Design Multicast Protocols for Non-Cooperative Networks

Size: px
Start display at page:

Download "Design Multicast Protocols for Non-Cooperative Networks"

Transcription

1 Deign Multicat Protocol for Non-Cooperative Networ WeiZhao Wang Xiang-Yang Li Zheng Sun Yu Wang Abtract Conventionally, mot networ protocol aume that the networ entitie who participate in the networ activitie will alway behave a intructed. However, in practice, mot networ entitie will try to maximize their own benefit intead of altruitically contribute to the networ by following the precribed protocol, which i nown a elfih. Thu, new protocol hould be deigned for the non-cooperative networ which i compoed of elfih entitie. In thi paper, we pecifically how how to deign trategyproof multicat protocol for noncooperative networ uch that thee elfih entitie will follow the protocol out of their own interet. By auming that a group of receiver i willing to pay to receive the multicat ervice, we pecifically give a general framewor to decide whether it i poible, and how if poible to tranform an exiting multicat protocol to a trategyproof multicat protocol. We then how how the payment to thoe relay entitie are hared fairly among all receiver o that it encourage collaboration among receiver. A a running example, we how how to deign the trategyproof multicat protocol for the currently ued core-baed multicat tructure. We alo conduct extenive imulation to tudy the relation between payment and cot of the multicat tructure. Index Term Control theory, combinatoric, economic, noncooperative, multicat, payment, haring. I. INTRODUCTION Multicat ha received coniderable attention over the pat few year due to it reource haring capability. In multicat, there i a topology, either a tree or a meh, that connect the ource to a et of receiver, and pacet i only duplicated at the branching node. Numerou multicat protocol have been propoed, and mot of them aumed that the networ entitie, either lin or node, will relay the multicat pacet a precribed by the multicat protocol without any deviation. However, the Internet, which i compoed of different heterogenou and autonomou ytem (AS), raie a doubt about thi common belief. Although multicat benefit the whole ytem by aving bandwidth and reource, it i dubiou that multicat will alo bring benefit to every individual node or lin who relay the pacet. Thu, it i more reaonable to aume that thee AS, probably owned by ome organization and private uer, are elfih: aim to maximize their own benefit intead of faithfully conform the precribed multicat protocol. A networ compoed of elfih AS i generally nown a a non-cooperative networ. Department of Computer Science, Illinoi Intitute of Technology, Chicago, Illinoi, USA. wangwei4@iit.edu, xli@c.iit.edu. The wor of Xiang-Yang Li i partially upported by NSF CCR-374. Department of Computer Science, Hong Kong Baptit Univerity, Hong Kong, China. unz@comp.hbu.edu.h Department of Computer Science, Univerity of North Carolina at Charlotte, North Carolina, USA. ywang3@uncc.edu Nian and Ronen [] tudied the unicat routing problem in non-cooperative networ and introduced the idea of algorithmic mechanim deign: they propoed to give the AS ome proper payment to enure that every AS conform to the precribed protocol regardle of all other AS behavior, which i nown a trategy-proof or truthful. They deigned the payment for unicat by uing the VCG mechanim[], [3], [4], which i conidered a one of the mot poitive reult in algorithm mechanim deign. Unfortunately, VCG mechanim ha it own drawbac. For multicat, if we want to apply VCG mechanim, the multicat tree hould have the leat cot among all tree panning the receiver. However, finding the minimum cot multicat tree i nown to be NP-Hard for both edge weighted networ [4], [5] and node weighted networ [6], [7]. If we init on applying the VCG mechanim to a multicat topology that doe not have the minimal cot, VCG mechanim may fail [8]. Thu, ome payment cheme other than VCG mechanim hould be deigned for multicat. Recently, in [8], the author propoed everal non-vcg trategy-proof payment cheme for everal commonly ued multicat tree. In thi paper, intead of focuing on ome pecific multicat tructure, we tudy whether it i poible to tranform a multicat protocol baed on any given multicat topology to a trategyproof multicat protocol, and if poible, how to deign the trategyproof protocol. Deigning a truthful payment cheme i not the whole tory for many practical application. A natural quetion ha to be anwered i who will afford the payment. A imple olution i that the organization to which the receiver belong pay [8]. However, thi olution i not panacea. In many application uch a video treaming, often the individual receiver have to pay the relay agent to receive the data. How to charge the receiver for multicat tranmiion ha been tudied extenively in literature [9], [], [], [], [3], [4]. In mot of their model, they aumed that ) every receiver ha a valuation for receiving the data and the receiver i elfih, ) all relay agent are cooperative and reveal their true cot, and 3) the multicat tree i formed by the union of the hortet path from the ource to receiver. In the harp contrat, in thi paper, we alo tae the elfih behavior of the relay node (or lin) into account. Thu, we model the networ differently by auming that ) the relay agent are elfih, ) the receiver alway receive the data and pay what they hould pay, and 3) the multicat topology could be any tructure pecified by ome exiting multicat protocol, including tree and mehe. To the bet of our nowledge, thi i the firt paper to conider multicat pricing when the relay agent are non-cooperative. Notice that there i a poible wor

2 left for future exploration: what happen if both the receiver and relay agent are elfih and each receiver ha a valuation and would receive the data if and only if it valuation i greater than what it need to pay according to a trategyproof multicat protocol. One thing we hould point out i that algorithmic mechanim deign i not the only way to achieve trategyproofne. There are lot of literature which ue Nah equilibrium, a tate at which no agent can improve it utility by unilaterally deviating from it current trategy when other agent eep their trategie. Since Nah equilibrium ha a wea requirement for the trategie ued by the agent, it often can achieve a wider variety of outcome. The main contribution of thi paper are two-folded. Firt, we preent a general framewor about whether it i poible, and how if poible, to tranform an exiting multicat protocol to a trategyproof one. We then how how the payment to the relay agent are hared fairly among the receiver. A a running example, we how how to deign a trategyproof multicat protocol, and how the payment are hared among receiver when the leat cot path tree i ued for multicat. We alo conduct extenive imulation to tudy the relation between payment and cot of the multicat tructure. Our imulation how that by only overpaying a mall amount to the relay node (or lin), each relay node (or lin) will declare it true cot to maximize it profit. The ret of the paper i organized a follow. We introduce ome preliminarie, related wor, our communication model, and the problem to be olved in Section II. In Section III, we dicu the exitence of truthful payment and how to find it if a given multicat tructure i ued. We how how to deign a truthful multicat protocol baed on a pecific routing topology in Section IV. Several other important iue are dicued in Section V. The performance tudy of our propoed truthful core-baed multicat protocol i preented in Section VI. We conclude our paper in Section VII. II. TECHNICAL PRELIMINARIES A. Algorithmic Mechanim Deign In a tandard model of algorithm mechanim deign, there are n agent {,,,n}. Each agent i {,,n} ha ome private information t i, called it type, e.g. it cot to forward a pacet in a networ environment. All agent type define a profile t (t,t,,t n ). Each agent i declare a valid type τ i which may be different from it actual type t i and all agent trategy define a declared type vector τ (τ,,τ n ). A mechanim M (O, P) i compoed of two part: an output function O that map a declared type vector τ to an output o and a payment function P that decide the monetary payment p i P i (τ) for every agent i. Each agent i ha a valuation function w i (t i,o) that expreed it preference over different outcome. Agent i utility or called profit i u i (t i,o)w i (t i,o)+p i. An agent i i aid to be rational if it alway chooe it trategy τ i to maximize it utility u i. Let τ i (τ,,τ i,τ i+,,τ n ), i.e., the trategie of all other agent except i and τ i t i (τ,τ,,τ i,t i,τ i+,,τ n ). A mechanim i trategyproof if for every agent i, revealing it true type t i will maximize it utility regardle of what other agent do. In thi paper, we are only intereted in mechanim M (O, P) that atify the following three condition: ) Incentive Compatibility (IC): For every agent i, w i (t i, O(τ i t i ))+p i (τ i t i ) w i (t i, O(τ))+p i (τ) τ. ) Individual Rationality (IR): It i alo called Voluntary Participation. Every participating agent mut have a nonnegative utility, i.e., w i (t i, O(τ i t i )) + p i (τ i t i ). 3) Polynomial Time Computability (PC): O and P are computed in polynomial time. VCG MECHANISM: Arguably the mot important poitive reult in mechanim deign i what i uually called the generalized Vicrey-Clare-Grove (VCG) mechanim [], [3], [4]. A direct revelation mechanim M (O(t), P(t)) belong to the VCG family if () the output O(t) computed baed on the type vector t maximize the objective function g(o, t) i w i(t i,o), and () the payment to agent i i P i (t) j i w j(t j, O(t))+h i (t i ). Here h i () i an arbitrary function of t i. It i proved in [4] that a VCG mechanim i truthful, i.e., atifying the IC property. Under mild aumption, VCG mechanim are the only truthful implementation [5] for utilitarian problem, i.e., g(o, t) i w i(t i,o). B. Networ Model and Problem Statement Conider any communication networ G (V,E,c), where V {v,,v n } i the et of communication terminal, E {e,e,,e m } are the et of lin. Every agent i in the networ ha a private cot c i to tranmit a unit ize of data. Here agent could be either terminal or lin whoever could behave elfihly. If agent are terminal then G i node weighted; if agent are lin then G i lin weighted. Given a et of terminal Q {q,q,,q r } V who are willing to receive the data, we will deign a multicat protocol that ) contruct a topology (a tree, a meh, a ring, etc) that pan thee receiver; ) calculate a payment for each relay agent according to a payment cheme that i trategy-proof; 3) charge each receiver according to a pricing cheme that i reaonable. We will formally define what i reaonable in ubection III-C. For the convenience of our analyi, we aume that q i the ource node in one pecific multicat and the ize of the data i normalized to. We alo aume throughout thi paper that agent in the networ will not collude to improve their profit together. In order to prevent the monopoly, we aume the networ i bi-connected. One thing we hould highlight here i that intead of reinventing the wheel by deigning ome new multicat tructure, we focu on how we can deign a truthful payment cheme for the exiting multicat protocol to enure that they wor correctly even in non-cooperative networ. Baed on the truthful payment cheme we deigned, we further tudy how we charge the receiver in a reaonable way. Given a tructure H G, weueω(h) to denote the um of the cot of all agent in thi networ. If we change the cot of any agent i (lin e i or node v i )toc i, we denote the new networ a G (V,E,c i c i ), or imply c i c i. If we remove

