Artificial Intersymbol Interference (ISI) to Exploit Receiver Imperfections for Secrecy
|
|
- Paulina Morton
- 6 years ago
- Views:
Transcription
1 Artificial Interymbol Interference ISI to Exploit Receiver Imperfection for Secrecy Azadeh Sheikholelami, Denni Goeckel and Hoein ihro-nik Electrical and Computer Engineering Department, Univerity of Maachuett, Amhert Abtract Secure communication over a wirele channel in the preence of a paive eavedropper i conidered. We preent a method to exploit the eavedropper inherent receiver vulnerabilitie to obtain everlating ecrecy. An ephemeral cryptographic key i pre-hared between the tranmitter and the legitimate receiver and i utilized to induce intentional interymbol interference ISI. The legitimate receiver ue the key to cancel the ISI while the eavedropper, ince it doe not have the key, cannot do uch. It i hown that although ISI reduce the capacity of the main channel, it can lead to a net gain in ecrecy rate. The achievable ecrecy rate for different ISI filter etting are evaluated and the propoed method i compared with other information-theoretic ecurity cheme. I. INTRODUCTION The meage ent over a wirele network are vulnerable to being overheard by any maliciou party in the coverage range of the tranmitter. The traditional way to prevent an eavedropper from obtaining a ecret meage i to encrypt the meage uch that decoding the cypher without having the key i beyond the eavedropper computational capability []. However, the vulnerability hown by many implemented cryptographic cheme, the lack of a fundamental proof etablihing the difficulty of the cheme, and the potential for tranformative change in computing motivate form of ecurity that are provably everlating. In particular, when a cryptographic cheme i employed, the adverary can record the clean cypher and recover it later when the cryptographic algorithm i broken [] or when the eavedropper obtain the key, which i not acceptable in enitive application requiring everlating ecrecy. The deire for uch everlating ecurity motivate conidering information-theoretic approache, where the eavedropper i unable to extract any information about the ecret meage from the received ignal. The feaibility of informationtheoretic ecurity wa demontrated by the eminal work of Wyner [3], where he howed for dicrete memoryle wiretap channel, that, if the eavedropper channel i degraded with repect to the main channel, adding randomne to the codebook allow perfect ecrecy to be achieved. Later, the idea wa extended to the more general cae where the eavedropper channel i not necearily degraded, but more noiy or le capable with repect to the main channel []. Thu, the deirable ituation for achieving information theoretic ecrecy i to have a better channel from the tranmitter to the intended receiver than that from the tranmitter to the eavedropper. However, thi i not alway guaranteed, a the eavedropper can be very cloe to the tranmitter or can ue a directional antenna to improve it received ignal, while the eavedropper location and it channel tate information i not known to the legitimate node. When uch an advantage doe not exit, approache baed on public dicuion [5], [] can be employed. However, thee approache, while they could be ued to generate an information-theoretically ecure one-time pad, are baically deigned for ecret key agreement by performing multiple two-way tranmiion and utilizing a public authenticated channel [7, Chapter 7.] rather than efficient one-way ecret communication. Recently, approache baed on the cooperative jamming approach of [8] have been conidered. However, all of thee approache require either multiple antenna, helper node, and/or fading, and many are uceptible to attack uch a pointing directive antenna. For a one-way cenario with a ingle antenna, Cachin and Maurer [9] exploited hardware limitation to obtain everlating ecurity, a i our interet. In particular, they introduced the bounded memory model in uch a way that the eavedropper i not able to tore the information it would need to eventually break the cypher. Thi novel approach uffer from two hortcoming: by Moore Law ee NAND caling plot at [], the denity of memorie increae at an exponential rate; memorie can be tacked arbitrarily ubject only to very large pace limitation. Hence, although the bounded memory model i a viable approach to everlating ecurity, it i difficult to pick a memory ize beyond which it will be effective and thu it i difficult to employ in wirele communication. Our approach to provide everlating ecurity i that, intead of attacking the memory in the receiver back-end, we attack the receiver front-end. In particular, the technology of analog-to-digital converter progree lowly and unlike memory, they cannot be tacked arbitrarily in fact, high-quality already employ parallelization to the limit of the jitter. Alo, importantly from a long-term perpective, there i a fundamental bound on the ability to perform converion [], []. Hence, our goal i to exploit the receiver analog-to-digital converion proceing effect for ecurity. The tranmitter Alice and the intended receiver Bob pre-hare a cryptographic key that only need to be kept ecret for the duration of the tranmiion i.e. it can be given to the
2 Alice Fig.. The tranmitter perform fat power modulation to obtain ecrecy by utilizing a cryptographic key pre-hared between Alice and Bob. eavedropper immediately afterward. By uing thi key, we conider inerting intentional ditortion on the tranmitted ignal. Since Bob know the ditortion, he can undo it effect before hi, wherea Eve mut tore the ignal and try to compenate for the ditortion after her ; however, he already lot the information he need to recover the meage. We conidered a rapid power modulation intance of thi approach in [3] and [], where the tranmitted ignal i modulated by two vatly different power level at the tranmitter Figure. Since Bob know the key, he can cancel the effect of power modulator before hi, putting hi ignal in the appropriate range for converion. On the other hand, Eve mut compromie between larger quantization noie and more overflow. Conequently, he will loe information he need to recover the meage and informationtheoretic ecurity i obtained. However, a clear rik of thi approach i an eavedropper with multiple. Motivated by the fact that an additive white Gauian noie AWGN channel will have a higher capacity than an interymbol interference channel under the ame output power contraint, we eek to induce an ISI channel for Eve while preerving an AWGN channel at Bob. The tranmitter i equipped with a linear filter with random coefficient that are taken baed on a pre-hared key between Alice and Bob. The ecret meage i broken into chunk of data with a guard interval between every two chunk and i tranmitted over the channel after going through the ISI filter. Bob, ince he know the key, place a filter before hi in concert with the ISI filter to cancel the ISI. In order to prevent Eve from performing any kind of adaptive equalization to cancel the ISI, the coefficient of the ISI filter are changed baed on the key during each chunk. By exploiting the reulting ditortion, information-theoretic ecrecy can be obtained, even if Eve i given the key immediately after meage tranmiion. The ret of paper i a follow. Section II decribe the ytem model, metric, and the propoed idea in detail. In Section III, the achievable ecrecy rate for the propoed method are characterized. In Section IV, the reult of numerical example for variou realization of the ytem and comparion of the propoed method to the public dicuion approache of [5], [] are preented. Concluion and idea for future work are dicued in Section V. Bob Eve II. SYSTEM MODEL AND AROACH A. Sytem Model A imple wiretap channel i conidered, which conit of a tranmitter, Alice, an intended receiver, Bob, and an eavedropper, Eve. The eavedropper i aumed to be paive, i.e. it doe not attempt