5048 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12, NO. 10, OCTOBER 2013

Size: px
Start display at page:

Download "5048 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 12, NO. 10, OCTOBER 2013"

Transcription

1 548 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO., OCTOBER Wirele Acce Networ Selection Game with Negative Networ Externality Yu-Han Yang, Student Member, IEEE, Yan Chen, Member, IEEE, Chunxiao Jiang, Member, IEEE, Chih-Yu Wang, Member, IEEE, and K. J. Ray Liu, Fellow, IEEE Abtract Networ ervice acquiition in a wirele environment require the election of a wirele acce networ. A ey problem in wirele acce networ election i to tudy the rational trategy conidering the negative networ externality, i.e, the influence of ubequent uer deciion on an individual throughput due to the limited available reource. In thi wor, we formulate the wirele networ election problem a a tochatic game with negative networ externality and how that finding the optimal deciion rule can be modelled a a multi-dimenional Marov Deciion Proce (MDP. A modified value iteration algorithm i propoed to efficiently obtain the optimal deciion rule with a imple threhold tructure, which enable u to reduce the torage pace of the trategy profile. We further invetigate the mechanim deign problem with incentive compatibility contraint, which enforce the networ to reveal the truthful tate information. The formulated problem i a mixed integer programming problem which in general lac an efficient olution. Exploiting the optimality of ubtructure, we propoe a dynamic programming algorithm that can optimally olve the problem in the two-networ cenario. For the multinetwor cenario, the propoed algorithm can outperform the heuritic greedy approach in a polynomial-time complexity. Finally, imulation reult are hown to validate the analyi and demontrate the effectivene of the propoed algorithm. Index Term Game theory, tochatic game, negative networ externality, Marov deciion proce, networ election, mechanim deign, dynamic programming. I. INTRODUCTION NOWADAYS, wirele networ ervice uch a Femtocell [] and Wi-Fi acce point are widely deployed to provide Internet acce in area uch a home, office, airport, hotel, etc. While there may be multiple available wirele networ, a uer can only chooe one to join. Figure how an example of the Wi-Fi networ election from a mart phone. Since the networ can be owned by different operator, the networ election problem, which ued to be reolved in a centralized manner by admiion control [], Manucript received December, ; revied April 9 and June, ; accepted July,. The aociate editor coordinating the review of thi paper and approving it for publication wa P. Wang. Y.-H. Yang, Y. Chen, and K.J.R. Liu are with the Department of Electrical and Computer Engineering, Univerity of Maryland, College Par, MD, 74, USA ( {yhyang, yan, jrliu}@umd.edu. C. Jiang i with the Department of Electrical and Computer Engineering, Univerity of Maryland, College Par, MD 74, USA, and alo with the Department of Electronic Engineering, Tinghua Univerity, Beijing 84, P. R. China ( chx.jiang@gmail.com. C.-Y. Wang i with the Department of Electrical and Computer Engineering, Univerity of Maryland, College Par, MD 74, USA, and alo with GICE, National Taiwan Univerity, Taipei, 6, Taiwan (R.O.C. ( tomywang@gmail.com. Digital Object Identifier.9/TWC..95. Fig /$. c IEEE Wi-Fi networ election. [], hould be invetigated in a ditributed perpective by conidering uer own interet. In the wirele acce networ election problem, a myopic trategy can uually be adopted by chooing the one with the tronget ignal. A conequence of thi trategy i the congetion of uer to communicate with certain networ controller uch a acce point (AP, witche, or router. The concentration of uer create an unbalanced load in the networ, which lead to an inefficient reource utilization for ervice provider and a poor qualityof-ervice (QoS for uer. Efficient reource utilization i an important iue in modern wirele acce networ due to limited available reource uch a ignal power, temporal and patial bandwidth. On one hand, the ervice provider attempt to maximize reource utilization uch that the available reource can accommodate a many uer a poible. On the other hand, due to the individual rationality and the elfih nature, a uer aim to optimize hi/her own utility. Therefore, a uer optimal trategy in uch a reource-haring cenario inevitably ha to tae into conideration the negative networ externality [4], [5], i.e., the influence of other uer trategie on the uer own utility. Commonly referred in economic and buine, the negative networ externality i the effect that occur when more uer mae the available reource le valuable. For example, the traffic congetion overload the highway. Overwhelming cutomer degrade the quality-of-ervice in a retaurant. The negative networ externality in thee example impair the utilitie of the uer maing the ame deciion. In thi paper, we firtly focu on how a uer hould chooe

2 YANG et al.: WIRELESS ACCESS NETWORK SELECTION GAME WITH NEGATIVE NETWORK EXTERNALITY 549 one of the available wirele acce networ conidering the negative networ externality. Wirele acce networ election i an eential problem of reource utilization and ha received great attention recently [6] [7]. In [], centralized approache are invetigated to provide congetion relief by explicit channel witching and networ-directed roaming. A ditributed acce point election algorithm baed on no regret learning i propoed in [4]. The author how that the algorithm can guarantee convergence to an equilibrium. The arrival and departure of the uer in networ election problem are alo conidered in [6] and [7]. Another cla of networ election approache i baed on game theory. Game theory ha been recognized a an ideal tool to tudy the interaction among uer [8], [9]. It ha been widely ued in wirele communication and networing for many different problem [9] [] including power control [], cooperation timulation [], and ecurity enforcement [4]. In [7], Mittal et al. conider uer changing location a trategie to obtain more reource and analyze the correponding Nah equilibria (NE. In [], the networ election i modelled a a congetion game, where player mae deciion imultaneouly to optimize the interference and throughput. Alo, the congetion in the networ election game i imilar to that in the channel election game, e.g., [5] [7]. In [5], an atomic congetion game in which reource are allowed to be reued among noninterfering uer i conidered. In [6] and [7], the author invetigated game theoretic olution to the ditributed channel election problem in opportunitic pectrum acce ytem. A comprehenive review and comparion of exiting deciiontheoretic olution including Marov deciion proce, game theory and tochatic control can be found in [8]. However, mot of the exiting wor tudy the networ election problem under the cenario where uer mae deciion imultaneouly. In thi paper, we conider the problem under a different cenario where uer mae deciion equentially and their optimal deciion involve the prediction of ubequent uer deciion due to the negative networ externality. Sequential deciion conidering the negative networ externality effect are tudied in the Chinee retaurant game [9] [], in which the equilibrium of grouping under the cenario of a fixed total number of player i characterized. In thi wor, we formulate the wirele acce networ election problem a a tochatic game with negative networ externality, where uer arrive at and depart from networ in a probabilitic manner. The problem of finding the optimal deciion rule i hown to be a multi-dimenional Marov Deciion Proce (MDP. Different from the conventional MDP [], the multidimenional MDP ha multiple potential function and thu the dynamic programming (DP [] cannot be directly applied. We propoe a modified value iteration algorithm to find the equilibrium for the multi-dimenional MDP. The analyi of the propoed algorithm how that the trategy profile generated by the algorithm ha a threhold tructure, which enable u to ave the torage pace of the trategy profile from O(N to O(N log N, wheren i the number of ytem tate in the two-networ cenario. Simulation reult verify the analyi and demontrate the efficiency and effectivene of the propoed algorithm, i.e., while achieving the optimal trategy for the individual, the propoed algorithm attain imilar performance of ocial welfare compared to the centralized method that maximize the ocial welfare. The econd focu of thi paper i the truthful mechanim deign [4] [8] for the networ election game. Mechanim deign i to devie pricing and allocation rule atifying the incentive compatibility [5], [6]. In the networ election game, uer mae deciion relying on the ytem tate which conit of the information provided by the networ, poibly owned by different operator with different interet. Therefore, the reported tate may be untruthful if it i profitable to mae a deceitful claim. In thi wor, we invetigate the mechanim deign problem with incentive compatibility contraint, which enforce the networ to report truthfully, while optimizing the utility of uer. The formulated problem i a mixed integer programming problem which in general lac an efficient olution. Exploiting the optimality of ubtructure, we propoe a dynamic programming algorithm that can efficiently and optimally olve the problem in the two-networ cenario. For the multi-networ cenario, the propoed algorithm can outperform the heuritic greedy approach in a polynomial-time complexity. Finally, imulation reult are hown to validate the analyi and demontrate the effectivene of the propoed algorithm. The novelty and technical contribution of thi wor are ummarized a follow. We formulate the ditributed wirele acce networ election problem a a multi-dimenional MDP, which, to the bet of our nowledge, i new and ha not been tudied before. We propoe a modified value iteration algorithm to earch for an equilibrium. We alo analyze the propoed algorithm and how that the reulting trategy profile ha a threhold tructure. We further propoe an efficient dynamic programming algorithm to deign a truthful mechanim which enforce the networ to truthfully reveal the tate information. The ret of the paper i organized a follow. The ytem model and the formulation of the wirele acce networ election game i decribed in Section II. In Section III, we propoe a modified value iteration algorithm for the multidimenional MDP. The threhold tructure of the trategy profile generated by the propoed algorithm i analyzed in Section IV. In Section V, we decribe the mechanim deign problem for the networ election game and propoe the dynamic programming algorithm. In Section VI, the performance of the propoed algorithm i evaluated uing numerical imulation. Finally, Section VIII conclude the paper. II. SYSTEM MODEL AND PROBLEM FORMULATION In thi ection, we decribe in detail the ytem model and the problem formulation of the wirele acce networ election problem. To better illutrate the idea, we firt introduce ome neceary notation including the probabilitic model and then characterize the (approximate equilibrium. Note that a will be een, the model i quite general and hence it application i not retricted to the networ election problem but can alo be deployed in other problem with negative networ externality.

3 55 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO., OCTOBER A. Sytem Model The ytem under conideration comprie K wirele acce networ and each networ ha a capacity of N uer, i.e., a networ can imultaneouly erve at mot N uer. For the ae of notational conciene, we conider that all the networ have the ame capacity. The analyi can be eaily extended to the ytem with networ of different capacity. We alo aume that the networ have no buffer room for uer, which mean when a networ i full, uer cannot mae requet of connection to the networ. Each uer in networ obtain a utility R ( per unit time, where i the current number of uer in networ. The utility function i defined a the individual throughput, i.e., R ( = P log( + S/N ( P I/N +,, which repreent the achievable data rate under inter-uer interference, where P S /N denote the ignal-to-noie power ratio, and P I /N i the interferenceto-noie power ratio. The utility repreent the quality-ofervice (QoS guaranteed by the networ but retricted to the available reource uch a the total tranmiion power and the bandwidth of radio frequency. The negative networ externality i manifeted in the decreae of the data rate a the number of uer in the networ increae due to a higher inter-uer interference. Note that the utilitie of uer in the ame networ are aumed the ame at each time lot ince the networ can provide the ame QoS to each uer by mean of reource allocation, even though the intantaneou channel condition of different uer may be different. For example, centralized downlin power control algorithm [9], [4] can be applied by the networ to attain a common ignal to interference-plu-noie ratio (SINR or to maximize the minimum SINR among the uer. The uer with Poion ditributed arrival rate λ (uer per econd have choice of connecting to one of the K networ. After a uer mae hi deciion, he/he cannot witch to any of other networ and ha to tay during a period of time with exponential ditribution of parameter μ, which i aumed the ame for all networ for implicity. The uer with arrival rate λ can only chooe networ, for =,...,K. Thee uer can be enviioned a either the uer with certain determinitic behavior, or the uer who can only have acce to one pecific networ due to the geographical ditribution. Note that incorporating thi type of uer only mae the ytem model more general ince we can imply et thee rate a zeroiftherearenouchuer. The ytem tate = (,..., K tae it value from the tate pace S = {(,..., K =,,..., N, =,...,K}, and repreent the tate that uer are in networ, for =,...,K. We conider a dicrete time Marov ytem where a time lot ha duration T (econd. Then the arrival and departure probabilitie λ = λ Te λ T and μ = μt e μt can be approximated a λ λ T, =,...,K and μ μt when T i ufficiently mall [4] [4]. Let F( = { = N, =,...,K} be the index et of the full networ which are erving the maximum number of More general type of uer, uch a uer who can only connect to one of a ubet of K networ, can be conidered. Here for implicity we only conider two type of uer, i.e., uer who have choice of connecting to any one of K networ, and uer who can only chooe one pecific networ. uer and thu cannot accept any more. The complement et of F( i denoted by F( = { <N,=,...,K}, i.e., the index et of the non-full networ. The trategy pace of networ election i retricted in F( when i a boundary tate, i.e., when σ F(. We aume that the connection requet from uer arriving at the full networ will be rejected and the traffic then goe to other non-full networ. To model uch a traffic tranition, we therefore aume that the traffic immediately flow to the non-full networ. For the two-networ cae, at mot only one non-full networ ha room for thoe uer, o the traffic goe to that nonfull networ. For the multi-networ cae, multiple non-full networ can accommodate thoe uer. In order to provide a well-defined Marov ytem and to implify the notation, we aume that the traffic goe to a pecific networ, i.e., min F(, the networ with the minimum index. Notice that if F( =φ, i.e., all networ are full, no connection requet can be accepted. The networ election trategy when the uer oberve tate i denoted a σ, which tae value in F(. Wedefineσ = j if networ j i choen. The indicator function I (σ i then defined a: if σ = j, I j (σ =; otherwie I j (σ =. We have the tate tranition probability of an arrival event a P y ( + e j { i F( = λ i + λ j + I j (σ λ, if j =min F(, λ j + I j (σ λ, if j F(\ { min F( } (, where and + e j denote the ytem tate at the current time lot and the next time lot, and e j i a tandard bai vector whoe j-th coordinate i and other coordinate are. At ytem tate, ince the number of uer in networ j i j, the tranition probability of a departure event i given by P y ( e j = j μ, j =,...,K. ( Furthermore, the probability that the ytem tate remain the ame i { K j= P y ( = λ j K j= jμ, if F( φ, K j= jμ, if F( =φ. ( The duration of a time lot T hould be choen uch that K j= λ j + KNμ, i.e., T /( K λ j= j + KN μ. For intance, when K =, N, and N, the tranition probability i given by P y { =(, } I (σ λ + λ, if =( +,, I (σ λ + λ, if =(, +, μ, if =(,, = μ, if =(,, λ λ λ μ μ, if =(,,, otherwie. (4 Similarly the correponding tranition probability for = N, N or N, = N can alo be defined. Figure depict the tate tranition diagram