3 one agent i from the networ, we denote it a c i. Denote G\e i a the networ without lin e i, and denote G\v i a the networ without node v i and all it incident lin. For the implicity of notation, we will ue only the cot vector c to denote the networ G (V,E,c) if no confuion i caued. C. Related Wor Routing ha been part of the algorithmic mechanim-deign from the very beginning. Nian and Ronen [6] provided a polynomial-time trategyproof mechanim for unicat routing in a centralized computational model. Each lin e of the networ i an agent and ha a private cot t e of ending a meage. Their mechanim i eentially a VCG mechanim. The reult in [6] i extended in [5] to deal with unicat problem for all pair of terminal. They aume there i a traffic demand T i,j from a node i to a node j. They alo gave a ditributed method to compute the payment. Anderegg and Eidenbenz [6] recently propoed a imilar routing protocol for wirele ad hoc networ baed on VCG mechanim again. In [9], Wang and Li propoed an aymptotically optimum centralized method to compute the payment for unicat and howed that there i truthful mechanim that can prevent colluion. For multicat, Feigenbaum et. al [3] aumed that there i a univeral tree panning all receiver and for every ubet R of receiver, the panning tree T (R) i merely a part of the univeral tree induced by receiver et R. They alo aumed that there i a publicly nown lin cot aociated with each communication lin and receiver q i will report a number w i, which i the amount of money he/he i willing to pay to receive the data, which may be different from it true privately nown valuation w i. The ource node then elect a ubet R Q of receiver according to ome criteria. They tudied how to elect receiver and propoed to ue Shapely value and marginal cot to hare the lin cot. Maximizing profit in trategy-proof multicat wa tudied in [7], [8] ([8] i baed on cancellable auction [9]). Sharing the cot of the multicat tructure among receiver wa tudied in [], [7], [], [], [4], [3] o ome fairne i accomplihed. In [8], Wang et al. tudied how to deign trategyproof multicat protocol for variou multicat tree when the relay terminal or lin are elfih and the receiver will relay the data for peer receiver for free. III. CHARACTERIZATION OF TRUTHFUL MULTICAST ROUTING Several multicat topologie have been propoed and ued in practice and it i expected that more topologie will be propoed in the near future. It will be difficult if not impoible to deign a trategyproof multicat mechanim for each of thee topologie individually. Thu, intead of tudying ome pecific multicat topologie, we preent a general framewor to decide whether there i, and how to deign if it exit, a trategyproof mechanim for any given multicat topology. We alo conider how to charge the receiver to cover the total payment to the relay agent. Intuitively, we may till want to ue the VCG payment cheme for thee multicat topologie. Notice that an output function of a VCG mechanim i required to maximize the total valuation of agent. Thi mae the mechanim computationally intractable in many cae, e.g., multicat. Notice that replacing the optimal algorithm with non-optimal approximation uually lead to untruthful mechanim [8]. Thu a mechanim other than VCG i needed when we cannot find the optimal olution or the objective i not to maximize the total valuation of all agent. Thi paper preent the firt general framewor to deign trategyproof mechanim for multicat in which we cannot find the tructure with minimum total cot. A. Exitence of the Truthful Payment Mechanim Before we deign ome truthful payment cheme for a given multicat topology, we hould decide whether uch payment cheme exit or not. Following definition and theorem will preent a ufficient and neceary condition for the exitence of the truthful payment cheme. Definition : A method O computing a multicat topology atifie the monotone property (MP) if for every agent i and fixed c i, following condition i atified: If agent i i elected a a relay agent with cot c i, then it i alo elected with a maller cot c i. Obviouly, the above condition i equivalent to the following condition: There exit a threhold value κ i (O,c i ) uch that if i i elected a a relay agent, then it cot i at mot κ i (O,c i ). For the convenience of our preentation, we ue O i (c) (repectively ) to denote that agent i i elected (repectively not elected) to the multicat topology when the cot vector i c. Theorem : Given a method O computing a multicat topology, there exit a payment P uch that M (O, P) i trategyproof iff O atifie monotone property. Proof: We firt prove if there exit a truthful payment baed on O then O atifie the monotone property. We prove it by contradiction by auming there i a truthful payment cheme P baed on O that doe not atify MP. From the definition of MP, there exit an agent i and two cot vector c i c i and c i c i, where c i <c i uch that O i (c i c i )and O i (c i c i ). Let p i (c i c i )p i and p i(c i c i )p i. Conider a networ with a cot vector c i c i, the utility for agent i when it reveal it true cot i u i (c i )p i. When agent i lie it cot to c i, it utility become p i c i. Since payment cheme P i truthful, we have p i >p i c i. Similarly we conider another networ with a cot vector c i c i. Agent i utility i p i c i when it reveal it true cot. Similarly, if it lie it cot to c i, it utility i p i. Since payment cheme P i truthful, p i <p i c i. Thu, we have p i c i >p i >p i c i. Thi inequality implie that c i >c i, which i a contradiction. We then prove that if O atifie the monotone property then there exit a truthful payment baed on O. We prove it by contructing the following payment cheme P for a given a networ G (V,E,c).

4 Algorithm Payment Scheme P : For any agent i not elected to relay, it payment i. : For any agent i elected to relay, it payment i κ i (O,c i ). From the definition of MP, the IR property i obviou. Thu we only need to prove that the payment cheme P atifie IR. We prove it by cae. Cae : Agent i lie it cot upward to c i or downward to c i, but it doe not change the output whether agent i i elected or not. Notice for fixed c i, when the output of agent i doe not change, it payment i the ame. Thu, agent i utility eep the ame which in turn implie that agent i doe not have incentive to lie in thi cae. Cae : Agent i i elected when it reveal it actual cot c i, and it lie it cot upward to c i uch that it i not elected. From the property of MP, we now c i κ i (O,c i ). Thi enure that agent i get non-negative utility when it reveal it actual cot c i. When i lie it cot to c i, it get zero payment and zero utility. Therefore, agent i won t lie in thi cae. Cae 3: Agent i i not elected when it reveal it actual cot c i, and it lie it cot downward to c i uch that it i elected. Similarly, we have c i κ i (O,c i ), which implie that agent i get a non-poitive utility. Comparing with the zero utility when agent i reveal it true cot, agent i alo ha no incentive to lie in thi cae. Thi finihe our proof. Actually, if we require that relay agent who are not elected hould receive zero payment, our payment cheme illutrated by Algorithm i the only trategy-proof payment cheme. The proof i omitted here due to pace limit. B. Rule to Find the Truthful Payment Scheme Given a multicat tructure atifying MP, it eem quite imple to find a truthful payment cheme by applying Algorithm. However, ometime the proce to find the threhold value in Algorithm i far more complicated. A to our nowledge, our approach preented later i the firt ever effort to find the threhold value efficiently. Intead of trying to give a unified approach that can find the threhold value for all multicat topologie atifying MP, we preent ome ueful technique to find threhold value under certain circumtance. Our general approach wor a follow. Firt, given an output method O that compute a multicat tructure, we decompoe it into everal impler output method. We then find the threhold value for each of the decompoed method. Finally, we calculate the original threhold value by combining the threhold value for thoe decompoed method. ) Simple Combination: Given a multicat method O, let κ(o,c) denote a n-tuple vector (κ (O,c ),κ (O,c ),,κ n (O,c n )). Here, κ i (O,c i ) i the threhold value for agent i when the multicat topology i computed by O and the cot c i of all other agent are fixed. We then preent a imple but ueful technique to find the threhold value. Theorem : Given n multicat method O,, O n atifying monotone property, and κ(o i,c) i the threhold value for O i where i n. Then the output method O(c) O (c) O (c) O n (c) alo atifie monotone property. Moreover, the threhold value for O i κ(o,c) max i n {κ(oi,c)}. The proof of thi theorem i quite imple and i omitted here. We will how how to ue thi imple combination technique in Section IV. ) Round-baed Method: Many multicat topologie are contructed in a round-baed manner: for each round they elect ome unelected agent, update the problem and the cot profile if neceary. Following i a general characterization of a round-baed method that contruct a multicat topology. Algorithm A Round-Baed Multicat Method : Set r and c () c and Q () Q initially. : repeat 3: Let O r be a determinitic method that decide in round r whether agent i i elected or not. 4: Update the networ cot vector and receiver et, i.e., we obtain a new networ cot vector c (r+) and receiver et Q (r+) according to a update rule U r : U r : O r [c r,q (r) ] [c (r+),q (r+) ]. 5: until the deired property of the multicat topology i met 6: Return the union of the relay agent in all round a the final output. Here, every agent can be elected at mot once. To help the undertanding of general round-baed method, we preent a multicat topology that i contructed in uch way. The example we ued i the polynomial time method in [5] that find a multicat topology whoe cot i no more than time of the minimum cot Steiner tree (MCST) in a lin weight networ. For the completene of our preentation, we review their method here. Algorithm 3 Lin Weighted Multicat Structure [5] : repeat : Find one receiver in the receiver et Q, ay q i, that i cloet to the ource, i.e., the LCP(, q i,d) ha the leat cot among the hortet path from to all receiver. 3: Connect q i to the ource uing the leat cot path between them. Update the cot of all edge on thi path a. Remove q i from the receiver et Q. 4: until no receiver remain Here no receiver remain correpond to the deired propertie of general round-baed method; LCP (, q i,d) in round r correpond to O r ; updating cot of edge on LCP (, q i,d) to and removing q i from Q i the update rule U r. Figure how how to apply Algorithm 3. Initially, the receiver et i Q Q {q,q } and the lin cot are hown in Figure. The firt round elect the nearet receiver q from

5 , and it correponding path q i elected. Remove q from Q and et cot of lin and q to. The networ in the end of firt round i hown in Figure (b). In the econd round, the receiver et i Q {q }, and the leat cot path from to q i q intead of the leat cot path q in original networ. The final multicat tree, hown a olid line in Figure, i the union of the two path..5 v v q q q q q q (a) The original (b) Networ after (c) Networ after networ firt round econd round Fig...5 Illutration of Algorithm (3). Here, i the ource node. Definition : An updating rule U r i aid to be croingindependent if for any unelected agent i: c (r+) i and Q (r+ ) do not depend on c (r) i. Fixed c (r) i,ifd(r) i c (r) i then d (r+) i c (r+) i. Theorem 3: A round-baed multicat method O atifie MP if, for every round r, method O r atifie MP and the updating function U r i croing-independent. Proof: For an agent i, fix the original cot c i of all other agent. We prove that if i i elected when the original cot vector i a {c i,c i }, then it i alo elected when the original cot vector i b {c i,c i } uch that c i <c i. Without lo of generality aume that i i elected in round r under cot vector a. Then under cot vector b, if agent i i elected before round r, our claim hold. Otherwie, in round r, a (r) i b (r) i and a (r) i >b (r) i ince agent i i not elected in the previou round. Notice i i elected in round r under cot vector a (r) i, thu i i alo elected in round r under cot vector b (r) i from the monotone property of the method O r. Thi finihe the proof. Theorem 3 preent a ufficient condition for the exitence of truthful payment cheme for a round-baed multicat method. Following, we how how to find the threhold value for any elected agent. The proof of the correctne of thi algorithm i omitted here due to the pace limit, refer to the full verion for detail. q.5 v q (a) The multicat tree q (.4).5.4(.9) v (.5) 5.6(.).5 (.5) q (b) Payment for elected lin Fig.. Payment calculation baed on LST found by Algorithm (3). We ue the ame networ in Figure to illutrate how to find the threhold value for edge baed on the multicat.5 Algorithm 4 Computing payment for elected agent baed on round-baed multicat method O : Initially et the cot of to and r. : repeat 3: Find the threhold value for agent baed on O r under cot vector c (r) and receiver et Q(r). Let l r κ (O r,c r ) be the threhold value found. Here we et l r if agent cannot be elected in thi round for any cot. 4: Update cot vector and receiver et to obtain the new cot vector c (r+) and Q (r+). Set r r +. 5: until a valid output i found 6: Fix c and aume x i the payment for agent. Let x r be the cot for agent in round r if the original cot i c x. Then x the minimum value that atifie the following inequation: x i l i for i r. tree found by Algorithm 3. In the firt round, can not be elected, thu l. In econd round, it i eay to oberve that when cot i maller than.9, the path q i elected and when cot i greater than.9, path q i elected. Thu, the threhold value for in thi round i l.9. Notice the updating by Algorithm 3 doe not change the cot of an unelected agent, thu the final threhold value i imply the maximum of l and l, which i.9. In other word, we have to pay lin.9. Similarly, we can find all elected edge threhold value a hown in Figure (b): the number in the parenthei are the threhold value. C. Reaonable Charging Scheme For a given et of receiver, after we calculate the payment p for every relay agent baed on a declared cot vector d, it i natural to a who will pay thee payment. Two poible payment model have been propoed in the literature. ) Outide ban or Group payment model: an outide ban or an organization to which the receiver belong will pay all thee relay agent. ) Payment haring model: each receiver i hould pay a reaonable haring S i of the total payment. We will addre what reaonable mean later. For outide ban model, the only thing we hould care i how to find the truthful payment cheme for the given multicat topology, which ha been addreed in the previou ubection. In practice, it i often the cae that the receiver have to hare the payment among themelve. Thu, we will tudy how to hare the payment fairly. Notice that the payment haring i different from the traditional cot haring. How to hare the multicat cot among the receiver ha been tudied previouly in [7], [], [3], [9], in which the cot of relay agent are public and the multicat topology i a fixed tree. Mot of the literature ued the Equal Lin Split Downtream (ELSD) pricing cheme to charge receiver: the cot of a lin i hared equally among all it downtream receiver. A we will how later, if we imply ue the ELSD a our charging cheme to hare the payment, it uually i not reaonable in common ene.

