Artificial Intersymbol Interference (ISI) to Exploit Receiver Imperfections for Secrecy

Size: px
Start display at page:

Download "Artificial Intersymbol Interference (ISI) to Exploit Receiver Imperfections for Secrecy"

Transcription

1 Artificial Interymbol Interference ISI to Exploit Receiver Imperfection for Secrecy Azadeh Sheikholelami, Denni Goeckel and Hoein ihro-nik Electrical and Computer Engineering Department, Univerity of Maachuett, Amhert Abtract Secure communication over a wirele channel in the preence of a paive eavedropper i conidered. We preent a method to exploit the eavedropper inherent receiver vulnerabilitie to obtain everlating ecrecy. An ephemeral cryptographic key i pre-hared between the tranmitter and the legitimate receiver and i utilized to induce intentional interymbol interference ISI. The legitimate receiver ue the key to cancel the ISI while the eavedropper, ince it doe not have the key, cannot do uch. It i hown that although ISI reduce the capacity of the main channel, it can lead to a net gain in ecrecy rate. The achievable ecrecy rate for different ISI filter etting are evaluated and the propoed method i compared with other information-theoretic ecurity cheme. I. INTRODUCTION The meage ent over a wirele network are vulnerable to being overheard by any maliciou party in the coverage range of the tranmitter. The traditional way to prevent an eavedropper from obtaining a ecret meage i to encrypt the meage uch that decoding the cypher without having the key i beyond the eavedropper computational capability []. However, the vulnerability hown by many implemented cryptographic cheme, the lack of a fundamental proof etablihing the difficulty of the cheme, and the potential for tranformative change in computing motivate form of ecurity that are provably everlating. In particular, when a cryptographic cheme i employed, the adverary can record the clean cypher and recover it later when the cryptographic algorithm i broken [] or when the eavedropper obtain the key, which i not acceptable in enitive application requiring everlating ecrecy. The deire for uch everlating ecurity motivate conidering information-theoretic approache, where the eavedropper i unable to extract any information about the ecret meage from the received ignal. The feaibility of informationtheoretic ecurity wa demontrated by the eminal work of Wyner [3], where he howed for dicrete memoryle wiretap channel, that, if the eavedropper channel i degraded with repect to the main channel, adding randomne to the codebook allow perfect ecrecy to be achieved. Later, the idea wa extended to the more general cae where the eavedropper channel i not necearily degraded, but more noiy or le capable with repect to the main channel []. Thu, the deirable ituation for achieving information theoretic ecrecy i to have a better channel from the tranmitter to the intended receiver than that from the tranmitter to the eavedropper. However, thi i not alway guaranteed, a the eavedropper can be very cloe to the tranmitter or can ue a directional antenna to improve it received ignal, while the eavedropper location and it channel tate information i not known to the legitimate node. When uch an advantage doe not exit, approache baed on public dicuion [5], [] can be employed. However, thee approache, while they could be ued to generate an information-theoretically ecure one-time pad, are baically deigned for ecret key agreement by performing multiple two-way tranmiion and utilizing a public authenticated channel [7, Chapter 7.] rather than efficient one-way ecret communication. Recently, approache baed on the cooperative jamming approach of [8] have been conidered. However, all of thee approache require either multiple antenna, helper node, and/or fading, and many are uceptible to attack uch a pointing directive antenna. For a one-way cenario with a ingle antenna, Cachin and Maurer [9] exploited hardware limitation to obtain everlating ecurity, a i our interet. In particular, they introduced the bounded memory model in uch a way that the eavedropper i not able to tore the information it would need to eventually break the cypher. Thi novel approach uffer from two hortcoming: by Moore Law ee NAND caling plot at [], the denity of memorie increae at an exponential rate; memorie can be tacked arbitrarily ubject only to very large pace limitation. Hence, although the bounded memory model i a viable approach to everlating ecurity, it i difficult to pick a memory ize beyond which it will be effective and thu it i difficult to employ in wirele communication. Our approach to provide everlating ecurity i that, intead of attacking the memory in the receiver back-end, we attack the receiver front-end. In particular, the technology of analog-to-digital converter progree lowly and unlike memory, they cannot be tacked arbitrarily in fact, high-quality already employ parallelization to the limit of the jitter. Alo, importantly from a long-term perpective, there i a fundamental bound on the ability to perform converion [], []. Hence, our goal i to exploit the receiver analog-to-digital converion proceing effect for ecurity. The tranmitter Alice and the intended receiver Bob pre-hare a cryptographic key that only need to be kept ecret for the duration of the tranmiion i.e. it can be given to the

2 Alice Fig.. The tranmitter perform fat power modulation to obtain ecrecy by utilizing a cryptographic key pre-hared between Alice and Bob. eavedropper immediately afterward. By uing thi key, we conider inerting intentional ditortion on the tranmitted ignal. Since Bob know the ditortion, he can undo it effect before hi, wherea Eve mut tore the ignal and try to compenate for the ditortion after her ; however, he already lot the information he need to recover the meage. We conidered a rapid power modulation intance of thi approach in [3] and [], where the tranmitted ignal i modulated by two vatly different power level at the tranmitter Figure. Since Bob know the key, he can cancel the effect of power modulator before hi, putting hi ignal in the appropriate range for converion. On the other hand, Eve mut compromie between larger quantization noie and more overflow. Conequently, he will loe information he need to recover the meage and informationtheoretic ecurity i obtained. However, a clear rik of thi approach i an eavedropper with multiple. Motivated by the fact that an additive white Gauian noie AWGN channel will have a higher capacity than an interymbol interference channel under the ame output power contraint, we eek to induce an ISI channel for Eve while preerving an AWGN channel at Bob. The tranmitter i equipped with a linear filter with random coefficient that are taken baed on a pre-hared key between Alice and Bob. The ecret meage i broken into chunk of data with a guard interval between every two chunk and i tranmitted over the channel after going through the ISI filter. Bob, ince he know the key, place a filter before hi in concert with the ISI filter to cancel the ISI. In order to prevent Eve from performing any kind of adaptive equalization to cancel the ISI, the coefficient of the ISI filter are changed baed on the key during each chunk. By exploiting the reulting ditortion, information-theoretic ecrecy can be obtained, even if Eve i given the key immediately after meage tranmiion. The ret of paper i a follow. Section II decribe the ytem model, metric, and the propoed idea in detail. In Section III, the achievable ecrecy rate for the propoed method are characterized. In Section IV, the reult of numerical example for variou realization of the ytem and comparion of the propoed method to the public dicuion approache of [5], [] are preented. Concluion and idea for future work are dicued in Section V. Bob Eve II. SYSTEM MODEL AND AROACH A. Sytem Model A imple wiretap channel i conidered, which conit of a tranmitter, Alice, an intended receiver, Bob, and an eavedropper, Eve. The eavedropper i aumed to be paive, i.e. it doe not attempt to actively thwart i.e. via jamming, ignal inertion the legitimate node. Thu, the location and channel tate information of the eavedropper i aumed to be unknown to the legitimate node. Alice and Bob either pre-hare a cryptographic key or ue a tandard key agreement cheme e.g. Diffie-Hellman [5] to generate a hared key. Then, the number of key bit can be expanded aggreively uing a linear feedback hift regiter LFSR to make a long key equence. Generally, the output of an LFSR, even when the initial tate i unknown, i eaily predictable, thu making it inappropriate for cryptography. However, here the key i employed only ephemerally and it i aumed peimitically that Eve i handed the full key once tranmiion i complete. Since Eve only view the tranmitted ignal through a very noiy proce uing the method decribed in Section II.B, and the key i changed by the legitimate node periodically, he cannot hope to recover the key during the tranmiion period. We conider a one-way communication ytem, and aume that both Bob and Eve are at a unit ditance from the tranmitter by including variation of the path-lo in the noie variance; thu, the channel gain of both channel i unity. Both channel experience additive white Gauian noie AWGN. Let n B and n E denote the zero-mean noie procee at Bob and Eve receiver with flat power pectrum N B f =N B / and N E f =N E /, repectively. Let ˆX denote the input of both channel, Ŷ denote the received ignal at Bob receiver, and Ẑ denote the received ignal at Eve receiver Figure. Both Bob and Eve employ high preciion uniform analogto-digital converter and the effect of the on the received ignal quantization noie i modeled by an additive Gauian noie with variance δ /, where δ i the length of one quantization level. The aumption that quantization noie follow a Gauian ditribution i not accurate; however, it enable u to ue reult of Gauian channel to obtain ome inight about the actual ytem. The equivalent continuoutime power pectrum of the quantization noie of Bob, n QB, and quantization noie of Eve, n QE, are aumed to be flat, i.e. N QB f =N QB / and N QE f =N QE /, repectively. Let X denote the current code ymbol. Since all noie are aumed to be Gauian procee, we aume that X i taken from a tandard Gauian codebook where each entry ha variance,i.e.x N,. B. Artificial ISI for ecrecy Our goal i to tudy how Alice and Bob can employ bit of the hared cryptographic key to modify their radio to gain an information theoretic advantage. Aume that Alice applie a linear filter after her D/A with pectral denity G k f a hown in Figure. The pectral denity of thi filter i choen