4 YANG et al.: WIRELESS ACCESS NETWORK SELECTION GAME WITH NEGATIVE NETWORK EXTERNALITY 55 I, I, ( ( I, ( (, I(, (, (, I, I(, (, (, ( (, (, I (, I ( I, ( I, ( I(, I(, I,, I, ( I, I, ( ( Fig.. State diagram of the -D Marov chain. (, (, ( I(, I, ( where ( P = i F( λi + λj + Ij(σλ, if j =min F(, λ j + I j(σ λ, if j F(\ { min F( }, iμ, if = e i, i, ( μ, if = e, K j= λj K j= jμ + μ, if =,, otherwie. which i the tranition probability given that the uer till tay in networ. The probability of tranition from to e i ( μ ince uer may leave the networ. The tranition probability from to other tate i imilar to the definition of P y in (4. (7 when K =. The dynamic of the two-networ ytem can be decribed by a two-dimenional (-D Marov chain where the probability P y ( i not hown in Figure for conciene. B. Expected utility The trategy profile σ = {σ S} i a mapping from the aggregate tate pace to the action pace, i.e., σ : {,,..., N} K {,,...,K}. Given a trategy profile σ, we can obtain the ytem tranition probability in ( - (. When a rational uer arrive and oberve ytem tate, he/he mae the deciion σ = ˆ which lead the uer into the ytem tate = + eˆ. Then, the expected utility of the rational uer i given by [ ] Vˆ( =E ( μ t Rˆ( t, (5 t= where t denote the ytem tate at time t. Sinceμ i the probability that the ervice i terminated in one time lot, then ( μ can be interpreted a the probability that the uer tay in the networ in one time lot. The value ( μ can alo be regarded a the dicounting factor for the future utility a hown later in (6. The trategy σ = ˆ determine which networ the uer will enter and thu which expected utility function the uer will obtain. Denoted by Vˆ(, the expected utility function i the expected value of the dicounted um of the immediate utilitie Rˆ( t accumulated from the next time lot. Notice that = + eˆ i uniquely determined by the uer trategy σ, but the ubequent tate t,for t, are tochatic and dependent on the arrival of other uer, including uer from uer-arrival tream, K, and other rational uer. From the Bellman equation [], the expected utility in (5 can be hown to atify the following recurive expreion. V ( =R ( +( μ P ( V (, (6 C. Bet Repone of Rational Uer Due to the elfih nature, when oberving the tate, a rational uer will chooe the trategy σ to maximize hi expected utility. Thu, the rational trategy σ ha to atify σ =argmaxv ( + e. (8 It can be een that with the trategy profile in which the trategy of every tate atifie (8, no uer can obtain a higher expected utility by unilateral deviation to any other trategy. Therefore, the trategy profile atifying (6-(8 i a Nah equilibrium of the tochatic game. III. MODIFIED VALUE ITERATION ALGORITHM The problem of finding the trategy profile atifying (6-(8 i not a conventional Marov Deciion Proce problem. In a conventional MDP problem [], a ingle potential function i aociated with each ytem tate, and the optimal trategy can be obtained directly by optimizing the potential function. Such a problem can often be olved via the theory of dynamic programming (DP []. However, in our model, multiple potential function are related in a vector form: T V ( R ( p v V (. = R ( p v +( μ , V K ( R K ( K p K v K (9 where denote an all-zero vector, p and v are vector compriing P ( and V ( a element, =,...,K. The tranpoe operator i denoted by ( T. The trategy σ i determined by comparing V ( + e for all a in (8. Thu, DP cannot be directly applied in uch a problem. It i important to point out that a uer mae a deciion after he arrive and oberve the ytem tate. The trategy lead the uer into ome networ and reult in an expected utility V ( + e. In ubequent time lot, the uer cannot change from the networ he/he i taying to any other networ. The expected utility i affected by other trategie through the tranition probabilitie a given in (6. We can ee that given the expected utilitie {V } K =,the rational trategy profile σ hould atify (8. On the other hand, given a trategy profile σ, the expected utilitie {V } K =

5 55 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO., OCTOBER can be found by (6, where the tranition probability P ( i a function of the trategy σ. To obtain the optimal trategy profile σ atifying (6-(8, we propoe a modified value iteration algorithm to iteratively olve the problem. At the n-th iteration, the rational trategy profile i given by σ (n+ =argmaxv (n ( + e, S. ( The expected utility function can be obtained by olving V (n+ ( =R ( +( μ S P (n+ ( V (n+ (, S, {,...,K}, ( where the tranition probability P (n+ ( i updated uing the correponding updated trategie, i.e., P (n+ ( = i F( λi + λj + Ij(σ(n+ λ, if = + e j,j =min F( λ j + I j(σ (n+ λ, if = + e j,j F(\ { min F( } jμ, if = e j,j ( μ, if = e j F P ( + e j K j= P ( e j, =,, otherwie, ( The olution to ( can be obtained through everal approache, one of which i the value iteration algorithm []. The algorithm firt initialize V (n+ ( a an arbitrary value uch a zero and iteratively update it uing (. The iteration function i a contraction mapping o the convergence to a unique fixed point i guaranteed. Another approach i to conider ( a K et of linear ytem, where each et ha N unnown variable correponding to {V (n+ (, } and N equation. Such linear ytem can be olved by linear programming or matrix inverion. In the next ection, we will theoretically how that for K =, the propoed algorithm reult in a threhold tructure of the trategy profile at each iteration, and uch a threhold tructure i alo oberved for general K >. However, the trategy profile may not converge but ocillate near the threhold due to the hard deciion rule in (8. The nonconvergence occur when the rational trategy of the tate near the threhold ocillate between different choice each time when the expected utility i updated. When uch a ituation happen, the expected utilitie correponding to different trategie are very cloe to each other. Hence, to olve thi problem, we relax the hard deciion rule by allowing a mall region of tolerance for witching among the trategie [44], which lead to the oft deciion rule a follow. σ (n+ = σ (n, if V (n σ (n arg max V (n ( + e, if V (n ( + e (n σ σ (n ( + e (n σ max V (n ( + e ɛ, < max V (n ( + e ɛ, ( where ɛ > i a mall contant. Table I ummarize the propoed modified value iteration algorithm for the multidimenional MDP. Notice that the algorithm top when an TABLE I MODIFIED VALUE ITERATION ALGORITHM (i Initialize: V ( ( =, {,...,K}, S. T = φ. (ii Loop :. Update {σ (n+ } by (. If {σ (n+ } = {σ (n }, then top loop. } T, then chooe a {σ } T,andlet{σ (n+ ele if {σ (n+ end if T = T {σ (n+ }. } = {σ }.. Update {P (n+ ( } by (.. Solve {V (n+ (} in ( by value iteration or linear programming. Until T = φ or {σ (n+ } = {σ (n }. equilibrium i found or all the trategy profile are earched. By definition, when the algorithm obtain a olution, the reulting trategy profile i an ɛ-approximate NE [8], in which the trategy at each tate ha an expected utility that i at mot ɛ le than that of any other trategy. Note that there may be multiple ɛ-approximate NE epecially for a larger ɛ when a larger region of tolerance i allowed for witching among the trategie. IV. THRESHOLD STRUCTURE OF STRATEGY PROFILE In thi ection, we how that the trategy profile produced by the propoed modified value iteration algorithm in each iteration exhibit a threhold tructure for two-networ ytem. With the aumption that R (, =,, are non-increaing, the following lemma how that V ( i non-decreaing and V ( i non-increaing along the line of + = m, m {,,..., N}. Lemma : For n, V (n ( V (n ( + e e, (4 V (n ( V (n ( + e e. (5 Proof: We ue induction to how that (4 and (5 hold for all n. i Since V ( ( and V ( ( are initialized a zero, (4 and (5 hold for n =. ii We aume the induction hypothei hold for ome n. Then it can be hown that (4 and (5 alo hold for (n+ by analyzing the following difference. Let = + e e. For N and N, V (n+ ( V (n+ ( =R ( R ( + ( +( μ [λ V (n ( + e V (n ( + e ( + λ I (σ V (n ( + e I (σ V (n ( + e ( + λ V (n ( + e V (n ( + e ( + λ I (σ V (n ( + e I (σ V (n ( + e +( μv (n ( e μv (n ( e + μv (n ( e ( μv (n ( e +( λ λ λ μ μ ( V (n ( V (n ( ]. (6

6 YANG et al.: WIRELESS ACCESS NETWORK SELECTION GAME WITH NEGATIVE NETWORK EXTERNALITY 55 Due to the fact that the utility function R ( i nonincreaing in and the induction hypothei which guarantee the non-negativene of many difference of term in (6, by rearranging a few term, it uffice to dicu the following cae. Cae : σ (n = σ (n (n =. Then, V ( + e V (n ( + e by the induction hypothei. Cae : σ (n = σ (n (n =. Then, V ( + e V (n ( + e by the induction hypothei. Cae : σ (n =and σ (n (n =. Then, V ( + e V (n ( + e =. Cae 4: σ (n =and σ (n (n =. Then, V ( + e V (n ( + e by the induction hypothei. Therefore, we have V (n+ ( V (n+ (, for N and N. Next, it can be eaily checed that the inequality till hold for the cae of = N, N a well a the cae of N, = N. Similarly, V (n ( V (n ( can alo be etablihed. The following lemma how the difference of V ( + e and V (+e i non-increaing along the line of + = m, m {,,..., N}. Lemma : V (n ( + e V (n ( + e V (n ( + e V (n ( + e,where = + e e. Proof: It can be eaily hown uing Lemma. Theorem : The trategy profile generated by the modified value iteration algorithm ha a threhold tructure for K =. Proof: The oft deciion rule in ( for K =can be rewritten a σ σ (n+ (n, if V (n ( + e V (n ( + e ɛ, =, if V (n ( + e >V (n ( + e +ɛ, (7, if V (n ( + e >V (n ( + e +ɛ. If σ (n =and σ (n+ =, i.e., the trategy of the current iteration i updated to be different from the one of the previou iteration, then we mut have V (n ( + e >V (n ( + e + ɛ. Lemma implie that V ( + e V ( + e i nonincreaing along the line of + = +. Thu, for = e + e, =,,...,min{,n },wehave V ( + e V ( + e V ( + e V ( + e >ɛ>. Therefore, σ (n+ = for = e + e, =,,..., min{,n }. Similarly, if σ (n =and σ (n+ =, then σ (n+ =, for = + e e, =,,..., min{n, }. With the above dicuion, the trategie along the line of + = m, m {,,..., N} retain a threhold tructure in each iteration. Since the initialization of the trategy profile exhibit a threhold tructure trivially, the trategy profile obtained in each iteration of the algorithm ha a threhold tructure. In a two-networ ytem, the number of ytem tate i N and thu N trategie are needed to be tored without the threhold tructure. The torage pace of each trategy i bit. Now with uch threhold tructure on each line + = m, m =,,..., N, we can imply tore the threhold point on each line. Each threhold point require the torage pace of log N bit. Therefore, The torage of the trategy profile can be reduced from O(N to O(N log N. In thi paper, we only provide the analyi for the twonetwor ytem. The analyi for ytem with more than two networ i difficult due to the lac of the optimality in a ingle potential function a in the admiion control problem [45], [46]. However, it i oberved from the imulation reult in Section VI that the multi-networ ytem alo poe the trategy profile with threhold tructure. The theoretic analyi of the threhold tructure for the multi-networ ytem i important but out of the cope of thi paper, and will erve a one of our future wor. V. TRUTHFUL MECHANISM DESIGN In the above dicuion, we have implicitly aumed the networ truthfully report their tate, and therefore the uer can oberve the true ytem tate, by which he/he can mae a deciion to maximize hi/her utility. However, without appropriate incentive, the networ may not truthfully report their tate. Intead, a networ may untruthfully report ome tate different from the true tate if profitable. In thi ection, we conider to enforce truth-telling a a dominant trategy for the networ by incorporating pricing rule into the wirele acce networ election game. A mechanim conit of pricing rule {P (} and allocation rule {a (}, wherep ( i denoted a the unit price of the expected rate V ( provided by networ at tate, and a ( i denoted a the allocation probability, which i either or, i.e., whether or not the uer enter networ. The utility of networ i given by U ( =V ( + e P ( c ( + e a (, (8 where c ( + e i the cot per uer. With the tate reported from the networ, thee rule determine the uer allocation and the price the uer ha to pay, both a function of the report from networ. For example, if networ report hi tate a and other report = { j : j }, hi utility become V (+e P (, c (+e a (,. Notice that V ( + e and c ( + e are function of true tate that do not depend on the report. Thu, the truthtelling or the incentive compatibility (IC contraint are,,,, V ( +, P (, c ( +, a (, V ( +, P (, c ( +, a (,, which mean truth-telling i a dominant trategy for each networ at each tate. The mechanim alo ha to atify the individual rationality (IR contraint, i.e.,,, V ( +, P (, c ( +, a (,, (9 which guarantee all networ would attend the mechanim. In the previou ection, we tudy the networ election game with the focu of the interdependence between the uer. In thi ection, we tudy the interplay among the networ. To thi end, we aume that uer trategie are choen baed on the ex ante optimality [8], [5], i.e., the allocation rule i baed on optimizing the expected objective over the tate probability. The truthful mechanim deign i to contruct a et of pricing and allocation rule which optimize a pecific objective while atifying IC and IR contraint. For