6 Given a et of receiver R, let P(R, d) p (R, d) denote the total payment to all relay agent. For a charging cheme S, let S i (R, d) denote the charge (or called haring) to receiver i. We call a charging cheme S reaonable or fair if it atifie the following criteria. ) Nonnegative Sharing (NNS): Any receiver q i haring hould not be negative. In other word, we don t pay the receiver to receive. ) Cro-Monotone (CM): For any two receiver et R R containing q i : S i (R,d) S i (R,d). In other word, for a given networ, receiver i haring doe not increae when more receiver require ervice. 3) No-Free-Rider (NFR): The haring S i (R, d) of a receiver q i R i never le than R of it unicat haring S i (q i,d). Thi guarantee that the haring of any receiver will not be too mall. 4) Budget Balance (BB): The payment to all relay agent hould be hared by all receiver, i.e., P(R, d) q S i R i(r, d). Notice the definition of reaonable can be changed due to different requirement. For example, a common criterion for multicat charging cheme i to maximize networ welfare: elect a ubet of receiver uch that the networ welfare i maximized. Here, the networ welfare i defined a the total valuation of all elected receiver minu the cot of the networ providing ervice. Since in our model we do not conider receiver valuation, we will only focu on budget balance intead of maximizing the networ welfare. In literature, the Shapely value [8] i one of the mot commonly ued charging cheme to achieve BB and CM. By auming a univeral multicat tree and the publicly nown lin cot, Feigenbaum et al. [3] proved that ELSD charging cheme i a Shapely Value. Unfortunately, the ELSD charging cheme i not alway fair if we want to hare the payment. Lemma 4: For tree LST, ELSD haring i not fair. Proof: A a running example, we will ue the multicat tree, denoted by LST, found by Algorithm 3 to how that ELSD i not fair. We till ue the ame networ hown in Figure (a). Let Q q,q be receiver. The multicat tree LST (Q) i hown in Figure (c). Tree LST (q ) and LST (q ) are hown in Figure 3 (a) and (b) repectively. Fig. 3. v.5(.6) q q q (.4).5 (.5) q (a) LST (q ) (b) LST (q ) LST (q ) and LST (q ) and their correponding payment(3). We now how that ELSD i not fair in thi ituation. Figure 3 (a) and (b) illutrate the payment P (q ).5 and P (q ).9. If we ue ELSD a our charging cheme, the haring by q i S (q q,c) which i larger than it haring S (q,c).6 when q i the only receiver. Thu, it violate the property CM. It implie that ELSD i not a fair charging cheme for multicat topology LST. Furthermore, uing the ame example, we how by contradiction that there i no charging cheme atifying both CM and BB. Lemma 5: For multicat topology LST, there i no charging cheme that atifie both CM and BB for a truthful payment cheme. Proof: For the ae of contradiction, we aume that a charging cheme S atifie both CM and BB. From the property of BB, we have S (q,c).6, S (q,c).9 and S (q q,c)+s (q q,c)6.4. From CM, we have S (q q,c) S (q,c).6 and S (q q,c) S (q,c).9. Combining thee two inequalitie, we obtain 6.4 S (q q,c)+s (q q,c) , which i a contradiction. Thu, given an arbitrary multicat topology and it correponding truthful payment cheme, a fair charging cheme may not exit at all. It i attractive and important to find the neceary and ufficient condition for the exitence of a fair charging cheme for a given multicat topology. IV. CASE STUDY: CORE-BASED MULTICAST In thi ection, we illutrate how to deign a truthful multicat protocol for the currently ued core-baed multicat which ue the leat cot path tree (LCPT) a it topology. Here, we aume that the networ i modelled a a lin weighted graph. All our reult preented in thi ection alo apply to the cae when the networ i modelled a a node weighted graph. Given a et of receiver R, we firt compute the leat cot path, denoted by LCP(, q i,d), between the ource and every receiver q i Q under the reported cot profile d. The union of all leat cot path between the ource and the receiver i called leat cot path tree, denoted by LCP T (R, d). A. Payment Scheme Intuitively, we may ue the VCG payment cheme in conjunction with the LCPT tree tructure a follow. The payment p to each lin e that i not in LCPT i and the payment to each lin e on LCPT i p ω(lcp T (R, d )) ω(lcp T (R, d)) + d. In other word, the payment i it declared cot plu the difference between the cot of the leat cot path tree without uing e and the cot of the leat cot path tree. We how by example that the above payment cheme i not trategyproof. In other word, if we imply apply VCG cheme on LCPT, a lin may have incentive to lie about it cot. Figure 4 illutrate uch an example where lin can lie it cot to improve it utility. The payment to lin e 4 i and it utility i alo if it report it cot truthfully. The total payment to lin e 4 when e 4 lie it cot down to 4 i ω(lcp T (R, c 4 ))

7 q q q 3 Fig q q q q q q 3 (a) Networ (b) LCPT (c) LCPT after lie VCG mechanim i not truthful for LCPT ω(lcp T (R, c 4 d 4 ))+d and the utility of lin become u 4 (c 4 d 4 )6 8 8, which i larger than u 4 (c). Thu lin e 4 ha incentive to lie, which implie that VCG mechanim i not truthful. With the failure of the VCG mechanim, we may doubt whether there exit a truthful payment cheme baed on LCPT. Remember LCPT i formed by union of leat cot path. By applying Theorem, we conclude that LCPT atifie MP. Thu, there exit a truthful payment cheme and the truthful payment can be found according to Theorem a following. For each receiver q i R, we find the leat cot path from the ource to q i, and compute an intermediate payment p i to lin e on LCP(, q i,d) uing the VCG payment cheme for unicat p i d + LCP(, q i,d ) LCP(, q i,d). Here LCP(, q i,d) denote the total cot of the leat cot path LCP(, q i,d). The final payment to lin e LCP T i p max q pi i Q () The payment to a lin i zero if it i not on LCPT. Let u illutrate the above payment cheme for LCPT by a running example in Figure 4. If lin report it cot 8 truthfully, then it get payment ince it i not in the LCPT. If lin report a cot 4, it i now in the LCPT, a hown in Figure 3 (c). It payment then become max(p,p,p 3 ), where p LCP(, q,d v4 ) LCP(, q,d) Similarly, p 6and p 3 7. Then the utility of lin become max(p,p,p 3 ) 87 8, which i le than what it get by reporting it truth cot. B. Ditributed Payment Algorithm Remember that LCPT i baed on the union of the leat cot path from the ource to all receiver. For unicat, Feigenbaum et al. [5] gave a ditributed method uch that each node i can compute a number p ij >, which i the payment to node for carrying the tranit traffic from node i to node j if node i on LCP(i, j, d). The algorithm converge to a table tate after d round, where d i the maximum of diameter of graph G removing a node, over all. We then briefly dicu how to compute the payment for multicat uing LCPT. Our ditributed algorithm ue the algorithm in [5] a the firt phae and i hown a follow. Algorithm 5 Ditributed payment computing : Apply the ditributed algorithm in [5] to compute the payment p q i. After thi tep, every receiver q i will compute the payment p i to each uptream edge e on the leat cot path between and q i. : Every receiver q i end the payment information it computed to it parent. 3: Upon receiving a pacet containing the payment from it child which originated from receiver q i, lin e only eep payment p i and end all remaining payment information to it parent if exit. 4: When lin e receive p i from all it downtream receiver q i, it compute the maximum of them a the it own final payment. C. Payment Sharing Intuitively, we may want to ue ELSD a the charging cheme. Unfortunately, we will how by example that ELSD i not fair when coupled with LCPT. Conider the networ hown by Figure 5 (a). There are two receiver q,q. Path 3 4 () () q q q q q q (a) Networ (b) LCP T (q,d) (c) LCP T (q q,d) Fig. 5. ELSD charging cheme doe not wor for LCPT LCP T (q,d) i hown in Figure 5 (b) and the payment to lin i hown beide the lin cot in parenthei. The total payment to lin on LCP T (q,d) i + 4. If we conider LCP T (q q,d), the payment to lin i hown in Figure 5 (c). If we apply ELSD to hare payment, the payment to lin (which i 6) i plit equally between q and q. Thu, the hared payment of receiver q i 3+5 when the receiver et i {q,q }, while it payment i only 4 when q i the only receiver. Thu, ELSD haring method violate the CM property here, i.e., ELSD i not a fair charging cheme for LCPT. Therefore we hould find ome reaonable charging cheme other than ELSD. In thi paper, we give one fair payment haring method. The baic idea behind our method i that a receiver hould only pay a proportion of the payment that i due to it exitence. Roughly peaing, our payment haring cheme wor a follow. Notice that a final payment to an agent j i the maximum of payment p i j by all receiver. Since different receiver may have different value of payment to agent j, the final payment P j hould be hared proportionally to their value, not equally among them a cot-haring. Figure IV-C illutrate the payment haring cheme that follow. Without lo of generality, aume that p j p j pn j, i.e., p j p n j. We then divide the payment p j into n portion: p j, p j p j,, pi j pi j 3 4 () (6) 3 (6),, p n j pn j. Each portion p i j pi 4 j

