Defense Against Selfish PUEA in Cognitive Radio Networks Based on Hash Message Authentication Code

Size: px
Start display at page:

Download "Defense Against Selfish PUEA in Cognitive Radio Networks Based on Hash Message Authentication Code"

Transcription

1 Internatonal Journal of Electroncs and Informaton Engneerng, Vol.4, No.1, PP.12-21, Mar Defense Aganst Selfsh PUEA n Cogntve Rado Networks Based on Hash Message Authentcaton Code Wald Ramadan Ghanem, Mona Shokar, and Moawad I. Dessouky (Correspondng author: Wald Ramadan Ghanem) The Department of Electronc and Electrcal Communcaton, Menoufa Unversty, Egypt (Emal: wald.ghanem.eng@eee.org) (Receved Dec. 11, 2015; revsed and accepted Dec. 26, 2015) Abstract Cogntve rado network (CRN) s a very astute technology developed to solve the spectrum shortage problem n wreless communcaton by utlzng the unused bands, where a secondary user (SU) utlzes the free spectrum of the prmary user (PU) n an opportunstc manner. The CRN defnes the free spectrum sessons usng an ntellgent and sophstcated process called a spectrum sensng. The spectrum sensng encounters a securty problem called prmary user emulaton attack (PUEA). In ths problem, an attacker mmcs the PU sgnal to force the SUs to leave the free band. In ths paper, a proposed model based on hash message authentcaton code (HMAC) s used to detect the PUEA n CRN. HMAC s used to trustng the PU transmsson, whch s not clarfed untl now. A shared secret key s used between the SU and the PU to acheve an accurate dentfcaton of the PU sgnal from the attacker. The effectveness of the proposed approach s analyzed through both theoretcal analyss and Smulaton. Results show that the proposed method s completely defeated the selfsh PUEA and acheves effcent spectrum sharng, moreover, t provdes a good detecton of the PU when error correctng codes are used. Keywords: Cogntve rado network (CRN), hash message authentcaton code (HMAC), physcal layer authentcaton, prmary user emulaton Attack (PUEA) 1 Introducton Cogntve rado (CR) has attracted a strong attenton recently to solve the spectrum shortage problem [19]. Spectrum scarcty becomes a serous challenge to the emergng wreless technologes. In lcensed networks, the prmary users operate n ther allocated lcensed bands. It s recognzed that the lcensed bands are generally underutlzed and ther occupaton fluctuates temporary and geographcally n the range of 15-85%. In a typcal Cogntve Rado (CR) system, the PU s the spectrum lcense holder and the SU s an unlcensed user who ntends to use the spectrum opportunstcally. CR s based on Dynamc Spectrum Access (DSA), where the Prorty s gven to the PU n the sense that SU can only transmt, f ts transmsson s deemed to be a harmless to the PU. The SU s not allowed to transmt when the PU s transmttng [1]. Unused bands (Whte spaces) are dentfed through spectrum sensng process [24], then they are used by the SUs for data transmsson, the spectrum sensng process s contnuously performed to determne the whte spaces, f the prmary user s detected, then the SU must vacate the band for hm. The CR networks are exposed to many attacks one of these attacks s called PUEA. The PUEA s consdered as a physcal layer attack, where a selfsh user (attacker) mmcs the PU sgnal to confuse the SUs to leave the band for hm. Ths leads to low spectrum utlzaton n CRN. PUEA has been studed n many researches. R. Chen proposed to use the locaton of the prmary user to dentfy the PUEA n [9]. S. Annand made an analytcal model based on Fenton s approxmaton and Markov nequalty n [4]. Z. Jn et al. Presented a NeymanPearson composte hypothess test n [15]. and a Wald s sequental probablty rato test to detect the PUEA was descrbed n [16]. Z. Chen showed how the attacker can emulate the PU sgnal to confuse the SU and used an advanced strategy called varance detecton to mtgate the effect of an attacker usng the dfference between the communcaton channel of PUEA and PU n [10]. C. Chen et al made a jont poston verfcaton method to enhance the postonng accuracy n [14]. Cooperatve Spectrum Sensng n CRN n the Presence of the PUEA s proposed n [8]. Fegn Bao et al studed the PUEA wth natonal secondary users n CRN

2 Internatonal Journal of Electroncs and Informaton Engneerng, Vol.4, No.1, PP.12-21, Mar and usng a hybrd method based on Energy Detecton (ED) and Varance Detecton n [5]. Kapl M. Borle has developed a physcal layer authentcaton scheme for wreless communcaton n [7]. Advanced encrypton standard was used to mtgate PUEA n [2]. More researches dscussed ths problem wll be found n [3, 6, 12, 13, 21, 22]. In ths paper, a proposed Physcal layer authentcaton based on hash message authentcaton code (HMAC) s used to detect the PUEA n cogntve rado networks whch s not clarfed untl now. Moreover, dfferent codng technques wll be appled. The HMAC s used to generate a tag at the transmtter, ths tag s appended to the message and sent over the channel. At the recever the secondary user separates the message and tag and regenerates a new tag from the shared key and the receved message. By comparng the two tags, the SU determnes f the sgnal comes from the PU or from the attacker. The proposed method provde a good detecton of the PU and t s completely defeated the PUEA under any condton and ables a hgh spectrum usage and hgh effcency. The performance of the system s measured usng the probablty of false alarm and probablty of detecton. The rest of ths paper s organzed as follows In Secton 2, the problem formulaton wll be explaned. In Secton 3, the system model of the system s ntroduced. In Secton 4 the performance metrcs wll be presented. In Secton 5, the analytcal Model Evoluton wll be explaned. In Secton 6 numercal and smulaton results wll be ncluded. Fnally conclusons wll be drawn n Secton 7 2 Problem Formulaton The PUEA s consdered one of the man threats n CRNs. In ths problem, an attacker emulates the PU sgnal to confuse the SU to leave the free spectrum sesson as shown n Fgure 1. The attacker receves the sgnal from the prmary user and emulates t and retransmts the sgnal agan to the SUs. The SUs suppose that the transmsson comes from the PU and therefore, they leave the free spectrum. The PUEA destroys the spectrum sensng process. In Fgure 1, there are three users as follow: Prmary User: A user who has hgher prorty or legacy rghts for the usage of a specfc part of the Spectrum. Secondary User: A user who has a lower prorty and therefore explots the spectrum n such a way that t does not cause any nterference to PUs. Selfsh PUEA: the am of ths attacker s to maxmze the spectrum usage for hmself, by takng the free band and preventng the others SUs from usng t. Ths attacker can mmc the prmary user power, modulaton, sgnal characterstcs and any characterstcs of the PU sgnal. Thus the detecton of the attacker becomes extremely dffcult. The authentcaton s a proper method to solve ths problem. By authentcatng the transmsson between the PU and the SU, ths problem wll be solved easly. 3 System Model In ths secton, the system model wll be descrbed, then the block dagram of the proposed system, whch ncludes the attackers wll be explaned. Fnally the flow chart of the system wll be done as shown n fgure 2. The PU message runs nto the HMAC algorthm to produce the frst HMAC (TAG A) [23], then ths tag s padded wth the message usng TDMA, both of them are encoded, modulated and transmtted to the SUs as shown n fgure.2. The SU ntern runs the message porton of the transmsson through the HMAC algorthm usng the same key that was used by the PU, producng a second HMAC (TAG B), The SU compares the two tags. If they are dentcal the transmsson s assumed to be from the PU and the SU must stop ts transmsson, otherwse a PUEA s n progress. The attacker don not have the same key used by the PU and assumed to be not ntellgent enough to extract the key, therefore, he cannot authentcate hs transmsson. If the attacker uses another key, the SU defnes hm correctly. In Fgure 3, the flow chart of the proposed model s descrbed as follows, frst, a random data represents the PU message s generated, ths data s appled to the HMAC functon to generate the TAG A. The TAG A and the message are added together usng TDMA, then the message s encoded, modulated and transmtted on the channel. The SU receves the data demodulates and decodes t. Then SU separates the TAG from the message, and apples the message part to HMAC to produces a second tag (TAG B). And compares the two tags, f the two tags are dentcal, then the data s consdered from the PU, otherwse, the attacker s n progress and the SU must punsh hm.

