t) and U r(t), where λ =.7,µ =.8. The time-consuming nature of the simulation meant that only a small amount of data was obtained, therefore fluctuations are observable in the simulation results. grous them by the index of their oldest undecoded acket. Ordering these indices from n for the newest undecoded acket to n k for the oldest, we must determine v s (t) that will be innovative to all corresonding receivers. The sender begins with v s (t) =, then taking n i = n,...,n k, tests if the receivers corresonding to n i already have v s (t) in their knowledge sace. If so, an aroriate multile of e ni is added to v s (t). Otherwise v s (t) remains unchanged. By the time the sender reaches n i, v s (t) contains at most i nonzero coefficients. If we assume these coefficients along with the ackets in the receiver s buffer are indeendently selected, then whether or not v s (t) so far is innovative deends on whether its nonzero coefficients corresond to ackets the receiver already has. This robability is bounded between U r (t )/(B r (t) ) if v s (t) has only one nonzero coefficient so far, and ( U r(t ) ) ( R / Br(t) ) R if in the worst case, vs (t) has already coded all other R ackets. The simulation data of Fig. 9 agrees reasonably well with theoretical bounds. VI. CONCLUSION We have shown that acket delivery can be divided into three categories: zero state decoding, receiving while a leader, and chance decoding. All schemes satisfying the innovative guarantee roerty have the same zero state decoding robability, and using a Markov chain model the distribution of zero state decoding cycle lengths was determined. Analysing the leader state distribution, we found a relationshi with the number of receivers as well as the transmission and recetion rates. The chance decoding robability was found to vary dramatically between transmission schemes. Comared to Scheme A [4], [], Scheme B [5], in which uncoded ackets are sent more often, results in a better chance decoding robability and is hence more attractive in ractice. Although here we have only studied throughut otimal schemes, in future our work can be used to modify such schemes to give throughut-delay tradeoffs more suited to their alications. Knowledge of the receivers erformance under different conditions would give a sender the ability to dynamically determine the most aroriate sending rate, transmitting at higher rates during more favourable conditions and lower rates during unusually bad channel conditions. This would allow broadcast networks to rovide users with the best ossible exerience using the available resources. ACKNOWLEDGMENT This work was suorted under Australian Research Council Discovery Projects funding scheme, roject no. DP26. REFERENCES [] C. Fragouli, D. Lun, M. Médard, and P. Pakzad, On feedback for network coding, in Information Sciences and Systems, 27. CISS 7. 4st Annual Conference on, 27, [2] R. Ahlswede, N. Cai, S. Li, and R. Yeung, Network information flow, Information Theory, IEEE Transactions on, vol. 46, no. 4, , 22. [3] R. Koetter and M. Medard, An algebraic aroach to network coding, IEEE/ACM transactions on networking, vol., no. 5, , 23. [4] K. Sundararajan, D. Shah, and M. Médard, ARQ for network coding, in Information Theory, 28. ISIT 28. IEEE International Symosium on. IEEE, 28, [5] J. Sundararajan, P. Sadeghi, and M. Médard, A feedback-based adative broadcast coding scheme for reducing in-order delivery delay, in Network Coding, Theory, and Alications, 29. NetCod 9. Worksho on. IEEE, 2,. 6. [6] P. Sadeghi, R. Shams, and D. Traskov, An otimal adative network coding scheme for minimizing decoding delay in broadcast erasure channels, EURASIP Journal on Wireless Communications and Networking, vol. 2,. 4, 2. [7] R. Costa, D. Munaretto, J. Widmer, and J. Barros, Informed network coding for minimum decoding delay, in Mobile Ad Hoc and Sensor Systems, 28. MASS 28. 5th IEEE International Conference on, oct. 2 28, [8] S. Sorour and S. Valaee, On minimizing broadcast comletion delay for instantly decodable network coding, in Communications (ICC), 2 IEEE International Conference on, May 2,. 5. [9] J. Barros, R. Costa, D. Munaretto, and J. Widmer, Effective delay control in online network coding, in INFOCOM 29, IEEE, 29, [] J. Sundararajan, D. Shah, and M. Medard, Feedback-based online network coding, submitted to IEEE Transactions on Information Theory, 29. [] R. Brualdi and K. Bogart, Introductory combinatorics. Prentice Hall,

Efficient Importance Sampling for Monte Carlo Simulation of Multicast Networks

Efficient Importance Sampling for Monte Carlo Simulation of Multicast Networks Efficient Imortance Samling for Monte Carlo Simulation of Multicast Networks P. Lassila, J. Karvo and J. Virtamo Laboratory of Telecommunications Technology Helsinki University of Technology P.O.Box 3000,

More information

Properties of Mobile Tactical Radio Networks on VHF Bands

Properties of Mobile Tactical Radio Networks on VHF Bands Proerties of Mobile Tactical Radio Networks on VHF Bands Li Li, Phil Vigneron Communications Research Centre Canada Ottawa, Canada li.li@crc.gc.ca / hil.vigneron@crc.gc.ca ABSTRACT This work extends a