8 Fig. 6. Σ i t e pt p t j j n i+ S j p j e i p i pi j j e n n pn j j Share the payment to ervice provider among receiver fairly. i then equally hared among the lat n i+ element, which have the larget n i + payment to S j. Algorithm 6 Fair charging cheme for LCPT. : for edge e LCP T (R, d) do : Let R(e ) be the et of downtream receiver of e, i.e., p max qi R(e ) p i max q i R p i. 3: Sort the receiver in R(e ) according to p i in an acending order. If two or more receiver have the ame value, the receiver with maller ID ran firt. Let σ {σ,σ,,σ R(e ) } be the raning. Here, we add a dummy payment p σ to raning σ. 4: For receiver not in R(e ), it haring of the payment p of lin e i. 5: For a receiver q σa R(e ), it haring of the payment p to lin e i: f σ a (R, d) a x p pσ x R(e ) x + In other word, for two receiver q σx, q σx+ who are conecutive in raning σ, the difference + i hared by all receiver who ran after q σ x. 6: end for 7: The total charge for receiver q i in LCPT i S i (R, d) f j i (R, d) (3) e j LCP T (R,d) We firt illutrate how to charge the receiver q uing Algorithm 6 for a networ repreented by Figure 5. For lin, the two intermediate payment are p and p 6. Firt, we obtain a ran of thee receiver baed on the intermediate payment {q,q }. Then p i equally plit between q and q and p p 4i charged to q alone. Thu, receiver q i charged + 3 totally in LCP T (q q,d), which i maller than the price 4 when q i the only receiver. Thi how that charging cheme decribed by Algorithm 6 i reaonable for thi pecific networ. Following theorem how that it i reaonable for LCPT generally. Theorem 6: The charging cheme defined in Algorithm 6 for LCPT atifie NNS, CM, NFR and BB. Proof: A lin i called an uptream lin of a receiver q i if it i on the unique imple path between the ource and the receiver q i in the multicat tree. Obviouly, our charging cheme atifie NNS ince pσx for any () two receiver q σx and q σx. Remember for a receiver q σa R(e ), it haring of the payment to it uptream lin e i: a fσ a (R, d) pσ x a pσ x R(e ) x + R(e ) pσa x pσ R(e ) pσa R(e ) Thu, the total charge to receiver q σa i S σa (R, d) fσ a (R, d) e LCP T (R,d) e LCP (,q σa,d) pσa R(e ) x e LCP (,q σa,d) Sσa (q σa,d). R(e ) It implie that the charging cheme 6 atifie NFR. Summing f σ a (R) for a from to R(e ), we obtain R(e ) a R(e ) a R(e ) a f σ a (R) a x p σa Thu, we obtain S(R, d) R(e ) a a x R(e ) R(e ) x + R(e) q i R a p σa S i(r, d) e j LCP T (R,d) q i R f j i (R, d) pσ x R(e ) x + a a x f σ a (R, d) p σ x R(e ) x + pσ R(e ) p q i R e j LCP T (R,d) e j LCP T (R,d) f j i (R, d) Thi prove that our charging cheme (6) atifie BB. p j P(R, d) We then how that our cheme doe atify CM. Notice a neceary and ufficient condition for CM i that for any R Q and q j Q R we have S i (R, d) S i (R q j,d) for every q i R. To prove thi, it i ufficient to prove that f i (R) f i (R q j ). Aume q i i raned a in raning σ when the receiver et i R. We prove it by dicuing all poible cae: Cae : p j pi. Let σ be the new raning for receiver et R q j, then q j raned after q i in σ. Thu σ x σ x for x a. In other word, all receiver raned before or at a in raning σ till ha the ame ran in σ. Therefore, f i (R q j) a x a x a x pσ x R(e ) + x + pσ x R(e ) x + pσ x R(e ) x + f i (R) Cae : p j <pi. In thi cae, q j i raned before q i in σ and q i raned a + in σ. Without lo of generality, we aume q j raned b in raning σ. Thu, we have σ x σ x for

9 x<band σ x σ x+ for x>b. Therefore, f i (R q j) b x a+ x pσ x R(e ) + x + pσ x a+ R(e ) x + + xb+ For the firt part of the equality we have b x b x b x b x pσ x R(e ) x + pσ x R(e ) x + pσ x R(e ) x + pσ x R(e ) x + + pσ b + pσ b + pσ b For the econd part of the equality we have a+ xb+ a+ xb+ a xb pσ x R(e ) x + p σ x p σ x R(e ) x + pσ x R(e ) x + pσ b Combining the above two, we obtain fi (R q j) b pσ x a+ R(e ) x + + x b x a xb a x pσ x R(e ) x + pσ x R(e ) x + pσ x R(e ) x + pσ x R(e ) x + pσ b R(e ) b + pσ b R(e ) b + pσ b R(e ) b + pσ b pσ b R(e ) b + pσ b R(e ) b + xb+ + pσ b pσ b pσ x R(e ) x + pσ b R(e ) b + + pσ b R(e ) b + f i (R) Thi immediately implie that our charging cheme atifie CM. Thi finihe the proof of Theorem 6. D. Ditributed Charge Calculation Notice, if we implement the payment haring cheme in a centralized way, for every lin, it need to tore up to Q r intermediate payment. Thu the total pace needed i O(nr). In practice, it may be more deirable to implement a ditributed payment haring cheme. In the following, we preent a ditributed algorithm that implement our payment haring cheme that require at mot O(r) pace for each lin and total meage at mot O(r h), where h i the height of the tree. In our ditributed algorithm, for any lin e in LCP T, we not only need it final payment p, but alo need the intermediate payment p j for every downtream receiver q j. We aume that thi i already available through our ditributed payment computing method. In our ditributed charge cheme, at every lin e we ue MD [i] to tore the payment it and all it uptream agent will receive from the receiver q i. Our ditributed charging cheme i implemented in a top-down fahion from the ource to all receiver. Algorithm 7 Ditributed charging cheme : Initially, the ource node end all it children in the multicat tree a vector MD for all receiver. : Every lin e in LCP T, upon receiving a charging vector MD from it parent, update the charge for each of it downtream receiver q i a MD [i] MD[i] + f i (R(e )). Here, f i (R(e )) i calculated according to Algorithm 6. 3: If lin e ha more than one downtream receiver, it contruct a new charge vector MD j {MD[i ],MD[i ],,MD[i R(ej) ]} for every downtream adjacent lin e j. Here, the charge MD[i t ] ( t R(e j ) ) i for receiver q it who i a downtream receiver of lin e j. Then end vector MD j to lin e j. If lin e ha only one downtream receiver q i then e imply end the modified charge MD to it downtream lin. 4: Every receiver q i will finally receive a charge which i equal to equation (3). V. OTHER ISSUES AND OPEN QUESTIONS A we mentioned early, thi paper i the firt tep to explore the general networ protocol deign when relay agent are non-cooperative. There are many intereting and important iue that have been untouched and left for further tudy. We jut lit a few here. Colluion: Throughout thi paper, we aume all agent will not collude together to manipulate the protocol. It i intereting to tudy what will happen when agent will collude and how to find truthful mechanim that are reitent to colluion. Our conjecture i that no truthful multicat protocol that can prevent the colluion from an initial wor proved in [9] for unicat. Ditributed Computing: One thing we hould notice i that thee agent running the ditributed algorithm are indeed noncooperative. How to enure they implement the correct ditributed algorithm we deigned alo i an important quetion we have to conider. Receiver Valuation: So far, we aume that the receiver will pay the fair amount of haring of payment to receive data uing multicat. In practice, each receiver often ha a valuation to indicate how much it i willing to pay to receive the information. Receiver will chooe to receive the information if and only if the charge i at mot it valuation. Furthermore, receiver could alo be non-cooperative and elfih: each receiver will alway maximize it profit by manipulating it

10 reported valuation. Thi mae the multicat deign even harder and it i a very promiing and intereting future reearch direction. It i well-nown that a cro-monotone cot haring cheme implie a group-trategyproof mechanim [7]. Unfortunately, we can how that the imple application of a cro-monotone payment-haring mechanim doe not imply a group-trategyproof mechanim at all. The elfih relay agent could lie up or downward it cot to improve it utility. VI. PERFORMANCE STUDY We conduct extenive imulation to tudy the performance of trategy-proof multicat routing baed on LCPT. Remember that the payment of LCPT i at leat the actual cot of LCPT. For a LCPT T, let c(t ) be it cot and P(T ) be the total payment to all relay agent. We define the overpayment ratio (OR) of T a OR(T ) P(T ) c(t ). (4) In the wort cae, the ratio OR(T ) could be a large a O(n) for a networ of n node [3], even for the unicat pecial cae. Notice there are ome other definition about overpayment ratio in the literature. In [3], the author propoed to compare the total payment P(T ) with the cot of the new LCPT obtained from the graph G\T, i.e., removing T from the original graph G. In addition to the overpayment ratio, we propoe another metric to meaure the performance of the trategy-proof multicat baed on LCPT. Remember that the payment to relay agent are hared among receiver. Thu, for each receiver, it i more intereted in how much extra it hould pay to guarantee the truthfulne of the lin. Given the LCPT T for a et of receiver R, let m i (R, T ) be the price that receiver q i i charged to receive the information if the lin are cooperative. Notice that S i (R, T ) i the amount that receiver q i i charged to receive the data if the lin are non-cooperative. We define the Price-Cot-Ratio (PCR) a PCR(q i,t) S i(r, T ) m i (R, T ). (5) In our experiment, we generate random networ with n node, where n i a parameter. In order to enure the networ i bi-connected, the average node degree hould be greater than log n with high probability. Firt, for every node u, we randomly draw a number from [α log n, 5α log n] a it degree d u, where α i a parameter. A random graph atifying thee degree requirement i then generated. The length of each edge i then uniformly drawn from ditribution [, ]. By chooing different parameter, we tudy what apect of the networ affect the OR and PCR. To compute the probability ditribution, we generate 4 different networ and compute the number of intance that fall in ome pecific interval. For other imulation, given all fixed parameter, we generate 3 different networ intance and compute the performance accordingly. A. Effect of Networ Size In thi imulation, we fix the parameter α to 3logn, which mean that node degree are drawn from a uniform ditribution [ 3, 5 3 ] with average. We alo fix the ize of receiver et R to 5. We meaure the performance of our trategyproof multicat protocol baed on the following four metric: Average Overpayment Ratio (AOR), Maximum Overpayment Ratio (MOR), Average Price-Cot-Ratio (APCR) and Maximum Price-Cot-Ratio (MPCR). Figure 7 (a) and (b) plot the ditribution of the average overpayment ratio and the average PCR when the number of node are and 5. Oberve that the probability ditribution of AOR (alo APCR) for different networ ize are imilar. Figure 7 (c) how that the AOR, MOR and APCR do not change when the number of networ node grow from to 5. On the other hand, MPCR fluctuate and i much larger than the other three metric. Thu, we conclude that the number of node do not affect the overpayment ratio and price-cot-ratio in random networ. B. Effect of Networ Denity Since the difference in the networ ize do not affect the performance of our trategy-proof protocol, we then tudy other effect by fixing the networ ize ( in the reult reported here). We pecifically tudy the effect of the networ denity by changing the node degree parameter α. Figure 8 (a) and (b) how the ditribution of AOR and APCR repectively when the node degree are drawn from two uniform ditribution [log, 5 log ] and [ log, log ]. Figure 8 (c) how that the AOR, MOR and APCR change when the networ denity change. It i intereting to oberve that both AOR and APCR firt decreae when the networ denity (i.e., the average node degree) increae from to 3, and then increae lightly when the networ denity increae from 3 to 4. They both become teady when the networ denity i greater than 4. It i intereting to analyze thi phenomenon theoretically. C. Performance Comparion with Unicat In thi imulation, we compare the average cot and payment per receiver in multicat baed on LCPT with thoe of unicat. We randomly generate n terminal where n varie from to 5. The degree of each node i randomly drawn from the uniform ditribution [log n, 5 log n]. For a pecific networ, we average the cot and payment for all receiver. Figure 9 (a) plot the cot and payment for multicat and unicat per receiver when the number of receiver i 5, while Figure 9 (b) how the reult when % of node are receiver. Oberve that the average cot and payment per receiver for multicat baed on LCPT i maller than the average cot and payment per receiver for unicat repectively. Furthermore, under mot of the cae, the payment per receiver for LCPT payment i even maller than the cot per receiver for unicat. Thi enure u that multicat not only ave the total reource, but alo benefit the individual receiver even in elfih networ. We then vary the networ ize among,, 3, 4, 5 and the number of receiver from to