7 554 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO., OCTOBER example, the mechanim deign problem P p for minimizing the expected payment can be formulated a follow. P p : min K π( P (V ( + e ( {P },{a } S =.t. (IC, (IR, a ( {, },,. ( K a ( =, S, ( = Other mechanim deign objective uch a the utility maximization P u can be formulated by ubtituting ( with uer expected utility function a follow. K max π( [λa (V ( + e P (V ( + e ] {P },{a } S =.t. (, (. The unit cot c ( + e /V ( + e i denoted a w (. The (IC contraint become P (, w (, a (, P (, w (, a (,,,,. ( In the following, we need a monotonicity aumption for the unit cot, i.e., w (, i non-decreaing in, i.e., w (, w (,, if.sincev (, i non-increaing in, the aumption hold when c (, i non-decreaing in. For example, if the per-uer cot i a contant in each networ, i.e., c (, =C,then the aumption hold. The monotonicity of w (, lead to the threhold tructure of a (, a in the following lemma. Lemma : Under IC contraint, there exit a threhold value of on the allocation rule a (,, i.e., given, there exit ( {,,,...,N}, uch that {, a (, = (, > ( (4. Proof: From (, we have P (, P (, w (, [a (, a (, ]. (5 Interchanging and,wealohave P (, P (, w (, [a (, a (, ]. (6 Combining the above two inequality lead to [ w (, w (, ][ a (, a (, ]. (7 Thu, ince w (, i non-decreaing in, the allocation rule a (, ha to be non-increaing in. With thi monotonicity and the fact that a (, can only have value of or, we can conclude that there exit a threhold of a (, in a decribed in (4. Corollary : If K =,then ( i non-decreaing in, and ( i non-decreaing in. Proof: Suppoe uch that ( +< (. By Lemma, we have a (, + =,for > ( +, which implie a (, +=,for > ( +, due to the contraint that a ( +a ( =,. Therefore, a ( (, +=, which implie a ( (, =by Lemma, but we alo have a ( (, =, which lead to a contradiction. The following lemma how that only adjacent IC contraint are neceary. Lemma 4: Non-adjacent IC contraint are redundant. Proof: Let u conider the two adjacent IC contraint a follow. P (, w (, a (, P (, w (, a (,, (8 P (, w (, a (, P (, w (,.a (, (9 Adding (8 and (9, we have P (, w (, a (, P (, w (, a (, w (, [a (, a (, ] + w (, [a (, a (, ] P (, w (, a (,. ( The lat inequality i due to that w (, i increaing in and a (, i decreaing in. It how that the non-adjacent IC contraint can be inferred from the adjacent one. Uing the adjacent IC contraint, we can obtain the bound for the payment, i.e., given an allocation rule {a (}, the incentive compatible payment rule {P (} atifie P (, +w (, [a (, a (, ] P (, P (, + w (, [a (, a (, ] ( In the optimization problem P p, we aim to minimize a linear combination of P (, with nonnegative coefficient. Clearly, the lower bound in ( hould be binding; otherwie, the objective function can alway be better optimized by decreaing the non-binding P (,. Hence, the payment rule can be expreed a P (, =P (N, N + w (r, [a (r, a (r, ]. ( r= + To minimize P (, while atifying the IR contraint in (9, P (N, hould be et a. Subtituting Lemma into (, we can conclude { w ( P (, =,,,, >, ( where denote ( for notational implicity. From the IC and IR contraint, the pricing rule {P } can be determined given the allocation rule {a }, which i pecified by the threhold { }. Thu ( imply mean the pricing rule {P } i alo pecified by the threhold { }.Uing{ } a optimization variable, the problem P p can be implified a K min π( P (V ( { } (4 S =.t. (, (4, (.

8 YANG et al.: WIRELESS ACCESS NETWORK SELECTION GAME WITH NEGATIVE NETWORK EXTERNALITY 555 With the implification, however, the optimization problem i till difficult to be olved optimally ince the optimization variable { } i dicrete and the exhautive earch require exponential-time complexity in N. Motivated by the optimal ubtructure in the two-networ cae, a dynamic programming algorithm i propoed for the above problem. The optimal olution to the primary problem can be broen down into olving the optimal olution to it ubproblem. The dynamic programming technique eentially perform recurive divide-and-conquer to tacle each of thee ubproblem. However, for the multi-networ cae, the propoed dynamic programming approach i uboptimal but the performance i atifactory compared to the greedy method. Other traditional optimization algorithm uch a branch-andbound can be applied to optimally olve the mixed integer programming problem, but the computational complexity i prohibitively high (exponential in the number of tate ince uch an algorithm baically perform exhautive tree earch with certain pruning trategie. In general a mixed integer program doe not have an efficient olution. In thi paper, we aim to propoe an algorithm that i able to achieve atifactory performance with reaonable complexity (polynomial in the number of tate. A. Propoed Algorithm Since the number of tate i N K, the exhautive earch over all poible allocation rule require complexity of O(K N K. Such an exponential complexity i formidably high even for a moderate N. In thi ubection, we propoe a polynomial time algorithm baed on dynamic programming to earch for the threhold { DP }.Letf ({ i : i I} { j : j J} denote the optimal value of a et of ytem tate pecified by ({ i : i I} { j : j J}, wheretheetj conit of coordinate with coordinate j beingfixeda j.the et I conit of the coordinate with range, where coordinate i range from to i.theeti ha coordinate, i.e., the conidered et of ytem tate i -dimenional. The optimal value function f DP can be computed uing lower-dimenional optimal value function. The recurive calculation i decribed by the following equation. For =,...,K, { f DP ({ i : i I} { j : j J}=min i I f DP ( i, i { j : j J}+f DP ( i { j : j J {i}} where i = { l : l i, l I}. (5 a i ( i, i,j, j =, i i, (6 i =argmin i I { f DP ( i, i { j : j J} +f DP ( i { j : j J {i}} }, }, (7 where i i denote i { l : l l,l i,l I}. The boundary condition i f DP ( i i =f DP w i( i, i ( i i w i( i, i + π( i, iv i( i +, iw i( i, i, (8 a i ( i, i,j, j =, i i, (9 where i i the minimizer in (7 when =. Notice that (8 i equivalent to f DP ( i i = i r= π(r, iv i (r + TABLE II DYNAMIC PROGRAMMING ALGORITHM FOR MECHANISM DESIGN (i Initialization: obtain {V ( (} and {π ( (} uing Table I. (ii Loop:. With initial I = {,...,K}, J = φ, evaluate f (n K (N,...,N uing (5-(9 to obtain {a(n+ (} (}. (} and {π (n+ (}. (} and {P (n+ (} converge. and {P (n+. Calculate {V (n+ Until {a (n+, i w i ( i, i, but the recurive form in (8 i more efficient in computation with the price of uing more torage pace. The propoed algorithm i to evaluate fk DP(N,...,N with I = {,...,K} and J = φ by uing (5-(9. The following propoition how the optimality of the olution obtained by the propoed algorithm when K =. The proof i omitted due to pace limitation. Propoition : For K =, the propoed algorithm optimally olve P p in O(N. For K, the olution obtained by the propoed algorithm may be ub-optimal ince monotonicity of allocation threhold in Corollary only hold when K =.However, it will be hown in Section VI that the propoed algorithm till outperform the heuritic greedy method. For a general K, the computational complexity of the propoed algorithm canbehowntobeo(n K, which i polynomial in N. Given the expected rate {V (} and the tationary probability {π(}, the propoed dynamic programming can efficiently find olution of the allocation rule {a (} and the pricing rule {P (} to the problem P p. However, {V (} and {π(} depend on {a (} ince the tate tranition probability depend on {a (}. Therefore, we propoe to iteratively update {V (}, {π(}, and{a (}. The propoed mechanim deign algorithm for the networ election game i ummarized in Table II. In the numerical imulation, we oberved that the iterative algorithm exhibit very fat convergence. The typical number of iteration to converge i between 5 to 8. The propoed algorithm can be eaily modified to olve P u by replacing the min in (5 and (7 with the max, and changing the boundary condition in (8 to be f ( i i = i r= π(r, iv (r, i (λ w( i, i. VI. NUMERICAL SIMULATION In thi ection, we ue numerical imulation to verify the analyi and evaluate the performance of the propoed modified value iteration algorithm a the rational trategy. The propoed method i compared with the following cheme. We firt define the ocial welfare given a trategy profile σ a SW σ = S πσ ( K = R (, where π σ ( i the tationary probability at ytem tate. The centralized method i to exhautively earch through all the poible trategy profile and chooe the one that achieve the larget ocial welfare, i.e., σ cent = argmax σ SW σ. Thu, the centralized method require a computational complexity of O(K S, which i exponentially increaing in the number of ytem tate and i impoible to be ued in practice. The myopic trategy i obtained by chooing the larget

9 556 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO., OCTOBER Strategy profile ( iteration iteration iteration iteration (converged Fig.. The threhold tructure of the trategy profile during iteration of the propoed algorithm. Strategy profile (σ immediate utility after maing the deciion, i.e., σ myop = arg max {,...,K} R ( +. In current cellular ytem, the cell election i done by chooing the bae-tation with the highet detected SNR. Such an approach i imilar to the myopic trategy ince it only concern about the immediate utility. Finally, the random trategy i to randomly mae the deciion with equal probability, i.e., Pr { σ rand = } = F(, F(, where denote the cardinality of a et. In the following imulation, the performance of the random trategy i obtained by averaging the performance of intance for each et of parameter. The algorithm analyi in Section IV how that there exit a threhold tructure of the trategie along each line of + = m, m {,,..., N}. We verify the analyi by numerical imulation in Figure, which illutrate the trategy profile computed by the propoed algorithm in a twonetwor ytem where P /N =5, P I /N =, T =.8 (ec, λ =.5 (uer/ec, λ =.5 (uer/ec, λ =.5 (uer/ec, μ =.5 (uer/ec, ɛ =.5 and N =8.The x-axi (y-axi denote (, i.e., the number of uer in networ (networ. The number mared at the coordinate =(, denote the computed trategy σ, which i either or in thi cenario. Thi figure how the trategy profile converge in iteration. The green (dot-dah line i drawn in between different trategie to emphaize the threhold. The threhold line of certain iteration (,, and are alo hown in the figure to illutrate the evolution of the trategy profile during the iteration of the propoed algorithm. It i oberved that at each iteration, the threhold tructure of the trategie alway exit along the diagonal line a the analyi in Section IV. In the ret of imulation, intead of pecifying the arrival rate and the time lot duration, we conider the parameter a tranition probabilitie ince the relative value of thee probabilitie directly influence the reulting performance. Figure 4 how the converged trategy profile of a three-networ ytem, where P /N =5, P I /N =, λ =., λ =., λ =., λ =., μ =., ɛ =.5 and N =5. It i oberved that the trategy profile alo ha a threhold tructure. Figure 5 validate the individual rationality of the propoed Fig. 4. ytem. The threhold tructure of the trategy profile for a three-networ Expected utility of the deciion maer 4 uer, λ =., λ =., λ =., μ =.5, R ( = log(+p S /(( P I + N.4 Centralized Propoed Probability of deviation Fig. 5. Comparion of the propoed method and the centralized method for the deciion maer expected utility veru probability of deviation. method in a two-networ ytem, where the parameter are et to be P /N =5, P I /N =, λ =., λ =., λ =., μ =.5, ɛ =.5, andn =4. The deciion maer expected utility, defined a E[V σ ( + e σ ], ievaluated veru the probability of deviation p d. For computational tractability of the centralized method, the number of uer N i et to be 4. Note that the time lot duration i choen to enure that λ + λ + λ +Nμ but the relative value of thee probabilitie are retained. The uer at tate deviate from the given trategy σ with probability p d.the deciion maer expected utility can only be impaired if he deviate from the trategy profile generated by the propoed method. However, by deviating from the centralized trategy that maximize the ocial welfare, the uer can poibly obtain higher expected utility (about 7% performance improvement in Figure 5. Clearly, the individual rationality i not atified for the centralized trategy. Figure 6(a and 6(b how the comparion of the deciion maer expected utility with different trategy profile in a two-networ ytem where P /N = 5, P I /N =,

