A Game Theoretic Analysis of Distributed Power Control for Spread Spectrum Ad Hoc Networks

Size: px
Start display at page:

Download "A Game Theoretic Analysis of Distributed Power Control for Spread Spectrum Ad Hoc Networks"

Transcription

1 A Game Theoretic Analysis of Distributed ower Control for Sread Sectrum Ad Hoc Networs Jianwei Huang, Randall A. Berry, Michael L. Honig Deartment of Electrical & Comuter Engineering, Northwestern University, 145 Sheridan Road, Evanston, IL 6008, USA {jianweih, rberry, Abstract We consider a distributed ower control scheme in a Sread Sectrum SS) wireless ad hoc networ, in which each user announces a rice that reflects his current interference level. Given these rices, we resent an asynchronous distributed algorithm for udating ower levels, and rovide conditions under which this algorithm converges to an otimal ower allocation. We relate this algorithm to myoic best resonse udates of a fictitious game, and characterize the algorithm s convergence using suermodular game theory. I. INTRODUCTION ower control is a basic technique for mitigating interference in wireless networs that enables efficient use of available sectrum. In ad hoc networs ower control is comlicated by the lac of centralized infrastructure, which necessitates the use of distributed aroaches. In this aer, we consider distributed ower control for SS ad hoc wireless networs, where each transmitter sreads its ower over the available bandwidth and all interference is treated as noise. We focus on a model where the users receive a variable transmission rate that deends on their received signal-to-interference lus noise ratio SINR). Our objective is to find distributed mechanisms for coordinating the users ower levels and otimizing overall erformance, measured in terms of total networ utility. We consider a ower control scheme in which the users exchange rice signals that indicate the cost of received interference. ricing mechanisms for allocating resources in networs has received considerable attention for both wire-line e.g. [1]) and wireless networs e.g. [] [4]). The roblem here differs from much of the revious wor because, due to interference, the users objective functions are couled with each other, and the overall networ objective is not concave in the allocated resource transmit ower). Also, in most revious wor, rices are Lagrange multiliers for some constrained resource such as ower or bandwidth; here the rices reflect the interference or externalities among the users instead of a resource constraint. Our model is similar to [5], which also considers combined ower and rate control for a SS ad hoc networ. The ower adatation in [5] solves a similar roblem to that considered here using gradient udates. Instead, we consider an aroach based on suermodular game theory [6], which allows for different utility functions and aears to have faster convergence. A variety of game-theoretic aroaches have been alied to networ resource allocation e.g., [7]). Suermodular game theory, in articular, has been used to study ower control in [8] [10]. Our aroach differs from those in that i) we focus on an ad hoc instead of a cellular networ; ii) we consider a different functional form for the utilities, and iii) we do not directly model the roblem as a non-cooerative game. Instead, the users voluntarily cooerate with each other by exchanging interference information. We introduce a fictitious game and aly a strategy sace transformation to view this algorithm as a suermodular game. Other wor on ower control in CDMA cellular and ad hoc networs includes [9] [13]. In much of this wor, a transmission is assumed to be successful only if a fixed imum SINR requirement is met. This is true for fixed-rate communications. However, this is not the case for elastic data alications, in which users can adat their transmission rate. In this aer, we focus on such rate-adative users, where the goal of ower control is to imize total networ erformance instead of guarantee interference margins for each user. II. SYSTEM MODEL We consider a sna-shot of an ad hoc networ with a set K = {1,..., K} of distinct transmission airs. Each air consists of one dedicated transmitter and one dedicated receiver. This can reresent a articular schedule of transmissions detered by an underlying routing and MAC layer rotocol. We will use the terms air and user interchangeably in the rest of the aer. Each user transmits an SS signal sread over the total bandwidth of B Hz. Over the time-eriod of interest we assume that the channel gains of the transmitterreceiver airs are fixed. The channel gain between user s transmitter and user j s receiver is denoted by h j. Note that in general h j =h j, since the latter reresents the channel gain between user j s transmitter and user s receiver. An examle of a networ with four users airs of nodes) is shown in Fig. 1. The value of the transmission by user Kis characterized by a utility function u γ ), which is an increasing and strictly concave function of the received SINR, h γ ) = n B j =, 1) jh j