More information

On Coding for Cooperative Data Exchange

On Coding for Cooperative Data Exchange On Coding for Cooperative Data Exchange Salim El Rouayheb Texas A&M University Email: rouayheb@tamu.edu Alex Sprintson Texas A&M University Email: spalex@tamu.edu Parastoo Sadeghi Australian National University

More information

Performance Analysis of Battery Power Management Schemes in Wireless Mobile. Devices

Performance Analysis of Battery Power Management Schemes in Wireless Mobile. Devices Performance Analysis of Battery Power Management Schemes in Wireless Mobile Devices Balakrishna J Prabhu, A Chockalingam and Vinod Sharma Det of ECE, Indian Institute of Science, Bangalore, INDIA Abstract

More information

Transmitter Antenna Diversity and Adaptive Signaling Using Long Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1

Transmitter Antenna Diversity and Adaptive Signaling Using Long Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1 Transmitter Antenna Diversity and Adative Signaling Using ong Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1 Shengquan Hu, Tugay Eyceoz, Alexandra Duel-Hallen North Carolina State University

More information

High resolution radar signal detection based on feature analysis

High resolution radar signal detection based on feature analysis Available online www.jocr.com Journal of Chemical and Pharmaceutical Research, 4, 6(6):73-77 Research Article ISSN : 975-7384 CODEN(USA) : JCPRC5 High resolution radar signal detection based on feature

More information

An Overview of PAPR Reduction Optimization Algorithm for MC-CDMA System

An Overview of PAPR Reduction Optimization Algorithm for MC-CDMA System RESEARCH ARTICLE OPEN ACCESS An Overview of PAPR Reduction Otimization Algorithm for MC-CDMA System Kanchan Singla*, Rajbir Kaur**, Gagandee Kaur*** *(Deartment of Electronics and Communication, Punjabi

More information

Uplink Scheduling in Wireless Networks with Successive Interference Cancellation

Uplink Scheduling in Wireless Networks with Successive Interference Cancellation 1 Ulink Scheduling in Wireless Networks with Successive Interference Cancellation Majid Ghaderi, Member, IEEE, and Mohsen Mollanoori, Student Member, IEEE, Abstract In this aer, we study the roblem of

More information

Performance Analysis of MIMO System using Space Division Multiplexing Algorithms

Performance Analysis of MIMO System using Space Division Multiplexing Algorithms Performance Analysis of MIMO System using Sace Division Multilexing Algorithms Dr.C.Poongodi 1, Dr D Deea, M. Renuga Devi 3 and N Sasireka 3 1, Professor, Deartment of ECE 3 Assistant Professor, Deartment

More information

Analysis of Mean Access Delay in Variable-Window CSMA

Analysis of Mean Access Delay in Variable-Window CSMA Sensors 007, 7, 3535-3559 sensors ISSN 44-80 007 by MDPI www.mdi.org/sensors Full Research Paer Analysis of Mean Access Delay in Variable-Window CSMA Marek Miśkowicz AGH University of Science and Technology,

More information

Random Access Compressed Sensing in Underwater Sensor Networks

Random Access Compressed Sensing in Underwater Sensor Networks Random Access Comressed Sensing in Underwater Sensor Networks Fatemeh Fazel Northeastern University Boston, MA 2115 Email: ffazel@ece.neu.edu Maryam Fazel University of Washington Seattle, WA 98195 Email:

More information

Prediction Efficiency in Predictive p-csma/cd

Prediction Efficiency in Predictive p-csma/cd Prediction Efficiency in Predictive -CSMA/CD Mare Miśowicz AGH University of Science and Technology, Deartment of Electronics al. Miciewicza 30, 30-059 Kraów, Poland misow@agh.edu.l Abstract. Predictive

More information

University of Twente

University of Twente University of Twente Faculty of Electrical Engineering, Mathematics & Comuter Science Design of an audio ower amlifier with a notch in the outut imedance Remco Twelkemeijer MSc. Thesis May 008 Suervisors:

More information

Antenna Selection Scheme for Wireless Channels Utilizing Differential Space-Time Modulation

Antenna Selection Scheme for Wireless Channels Utilizing Differential Space-Time Modulation Antenna Selection Scheme for Wireless Channels Utilizing Differential Sace-Time Modulation Le Chung Tran and Tadeusz A. Wysocki School of Electrical, Comuter and Telecommunications Engineering Wollongong

More information

Initial Ranging for WiMAX (802.16e) OFDMA

Initial Ranging for WiMAX (802.16e) OFDMA Initial Ranging for WiMAX (80.16e) OFDMA Hisham A. Mahmoud, Huseyin Arslan Mehmet Kemal Ozdemir Electrical Engineering Det., Univ. of South Florida Logus Broadband Wireless Solutions 40 E. Fowler Ave.,

More information

Is 1 a Square Modulo p? Is 2?