10 YANG et al.: WIRELESS ACCESS NETWORK SELECTION GAME WITH NEGATIVE NETWORK EXTERNALITY 557 Expected utility of the deciion maer (normalized w.r.t. Myopic Eexpected utility of the deciion maer (normalized w.r.t. Myopic uer, λ =., λ =., μ =.5, R ( = log(+p S /(( P I + N.6 Myopic Centralized.5 Propoed Random λ (a The deciion maer expected utility veru λ uer, λ =., λ =., μ =.5, R ( = log(+p S /(( P I + N λ Myopic Centralized Propoed Random (b The deciion maer expected utility veru λ. Fig. 7. Social Welfare (normalized w.r.t. Myopic Social Welfare (normalized w.r.t. Myopic 4 uer, λ =., λ =., μ =.5, R ( = log(+p S /(( P I + N Myopic Centralized Propoed Random λ (a The ocial welfare veru λ. 4 uer, λ =., λ =., μ =.5, R ( = log(+p S /(( P I + N Myopic Centralized Propoed Random λ (b The ocial welfare veru λ. Comparion of different trategie for the ocial welfare. Fig. 6. utility. Comparion of different trategie for the deciion maer expected 4 uer, λ =., λ =., λ =.5, μ =.5, R ( = log( + P S /(( P I + N 4 λ =., μ =.5, ɛ =.5, andn =4. We ue the myopic trategy a the baeline by normalizing the performance of other method with that of the myopic trategy. In Figure 6(a, λ =. and λ i varied from.5 to.75. In Figure 7(b, λ =. and λ i varied from.5 to.75. It can be een that the propoed method perform the bet among all the cheme ince the deciion maer optimize hi expected utility by chooing networ to hi bet advantage. The myopic trategy alway ha performance due to the normalization. The random trategy i wore than the myopic method which exploit the information of the immediate utility. The centralized method perform the wort becaue it maximize the ocial welfare and reult in acrificing the deciion maer expected utility. In Figure 7(a and 7(b, we compare the ocial welfare performance of the trategy profile generated by different approache in a two-networ ytem where the parameter are P /N =5, P I /N =, λ =., μ =.5, ɛ =.5 and N =4. In Figure 7(a, λ =. and λ i varied from.5 to.75. In Figure 7(b, λ =. and λ i varied from.5 to.75. The performance of each method i normalized by the myopic one. It can be een that the propoed method perform imilar to that of the centralized method which maximize the ocial welfare. Figure 8 how the impact of ɛ on the number of iteration for the trategy profile to converge uing the propoed modified value iteration algorithm. It can be een Number of iteration to converge ε Fig. 8. The impact of ɛ on the number of iteration for the trategy profile to converge. that when ɛ increae, it require maller number of iteration to converge ince the region of tolerance for witching among the trategy profile i larger, and poibly more ɛ-approximate NE are available. Figure 9 and how the performance comparion for different mechanim deign when K = and K =, repectively. The exhautive earch i to earch over all poible allocation rule and find out the one with the optimal objective value. The greedy algorithm i characterized by the

11 558 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO., OCTOBER Expected payment λ = λ =., μ =., N=, K= Propoed Greedy Exhautive earch λ Fig. 9. Comparion of different mechanim deign for the expected payment veru λ when K =. Expected payment λ = λ = λ =., μ =., N=, K= Propoed Greedy Exhautive Search λ Fig.. Comparion of different mechanim deign for the expected payment veru λ when K =. following recurive formula. f G ({ i,i I} { j,j J} { =min f G ( i { j,j J {i}} }, (4 i I a i ( i, i, j, j =, i i, where i { =argmin f G ( i j,j J {i} }. (4 i I The boundary condition i f G ( i i =f G ( w i ( i, i i i w i ( i, i + π( i, i V i ( i +, i w i ( i, i, (4 a i ( i, i, j, j =, i i, where i i the minimizor in (4 when =. (4 The greedy algorithm i to evaluate fk G (N,...,N with I = {,...,K} and J = φ by uing (4-(4. With a imilar analyi, the computational complexity of the greedy algorithm can be hown to be O(N K. Compared with the propoed DP algorithm, the greedy method i a heuritic approach which mae a local optimal deciion according to lower dimenional reult. We can ee more clearly by conidering the cae K =, i.e., f G (, =min { f G (,f G ( }, (44 (a (,,a (, = (,,, if f G ( >f G (, (45 (a (,,a (, = (,,, if f G ( f G (. (46 For example, when evaluating f G(N,N, iff G( = N = N i larger than f G ( = N = N, then tate (N,N i allocated to networ. Due to Lemma, the tate {(,N, N} are all allocated to networ. Since the unallocated tate o far are {(,, N, N }, we can then evaluate f G (N,N, and o on. In Figure 9, we can ee that the propoed DP algorithm can achieve the ame performance a the exhautive earch when K =, but require only a polynomial time complexity. The greedy algorithm ha a wore performance ince it mae a local optimal deciion to determine the threhold of allocation rule. In Figure, different mechanim deign approache are compared for K =. It can be een that the propoed DP algorithm till outperform the greedy method. A dicued in Section V, for a general K the propoed DP algorithm may not achieve the global optimum. However, with much lower complexity compared to the exhautive earch, the propoed algorithm can achieve reaonably good reult and thu can erve a an approximate approach. VII. DISCUSSION Although we focu on the wirele acce networ election problem in thi paper, we hould notice that the model decribed in thi wor i very general and can be applied into many other problem. A cloely related cenario i the cell election problem in cellular networ [47] [49]. When a mobile tation deire to inform the cellular ytem whether it i on the air, it regiter to a bae tation which correpond to a cellular cell. In mot current cellular ytem, the cell election proce i imply accomplihed by a local ignal-tonoie ratio (SNR-baed trategy, which i to detect the SNR of each cell and chooe the cell with the larget SNR [48]. However, uch a imple trategy doe not tae into account the trategie of other, i.e., the negative networ externality. The QoS experienced by a mobile tation will be degraded if the limited reource are hared with a large number of uer. The utilization of ytem reource will alo be degraded ince uch a trategy reult in cellular cell with unbalanced load. It can be een that the cell election problem ha the ame tructure with the wirele acce networ election problem. Mobile tation equentially chooe one cellular cell (correponding to a bae tation to regiter baed on the obtained information about each available cell. The utility of a mobile tation i determined by the expected throughput during the period it tay in the cell. Furthermore, the intantaneou throughput of a mobile tation in a certain cell i affected by the crowdedne of the cell due to the limited bandwidth and the delay caued by the cheduling overhead. Thu, a rational mobile tation hould chooe a cellular cell in conideration of other mobile tation deciion to avoid the crowdedne. VIII. CONCLUSION In thi paper, we have tudied the wirele acce networ election problem a a tochatic game with negative networ

12 YANG et al.: WIRELESS ACCESS NETWORK SELECTION GAME WITH NEGATIVE NETWORK EXTERNALITY 559 externality, where a uer decide which networ to connect to by conidering ubequent uer deciion. The problem i hown to be a multi-dimenional MDP. We propoe a modified value iteration algorithm to obtain the optimal trategy profile for each elfih uer. The analyi of the propoed algorithm how that the reulting trategy profile exhibit a threhold tructure along each diagonal line. Such a threhold tructure can be ued to ave the torage pace of the trategy profile from O(N to O(N log N in the two-networ cenario. Simulation reult are hown to validate the analyi and demontrate that rational uer will not deviate from the trategy profile obtained by the propoed algorithm. For the expected utility of the deciion maer, the propoed method i uperior to other approache. Moreover, it ocial welfare performance i hown to be imilar to that of the centralized trategy which maximize the ocial welfare. We further invetigated truth-telling enforcing mechanim deign in the wirele acce networ election problem. The mechanim deign capture the incentive compatibility and individual rationality contraint while optimizing the utility of uer. The formulated problem a a mixed integer program in general doe not have an efficient olution. By exploiting the optimal ubtructure, a dynamic programming algorithm i propoed to optimally olve the mixed integer programming problem in the two-networ cenario. For the multi-networ cenario, the propoed algorithm can outperform the heuritic greedy approach in a polynomial-time complexity. Finally, imulation reult ubtantiate the optimality in the twonetwor cae and alo demontrate the effectivene of the propoed algorithm in the multi-networ cenario. REFERENCES [] V. Chandraehar, J. Andrew, and A. Gatherer, Femtocell networ: aurvey, IEEE Commun. Mag., vol. 46, no. 9, pp , Sept. 8. [] M. Ahmed, Call admiion control in wirele networ: a comprehenive urvey, IEEE Commun. Survey Tut., vol. 7, no., pp , 5. [] D. Gao, J. Cai, and K. N. Ngan, Admiion control in IEEE 8.e wirele LAN, IEEE Netw., vol. 9, no. 4, pp. 6, 5. [4] W. H. Sandholm, Negative externalitie and evolutionary implementation, Rev. Economic Studie, vol. 7, no., pp , July 5. [5] G. Fagiolo, Endogenou neighborhood formation in a local coordination model with negative networ externalitie, J. Economic Dynamic Control, vol. 9, no. -, pp. 97 9, 5. [6] J. Hou and D. C. O Brien, Vertical handover-deciion-maing algorithm uing fuzzy logic for the integrated radio-and-ow ytem, IEEE Tran. Wirele Commun., vol. 5, no., pp , Nov. 6. [7] K. Mittal, E. M. Belding, and S. Suri, A game-theoretic analyi of wirele acce point election by mobile uer, Comput. Commun., vol., no., pp. 49 6, 8. [8] D. Niyato and E. Hoain, Dynamic of networ election in heterogeneou wirele networ: an evolutionary game approach, IEEE Tran. Veh. Technol., vol. 58, no. 4, pp. 8 7, May 9. [9] Q. Song and A. Jamalipour, Networ election in an integrated wirele LAN and UMTS environment uing mathematical modeling and computing technique, IEEE Tran. Wirele Commun., vol., no., pp. 4 48, June 5. [] A. Argento, M. Ceana, N. Gatti, and I. Malanchini, A game theoretical tudy of acce point aociation in wirele meh networ, Comput. Commun., vol. 5, no. 5, pp ,. [] D. Charila, O. Marai, D. Niitopoulo, and M. Theologou, Pacetwitched networ election with the highet QoS in 4G networ, Comput. Netw., vol. 5, no., pp , 8. [] M. Ceana, N. Gatti, and I. Malanchini, Game theoretic analyi of wirele acce networ election: model, inefficiency bound, and algorithm, in Proc. 8 Intl. Conf. Performance Evaluation Methodologie Tool, pp. 6: 6:. [] A. Balachandran, P. Bahl, and G. Voeler, Hot-pot congetion relief in public-area wirele networ, in Proc. IEEE Worhop Mobile Comput. Syt. Appl., pp [4] L. Chen, A ditributed acce point election algorithm baed on noregret learning for wirele acce networ, in Proc. IEEE VTC Spring, pp. 5. [5] M. Satyanarayanan, Pervaive computing: viion and challenge, IEEE Peronal Commun., vol. 8, no. 4, pp. 7, Aug. [6] J. Konori, Multihomed wirele terminal: MAC configuration and networ election game, in Proc. Intl. Conf. Inf. Netw., pp [7] F. Xu, C. Tan, Q. Li, G. Yan, and J. Wu, Deigning a practical acce point aociation protocol, in Proc. IEEE INFOCOM. [8] D. Fudenberg and J. Tirole, Game Theory. MIT Pre, 99. [9] B. Wang, Y. Wu, and K. J. R. Liu, Game theory for cognitive radio networ: an overview, Comput. Netw., vol. 54, no. 4, pp , Oct.. [] Z. Han and K. J. R. Liu, Noncooperative power-control game and throughput game over wirele networ, IEEE Tran. Commun., vol. 5, no., pp , Oct. 5. [] B. Wang, Z. Han, and K. J. R. Liu, Ditributed relay election and power control for multiuer cooperative communication networ uing Stacelberg game, IEEE Tran. Mobile Comput., vol. 8, no. 7, pp , July 9. [] K. J. R. Liu and B. Wang, Cognitive Radio Networing and Security: A Game Theoretical View. Cambridge Univerity Pre,. [] Y. Chen and K. J. R. Liu, Indirect reciprocity game modelling for cooperation timulation in cognitive networ, IEEE Tran. Commun., vol. 59, no., pp , Jan.. [4] L. Xiao, Y. Chen, W. Lin, and K. J. R. Liu, Indirect reciprocity ecurity game for large-cale wirele networ, IEEE Tran. Inf. Forenic Security, vol. 7, no. 4, pp. 68 8, Aug.. [5] C. Tein, M. Liu, R. Southwell, J. Huang, and S. Ahmad, Atomic congetion game on graph and their application in networing, IEEE/ACM Tran. Netw., vol., no. 5, pp , Oct.. [6] Y. Xu, J. Wang, Q. Wu, A. Anpalagan, and Y.-D. Yao, Opportunitic pectrum acce in cognitive radio networ: global optimization uing local interaction game, IEEE J. Sel. Area Commun., vol. 6, no., pp. 8 94, Apr.. [7], Opportunitic pectrum acce in unnown dynamic environment: a game-theoretic tochatic learning olution, IEEE Tran. Wirele Commun., vol., no. 4, pp. 8 9, Apr.. [8] Y. Xu, A. Anpalagan, Q. Wu, L. Shen, Z. Gao, and J. Wang, Deciiontheoretic ditributed channel election for opportunitic pectrum acce: trategie, challenge and olution, IEEE Commun. Survey Tut.,. [9] C.-Y. Wang, Y. Chen, and K. J. R. Liu, Chinee retaurant game, IEEE Signal Proce. Lett., vol. 9, no., pp , Dec.. [], Sequential Chinee retaurant game, IEEE Tran. Signal Proce., vol. 6, no., pp , Feb.. [] C. Jiang, Y. Chen, Y.-H. Yang, C.-Y.Wang, and K. J. R. Liu, Dynamic Chinee retaurant game in cognitive radio networ, in Proc. IEEE INFOCOM. [] M. L. Puterman, Marov Deciion Procee: Dicrete Stochatic Dynamic Programming. John Wiley & Son, 994. [] D. Bertea, Dynamic Programming and Optimal Control, rd ed. Athena Scientific, 7. [4] R. B. Myeron, Optimal auction deign, Mathematic Operation Reearch, vol. 6, no., pp. 58 7, 98. [5] V. Krihna, Auction Theory. Academic Pre/Elevier, 9. [6] N. Nian, T. Roughgarden, E. Tardo, and V. Vazirani, Algorithmic Game Theory. Cambridge Univerity Pre, 7. [7] E. J. Friedman and D. C. Pare, Pricing WiFi at tarbuc: iue in online mechanim deign, in Proc. ACM Conf. Electron. Commerce, pp [8] R. Vohra, Mechanim Deign: A Linear Programming Approach. Cambridge Univerity Pre,. [9] J. Zander, Performance of optimum tranmitter power control in cellular radio ytem, IEEE Tran. Veh. Technol., vol. 4, no., pp. 57 6, 99. [4] T.-H. Lee, J.-C. Lin, and Y. Su, Downlin power control algorithm for cellular radio ytem, IEEE Tran. Veh. Technol., vol. 44, no., pp , 995. [4] E. Parzen, Stochatic Procee. Holden-Day, 96. [4] M. Lopez-Benitez and F. Caadevall, Dicrete-time pectrum occupancy model baed on Marov chain and duty cycle model, in Proc. IEEE DySPAN, pp