11 Node Number Node Number 5.3 Node Number Node Number Probability..5. Probability..5. Overpayment Ratio/ Price Cot Ratio AOR MOR APCR MPCR.5.5 Average Overpayment Ratio Average Price Cot Ratio Node Number (a) Probability ditribution of AOR (b) Probability ditribution of APCR (c) Average and Maximum OR/PCR Fig. 7. The average overpayment ratio and price cot ratio do not depend on the networ denity α α.4.35 α α.65.6 AOR MOR APCR Probability Probability Over Payment Ratio/Price Cot Ratio Average Overpayment Ratio Average Price Cot Ratio Average Node Degree (a) Probability ditribution of AOR (b) Probability ditribution of APCR (c) Average and Maximum OR/PCR Fig. 8. The overpayment ratio and price cot ratio depend on the networ denity. 6 5 Unicat Cot Unicat Payment LCPT Cot LCPT Payment 6 4 Unicat Cot Unicat Payment LCPT Cot LCPT Payment Reveiver cot and payment 3 Reveiver cot and payment 8 Cot number of node Fig number of node Number of Node 5 5 Number of Receiver (a) 5 receiver (b) % node are receiver (c) Varying receiver number The cot and payment per receiver for unicat and multicat baed on LCPT Figure 9 (c) how the unicat cot (the red urface) and the LCPT baed multicat payment (the blue urface). From the reult of previou three imulation, we oberve that AOR and APCR are both quite mall for a random networ, and even the MOR i maller than.7 generally. Thu, we conclude that the theoretical wort cae almot urely will not happen in a random networ. VII. CONCLUSION AND FUTURE WORKS In thi paper we give a trategyproof payment and charging mechanim that timulate cooperation for multicat in a elfih networ. We aumed that a group of receiver i willing to pay to receive the data. Each poible relay agent ha a privately nown cot of providing the relay ervice. In a multicat cheme, each elfih relay agent firt i aed to declare a cot for relaying data for other node. In return, it will get a payment baed on the reported cot of all relay agent that can provide the ervice. The objective of every individual relay agent i then to maximize it profit. A multicat protocol i aid to be trategyproof if no peculation and counter peculation happen, i.e., every relay agent will maximize it profit when it truthfully report it cot. It i well-nown that the traditional protocol deigned for conforming agent cannot prevent the elfih agent from manipulating it cot to it benefit. Intead of redeigning the wheel, it i preferred to enhance an exiting multicat protocol to deal with elfih agent. In thi paper, we pecifically gave a general rule to decide whether it i poible, and how to if

Chapter Introduction

Chapter Introduction Chapter-6 Performance Analyi of Cuk Converter uing Optimal Controller 6.1 Introduction In thi chapter two control trategie Proportional Integral controller and Linear Quadratic Regulator for a non-iolated

More information

Hashiwokakero. T. Morsink. August 31, 2009

Hashiwokakero. T. Morsink. August 31, 2009 Hahiwokakero T. Morink Augut 31, 2009 Content 1 Introduction 3 2 What i Hahiwokakero? 3 2.1 The rule............................. 3 2.2 Eay olving tatement..................... 4 3 Building an Own Solver

More information

The Central Limit Theorem

The Central Limit Theorem Objective Ue the central limit theorem to olve problem involving ample mean for large ample. The Central Limit Theorem In addition to knowing how individual data value vary about the mean for a population,

More information

Subcarrier exclusion techniques

Subcarrier exclusion techniques Subcarrier excluion technique for coded OFDM ytem Kai-Uwe Schmidt, Jochen Ertel, Michael Benedix, and Adolf Finger Communication Laboratory, Dreden Univerity of Technology, 62 Dreden, Germany email: {chmidtk,

More information

Produced in cooperation with. Revision: May 26, Overview

Produced in cooperation with. Revision: May 26, Overview Lab Aignment 6: Tranfer Function Analyi Reviion: May 6, 007 Produced in cooperation with www.digilentinc.com Overview In thi lab, we will employ tranfer function to determine the frequency repone and tranient

More information

Active Harmonic Elimination in Multilevel Converters Using FPGA Control

Active Harmonic Elimination in Multilevel Converters Using FPGA Control Active Harmonic Elimination in Multilevel Converter Uing FPGA Control Zhong Du, Leon M. Tolbert, John N. Chiaon Electrical and Computer Engineering The Univerity of Tenneee Knoxville, TN 7996- E-mail:

More information

COST OF TRANSMISSION TRANSACTIONS: Comparison and Discussion of Used Methods

COST OF TRANSMISSION TRANSACTIONS: Comparison and Discussion of Used Methods INTERNATIONAL CONFERENCE ON RENEWABLE ENERGY AND POWER QUALITY (ICREPQ 03) COST OF TRANSMISSION TRANSACTIONS: Comparion and Dicuion of Ued Method Judite Ferreira 1, Zita Vale 2, A. Almeida Vale 3 and Ricardo

More information

Frequency Calibration of A/D Converter in Software GPS Receivers

Frequency Calibration of A/D Converter in Software GPS Receivers Frequency Calibration of A/D Converter in Software GPS Receiver L. L. Liou, D. M. Lin, J. B. Tui J. Schamu Senor Directorate Air Force Reearch Laboratory Abtract--- Thi paper preent a oftware-baed method

More information

CHAPTER 2 WOUND ROTOR INDUCTION MOTOR WITH PID CONTROLLER

CHAPTER 2 WOUND ROTOR INDUCTION MOTOR WITH PID CONTROLLER 16 CHAPTER 2 WOUND ROTOR INDUCTION MOTOR WITH PID CONTROLLER 2.1 INTRODUCTION Indutrial application have created a greater demand for the accurate dynamic control of motor. The control of DC machine are

More information

Design, Realization, and Analysis of PIFA for an RFID Mini-Reader

Design, Realization, and Analysis of PIFA for an RFID Mini-Reader Deign, Realization, and Analyi of PIFA for an RFID Mini-Reader SUNG-FEI YANG ; TROY-CHI CHIU ; CHIN-CHUNG NIEN Indutrial Technology Reearch Intitute (ITRI) Rm. 5, Bldg. 5, 95, Sec., Chung Hing Rd., Chutung,

More information

UNIVERSITY OF SASKATCHEWAN EE456: Digital Communications FINAL EXAM, 9:00AM 12:00PM, December 9, 2010 (open-book) Examiner: Ha H.

UNIVERSITY OF SASKATCHEWAN EE456: Digital Communications FINAL EXAM, 9:00AM 12:00PM, December 9, 2010 (open-book) Examiner: Ha H. Name: Page 1 UNIVERSIY OF SASKACHEWAN EE456: Digital Communication FINAL EXAM, 9:00AM 1:00PM, December 9, 010 (open-book) Examiner: Ha H. Nguyen Permitted Material: Only textbook and calculator here are

More information

Network Coding for Multi-Resolution Multicast

Network Coding for Multi-Resolution Multicast Network Coding for Multi-Reolution Multicat MinJi Kim, Daniel Lucani, Xiaomeng Shi, Fang Zhao, Muriel Médard Maachuett Intitute of Technology, Cambridge, MA 02139, USA Email: {minjikim, dlucani, xhi, zhaof,

More information

RESEARCH ON NEAR FIELD PASSIVE LOCALIZATION BASED ON PHASE MEASUREMENT TECHNOLOGY BY TWO TIMES FREQUENCY DIFFERENCE

RESEARCH ON NEAR FIELD PASSIVE LOCALIZATION BASED ON PHASE MEASUREMENT TECHNOLOGY BY TWO TIMES FREQUENCY DIFFERENCE RESEARCH ON NEAR FIED PASSIVE OCAIZATION BASED ON PHASE MEASUREMENT TECHNOOGY BY TWO TIMES FREQUENCY DIFFERENCE Xuezhi Yan, Shuxun Wang, Zhongheng Ma and Yukuan Ma College of Communication Engineering

More information

Lab 7 Rev. 2 Open Lab Due COB Friday April 27, 2018

Lab 7 Rev. 2 Open Lab Due COB Friday April 27, 2018 EE314 Sytem Spring Semeter 2018 College of Engineering Prof. C.R. Tolle South Dakota School of Mine & Technology Lab 7 Rev. 2 Open Lab Due COB Friday April 27, 2018 In a prior lab, we et up the baic hardware

More information

AN EVALUATION OF DIGILTAL ANTI-ALIASING FILTER FOR SPACE TELEMETRY SYSTEMS

AN EVALUATION OF DIGILTAL ANTI-ALIASING FILTER FOR SPACE TELEMETRY SYSTEMS AN EVALUATION OF DIGILTAL ANTI-ALIASING FILTER FOR SPACE TELEMETRY SYSTEMS Alion de Oliveira Morae (1), Joé Antonio Azevedo Duarte (1), Sergio Fugivara (1) (1) Comando-Geral de Tecnologia Aeroepacial,

More information

International Journal of Engineering Research & Technology (IJERT) ISSN: Vol. 1 Issue 6, August

International Journal of Engineering Research & Technology (IJERT) ISSN: Vol. 1 Issue 6, August ISSN: 2278-08 Vol. Iue 6, Augut - 202 The Turbo Code and an Efficient Decoder Implementation uing MAP Algorithm for Software Defined Radio Mr Rupeh Singh (Principal), Dr. Nidhi Singh (Aociate Profeor)

More information

Deterministic Deployment for Wireless Image Sensor Nodes

Deterministic Deployment for Wireless Image Sensor Nodes Send Order for Reprint to reprint@benthamcience.ae 668 The Open Electrical & Electronic Engineering Journal, 04, 8, 668-674 Determinitic Deployment for Wirele Image Senor Node Open Acce Junguo Zhang *,

More information

II. SYSTEM MODEL. A. Link and path model

II. SYSTEM MODEL. A. Link and path model HARQ I. INTRODUCTION ARQ (automatic repeat-requet i a link layer protocol ued for packet error detection and retranmiion. Errordetection bit (uch a CRC bit are attached and tranmitted along with the meage

More information

The RCS of a resistive rectangular patch antenna in a substrate-superstrate geometry

The RCS of a resistive rectangular patch antenna in a substrate-superstrate geometry International Journal of Wirele Communication and Mobile Computing 0; (4): 9-95 Publihed online October 0, 0 (http://www.ciencepublihinggroup.com/j/wcmc) doi: 0.648/j.wcmc.0004. The RCS of a reitive rectangular

More information

Time-Domain Coupling to a Device on Printed Circuit Board Inside a Cavity. Chatrpol Lertsirimit, David R. Jackson and Donald R.