Is 1 a Square Modulo p? Is 2? Chater 21 Is 1 a Square Modulo? Is 2? In the revious chater we took various rimes and looked at the a s that were quadratic residues and the a s that were nonresidues. For examle, we made a table of squares

More information

Optimal p-persistent MAC algorithm for event-driven Wireless Sensor Networks

Optimal p-persistent MAC algorithm for event-driven Wireless Sensor Networks Otimal -ersistent MAC algorithm for event-driven Wireless Sensor Networks J. Vales-Alonso,E.Egea-Lóez, M. V. Bueno-Delgado, J. L. Sieiro-Lomba, J. García-Haro Deartment of Information Technologies and

More information

Delivery Time Reduction for Order-Constrained Applications using Binary Network Codes

Delivery Time Reduction for Order-Constrained Applications using Binary Network Codes Delivery Time Reduction for Order-Constrained Applications using Binary Network Codes Ahmed Douik, Mohammad S. Karim, Parastoo Sadeghi, and Sameh Sorour California Institute of Technology (Caltech), California,

More information

Mathematical and Computer Modelling. On the characterization of Aloha in underwater wireless networks

Mathematical and Computer Modelling. On the characterization of Aloha in underwater wireless networks Mathematical and Comuter Modelling 53 (2011) 2093 2107 Contents lists available at ScienceDirect Mathematical and Comuter Modelling journal homeage: www.elsevier.com/locate/mcm On the characterization

More information

Ultra Wideband System Performance Studies in AWGN Channel with Intentional Interference

Ultra Wideband System Performance Studies in AWGN Channel with Intentional Interference Ultra Wideband System Performance Studies in AWGN Channel with Intentional Interference Matti Hämäläinen, Raffaello Tesi, Veikko Hovinen, Niina Laine, Jari Iinatti Centre for Wireless Communications, University

More information

Economics of Strategy (ECON 4550) Maymester 2015 Foundations of Game Theory

Economics of Strategy (ECON 4550) Maymester 2015 Foundations of Game Theory Economics of Strategy (ECON 4550) Maymester 05 Foundations of Game Theory Reading: Game Theory (ECON 4550 Courseak, Page 95) Definitions and Concets: Game Theory study of decision making settings in which

More information

UNDERWATER ACOUSTIC CHANNEL ESTIMATION USING STRUCTURED SPARSITY

UNDERWATER ACOUSTIC CHANNEL ESTIMATION USING STRUCTURED SPARSITY UNDERWATER ACOUSTIC CHANNEL ESTIMATION USING STRUCTURED SPARSITY Ehsan Zamanizadeh a, João Gomes b, José Bioucas-Dias c, Ilkka Karasalo d a,b Institute for Systems and Robotics, Instituto Suerior Técnico,

More information

and assigned priority levels in accordance with the QoS requirements of their applications.

and assigned priority levels in accordance with the QoS requirements of their applications. Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm Vasco Quintyne *, Adrian Als Deartment of Comuter Science, Physics and Mathematics University of the West Indies

More information

Servo Mechanism Technique based Anti-Reset Windup PI Controller for Pressure Process Station

Servo Mechanism Technique based Anti-Reset Windup PI Controller for Pressure Process Station Indian Journal of Science and Technology, Vol 9(11), DOI: 10.17485/ijst/2016/v9i11/89298, March 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Servo Mechanism Technique based Anti-Reset Windu

More information

Depth of Focus and the Alternating Phase Shift Mask

Depth of Focus and the Alternating Phase Shift Mask T h e L i t h o g r a h y E x e r t (November 4) Deth of Focus and the Alternating Phase Shift Mask Chris A. Mack, KLA-Tencor, FINLE Division, Austin, Texas One of the biggest advantages of the use of

More information

Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation

Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation International Journal Of Comutational Engineering Research (ijceronline.com) Vol. 2 Issue. Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation Rajbir Kaur 1, Charanjit

More information

A Novel Image Component Transmission Approach to Improve Image Quality and Energy Efficiency in Wireless Sensor Networks

A Novel Image Component Transmission Approach to Improve Image Quality and Energy Efficiency in Wireless Sensor Networks Journal of Comuter Science 3 (5: 353-360, 2007 ISSN 1549-3636 2007 Science Publications A Novel Image Comonent Transmission Aroach to Imrove Image Quality and nergy fficiency in Wireless Sensor Networks

More information

Adaptive Switching between Spatial Diversity and Multiplexing: a Cross-layer Approach

Adaptive Switching between Spatial Diversity and Multiplexing: a Cross-layer Approach Adative Switching between Satial Diversity and ultilexing: a Cross-layer Aroach José Lóez Vicario and Carles Antón-Haro Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) c/ Gran Caità -4, 08034

More information

A Genetic Algorithm Approach for Sensorless Speed Estimation by using Rotor Slot Harmonics

A Genetic Algorithm Approach for Sensorless Speed Estimation by using Rotor Slot Harmonics A Genetic Algorithm Aroach for Sensorless Seed Estimation by using Rotor Slot Harmonics Hayri Arabaci Abstract In this aer a sensorless seed estimation method with genetic algorithm for squirrel cage induction

More information

A Resource Allocation Algorithm using Frequency Borrowing in Hierarchical CDMA Cellular Systems

A Resource Allocation Algorithm using Frequency Borrowing in Hierarchical CDMA Cellular Systems A Resource Allocation Algorithm using Frequency Borrowing in Hierarchical CDMA Cellular Systems Young-uk Chung and Dong-Ho Cho Division o Electrical Engineering Deartment o Electrical Engineering and Comuter

More information

Lab 4: The transformer

Lab 4: The transformer ab 4: The transformer EEC 305 July 8 05 Read this lab before your lab eriod and answer the questions marked as relaboratory. You must show your re-laboratory answers to the TA rior to starting the lab.