3 Internatonal Journal of Electroncs and Informaton Engneerng, Vol.4, No.1, PP.12-21, Mar Fgure 1: The basc concept of PUEA n CRN Fgure 2: Block dagram of the proposed system

4 Internatonal Journal of Electroncs and Informaton Engneerng, Vol.4, No.1, PP.12-21, Mar Fgure 3: Flow chart of the proposed model

5 Internatonal Journal of Electroncs and Informaton Engneerng, Vol.4, No.1, PP.12-21, Mar Performance Matrces In ths secton, the system performance s analyzed by usng false alarm probablty and detecton probablty [10]. Most exstng works on cogntve sensng focused on performng a hypothess testng to decde the presence of the prmary user. H0: the sgnal s from the prmary user H1: the sgnal s from the attacker Probablty of false alarm (PFA): When the sgnal s consdered from the prmary user, the probablty that the SU falsely Identfy the sgnal as from the attacker s defned by [10]: P F A = P r(h 1 \H 0 ). (1) If ths case happens, the SU wll attempt to access the network and cause nterference to the PU. Then the SU may be punshed as an attacker. Hence the SU may use a strategy to make PFA as small as possble whle the attacker wants to make PFA as large as possble. Probablty of Prmary User detecton (PDP): When the sgnal s deeded from the PU, the probablty that the SU classfes t as from the prmary use, P DP = P r(h 0 \H 0 ) = 1 P F A. (2) If ths case happens, the SU wll attempt to access the network and cause nterference to the PU. Then the SU may be punshed as an attacker. Hence the SU may use a strategy to make PFA as small as possble whle the attacker wants to make PFA as large as possble. Probablty of Msdetecton (PMD): When the sgnal s counted from the attacker, the probablty that the SU classfes falsely t as from the prmary user s detonated by, P MD = P r(h 0 \H 1 ). (3) If ths happens, the vctm wll gve up accessng the network, although the spectrum band s vacant, and the attacker launches a successful PUEA and takes the spectrum resources. Another wdely matrces s the probablty of detecton of the attacker PDA. The SU should take a strategy to make the PDA as large as possble. 5 Analytcal Model Evoluton P DA = P r(h 1 \H 1 ) = 1 P MD. (4) The authentcaton tag s formed usng a Key based HMAC, even a sngle bt n the tag or the message wll destroy the authentcaton between the SU and the PU. The probablty of false alarm s calculated analytcally for the uuencoded BPSK under AWGN. The Probablty of False Alarm for Uuencoded BPSK Under AWGN The probablty of false alarm s related to the probablty of one bt occurs n the tag or the data. Assume the channel s a bnary symmetrc channel wth error probablty equal to P, the bt error occurs ndependently. Hence, the probablty of m errors n a block of n bts s gven by [20]. ( ) n P (m, n) = P m (1 P ) n m (5) k The probablty of false alarm s measured by calculatng the probablty of one error occur and more, therefore, the probablty of false alarm s gven by P F A = P r(atleastonebterror) (6) ( ) n = P m (1 P ) n m (7) k m=1