Time-Domain Coupling to a Device on Printed Circuit Board Inside a Cavity. Chatrpol Lertsirimit, David R. Jackson and Donald R. Time-Domain Coupling to a Device on Printed Circuit Board Inide a Cavity Chatrpol Lertirimit, David R. Jackon and Donald R. Wilton Applied Electromagnetic Laboratory Department of Electrical Engineering,

More information

A New Technique to TEC Regional Modeling using a Neural Network.

A New Technique to TEC Regional Modeling using a Neural Network. A New Technique to TEC Regional Modeling uing a Neural Network. Rodrigo F. Leandro Geodetic Reearch Laboratory, Department of Geodey and Geomatic Engineering, Univerity of New Brunwick, Fredericton, Canada

More information

Analysis. Control of a dierential-wheeled robot. Part I. 1 Dierential Wheeled Robots. Ond ej Stan k

Analysis. Control of a dierential-wheeled robot. Part I. 1 Dierential Wheeled Robots. Ond ej Stan k Control of a dierential-wheeled robot Ond ej Stan k 2013-07-17 www.otan.cz SRH Hochchule Heidelberg, Mater IT, Advanced Control Engineering project Abtract Thi project for the Advanced Control Engineering

More information

Active vibration isolation for a 6 degree of freedom scale model of a high precision machine

Active vibration isolation for a 6 degree of freedom scale model of a high precision machine Active vibration iolation for a 6 degree of freedom cale model of a high preciion machine W.B.A. Boomma Supervior Report nr : Prof. Dr. Ir. M. Steinbuch : DCT 8. Eindhoven Univerity of Technology Department

More information

IE 361 Module 6. Gauge R&R Studies Part 2: Two-Way ANOVA and Corresponding Estimates for R&R Studies

IE 361 Module 6. Gauge R&R Studies Part 2: Two-Way ANOVA and Corresponding Estimates for R&R Studies IE 361 Module 6 Gauge R&R Studie Part 2: Two-Way ANOVA and Correponding Etimate for R&R Studie Reading: Section 2.2 Statitical Quality Aurance for Engineer (Section 2.4 of Revied SQAME) Prof. Steve Vardeman

More information

Constant Switching Frequency Self-Oscillating Controlled Class-D Amplifiers

Constant Switching Frequency Self-Oscillating Controlled Class-D Amplifiers http://dx.doi.org/.5755/j.eee..6.773 ELEKTRONIKA IR ELEKTROTECHNIKA, ISSN 39 5, OL., NO. 6, 4 Contant Switching Frequency Self-Ocillating Controlled Cla-D Amplifier K. Nguyen-Duy, A. Knott, M. A. E. Anderen

More information

A COMPARISON OF METHODS FOR EVALUATING THE TEST ZONE PERFORMANCE OF ANECHOIC CHAMBERS DESIGNED FOR TESTING WIRELESS DEVICES

A COMPARISON OF METHODS FOR EVALUATING THE TEST ZONE PERFORMANCE OF ANECHOIC CHAMBERS DESIGNED FOR TESTING WIRELESS DEVICES A COMPARISON OF METHODS FOR EVALUATING THE TEST ZONE PERFORMANCE OF ANECHOIC CHAMBERS DESIGNED FOR TESTING WIRELESS DEVICES Jame D. Huff John C. Mantovani Carl W. Sirle The Howland Company, Inc. 4540 Atwater

More information

The Performance Analysis of MIMO OFDM System with Different M-QAM Modulation and Convolution Channel Coding

The Performance Analysis of MIMO OFDM System with Different M-QAM Modulation and Convolution Channel Coding The Performance Analyi of MIMO OFDM Sytem with Different M-QAM Modulation and Convolution Channel Coding H. S. Shwetha M.tech, Digital Communication Engineering Siddaganga Intitute of Technology Tumakuru,

More information

Development of a Novel Vernier Permanent Magnet Machine

Development of a Novel Vernier Permanent Magnet Machine Development of a Novel Vernier Permanent Magnet Machine Shuangxia Niu 1, S. L. Ho 1, W. N. Fu 1, and L. L. Wang 2 1 The Hong Kong Polytechnic Univerity, Hung Hom, Kowloon, Hong Kong 2 Zhejiang Univerity,

More information

Adaptive Space/Frequency Processing for Distributed Aperture Radars

Adaptive Space/Frequency Processing for Distributed Aperture Radars Adaptive Space/Frequency Proceing for Ditributed Aperture Radar Raviraj Adve a, Richard Schneible b, Robert McMillan c a Univerity of Toronto Department of Electrical and Computer Engineering 10 King College

More information

Revisiting Cross-channel Information Transfer for Chromatic Aberration Correction

Revisiting Cross-channel Information Transfer for Chromatic Aberration Correction Reviiting Cro-channel Information Tranfer for Chromatic Aberration Correction Tiancheng Sun, Yifan Peng 3, Wolfgang Heidrich,3 King Abdullah Univerity of Science and Technology, Thuwal, Saudi Arabia IIIS,

More information

Self-Programmable PID Compensator for Digitally Controlled SMPS

Self-Programmable PID Compensator for Digitally Controlled SMPS 6 IEEE COMPEL Workhop, Renelaer Polytechnic Intitute, Troy, NY, USA, July 16-19, 6 Self-Programmable PID Compenator for Digitally Controlled SMPS Zhenyu Zhao and Alekandar Prodi Univerity of Toronto Toronto,

More information

Position Control of a Large Antenna System

Position Control of a Large Antenna System Poition Control of a Large Antenna Sytem uldip S. Rattan Department of Electrical Engineering Wright State Univerity Dayton, OH 45435 krattan@c.wright.edu ABSTRACT Thi report decribe the deign of a poition

More information

Optimized BER Performance of Asymmetric Turbo Codes over AWGN Channel

Optimized BER Performance of Asymmetric Turbo Codes over AWGN Channel International Journal of Computer Application (0975 8887) Optimized Performance of Aymmetric Turbo Code over AWGN Channel M.Srinivaa Rao Pvpit, JNTU Kainada Andhra Pradeh, India. G.Vijaya Kumar Pvpit,

More information

Before the beginning of the Q wave At the top of the R wave After the end of the S wave

Before the beginning of the Q wave At the top of the R wave After the end of the S wave 334 AcqKnowledge 4 Software Guide Detect and Claify Heartbeat Thi robut QRS detector i tuned for human ECG Lead II ignal. It attempt to locate QRS complexe and place an event near the center of each QRS

More information

New Resonance Type Fault Current Limiter

New Resonance Type Fault Current Limiter New Reonance Type Fault Current imiter Mehrdad Tarafdar Hagh 1, Member, IEEE, Seyed Behzad Naderi 2 and Mehdi Jafari 2, Student Member, IEEE 1 Mechatronic Center of Excellence, Univerity of Tabriz, Tabriz,

More information

Truthful Multicast in Selfish Wireless Networks

Truthful Multicast in Selfish Wireless Networks Truthful ulticast in Selfish Wireless Networks Weizhao Wang Dept. of Computer Science Illinois Institute of Technology, Chicago wangwei4@iit.edu Xiang-Yang Li Dept. of Computer Science Illinois Institute

More information

Reinforcement Learning Based Anti-jamming with Wideband Autonomous Cognitive Radios

Reinforcement Learning Based Anti-jamming with Wideband Autonomous Cognitive Radios 1 Reinforcement Learning Baed Anti-jamming with Wideband Autonomou Cognitive Radio Stephen Machuzak, Student Member, IEEE, and Sudharman K. Jayaweera, Senior Member, IEEE Communication and Information

More information

Sampling Theory MODULE XIII LECTURE - 41 NON SAMPLING ERRORS

Sampling Theory MODULE XIII LECTURE - 41 NON SAMPLING ERRORS Sampling Theory MODULE XIII LECTURE - 41 NON SAMPLING ERRORS DR. SHALABH DEPARTMENT OF MATHEMATICS AND STATISTICS INDIAN INSTITUTE OF TECHNOLOG KANPUR 1 It i a general aumption in ampling theory that the

More information

DIGITAL COMMUNICATION

DIGITAL COMMUNICATION DEPARTMENT OF ELECTRICAL &ELECTRONICS ENGINEERING DIGITAL COMMUNICATION Spring 2010 Yrd. Doç. Dr. Burak Kelleci OUTLINE Line Code Differential Encoding Regeneration, Decoding and Filtering Delta Modulation

More information

EEEE 480 Analog Electronics

EEEE 480 Analog Electronics EEEE 480 Analog Electronic Lab #1: Diode Characteritic and Rectifier Circuit Overview The objective of thi lab are: (1) to extract diode model parameter by meaurement of the diode current v. voltage characteritic;

More information

A simple low rate turbo-like code design for spread spectrum systems

A simple low rate turbo-like code design for spread spectrum systems 5 A imple low rate turbo-like code deign for pread pectrum ytem Durai Thirupathi and Keith M. Chugg Communication Science Intitute Dept. of Electrical Engineering Univerity of Southern California, Lo Angele

More information

5048 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12, NO. 10, OCTOBER 2013

5048 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12, NO. 10, OCTOBER 2013 548 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO., OCTOBER Wirele Acce Networ Selection Game with Negative Networ Externality Yu-Han Yang, Student Member, IEEE, Yan Chen, Member, IEEE, Chunxiao

More information

A Flyback Converter Fed Multilevel Inverter for AC Drives

A Flyback Converter Fed Multilevel Inverter for AC Drives 2016 IJRET olume 2 Iue 4 Print IN: 2395-1990 Online IN : 2394-4099 Themed ection: Engineering and Technology A Flyback Converter Fed Multilevel Inverter for AC Drive ABTRACT Teenu Joe*, reepriya R EEE

More information

Parallel DCMs APPLICATION NOTE AN:030. Introduction. Sample Circuit

Parallel DCMs APPLICATION NOTE AN:030. Introduction. Sample Circuit APPLICATION NOTE AN:030 Parallel DCM Ugo Ghila Application Engineering Content Page Introduction 1 Sample Circuit 1 Output Voltage Regulation 2 Load Sharing 4 Startup 5 Special Application: Optimizing

More information

HEURISTIC APPROACHES TO SOLVE THE U-SHAPED LINE BALANCING PROBLEM AUGMENTED BY GENETIC ALGORITHMS. Ulises Martinez William S. Duff