3 Alice Bob Eve Fig. 3. Equivalent wiretap channel. Fig.. Alice end the meage through an ISI filter that i determined by the key equence, pre-hared between Alice and Bob. Bob ue the key equence to cancel the effect of ISI on hi ignal before the analog-to-digital converion proce. baed on the pre-hared key between Alice and Bob. Since Bob hare the long key with Alice, he eaily cancel the effect of thi filter before hi properly, wherea Eve will truggle with uch. In eence, we are inducing an ISI channel that Bob i able to equalize before hi, while Eve cannot. Thu, Eve will uffer from the channel degradation due to ISI and information-theoretic ecurity i obtained. Further, Alice change the weight of ISI filter tap frequently baed on the hared key to enure that Eve i not able to perform any kind of adaptive ISI cancellation. Here we ue a filter imilar to a n-tap ISI channel, ˆxj = n g k ixj i n j= where xj i the channel input, ˆxj i the channel output, and g k i, i=,,n are filter coefficient. Hence, the pectrum of the ISI filter i, { n n G k f = i= g kie jiπf/w, f W, ele In order to confue Eve, the coefficient vector g k = [g k g k g k n ] i choen randomly from an i.i.d enemble that follow N μ, σ according to the key equence, k, pre-hared between Alice and Bob. Thee coefficient are choen uch that the ISI filter doe not change the average output tranmit power, i.e. E[g k i ]=,i=,,n. To cancel the ISI at Bob receiver, we put a filter with power pectrum H k f =/G k f at the input of Bob receiver. Note that the aumption that Bob applie a H k f =/G k f i for eae of proof of Theorem and etablihe an achievable ecrecy rate of the propoed approach. The optimization of H k f to maximize the provable ecrecy rate i a topic of ongoing work. In the equel, the average ecrecy rate that can be obtained uing the propoed method will be invetigated. III. ARTIFICIAL ISI FOR SECRECY To the bet of our knowledge the ecrecy capacity of the wiretap ISI channel i not etablihed yet. Therefore we repreent a theorem for the achievable ecrecy rate of the Gauian band-limited wiretap channel that i hown in Figure. Theorem. The average ecrecy rate of the wiretap channel hown in Figure without CSI of both the main and eavedropper channel for a given key equence, k, i: R = W log + G k f W N QB G k f + N B log + G kf W N QE + N E df. roof: The equivalent wiretap channel i hown in Figure 3. The channel noie of the main channel can be ubtituted by n B with pectrum N B f = N Bf/ G k f at the input of the main channel. Since H k fg k f =, the pectrum of quantization noie of Bob receiver will be N QB fh k fg k f =N QB f and thu n QB remain unchanged. Similarly, the total noie of the eavedropper channel can be ubtituted by n E with pectrum N E f =N Ef+ N EB f/ G k f. Since we want to induce ISI and the tranmitter doe not have knowledge of the main channel, the tranmitter doe not perform pectral-loading e.g. waterfilling at the tranmitter and thu the power pectral denity of the input of the wiretap channel, /W,ifixed. In a finite time interval of length T, by expanding the auto-correlation function of the equivalent noie of the main channel, n B t, uing the Karhunen-Loeve expanion, n Bt = n Blφ l t, l= where φ l t are the orthonormal eigenfunction and the coefficient n Bl are independent Gauian random variable of variance λ Bl = λ l N B /. The λ l are the eigenvalue correponding to the pectrum / G k f. We can repreent the other noie and the input ignal in term of φ l t, n E t = l= n El φ lt, n BQ t = l= n BQlφ l t, and xt = l= x lφ l t, where n El, n BQl, and x l are independent Gauian random variable with variance λ l N E + N QE /, N QB /, and/w, repectively. Thu, our wiretap channel i decompoed into an infinite number of independent parallel wiretap channel. Thu, R = lim T = lim T T R T log l= + log + /W N QB /+λ l N B /. /W λ l N QE + N E / By applying the Toeplitz ditribution theorem for continuou random variable [] and ince the pectrum of output filter

4 i limited to [, W ], R in i obtained. The ecrecy rate averaged over all key equence i, R = E k log G k f + W N QB G k f + N B log + G kf ] df. 3 W N QE + N E Equation for a given G k f i complicated, and thu it i not poible to obtain a cloed form for the average achievable ecrecy rate. However, in the high SNR regime, it can be hown that R in 3 i alway greater than the ecrecy capacity of the correponding wiretap channel without applying the ISI filter, which i, C = W {log + Suppoe that C regime, C = E k E k W N B + N QB log + W N E + N QE } >. Since we are working in high SNR logn E + N QE E k [ logn B G k f + N QB df log G k f W N B G k f + N QB log G k f W N E + N QE df ] log + G k f W N B G k f + N QB log + G kf W N E + N QE df ] R where the econd equality i from the fact that E k [ G k f ]=, the firt inequality i Jenen inequality, and in the lat equality we ue the fact that the probability of G k f = at uncountably infinite number of point over the interval [, W ] i zero. Thi how that inducing the ISI, which lower the capacity of the main channel, provide a net gain in ecrecy capacity. Numerical reult are preented in the next ection. IV. NUMERICAL RESULTS AND COMARISON TO OTHER METHODS In thi ection we tudy the achievable ecrecy rate of the propoed method for variou cenario. Alo, we compare the propoed method to the conventional Gauian wiretap channel [7] and public dicuion D [5]. ublic dicuion, in contrat to the wiretap channel which i limited to oneway rate-limited communication, may take advantage of twoway communication over a noiele and public authenticated Amplitude.5 tap filter,.5 =.7.5 tap filter,.5 =.9 tap filter, = Frequancy Fig.. Frequency pectrum of -tap ISI filter for variou value of variance, σ =.5,.7, and.9, and three realization of filter coefficient in each cae. channel. Hence, the legitimate partie can agree on a ecret W log W N E + N QE W log W N E + N QE key by extracting information from realization of correlated random variable. Thi ecret key can be ued in a one-timepad for ecret communication between Alice and Bob. A = W logn E + N QE W logn B + N QB = W cloed form for the general ecret-key capacity i not available; logn E + N QE logn B E k [ G k f ]+N QB df however, in the cae of a Gauian ource model in which X N, and a Gauian wiretap channel, i.e. when W ] the channel between Alice and Bob and the channel between Alice and Eve are AWGN channel, the ecrecy capacity of the public dicuion method ha a imple form [7, Chapter 5]: C SM =log + N t E + N t E N t B where here N t B = N B + N QB and N t E = N E + N QE. In the propoed method, uppoe that the bandwidth of the tranmit filter i normalized a [, W ]=[, ] and it coefficient are taken from an enemble with normal ditribution uch that the ISI filter doe not change the average tranmit power, i.e. g k i Nμ, σ,i=,,n uch that E[g k i ]=μ + σ =. The frequency pectrum of -tap ISI filter for variou value of σ for three realization of the filter coefficient are hown in Figure. oberve that a the variance of the filter coefficient become maller, the uncertainty of the hape of the frequency repone of the ISI filter leen and the eavedropper might be able to increae the information leakage by uing thi information. However, by applying a random phae hift to the tranmitted ignal baed on the key, we can prevent the eavedropper from doing uch while the achievable ecrecy rate remain unchanged. Firt we look at the extreme cae that Eve i able to receive exactly what Alice tranmit and receive e.g. the adverary i able to pick up the tranmitter radio and hook directly to the antenna, but the channel between Alice and Bob i noiy and hence the conventional wiretap channel doe not work. In other word, the channel between Alice and Bob experience an additive white Gauian noie, while Eve