6 Internatonal Journal of Electroncs and Informaton Engneerng, Vol.4, No.1, PP.12-21, Mar The channel error rate of BPSK under AWGN s gven by [20]: P = 0.5erfc( Eb N o ). (8) The probablty of false alarm of uuencoded BPSK s done by put Equaton (8) nto Equaton (6): P m = m=1 ( ) n (0.5erf c( k Eb N o ) m )(1 (0.5erfc( For Coded BPSK Usng a Lnear Block Codng (BCH Code) P tag CW n P tag b =t tag +1 1 n tag ( n tag =t tag +1 Eb N o ))) n m (9) ) P (1 P ) n (10) ( n tag For smplcty equally wll be used the probablty of false alarm s gven by: P F A = 1 (1 P tag = 1 (1 CW ) L K tag =t tag +1 ( n tag ) P (1 P ) n (11) ) P (1 P ) n ) L K tag (12) The probablty of False Alarm of BPSK under AWGN usng block code s done by substtute Equaton (6) nto Equaton (12): ( ) n tag Eb P F A = 1 (1 (0.5erf c( )) m Eb (1 (0.5erfc( )) n ) L K N o N tag (13) o =t tag +1 The overall probablty of detecton of the prmary user of BPSK under AWGN when error correctng block code block code s done by: ( ) n tag Eb P DP = (1 (0.5erf c( ))) m Eb (1 (0.5erfc( )) n ) L K N o N tag (14) o =t tag +1 More about authentcaton and encrypton wll be found n [11, 17, 18]. 6 Smulaton And Numercal Results In ths secton, the effectveness of the HMAC authentcaton method wll be valdated through analytcal and smulaton. The smulaton parameters of the system wll be tabulated n table 1. Frst the data s generated by the PU as a random data of length 18bytes, ths data s prepared frst to apply as the nput of the HMAC functon to produce an output wth a length of 20 bytes by takng the left 18 bytes n the output to produce TAG A. The TAG A s appended to the message usng TDMA algorthm, then encoded, modulated and sent both of them on the channel. The SU separates the message and TAG A. The receved message s appled to HMAC to produce TAG B. The SU compares the two tags. If the two tags are dentcal, then the transmsson s represented by PU, otherwse s done by the attacker. Mont Carol smulaton s used, for every packet we run tmes and calculate the probablty of the false alarm and detecton. In Fgure 4 the probablty of false alarm vares by changng the SNR db usng BPSK under AWGN channel model. As the SNR ncreases the probablty of the PFA decreases. The smulaton and the analytcal soluton gves the same results. It s also show that, usng a good error correctng code decreases the PFA. At SNR=2dB, the PFA=100% for the uuencoded BPSK, when usng BCH (7, 4, 1) the PFA s decrease by 15%, when usng BCH (31, 16, 3) the PFA s decreased by 60%. In Fgure 5, the probablty of false alarm vares by changng the SNR db under AWGN channel model when the error correctng code s a reed solomn code. As the SNR ncreases the probablty of the PFA s decreases. At

7 Internatonal Journal of Electroncs and Informaton Engneerng, Vol.4, No.1, PP.12-21, Mar Fgure 4: The PFA versus the SNR for a dfferent BCH codes Table 1: Smulaton parameters Smulaton parameters N=1000 Data length of the PU 16bytes HMAC code length 16 bytes Total PU data 36 bytes Channel AWGN Modulaton type BPSK S/N db 0:20 db Encodng types BCH, Reed solomn Hash method used SHA-1 Fgure 5: PFA V.s SNR for Uuencoded and encoded usng RS (n, k) codes

8 Internatonal Journal of Electroncs and Informaton Engneerng, Vol.4, No.1, PP.12-21, Mar SNR=1dB the PFA=100% for the uuencoded, when usng RS (88, 36), RS (120, 36), RS (160, 36) and RS (240, 36) the PFA s decrease by 10%, 30 %, 60% and 98% respectvely. In Fgure 6 the probablty of detecton (PDA) s vared accordng to SNR db. The SU detect the attacker at each value of the SNR and acheve 100% detecton of PUEA under all cases. In ths smulaton the attacker tres many keys to confuse the SU but he cannot. The two curves are dentcal. Fgure 6: PDA of BPSK under AWGN 7 Conclusons In ths paper, a new method s proposed to solve the prmary user emulaton attack n cogntve rado networks. In ths model, the prmary user uses a hash message authentcaton code (HMAC) to authentcate ts transmsson. The new method helps the secondary user to defnes the attackers, by appendng a tag n the transmsson and sends the tag and the message on the channel. At the recever the SU separates the tag from the message and a new tag s generated from the receved message and the shard key. If the two tags are the same, then the transmsson s consdered from the PU, otherwse, the PUEA s n progress. The smulaton results show that the new method completely defeats the PUEA and provdes good detecton of the prmary user. In future, more error correctng codes and channel models wll be used. Acknowledgments The authors gratefully acknowledge the anonymous revewers for ther valuable comments. References [1] I. F. Akyldz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, Nextgeneraton/dynamc spectrum access/cogntve rado wreless networks, Computer Networks, vol. 50, no. 13, pp , [2] A. Alahmad, M. Abdelhakm, J. Ren, and T. L, Defense aganst prmary user emulaton attacks n cogntve rado networks usng advanced encrypton standard, IEEE Transactons on Informaton Forenscs and Securty, vol. 9, no. 5, pp , [3] A. Alahmad, T. Song, and T. L, Sub-band detecton of prmary user emulaton attacks n ofdm-based cogntve rado networks, n 2014 IEEE Global Conference on Sgnal and Informaton Processng (GlobalSIP 14), pp , Atlanta-GA, Dec [4] S. Anand, Z. Jn, and K. P. Subbalakshm, An analytcal model for prmary user emulaton attacks n cogntve rado networks, n 3rd IEEE Symposum on New Fronters n Dynamc Spectrum Access Networks (DyS- PAN 08), pp. 1 6, Chcago, USA, Oct