More information

FOUNTAIN codes [1], [2] have been introduced to achieve

FOUNTAIN codes [1], [2] have been introduced to achieve Controlled Flooding of Fountain Codes Waqas bin Abbas, Paolo Casari, Senior Member, IEEE, Michele Zorzi, Fellow, IEEE Abstract We consider a multiho network where a source node must reliably deliver a

More information

Accurate wireless channel modeling for efficient adaptive Forward Error Correction in JPEG 2000 video streaming systems

Accurate wireless channel modeling for efficient adaptive Forward Error Correction in JPEG 2000 video streaming systems International Journal of Engineering Research and Develoment e-iss: 78-067X, -ISS: 78-800X, www.ijerd.com olume 0, Issue (December 04), PP.30-38 Accurate wireless channel modeling for efficient adative

More information

ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM

ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM Kaushal Patel 1 1 M.E Student, ECE Deartment, A D Patel Institute of Technology, V. V. Nagar, Gujarat, India ABSTRACT Today, in

More information

SQUARING THE MAGIC SQUARES OF ORDER 4

SQUARING THE MAGIC SQUARES OF ORDER 4 Journal of lgebra Number Theory: dvances and lications Volume 7 Number Pages -6 SQURING THE MGIC SQURES OF ORDER STEFNO BRBERO UMBERTO CERRUTI and NDIR MURRU Deartment of Mathematics University of Turin

More information

LDPC-Coded MIMO Receiver Design Over Unknown Fading Channels

LDPC-Coded MIMO Receiver Design Over Unknown Fading Channels LDPC-Coded MIMO Receiver Design Over Unknown Fading Channels Jun Zheng and Bhaskar D. Rao University of California at San Diego Email: juzheng@ucsd.edu, brao@ece.ucsd.edu Abstract We consider an LDPC-coded

More information

Reliability and Criticality Analysis of Communication Networks by Stochastic Computation

Reliability and Criticality Analysis of Communication Networks by Stochastic Computation > EPLACE HIS LINE WIH YOU PAPE IDENIFICAION NUMBE (DOUBLE-CLICK HEE O EDI) < 1 eliability and Criticality Analysis of Communication Networks by Stochastic Comutation Peican Zhu, Jie Han, Yangming Guo and

More information

Analysis of Pseudorange-Based DGPS after Multipath Mitigation

Analysis of Pseudorange-Based DGPS after Multipath Mitigation International Journal of Scientific and Research Publications, Volume 7, Issue 11, November 2017 77 Analysis of Pseudorange-Based DGPS after Multiath Mitigation ThilanthaDammalage Deartment of Remote Sensing

More information

Operating Characteristics of Underlay Cognitive Relay Networks

Operating Characteristics of Underlay Cognitive Relay Networks Oerating Characteristics of Underlay Cognitive Relay Networks Ankit Kaushik, Ralh Tanbourgi, Friedrich Jondral Communications Engineering Lab Karlsruhe Institute of Technology (KIT) {Ankit.Kaushik, Ralh.Tanbourgi,

More information

RICIAN FADING DISTRIBUTION FOR 40GHZ CHANNELS

RICIAN FADING DISTRIBUTION FOR 40GHZ CHANNELS Jan 006 RICIAN FADING DISTRIBUTION FOR 40GHZ CHANNELS.0 Background and Theory Amlitude fading in a general multiath environment may follow different distributions deending recisely on the area covered

More information

A Pricing-Based Cooperative Spectrum Sharing Stackelberg Game

A Pricing-Based Cooperative Spectrum Sharing Stackelberg Game A Pricing-Based Cooerative Sectrum Sharing Stackelberg Game Ramy E. Ali, Karim G. Seddik, Mohammed Nafie, and Fadel F. Digham? Wireless Intelligent Networks Center (WINC), Nile University, Smart Village,

More information

Random Access Compressed Sensing for Energy-Efficient Underwater Sensor Networks

Random Access Compressed Sensing for Energy-Efficient Underwater Sensor Networks Random Access Comressed Sensing for Energy-Efficient Underwater Sensor Networks Fatemeh Fazel, Maryam Fazel and Milica Stojanovic Abstract Insired by the theory of comressed sensing and emloying random

More information

Chapter 7 Local Navigation: Obstacle Avoidance

Chapter 7 Local Navigation: Obstacle Avoidance Chater 7 Local Navigation: Obstacle Avoidance A mobile robot must navigate from one oint to another in its environment. This can be a simle task, for examle, if a robot can follow an unobstructed line

More information

Optimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm

Optimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm o Otimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm Nirvana S. Antonio, Cícero F. F. Costa Filho, Marly G. F. Costa, Rafael Padilla Abstract In 4-sided dominoes,

More information

A Comparative Study on Compensating Current Generation Algorithms for Shunt Active Filter under Non-linear Load Conditions