5 R nat/ymbol tap, =.5 tap, =.5 5 tap, =.5 5 tap, =.7 tap, =.7 5 tap, =.7 5 tap, =.9 tap, =.9 5 tap, =.9 D SNR B Fig. 5. Achievable ecure rate of the propoed method, conventional wiretap channel, and public dicuion D v. SNR of channel between Alice and Bob while the channel between Alice and Eve i noiele Eve ha perfect acce to the tranmitted ignal. σ i the variance of the ISI filter coefficient. Becaue Eve ha perfect acce to the ignal, note that the ecrecy rate of the wiretap channel i zero. R nat/ymbol tap, =.5 tap, =.5 5 tap, =.5 5 tap, =.7 tap, =.7 5 tap, =.7 5 tap, =.9 tap, =.9 5 tap, =.9 D SNR B Fig.. Achievable ecure rate of the propoed method, conventional wiretap channel, and public dicuion D v. SNR of channel between Alice and Bob when SNR of channel between Alice and Eve i db. σ i the variance of the ISI filter coefficient. channel i noiele n E =. Figure 5 how the achievable ecrecy rate veru ignal-to-noie ratio at Bob receiver when Eve receiver i noiele. The average tranmit power = and both Bob and Eve ue -bit. It can be een that, although the eavedropper channel i much better than the main channel, when the SNR at Bob receiver i greater than 55 db, which i quite common in hort-range communication, poitive ecrecy rate are obtained. ublic dicuion, although it provide better ecrecy rate in low SNR, need two-way communication and a public authenticated channel which are not alway poible. If a public authenticated channel exit and uer can perform two-way communication, the propoed method till ha utility: it can enhance the underlying channel and thu improve the ecrecy rate of the public dicuion. Another obervation i that a the ISI channel get further from the flat channel, higher ecrecy rate are achievable due to greater variation of the channel. In the current contruction of the ISI filter, thi occur when σ get maller. In Figure, the achievable ecrecy rate veru SNR at Bob receiver i hown. Again, the average tranmit power = and both Bob and Eve ue -bit. Similar to the previou cae, a expected, channel with greater variation lead to higher ecrecy rate. For our model here, thoe correpond to channel with larger number of tap and maller σ. V. CONCLUSION In thi paper, a new method that utilize an ephemeral cryptographic key to achieve ecrecy i introduced. The ecret meage goe through a time-varying ISI filter with filter coefficient determined by the hared key. The intended receiver ue the key equence to cancel the effect of ISI on it ignal, while the eavedropper cannot. The coefficient of the filter are changed frequently and thu the eavedropper i not able to perform adaptive ISI cancellation. It i hown that thi method can ubtantially improve the achievable ecrecy rate of the correponding wiretap channel and provide ecrecy even in the cae that the eavedropper ha perfect acce to the output of the tranmitter radio. At high SNR, the ecrecy rate are better that public dicuion, which take advantage of additional reource in the form of two-way communication and a public authenticated channel. Neverthele, in the cae that two-way communication i poible and a public channel i available, our cheme can be ued in conjunction with public dicuion and improve it performance by adding more uncertainty to the adverary channel. REFERENCES [] D. Stinon, Cryptography: theory and practice. CRC pre,. [] R. Benon, The verona tory, National Security Agency Central Security Service, Hitorical ublication available via WWW. [3] A. Wyner, The wire-tap channel, Bell Sytem Technical Journal, vol. 5, no. 8, pp , 975. [] I. Cizár and J. Korner, Broadcat channel with confidential meage, IEEE Tranaction on Information Theory, vol., no. 3, pp , 978. [5] U. Maurer, Secret key agreement by public dicuion from common information, IEEE Tranaction on Information Theory, vol. 39, no. 3, pp , 993. [] R. Ahlwede and I. Cizár, Common randomne in information theory and cryptography. i. ecret haring, IEEE Tranaction on Information Theory, vol. 39, no., pp. 3, 993. [7] M. Bloch and J. Barro, hyical-layer Security: From Information Theory to Security Engineering. Cambridge Univerity re,. [8] R. Negi and S. Goel, Secret communication uing artificial noie, in IEEE Vehicular Technology Conference, 5, vol., p. 9. [9] C. Cachin and U. Maurer, Unconditional ecurity againt memorybounded adverarie, Advance in Cryptology, pp. 9 3, 997. [] R. Kuchibhatla, Imft 5-nm mlc nand: technology caling barrier broken, EE Time New and Analyi,. [] S. Krone and G. Fettwei, Fundamental limit to communication with analog-to-digital converion at the receiver, in IEEE th Workhop on Signal roceing Advance in Wirele Communication, pp. 8, 9. [] S. Krone and G. Fettwei, A fundamental phyical limit to data tranmiion and proceing, Signal roceing Letter, IEEE, vol. 7, no. 3, pp ,. [3] A. Sheikholelami, D. Goeckel, and H. ihro-nik, Exploiting the noncommutativity of nonlinear operator for information-theoretic ecurity in diadvantaged wirele environment, 5th Annual Allerton Conference,. [] A. Sheikholelami, D. Goeckel, and H. ihro-nik, Everlating ecrecy by exploiting non-idealitie of the eavedropper receiver, arxiv:.79,. [5] W. Diffie and M. Hellman, New direction in cryptography, IEEE Tranaction on Information Theory, vol., no., pp. 5, 97. [] R. E. Blahut, rinciple and ractice of Information Theory. Addion- Weley, 987. [7] S. Leung-Yan-Cheong and M. Hellman, The gauian wire-tap channel, IEEE Tranaction on Information Theory, vol., no., pp. 5 5, 978.

Artificial Intersymbol Interference (ISI) to Exploit Receiver Imperfections for Secrecy

Artificial Intersymbol Interference (ISI) to Exploit Receiver Imperfections for Secrecy Artificial Intersymbol Interference ISI to Exploit Receiver Imperfections for Secrecy Azadeh Sheikholeslami, Dennis Goeckel and Hossein ishro-nik Electrical and Computer Engineering Department, University

More information

Asymptotic Diversity Analysis of Alamouti Transmit Diversity with Quasi-ML Decoding Algorithm in Time-Selective Fading Channels

Asymptotic Diversity Analysis of Alamouti Transmit Diversity with Quasi-ML Decoding Algorithm in Time-Selective Fading Channels International Journal of Software Engineering and It Application Vol. 9, No. 1 (015), pp. 381-388 http://dx.doi.org/10.1457/ijeia.015.9.1.34 Aymptotic Diverity Analyi of Alamouti Tranmit Diverity with

More information

MIMO Systems: Multiple Antenna Techniques

MIMO Systems: Multiple Antenna Techniques ADVANCED MIMO SYSTEMS MIMO Sytem: Multiple Antenna Technique Yiqing ZOU, Zhengang PAN, Kai-Kit WONG Dr, Senior Member of IEEE, Aociate Editor, IEEE TWirele, IEEE CL, and JoC (AP), Senior Lecturer, Department

More information

UNIVERSITY OF SASKATCHEWAN EE456: Digital Communications FINAL EXAM, 9:00AM 12:00PM, December 9, 2010 (open-book) Examiner: Ha H.