HEURISTIC APPROACHES TO SOLVE THE U-SHAPED LINE BALANCING PROBLEM AUGMENTED BY GENETIC ALGORITHMS. Ulises Martinez William S. Duff Proceeding of the 200 Sytem and Information Engineering Deign Sympoium Matthew H. Jone, Stephen D. Pate, and Barbara E. Tawney, ed. HEURISTIC APPROACHES TO SOLVE THE U-SHAPED LINE BALANCING PROBLEM AUGMENTED

More information

Pre- and Post-DFT Combining Space Diversity Receiver for Wideband Multi-Carrier Systems

Pre- and Post-DFT Combining Space Diversity Receiver for Wideband Multi-Carrier Systems Pre- and Pot- Combining Space Receiver for Wideband Multi-Carrier Sytem Muhammad Imadur Rahman, Suvra Sekhar Da, Frank HP Fitzek, Ramjee Praad Center for TeleInFratruktur (CTiF), Aalborg Univerity, Denmark

More information

NOISE BARRIERS CERC 1. INTRODUCTION

NOISE BARRIERS CERC 1. INTRODUCTION Augut 217 P33/1B/17 NOISE BARRIERS CERC In thi document ADMS refer to ADMS-Road 4.1, ADMS-Urban 4.1 and ADMS-Airport 4.1. Where information refer to a ubet of the lited model, the model name i given in

More information

Voltage Analysis of Distribution Systems with DFIG Wind Turbines

Voltage Analysis of Distribution Systems with DFIG Wind Turbines 1 Voltage Analyi of Ditribution Sytem with DFIG Wind Turbine Baohua Dong, Sohrab Agarpoor, and Wei Qiao Department of Electrical Engineering Univerity of Nebraka Lincoln Lincoln, Nebraka 68588-0511, USA

More information

A Feasibility Study on Frequency Domain ADC for Impulse-UWB Receivers

A Feasibility Study on Frequency Domain ADC for Impulse-UWB Receivers A Feaibility Study on Frequency Domain ADC for Impule-UWB Receiver Rajeh hirugnanam and Dong Sam Ha VV (Virginia ech VLSI for elecommunication Lab Department of Electrical and Computer Engineering Virginia

More information

Control of Electromechanical Systems using Sliding Mode Techniques

Control of Electromechanical Systems using Sliding Mode Techniques Proceeding of the 44th IEEE Conference on Deciion and Control, and the European Control Conference 25 Seville, Spain, December 2-5, 25 MoC7. Control of Electromechanical Sytem uing Sliding Mode Technique

More information

Downlink Small-cell Base Station Cooperation Strategy in Fractal Small-cell Networks

Downlink Small-cell Base Station Cooperation Strategy in Fractal Small-cell Networks Downlink Small-cell Bae Station Cooperation Strategy in Fractal Small-cell Network Fen Bin, Jiaqi Chen, Xiaohu Ge, and Wei Xiang, School of Electronic Information and Communication Huazhong Univerity of

More information

Available online at ScienceDirect. Procedia Technology 17 (2014 )

Available online at  ScienceDirect. Procedia Technology 17 (2014 ) Available online at www.ciencedirect.com ScienceDirect Procedia Technology 17 (014 ) 791 798 Conference on Electronic, Telecommunication and Computer CETC 013 DC-DC buck converter with reduced impact Miguel

More information

A Faster and Accurate Method for Spectral Testing Applicable to Noncoherent Data

A Faster and Accurate Method for Spectral Testing Applicable to Noncoherent Data A Fater and Accurate ethod for Spectral Teting Applicable to Noncoherent Data inhun Wu 1,2, Degang Chen 2, Guican Chen 1 1 School of Electronic and Information Engineering Xi an Jiaotong Univerity, Xi

More information

Identification of Image Noise Sources in Digital Scanner Evaluation

Identification of Image Noise Sources in Digital Scanner Evaluation Identification of Image Noie Source in Digital Scanner Evaluation Peter D. Burn and Don William Eatman Kodak Company, ocheter, NY USA 4650-95 ABSTACT For digital image acquiition ytem, analyi of image

More information

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Stability Analyi in a Cognitive Radio Sytem with Cooperative Beamforming Mohammed Karmooe, Ahmed Sultan, Moutafa Youef Department of Electrical Engineering, Alexandria Univerity, Alexandria, Egypt Wirele

More information

On-Demand Spectrum Sharing By Flexible Time-Slotted Cognitive Radio Networks

On-Demand Spectrum Sharing By Flexible Time-Slotted Cognitive Radio Networks On-Demand Spectrum Sharing By Flexible Time-Slotted Cognitive Radio Network Shimin Gong, Xu Chen, Jianwei Huang, and Ping Wang Centre for Multimedia and Network Technology, Nanyang Technological Univerity

More information

Kalman Filtering Based Object Tracking in Surveillance Video System

Kalman Filtering Based Object Tracking in Surveillance Video System (669 -- 917) Proceeding of the 3rd (2011) CUSE International Conference Kalman Filtering Baed Object racking in Surveillance Video Sytem W.L. Khong, W.Y. Kow, H.. an, H.P. Yoong, K..K. eo Modelling, Simulation

More information

A Simple DSP Laboratory Project for Teaching Real-Time Signal Sampling Rate Conversions

A Simple DSP Laboratory Project for Teaching Real-Time Signal Sampling Rate Conversions A Simple DSP Laboratory Project for Teaching Real-Time Signal Sampling Rate Converion by Li Tan, Ph.D. lizhetan@pnc.edu Department of ECET Purdue Univerity North Central Wetville, Indiana Jean Jiang, Ph.D.

More information

Experiment 8: Active Filters October 31, 2005

Experiment 8: Active Filters October 31, 2005 Experiment 8: Active Filter October 3, In power circuit filter are implemented with ductor and capacitor to obta the deired filter characteritic. In tegrated electronic circuit, however, it ha not been

More information

Midterm: In Perspective

Midterm: In Perspective Undertanding and Meauring Speedup Lat Time» Midterm Exam Today» Midterm Summary» Definition of Speedup» Meauring Speedup Reminder/Announcement» New Homework #3 will be out oon (tomorrow?)» Midterm Exam

More information

Alternating Opportunistic Large Arrays in Broadcasting for Network Lifetime Extension

Alternating Opportunistic Large Arrays in Broadcasting for Network Lifetime Extension IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL 8, NO 6, JUNE 009 831 Alternating Opportunitic Large Array in Broadcating for Network Lifetime Extenion Aravind Kaila and Mary Ann Ingram Abtract We propoe

More information

Modulation Extension Control for Multilevel Converters Using Triplen Harmonic Injection with Low Switching Frequency

Modulation Extension Control for Multilevel Converters Using Triplen Harmonic Injection with Low Switching Frequency odulation Extenion Control for ultilevel Converter Uing Triplen Harmonic Injection with ow Switching Frequency Zhong Du, eon. Tolbert, John N. Chiaon Electrical and Computer Engineering The Univerity of

More information

MODAL ANALYSIS OF A BEAM WITH CLOSELY SPACED MODE SHAPES

MODAL ANALYSIS OF A BEAM WITH CLOSELY SPACED MODE SHAPES ME 164 Senior Captone Deign The Cooper Union Spring 2011 MODAL ANALYSIS O A BEAM WITH CLOSELY SPACED MODE SHAPES Eglind Myftiu The Cooper Union New York City, NY, USA ABSTRACT Thi paper invetigate the

More information

(a) frequency (b) mode (c) histogram (d) standard deviation (e) All the above measure

(a) frequency (b) mode (c) histogram (d) standard deviation (e) All the above measure MT143 Introductory Statitic I Exercie on Exam 1 Topic Exam 1 will ocu on chapter 2 rom the textbook. Exam will be cloed book but you can have one page o note. There i no guarantee that thee exercie will

More information

LCL Interface Filter Design for Shunt Active Power Filters

LCL Interface Filter Design for Shunt Active Power Filters [Downloaded from www.aece.ro on Sunday, November 4, 00 at 8::03 (TC) by 79.7.55.48. Retriction apply.] Advance in Electrical and Computer Engineering Volume 0, Number 3, 00 LCL nterface Filter Deign for

More information

STRUCTURAL SEMI-ACTIVE CONTROL DEVICE

STRUCTURAL SEMI-ACTIVE CONTROL DEVICE STRUCTURAL SEMI-ACTIVE CONTROL DEVICE Ming-Hiang SHIH SUMMARY Method for vibration reduction of tructure under dynamic excitation uch a wind and earthquake were generally claified into active control and

More information

Resonant amplifier L A B O R A T O R Y O F L I N E A R C I R C U I T S. Marek Wójcikowski English version prepared by Wiesław Kordalski

Resonant amplifier L A B O R A T O R Y O F L I N E A R C I R C U I T S. Marek Wójcikowski English version prepared by Wiesław Kordalski A B O R A T O R Y O F I N E A R I R U I T S Reonant amplifier 3 Marek Wójcikowki Englih verion prepared by Wieław Kordalki. Introduction Thi lab allow you to explore the baic characteritic of the reonant

More information

Solution to Tutorial 11

Solution to Tutorial 11 Solution to Tutorial 202/203 Semeter I MA4264 Game Theory Tutor: Xiang Sun November 5, 202 Exercie. Conider the following three-peron game: v( = 0, v(} = 0.2, v(2} = v(3} = 0, v(, 2} =.5, v(, 3} =.6, v(2,

More information

Design of an LCC current-output resonant converter for use as a constant current source

Design of an LCC current-output resonant converter for use as a constant current source Deign of an L current-output reonant converter for ue a a contant current ource A. J. Gilbert, D. A. Stone,. M. Bgham*, M. P. Foter SHEFFELD UNVERSTY Department of Electronic & Electrical Engeerg Mapp

More information

A Real-Time Wireless Channel Emulator For MIMO Systems

A Real-Time Wireless Channel Emulator For MIMO Systems A eal-time Wirele Channel Emulator For MIMO Sytem Hamid Elami, Ahmed M. Eltawil {helami,aeltawil}@uci.edu Abtract: The improvement in channel capacity hailed by MIMO ytem i directly related to intricate

More information

Wireless Link SNR Mapping Onto An Indoor Testbed

Wireless Link SNR Mapping Onto An Indoor Testbed Wirele Link SNR Mapping Onto An Indoor Tetbed Jing Lei, Roy Yate, Larry Greentein, Hang Liu WINLAB Rutger Univerity 73 Brett Road, Picataway, NJ 8854, USA {michelle, ryate, ljg, hliu}@winlab.rutger.edu

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /VETECS.2009.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /VETECS.2009. Nordin, R., Armour, S. M. D., & McGeehan, J. P. (9). Overcoming elfinterference in SM-OFDMA with and dynamic ubcarrier allocation. In IEEE 69th Vehicular Technology Conference 9 (VTC Spring 9), Barcelona

More information

Supervised Information-Theoretic Competitive Learning by Cost-Sensitive Information Maximization

Supervised Information-Theoretic Competitive Learning by Cost-Sensitive Information Maximization BIC, 9 Aug- ept upervied Information-Theoretic Competitive Learning by Cot-enitive Information Maximization Ryotaro Kamimura Information cience Laboratory, Tokai Univerity, 7 Kitakaname Hiratuka Kanagawa

More information

Sloppy Addition and Multiplication

Sloppy Addition and Multiplication Sloppy Addition and Multiplication IMM-Technical Report-2011-14 Alberto Nannarelli Dept. Informatic and Mathematical Modelling Technical Univerity of Denmark Kongen Lyngby, Denmark Email: an@imm.dtu.dk

More information

Low-Cost Routing in Selfish and Rational Wireless Ad Hoc Networks

Low-Cost Routing in Selfish and Rational Wireless Ad Hoc Networks 1 Low-Cost Routing in Selfish and Rational Wireless Ad Hoc Networks WeiZhao Wang Xiang-Yang Li Abstract Numerous routing protocols have been proposed for wireless networks. A common assumption made by

More information

Summary of Well Known Interface Standards

Summary of Well Known Interface Standards Summary of Well Known Interface Standard FORWARD Deigning an interface between ytem i not a imple or traight-forward tak that mut be taken into account include data rate data format cable length mode of

More information

A Two-Stage Optimization PID Algorithm

A Two-Stage Optimization PID Algorithm PID' Brecia (Italy), March 8-3, ThB. A Two-Stage Optimization PID Algorithm Gíli Herjólfon Anna Soffía Haukdóttir Sven Þ. Sigurðon Department of Electrical and Computer Engineering,Univerity of Iceland

More information

Note: This lab is a little longer than others. Read through the steps and do what you can before coming to lab.