A Comparative Study on Compensating Current Generation Algorithms for Shunt Active Filter under Non-linear Load Conditions International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 A Comarative Study on Comensating Current Generation Algorithms for Shunt Active Filter under Non-linear Conditions

More information

Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional Spread-Spectrum Systems

Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional Spread-Spectrum Systems I TRANSACTIONS ON CIRCUITS AND SYTMS I: FUNDAMNTAL THORY AND APPLICATIONS, VOL. 50, NO., NOVMBR 2003 475 Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional

More information

Application of Notch Filtering under Low Sampling Rate for Broken Rotor Bar Detection with DTFT and AR based Spectrum Methods

Application of Notch Filtering under Low Sampling Rate for Broken Rotor Bar Detection with DTFT and AR based Spectrum Methods Alication of Notch Filtering under Low Samling Rate for Broken Rotor Bar Detection with DTFT and AR based Sectrum Methods B. Ayhan H. J. Trussell M.-Y. Chow M.-H. Song IEEE Student Member IEEE Fellow IEEE

More information

The Optimization Model and Algorithm for Train Connection at Transfer Stations in Urban Rail Transit Network

The Optimization Model and Algorithm for Train Connection at Transfer Stations in Urban Rail Transit Network Send Orders for Rerints to rerints@benthamscienceae 690 The Oen Cybernetics & Systemics Journal, 05, 9, 690-698 Oen Access The Otimization Model and Algorithm for Train Connection at Transfer Stations

More information

Approximated fast estimator for the shape parameter of generalized Gaussian distribution for a small sample size

Approximated fast estimator for the shape parameter of generalized Gaussian distribution for a small sample size BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES, Vol. 63, No. 2, 2015 DOI: 10.1515/basts-2015-0046 Aroximated fast estimator for the shae arameter of generalized Gaussian distribution for

More information

Primary User Enters the Game: Performance of Dynamic Spectrum Leasing in Cognitive Radio Networks

Primary User Enters the Game: Performance of Dynamic Spectrum Leasing in Cognitive Radio Networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO., DECEMBER 365 Primary User Enters the Game: Performance of Dynamic Sectrum Leasing in Cognitive Radio Networks Gonzalo Vazquez-Vilar, Student Member,

More information

A Multi-View Nonlinear Active Shape Model Using Kernel PCA

A Multi-View Nonlinear Active Shape Model Using Kernel PCA A Multi-View Nonlinear Active Shae Model Using Kernel PCA Sami Romdhani y, Shaogang Gong z and Alexandra Psarrou y y Harrow School of Comuter Science, University of Westminster, Harrow HA1 3TP, UK [rodhams

More information

Product Accumulate Codes on Fading Channels

Product Accumulate Codes on Fading Channels Product Accumulate Codes on Fading Channels Krishna R. Narayanan, Jing Li and Costas Georghiades Det of Electrical Engineering Texas A&M University, College Station, TX 77843 Abstract Product accumulate

More information

The Gini Coefficient: An Application to Greece

The Gini Coefficient: An Application to Greece International Journal of Economics and Finance; Vol. 10, No. 3; 2018 ISSN 1916-971X E-ISSN 1916-9728 Published by Canadian Center of Science and Education The Gini Coefficient: An Alication to Greece Augustine

More information

An Alternative Single Parameter Functional Form for Lorenz Curve

An Alternative Single Parameter Functional Form for Lorenz Curve Crawford School of Public Policy Crawford School working aers An Alternative Single Parameter Functional Form for Lorenz Curve Crawford School Working Paer 7 Setember 07 Satya Paul Amrita University, India

More information

LAB IX. LOW FREQUENCY CHARACTERISTICS OF JFETS

LAB IX. LOW FREQUENCY CHARACTERISTICS OF JFETS LAB X. LOW FREQUENCY CHARACTERSTCS OF JFETS 1. OBJECTVE n this lab, you will study the -V characteristics and small-signal model of Junction Field Effect Transistors (JFET).. OVERVEW n this lab, we will

More information

The Impact of Random Waypoint Mobility on Infrastructure Wireless Networks

The Impact of Random Waypoint Mobility on Infrastructure Wireless Networks The Imact of Random Wayoint Mobility on Infrastructure Wireless Networks Dennis Pong and Tim Moors School of Electrical Engineering and Telecommunications The University of New South Wales, NSW 5 Australia

More information

Professor Fearing EECS150/Problem Set 10 Solution Fall 2013 Released December 13, 2013

Professor Fearing EECS150/Problem Set 10 Solution Fall 2013 Released December 13, 2013 Professor Fearing EECS150/Problem Set 10 Solution Fall 2013 Released December 13, 2013 1. Fast u counter. An u counter has next state decoder NS = PS + 1. Design a 16 bit Carry Look Ahead incrementer (add

More information

Data-precoded algorithm for multiple-relayassisted

Data-precoded algorithm for multiple-relayassisted RESEARCH Oen Access Data-recoded algorithm for multile-relayassisted systems Sara Teodoro *, Adão Silva, João M Gil and Atílio Gameiro Abstract A data-recoded relay-assisted (RA scheme is roosed for a

More information

State-of-the-Art Verification of the Hard Driven GTO Inverter Development for a 100 MVA Intertie