9 Internatonal Journal of Electroncs and Informaton Engneerng, Vol.4, No.1, PP.12-21, Mar [5] F. Bao, H. Chen, and L. Xe, Analyss of prmary user emulaton attack wth motonal secondary users n cogntve rado networks, n 2012 IEEE 23rd Internatonal Symposum on Personal Indoor and Moble Rado Communcatons (PIMRC 12), pp , Sydney-NSW, Sept [6] J. Blesa, E. Romero, A. Rozas, and A. Araujo, Pue attack detecton n cwsns usng anomaly detectton technques., EURASIP Journal on Wreless Communcatons and Networkng,, vol. 2013, no. 1, pp , [7] K. Borle, B. Chen, and W. Du, A physcal layer authentcaton scheme for counterng prmary user emulaton attacks, n IEEE Internatonal Conference on Acoustcs, Speech and Sgnal Processng (ICASSP 13), pp , Vancouver, BC, May [8] C. Chen, H. Cheng, and Y. Yao, Cooperatve spectrum sensng n cogntve rado networks n the presence of the prmary user emulaton attack, IEEE Transactons on Wreless Communcaton,, vol. 10, no. 7, pp , [9] R. Chen, J. Park, and J. Reed, Ensurng trustworthy spectrum sensng n cogntve rado networks, n Proceedngs of the IEEE Workshop Network Technology Software Defned Rado Networks(2006), pp , Reston, USA, sept [10] Z. Chen, T. Cooklev, C. Chen, and C. Plmalaza-Raez, Modelng prmary user emulaton attacks and defenses n cogntve rado networks, n IEEE Internatonal Conference on Communcatons (ICC 09), pp , Scottsdale, AZ, Dec [11] Y. Dou, W. Jang, and C. Ma, Improved fault attack aganst eta parng, Internatonal Journal of Network Securty, vol. 16, no. 1, pp , [12] W. R. Ghanem, M. Shokr, and MI Dessouky, Investgaton of puea n cogntve rado networks usng energy detecton n dfferent channel model, Crcuts and Systems: An Internatonal Journal, vol. 2, no. 2/3/4, pp. 1 11, [13] M. Haghghat and S. M. S. Sadough, Smart prmary user emulaton n cogntve rado networks: defence strateges aganst radoaware attacks and robust spectrum sensng., Transactons on Emergng Telecommuncatons Technologes,, vol. 26, no. 9, pp , [14] L. Huang, L. Xe, H. Yu, W. Wang, and Y. Yao, Ant-pue attack based on jont poston verfcaton n cogntve rado networks, n 2010 Internatonal Conference on Communcatons and Moble Computng (CMC 10),, pp , Shenzhen, Aprl [15] Z. Jn, S. Anand, and K. P. Subbalakshm, Mtgatng prmary user emulaton attacks n dynamc spectrum access networks usng hypothess testng, n IEEE Internatonal Conference on Communcatons (ICC 09), pp. 1 5, Dresden, USA, June [16] Z. Jn and K. P. Subbalakshm, Detectng prmary user emulaton attacks n dynamc spectrum access networks, n IEEE Internatonal Conference on Communcatons (ICC 09), pp. 1 5, Dresden, USA, June [17] C. C. Lee, C. H. Lu, and M. S. Hwang, Guessng attacks on strong-password authentcaton protocol., Internatonal Journal of Network Securty, vol. 15, no. 1, pp , [18] C. Ln, Y. Lv K. L, and C. C. Chang, Cphertext-audtable dentty-based encrypton., Internatonal Journal of Network Securty, vol. 17, no. 1, pp , [19] J. Mtola and G. Q. Magure, Cogntve rados: Makng software rados more personal, IEEE Personal Communcaton, vol. 6, no. 4, pp , [20] J. G. Proaks and M. Saleh, Dgtal Communcatons (5ed), Englsh. USA: McGraw-Hll Educaton, [21] M. J. Saber and S. M. S. Sadough, Optmal soft combnaton for multple antenna energy detecton under prmary user emulaton attacks, AEU-Internatonal Journal of Electroncs and Communcatons,, vol. 69, no. 9, pp , [22] A. A. Sharf, Morteza Sharf, and Mr Javad Musev Nya, Secure cooperatve spectrum sensng under prmary user emulaton attack n cogntve rado networks: Attack-aware threshold selecton approach, AEU- Internatonal Journal of Electroncs and Communcatons,, vol. 7, no. 2/3/4, pp , [23] W. Stallngs, Cryptography and Network Securty: Prncples and Practce (5ed). USA: Prentce-Hall, [24] H. Urkowtz, Energy detecton of unknown determnstc sgnals, Proceedngs of the IEEE, vol. 55, no. 4, pp , Wald R Ghanem receved the B.Sc. degree n communcaton engneerng from Electronc Engneerng, Menoufa Unversty, Egypt, n May 2011, and he s currently workng toward the MSc degree n Electrcal communcaton engneerng. Hs current research nterests are cogntve rado networks, Localzaton, wreless securty, encrypton and optmzaton algorthms. Mona Shokar receved the B.Sc., and M.Sc. degrees n electroncs engneerng from Menoufa Unversty, Menoufa, Egypt, n 1993, and 1997, respectvely. She receved the Ph.D. degree from Kyushu Unversty, Japan, n She receved VTS chapter IEEE award from Japan, n She publshed about 70 papers untl She receved

10 Internatonal Journal of Electroncs and Informaton Engneerng, Vol.4, No.1, PP.12-21, Mar the Assocated Professor degree n Presently, she s an Assocated Professor at Menoufa Unversty. Her research nterests nclude adaptve array antennas, CDMA system, WIMAX system, OFDM system, game theory, next generaton networks and optmzaton algorthms. Moawad I. Dessouky receved the B.Sc. (Honors) and M.Sc. degrees from the Faculty of Electronc Engneerng, Menoufa Unversty, Menouf, Egypt, n 1976 and 1981, respectvely, and the Ph.D. from McMaster Unversty, Canada, n He joned the teachng staff of the Department of Electroncs and Electrcal Communcatons, Faculty of Electronc Engneerng, Menoufa Unversty, Menouf, Egypt, n He has publshed more than 200 scentfc papers n natonal and Internatonal conference proceedngs and journals. He has receved the most cted paper award from Dgtal Sgnal Processng journal for Hs current research areas of nterest nclude spectral estmaton technques, mage enhancement, mage restoraton, super resoluton reconstructon of mages, satellte communcatons, and spread spectrum technques.

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

Malicious User Detection in Spectrum Sensing for WRAN Using Different Outliers Detection Techniques

Malicious User Detection in Spectrum Sensing for WRAN Using Different Outliers Detection Techniques Malcous User Detecton n Spectrum Sensng for WRAN Usng Dfferent Outlers Detecton Technques Mansh B Dave #, Mtesh B Nakran #2 Assstant Professor, C. U. Shah College of Engg. & Tech., Wadhwan cty-363030,

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

Improved Detection Performance of Cognitive Radio Networks in AWGN and Rayleigh Fading Environments

Improved Detection Performance of Cognitive Radio Networks in AWGN and Rayleigh Fading Environments Improved Detecton Performance of Cogntve Rado Networks n AWGN and Raylegh Fadng Envronments Yng Loong Lee 1, Wasan Kadhm Saad, Ayman Abd El-Saleh *1,, Mahamod Ismal 1 Faculty of Engneerng Multmeda Unversty

More information

Performance Evaluation of QoS Parameters in Dynamic Spectrum Sharing for Heterogeneous Wireless Communication Networks

Performance Evaluation of QoS Parameters in Dynamic Spectrum Sharing for Heterogeneous Wireless Communication Networks IJCSI Internatonal Journal of Computer Scence Issues, Vol. 9, Issue 1, No 2, January 2012 ISSN (Onlne): 1694-0814 www.ijcsi.org 81 Performance Evaluaton of QoS Parameters n Dynamc Spectrum Sharng for Heterogeneous