13 56 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO., OCTOBER [4] J.-L. Wang, Y.-H. Xu, Z. Gao, and Q.-H. Wu, Dicrete-time queuing analyi of opportunitic pectrum acce: ingle uer cae, Frequenz, vol. 65, no. -, pp. 5 4,. [44] J. Razavilar, K. J. R. Liu, and S. Marcu, Jointly optimized bitrate/delay control policy for wirele pacet networ with fading channel, IEEE Tran. Commun., vol. 5, no., pp , Mar.. [45] G. Koole, Monotonicity in Marov reward and deciion chain: theory and application, Found. Trend. Stoch. Syt., pp. 76, 7. [46] E. Cil, E. Ormeci, and F. Karaemen, Effect of ytem parameter on the optimal policy tructure in a cla of queueing control problem, Queueing Syt., vol. 6, pp. 7 4, 9. [47] A. Sang, X. Wang, M. Madihian, and R. Gitlin, Coordinated load balancing, handoff/cell-ite election, and cheduling in multi-cell pacet data ytem, Wirele Netw., vol. 4, pp., 8. [48] D. Amzallag, R. Bar-Yehuda, D. Raz, and G. Scaloub, Cell election in 4G cellular networ, in Proc. 8 IEEE INFOCOM, pp [49] L. Gao, X. Wang, G. Sun, and Y. Xu, A game approach for cell election and reource allocation in heterogeneou wirele networ, in Proc. IEEE SECON, pp Yu-Han Yang (S 6 received hi B.S. in electrical engineering in 4, and two M.S. degree in computer cience and communication engineering in 7, from National Taiwan Univerity, Taipei, Taiwan. He i currently puruing the Ph.D. degree in Univerity of Maryland, College Par, USA. Hi reearch interet include wirele communication and ignal proceing. He received Cla A Scholarhip from the ECE department, National Taiwan Univerity in Fall 5 and Spring 6. He i a recipient of Study Abroad Scholarhip from Taiwan (R.O.C. government in 9-. Yan Chen (S 6-M received the Bachelor degree from Univerity of Science and Technology of China in 4, the M. Phil degree from Hong Kong Univerity of Science and Technology (HKUST in 7, and the Ph.D. degree from Univerity of Maryland College Par in. From to, he i a Potdoctoral reearch aociate in the Department of Electrical and Computer Engineering at Univerity of Maryland College Par. Currently, he i a Principal Technologit at Origin Wirele Communication. He i alo affiliated with Signal and Information Group of Univerity of Maryland College Par. Hi current reearch interet are in ocial learning and networing, behavior analyi and mechanim deign for networ ytem, multimedia ignal proceing and communication. Dr. Chen received the Univerity of Maryland Future Faculty Fellowhip in, Chinee Government Award for outtanding tudent abroad in, Univerity of Maryland ECE Ditinguihed Diertation Fellowhip Honorable Mention in, and wa the Finalit of A. Jame Clar School of Engineering Dean Doctoral Reearch Award in. Chunxiao Jiang (S 9-M received hi B.S. degree in information engineering from Beijing Univerity of Aeronautic and Atronautic (Beihang Univerity in 8 and the Ph.D. degree from Tinghua Univerity (THU, Beijing in, both with the highet honor. During -, he viited the Signal and Information Group (SIG at Department of Electrical & Computer Engineering (ECE of Univerity of Maryland (UMD, upported by China Scholarhip Council (CSC for one year. Dr. Jiang i currently a reearch aociate in ECE department of UMD with Prof. K. J. Ray Liu, and alo a pot-doctor in EE department of THU. Hi reearch interet include the application of game theory and queuing theory in wirele communication and networing and ocial networ. Dr. Jiang received the Beijing Ditinguihed Graduated Student Award, Chinee National Fellowhip and Tinghua Outtanding Ditinguihed Doctoral Diertation in. Chih-Yu Wang (S 7-M received the B.S. degree in Electrical Engineering from National Taiwan Univerity, Taipei, Taiwan. in 7. He ha been a viiting tudent in Univerity of Maryland, College Par in. He received the Ph.D. degree in the Graduate Intitute of Communication Engineering, National Taiwan Univerity, Taipei, Taiwan, in. Hi reearch interet mainly are application of game theory in wirele networing and ocial networing. K. J. Ray Liu (F wa named a Ditinguihed Scholar-Teacher of Univerity of Maryland, College Par, in 7, where he i Chritine Kim Eminent Profeor of Information Technology. He lead the Maryland Signal and Information Group conducting reearch encompaing broad area of ignal proceing and communication with recent focu on cooperative and cognitive communication, ocial learning and networ cience, information forenic and ecurity, and green information and communication technology. Dr. Liu i the recipient of numerou honor and award including IEEE Signal Proceing Society Technical Achievement Award and Ditinguihed Lecturer. He alo received variou teaching and reearch recognition from Univerity of Maryland including univerity-level Invention of the Year Award; and Poole and Kent Senior Faculty Teaching Award, Outtanding Faculty Reearch Award, and Outtanding Faculty Service Award, all from A. Jame Clar School of Engineering. An ISI Highly Cited Author, Dr. Liu i a Fellow of IEEE and AAAS. Dr. Liu i Preident of IEEE Signal Proceing Society where he ha erved a Vice Preident Publication and Board of Governor. He wa the Editorin-Chief of IEEE Signal Proceing Magazine and the founding Editor-in- Chief of EURASIP Journal on Advance in Signal Proceing.

Frequency Calibration of A/D Converter in Software GPS Receivers

Frequency Calibration of A/D Converter in Software GPS Receivers Frequency Calibration of A/D Converter in Software GPS Receiver L. L. Liou, D. M. Lin, J. B. Tui J. Schamu Senor Directorate Air Force Reearch Laboratory Abtract--- Thi paper preent a oftware-baed method

More information

Subcarrier exclusion techniques

Subcarrier exclusion techniques Subcarrier excluion technique for coded OFDM ytem Kai-Uwe Schmidt, Jochen Ertel, Michael Benedix, and Adolf Finger Communication Laboratory, Dreden Univerity of Technology, 62 Dreden, Germany email: {chmidtk,

More information

MIMO Systems: Multiple Antenna Techniques

MIMO Systems: Multiple Antenna Techniques ADVANCED MIMO SYSTEMS MIMO Sytem: Multiple Antenna Technique Yiqing ZOU, Zhengang PAN, Kai-Kit WONG Dr, Senior Member of IEEE, Aociate Editor, IEEE TWirele, IEEE CL, and JoC (AP), Senior Lecturer, Department

More information

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Stability Analyi in a Cognitive Radio Sytem with Cooperative Beamforming Mohammed Karmooe, Ahmed Sultan, Moutafa Youef Department of Electrical Engineering, Alexandria Univerity, Alexandria, Egypt Wirele

More information

On-Demand Spectrum Sharing By Flexible Time-Slotted Cognitive Radio Networks

On-Demand Spectrum Sharing By Flexible Time-Slotted Cognitive Radio Networks On-Demand Spectrum Sharing By Flexible Time-Slotted Cognitive Radio Network Shimin Gong, Xu Chen, Jianwei Huang, and Ping Wang Centre for Multimedia and Network Technology, Nanyang Technological Univerity

More information

COST OF TRANSMISSION TRANSACTIONS: Comparison and Discussion of Used Methods

COST OF TRANSMISSION TRANSACTIONS: Comparison and Discussion of Used Methods INTERNATIONAL CONFERENCE ON RENEWABLE ENERGY AND POWER QUALITY (ICREPQ 03) COST OF TRANSMISSION TRANSACTIONS: Comparion and Dicuion of Ued Method Judite Ferreira 1, Zita Vale 2, A. Almeida Vale 3 and Ricardo

More information

Adaptive Space/Frequency Processing for Distributed Aperture Radars

Adaptive Space/Frequency Processing for Distributed Aperture Radars Adaptive Space/Frequency Proceing for Ditributed Aperture Radar Raviraj Adve a, Richard Schneible b, Robert McMillan c a Univerity of Toronto Department of Electrical and Computer Engineering 10 King College

More information

The Performance Analysis of MIMO OFDM System with Different M-QAM Modulation and Convolution Channel Coding

The Performance Analysis of MIMO OFDM System with Different M-QAM Modulation and Convolution Channel Coding The Performance Analyi of MIMO OFDM Sytem with Different M-QAM Modulation and Convolution Channel Coding H. S. Shwetha M.tech, Digital Communication Engineering Siddaganga Intitute of Technology Tumakuru,

More information

A Proportional Fair Resource Allocation Algorithm for Hybrid Hierarchical Backhaul Networks