State-of-the-Art Verification of the Hard Driven GTO Inverter Development for a 100 MVA Intertie State-of-the-Art Verification of the Hard Driven GTO Inverter Develoment for a 100 MVA Intertie P. K. Steimer, H. Grüning, J. Werninger R&D Drives and Power Electronics ABB Industrie AG CH-5300 Turgi,

More information

Compression Waveforms for Non-Coherent Radar

Compression Waveforms for Non-Coherent Radar Comression Waveforms for Non-Coherent Radar Uri Peer and Nadav Levanon el Aviv University P. O. Bo 39, el Aviv, 69978 Israel nadav@eng.tau.ac.il Abstract - Non-coherent ulse comression (NCPC) was suggested

More information

Multi-TOA Based Position Estimation for IR-UWB

Multi-TOA Based Position Estimation for IR-UWB Multi-TOA Based Position Estimation for IR-UWB Genís Floriach, Montse Nájar and Monica Navarro Deartment of Signal Theory and Communications Universitat Politècnica de Catalunya (UPC), Barcelona, Sain

More information

Design of PID Controller Based on an Expert System

Design of PID Controller Based on an Expert System International Journal of Comuter, Consumer and Control (IJ3C), Vol. 3, No.1 (014) 31 Design of PID Controller Based on an Exert System Wei Li Abstract For the instability of traditional control systems,

More information

Evolutionary Circuit Design: Information Theory Perspective on Signal Propagation

Evolutionary Circuit Design: Information Theory Perspective on Signal Propagation Evolutionary Circuit Design: Theory Persective on Signal Proagation Denis Poel Deartment of Comuter Science, Baker University, P.O. 65, Baldwin City, KS 66006, E-mail: oel@ieee.org Nawar Hakeem Deartment

More information

SPACE-FREQUENCY CODED OFDM FOR UNDERWATER ACOUSTIC COMMUNICATIONS

SPACE-FREQUENCY CODED OFDM FOR UNDERWATER ACOUSTIC COMMUNICATIONS SPACE-FREQUENCY CODED OFDM FOR UNDERWATER ACOUSTIC COMMUNICATIONS E. V. Zorita and M. Stojanovic MITSG 12-35 Sea Grant College Program Massachusetts Institute of Technology Cambridge, Massachusetts 02139

More information

Entropy Coding. Outline. Entropy. Definitions. log. A = {a, b, c, d, e}

Entropy Coding. Outline. Entropy. Definitions. log. A = {a, b, c, d, e} Outline efinition of ntroy Three ntroy coding techniques: Huffman coding rithmetic coding Lemel-Ziv coding ntroy oding (taken from the Technion) ntroy ntroy of a set of elements e,,e n with robabilities,

More information

ABB Semiconductors AG Section 2 SECTION 2 PRODUCT DESIGN BY NORBERT GALSTER SVEN KLAKA ANDRÉ WEBER S 2-1

ABB Semiconductors AG Section 2 SECTION 2 PRODUCT DESIGN BY NORBERT GALSTER SVEN KLAKA ANDRÉ WEBER S 2-1 SECTION 2 PRODUCT DESIGN BY NORBERT GALSTER SVEN KLAKA ANDRÉ WEBER S 2-1 PRODUCT DESIGN 2.1 GTOs The gate turn off thyristor (GTO) is a very high ower semiconductor switch, destined for use in industrial

More information

On Delay Performance Gains From Network Coding

On Delay Performance Gains From Network Coding On Delay Performance Gains From Network Coding Atilla Eryilmaz Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge, MA, 02139 Email: eryilmaz@mit.edu (Invited

More information

Software for Modeling Estimated Respiratory Waveform

Software for Modeling Estimated Respiratory Waveform Software for Modeling Estimated Resiratory Waveform Aleksei E. Zhdanov, Leonid G. Dorosinsky Abstract In the imaging of chest or abdomen, motion artifact is an unavoidable roblem. In the radiation treatment,

More information

Control of Grid Integrated Voltage Source Converters under Unbalanced Conditions

Control of Grid Integrated Voltage Source Converters under Unbalanced Conditions Jon Are Suul Control of Grid Integrated Voltage Source Converters under Unbalanced Conditions Develoment of an On-line Frequency-adative Virtual Flux-based Aroach Thesis for the degree of Philosohiae Doctor

More information

An Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ

An Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ An Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ Rong Lin y Koji Nakano z Stehan Olariu x Albert Y. Zomaya Abstract We roose an efficient reconfigurable arallel refix counting

More information

Comparison of image-based functional monitoring through resampling and compression Steven J. Simske, Margaret Sturgill, Jason S.