to actively thwart i.e. via jamming, ignal inertion the legitimate node. Thu, the location and channel tate information of the eavedropper i aumed to be unknown to the legitimate node. Alice and Bob either pre-hare a cryptographic key or ue a tandard key agreement cheme e.g. Diffie-Hellman [5] to generate a hared key. Then, the number of key bit can be expanded aggreively uing a linear feedback hift regiter LFSR to make a long key equence. Generally, the output of an LFSR, even when the initial tate i unknown, i eaily predictable, thu making it inappropriate for cryptography. However, here the key i employed only ephemerally and it i aumed peimitically that Eve i handed the full key once tranmiion i complete. Since Eve only view the tranmitted ignal through a very noiy proce uing the method decribed in Section II.B, and the key i changed by the legitimate node periodically, he cannot hope to recover the key during the tranmiion period. We conider a one-way communication ytem, and aume that both Bob and Eve are at a unit ditance from the tranmitter by including variation of the path-lo in the noie variance; thu, the channel gain of both channel i unity. Both channel experience additive white Gauian noie AWGN. Let n B and n E denote the zero-mean noie procee at Bob and Eve receiver with flat power pectrum N B f =N B / and N E f =N E /, repectively. Let ˆX denote the input of both channel, Ŷ denote the received ignal at Bob receiver, and Ẑ denote the received ignal at Eve receiver Figure. Both Bob and Eve employ high preciion uniform analogto-digital converter and the effect of the on the received ignal quantization noie i modeled by an additive Gauian noie with variance δ /, where δ i the length of one quantization level. The aumption that quantization noie follow a Gauian ditribution i not accurate; however, it enable u to ue reult of Gauian channel to obtain ome inight about the actual ytem. The equivalent continuoutime power pectrum of the quantization noie of Bob, n QB, and quantization noie of Eve, n QE, are aumed to be flat, i.e. N QB f =N QB / and N QE f =N QE /, repectively. Let X denote the current code ymbol. Since all noie are aumed to be Gauian procee, we aume that X i taken from a tandard Gauian codebook where each entry ha variance,i.e.x N,. B. Artificial ISI for ecrecy Our goal i to tudy how Alice and Bob can employ bit of the hared cryptographic key to modify their radio to gain an information theoretic advantage. Aume that Alice applie a linear filter after her D/A with pectral denity G k f a hown in Figure. The pectral denity of thi filter i choen
3 Alice Bob Eve Fig. 3. Equivalent wiretap channel. Fig.. Alice end the meage through an ISI filter that i determined by the key equence, pre-hared between Alice and Bob. Bob ue the key equence to cancel the effect of ISI on hi ignal before the analog-to-digital converion proce. baed on the pre-hared key between Alice and Bob. Since Bob hare the long key with Alice, he eaily cancel the effect of thi filter before hi properly, wherea Eve will truggle with uch. In eence, we are inducing an ISI channel that Bob i able to equalize before hi, while Eve cannot. Thu, Eve will uffer from the channel degradation due to ISI and information-theoretic ecurity i obtained. Further, Alice change the weight of ISI filter tap frequently baed on the hared key to enure that Eve i not able to perform any kind of adaptive ISI cancellation. Here we ue a filter imilar to a n-tap ISI channel, ˆxj = n g k ixj i n j= where xj i the channel input, ˆxj i the channel output, and g k i, i=,,n are filter coefficient. Hence, the pectrum of the ISI filter i, { n n G k f = i= g kie jiπf/w, f W, ele In order to confue Eve, the coefficient vector g k = [g k g k g k n ] i choen randomly from an i.i.d enemble that follow N μ, σ according to the key equence, k, pre-hared between Alice and Bob. Thee coefficient are choen uch that the ISI filter doe not change the average output tranmit power, i.e. E[g k i ]=,i=,,n. To cancel the ISI at Bob receiver, we put a filter with power pectrum H k f =/G k f at the input of Bob receiver. Note that the aumption that Bob applie a H k f =/G k f i for eae of proof of Theorem and etablihe an achievable ecrecy rate of the propoed approach. The optimization of H k f to maximize the provable ecrecy rate i a topic of ongoing work. In the equel, the average ecrecy rate that can be obtained uing the propoed method will be invetigated. III. ARTIFICIAL ISI FOR SECRECY To the bet of our knowledge the ecrecy capacity of the wiretap ISI channel i not etablihed yet. Therefore we repreent a theorem for the achievable ecrecy rate of the Gauian band-limited wiretap channel that i hown in Figure. Theorem. The average ecrecy rate of the wiretap channel hown in Figure without CSI of both the main and eavedropper channel for a given key equence, k, i: R = W log + G k f W N QB G k f + N B log + G kf W N QE + N E df. roof: The equivalent wiretap channel i hown in Figure 3. The channel noie of the main channel can be ubtituted by n B with pectrum N B f = N Bf/ G k f at the input of the main channel. Since H k fg k f =, the pectrum of quantization noie of Bob receiver will be N QB fh k fg k f =N QB f and thu n QB remain unchanged. Similarly, the total noie of the eavedropper channel can be ubtituted by n E with pectrum N E f =N Ef+ N EB f/ G k f. Since we want to induce ISI and the tranmitter doe not have knowledge of the main channel, the tranmitter doe not perform pectral-loading e.g. waterfilling at the tranmitter and thu the power pectral denity of the input of the wiretap channel, /W,ifixed. In a finite time interval of length T, by expanding the auto-correlation function of the equivalent noie of the main channel, n B t, uing the Karhunen-Loeve expanion, n Bt = n Blφ l t, l= where φ l t are the orthonormal eigenfunction and the coefficient n Bl are independent Gauian random variable of variance λ Bl = λ l N B /. The λ l are the eigenvalue correponding to the pectrum / G k f. We can repreent the other noie and the input ignal in term of φ l t, n E t = l= n El φ lt, n BQ t = l= n BQlφ l t, and xt = l= x lφ l t, where n El, n BQl, and x l are independent Gauian random variable with variance λ l N E + N QE /, N QB /, and/w, repectively. Thu, our wiretap channel i decompoed into an infinite number of independent parallel wiretap channel. Thu, R = lim T = lim T T R T log l= + log + /W N QB /+λ l N B /. /W λ l N QE + N E / By applying the Toeplitz ditribution theorem for continuou random variable [] and ince the pectrum of output filter
4 i limited to [, W ], R in i obtained. The ecrecy rate averaged over all key equence i, R = E k log G k f + W N QB G k f + N B log + G kf ] df. 3 W N QE + N E Equation for a given G k f i complicated, and thu it i not poible to obtain a cloed form for the average achievable ecrecy rate. However, in the high SNR regime, it can be hown that R in 3 i alway greater than the ecrecy capacity of the correponding wiretap channel without applying the ISI filter, which i, C = W {log + Suppoe that C regime, C = E k E k W N B + N QB log + W N E + N QE } >. Since we are working in high SNR logn E + N QE E k [ logn B G k f + N QB df log G k f W N B G k f + N QB log G k f W N E + N QE df ] log + G k f W N B G k f + N QB log + G kf W N E + N QE df ] R where the econd equality i from the fact that E k [ G k f ]=, the firt inequality i Jenen inequality, and in the lat equality we ue the fact that the probability of G k f = at uncountably infinite number of point over the interval [, W ] i zero. Thi how that inducing the ISI, which lower the capacity of the main channel, provide a net gain in ecrecy capacity. Numerical reult are preented in the next ection. IV. NUMERICAL RESULTS AND COMARISON TO OTHER METHODS In thi ection we tudy the achievable ecrecy rate of the propoed method for variou cenario. Alo, we compare the propoed method to the