A Proportional Fair Resource Allocation Algorithm for Hybrid Hierarchical Backhaul Networks A Proportional Fair Reource Allocation Algorithm for Hybrid Hierarchical Backhaul Network Intitute of Communication and Information Sytem, Hohai Univerity, Nanjing, 211100, China E-mail: 498807912@qq.com

More information

Adaptive Code Allocation for Interference Exploitation on the Downlink of MC-CDMA Systems

Adaptive Code Allocation for Interference Exploitation on the Downlink of MC-CDMA Systems Adaptive Code Allocation for Interference Exploitation on the Downlink of MC-CDMA Sytem E. Alua and C. Maouro School of Electrical and Electronic Engineering, The Univerity of Mancheter, PO. Box 88, email:

More information

Asymptotic Diversity Analysis of Alamouti Transmit Diversity with Quasi-ML Decoding Algorithm in Time-Selective Fading Channels

Asymptotic Diversity Analysis of Alamouti Transmit Diversity with Quasi-ML Decoding Algorithm in Time-Selective Fading Channels International Journal of Software Engineering and It Application Vol. 9, No. 1 (015), pp. 381-388 http://dx.doi.org/10.1457/ijeia.015.9.1.34 Aymptotic Diverity Analyi of Alamouti Tranmit Diverity with

More information

Optimized BER Performance of Asymmetric Turbo Codes over AWGN Channel

Optimized BER Performance of Asymmetric Turbo Codes over AWGN Channel International Journal of Computer Application (0975 8887) Optimized Performance of Aymmetric Turbo Code over AWGN Channel M.Srinivaa Rao Pvpit, JNTU Kainada Andhra Pradeh, India. G.Vijaya Kumar Pvpit,

More information

Wireless Link SNR Mapping Onto An Indoor Testbed

Wireless Link SNR Mapping Onto An Indoor Testbed Wirele Link SNR Mapping Onto An Indoor Tetbed Jing Lei, Roy Yate, Larry Greentein, Hang Liu WINLAB Rutger Univerity 73 Brett Road, Picataway, NJ 8854, USA {michelle, ryate, ljg, hliu}@winlab.rutger.edu

More information

Active Harmonic Elimination in Multilevel Converters Using FPGA Control

Active Harmonic Elimination in Multilevel Converters Using FPGA Control Active Harmonic Elimination in Multilevel Converter Uing FPGA Control Zhong Du, Leon M. Tolbert, John N. Chiaon Electrical and Computer Engineering The Univerity of Tenneee Knoxville, TN 7996- E-mail:

More information

Produced in cooperation with. Revision: May 26, Overview

Produced in cooperation with. Revision: May 26, Overview Lab Aignment 6: Tranfer Function Analyi Reviion: May 6, 007 Produced in cooperation with www.digilentinc.com Overview In thi lab, we will employ tranfer function to determine the frequency repone and tranient

More information

Two Novel Handover Algorithms with Load Balancing for Heterogeneous Network

Two Novel Handover Algorithms with Load Balancing for Heterogeneous Network Two Novel Handover Algorithm Load Balancing for Heterogeneou Network Rintaro Yoneya, Abolfazl Mehbodniya and Fumiyuki Adachi Dept. of Communication Engineering, Graduate School of Engineering, Tohoku Univerity,

More information

The Central Limit Theorem

The Central Limit Theorem Objective Ue the central limit theorem to olve problem involving ample mean for large ample. The Central Limit Theorem In addition to knowing how individual data value vary about the mean for a population,

More information

Chapter Introduction

Chapter Introduction Chapter-6 Performance Analyi of Cuk Converter uing Optimal Controller 6.1 Introduction In thi chapter two control trategie Proportional Integral controller and Linear Quadratic Regulator for a non-iolated

More information

II. SYSTEM MODEL. A. Link and path model

II. SYSTEM MODEL. A. Link and path model HARQ I. INTRODUCTION ARQ (automatic repeat-requet i a link layer protocol ued for packet error detection and retranmiion. Errordetection bit (uch a CRC bit are attached and tranmitted along with the meage

More information

Control of Electromechanical Systems using Sliding Mode Techniques

Control of Electromechanical Systems using Sliding Mode Techniques Proceeding of the 44th IEEE Conference on Deciion and Control, and the European Control Conference 25 Seville, Spain, December 2-5, 25 MoC7. Control of Electromechanical Sytem uing Sliding Mode Technique

More information

Lab 7 Rev. 2 Open Lab Due COB Friday April 27, 2018

Lab 7 Rev. 2 Open Lab Due COB Friday April 27, 2018 EE314 Sytem Spring Semeter 2018 College of Engineering Prof. C.R. Tolle South Dakota School of Mine & Technology Lab 7 Rev. 2 Open Lab Due COB Friday April 27, 2018 In a prior lab, we et up the baic hardware

More information

EFFICIENT TRANSMITTER-RECEIVER OPTIMIZATION FOR MULTI-USER SPATIAL MULTIPLEXING MIMO SYSTEM WITH ANTENNA SELECTION

EFFICIENT TRANSMITTER-RECEIVER OPTIMIZATION FOR MULTI-USER SPATIAL MULTIPLEXING MIMO SYSTEM WITH ANTENNA SELECTION INTERNATIONAL JOURNAL JOURNAL OF OF INFORMATION AND AND SYSTEMS SYSTEMS SCIENCES Volume Volume 5, Number, Number, Page, Page 57-7- 9 Intitute for Scientific Computing and Information EFFICIENT TRANSMITTER-RECEIVER

More information

Deterministic Deployment for Wireless Image Sensor Nodes

Deterministic Deployment for Wireless Image Sensor Nodes Send Order for Reprint to reprint@benthamcience.ae 668 The Open Electrical & Electronic Engineering Journal, 04, 8, 668-674 Determinitic Deployment for Wirele Image Senor Node Open Acce Junguo Zhang *,

More information

Performance analysis in cognitive radio system under perfect spectrum sensing Chen Song, Gu Shuainan, Zhang Yankui

Performance analysis in cognitive radio system under perfect spectrum sensing Chen Song, Gu Shuainan, Zhang Yankui International Conference on Automation, Mechanical Control and Comutational Engineering (AMCCE 205) Performance analyi in cognitive radio ytem under erfect ectrum ening Chen Song, Gu Shuainan, Zhang Yankui

More information

Hardware-in-the-loop tuning of a feedback controller for a buck converter using a GA

Hardware-in-the-loop tuning of a feedback controller for a buck converter using a GA SPEEDAM 8 International Sympoium on Power Electronic, Electrical Drive, Automation and Motion Hardware-in-the-loop tuning of a feedback controller for a buck converter uing a GA Mr K. D. Wilkie, Dr M.

More information

Pre- and Post-DFT Combining Space Diversity Receiver for Wideband Multi-Carrier Systems

Pre- and Post-DFT Combining Space Diversity Receiver for Wideband Multi-Carrier Systems Pre- and Pot- Combining Space Receiver for Wideband Multi-Carrier Sytem Muhammad Imadur Rahman, Suvra Sekhar Da, Frank HP Fitzek, Ramjee Praad Center for TeleInFratruktur (CTiF), Aalborg Univerity, Denmark

More information

Analysis. Control of a dierential-wheeled robot. Part I. 1 Dierential Wheeled Robots. Ond ej Stan k

Analysis. Control of a dierential-wheeled robot. Part I. 1 Dierential Wheeled Robots. Ond ej Stan k Control of a dierential-wheeled robot Ond ej Stan k 2013-07-17 www.otan.cz SRH Hochchule Heidelberg, Mater IT, Advanced Control Engineering project Abtract Thi project for the Advanced Control Engineering

More information

Identification of Image Noise Sources in Digital Scanner Evaluation

Identification of Image Noise Sources in Digital Scanner Evaluation Identification of Image Noie Source in Digital Scanner Evaluation Peter D. Burn and Don William Eatman Kodak Company, ocheter, NY USA 4650-95 ABSTACT For digital image acquiition ytem, analyi of image

More information

Time-Domain Coupling to a Device on Printed Circuit Board Inside a Cavity. Chatrpol Lertsirimit, David R. Jackson and Donald R.

Time-Domain Coupling to a Device on Printed Circuit Board Inside a Cavity. Chatrpol Lertsirimit, David R. Jackson and Donald R. Time-Domain Coupling to a Device on Printed Circuit Board Inide a Cavity Chatrpol Lertirimit, David R. Jackon and Donald R. Wilton Applied Electromagnetic Laboratory Department of Electrical Engineering,

More information

The RCS of a resistive rectangular patch antenna in a substrate-superstrate geometry

The RCS of a resistive rectangular patch antenna in a substrate-superstrate geometry International Journal of Wirele Communication and Mobile Computing 0; (4): 9-95 Publihed online October 0, 0 (http://www.ciencepublihinggroup.com/j/wcmc) doi: 0.648/j.wcmc.0004. The RCS of a reitive rectangular

More information

Reinforcement Learning Based Anti-jamming with Wideband Autonomous Cognitive Radios

Reinforcement Learning Based Anti-jamming with Wideband Autonomous Cognitive Radios 1 Reinforcement Learning Baed Anti-jamming with Wideband Autonomou Cognitive Radio Stephen Machuzak, Student Member, IEEE, and Sudharman K. Jayaweera, Senior Member, IEEE Communication and Information

More information

Design Multicast Protocols for Non-Cooperative Networks

Design Multicast Protocols for Non-Cooperative Networks Deign Multicat Protocol for Non-Cooperative Networ WeiZhao Wang Xiang-Yang Li Zheng Sun Yu Wang Abtract Conventionally, mot networ protocol aume that the networ entitie who participate in the networ activitie

More information

MIMO Enabled Efficient Mapping of Data in WiMAX Networks

MIMO Enabled Efficient Mapping of Data in WiMAX Networks MIMO Enabled Efficient Mapping of Data in WiMAX Network Penumarthi Phani Krihna, R. Saravana Manickam, and C. Siva Ram Murthy Department of Computer Science and Engineering Indian Intitute of Technology

More information

To appear in 30th ACM/IEEE Design Automation Conference 1993.

To appear in 30th ACM/IEEE Design Automation Conference 1993. Reolving Signal Correlation for Etimating Maximum Current in CMOS Combinational Circuit Harih Kriplani y,farid Najm y, Ping Y ang yy and Ibrahim Hajj y y Univerity of Illinoi at Urbana-Champaign yy Texa

More information

LCL Interface Filter Design for Shunt Active Power Filters

LCL Interface Filter Design for Shunt Active Power Filters [Downloaded from www.aece.ro on Sunday, November 4, 00 at 8::03 (TC) by 79.7.55.48. Retriction apply.] Advance in Electrical and Computer Engineering Volume 0, Number 3, 00 LCL nterface Filter Deign for

More information

HEURISTIC APPROACHES TO SOLVE THE U-SHAPED LINE BALANCING PROBLEM AUGMENTED BY GENETIC ALGORITHMS. Ulises Martinez William S. Duff

HEURISTIC APPROACHES TO SOLVE THE U-SHAPED LINE BALANCING PROBLEM AUGMENTED BY GENETIC ALGORITHMS. Ulises Martinez William S. Duff Proceeding of the 200 Sytem and Information Engineering Deign Sympoium Matthew H. Jone, Stephen D. Pate, and Barbara E. Tawney, ed. HEURISTIC APPROACHES TO SOLVE THE U-SHAPED LINE BALANCING PROBLEM AUGMENTED

More information

A Real-Time Wireless Channel Emulator For MIMO Systems

A Real-Time Wireless Channel Emulator For MIMO Systems A eal-time Wirele Channel Emulator For MIMO Sytem Hamid Elami, Ahmed M. Eltawil {helami,aeltawil}@uci.edu Abtract: The improvement in channel capacity hailed by MIMO ytem i directly related to intricate

More information

Sampling Theory MODULE XIII LECTURE - 41 NON SAMPLING ERRORS

Sampling Theory MODULE XIII LECTURE - 41 NON SAMPLING ERRORS Sampling Theory MODULE XIII LECTURE - 41 NON SAMPLING ERRORS DR. SHALABH DEPARTMENT OF MATHEMATICS AND STATISTICS INDIAN INSTITUTE OF TECHNOLOG KANPUR 1 It i a general aumption in ampling theory that the

More information

CHAPTER 2 WOUND ROTOR INDUCTION MOTOR WITH PID CONTROLLER

CHAPTER 2 WOUND ROTOR INDUCTION MOTOR WITH PID CONTROLLER 16 CHAPTER 2 WOUND ROTOR INDUCTION MOTOR WITH PID CONTROLLER 2.1 INTRODUCTION Indutrial application have created a greater demand for the accurate dynamic control of motor. The control of DC machine are

More information

1260 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 6, JUNE 2011

1260 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 6, JUNE 2011 26 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 6, JUNE 2 : A Practical Interference Management in Heterogeneou Wirele Acce Network Kyuho Son, Member, IEEE, Soohwan Lee, Student Member,