Comparison of image-based functional monitoring through resampling and compression Steven J. Simske, Margaret Sturgill, Jason S. Comarison of image-based functional monitoring through resamling and comression Steven J. Simse, Margaret Sturgill, Jason S. Aronoff HP Laboratories HPL-2009-145 Keyword(s): Image forensics, counterfeit

More information

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern

More information

Performance Analysis of SR-ARQ Based on Geom/G/1/ Queue over Wireless Link

Performance Analysis of SR-ARQ Based on Geom/G/1/ Queue over Wireless Link Al. Math. Inf. Sci. 7, No. 5, 1969-1976 (013) 1969 Alied Mathematics & Information Sciences An International Journal htt://dx.doi.org/10.1785/amis/070536 Performance Analysis of SR-ARQ Based on Geom/G/1/

More information

Analysis of Electronic Circuits with the Signal Flow Graph Method

Analysis of Electronic Circuits with the Signal Flow Graph Method Circuits and Systems, 207, 8, 26-274 htt://www.scir.org/journal/cs ISSN Online: 253-293 ISSN Print: 253-285 Analysis of Electronic Circuits with the Signal Flow Grah Method Feim Ridvan Rasim, Sebastian

More information

A Novel, Robust DSP-Based Indirect Rotor Position Estimation for Permanent Magnet AC Motors Without Rotor Saliency

A Novel, Robust DSP-Based Indirect Rotor Position Estimation for Permanent Magnet AC Motors Without Rotor Saliency IEEE TANSACTIONS ON POWE EECTONICS, VO. 18, NO. 2, MACH 2003 539 A Novel, obust DSP-Based Indirect otor Position Estimation for Permanent Magnet AC Motors Without otor Saliency i Ying and Nesimi Ertugrul,

More information

EXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER

EXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER YEDITEPE UNIVERSITY ENGINEERING & ARCHITECTURE FACULTY INDUSTRIAL ELECTRONICS LABORATORY EE 432 INDUSTRIAL ELECTRONICS EXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER Introduction:

More information

Performance of Single-tone and Two-tone Frequency-shift Keying for Ultrawideband

Performance of Single-tone and Two-tone Frequency-shift Keying for Ultrawideband erformance of Single-tone and Two-tone Frequency-shift Keying for Ultrawideband Cheng Luo Muriel Médard Electrical Engineering Electrical Engineering and Computer Science, and Computer Science, Massachusetts

More information

D-BLAST Lattice Codes for MIMO Block Rayleigh Fading Channels Λ

D-BLAST Lattice Codes for MIMO Block Rayleigh Fading Channels Λ D-BLAST Lattice Codes for MIMO Block Rayleigh Fading Channels Λ Narayan Prasad and Mahesh K. Varanasi e-mail: frasadn, varanasig@ds.colorado.edu University of Colorado, Boulder, CO 80309 October 1, 2002

More information

A New Method for Design of Robust Digital Circuits

A New Method for Design of Robust Digital Circuits A New Method for Design of Robust Digital Circuits Dinesh Patil, Sunghee Yun, Seung-Jean Kim, Alvin Cheung, Mark Horowitz and Stehen oyd Deartment of Electrical Engineering, Stanford University, Stanford,

More information

Tuning a GPS/IMU Kalman Filter for a Robot Driver

Tuning a GPS/IMU Kalman Filter for a Robot Driver Tuning a GPS/IMU Kalman Filter for a Robot Driver Jamie Bell, Karl A. Stol Deartment of Mechanical ngineering The University of Aucland Private Bag 92019 Aucland 1142 jbel060@ec.aucland.ac.nz Abstract

More information

Escaping from a Labyrinth with One-way Roads for Limited Robots

Escaping from a Labyrinth with One-way Roads for Limited Robots 1 Escaing from a Labyrinth with One-way Roads for Limited Robots Bernd Brüggemann Tom Kamhans Elmar Langetee FKIE, FGAN e.v., Bonn, Germany Institute of Comuter Science I, University of Bonn, Bonn, Germany

More information

A Game Theoretic Analysis of Distributed Power Control for Spread Spectrum Ad Hoc Networks

A Game Theoretic Analysis of Distributed Power Control for Spread Spectrum Ad Hoc Networks A Game Theoretic Analysis of Distributed ower Control for Sread Sectrum Ad Hoc Networs Jianwei Huang, Randall A. Berry, Michael L. Honig Deartment of Electrical & Comuter Engineering, Northwestern University,

More information

A toy-model for the regulation of cognitive radios

A toy-model for the regulation of cognitive radios A toy-model for the regulation of cognitive radios Kristen Woyach and Anant Sahai Wireless Foundations Deartment of EECS University of California at Berkeley Email: {kwoyach, sahai}@eecs.berkeley.edu Abstract

More information

UNDERWATER sensor networks are envisioned as consisting

UNDERWATER sensor networks are envisioned as consisting 66 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 8, SEPTEMBER 2 Random Access Comressed Sensing for Energy-Efficient Underwater Sensor Networks Fatemeh Fazel, Maryam Fazel and Milica Stojanovic

More information

Decorrelation distance characterization of long term fading of CW MIMO channels in urban multicell environment

Decorrelation distance characterization of long term fading of CW MIMO channels in urban multicell environment Decorrelation distance characterization of long term fading of CW MIMO channels in urban multicell environment Alayon Glazunov, Andres; Wang, Ying; Zetterberg, Per Published in: 8th International Conference

More information

Keywords: Adaptive genetic algorithm, Call Admission Control (CAC), Code-Division Multiple Access (CDMA), dynamic code assignment