More information

Wideband Spectrum Sensing by Compressed Measurements

Wideband Spectrum Sensing by Compressed Measurements Wdeband Spectrum Sensng by Compressed Measurements Davood Mardan Najafabad Department of Electrcal Engneerng Yazd Unversty Emal: d.mardan@stu.yazdun.ac.r Al A. Tadaon Department of Electrcal Engneerng

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

Traffic balancing over licensed and unlicensed bands in heterogeneous networks

Traffic balancing over licensed and unlicensed bands in heterogeneous networks Correspondence letter Traffc balancng over lcensed and unlcensed bands n heterogeneous networks LI Zhen, CUI Qme, CUI Zhyan, ZHENG We Natonal Engneerng Laboratory for Moble Network Securty, Bejng Unversty

More information

Selective Sensing and Transmission for Multi-Channel Cognitive Radio Networks

Selective Sensing and Transmission for Multi-Channel Cognitive Radio Networks IEEE INFOCOM 2 Workshop On Cogntve & Cooperatve Networks Selectve Sensng and Transmsson for Mult-Channel Cogntve Rado Networks You Xu, Yunzhou L, Yfe Zhao, Hongxng Zou and Athanasos V. Vaslakos Insttute

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal

More information

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game 8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang

More information

SC-FDMA and OFDMA: An Efficient Wireless Image Transmission Schemes

SC-FDMA and OFDMA: An Efficient Wireless Image Transmission Schemes Journal of Control and Systems Engneerng 016, Vol. 4 Iss. 1, PP. 74-83 Frst onlne: 8 July 016 SC-FDMA and OFDMA: An Effcent Wreless Image Transmsson Schemes Fasal S. Al-Kamal 1, Abdullah A. Qasem, Samah

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

Index Terms Adaptive modulation, Adaptive FEC, Packet Error Rate, Performance.

Index Terms Adaptive modulation, Adaptive FEC, Packet Error Rate, Performance. ANALYTICAL COMPARISON OF THE PERFORMANCE OF ADAPTIVE MODULATION AND CODING IN WIRELESS NETWORK UNDER RAYLEIGH FADING 723 Sab Y.M. BANDIRI, Rafael M.S. BRAGA and Danlo H. SPADOTI Federal Unversty of Itajubá

More information

An Efficient Energy Adaptive Hybrid Error Correction Technique for Underwater Wireless Sensor Networks

An Efficient Energy Adaptive Hybrid Error Correction Technique for Underwater Wireless Sensor Networks World Academy of Scence, Engneerng and Technology 5 2 An Effcent Energy Adaptve Hybrd Error Correcton Technque for Underwater Wreless Sensor Networks Ammar Elyas babker, M.Nordn B. Zakara, Hassan Yosf,

More information

MIMO-OFDM Systems. Team Telecommunication and Computer Networks, FSSM, University Cadi Ayyad, P.O. Box 2390, Marrakech, Morocco.

MIMO-OFDM Systems. Team Telecommunication and Computer Networks, FSSM, University Cadi Ayyad, P.O. Box 2390, Marrakech, Morocco. IJCSI Internatonal Journal of Computer Scence Issues, Vol. 8, Issue 3, ay 2011 ISSN (Onlne: 1694-0814 A Low-complexty Power and Bt Allocaton Algorthm for ultuser IO-OFD Systems Ayad Habb 1, Khald El Baamran

More information

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

Topology Control for C-RAN Architecture Based on Complex Network

Topology Control for C-RAN Architecture Based on Complex Network Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

MATCHED FILTER BASED SPECTRUM SENSING FOR COGNITIVE RADIO AT LOW SIGNAL TO NOISE RATIO

MATCHED FILTER BASED SPECTRUM SENSING FOR COGNITIVE RADIO AT LOW SIGNAL TO NOISE RATIO Journal of heoretcal and Appled Informaton echnology th Aprl 4. Vol. 6 No. 5-4 JAI & LLS. All rghts reserved. ISSN: 99-8645 www.jatt.org E-ISSN: 87-395 MACED FILER BASED SPECRUM SENSING FOR COGNIIVE RADIO

More information

On Channel Estimation of OFDM-BPSK and -QPSK over Generalized Alpha-Mu Fading Distribution

On Channel Estimation of OFDM-BPSK and -QPSK over Generalized Alpha-Mu Fading Distribution Int. J. Communcatons, Network and System Scences, 010, 3, 380-384 do:10.436/jcns.010.34048 Publshed Onlne Aprl 010 (http://www.scrp.org/journal/jcns/) On Channel Estmaton of OFDM-BPSK and -QPSK over Generalzed

More information

Cooperative Sensing Decision Rules over Imperfect Reporting Channels Nian Xia1, a, Chu-Sing Yang1, b

Cooperative Sensing Decision Rules over Imperfect Reporting Channels Nian Xia1, a, Chu-Sing Yang1, b 2nd Internatonal Conerence on Advances n Mechancal Engneerng Industral Inormatcs (AMEII 206) Cooperatve Sensng Decson Rules over Imperect Reportng Channels an Xa, a, Chu-Sng Yang, b Insttute o Computer

More information

Adaptive Modulation for Multiple Antenna Channels

Adaptive Modulation for Multiple Antenna Channels Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,

More information

A Current Differential Line Protection Using a Synchronous Reference Frame Approach

A Current Differential Line Protection Using a Synchronous Reference Frame Approach A Current Dfferental Lne rotecton Usng a Synchronous Reference Frame Approach L. Sousa Martns *, Carlos Fortunato *, and V.Fernão res * * Escola Sup. Tecnologa Setúbal / Inst. oltécnco Setúbal, Setúbal,

More information

THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM

THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM Azura Abdullah, Muhammad Sobrun Jaml Jamal, Khazuran Abdullah, Ahmad Fadzl Ismal and An Lza Asnaw Department of

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

International Journal of Wireless Communications and Mobile Computing

International Journal of Wireless Communications and Mobile Computing Internatonal Journal of Wreless Communcatons and Moble Computng 215; 3(6): 58-65 ublshed onlne eptember 25, 215 (http://www.scencepublshnggroup.com/j/wcmc) do: 1.11648/j.wcmc.21536.11 I: 233-17 (rnt);

More information

Performance Analysis of Power Line Communication Using DS-CDMA Technique with Adaptive Laguerre Filters

Performance Analysis of Power Line Communication Using DS-CDMA Technique with Adaptive Laguerre Filters Internatonal Conference on Informaton and Electroncs Engneerng IPCSIT vol.6 ( ( IACSIT Press, Sngapore Performance Analyss of Power Lne Communcaton Usng DS-CDMA Technque wth Adaptve Laguerre Flters S.