UNIVERSITY OF SASKATCHEWAN EE456: Digital Communications FINAL EXAM, 9:00AM 12:00PM, December 9, 2010 (open-book) Examiner: Ha H. Name: Page 1 UNIVERSIY OF SASKACHEWAN EE456: Digital Communication FINAL EXAM, 9:00AM 1:00PM, December 9, 010 (open-book) Examiner: Ha H. Nguyen Permitted Material: Only textbook and calculator here are

More information

Frequency Calibration of A/D Converter in Software GPS Receivers

Frequency Calibration of A/D Converter in Software GPS Receivers Frequency Calibration of A/D Converter in Software GPS Receiver L. L. Liou, D. M. Lin, J. B. Tui J. Schamu Senor Directorate Air Force Reearch Laboratory Abtract--- Thi paper preent a oftware-baed method

More information

Subcarrier exclusion techniques

Subcarrier exclusion techniques Subcarrier excluion technique for coded OFDM ytem Kai-Uwe Schmidt, Jochen Ertel, Michael Benedix, and Adolf Finger Communication Laboratory, Dreden Univerity of Technology, 62 Dreden, Germany email: {chmidtk,

More information

AN EVALUATION OF DIGILTAL ANTI-ALIASING FILTER FOR SPACE TELEMETRY SYSTEMS

AN EVALUATION OF DIGILTAL ANTI-ALIASING FILTER FOR SPACE TELEMETRY SYSTEMS AN EVALUATION OF DIGILTAL ANTI-ALIASING FILTER FOR SPACE TELEMETRY SYSTEMS Alion de Oliveira Morae (1), Joé Antonio Azevedo Duarte (1), Sergio Fugivara (1) (1) Comando-Geral de Tecnologia Aeroepacial,

More information

The Performance Analysis of MIMO OFDM System with Different M-QAM Modulation and Convolution Channel Coding

The Performance Analysis of MIMO OFDM System with Different M-QAM Modulation and Convolution Channel Coding The Performance Analyi of MIMO OFDM Sytem with Different M-QAM Modulation and Convolution Channel Coding H. S. Shwetha M.tech, Digital Communication Engineering Siddaganga Intitute of Technology Tumakuru,

More information

REAL-TIME IMPLEMENTATION OF A NEURO-AVR FOR SYNCHRONOUS GENERATOR. M. M. Salem** A. M. Zaki** O. P. Malik*

REAL-TIME IMPLEMENTATION OF A NEURO-AVR FOR SYNCHRONOUS GENERATOR. M. M. Salem** A. M. Zaki** O. P. Malik* Copyright 2002 IFAC 5th Triennial World Congre, Barcelona, Spain REAL-TIME IMPLEMENTATION OF A NEURO- FOR SYNCHRONOUS GENERATOR M. M. Salem** A. M. Zaki** O. P. Malik* *The Univerity of Calgary, Canada

More information

DESIGN OF SECOND ORDER SIGMA-DELTA MODULATOR FOR AUDIO APPLICATIONS

DESIGN OF SECOND ORDER SIGMA-DELTA MODULATOR FOR AUDIO APPLICATIONS DESIGN OF SECOND ORDER SIGMA-DELTA MODULATOR FOR AUDIO APPLICATIONS 1 DHANABAL R, 2 BHARATHI V, 3 NAAMATHEERTHAM R SAMHITHA, 4 G.SRI CHANDRAKIRAN, 5 SAI PRAMOD KOLLI 1 Aitant Profeor (Senior Grade), VLSI

More information

Automatic Target Recognition with Unknown Orientation and Adaptive Waveforms

Automatic Target Recognition with Unknown Orientation and Adaptive Waveforms Automatic Target Recognition wi Unknown Orientation and Adaptive Waveform Junhyeong Bae Department of Electrical and Computer Engineering Univerity of Arizona 13 E. Speedway Blvd, Tucon, Arizona 8571 dolbit@email.arizona.edu

More information

Comm 502: Communication Theory. Lecture 5. Intersymbol Interference FDM TDM

Comm 502: Communication Theory. Lecture 5. Intersymbol Interference FDM TDM Lecture 5 Interymbol Interference FDM TDM 1 Time Limited Waveform Time-Limited Signal = Frequency Unlimited Spectrum Square Pule i a Time-Limited Signal Fourier Tranform 0 T S -3/T S -2/T S -1/T S 0 1/T

More information

DIGITAL COMMUNICATION

DIGITAL COMMUNICATION DEPARTMENT OF ELECTRICAL &ELECTRONICS ENGINEERING DIGITAL COMMUNICATION Spring 2010 Yrd. Doç. Dr. Burak Kelleci OUTLINE Line Code Differential Encoding Regeneration, Decoding and Filtering Delta Modulation

More information

Adaptive Code Allocation for Interference Exploitation on the Downlink of MC-CDMA Systems

Adaptive Code Allocation for Interference Exploitation on the Downlink of MC-CDMA Systems Adaptive Code Allocation for Interference Exploitation on the Downlink of MC-CDMA Sytem E. Alua and C. Maouro School of Electrical and Electronic Engineering, The Univerity of Mancheter, PO. Box 88, email:

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS SIMULATION PERFORMANCE OF MULTIPLE-INPUT MULTIPLE-OUTPUT SYSTEMS EMPLOYING SINGLE- CARRIER MODULATION AND ORTHOGONAL FRE- QUENCY DIVISION MULTIPLEXING

More information

Chapter Introduction

Chapter Introduction Chapter-6 Performance Analyi of Cuk Converter uing Optimal Controller 6.1 Introduction In thi chapter two control trategie Proportional Integral controller and Linear Quadratic Regulator for a non-iolated

More information

Space-Time Coded Systems with Continuous Phase Frequency Shift Keying

Space-Time Coded Systems with Continuous Phase Frequency Shift Keying Thi full text paper wa peer reviewed at the direction of IEEE Communication Society ubject matter expert for publication in the IEEE GLOBECOM 005 proceeding Space-Time Coded Sytem with Continuou Phae Frequency

More information

HIGH VOLTAGE DC-DC CONVERTER USING A SERIES STACKED TOPOLOGY

HIGH VOLTAGE DC-DC CONVERTER USING A SERIES STACKED TOPOLOGY HIGH VOLTAGE DC-DC CONVERTER USING A SERIES STACKED TOPOLOGY Author: P.D. van Rhyn, Co Author: Prof. H. du T. Mouton Power Electronic Group (PEG) Univerity of the Stellenboch Tel / Fax: 21 88-322 e-mail:

More information

ECS455: Chapter 5 OFDM

ECS455: Chapter 5 OFDM ECS455: Chapter 5 OFDM 1 Dr.Prapun Sukompong prapun.com/ec455 Office Hour: BKD 3601-7 Tueday 9:30-10:30 Friday 14:00-16:00 2 OFDM: Overview Let S 1, S 2,, S N be the information ymbol. The dicrete baeband

More information

Wireless Link SNR Mapping Onto An Indoor Testbed

Wireless Link SNR Mapping Onto An Indoor Testbed Wirele Link SNR Mapping Onto An Indoor Tetbed Jing Lei, Roy Yate, Larry Greentein, Hang Liu WINLAB Rutger Univerity 73 Brett Road, Picataway, NJ 8854, USA {michelle, ryate, ljg, hliu}@winlab.rutger.edu

More information

II. SYSTEM MODEL. A. Link and path model

II. SYSTEM MODEL. A. Link and path model HARQ I. INTRODUCTION ARQ (automatic repeat-requet i a link layer protocol ued for packet error detection and retranmiion. Errordetection bit (uch a CRC bit are attached and tranmitted along with the meage

More information

Lecture 11. Noise from optical amplifiers. Optical SNR (OSNR), noise figure, (electrical) SNR Amplifier and receiver noise

Lecture 11. Noise from optical amplifiers. Optical SNR (OSNR), noise figure, (electrical) SNR Amplifier and receiver noise Lecture 11 Noie from optical amplifier EDFA noie Raman noie Optical SNR (OSNR), noie figure, (electrical) SNR Amplifier and receiver noie ASE and hot/thermal noie Preamplification for SNR improvement Fiber

More information

Produced in cooperation with. Revision: May 26, Overview

Produced in cooperation with. Revision: May 26, Overview Lab Aignment 6: Tranfer Function Analyi Reviion: May 6, 007 Produced in cooperation with www.digilentinc.com Overview In thi lab, we will employ tranfer function to determine the frequency repone and tranient

More information

A Feasibility Study on Frequency Domain ADC for Impulse-UWB Receivers

A Feasibility Study on Frequency Domain ADC for Impulse-UWB Receivers A Feaibility Study on Frequency Domain ADC for Impule-UWB Receiver Rajeh hirugnanam and Dong Sam Ha VV (Virginia ech VLSI for elecommunication Lab Department of Electrical and Computer Engineering Virginia

More information

Active vibration isolation for a 6 degree of freedom scale model of a high precision machine

Active vibration isolation for a 6 degree of freedom scale model of a high precision machine Active vibration iolation for a 6 degree of freedom cale model of a high preciion machine W.B.A. Boomma Supervior Report nr : Prof. Dr. Ir. M. Steinbuch : DCT 8. Eindhoven Univerity of Technology Department

More information

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Stability Analyi in a Cognitive Radio Sytem with Cooperative Beamforming Mohammed Karmooe, Ahmed Sultan, Moutafa Youef Department of Electrical Engineering, Alexandria Univerity, Alexandria, Egypt Wirele

More information

Time-Domain Coupling to a Device on Printed Circuit Board Inside a Cavity. Chatrpol Lertsirimit, David R. Jackson and Donald R.