Keywords: Adaptive genetic algorithm, Call Admission Control (CAC), Code-Division Multiple Access (CDMA), dynamic code assignment Research Journal of Alied Sciences, Engineering and Technology 7(12): 2545-2553, 2014 DOI:10.19026/rjaset.7.565 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Cor. Submitted: August

More information

Revisiting Weighted Stego-Image Steganalysis

Revisiting Weighted Stego-Image Steganalysis Revisiting Weighted Stego-Image Steganalysis Andrew D. Ker a and Rainer Böhme b a Oxford University Comuting Laboratory, Parks Road, Oxford OX 3QD, England; b Technische Universität Dresden, Institute

More information

Opportunistic Communications under Energy & Delay Constraints

Opportunistic Communications under Energy & Delay Constraints Opportunistic Communications under Energy & Delay Constraints Narayan Mandayam (joint work with Henry Wang) Opportunistic Communications Wireless Data on the Move Intermittent Connectivity Opportunities

More information

IEEE/ACM TRANSACTIONS ON NETWORKING 1

IEEE/ACM TRANSACTIONS ON NETWORKING 1 IEEE/ACM TRANSACTIONS ON NETWORKING 1 Otimal Power Allocation and Scheduling Under Jamming Attacks Salvatore D Oro, Eylem Ekici, and Sergio Palazzo Abstract In this aer, we consider a jammed wireless scenario

More information

Origins of Stator Current Spectra in DFIGs with Winding Faults and Excitation Asymmetries

Origins of Stator Current Spectra in DFIGs with Winding Faults and Excitation Asymmetries Origins of Stator Current Sectra in DFIGs with Wing Faults and Excitation Asymmetries S. Williamson * and S. Djurović * University of Surrey, Guildford, Surrey GU2 7XH, United Kingdom School of Electrical

More information

Multiband Differential Modulation for UWB Communication Systems

Multiband Differential Modulation for UWB Communication Systems Multiband Differential Modulation for UWB Communication Systems Thanongsak Himsoon, Weifeng Su,andK.J.RayLiu Deartment of Electrical and Comuter Engineering, University of Maryland, College Park, MD 074.

More information

Circular Dynamic Stereo and Its Image Processing

Circular Dynamic Stereo and Its Image Processing Circular Dynamic Stereo and Its Image Processing Kikuhito KAWASUE *1 and Yuichiro Oya *2 *1 Deartment of Mechanical Systems Engineering Miyazaki University 1-1, Gakuen Kibanadai Nishi, Miyazaki 889-2192

More information

Improved Water-Filling Power Allocation for Energy-Efficient Massive MIMO Downlink Transmissions

Improved Water-Filling Power Allocation for Energy-Efficient Massive MIMO Downlink Transmissions INTL JOUNAL OF ELECTONICS AND TELECOMMUNICATIONS, 17, VOL. 63, NO. 1,. 79-84 Manuscrit received October 7, 16; revised December, 16. DOI: 1.1515/eletel-17-11 Imroved Water-Filling ower Allocation for Energy-Efficient

More information

Capacity Gain From Two-Transmitter and Two-Receiver Cooperation

Capacity Gain From Two-Transmitter and Two-Receiver Cooperation 3822 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 Caacity Gain From Two-Transmitter and Two-Receiver Cooeration Chris T. K. Ng, Student Member, IEEE, Nihar Jindal, Member, IEEE,

More information

Cone of Silence: Adaptively Nulling Interferers in Wireless Networks

Cone of Silence: Adaptively Nulling Interferers in Wireless Networks UCL DEPARTMENT OF COMPUTER SCIENCE Research Note RN/1/ Cone of Silence: Adatively Nulling Interferers in Wireless Networks 3 th January 1 Georgios Nikolaidis Astrit Zhushi Kyle Jamieson Brad Kar Abstract

More information

RECOMMENDATION ITU-R SF

RECOMMENDATION ITU-R SF Rec. ITU-R SF.1649-1 1 RECOMMENDATION ITU-R SF.1649-1 Guidance for determination of interference from earth stations on board vessels to stations in the fixed service when the earth station on board vessels

More information

Underwater acoustic channel model and variations due to changes in node and buoy positions

Underwater acoustic channel model and variations due to changes in node and buoy positions Volume 24 htt://acousticalsociety.org/ 5th Pacific Rim Underwater Acoustics Conference Vladivostok, Russia 23-26 Setember 2015 Underwater acoustic channel model and variations due to changes in node and

More information

EE 462: Laboratory Assignment 5 Biasing N- channel MOSFET Transistor

EE 462: Laboratory Assignment 5 Biasing N- channel MOSFET Transistor EE 46: Laboratory Assignment 5 Biasing N channel MOFET Transistor by r. A.V. adun and r... onohue (/1/07 Udated ring 008 by tehen Maloney eartment of Elecical and Comuter Engineering University of entucky

More information

Improvements of Bayesian Matting

Improvements of Bayesian Matting Imrovements of Bayesian Matting Mikhail Sindeyev, Vadim Konushin, Vladimir Vezhnevets Deartment of omutational Mathematics and ybernetics, Grahics and Media Lab Moscow State Lomonosov University, Moscow,

More information

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,

More information