2 T 1 T 3 h 14 h 11 h 31 h 13 h 34 h 33 R 1 h 1 h 3 h 4 R 4 h 1 T h Fig. 1. SS ad hoc networ of four users airs of nodes). T and R denote the transmitter and receiver of user, resectively. where n 0 is the bacground noise ower and = 1,, K ) is a vector of the users transmission owers. The users utility functions are couled due to mutual interference. An examle utility function is a logarithmic utility function u γ ) = θ log γ ), where θ is a user deendent riority arameter. For low SINR, a user s rate is aroximately linear in SINR; in this regime, the utility is therefore roortional to the logarithm of the rate. In the high SINR regime, the logarithmic utility aroximates the Shannon caacity log 1 + γ ) weighted by arameter θ. The ower control roblem is to secify the vector of transmission owers,, where each user must also satisfy an [ individual] transmission ower constraint, =,,where0. From a networ ersective, the objective is to imize the total utility summed over all users, i.e., 3 h 44 u tot ) = {,, K} h h 41 h 4 T 4 R 3 h 43 R K u γ )). =1 1) As a baseline, first consider the case where the users do not exchange any information and simly choose their transmission owers to imize their individual utilities. As in [9], this can be modeled as a non-cooerative ower control NCC) game, G NCC =[K, { }, {u }], where the layers corresond to the users in K; each layer ics [ a strategy transmission ] ower) from the strategy set =, and receives a ayoff u γ ). In this game, a ower rofile, = 1,..., K ), is a vector of the users transmission owers. The ower rofile of user s oonents is defined to be = 1,..., 1, +1,..., K ), so that = ; ).User s best resonse is B ) = arg u γ, )), i.e., the value that imizes u γ, )) given a fixed. A ower rofile is a Nash Equilibrium NE) of the NCC game if it is a fixed oint of the users best resonses, i.e. u γ ; )) u γ ; )) for any and any user. Since each user s ayoff u γ, )) is strictly increasing with for fixed, and there is no enalty for high transmission ower as long as, it is easy to verify that the unique NE of the NCC game is NCC = 1,..., K ), i.e., each transmitter uses its imum ower. This solution can be far from the socially otimal solution, which imizes the total utility. Although u γ ) is strictly concave in γ, the objective in roblem 1 may not be concave in. However, it is easy to verify that any local otimum, = 1,..., K ),ofthis roblem will be regular see age 309 of [14]), and so must satisfy the following KKT necessary conditions: Lemma 1 KKT necessary conditions:): For any local otimal solution of roblem 1, there exist unique Lagrange multilier vectors λ =λ 1,..., λ K) and µ =µ 1,..., µ K ) such that for all K, u γ, )) + u jγ j j, j)) = λ µ, j = = ) λ )=0,µ ) =0, and λ,µ 0. Let π j j, j )= u j γj j, j ) ), 3) I j j ) where I j j )= l =j lh lj is the total interference received by user j before bandwidth scaling). Here, π j j, j ) is always nonnegative and reresents user j s sensitivity to its current interference level, i.e., how much its utility would increase if the interference is decreased by one unit. This imlicitly incororates user j s utility information, i.e., the larger the utility e.g., larger θ ) the larger is π j j, j ). Using 3), condition ), forall K, can be written as u γ, )) ) = j = π j j, j) hj = λ µ. 4) Assume each user j announces π j = π j j, j )) as a rice that he charges other users for generating interference, and that users are rice taers i.e. each user regards other users rices as constants). Condition 4) is then a necessary and sufficient otimality condition for the roblem in which each user secifies a ower level to imize the surlus function, s, ; π )=u γ, )) π j h j, 5) j = assug fixed and π i.e., each user is a rice taer and ignores any influence it may have on these rices). The surlus in 5) can be viewed as user s utility us a ayment to the other users in the networ due to the interference it generates. The ayment is its transmit ower times a weighted sum of other users rices, with weights equal to the channel gains between user s transmitter and the other users receivers. This ayment can be interreted as a igovian tax [15]. III. ASYNCHRONOUS DISTRIBUTED RICING AD) ALGORITHM The ricing interretation of the KKT conditions motivates the following asynchronous distributed ricing AD) algo-