Time-Domain Coupling to a Device on Printed Circuit Board Inside a Cavity. Chatrpol Lertsirimit, David R. Jackson and Donald R. Time-Domain Coupling to a Device on Printed Circuit Board Inide a Cavity Chatrpol Lertirimit, David R. Jackon and Donald R. Wilton Applied Electromagnetic Laboratory Department of Electrical Engineering,

More information

Position Control of a Large Antenna System

Position Control of a Large Antenna System Poition Control of a Large Antenna Sytem uldip S. Rattan Department of Electrical Engineering Wright State Univerity Dayton, OH 45435 krattan@c.wright.edu ABSTRACT Thi report decribe the deign of a poition

More information

Analysis. Control of a dierential-wheeled robot. Part I. 1 Dierential Wheeled Robots. Ond ej Stan k

Analysis. Control of a dierential-wheeled robot. Part I. 1 Dierential Wheeled Robots. Ond ej Stan k Control of a dierential-wheeled robot Ond ej Stan k 2013-07-17 www.otan.cz SRH Hochchule Heidelberg, Mater IT, Advanced Control Engineering project Abtract Thi project for the Advanced Control Engineering

More information

RESEARCH ON NEAR FIELD PASSIVE LOCALIZATION BASED ON PHASE MEASUREMENT TECHNOLOGY BY TWO TIMES FREQUENCY DIFFERENCE

RESEARCH ON NEAR FIELD PASSIVE LOCALIZATION BASED ON PHASE MEASUREMENT TECHNOLOGY BY TWO TIMES FREQUENCY DIFFERENCE RESEARCH ON NEAR FIED PASSIVE OCAIZATION BASED ON PHASE MEASUREMENT TECHNOOGY BY TWO TIMES FREQUENCY DIFFERENCE Xuezhi Yan, Shuxun Wang, Zhongheng Ma and Yukuan Ma College of Communication Engineering

More information

Formatting and Baseband. Formatting & Baseband. Page 1. Formatting and Baseband Modulation. CSE4214 Digital Communications

Formatting and Baseband. Formatting & Baseband. Page 1. Formatting and Baseband Modulation. CSE4214 Digital Communications CSE4214 Digital Communication CSE4214 Digital Communication Chapter 2 Formatting Formatting and Baeband Modulation Formatting & Baeband Formatting and Baeband 3 4 Page 1 1 What i Formatting? Information

More information

Massachusetts Institute of Technology Haystack Observatory WESTFORD, MASSACHUSETTS DATE 07/15/2009

Massachusetts Institute of Technology Haystack Observatory WESTFORD, MASSACHUSETTS DATE 07/15/2009 BBD Memo #033 Maachuett Intitute of Technolog Hatack Obervator WESTFORD, MASSACHUSETTS 0886 DATE 07/5/2009 To: Broadband Development Group From: C. J. Beaudoin Subject: Holographic Proceing and Conideration

More information

A Real-Time Wireless Channel Emulator For MIMO Systems

A Real-Time Wireless Channel Emulator For MIMO Systems A eal-time Wirele Channel Emulator For MIMO Sytem Hamid Elami, Ahmed M. Eltawil {helami,aeltawil}@uci.edu Abtract: The improvement in channel capacity hailed by MIMO ytem i directly related to intricate

More information

COST OF TRANSMISSION TRANSACTIONS: Comparison and Discussion of Used Methods

COST OF TRANSMISSION TRANSACTIONS: Comparison and Discussion of Used Methods INTERNATIONAL CONFERENCE ON RENEWABLE ENERGY AND POWER QUALITY (ICREPQ 03) COST OF TRANSMISSION TRANSACTIONS: Comparion and Dicuion of Ued Method Judite Ferreira 1, Zita Vale 2, A. Almeida Vale 3 and Ricardo

More information

Pulse Interval Modulation Dual Header (PIM-DH)

Pulse Interval Modulation Dual Header (PIM-DH) Pule Interval Modulation Dual Header () N. Aldiiat, Z. Ghaemlooy, and R. Saatchi Electronic Reearch Group, School of Engineering Sheffield Hallam Univerity Sheaf Building, Pond Street Sheffield S WB United

More information

ECE 6640 Digital Communications

ECE 6640 Digital Communications ECE 6640 Digital Communication Dr. Bradley J. Bazuin Aitant Profeor Department of Electrical and Computer Engineering College of Engineering and Applied Science Chapter 2 2. Formatting and Baeband Modulation.

More information

Pre- and Post-DFT Combining Space Diversity Receiver for Wideband Multi-Carrier Systems

Pre- and Post-DFT Combining Space Diversity Receiver for Wideband Multi-Carrier Systems Pre- and Pot- Combining Space Receiver for Wideband Multi-Carrier Sytem Muhammad Imadur Rahman, Suvra Sekhar Da, Frank HP Fitzek, Ramjee Praad Center for TeleInFratruktur (CTiF), Aalborg Univerity, Denmark

More information

Active Harmonic Elimination in Multilevel Converters Using FPGA Control

Active Harmonic Elimination in Multilevel Converters Using FPGA Control Active Harmonic Elimination in Multilevel Converter Uing FPGA Control Zhong Du, Leon M. Tolbert, John N. Chiaon Electrical and Computer Engineering The Univerity of Tenneee Knoxville, TN 7996- E-mail:

More information

The Central Limit Theorem

The Central Limit Theorem Objective Ue the central limit theorem to olve problem involving ample mean for large ample. The Central Limit Theorem In addition to knowing how individual data value vary about the mean for a population,

More information

A Flexible OFDM System Simulation Model. with BER Performance Test

A Flexible OFDM System Simulation Model. with BER Performance Test Contemporary Engineering Science, Vol. 5, 2012, no. 8, 365-374 A Flexible OFDM Sytem Simulation Model with BER Performance Tet Aladdin Amro Al-Huein Bin Talal Univerity, Jordan Department of Communication

More information

Studies on Novel Anti-jamming Technique of Unmanned Aerial Vehicle Data Link

Studies on Novel Anti-jamming Technique of Unmanned Aerial Vehicle Data Link Chinee Journal of Aeronautic 1(008) 141-148 Chinee Journal of Aeronautic www.elevier.com/locate/cja Studie on ovel Anti-jamming Technique of Unmanned Aerial Vehicle Data Link Huang enzhun a, *, ang Yongheng

More information

Constant Switching Frequency Self-Oscillating Controlled Class-D Amplifiers

Constant Switching Frequency Self-Oscillating Controlled Class-D Amplifiers http://dx.doi.org/.5755/j.eee..6.773 ELEKTRONIKA IR ELEKTROTECHNIKA, ISSN 39 5, OL., NO. 6, 4 Contant Switching Frequency Self-Ocillating Controlled Cla-D Amplifier K. Nguyen-Duy, A. Knott, M. A. E. Anderen

More information

Kalman Filtering Based Object Tracking in Surveillance Video System

Kalman Filtering Based Object Tracking in Surveillance Video System (669 -- 917) Proceeding of the 3rd (2011) CUSE International Conference Kalman Filtering Baed Object racking in Surveillance Video Sytem W.L. Khong, W.Y. Kow, H.. an, H.P. Yoong, K..K. eo Modelling, Simulation