Note: This lab is a little longer than others. Read through the steps and do what you can before coming to lab. 112 - Lab 8 Purpoe Oberve one-way diode behavior Ue ome L in conventional and non-conventional way Ue JT tranitor a amplifier and witche Part/tool needed: oldering iron and hand tool Part available in

More information

A Proportional Fair Resource Allocation Algorithm for Hybrid Hierarchical Backhaul Networks

A Proportional Fair Resource Allocation Algorithm for Hybrid Hierarchical Backhaul Networks A Proportional Fair Reource Allocation Algorithm for Hybrid Hierarchical Backhaul Network Intitute of Communication and Information Sytem, Hohai Univerity, Nanjing, 211100, China E-mail: 498807912@qq.com

More information

BY ROD SOLAR AND LAURA LIVESEY

BY ROD SOLAR AND LAURA LIVESEY FIVE THINGS EVERY WEBSITE S HOMEPAGE MUST HAVE To convert more online viitor into patient, include thee element. BY ROD SOLAR AND LAURA LIVESEY According to the Nielen Norman Group, you have 10 crucial

More information

HIGH VOLTAGE DC-DC CONVERTER USING A SERIES STACKED TOPOLOGY

HIGH VOLTAGE DC-DC CONVERTER USING A SERIES STACKED TOPOLOGY HIGH VOLTAGE DC-DC CONVERTER USING A SERIES STACKED TOPOLOGY Author: P.D. van Rhyn, Co Author: Prof. H. du T. Mouton Power Electronic Group (PEG) Univerity of the Stellenboch Tel / Fax: 21 88-322 e-mail:

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT)

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) ISSN: 777 ISO 9: Certified Volume, Iue, April Deign of Coine Modulated Filter Bank uing Computationally Efficient Multiplierle FIR Filter Jyotna Ogale, Alok Jain Abtract Thi reearch work preent a computationally

More information

DESIGN OF SECOND ORDER SIGMA-DELTA MODULATOR FOR AUDIO APPLICATIONS

DESIGN OF SECOND ORDER SIGMA-DELTA MODULATOR FOR AUDIO APPLICATIONS DESIGN OF SECOND ORDER SIGMA-DELTA MODULATOR FOR AUDIO APPLICATIONS 1 DHANABAL R, 2 BHARATHI V, 3 NAAMATHEERTHAM R SAMHITHA, 4 G.SRI CHANDRAKIRAN, 5 SAI PRAMOD KOLLI 1 Aitant Profeor (Senior Grade), VLSI

More information

Raising Cavity Q for Microwave-Pulse Compression by Reducing Aperture Skin-Effect Losses

Raising Cavity Q for Microwave-Pulse Compression by Reducing Aperture Skin-Effect Losses Circuit and Electromagnetic Sytem Deign Note Note 6 8 June 9 Raiing Cavity Q for Microwave-Pule Compreion by Reducing Aperture Skin-Effect Loe Carl E. Baum Univerity of New Meico Department of Electrical

More information

Fixed Structure Robust Loop Shaping Controller for a Buck-Boost Converter using Genetic Algorithm

Fixed Structure Robust Loop Shaping Controller for a Buck-Boost Converter using Genetic Algorithm Proceeding of the International ulticonference of Engineer and Computer Scientit 008 Vol II IECS 008, 9- arch, 008, Hong ong Fixed Structure Robut Loop Shaping Controller for a Buck-Boot Converter uing

More information

MIMO Systems: Multiple Antenna Techniques

MIMO Systems: Multiple Antenna Techniques ADVANCED MIMO SYSTEMS MIMO Sytem: Multiple Antenna Technique Yiqing ZOU, Zhengang PAN, Kai-Kit WONG Dr, Senior Member of IEEE, Aociate Editor, IEEE TWirele, IEEE CL, and JoC (AP), Senior Lecturer, Department

More information

Fast Thermal Cycling Stress and Degradation in Multilayer Interconnects

Fast Thermal Cycling Stress and Degradation in Multilayer Interconnects Fat Thermal Cycling Stre and Degradation in Multilayer Interconnect H.V. Nguyen 1, C. Salm 1, J. Vroemen 2, J. Voet 2, B. Krabbenborg 2 J. Bichop 2, A. J. Mouthaan 1 and F. G. Kuper 1,2 1 Univerity of

More information

Two Novel Handover Algorithms with Load Balancing for Heterogeneous Network

Two Novel Handover Algorithms with Load Balancing for Heterogeneous Network Two Novel Handover Algorithm Load Balancing for Heterogeneou Network Rintaro Yoneya, Abolfazl Mehbodniya and Fumiyuki Adachi Dept. of Communication Engineering, Graduate School of Engineering, Tohoku Univerity,

More information

Power Electronics Laboratory. THE UNIVERSITY OF NEW SOUTH WALES School of Electrical Engineering & Telecommunications

Power Electronics Laboratory. THE UNIVERSITY OF NEW SOUTH WALES School of Electrical Engineering & Telecommunications .0 Objective THE UNIVERSITY OF NEW SOUTH WALES School of Electrical Engineering & Telecommunication ELEC464 Experiment : C-C Step-own (Buck) Converter Thi experiment introduce you to a C-C tep-down (buck)

More information

Design Calculation and Performance Testing of Heating Coil in Induction Surface Hardening Machine

Design Calculation and Performance Testing of Heating Coil in Induction Surface Hardening Machine Vol:, No:6, 008 Deign Calculation and Performance Teting of Heating Coil in Induction Surface Hardening Machine Soe Sandar Aung, Han Phyo Wai, and Nyein Nyein Soe International Science Index, Energy and

More information

Accelerating Bluetooth Inquiry for Personal Area Networks

Accelerating Bluetooth Inquiry for Personal Area Networks Accelerating Bluetooth Inquiry for Peronal Area Networ Gergely V. Záruba 1, and Imrich Chlamtac 2 1 Center for Reearch in Wirele Mobility and Networing (CReWMaN) Department of Computer Science and Engineering,

More information

To appear in 30th ACM/IEEE Design Automation Conference 1993.

To appear in 30th ACM/IEEE Design Automation Conference 1993. Reolving Signal Correlation for Etimating Maximum Current in CMOS Combinational Circuit Harih Kriplani y,farid Najm y, Ping Y ang yy and Ibrahim Hajj y y Univerity of Illinoi at Urbana-Champaign yy Texa

More information

Robust Control of an Active Suspension System Using H 2 & H Control Methods. Fatemeh Jamshidi 1, Afshin Shaabany 1

Robust Control of an Active Suspension System Using H 2 & H Control Methods. Fatemeh Jamshidi 1, Afshin Shaabany 1 Journal of American Science, 11;(5) Robut Control of an Active Supenion Sytem Uing H & H Control Method Fatemeh Jamhidi 1, Afhin Shaabany 1 1 Ilamic Azad Univerity, Far Science and Reearch Branch, Shiraz,

More information

Cuing mechanisms in auditory signal detection

Cuing mechanisms in auditory signal detection Cuing mechanim in auditory ignal detection RONALD HÜBNER and ERVIN R. HAFTER Univerity of California, Berkeley, California Detection of auditory ignal under frequency uncertainty can be improved by preenting

More information

Design Calculation and Performance Testing of Heating Coil in Induction Surface Hardening Machine

Design Calculation and Performance Testing of Heating Coil in Induction Surface Hardening Machine Deign Calculation and Performance Teting of Heating Coil in Induction Surface Hardening Machine Soe Sandar Aung, Han Phyo Wai, and Nyein Nyein Soe Abtract The induction hardening machine are utilized in

More information

Improvement in Image Reconstruction of Biological Object by EXACT SIRT cell Scanning Technique from Two Opposite sides of the Target

Improvement in Image Reconstruction of Biological Object by EXACT SIRT cell Scanning Technique from Two Opposite sides of the Target Vol. 3, Iue. 3, ay.-june. 2013 pp-1597-1601 ISSN: 2249-6645 Improvement in Image Recontruction of Biological Object by EXACT SIRT cell Scanning Technique from Two Oppoite ide of the Target Kabita Purkait

More information

Review of D-STATCOM for Stability Analysis

Review of D-STATCOM for Stability Analysis IOSR Journal of Electrical and Electronic Engineering (IOSRJEEE) ISSN : 78-676 Volume, Iue (May-June 0), PP 0-09 Review of D-STATCOM for Stability Analyi Pradeep Kumar, Niranjan Kumar & A.K.Akella 3 3

More information

Adaptive Path Planning for Effective Information Collection

Adaptive Path Planning for Effective Information Collection Adaptive Path Planning for Effective Information Collection Ayan Dutta, Prithviraj Dagupta Abtract We conider the problem of information collection from an environment by a multi-robot ytem, where the

More information

Design of Centralized PID Controllers for TITO Processes*

Design of Centralized PID Controllers for TITO Processes* 6th International Sympoium on Advanced Control of Indutrial Procee (AdCONIP) May 8-3, 07. Taipei, Taiwan Deign of Centralized PID Controller for TITO Procee* Byeong Eon Park, Su Whan Sung, In-Beum Lee

More information

SCK LAB MANUAL SAMPLE

SCK LAB MANUAL SAMPLE SCK LAB MANUAL SAMPLE VERSION 1.2 THIS SAMPLE INCLUDES: TABLE OF CONTENTS TWO SELECTED LABS FULL VERSION IS PROVIDED FREE WITH KITS Phone: +92 51 8356095, Fax: +92 51 8311056 Email: info@renzym.com, URL:www.renzym.com

More information