conventional Gauian wiretap channel [7] and public dicuion D [5]. ublic dicuion, in contrat to the wiretap channel which i limited to oneway rate-limited communication, may take advantage of twoway communication over a noiele and public authenticated Amplitude.5 tap filter,.5 =.7.5 tap filter,.5 =.9 tap filter, = Frequancy Fig.. Frequency pectrum of -tap ISI filter for variou value of variance, σ =.5,.7, and.9, and three realization of filter coefficient in each cae. channel. Hence, the legitimate partie can agree on a ecret W log W N E + N QE W log W N E + N QE key by extracting information from realization of correlated random variable. Thi ecret key can be ued in a one-timepad for ecret communication between Alice and Bob. A = W logn E + N QE W logn B + N QB = W cloed form for the general ecret-key capacity i not available; logn E + N QE logn B E k [ G k f ]+N QB df however, in the cae of a Gauian ource model in which X N, and a Gauian wiretap channel, i.e. when W ] the channel between Alice and Bob and the channel between Alice and Eve are AWGN channel, the ecrecy capacity of the public dicuion method ha a imple form [7, Chapter 5]: C SM =log + N t E + N t E N t B where here N t B = N B + N QB and N t E = N E + N QE. In the propoed method, uppoe that the bandwidth of the tranmit filter i normalized a [, W ]=[, ] and it coefficient are taken from an enemble with normal ditribution uch that the ISI filter doe not change the average tranmit power, i.e. g k i Nμ, σ,i=,,n uch that E[g k i ]=μ + σ =. The frequency pectrum of -tap ISI filter for variou value of σ for three realization of the filter coefficient are hown in Figure. oberve that a the variance of the filter coefficient become maller, the uncertainty of the hape of the frequency repone of the ISI filter leen and the eavedropper might be able to increae the information leakage by uing thi information. However, by applying a random phae hift to the tranmitted ignal baed on the key, we can prevent the eavedropper from doing uch while the achievable ecrecy rate remain unchanged. Firt we look at the extreme cae that Eve i able to receive exactly what Alice tranmit and receive e.g. the adverary i able to pick up the tranmitter radio and hook directly to the antenna, but the channel between Alice and Bob i noiy and hence the conventional wiretap channel doe not work. In other word, the channel between Alice and Bob experience an additive white Gauian noie, while Eve
5 R nat/ymbol tap, =.5 tap, =.5 5 tap, =.5 5 tap, =.7 tap, =.7 5 tap, =.7 5 tap, =.9 tap, =.9 5 tap, =.9 D SNR B Fig. 5. Achievable ecure rate of the propoed method, conventional wiretap channel, and public dicuion D v. SNR of channel between Alice and Bob while the channel between Alice and Eve i noiele Eve ha perfect acce to the tranmitted ignal. σ i the variance of the ISI filter coefficient. Becaue Eve ha perfect acce to the ignal, note that the ecrecy rate of the wiretap channel i zero. R nat/ymbol tap, =.5 tap, =.5 5 tap, =.5 5 tap, =.7 tap, =.7 5 tap, =.7 5 tap, =.9 tap, =.9 5 tap, =.9 D SNR B Fig.. Achievable ecure rate of the propoed method, conventional wiretap channel, and public dicuion D v. SNR of channel between Alice and Bob when SNR of channel between Alice and Eve i db. σ i the variance of the ISI filter coefficient. channel i noiele n E =. Figure 5 how the achievable ecrecy rate veru ignal-to-noie ratio at Bob receiver when Eve receiver i noiele. The average tranmit power = and both Bob and Eve ue -bit. It can be een that, although the eavedropper channel i much better than the main channel, when the SNR at Bob receiver i greater than 55 db, which i quite common in hort-range communication, poitive ecrecy rate are obtained. ublic dicuion, although it provide better ecrecy rate in low SNR, need two-way communication and a public authenticated channel which are not alway poible. If a public authenticated channel exit and uer can perform two-way communication, the propoed method till ha utility: it can enhance the underlying channel and thu improve the ecrecy rate of the public dicuion. Another obervation i that a the ISI channel get further from the flat channel, higher ecrecy rate are achievable due to greater variation of the channel. In the current contruction of the ISI filter, thi occur when σ get maller. In Figure, the achievable ecrecy rate veru SNR at Bob receiver i hown. Again, the average tranmit power = and both Bob and Eve ue -bit. Similar to the previou cae, a expected, channel with greater variation lead to higher ecrecy rate. For our model here, thoe correpond to channel with larger number of tap and maller σ. V. CONCLUSION In thi paper, a new method that utilize an ephemeral cryptographic key to achieve ecrecy i introduced. The ecret meage goe through a time-varying ISI filter with filter coefficient determined by the hared key. The intended receiver ue the key equence to cancel the effect of ISI on it ignal, while the eavedropper cannot. The coefficient of the filter are changed frequently and thu the eavedropper i not able to perform adaptive ISI cancellation. It i hown that thi method can ubtantially improve the achievable ecrecy rate of the correponding wiretap channel and provide ecrecy even in the cae that the eavedropper ha perfect acce to the output of the tranmitter radio. At high SNR, the ecrecy rate are better that public dicuion, which take advantage of additional reource in the form of two-way communication and a public authenticated channel. Neverthele, in the cae that two-way communication i poible and a public channel i available, our cheme can be ued in conjunction with public dicuion and improve it performance by adding more uncertainty to the adverary channel. REFERENCES [] D. Stinon, Cryptography: theory and practice. CRC pre,. [] R. Benon, The verona tory, National Security Agency Central Security Service, Hitorical ublication available via WWW. [3] A. Wyner, The wire-tap channel, Bell Sytem Technical Journal, vol. 5, no. 8, pp , 975. [] I. Cizár and J. Korner, Broadcat channel with confidential meage, IEEE Tranaction on Information Theory, vol., no. 3, pp , 978. [5] U. Maurer, Secret key agreement by public dicuion from common information, IEEE Tranaction on Information Theory, vol. 39, no. 3, pp , 993. [] R. Ahlwede and I. Cizár, Common randomne in information theory and cryptography. i. ecret haring, IEEE Tranaction on Information Theory, vol. 39, no., pp. 3, 993. [7] M. Bloch and J. Barro, hyical-layer Security: From Information Theory to Security Engineering. Cambridge Univerity re,. [8] R. Negi and S. Goel, Secret communication uing artificial noie, in IEEE Vehicular Technology Conference, 5, vol., p. 9. [9] C. Cachin and U. Maurer, Unconditional ecurity againt memorybounded adverarie, Advance in Cryptology, pp. 9 3, 997. [] R. Kuchibhatla, Imft 5-nm mlc nand: technology caling barrier broken, EE Time New and Analyi,. [] S. Krone and G. Fettwei, Fundamental limit to communication with analog-to-digital converion at the receiver, in IEEE th Workhop on Signal roceing Advance in Wirele Communication, pp. 8, 9. [] S. Krone and G. Fettwei, A fundamental phyical limit to data tranmiion and proceing, Signal roceing Letter, IEEE, vol. 7, no. 3, pp ,. [3] A. Sheikholelami, D. Goeckel, and H. ihro-nik, Exploiting the noncommutativity of nonlinear operator for information-theoretic ecurity in diadvantaged wirele environment, 5th Annual Allerton Conference,. [] A. Sheikholelami, D. Goeckel, and H. ihro-nik, Everlating ecrecy by exploiting non-idealitie of the eavedropper receiver, arxiv:.79,. [5] W. Diffie and M. Hellman, New direction in cryptography, IEEE Tranaction on Information Theory, vol., no., pp. 5, 97. [] R. E. Blahut, rinciple and ractice of Information Theory. Addion- Weley, 987. [7] S. Leung-Yan-Cheong and M. Hellman, The gauian wire-tap channel, IEEE Tranaction on Information Theory, vol., no., pp. 5 5, 978.