More information

MIMO Enabled Efficient Mapping of Data in WiMAX Networks

MIMO Enabled Efficient Mapping of Data in WiMAX Networks MIMO Enabled Efficient Mapping of Data in WiMAX Network Penumarthi Phani Krihna, R. Saravana Manickam, and C. Siva Ram Murthy Department of Computer Science and Engineering Indian Intitute of Technology

More information

Mobile Communications TCS 455

Mobile Communications TCS 455 Mobile Communication TCS 455 Dr. Prapun Sukompong prapun@iit.tu.ac.th Lecture 23 1 Office Hour: BKD 3601-7 Tueday 14:00-16:00 Thurday 9:30-11:30 Announcement Read Chapter 9: 9.1 9.5 Section 1.2 from [Bahai,

More information

Adaptive Space/Frequency Processing for Distributed Aperture Radars

Adaptive Space/Frequency Processing for Distributed Aperture Radars Adaptive Space/Frequency Proceing for Ditributed Aperture Radar Raviraj Adve a, Richard Schneible b, Robert McMillan c a Univerity of Toronto Department of Electrical and Computer Engineering 10 King College

More information

Resonant amplifier L A B O R A T O R Y O F L I N E A R C I R C U I T S. Marek Wójcikowski English version prepared by Wiesław Kordalski

Resonant amplifier L A B O R A T O R Y O F L I N E A R C I R C U I T S. Marek Wójcikowski English version prepared by Wiesław Kordalski A B O R A T O R Y O F I N E A R I R U I T S Reonant amplifier 3 Marek Wójcikowki Englih verion prepared by Wieław Kordalki. Introduction Thi lab allow you to explore the baic characteritic of the reonant

More information

ECE 6640 Digital Communications

ECE 6640 Digital Communications ECE 6640 Digital Communication Dr. Bradley J. Bazuin Aitant Profeor Department of Electrical and Computer Engineering College of Engineering and Applied Science Chapter. Formatting and Baeband Modulation.

More information

Identification of Image Noise Sources in Digital Scanner Evaluation

Identification of Image Noise Sources in Digital Scanner Evaluation Identification of Image Noie Source in Digital Scanner Evaluation Peter D. Burn and Don William Eatman Kodak Company, ocheter, NY USA 4650-95 ABSTACT For digital image acquiition ytem, analyi of image

More information

SCK LAB MANUAL SAMPLE

SCK LAB MANUAL SAMPLE SCK LAB MANUAL SAMPLE VERSION 1.2 THIS SAMPLE INCLUDES: TABLE OF CONTENTS TWO SELECTED LABS FULL VERSION IS PROVIDED FREE WITH KITS Phone: +92 51 8356095, Fax: +92 51 8311056 Email: info@renzym.com, URL:www.renzym.com

More information

IMPROVED SPATIAL MODULATION FOR HIGH SPECTRAL EFFICIENCY

IMPROVED SPATIAL MODULATION FOR HIGH SPECTRAL EFFICIENCY IMPOVED SPIL MODULION FO HIGH SPECL EFFICIENCY ajab M. Legnain, ohdy H.M. Hafez 1 and bdelgader M. Legnain 2 1 Department of Sytem and Computer Eng., Carleton Univerity, Ottawa, Canada {rlegnain, hafez}@ce.carleton.ca

More information

A simple low rate turbo-like code design for spread spectrum systems

A simple low rate turbo-like code design for spread spectrum systems 5 A imple low rate turbo-like code deign for pread pectrum ytem Durai Thirupathi and Keith M. Chugg Communication Science Intitute Dept. of Electrical Engineering Univerity of Southern California, Lo Angele

More information

Radio-Efficient Adaptive Modulation and Coding: Green Communication Perspective

Radio-Efficient Adaptive Modulation and Coding: Green Communication Perspective Radio-Efficient Adaptive Modulation and Coding: Green Communication Perpective Liqiang Zhao, Jian Cai, and Hailin Zhang State Key Laboratory of Integrated Service Network Xidian Univerity Xi an, Shaanxi,

More information

Adaptive Groundroll filtering

Adaptive Groundroll filtering Adaptive Groundroll filtering David Le Meur (CGGVerita), Nigel Benjamin (CGGVerita), Rupert Cole (Petroleum Development Oman) and Mohammed Al Harthy (Petroleum Development Oman) SUMMARY The attenuation

More information

SINGLE-PHASE ACTIVE FILTER FOR HIGH ORDER HARMONICS COMPENSATION

SINGLE-PHASE ACTIVE FILTER FOR HIGH ORDER HARMONICS COMPENSATION .jee.ro SINGLE-PHASE ACTIVE FILTER FOR HIGH ORDER HARMONICS COMPENSATION Kyo-Beum Lee Diviion of Electrical and Computer Engineering, Ajou Univerity San5, Woncheon-dong, Yeontong-gu, Suon 44-749, Korea

More information

Self-Programmable PID Compensator for Digitally Controlled SMPS

Self-Programmable PID Compensator for Digitally Controlled SMPS 6 IEEE COMPEL Workhop, Renelaer Polytechnic Intitute, Troy, NY, USA, July 16-19, 6 Self-Programmable PID Compenator for Digitally Controlled SMPS Zhenyu Zhao and Alekandar Prodi Univerity of Toronto Toronto,

More information

GPS signal Rician fading model for precise navigation in urban environment

GPS signal Rician fading model for precise navigation in urban environment Indian Journal of Radio & Space Phyic Vol 42, June 203, pp 92-96 GPS ignal Rician fading model for precie navigation in urban environment G Sai Bhuhana Rao, G Sateeh Kumar $,* & M N V S S Kumar Department

More information

Non-Linear UWB Receivers With MLSE Post-Detection

Non-Linear UWB Receivers With MLSE Post-Detection on-linear UWB Receiver With MLSE Pot-Detection Florian roech, homa Zaowki, and Armin Wittneben Communication echnology Laboratory, EH Zurich, 8092 Zurich, Switzerland Email: {troechf,zaowki,wittneben}@nari.ee.ethz.ch

More information

Alternating Opportunistic Large Arrays in Broadcasting for Network Lifetime Extension

Alternating Opportunistic Large Arrays in Broadcasting for Network Lifetime Extension IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL 8, NO 6, JUNE 009 831 Alternating Opportunitic Large Array in Broadcating for Network Lifetime Extenion Aravind Kaila and Mary Ann Ingram Abtract We propoe

More information

Optimized BER Performance of Asymmetric Turbo Codes over AWGN Channel

Optimized BER Performance of Asymmetric Turbo Codes over AWGN Channel International Journal of Computer Application (0975 8887) Optimized Performance of Aymmetric Turbo Code over AWGN Channel M.Srinivaa Rao Pvpit, JNTU Kainada Andhra Pradeh, India. G.Vijaya Kumar Pvpit,

More information

Performance evaluation of a DPSK/SCM combined modulation scheme for optical label switching

Performance evaluation of a DPSK/SCM combined modulation scheme for optical label switching Performance evaluation of a DPSK/SCM combined modulation cheme for optical label witching C. Díaz Giménez, I. Tafur Monroy, J.J. Vega Olmo, S. Sale, A.M.J. Koonen COBRA Reearch Intitute, Faculty of Electrical

More information

HARMONIC COMPENSATION ANALYSIS USING UNIFIED SERIES SHUNT COMPENSATOR IN DISTRIBUTION SYSTEM

HARMONIC COMPENSATION ANALYSIS USING UNIFIED SERIES SHUNT COMPENSATOR IN DISTRIBUTION SYSTEM HARMONIC COMPENSATION ANAYSIS USING UNIFIED SERIES SHUNT COMPENSATOR IN DISTRIBUTION SYSTEM * Montazeri M. 1, Abai Garavand S. 1 and Azadbakht B. 2 1 Department of Electrical Engineering, College of Engineering,