More information

A Faster and Accurate Method for Spectral Testing Applicable to Noncoherent Data

A Faster and Accurate Method for Spectral Testing Applicable to Noncoherent Data A Fater and Accurate ethod for Spectral Teting Applicable to Noncoherent Data inhun Wu 1,2, Degang Chen 2, Guican Chen 1 1 School of Electronic and Information Engineering Xi an Jiaotong Univerity, Xi

More information

REAL-TIME IMPLEMENTATION OF A NEURO-AVR FOR SYNCHRONOUS GENERATOR. M. M. Salem** A. M. Zaki** O. P. Malik*

REAL-TIME IMPLEMENTATION OF A NEURO-AVR FOR SYNCHRONOUS GENERATOR. M. M. Salem** A. M. Zaki** O. P. Malik* Copyright 2002 IFAC 5th Triennial World Congre, Barcelona, Spain REAL-TIME IMPLEMENTATION OF A NEURO- FOR SYNCHRONOUS GENERATOR M. M. Salem** A. M. Zaki** O. P. Malik* *The Univerity of Calgary, Canada

More information

Comm 502: Communication Theory. Lecture 5. Intersymbol Interference FDM TDM

Comm 502: Communication Theory. Lecture 5. Intersymbol Interference FDM TDM Lecture 5 Interymbol Interference FDM TDM 1 Time Limited Waveform Time-Limited Signal = Frequency Unlimited Spectrum Square Pule i a Time-Limited Signal Fourier Tranform 0 T S -3/T S -2/T S -1/T S 0 1/T

More information

Downlink Small-cell Base Station Cooperation Strategy in Fractal Small-cell Networks

Downlink Small-cell Base Station Cooperation Strategy in Fractal Small-cell Networks Downlink Small-cell Bae Station Cooperation Strategy in Fractal Small-cell Network Fen Bin, Jiaqi Chen, Xiaohu Ge, and Wei Xiang, School of Electronic Information and Communication Huazhong Univerity of

More information

Radio-Efficient Adaptive Modulation and Coding: Green Communication Perspective

Radio-Efficient Adaptive Modulation and Coding: Green Communication Perspective Radio-Efficient Adaptive Modulation and Coding: Green Communication Perpective Liqiang Zhao, Jian Cai, and Hailin Zhang State Key Laboratory of Integrated Service Network Xidian Univerity Xi an, Shaanxi,

More information

AN EVALUATION OF DIGILTAL ANTI-ALIASING FILTER FOR SPACE TELEMETRY SYSTEMS

AN EVALUATION OF DIGILTAL ANTI-ALIASING FILTER FOR SPACE TELEMETRY SYSTEMS AN EVALUATION OF DIGILTAL ANTI-ALIASING FILTER FOR SPACE TELEMETRY SYSTEMS Alion de Oliveira Morae (1), Joé Antonio Azevedo Duarte (1), Sergio Fugivara (1) (1) Comando-Geral de Tecnologia Aeroepacial,

More information

Adaptive Coding in MC-CDMA/FDMA Systems with Adaptive Sub-Band Allocation

Adaptive Coding in MC-CDMA/FDMA Systems with Adaptive Sub-Band Allocation Adaptive Coding in MC-CDMA/FDMA Sytem with Adaptive Sub-Band Allocation PETER TRIFONOV 1, ELENA COSTA, ALESSIO FILIPPI AND EGON SCHULZ Siemen AG, ICM N PG SP RC FR, Germany, ptrifonov@ieee.org,{elena.cota,aleio.filippi,egon.schulz}@iemen.com

More information

DIGITAL COMMUNICATION

DIGITAL COMMUNICATION DEPARTMENT OF ELECTRICAL &ELECTRONICS ENGINEERING DIGITAL COMMUNICATION Spring 2010 Yrd. Doç. Dr. Burak Kelleci OUTLINE Line Code Differential Encoding Regeneration, Decoding and Filtering Delta Modulation

More information

NOISE BARRIERS CERC 1. INTRODUCTION

NOISE BARRIERS CERC 1. INTRODUCTION Augut 217 P33/1B/17 NOISE BARRIERS CERC In thi document ADMS refer to ADMS-Road 4.1, ADMS-Urban 4.1 and ADMS-Airport 4.1. Where information refer to a ubet of the lited model, the model name i given in

More information

RESEARCH ON NEAR FIELD PASSIVE LOCALIZATION BASED ON PHASE MEASUREMENT TECHNOLOGY BY TWO TIMES FREQUENCY DIFFERENCE

RESEARCH ON NEAR FIELD PASSIVE LOCALIZATION BASED ON PHASE MEASUREMENT TECHNOLOGY BY TWO TIMES FREQUENCY DIFFERENCE RESEARCH ON NEAR FIED PASSIVE OCAIZATION BASED ON PHASE MEASUREMENT TECHNOOGY BY TWO TIMES FREQUENCY DIFFERENCE Xuezhi Yan, Shuxun Wang, Zhongheng Ma and Yukuan Ma College of Communication Engineering

More information

A Feasibility Study on Frequency Domain ADC for Impulse-UWB Receivers

A Feasibility Study on Frequency Domain ADC for Impulse-UWB Receivers A Feaibility Study on Frequency Domain ADC for Impule-UWB Receiver Rajeh hirugnanam and Dong Sam Ha VV (Virginia ech VLSI for elecommunication Lab Department of Electrical and Computer Engineering Virginia

More information

Solution to Tutorial 11

Solution to Tutorial 11 Solution to Tutorial 202/203 Semeter I MA4264 Game Theory Tutor: Xiang Sun November 5, 202 Exercie. Conider the following three-peron game: v( = 0, v(} = 0.2, v(2} = v(3} = 0, v(, 2} =.5, v(, 3} =.6, v(2,

More information

International Journal of Engineering Research & Technology (IJERT) ISSN: Vol. 1 Issue 6, August

International Journal of Engineering Research & Technology (IJERT) ISSN: Vol. 1 Issue 6, August ISSN: 2278-08 Vol. Iue 6, Augut - 202 The Turbo Code and an Efficient Decoder Implementation uing MAP Algorithm for Software Defined Radio Mr Rupeh Singh (Principal), Dr. Nidhi Singh (Aociate Profeor)

More information

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Chunxiao Jiang, Yan Chen, and K. J. Ray Liu Department of Electrical and Computer Engineering, University of Maryland, College

More information

UNIVERSITY OF SASKATCHEWAN EE456: Digital Communications FINAL EXAM, 9:00AM 12:00PM, December 9, 2010 (open-book) Examiner: Ha H.

UNIVERSITY OF SASKATCHEWAN EE456: Digital Communications FINAL EXAM, 9:00AM 12:00PM, December 9, 2010 (open-book) Examiner: Ha H. Name: Page 1 UNIVERSIY OF SASKACHEWAN EE456: Digital Communication FINAL EXAM, 9:00AM 1:00PM, December 9, 010 (open-book) Examiner: Ha H. Nguyen Permitted Material: Only textbook and calculator here are

More information

Resilient Large-Scale Cognitive Radio Ad Hoc Networking Using Path-Time Codes

Resilient Large-Scale Cognitive Radio Ad Hoc Networking Using Path-Time Codes IEEE ICC 2017 Cognitive Radio and Network Sympoium Reilient Large-Scale Cognitive Radio Ad Hoc Networking Uing Path-Time Code Yi-Chi Chen 1, I-Wei Lai 2 and Kwang-Cheng Chen 3 Graduate Intitute of Communication

More information

Innovation activity of corporations in emerging economies

Innovation activity of corporations in emerging economies Innovation activity of corporation in emerging economie Ekaterina N. Soboleva 1a, Mikhail V. Chikov 2, and Anataia S. Zaikovkaya 1 1 National Reearch Tomk Polytechnic Univerity, Tomk, 634050, Ruia 2 National

More information

Automatic Target Recognition with Unknown Orientation and Adaptive Waveforms

Automatic Target Recognition with Unknown Orientation and Adaptive Waveforms Automatic Target Recognition wi Unknown Orientation and Adaptive Waveform Junhyeong Bae Department of Electrical and Computer Engineering Univerity of Arizona 13 E. Speedway Blvd, Tucon, Arizona 8571 dolbit@email.arizona.edu

More information

Hashiwokakero. T. Morsink. August 31, 2009

Hashiwokakero. T. Morsink. August 31, 2009 Hahiwokakero T. Morink Augut 31, 2009 Content 1 Introduction 3 2 What i Hahiwokakero? 3 2.1 The rule............................. 3 2.2 Eay olving tatement..................... 4 3 Building an Own Solver

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /VETECS.2009.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /VETECS.2009. Nordin, R., Armour, S. M. D., & McGeehan, J. P. (9). Overcoming elfinterference in SM-OFDMA with and dynamic ubcarrier allocation. In IEEE 69th Vehicular Technology Conference 9 (VTC Spring 9), Barcelona

More information

Relay Selection and Resource Allocation in LTE-Advanced Cognitive Relay Networks

Relay Selection and Resource Allocation in LTE-Advanced Cognitive Relay Networks International Journal on Communication Antenna and Propagation (I.Re.C.A.P.), Vol. 1, N. 4 Augut 2011 Relay Selection and Reource Allocation in LTE-Advanced Cognitive Relay Network Ardalan Alizadeh, Seyed

More information

Space-Time Coded Systems with Continuous Phase Frequency Shift Keying

Space-Time Coded Systems with Continuous Phase Frequency Shift Keying Thi full text paper wa peer reviewed at the direction of IEEE Communication Society ubject matter expert for publication in the IEEE GLOBECOM 005 proceeding Space-Time Coded Sytem with Continuou Phae Frequency

More information

Resonant amplifier L A B O R A T O R Y O F L I N E A R C I R C U I T S. Marek Wójcikowski English version prepared by Wiesław Kordalski

Resonant amplifier L A B O R A T O R Y O F L I N E A R C I R C U I T S. Marek Wójcikowski English version prepared by Wiesław Kordalski A B O R A T O R Y O F I N E A R I R U I T S Reonant amplifier 3 Marek Wójcikowki Englih verion prepared by Wieław Kordalki. Introduction Thi lab allow you to explore the baic characteritic of the reonant

More information

Active vibration isolation for a 6 degree of freedom scale model of a high precision machine

Active vibration isolation for a 6 degree of freedom scale model of a high precision machine Active vibration iolation for a 6 degree of freedom cale model of a high preciion machine W.B.A. Boomma Supervior Report nr : Prof. Dr. Ir. M. Steinbuch : DCT 8. Eindhoven Univerity of Technology Department

More information

A New Technique to TEC Regional Modeling using a Neural Network.

A New Technique to TEC Regional Modeling using a Neural Network. A New Technique to TEC Regional Modeling uing a Neural Network. Rodrigo F. Leandro Geodetic Reearch Laboratory, Department of Geodey and Geomatic Engineering, Univerity of New Brunwick, Fredericton, Canada

More information

A Multi-objective Approach to Indoor Wireless Heterogeneous Networks Planning

A Multi-objective Approach to Indoor Wireless Heterogeneous Networks Planning A Multi-objective Approach to Indoor Wirele Heterogeneou Networ Planning Sotirio K. Goudo 1, David Plet 2, Ning Liu 2, Luc Marten 2, Wout Joeph 2 1 Radiocommunication Laboratory, Department of Phyic, Aritotle

More information

Joint Downlink and Uplink Tilt-Based Self-Organization of Coverage and Capacity Under Sparse System Knowledge

Joint Downlink and Uplink Tilt-Based Self-Organization of Coverage and Capacity Under Sparse System Knowledge 1 Joint Downlink and Uplink Tilt-Baed Self-Organization of Coverage and Capacity Under Spare Sytem Knowledge Sacha Berger, Meryem Simek, Albrecht Fehke, Paolo Zanier, Ingo Viering, and Gerhard Fettwei

More information

Parallel DCMs APPLICATION NOTE AN:030. Introduction. Sample Circuit

Parallel DCMs APPLICATION NOTE AN:030. Introduction. Sample Circuit APPLICATION NOTE AN:030 Parallel DCM Ugo Ghila Application Engineering Content Page Introduction 1 Sample Circuit 1 Output Voltage Regulation 2 Load Sharing 4 Startup 5 Special Application: Optimizing

More information

Constant Switching Frequency Self-Oscillating Controlled Class-D Amplifiers

Constant Switching Frequency Self-Oscillating Controlled Class-D Amplifiers http://dx.doi.org/.5755/j.eee..6.773 ELEKTRONIKA IR ELEKTROTECHNIKA, ISSN 39 5, OL., NO. 6, 4 Contant Switching Frequency Self-Ocillating Controlled Cla-D Amplifier K. Nguyen-Duy, A. Knott, M. A. E. Anderen