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks I. J. Communcatons, etwork and System Scences, 8, 3, 7-83 Publshed Onlne August 8 n ScRes (http://www.scrp.org/journal/jcns/). Jont Adaptve Modulaton and Power Allocaton n Cogntve Rado etworks Dong LI,

More information

Queuing-Based Dynamic Channel Selection for Heterogeneous Multimedia Applications over Cognitive Radio Networks

Queuing-Based Dynamic Channel Selection for Heterogeneous Multimedia Applications over Cognitive Radio Networks 1 Queung-Based Dynamc Channel Selecton for Heterogeneous ultmeda Applcatons over Cogntve Rado Networks Hsen-Po Shang and haela van der Schaar Department of Electrcal Engneerng (EE), Unversty of Calforna

More information

29. Network Functions for Circuits Containing Op Amps

29. Network Functions for Circuits Containing Op Amps 9. Network Functons for Crcuts Contanng Op Amps Introducton Each of the crcuts n ths problem set contans at least one op amp. Also each crcut s represented by a gven network functon. These problems can

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

Resource Control for Elastic Traffic in CDMA Networks

Resource Control for Elastic Traffic in CDMA Networks Resource Control for Elastc Traffc n CDMA Networks Vaslos A. Srs Insttute of Computer Scence, FORTH Crete, Greece vsrs@cs.forth.gr ACM MobCom 2002 Sep. 23-28, 2002, Atlanta, U.S.A. Funded n part by BTexact

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

On the Performance of Cooperative Spectrum Sensing of Cognitive Radio Networks in AWGN and Rayleigh Fading Environments

On the Performance of Cooperative Spectrum Sensing of Cognitive Radio Networks in AWGN and Rayleigh Fading Environments 754 wasan et al.: On the performance of Coperatve Spectrum Sensng of Cogntvr Rado Networks On the Performance of Cooperatve Spectrum Sensng of Cogntve Rado Networks n AWGN and Raylegh Fadng Envronments

More information

Adaptive Modulation and Coding for Utility Enhancement in VMIMO WSN Using Game Theory

Adaptive Modulation and Coding for Utility Enhancement in VMIMO WSN Using Game Theory Adaptve Modulaton and Codng for Utlty nhancement n VMIMO WSN Usng Game Theory R. Vall and P. Dananjayan mparments. The data transmtted from the sensor nodes s hghly susceptble to error n a wreless envronment

More information

RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING

RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING Vaslos A. Srs Insttute of Computer Scence (ICS), FORTH and Department of Computer Scence, Unversty of Crete P.O. Box 385, GR 7 Heraklon, Crete,

More information

Robust Power and Subcarrier Allocation for OFDM-Based Cognitive Radio Networks Considering Spectrum Sensing Uncertainties

Robust Power and Subcarrier Allocation for OFDM-Based Cognitive Radio Networks Considering Spectrum Sensing Uncertainties 8 H. FATHI, S. M. S. SADOUGH, ROBUST POWER AD SUBCARRIER ALLOCATIO FOR OFDM-BASED COGITIVE RADIO... Robust Power and Subcarrer Allocaton for OFDM-Based Cogntve Rado etworks Consderng Spectrum Sensng Uncertantes

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

A Parallel Task Scheduling Optimization Algorithm Based on Clonal Operator in Green Cloud Computing

A Parallel Task Scheduling Optimization Algorithm Based on Clonal Operator in Green Cloud Computing A Parallel Task Schedulng Optmzaton Algorthm Based on Clonal Operator n Green Cloud Computng Yang Lu, Wanneng Shu, and Chrsh Zhang College of Informaton Scence and Engneerng, Hunan Cty Unversty, Yyang,

More information

High Accuracy Signal Recognition Algorithm Based on Machine Learning for Heterogeneous Cognitive Wireless Networks

High Accuracy Signal Recognition Algorithm Based on Machine Learning for Heterogeneous Cognitive Wireless Networks Journal of Communcatons Vol., o. 3, March 7 Hgh Accuracy Sgnal Recognton Algorthm Based on Machne Learnng for Heterogeneous Cogntve Wreless etworks Jan Lu, Jbn Wang, and San Umar Abdullah School of Computer

More information

A RF Source Localization and Tracking System

A RF Source Localization and Tracking System The 010 Mltary Communcatons Conference - Unclassfed Program - Waveforms and Sgnal Processng Track A RF Source Localzaton and Trackng System Wll Tdd, Raymond J. Weber, Ykun Huang Department of Electrcal

More information

Uplink User Selection Scheme for Multiuser MIMO Systems in a Multicell Environment

Uplink User Selection Scheme for Multiuser MIMO Systems in a Multicell Environment Uplnk User Selecton Scheme for Multuser MIMO Systems n a Multcell Envronment Byong Ok Lee School of Electrcal Engneerng and Computer Scence and INMC Seoul Natonal Unversty leebo@moble.snu.ac.kr Oh-Soon

More information

Bit Error Probability of Cooperative Diversity for M-ary QAM OFDM-based system with Best Relay Selection

Bit Error Probability of Cooperative Diversity for M-ary QAM OFDM-based system with Best Relay Selection 011 Internatonal Conerence on Inormaton and Electroncs Engneerng IPCSIT vol.6 (011) (011) IACSIT Press, Sngapore Bt Error Proalty o Cooperatve Dversty or M-ary QAM OFDM-ased system wth Best Relay Selecton

More information

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER 7th European Sgnal Processng Conference (EUSIPCO 9) Glasgow, Scotland, August -8, 9 DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER Ha-Nam Nguyen, Danel Menard, and Olver Senteys IRISA/INRIA, Unversty of

More information

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr

More information

Study of the Improved Location Algorithm Based on Chan and Taylor

Study of the Improved Location Algorithm Based on Chan and Taylor Send Orders for eprnts to reprnts@benthamscence.ae 58 The Open Cybernetcs & Systemcs Journal, 05, 9, 58-6 Open Access Study of the Improved Locaton Algorthm Based on Chan and Taylor Lu En-Hua *, Xu Ke-Mng

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks

A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks 74 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 3, No., Aprl 0 A Fuzzy-based Routng Strategy for Multhop Cogntve Rado Networks Al El Masr, Naceur Malouch and Hcham