More information

Control of Electromechanical Systems using Sliding Mode Techniques

Control of Electromechanical Systems using Sliding Mode Techniques Proceeding of the 44th IEEE Conference on Deciion and Control, and the European Control Conference 25 Seville, Spain, December 2-5, 25 MoC7. Control of Electromechanical Sytem uing Sliding Mode Technique

More information

The RCS of a resistive rectangular patch antenna in a substrate-superstrate geometry

The RCS of a resistive rectangular patch antenna in a substrate-superstrate geometry International Journal of Wirele Communication and Mobile Computing 0; (4): 9-95 Publihed online October 0, 0 (http://www.ciencepublihinggroup.com/j/wcmc) doi: 0.648/j.wcmc.0004. The RCS of a reitive rectangular

More information

ENERGY CONSERVING MODEL FOR THE CHANNEL POWER-GAIN IN WIRELESS MULTI-USER DOWNLINK SCENARIOS

ENERGY CONSERVING MODEL FOR THE CHANNEL POWER-GAIN IN WIRELESS MULTI-USER DOWNLINK SCENARIOS ENERGY CONSERVING MOEL FOR THE CHANNEL POWER-GAIN IN WIRELESS MULTI-USER OWNLIN SCENARIOS Michel T. Ivrlač and Joef A. Noek Intitute for Circuit Theory and Signal Proceing Techniche Univerität München

More information

Pilot Symbol Assisted Modulation using 16-Level QAM for a Wireless System

Pilot Symbol Assisted Modulation using 16-Level QAM for a Wireless System Pilot Symbol Aited Modulation uing 16-Level QAM for a Wirele Sytem Pilot Symbol Aited Modulation uing 16-Level QAM for a Wirele Sytem Angela DARIE, Ion BOGDAN Rezumat. Modulaţia cu imbol pilot(psam) ete

More information

An analytic technique

An analytic technique From June 2010 High Frequency Electronic Copyright 2010 Summit Technical Media, C An Analytic and Graphical Method for NA Deign with Feedback By Alan Victor, Nitronex Corp., and Jayeh Nath, Aviat Network

More information

Lab 7 Rev. 2 Open Lab Due COB Friday April 27, 2018

Lab 7 Rev. 2 Open Lab Due COB Friday April 27, 2018 EE314 Sytem Spring Semeter 2018 College of Engineering Prof. C.R. Tolle South Dakota School of Mine & Technology Lab 7 Rev. 2 Open Lab Due COB Friday April 27, 2018 In a prior lab, we et up the baic hardware

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /VETECS.2009.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /VETECS.2009. Nordin, R., Armour, S. M. D., & McGeehan, J. P. (9). Overcoming elfinterference in SM-OFDMA with and dynamic ubcarrier allocation. In IEEE 69th Vehicular Technology Conference 9 (VTC Spring 9), Barcelona

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS PERFORMANCE ANALYSIS OF THE EFFECT OF PULSED- NOISE INTERFERENCE ON WLAN SIGNALS TRANSMITTED OVER A NAKAGAMI FADING CHANNEL by Andrea Toumani March

More information

An FM signal in the region of 4.2 to 4.6

An FM signal in the region of 4.2 to 4.6 A LOW COST, HIGH ACCURACY RADAR ALTIMETER Thi article decribe the development of a frequency modulated (FM) radar altimeter for meauring the height of flying object. The entire tructure comprie two part:

More information

Voltage Analysis of Distribution Systems with DFIG Wind Turbines

Voltage Analysis of Distribution Systems with DFIG Wind Turbines 1 Voltage Analyi of Ditribution Sytem with DFIG Wind Turbine Baohua Dong, Sohrab Agarpoor, and Wei Qiao Department of Electrical Engineering Univerity of Nebraka Lincoln Lincoln, Nebraka 68588-0511, USA

More information

A SIMPLE HARMONIC COMPENSATION METHOD FOR NONLINEAR LOADS USING HYSTERESIS CONTROL TECHNIQUE

A SIMPLE HARMONIC COMPENSATION METHOD FOR NONLINEAR LOADS USING HYSTERESIS CONTROL TECHNIQUE A IMPLE HARMONIC COMPENATION METHOD FOR NONLINEAR LOAD UING HYTEREI CONTROL TECHNIQUE Kemal KETANE kemalketane@gazi.edu.tr İre İKENDER irei@gazi.edu.tr Gazi Univerity Engineering and Architecture Faculty

More information

Reinforcement Learning Based Anti-jamming with Wideband Autonomous Cognitive Radios

Reinforcement Learning Based Anti-jamming with Wideband Autonomous Cognitive Radios 1 Reinforcement Learning Baed Anti-jamming with Wideband Autonomou Cognitive Radio Stephen Machuzak, Student Member, IEEE, and Sudharman K. Jayaweera, Senior Member, IEEE Communication and Information

More information

Sampling Theory MODULE XIII LECTURE - 41 NON SAMPLING ERRORS

Sampling Theory MODULE XIII LECTURE - 41 NON SAMPLING ERRORS Sampling Theory MODULE XIII LECTURE - 41 NON SAMPLING ERRORS DR. SHALABH DEPARTMENT OF MATHEMATICS AND STATISTICS INDIAN INSTITUTE OF TECHNOLOG KANPUR 1 It i a general aumption in ampling theory that the

More information

Operation of the Discrete Wavelet Transform: basic overview with examples

Operation of the Discrete Wavelet Transform: basic overview with examples Operation o the Dicrete Wavelet Tranorm: baic overview with example Surname, name Antonino Daviu, Joe Alono (joanda@die.upv.e) Department Centre Ecuela Técnica Superior de Ingeniero Indutriale Departamento

More information

Comparative Study of PLL, DDS and DDS-based PLL Synthesis Techniques for Communication System

Comparative Study of PLL, DDS and DDS-based PLL Synthesis Techniques for Communication System International Journal of Electronic Engineering, 2(1), 2010, pp. 35-40 Comparative Study of PLL, DDS and DDS-baed PLL Synthei Technique for Communication Sytem Govind Singh Patel 1 & Sanjay Sharma 2 1

More information

Performance Analysis of Ultra-Wide Band Impulse Radio (UWB-IR) with Super-Orthogonal Turbo Codes (SOTC)

Performance Analysis of Ultra-Wide Band Impulse Radio (UWB-IR) with Super-Orthogonal Turbo Codes (SOTC) rformance Analyi of Ultra-Wide Band Impule Radio UWB-IR with Super-Orthogonal Turbo Code SOTC Uman Riaz, Man-On Pun and C.-C. Jay Kuo Abtract Low-complexity low-rate uper-orthogonal turbo code SOTC are

More information

Raising Cavity Q for Microwave-Pulse Compression by Reducing Aperture Skin-Effect Losses

Raising Cavity Q for Microwave-Pulse Compression by Reducing Aperture Skin-Effect Losses Circuit and Electromagnetic Sytem Deign Note Note 6 8 June 9 Raiing Cavity Q for Microwave-Pule Compreion by Reducing Aperture Skin-Effect Loe Carl E. Baum Univerity of New Meico Department of Electrical

More information

A Simple DSP Laboratory Project for Teaching Real-Time Signal Sampling Rate Conversions

A Simple DSP Laboratory Project for Teaching Real-Time Signal Sampling Rate Conversions A Simple DSP Laboratory Project for Teaching Real-Time Signal Sampling Rate Converion by Li Tan, Ph.D. lizhetan@pnc.edu Department of ECET Purdue Univerity North Central Wetville, Indiana Jean Jiang, Ph.D.