More information

Non-Linear UWB Receivers With MLSE Post-Detection

Non-Linear UWB Receivers With MLSE Post-Detection on-linear UWB Receiver With MLSE Pot-Detection Florian roech, homa Zaowki, and Armin Wittneben Communication echnology Laboratory, EH Zurich, 8092 Zurich, Switzerland Email: {troechf,zaowki,wittneben}@nari.ee.ethz.ch

More information

Digital Control of Boost PFC AC-DC Converters with Predictive Control

Digital Control of Boost PFC AC-DC Converters with Predictive Control Proceeding of the th International Middle Eat Power Sytem Conference (MEPCON ), Cairo Univerity, Egypt, December 9-,, Paper ID 7. Digital Control of Boot PFC AC-DC Converter with Predictive Control H.Z.Azazi

More information

Revisiting Cross-channel Information Transfer for Chromatic Aberration Correction

Revisiting Cross-channel Information Transfer for Chromatic Aberration Correction Reviiting Cro-channel Information Tranfer for Chromatic Aberration Correction Tiancheng Sun, Yifan Peng 3, Wolfgang Heidrich,3 King Abdullah Univerity of Science and Technology, Thuwal, Saudi Arabia IIIS,

More information

Integral Control AGC of Interconnected Power Systems Using Area Control Errors Based On Tie Line Power Biasing

Integral Control AGC of Interconnected Power Systems Using Area Control Errors Based On Tie Line Power Biasing ISSN (Online) 232 24 ISSN (Print) 232 5526 Vol. 2, Iue 4, April 24 Integral Control AGC of Interconnected Power Sytem Uing Area Control Error Baed On Tie Line Power Biaing Charudatta B. Bangal Profeor,

More information

Research on Control Technology of Permanent Magnet Synchronous Motor Based on Iterative Algorithm Liu Yangyang 1c, Yang Guang 2b, Zou Qi 1c,

Research on Control Technology of Permanent Magnet Synchronous Motor Based on Iterative Algorithm Liu Yangyang 1c, Yang Guang 2b, Zou Qi 1c, 3rd International Conference on Mechanical Engineering and Intelligent Sytem (ICMEIS 2015) Reearch on Control Technology of Permanent Magnet Synchronou Motor Baed on Iterative Algorithm Liu Yangyang 1c,

More information

FAST PATH LOSS PREDICTION BY USING VIRTUAL SOURCE TECHNIQUE FOR URBAN MICROCELLS

FAST PATH LOSS PREDICTION BY USING VIRTUAL SOURCE TECHNIQUE FOR URBAN MICROCELLS FAST PATH LOSS PREDICTION BY USING VIRTUAL SOURCE TECHNIQUE FOR URBAN MICROCELLS Haan M. El-Sallai Radio Laoratory, Intitute of Radio Communication (IRC) Helinki Univerity of Technology P. O. Box 3000,

More information

Design and Performance Comparison of PI and PID Controllers For Half Bridge DC-DC Converter

Design and Performance Comparison of PI and PID Controllers For Half Bridge DC-DC Converter International Journal of Advanced Reearch in Electrical and Electronic Engineering Volume: 2 Iue: 1 08-Mar-2014,ISSN_NO: 2321-4775 Deign and Performance Comparion of PI and PID Controller For Half Bridge

More information

DESIGN OF SECOND ORDER SIGMA-DELTA MODULATOR FOR AUDIO APPLICATIONS

DESIGN OF SECOND ORDER SIGMA-DELTA MODULATOR FOR AUDIO APPLICATIONS DESIGN OF SECOND ORDER SIGMA-DELTA MODULATOR FOR AUDIO APPLICATIONS 1 DHANABAL R, 2 BHARATHI V, 3 NAAMATHEERTHAM R SAMHITHA, 4 G.SRI CHANDRAKIRAN, 5 SAI PRAMOD KOLLI 1 Aitant Profeor (Senior Grade), VLSI

More information

Design of Centralized PID Controllers for TITO Processes*

Design of Centralized PID Controllers for TITO Processes* 6th International Sympoium on Advanced Control of Indutrial Procee (AdCONIP) May 8-3, 07. Taipei, Taiwan Deign of Centralized PID Controller for TITO Procee* Byeong Eon Park, Su Whan Sung, In-Beum Lee

More information

A Simple DSP Laboratory Project for Teaching Real-Time Signal Sampling Rate Conversions

A Simple DSP Laboratory Project for Teaching Real-Time Signal Sampling Rate Conversions A Simple DSP Laboratory Project for Teaching Real-Time Signal Sampling Rate Converion by Li Tan, Ph.D. lizhetan@pnc.edu Department of ECET Purdue Univerity North Central Wetville, Indiana Jean Jiang, Ph.D.

More information

IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 11, 2016 ISSN (online):

IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 11, 2016 ISSN (online): IJSRD - International Journal for Scientific Reearch & Development Vol. 3, Iue 11, 2016 ISSN (online): 2321-0613 Deign and Analyi of IIR Peak & Notch Ravi Choudhary 1 Pankaj Rai 2 1 M.Tech. Student 2 Aociate

More information

New Resonance Type Fault Current Limiter

New Resonance Type Fault Current Limiter New Reonance Type Fault Current imiter Mehrdad Tarafdar Hagh 1, Member, IEEE, Seyed Behzad Naderi 2 and Mehdi Jafari 2, Student Member, IEEE 1 Mechatronic Center of Excellence, Univerity of Tabriz, Tabriz,

More information

A Two-Stage Optimization PID Algorithm

A Two-Stage Optimization PID Algorithm PID' Brecia (Italy), March 8-3, ThB. A Two-Stage Optimization PID Algorithm Gíli Herjólfon Anna Soffía Haukdóttir Sven Þ. Sigurðon Department of Electrical and Computer Engineering,Univerity of Iceland

More information

A Flexible OFDM System Simulation Model. with BER Performance Test

A Flexible OFDM System Simulation Model. with BER Performance Test Contemporary Engineering Science, Vol. 5, 2012, no. 8, 365-374 A Flexible OFDM Sytem Simulation Model with BER Performance Tet Aladdin Amro Al-Huein Bin Talal Univerity, Jordan Department of Communication

More information

Control Method for DC-DC Boost Converter Based on Inductor Current

Control Method for DC-DC Boost Converter Based on Inductor Current From the electedwork of nnovative Reearch Publication RP ndia Winter November 1, 15 Control Method for C-C Boot Converter Baed on nductor Current an Bao Chau Available at: http://work.bepre.com/irpindia/46/

More information

Mobile Communications TCS 455

Mobile Communications TCS 455 Mobile Communication TCS 455 Dr. Prapun Sukompong prapun@iit.tu.ac.th Lecture 23 1 Office Hour: BKD 3601-7 Tueday 14:00-16:00 Thurday 9:30-11:30 Announcement Read Chapter 9: 9.1 9.5 Section 1.2 from [Bahai,

More information

Design, Realization, and Analysis of PIFA for an RFID Mini-Reader

Design, Realization, and Analysis of PIFA for an RFID Mini-Reader Deign, Realization, and Analyi of PIFA for an RFID Mini-Reader SUNG-FEI YANG ; TROY-CHI CHIU ; CHIN-CHUNG NIEN Indutrial Technology Reearch Intitute (ITRI) Rm. 5, Bldg. 5, 95, Sec., Chung Hing Rd., Chutung,

More information

Position Control of a Large Antenna System

Position Control of a Large Antenna System Poition Control of a Large Antenna Sytem uldip S. Rattan Department of Electrical Engineering Wright State Univerity Dayton, OH 45435 krattan@c.wright.edu ABSTRACT Thi report decribe the deign of a poition

More information

Fixed Structure Robust Loop Shaping Controller for a Buck-Boost Converter using Genetic Algorithm

Fixed Structure Robust Loop Shaping Controller for a Buck-Boost Converter using Genetic Algorithm Proceeding of the International ulticonference of Engineer and Computer Scientit 008 Vol II IECS 008, 9- arch, 008, Hong ong Fixed Structure Robut Loop Shaping Controller for a Buck-Boot Converter uing

More information

DSP-Based Control of Boost PFC AC-DC Converters Using Predictive Control

DSP-Based Control of Boost PFC AC-DC Converters Using Predictive Control DSP-Baed Control of Boot PFC AC-DC Converter Uing Predictive Control H.Z.Azazi*, E. E. E-Kholy**, S.A.Mahmoud* and S.S.Shokralla* * Electrical Engineering Department, Faculty of Engineering, Menoufiya

More information

Adaptive Groundroll filtering

Adaptive Groundroll filtering Adaptive Groundroll filtering David Le Meur (CGGVerita), Nigel Benjamin (CGGVerita), Rupert Cole (Petroleum Development Oman) and Mohammed Al Harthy (Petroleum Development Oman) SUMMARY The attenuation

More information

Sloppy Addition and Multiplication

Sloppy Addition and Multiplication Sloppy Addition and Multiplication IMM-Technical Report-2011-14 Alberto Nannarelli Dept. Informatic and Mathematical Modelling Technical Univerity of Denmark Kongen Lyngby, Denmark Email: an@imm.dtu.dk

More information

A simple low rate turbo-like code design for spread spectrum systems

A simple low rate turbo-like code design for spread spectrum systems 5 A imple low rate turbo-like code deign for pread pectrum ytem Durai Thirupathi and Keith M. Chugg Communication Science Intitute Dept. of Electrical Engineering Univerity of Southern California, Lo Angele

More information

A New SA-PNC Scheme for Uplink HetNets

A New SA-PNC Scheme for Uplink HetNets 217 25th European Signal Proceing Conference (EUSIPCO) A New SA-PNC Scheme for Uplin etnet Syed Saqlain Ali, Daniel Catanheira, Adão Silva, Atilio Gameiro DETI, Intituto de Telecomunicaçõe, Univerity of

More information

Instantaneous Cycle-Slip Detection and Repair of GPS Data Based on Doppler Measurement

Instantaneous Cycle-Slip Detection and Repair of GPS Data Based on Doppler Measurement Intantaneou Cycle-Slip Detection and Repair of GPS Data Baed on Doppler Meaurement Zhoufeng Ren, Liyan Li, Jie Zhong, and Minjian Zhao Abtract In GPS receiver, carrier phae meaurement can be ued to improve

More information

Improved Selective Harmonic Elimination for Reducing Torque Harmonics of Induction Motors in Wide DC Bus Voltage Variations

Improved Selective Harmonic Elimination for Reducing Torque Harmonics of Induction Motors in Wide DC Bus Voltage Variations Improved Selective Harmonic Elimination for Reducing Torque Harmonic of Induction Motor in Wide DC Bu Voltage Variation Hoein Valiyan Holagh, Tooraj Abbaian Najafabadi School of Electrical and Computer

More information

MAX3610 Synthesizer-Based Crystal Oscillator Enables Low-Cost, High-Performance Clock Sources

MAX3610 Synthesizer-Based Crystal Oscillator Enables Low-Cost, High-Performance Clock Sources Deign Note: HFDN-31.0 Rev.1; 04/08 MAX3610 Syntheizer-Baed Crytal Ocillator Enable Low-Cot, High-Performance Clock Source MAX3610 Syntheizer-Baed Crytal Ocillator Enable Low-Cot, High-Performance Clock

More information

Voltage Analysis of Distribution Systems with DFIG Wind Turbines

Voltage Analysis of Distribution Systems with DFIG Wind Turbines 1 Voltage Analyi of Ditribution Sytem with DFIG Wind Turbine Baohua Dong, Sohrab Agarpoor, and Wei Qiao Department of Electrical Engineering Univerity of Nebraka Lincoln Lincoln, Nebraka 68588-0511, USA

More information

Kalman Filtering Based Object Tracking in Surveillance Video System

Kalman Filtering Based Object Tracking in Surveillance Video System (669 -- 917) Proceeding of the 3rd (2011) CUSE International Conference Kalman Filtering Baed Object racking in Surveillance Video Sytem W.L. Khong, W.Y. Kow, H.. an, H.P. Yoong, K..K. eo Modelling, Simulation

More information

HIGH VOLTAGE DC-DC CONVERTER USING A SERIES STACKED TOPOLOGY

HIGH VOLTAGE DC-DC CONVERTER USING A SERIES STACKED TOPOLOGY HIGH VOLTAGE DC-DC CONVERTER USING A SERIES STACKED TOPOLOGY Author: P.D. van Rhyn, Co Author: Prof. H. du T. Mouton Power Electronic Group (PEG) Univerity of the Stellenboch Tel / Fax: 21 88-322 e-mail:

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT)

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) ISSN: 777 ISO 9: Certified Volume, Iue, April Deign of Coine Modulated Filter Bank uing Computationally Efficient Multiplierle FIR Filter Jyotna Ogale, Alok Jain Abtract Thi reearch work preent a computationally

More information