Artificial Intersymbol Interference (ISI) to Exploit Receiver Imperfections for Secrecy
Artificial Intersymbol Interference ISI to Exploit Receiver Imperfections for Secrecy Azadeh Sheikholeslami, Dennis Goeckel and Hossein ishro-nik Electrical and Computer Engineering Department, University
More informationAsymptotic Diversity Analysis of Alamouti Transmit Diversity with Quasi-ML Decoding Algorithm in Time-Selective Fading Channels
International Journal of Software Engineering and It Application Vol. 9, No. 1 (015), pp. 381-388 http://dx.doi.org/10.1457/ijeia.015.9.1.34 Aymptotic Diverity Analyi of Alamouti Tranmit Diverity with
More informationMIMO Systems: Multiple Antenna Techniques
ADVANCED MIMO SYSTEMS MIMO Sytem: Multiple Antenna Technique Yiqing ZOU, Zhengang PAN, Kai-Kit WONG Dr, Senior Member of IEEE, Aociate Editor, IEEE TWirele, IEEE CL, and JoC (AP), Senior Lecturer, Department
More informationUNIVERSITY OF SASKATCHEWAN EE456: Digital Communications FINAL EXAM, 9:00AM 12:00PM, December 9, 2010 (open-book) Examiner: Ha H.
Name: Page 1 UNIVERSIY OF SASKACHEWAN EE456: Digital Communication FINAL EXAM, 9:00AM 1:00PM, December 9, 010 (open-book) Examiner: Ha H. Nguyen Permitted Material: Only textbook and calculator here are
More informationFrequency Calibration of A/D Converter in Software GPS Receivers
Frequency Calibration of A/D Converter in Software GPS Receiver L. L. Liou, D. M. Lin, J. B. Tui J. Schamu Senor Directorate Air Force Reearch Laboratory Abtract--- Thi paper preent a oftware-baed method
More informationSubcarrier exclusion techniques
Subcarrier excluion technique for coded OFDM ytem Kai-Uwe Schmidt, Jochen Ertel, Michael Benedix, and Adolf Finger Communication Laboratory, Dreden Univerity of Technology, 62 Dreden, Germany email: {chmidtk,
More informationAN EVALUATION OF DIGILTAL ANTI-ALIASING FILTER FOR SPACE TELEMETRY SYSTEMS
AN EVALUATION OF DIGILTAL ANTI-ALIASING FILTER FOR SPACE TELEMETRY SYSTEMS Alion de Oliveira Morae (1), Joé Antonio Azevedo Duarte (1), Sergio Fugivara (1) (1) Comando-Geral de Tecnologia Aeroepacial,
More informationThe Performance Analysis of MIMO OFDM System with Different M-QAM Modulation and Convolution Channel Coding
The Performance Analyi of MIMO OFDM Sytem with Different M-QAM Modulation and Convolution Channel Coding H. S. Shwetha M.tech, Digital Communication Engineering Siddaganga Intitute of Technology Tumakuru,
More informationREAL-TIME IMPLEMENTATION OF A NEURO-AVR FOR SYNCHRONOUS GENERATOR. M. M. Salem** A. M. Zaki** O. P. Malik*
Copyright 2002 IFAC 5th Triennial World Congre, Barcelona, Spain REAL-TIME IMPLEMENTATION OF A NEURO- FOR SYNCHRONOUS GENERATOR M. M. Salem** A. M. Zaki** O. P. Malik* *The Univerity of Calgary, Canada
More informationDESIGN OF SECOND ORDER SIGMA-DELTA MODULATOR FOR AUDIO APPLICATIONS
DESIGN OF SECOND ORDER SIGMA-DELTA MODULATOR FOR AUDIO APPLICATIONS 1 DHANABAL R, 2 BHARATHI V, 3 NAAMATHEERTHAM R SAMHITHA, 4 G.SRI CHANDRAKIRAN, 5 SAI PRAMOD KOLLI 1 Aitant Profeor (Senior Grade), VLSI
More informationAutomatic Target Recognition with Unknown Orientation and Adaptive Waveforms
Automatic Target Recognition wi Unknown Orientation and Adaptive Waveform Junhyeong Bae Department of Electrical and Computer Engineering Univerity of Arizona 13 E. Speedway Blvd, Tucon, Arizona 8571 dolbit@email.arizona.edu
More informationComm 502: Communication Theory. Lecture 5. Intersymbol Interference FDM TDM
Lecture 5 Interymbol Interference FDM TDM 1 Time Limited Waveform Time-Limited Signal = Frequency Unlimited Spectrum Square Pule i a Time-Limited Signal Fourier Tranform 0 T S -3/T S -2/T S -1/T S 0 1/T
More informationDIGITAL COMMUNICATION
DEPARTMENT OF ELECTRICAL &ELECTRONICS ENGINEERING DIGITAL COMMUNICATION Spring 2010 Yrd. Doç. Dr. Burak Kelleci OUTLINE Line Code Differential Encoding Regeneration, Decoding and Filtering Delta Modulation
More informationAdaptive Code Allocation for Interference Exploitation on the Downlink of MC-CDMA Systems
Adaptive Code Allocation for Interference Exploitation on the Downlink of MC-CDMA Sytem E. Alua and C. Maouro School of Electrical and Electronic Engineering, The Univerity of Mancheter, PO. Box 88, email:
More informationNAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS SIMULATION PERFORMANCE OF MULTIPLE-INPUT MULTIPLE-OUTPUT SYSTEMS EMPLOYING SINGLE- CARRIER MODULATION AND ORTHOGONAL FRE- QUENCY DIVISION MULTIPLEXING
More informationChapter Introduction
Chapter-6 Performance Analyi of Cuk Converter uing Optimal Controller 6.1 Introduction In thi chapter two control trategie Proportional Integral controller and Linear Quadratic Regulator for a non-iolated
More informationSpace-Time Coded Systems with Continuous Phase Frequency Shift Keying
Thi full text paper wa peer reviewed at the direction of IEEE Communication Society ubject matter expert for publication in the IEEE GLOBECOM 005 proceeding Space-Time Coded Sytem with Continuou Phae Frequency
More informationHIGH VOLTAGE DC-DC CONVERTER USING A SERIES STACKED TOPOLOGY
HIGH VOLTAGE DC-DC CONVERTER USING A SERIES STACKED TOPOLOGY Author: P.D. van Rhyn, Co Author: Prof. H. du T. Mouton Power Electronic Group (PEG) Univerity of the Stellenboch Tel / Fax: 21 88-322 e-mail:
More informationECS455: Chapter 5 OFDM