More information

Ergodic Capacity of Block-Fading Gaussian Broadcast and Multi-access Channels for Single-User-Selection and Constant-Power

Ergodic Capacity of Block-Fading Gaussian Broadcast and Multi-access Channels for Single-User-Selection and Constant-Power 7th European Sgnal Processng Conference EUSIPCO 29 Glasgow, Scotland, August 24-28, 29 Ergodc Capacty of Block-Fadng Gaussan Broadcast and Mult-access Channels for Sngle-User-Selecton and Constant-Power

More information

Impact of Secondary MAC Cooperation on Spectrum Sharing in Cognitive Radio Networks

Impact of Secondary MAC Cooperation on Spectrum Sharing in Cognitive Radio Networks Impact of Secondary MAC Cooperaton on Spectrum Sharng n Cogntve ado Networks Tarq Elkourd and Osvaldo Smeone CWCSP, ECE Dept. New Jersey Insttute of Technology Unversty Heghts, Newark, New Jersey 0702

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

Time-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock

Time-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock Tme-frequency Analyss Based State Dagnoss of Transformers Wndngs under the Short-Crcut Shock YUYING SHAO, ZHUSHI RAO School of Mechancal Engneerng ZHIJIAN JIN Hgh Voltage Lab Shangha Jao Tong Unversty

More information

= ) number of (4) Where Ψ stands for decision statistics.

= ) number of (4) Where Ψ stands for decision statistics. 207 IEEE 7th Internatonal Advance Computng Conference on-unform Quantzed Data Fuson Rule Allevatng Control Channel Overhead for Cooperatve Spectrum Sensng n Cogntve Rado etworks Arpta Chakraborty, and

More information

Enhancing Throughput in Wireless Multi-Hop Network with Multiple Packet Reception

Enhancing Throughput in Wireless Multi-Hop Network with Multiple Packet Reception Enhancng Throughput n Wreless Mult-Hop Network wth Multple Packet Recepton Ja-lang Lu, Paulne Vandenhove, We Shu, Mn-You Wu Dept. of Computer Scence & Engneerng, Shangha JaoTong Unversty, Shangha, Chna

More information

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?

More information

AOA Cooperative Position Localization

AOA Cooperative Position Localization AOA Cooperatve Poston Localzaton Jun Xu, Maode Ma and Cho Loo Law Postonng and Wreless echnology Centre Nanyang echnologcal Unversty, Sngapore xujun@pmal.ntu.edu.sg Abstract- In wreless sensor networs,

More information

Distributed Uplink Scheduling in EV-DO Rev. A Networks

Distributed Uplink Scheduling in EV-DO Rev. A Networks Dstrbuted Uplnk Schedulng n EV-DO ev. A Networks Ashwn Srdharan (Sprnt Nextel) amesh Subbaraman, och Guérn (ESE, Unversty of Pennsylvana) Overvew of Problem Most modern wreless systems Delver hgh performance

More information

A Novel DSA-Driven MAC Protocol for Cognitive Radio Networks

A Novel DSA-Driven MAC Protocol for Cognitive Radio Networks Wreless Sensor Networ, 29, 2, 6-2 do:.4236/wsn.29.2 7 Publshed Onlne July 29 (http://www.scrp.org/journal/wsn/). A Novel DSA-Drven MAC Protocol for Cogntve Rado Networs Hua SONG, Xaola LIN School of Informaton

More information

The Application of Interpolation Algorithms in OFDM Channel Estimation

The Application of Interpolation Algorithms in OFDM Channel Estimation The Applcaton of Interpolaton Algorthms n OFDM Estmaton Xjun ZHANG 1,, Zhantng YUAN 1, 1 School of Electrcal and Informaton Engneerng, Lanzhou Unversty of Technology, Lanzhou, Gansu 730050, Chna School

More information

Fractional Base Station Cooperation Cellular Network

Fractional Base Station Cooperation Cellular Network Fractonal Base Staton Cooperaton Cellular Network Naok usashma Tokyo Insttute of Technoloy, Department of Electrcal and Electronc Enneern, Arak-Sakauch Laboratores. Contents Backround Cell-ede problem

More information

Multicarrier Modulation

Multicarrier Modulation Multcarrer Modulaton Wha Sook Jeon Moble Computng & Communcatons Lab Contents Concept of multcarrer modulaton Data transmsson over multple carrers Multcarrer modulaton wth overlappng Chap. subchannels

More information

Hardware Design of Filter Bank-Based Narrowband/Wideband Interference Canceler for Overlaid TDMA/CDMA Systems

Hardware Design of Filter Bank-Based Narrowband/Wideband Interference Canceler for Overlaid TDMA/CDMA Systems Hardware Desgn of Flter anased arrowband/deband Interference Canceler for Overlad TDMA/CDMA Systems Toyoau Ktano Kaunor Hayash Htosh Masutan and Shnsue Hara Graduate School of Engneerng Osaa Unversty YamadaOa

More information

Design of Teaching Platform Based on Information Detection System

Design of Teaching Platform Based on Information Detection System , pp.43-48 http://dx.do.org/1.14257/astl.216.139.8 Desgn of Teachng Platform Based on Informaton Detecton System Zhenjng Yao, Lxn L, Qn Gao & Zhmng Han Insttute of Dsaster Preventon Sanhe, Hebe, People

More information

Keywords LTE, Uplink, Power Control, Fractional Power Control.

Keywords LTE, Uplink, Power Control, Fractional Power Control. Volume 3, Issue 6, June 2013 ISSN: 2277 128X Internatonal Journal of Advanced Research n Computer Scence and Software Engneerng Research Paper Avalable onlne at: www.jarcsse.com Uplnk Power Control Schemes

More information

Power Control for Wireless Data

Power Control for Wireless Data Power Control for Wreless Data Davd Goodman Narayan Mandayam Electrcal Engneerng WINLAB Polytechnc Unversty Rutgers Unversty 6 Metrotech Center 73 Brett Road Brooklyn, NY, 11201, USA Pscataway, NJ 08854

More information

Approximating User Distributions in WCDMA Networks Using 2-D Gaussian

Approximating User Distributions in WCDMA Networks Using 2-D Gaussian CCCT 05: INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS, AND CONTROL TECHNOLOGIES 1 Approxmatng User Dstrbutons n CDMA Networks Usng 2-D Gaussan Son NGUYEN and Robert AKL Department of Computer