More information

Communication Systems, 5e

Communication Systems, 5e Communication Sytem, 5e Chapter 6: Sampling and pule modulation A. Bruce Carlon Paul B. Crilly 00 The McGraw-Hill Companie Chapter 6: Sampling and pule modulation Sampling theory and practice Pule-amplitude

More information

Supervised Information-Theoretic Competitive Learning by Cost-Sensitive Information Maximization

Supervised Information-Theoretic Competitive Learning by Cost-Sensitive Information Maximization BIC, 9 Aug- ept upervied Information-Theoretic Competitive Learning by Cot-enitive Information Maximization Ryotaro Kamimura Information cience Laboratory, Tokai Univerity, 7 Kitakaname Hiratuka Kanagawa

More information

Published in: Proceedings of the 26th European Solid-State Circuits Conference, 2000, ESSCIRC '00, September 2000, Stockholm, Sweden

Published in: Proceedings of the 26th European Solid-State Circuits Conference, 2000, ESSCIRC '00, September 2000, Stockholm, Sweden Uing capacitive cro-coupling technique in RF low noie amplifier and down-converion mixer deign Zhuo, Wei; Embabi, S.; Pineda de Gyvez, J.; Sanchez-Sinencio, E. Publihed in: Proceeding of the 6th European

More information

CHAPTER 2 WOUND ROTOR INDUCTION MOTOR WITH PID CONTROLLER

CHAPTER 2 WOUND ROTOR INDUCTION MOTOR WITH PID CONTROLLER 16 CHAPTER 2 WOUND ROTOR INDUCTION MOTOR WITH PID CONTROLLER 2.1 INTRODUCTION Indutrial application have created a greater demand for the accurate dynamic control of motor. The control of DC machine are

More information

The Cascode and Cascaded Techniques LNA at 5.8GHz Using T-Matching Network for WiMAX Applications

The Cascode and Cascaded Techniques LNA at 5.8GHz Using T-Matching Network for WiMAX Applications International Journal of Computer Theory and Engineering, Vol. 4, No. 1, February 01 The Cacode and Cacaded Technique LNA at 5.8Hz Uing T-Matching Network for WiMAX Application Abu Bakar Ibrahim, Abdul

More information

Reactive Power Control of Photovoltaic Systems Based on the Voltage Sensitivity Analysis Rasool Aghatehrani, Member, IEEE, and Anastasios Golnas

Reactive Power Control of Photovoltaic Systems Based on the Voltage Sensitivity Analysis Rasool Aghatehrani, Member, IEEE, and Anastasios Golnas 1 Reactive ower Control of hotovoltaic ytem Baed on the Voltage enitivity Analyi Raool Aghatehrani, Member, IEEE, and Anataio Golna Abtract: Thi paper addree the voltage fluctuation caued by the output

More information

Wavelength-Time Coding for Ultra Dense Wavelength Multiplexing

Wavelength-Time Coding for Ultra Dense Wavelength Multiplexing Wavelength-Time Coding for Ultra Dene Wavelength Multiplexing Frank Schaich and Joachim Speidel Intitut für Nachrichtenübertragung, Univerität Stuttgart Pfaffenwaldring 7, D-759 Stuttgart Email: frank.chaich@inue.uni-tuttgart.de

More information

Location-based Access Control. Outline. Why do we need location in WSN? SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

Location-based Access Control. Outline. Why do we need location in WSN? SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks SeRLoc: Secure Range-Independent Localization for Wirele Senor Network Louka Lazo Advior: Radha Poovendran Network Security Lab Univerity of Wahington Outline Motivation Secure Localization Problem SeRLoc

More information

FUZZY Logic Based Space Vector PWM Controlled Hybrid Active Power Filter for Power Conditioning

FUZZY Logic Based Space Vector PWM Controlled Hybrid Active Power Filter for Power Conditioning FUZZY Logic Baed Space Vector PWM Controlled Hybrid Active Power Filter for Power Conditioning 1 JARUPULA SOMLAL 2 DR.MANNAM VENU GOPALA RAO 1 Aociate Profeor, 2 Profeor Department of EEE K L Univerity

More information

Available online at ScienceDirect. Procedia Technology 21 (2015 ) SMART GRID Technologies, August 6-8, 2015

Available online at   ScienceDirect. Procedia Technology 21 (2015 ) SMART GRID Technologies, August 6-8, 2015 Available online at www.ciencedirect.com ScienceDirect Procedia Technology 1 (15 ) 589 595 SMART GRID Technologie, Augut 6-8, 15 An Optimization Algorithm for Voltage Flicer Analyi Athira S a*, Hariumar

More information

Hashiwokakero. T. Morsink. August 31, 2009

Hashiwokakero. T. Morsink. August 31, 2009 Hahiwokakero T. Morink Augut 31, 2009 Content 1 Introduction 3 2 What i Hahiwokakero? 3 2.1 The rule............................. 3 2.2 Eay olving tatement..................... 4 3 Building an Own Solver

More information

Synthetic aperture radar raw signal simulator for both pulsed and FM-CW modes

Synthetic aperture radar raw signal simulator for both pulsed and FM-CW modes Computational Method and Experimental Meaurement XV 43 Synthetic aperture radar raw ignal imulator for both puled and FM-CW mode P. Serafi C. Lenik & A. Kawalec Intitute of adioelectronic, Military Univerity

More information

Robust Control of an Active Suspension System Using H 2 & H Control Methods. Fatemeh Jamshidi 1, Afshin Shaabany 1

Robust Control of an Active Suspension System Using H 2 & H Control Methods. Fatemeh Jamshidi 1, Afshin Shaabany 1 Journal of American Science, 11;(5) Robut Control of an Active Supenion Sytem Uing H & H Control Method Fatemeh Jamhidi 1, Afhin Shaabany 1 1 Ilamic Azad Univerity, Far Science and Reearch Branch, Shiraz,

More information

MAX3610 Synthesizer-Based Crystal Oscillator Enables Low-Cost, High-Performance Clock Sources

MAX3610 Synthesizer-Based Crystal Oscillator Enables Low-Cost, High-Performance Clock Sources Deign Note: HFDN-31.0 Rev.1; 04/08 MAX3610 Syntheizer-Baed Crytal Ocillator Enable Low-Cot, High-Performance Clock Source MAX3610 Syntheizer-Baed Crytal Ocillator Enable Low-Cot, High-Performance Clock

More information

Gemini. The errors from the servo system are considered as the superposition of three things:

Gemini. The errors from the servo system are considered as the superposition of three things: Gemini Mount Control Sytem Report Prediction Of Servo Error Uing Simulink Model Gemini 9 July 1996 MCSJDW (Iue 3) - Decribe the proce of etimating the performance of the main axi ervo uing the non-linear

More information

Fixed Structure Robust Loop Shaping Controller for a Buck-Boost Converter using Genetic Algorithm

Fixed Structure Robust Loop Shaping Controller for a Buck-Boost Converter using Genetic Algorithm Proceeding of the International ulticonference of Engineer and Computer Scientit 008 Vol II IECS 008, 9- arch, 008, Hong ong Fixed Structure Robut Loop Shaping Controller for a Buck-Boot Converter uing

More information

Experiment 8: Active Filters October 31, 2005

Experiment 8: Active Filters October 31, 2005 Experiment 8: Active Filter October 3, In power circuit filter are implemented with ductor and capacitor to obta the deired filter characteritic. In tegrated electronic circuit, however, it ha not been

More information

Resilient Large-Scale Cognitive Radio Ad Hoc Networking Using Path-Time Codes

Resilient Large-Scale Cognitive Radio Ad Hoc Networking Using Path-Time Codes IEEE ICC 2017 Cognitive Radio and Network Sympoium Reilient Large-Scale Cognitive Radio Ad Hoc Networking Uing Path-Time Code Yi-Chi Chen 1, I-Wei Lai 2 and Kwang-Cheng Chen 3 Graduate Intitute of Communication

More information

Design, Realization, and Analysis of PIFA for an RFID Mini-Reader

Design, Realization, and Analysis of PIFA for an RFID Mini-Reader Deign, Realization, and Analyi of PIFA for an RFID Mini-Reader SUNG-FEI YANG ; TROY-CHI CHIU ; CHIN-CHUNG NIEN Indutrial Technology Reearch Intitute (ITRI) Rm. 5, Bldg. 5, 95, Sec., Chung Hing Rd., Chutung,

More information

On-Demand Spectrum Sharing By Flexible Time-Slotted Cognitive Radio Networks

On-Demand Spectrum Sharing By Flexible Time-Slotted Cognitive Radio Networks On-Demand Spectrum Sharing By Flexible Time-Slotted Cognitive Radio Network Shimin Gong, Xu Chen, Jianwei Huang, and Ping Wang Centre for Multimedia and Network Technology, Nanyang Technological Univerity

More information