ECS455: Chapter 5 OFDM 1 Dr.Prapun Sukompong prapun.com/ec455 Office Hour: BKD 3601-7 Tueday 9:30-10:30 Friday 14:00-16:00 2 OFDM: Overview Let S 1, S 2,, S N be the information ymbol. The dicrete baeband
More informationWireless Link SNR Mapping Onto An Indoor Testbed
Wirele Link SNR Mapping Onto An Indoor Tetbed Jing Lei, Roy Yate, Larry Greentein, Hang Liu WINLAB Rutger Univerity 73 Brett Road, Picataway, NJ 8854, USA {michelle, ryate, ljg, hliu}@winlab.rutger.edu
More informationII. SYSTEM MODEL. A. Link and path model
HARQ I. INTRODUCTION ARQ (automatic repeat-requet i a link layer protocol ued for packet error detection and retranmiion. Errordetection bit (uch a CRC bit are attached and tranmitted along with the meage
More informationLecture 11. Noise from optical amplifiers. Optical SNR (OSNR), noise figure, (electrical) SNR Amplifier and receiver noise
Lecture 11 Noie from optical amplifier EDFA noie Raman noie Optical SNR (OSNR), noie figure, (electrical) SNR Amplifier and receiver noie ASE and hot/thermal noie Preamplification for SNR improvement Fiber
More informationProduced in cooperation with. Revision: May 26, Overview
Lab Aignment 6: Tranfer Function Analyi Reviion: May 6, 007 Produced in cooperation with www.digilentinc.com Overview In thi lab, we will employ tranfer function to determine the frequency repone and tranient
More informationA Feasibility Study on Frequency Domain ADC for Impulse-UWB Receivers
A Feaibility Study on Frequency Domain ADC for Impule-UWB Receiver Rajeh hirugnanam and Dong Sam Ha VV (Virginia ech VLSI for elecommunication Lab Department of Electrical and Computer Engineering Virginia
More informationActive vibration isolation for a 6 degree of freedom scale model of a high precision machine
Active vibration iolation for a 6 degree of freedom cale model of a high preciion machine W.B.A. Boomma Supervior Report nr : Prof. Dr. Ir. M. Steinbuch : DCT 8. Eindhoven Univerity of Technology Department
More informationStability Analysis in a Cognitive Radio System with Cooperative Beamforming
Stability Analyi in a Cognitive Radio Sytem with Cooperative Beamforming Mohammed Karmooe, Ahmed Sultan, Moutafa Youef Department of Electrical Engineering, Alexandria Univerity, Alexandria, Egypt Wirele
More informationTime-Domain Coupling to a Device on Printed Circuit Board Inside a Cavity. Chatrpol Lertsirimit, David R. Jackson and Donald R.
Time-Domain Coupling to a Device on Printed Circuit Board Inide a Cavity Chatrpol Lertirimit, David R. Jackon and Donald R. Wilton Applied Electromagnetic Laboratory Department of Electrical Engineering,
More informationPosition Control of a Large Antenna System
Poition Control of a Large Antenna Sytem uldip S. Rattan Department of Electrical Engineering Wright State Univerity Dayton, OH 45435 krattan@c.wright.edu ABSTRACT Thi report decribe the deign of a poition
More informationAnalysis. Control of a dierential-wheeled robot. Part I. 1 Dierential Wheeled Robots. Ond ej Stan k
Control of a dierential-wheeled robot Ond ej Stan k 2013-07-17 www.otan.cz SRH Hochchule Heidelberg, Mater IT, Advanced Control Engineering project Abtract Thi project for the Advanced Control Engineering
More informationRESEARCH ON NEAR FIELD PASSIVE LOCALIZATION BASED ON PHASE MEASUREMENT TECHNOLOGY BY TWO TIMES FREQUENCY DIFFERENCE
RESEARCH ON NEAR FIED PASSIVE OCAIZATION BASED ON PHASE MEASUREMENT TECHNOOGY BY TWO TIMES FREQUENCY DIFFERENCE Xuezhi Yan, Shuxun Wang, Zhongheng Ma and Yukuan Ma College of Communication Engineering
More informationFormatting and Baseband. Formatting & Baseband. Page 1. Formatting and Baseband Modulation. CSE4214 Digital Communications
CSE4214 Digital Communication CSE4214 Digital Communication Chapter 2 Formatting Formatting and Baeband Modulation Formatting & Baeband Formatting and Baeband 3 4 Page 1 1 What i Formatting? Information
More informationMassachusetts Institute of Technology Haystack Observatory WESTFORD, MASSACHUSETTS DATE 07/15/2009
BBD Memo #033 Maachuett Intitute of Technolog Hatack Obervator WESTFORD, MASSACHUSETTS 0886 DATE 07/5/2009 To: Broadband Development Group From: C. J. Beaudoin Subject: Holographic Proceing and Conideration
More informationA Real-Time Wireless Channel Emulator For MIMO Systems
A eal-time Wirele Channel Emulator For MIMO Sytem Hamid Elami, Ahmed M. Eltawil {helami,aeltawil}@uci.edu Abtract: The improvement in channel capacity hailed by MIMO ytem i directly related to intricate
More informationCOST OF TRANSMISSION TRANSACTIONS: Comparison and Discussion of Used Methods
INTERNATIONAL CONFERENCE ON RENEWABLE ENERGY AND POWER QUALITY (ICREPQ 03) COST OF TRANSMISSION TRANSACTIONS: Comparion and Dicuion of Ued Method Judite Ferreira 1, Zita Vale 2, A. Almeida Vale 3 and Ricardo
More informationPulse Interval Modulation Dual Header (PIM-DH)
Pule Interval Modulation Dual Header () N. Aldiiat, Z. Ghaemlooy, and R. Saatchi Electronic Reearch Group, School of Engineering Sheffield Hallam Univerity Sheaf Building, Pond Street Sheffield S WB United
More informationECE 6640 Digital Communications
ECE 6640 Digital Communication Dr. Bradley J. Bazuin Aitant Profeor Department of Electrical and Computer Engineering College of Engineering and Applied Science Chapter 2 2. Formatting and Baeband Modulation.