More information

Fuzzy Logic Power Control in Cognitive Radio

Fuzzy Logic Power Control in Cognitive Radio Fuzzy Logc ower Control n Cogntve Rado Zeljko Tabakovc Croatan ost and Electronc Communcatons Agency Jursceva 3 Zagreb, Croata zeljkotabakovc@telekomhr Sonja Grgc, Mslav Grgc Unversty of Zagreb, Faculty

More information

Autonomous Dynamic Spectrum Management for Coexistence of Multiple Cognitive Tactical Radio Networks

Autonomous Dynamic Spectrum Management for Coexistence of Multiple Cognitive Tactical Radio Networks Autonomous Dynamc Spectrum Management for Coexstence of Multple Cogntve Tactcal Rado Networks Vncent Le Nr, Bart Scheers Abstract In ths paper, dynamc spectrum management s studed for multple cogntve tactcal

More information

Research on Peak-detection Algorithm for High-precision Demodulation System of Fiber Bragg Grating

Research on Peak-detection Algorithm for High-precision Demodulation System of Fiber Bragg Grating , pp. 337-344 http://dx.do.org/10.1457/jht.014.7.6.9 Research on Peak-detecton Algorthm for Hgh-precson Demodulaton System of Fber ragg Gratng Peng Wang 1, *, Xu Han 1, Smn Guan 1, Hong Zhao and Mngle

More information

Priority based Dynamic Multiple Robot Path Planning

Priority based Dynamic Multiple Robot Path Planning 2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna

More information

Clustering Based Fractional Frequency Reuse and Fair Resource Allocation in Multi-cell Networks

Clustering Based Fractional Frequency Reuse and Fair Resource Allocation in Multi-cell Networks Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the IEEE ICC 21 proceedngs Clusterng Based Fractonal Frequency Reuse and Far Resource

More information

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. The Impact of Spectrum Sensng Frequency and Pacet- Loadng

More information

Utility-based Routing

Utility-based Routing Utlty-based Routng Je Wu Dept. of Computer and Informaton Scences Temple Unversty Roadmap Introducton Why Another Routng Scheme Utlty-Based Routng Implementatons Extensons Some Fnal Thoughts 2 . Introducton

More information

Error Probability of RS Code Over Wireless Channel

Error Probability of RS Code Over Wireless Channel Internatonal Journal of Electroncs Engneerng, 3 (), 11, pp. 99 33 Serals Publcatons, ISS : 973-7383 Error Probablty of RS Code Over Wreless Channel Mohammad Aftab Alam Khan 1 & Mehwash Farooq 1 1 Department

More information

An efficient cluster-based power saving scheme for wireless sensor networks

An efficient cluster-based power saving scheme for wireless sensor networks RESEARCH Open Access An effcent cluster-based power savng scheme for wreless sensor networks Jau-Yang Chang * and Pe-Hao Ju Abstract In ths artcle, effcent power savng scheme and correspondng algorthm

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER Ha-Nam Nguyen, Danel Menard, and Olver Senteys IRISA/INRIA, Unversty of Rennes, rue de Kerampont F-3 Lannon Emal: hanguyen@rsa.fr ABSTRACT To satsfy energy

More information

RAPID advances in processing capability, memory capacity,

RAPID advances in processing capability, memory capacity, IEEE SENSORS JOURNAL, VOL. 13, NO. 11, NOVEMBER 2013 4247 Spectrum Sensng n Opportunty-Heterogeneous Cogntve Sensor Networks: How to Cooperate? Guoru Dng, Student Member, IEEE, Jnlong Wang, Senor Member,

More information

Compressive Direction Finding Based on Amplitude Comparison

Compressive Direction Finding Based on Amplitude Comparison Compressve Drecton Fndng Based on Ampltude Comparson Rumng Yang, Ypeng Lu, Qun Wan and Wanln Yang Department of Electronc Engneerng Unversty of Electronc Scence and Technology of Chna Chengdu, Chna { shan99,

More information

Suresh Babu, International Journal of Advanced Engineering Technology E-ISSN Int J Adv Engg Tech/Vol. VII/Issue I/Jan.-March.

Suresh Babu, International Journal of Advanced Engineering Technology E-ISSN Int J Adv Engg Tech/Vol. VII/Issue I/Jan.-March. Research Paper OPTIMUM POWR ALLOCATION AND SYMBOL RROR RAT (SR) PRFORMANC OF VARIOUS SPAC TIM BLOCK CODS (STBC) OVR FADING COGNITIV MIMO CHANNLS IN DIFFRNT WIRLSS NVIRONMNT R. Suresh Babu Address for Correspondence

More information

An Energy-aware Awakening Routing Algorithm in Heterogeneous Sensor Networks

An Energy-aware Awakening Routing Algorithm in Heterogeneous Sensor Networks An Energy-aware Awakenng Routng Algorthm n Heterogeneous Sensor Networks TAO Dan 1, CHEN Houjn 1, SUN Yan 2, CEN Ygang 3 1. School of Electronc and Informaton Engneerng, Bejng Jaotong Unversty, Bejng,

More information

TODAY S wireless networks are characterized as a static

TODAY S wireless networks are characterized as a static IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 2, FEBRUARY 2011 161 A Spectrum Decson Framework for Cogntve Rado Networks Won-Yeol Lee, Student Member, IEEE, and Ian F. Akyldz, Fellow, IEEE Abstract

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

Prediction-based Interacting Multiple Model Estimation Algorithm for Target Tracking with Large Sampling Periods

Prediction-based Interacting Multiple Model Estimation Algorithm for Target Tracking with Large Sampling Periods 44 Internatonal Jon Ha Journal Ryu, Du of Hee Control, Han, Automaton, Kyun Kyung and Lee, Systems, and Tae vol. Lyul 6, Song no., pp. 44-53, February 8 Predcton-based Interactng Multple Model Estmaton

More information

Performance Analysis of Scheduling Policies for Delay-Tolerant Applications in Centralized Wireless Networks

Performance Analysis of Scheduling Policies for Delay-Tolerant Applications in Centralized Wireless Networks Performance Analyss of Schedulng Polces for Delay-Tolerant Applcatons n Centralzed Wreless Networks Mohamed Shaqfeh and Norbert Goertz Insttute for Dgtal Communcatons Jont Research Insttute for Sgnal &

More information