More informationPre- and Post-DFT Combining Space Diversity Receiver for Wideband Multi-Carrier Systems
Pre- and Pot- Combining Space Receiver for Wideband Multi-Carrier Sytem Muhammad Imadur Rahman, Suvra Sekhar Da, Frank HP Fitzek, Ramjee Praad Center for TeleInFratruktur (CTiF), Aalborg Univerity, Denmark
More informationActive Harmonic Elimination in Multilevel Converters Using FPGA Control
Active Harmonic Elimination in Multilevel Converter Uing FPGA Control Zhong Du, Leon M. Tolbert, John N. Chiaon Electrical and Computer Engineering The Univerity of Tenneee Knoxville, TN 7996- E-mail:
More informationThe Central Limit Theorem
Objective Ue the central limit theorem to olve problem involving ample mean for large ample. The Central Limit Theorem In addition to knowing how individual data value vary about the mean for a population,
More informationA Flexible OFDM System Simulation Model. with BER Performance Test
Contemporary Engineering Science, Vol. 5, 2012, no. 8, 365-374 A Flexible OFDM Sytem Simulation Model with BER Performance Tet Aladdin Amro Al-Huein Bin Talal Univerity, Jordan Department of Communication
More informationStudies on Novel Anti-jamming Technique of Unmanned Aerial Vehicle Data Link
Chinee Journal of Aeronautic 1(008) 141-148 Chinee Journal of Aeronautic www.elevier.com/locate/cja Studie on ovel Anti-jamming Technique of Unmanned Aerial Vehicle Data Link Huang enzhun a, *, ang Yongheng
More informationConstant Switching Frequency Self-Oscillating Controlled Class-D Amplifiers
http://dx.doi.org/.5755/j.eee..6.773 ELEKTRONIKA IR ELEKTROTECHNIKA, ISSN 39 5, OL., NO. 6, 4 Contant Switching Frequency Self-Ocillating Controlled Cla-D Amplifier K. Nguyen-Duy, A. Knott, M. A. E. Anderen
More informationKalman Filtering Based Object Tracking in Surveillance Video System
(669 -- 917) Proceeding of the 3rd (2011) CUSE International Conference Kalman Filtering Baed Object racking in Surveillance Video Sytem W.L. Khong, W.Y. Kow, H.. an, H.P. Yoong, K..K. eo Modelling, Simulation
More informationMIMO Enabled Efficient Mapping of Data in WiMAX Networks
MIMO Enabled Efficient Mapping of Data in WiMAX Network Penumarthi Phani Krihna, R. Saravana Manickam, and C. Siva Ram Murthy Department of Computer Science and Engineering Indian Intitute of Technology
More informationMobile Communications TCS 455
Mobile Communication TCS 455 Dr. Prapun Sukompong prapun@iit.tu.ac.th Lecture 23 1 Office Hour: BKD 3601-7 Tueday 14:00-16:00 Thurday 9:30-11:30 Announcement Read Chapter 9: 9.1 9.5 Section 1.2 from [Bahai,
More informationAdaptive Space/Frequency Processing for Distributed Aperture Radars
Adaptive Space/Frequency Proceing for Ditributed Aperture Radar Raviraj Adve a, Richard Schneible b, Robert McMillan c a Univerity of Toronto Department of Electrical and Computer Engineering 10 King College
More informationResonant amplifier L A B O R A T O R Y O F L I N E A R C I R C U I T S. Marek Wójcikowski English version prepared by Wiesław Kordalski
A B O R A T O R Y O F I N E A R I R U I T S Reonant amplifier 3 Marek Wójcikowki Englih verion prepared by Wieław Kordalki. Introduction Thi lab allow you to explore the baic characteritic of the reonant
More informationECE 6640 Digital Communications
ECE 6640 Digital Communication Dr. Bradley J. Bazuin Aitant Profeor Department of Electrical and Computer Engineering College of Engineering and Applied Science Chapter. Formatting and Baeband Modulation.
More informationIdentification of Image Noise Sources in Digital Scanner Evaluation
Identification of Image Noie Source in Digital Scanner Evaluation Peter D. Burn and Don William Eatman Kodak Company, ocheter, NY USA 4650-95 ABSTACT For digital image acquiition ytem, analyi of image
More informationSCK LAB MANUAL SAMPLE
SCK LAB MANUAL SAMPLE VERSION 1.2 THIS SAMPLE INCLUDES: TABLE OF CONTENTS TWO SELECTED LABS FULL VERSION IS PROVIDED FREE WITH KITS Phone: +92 51 8356095, Fax: +92 51 8311056 Email: info@renzym.com, URL:www.renzym.com
More informationIMPROVED SPATIAL MODULATION FOR HIGH SPECTRAL EFFICIENCY
IMPOVED SPIL MODULION FO HIGH SPECL EFFICIENCY ajab M. Legnain, ohdy H.M. Hafez 1 and bdelgader M. Legnain 2 1 Department of Sytem and Computer Eng., Carleton Univerity, Ottawa, Canada {rlegnain, hafez}@ce.carleton.ca
More informationA simple low rate turbo-like code design for spread spectrum systems
5 A imple low rate turbo-like code deign for pread pectrum ytem Durai Thirupathi and Keith M. Chugg Communication Science Intitute Dept. of Electrical Engineering Univerity of Southern California, Lo Angele
More informationRadio-Efficient Adaptive Modulation and Coding: Green Communication Perspective
Radio-Efficient Adaptive Modulation and Coding: Green Communication Perpective Liqiang Zhao, Jian Cai, and Hailin Zhang State Key Laboratory of Integrated Service Network Xidian Univerity Xi an, Shaanxi,
More informationAdaptive Groundroll filtering
Adaptive Groundroll filtering David Le Meur (CGGVerita), Nigel Benjamin (CGGVerita), Rupert Cole (Petroleum Development Oman) and Mohammed Al Harthy (Petroleum Development Oman) SUMMARY The attenuation
More informationSINGLE-PHASE ACTIVE FILTER FOR HIGH ORDER HARMONICS COMPENSATION
.jee.ro SINGLE-PHASE ACTIVE FILTER FOR HIGH ORDER HARMONICS COMPENSATION Kyo-Beum Lee Diviion of Electrical and Computer Engineering, Ajou Univerity San5, Woncheon-dong, Yeontong-gu, Suon 44-749, Korea
More informationSelf-Programmable PID Compensator for Digitally Controlled SMPS
6 IEEE COMPEL Workhop, Renelaer Polytechnic Intitute, Troy, NY, USA, July 16-19, 6 Self-Programmable PID Compenator for Digitally Controlled SMPS Zhenyu Zhao and Alekandar Prodi Univerity of Toronto Toronto,
More informationGPS signal Rician fading model for precise navigation in urban environment
Indian Journal of Radio & Space Phyic Vol 42, June 203, pp 92-96 GPS ignal Rician fading model for precie navigation in urban environment G Sai Bhuhana Rao, G Sateeh Kumar $,* & M N V S S Kumar Department
More informationNon-Linear UWB Receivers With MLSE Post-Detection
on-linear UWB Receiver With MLSE Pot-Detection Florian roech, homa Zaowki, and Armin Wittneben Communication echnology Laboratory, EH Zurich, 8092 Zurich, Switzerland Email: {troechf,zaowki,wittneben}@nari.ee.ethz.ch
More informationAlternating Opportunistic Large Arrays in Broadcasting for Network Lifetime Extension
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL 8, NO 6, JUNE 009 831 Alternating Opportunitic Large Array in Broadcating for Network Lifetime Extenion Aravind Kaila and Mary Ann Ingram Abtract We propoe
More informationOptimized BER Performance of Asymmetric Turbo Codes over AWGN Channel
International Journal of Computer Application (0975 8887) Optimized Performance of Aymmetric Turbo Code over AWGN Channel M.Srinivaa Rao Pvpit, JNTU Kainada Andhra Pradeh, India. G.Vijaya Kumar Pvpit,
More informationPerformance evaluation of a DPSK/SCM combined modulation scheme for optical label switching
Performance evaluation of a DPSK/SCM combined modulation cheme for optical label witching C. Díaz Giménez, I. Tafur Monroy, J.J. Vega Olmo, S. Sale, A.M.J. Koonen COBRA Reearch Intitute, Faculty of Electrical
More informationHARMONIC COMPENSATION ANALYSIS USING UNIFIED SERIES SHUNT COMPENSATOR IN DISTRIBUTION SYSTEM
HARMONIC COMPENSATION ANAYSIS USING UNIFIED SERIES SHUNT COMPENSATOR IN DISTRIBUTION SYSTEM * Montazeri M. 1, Abai Garavand S. 1 and Azadbakht B. 2 1 Department of Electrical Engineering, College of Engineering,
More informationControl of Electromechanical Systems using Sliding Mode Techniques
Proceeding of the 44th IEEE Conference on Deciion and Control, and the European Control Conference 25 Seville, Spain, December 2-5, 25 MoC7. Control of Electromechanical Sytem uing Sliding Mode Technique
More informationThe RCS of a resistive rectangular patch antenna in a substrate-superstrate geometry
International Journal of Wirele Communication and Mobile Computing 0; (4): 9-95 Publihed online October 0, 0 (http://www.ciencepublihinggroup.com/j/wcmc) doi: 0.648/j.wcmc.0004. The RCS of a reitive rectangular
More informationENERGY CONSERVING MODEL FOR THE CHANNEL POWER-GAIN IN WIRELESS MULTI-USER DOWNLINK SCENARIOS
ENERGY CONSERVING MOEL FOR THE CHANNEL POWER-GAIN IN WIRELESS MULTI-USER OWNLIN SCENARIOS Michel T. Ivrlač and Joef A. Noek Intitute for Circuit Theory and Signal Proceing Techniche Univerität München
More informationPilot Symbol Assisted Modulation using 16-Level QAM for a Wireless System
Pilot Symbol Aited Modulation uing 16-Level QAM for a Wirele Sytem Pilot Symbol Aited Modulation uing 16-Level QAM for a Wirele Sytem Angela DARIE, Ion BOGDAN Rezumat. Modulaţia cu imbol pilot(psam) ete
More informationAn analytic technique
From June 2010 High Frequency Electronic Copyright 2010 Summit Technical Media, C An Analytic and Graphical Method for NA Deign with Feedback By Alan Victor, Nitronex Corp., and Jayeh Nath, Aviat Network
More informationLab 7 Rev. 2 Open Lab Due COB Friday April 27, 2018
EE314 Sytem Spring Semeter 2018 College of Engineering Prof. C.R. Tolle South Dakota School of Mine & Technology Lab 7 Rev. 2 Open Lab Due COB Friday April 27, 2018 In a prior lab, we et up the baic hardware
More informationUniversity of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /VETECS.2009.
Nordin, R., Armour, S. M. D., & McGeehan, J. P. (9). Overcoming elfinterference in SM-OFDMA with and dynamic ubcarrier allocation. In IEEE 69th Vehicular Technology Conference 9 (VTC Spring 9), Barcelona
More informationNAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS PERFORMANCE ANALYSIS OF THE EFFECT OF PULSED- NOISE INTERFERENCE ON WLAN SIGNALS TRANSMITTED OVER A NAKAGAMI FADING CHANNEL by Andrea Toumani March
More informationAn FM signal in the region of 4.2 to 4.6
A LOW COST, HIGH ACCURACY RADAR ALTIMETER Thi article decribe the development of a frequency modulated (FM) radar altimeter for meauring the height of flying object. The entire tructure comprie two part:
More informationVoltage Analysis of Distribution Systems with DFIG Wind Turbines
1 Voltage Analyi of Ditribution Sytem with DFIG Wind Turbine Baohua Dong, Sohrab Agarpoor, and Wei Qiao Department of Electrical Engineering Univerity of Nebraka Lincoln Lincoln, Nebraka 68588-0511, USA
More informationA SIMPLE HARMONIC COMPENSATION METHOD FOR NONLINEAR LOADS USING HYSTERESIS CONTROL TECHNIQUE
A IMPLE HARMONIC COMPENATION METHOD FOR NONLINEAR LOAD UING HYTEREI CONTROL TECHNIQUE Kemal KETANE kemalketane@gazi.edu.tr İre İKENDER irei@gazi.edu.tr Gazi Univerity Engineering and Architecture Faculty
More informationReinforcement Learning Based Anti-jamming with Wideband Autonomous Cognitive Radios
1 Reinforcement Learning Baed Anti-jamming with Wideband Autonomou Cognitive Radio Stephen Machuzak, Student Member, IEEE, and Sudharman K. Jayaweera, Senior Member, IEEE Communication and Information
More informationSampling Theory MODULE XIII LECTURE - 41 NON SAMPLING ERRORS
Sampling Theory MODULE XIII LECTURE - 41 NON SAMPLING ERRORS DR. SHALABH DEPARTMENT OF MATHEMATICS AND STATISTICS INDIAN INSTITUTE OF TECHNOLOG KANPUR 1 It i a general aumption in ampling theory that the
More informationOperation of the Discrete Wavelet Transform: basic overview with examples
Operation o the Dicrete Wavelet Tranorm: baic overview with example Surname, name Antonino Daviu, Joe Alono (joanda@die.upv.e) Department Centre Ecuela Técnica Superior de Ingeniero Indutriale Departamento
More informationComparative Study of PLL, DDS and DDS-based PLL Synthesis Techniques for Communication System
International Journal of Electronic Engineering, 2(1), 2010, pp. 35-40 Comparative Study of PLL, DDS and DDS-baed PLL Synthei Technique for Communication Sytem Govind Singh Patel 1 & Sanjay Sharma 2 1
More informationPerformance Analysis of Ultra-Wide Band Impulse Radio (UWB-IR) with Super-Orthogonal Turbo Codes (SOTC)
rformance Analyi of Ultra-Wide Band Impule Radio UWB-IR with Super-Orthogonal Turbo Code SOTC Uman Riaz, Man-On Pun and C.-C. Jay Kuo Abtract Low-complexity low-rate uper-orthogonal turbo code SOTC are
More informationRaising Cavity Q for Microwave-Pulse Compression by Reducing Aperture Skin-Effect Losses
Circuit and Electromagnetic Sytem Deign Note Note 6 8 June 9 Raiing Cavity Q for Microwave-Pule Compreion by Reducing Aperture Skin-Effect Loe Carl E. Baum Univerity of New Meico Department of Electrical
More informationA Simple DSP Laboratory Project for Teaching Real-Time Signal Sampling Rate Conversions
A Simple DSP Laboratory Project for Teaching Real-Time Signal Sampling Rate Converion by Li Tan, Ph.D. lizhetan@pnc.edu Department of ECET Purdue Univerity North Central Wetville, Indiana Jean Jiang, Ph.D.
More informationCommunication Systems, 5e
Communication Sytem, 5e Chapter 6: Sampling and pule modulation A. Bruce Carlon Paul B. Crilly 00 The McGraw-Hill Companie Chapter 6: Sampling and pule modulation Sampling theory and practice Pule-amplitude
More informationSupervised Information-Theoretic Competitive Learning by Cost-Sensitive Information Maximization
BIC, 9 Aug- ept upervied Information-Theoretic Competitive Learning by Cot-enitive Information Maximization Ryotaro Kamimura Information cience Laboratory, Tokai Univerity, 7 Kitakaname Hiratuka Kanagawa
More informationPublished in: Proceedings of the 26th European Solid-State Circuits Conference, 2000, ESSCIRC '00, September 2000, Stockholm, Sweden
Uing capacitive cro-coupling technique in RF low noie amplifier and down-converion mixer deign Zhuo, Wei; Embabi, S.; Pineda de Gyvez, J.; Sanchez-Sinencio, E. Publihed in: Proceeding of the 6th European
More informationCHAPTER 2 WOUND ROTOR INDUCTION MOTOR WITH PID CONTROLLER
16 CHAPTER 2 WOUND ROTOR INDUCTION MOTOR WITH PID CONTROLLER 2.1 INTRODUCTION Indutrial application have created a greater demand for the accurate dynamic control of motor. The control of DC machine are
More informationThe Cascode and Cascaded Techniques LNA at 5.8GHz Using T-Matching Network for WiMAX Applications
International Journal of Computer Theory and Engineering, Vol. 4, No. 1, February 01 The Cacode and Cacaded Technique LNA at 5.8Hz Uing T-Matching Network for WiMAX Application Abu Bakar Ibrahim, Abdul
More informationReactive Power Control of Photovoltaic Systems Based on the Voltage Sensitivity Analysis Rasool Aghatehrani, Member, IEEE, and Anastasios Golnas
1 Reactive ower Control of hotovoltaic ytem Baed on the Voltage enitivity Analyi Raool Aghatehrani, Member, IEEE, and Anataio Golna Abtract: Thi paper addree the voltage fluctuation caued by the output
More informationWavelength-Time Coding for Ultra Dense Wavelength Multiplexing
Wavelength-Time Coding for Ultra Dene Wavelength Multiplexing Frank Schaich and Joachim Speidel Intitut für Nachrichtenübertragung, Univerität Stuttgart Pfaffenwaldring 7, D-759 Stuttgart Email: frank.chaich@inue.uni-tuttgart.de
More informationLocation-based Access Control. Outline. Why do we need location in WSN? SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks
SeRLoc: Secure Range-Independent Localization for Wirele Senor Network Louka Lazo Advior: Radha Poovendran Network Security Lab Univerity of Wahington Outline Motivation Secure Localization Problem SeRLoc
More informationFUZZY Logic Based Space Vector PWM Controlled Hybrid Active Power Filter for Power Conditioning
FUZZY Logic Baed Space Vector PWM Controlled Hybrid Active Power Filter for Power Conditioning 1 JARUPULA SOMLAL 2 DR.MANNAM VENU GOPALA RAO 1 Aociate Profeor, 2 Profeor Department of EEE K L Univerity
More informationAvailable online at ScienceDirect. Procedia Technology 21 (2015 ) SMART GRID Technologies, August 6-8, 2015
Available online at www.ciencedirect.com ScienceDirect Procedia Technology 1 (15 ) 589 595 SMART GRID Technologie, Augut 6-8, 15 An Optimization Algorithm for Voltage Flicer Analyi Athira S a*, Hariumar
More informationHashiwokakero. T. Morsink. August 31, 2009
Hahiwokakero T. Morink Augut 31, 2009 Content 1 Introduction 3 2 What i Hahiwokakero? 3 2.1 The rule............................. 3 2.2 Eay olving tatement..................... 4 3 Building an Own Solver
More informationSynthetic aperture radar raw signal simulator for both pulsed and FM-CW modes
Computational Method and Experimental Meaurement XV 43 Synthetic aperture radar raw ignal imulator for both puled and FM-CW mode P. Serafi C. Lenik & A. Kawalec Intitute of adioelectronic, Military Univerity
More informationRobust Control of an Active Suspension System Using H 2 & H Control Methods. Fatemeh Jamshidi 1, Afshin Shaabany 1
Journal of American Science, 11;(5) Robut Control of an Active Supenion Sytem Uing H & H Control Method Fatemeh Jamhidi 1, Afhin Shaabany 1 1 Ilamic Azad Univerity, Far Science and Reearch Branch, Shiraz,
More informationMAX3610 Synthesizer-Based Crystal Oscillator Enables Low-Cost, High-Performance Clock Sources
Deign Note: HFDN-31.0 Rev.1; 04/08 MAX3610 Syntheizer-Baed Crytal Ocillator Enable Low-Cot, High-Performance Clock Source MAX3610 Syntheizer-Baed Crytal Ocillator Enable Low-Cot, High-Performance Clock
More informationGemini. The errors from the servo system are considered as the superposition of three things:
Gemini Mount Control Sytem Report Prediction Of Servo Error Uing Simulink Model Gemini 9 July 1996 MCSJDW (Iue 3) - Decribe the proce of etimating the performance of the main axi ervo uing the non-linear
More informationFixed Structure Robust Loop Shaping Controller for a Buck-Boost Converter using Genetic Algorithm
Proceeding of the International ulticonference of Engineer and Computer Scientit 008 Vol II IECS 008, 9- arch, 008, Hong ong Fixed Structure Robut Loop Shaping Controller for a Buck-Boot Converter uing
More informationExperiment 8: Active Filters October 31, 2005
Experiment 8: Active Filter October 3, In power circuit filter are implemented with ductor and capacitor to obta the deired filter characteritic. In tegrated electronic circuit, however, it ha not been
More informationResilient Large-Scale Cognitive Radio Ad Hoc Networking Using Path-Time Codes
IEEE ICC 2017 Cognitive Radio and Network Sympoium Reilient Large-Scale Cognitive Radio Ad Hoc Networking Uing Path-Time Code Yi-Chi Chen 1, I-Wei Lai 2 and Kwang-Cheng Chen 3 Graduate Intitute of Communication
More informationDesign, Realization, and Analysis of PIFA for an RFID Mini-Reader
Deign, Realization, and Analyi of PIFA for an RFID Mini-Reader SUNG-FEI YANG ; TROY-CHI CHIU ; CHIN-CHUNG NIEN Indutrial Technology Reearch Intitute (ITRI) Rm. 5, Bldg. 5, 95, Sec., Chung Hing Rd., Chutung,
More informationOn-Demand Spectrum Sharing By Flexible Time-Slotted Cognitive Radio Networks
On-Demand Spectrum Sharing By Flexible Time-Slotted Cognitive Radio Network Shimin Gong, Xu Chen, Jianwei Huang, and Ping Wang Centre for Multimedia and Network Technology, Nanyang Technological Univerity
More information