3 rithm, in which users iteratively udate their rice announcements and transmit ower decisions in an attemt to achieve a solution that satisfies Lemma 1. For each K, define a ower udate function 1 W,π ) = arg s ˆ, ; π ) ˆ ) = γ ) g j = π jh j γ ) and a rice udate function C ) = u γ )) I ) = u γ )) γ )), γ ) B h where /γ ) is indeendent of,and, 0 x u ), g x) = u ) 1 x), u ) <x<u 0), 0, u 0) x. The AD Algorithm is then secified as follows where t denotes the time immediately before t): 1.) Initialization: at t =0, each user Kchooses some initial ower 0) and rice π 0)..) There are K sets of infinite ositive time instances T, and T,π, K, at which each user udates ower t) and rice π t) as follows t) =W t ),π t ) ), if t T,, 6) π t) =C t ) ), if t T,π. 7) Note that a user need not udate his ower and rice at the same time. The asynchronous udate is imortant in ractice because it may be difficult to coordinate different users in the networ to udate their strategies in a synchronized manner. This algorithm is distributed in nature not only because of the distributed generation of owers and rices by users, but also because each user needs to acquire limited information. Secifically, to imlement the ower and rice udates, each user only needs to now: i) its own utility u,sinrγ and channel gain h, ii) the adjacent channel gains h j for j K and j =, and iii) the rice rofile π. By assumtion each user nows its own utility. The SINR γ and channel gain h can be measured at the receiver and fed bac to the user. Measuring the adjacent channel gains h j can be accomlished by having each receiver eriodically broadcast a beacon; assug recirocity, the transmitters can then measure these channel gains. Note that the adjacent channel gains account for only 1/K of the total channel gains in the networ; each user does not need to now the other gains. The rice information could also be eriodically broadcast through this beacon. Each user announces a single rice that is used by all interfering transmissions, so that the number of rices scales linearly with the size of the networ. Also, numerical results suggest that there is little effect on 1 Notation [x] b a denotes { {x, b},a}., erformance if users only convey their rices to nearby transmitters, i.e. those generating the strongest interference. Denote the set of fixed oints of the AD algorithm by F AD = {, π), π) =W, π), C ))}, 8) where W, π) = W 1 1,π 1 ),...,W K K,π K )) and C ) =C 1 ),...,C K )). Lemma : A ower rofile satisfies the KKT conditions of roblem 1 if and only if, C )) F AD. The roof relies on the strict concavity of u γ ). Furthermore, if the objective function of roblem 1 is strictly concave in or some monotonic transformation of ), then the KKT conditions become necessary and sufficient for the unique otimal solution to roblem 1, and the AD algorithm would reach that oint if it converges. In general, roblem 1 may not be a concave imization roblem, so that the AD algorithm may reach a locally otimal oint or saddle oint) of roblem 1. IV. CONVERGENCE ANALYSIS OF AD ALGORITHM In this section, we characterize the convergence of the AD algorithm by viewing it in a game theoretic context. We first consider a game similar to the NCC game, excet now each layer s strategy includes secifying both a ower and ariceπ to imize a ayoff given by the surlus in 5). Since there is no enalty for user announcing a high rice, it can be shown that each user s best resonse is to choose a large enough rice to force all other users to sto transmission. This is certainly not a desirable outcome and suggests that the rices should be detered externally by another rocedure. Instead of the receding game, we consider the following [ Fictitious { ower-rice } {F) control }] game: G F = FW FC, FW, FC, s FW,s FC, where the layers are from the union of the sets FW and FC. FW = {1,..., K} is the fictitious ower layer set, in which each layer chooses a ower from the strategy set FW = [ ],. FC = {1,..., K} is the fictitious rice layer set, inwhich each layer chooses a rice π from the strategy set FC = [0, π ]. Here π =su u γ )) / I )), which could be infinite for some utility functions. A layer FW receives a ayoff s FW, ; π )=u γ )) j = π j h j, 9) and a layer FC has a ayoff s FC π ; ) = π + u ) γ )). 10) I ) The ayoff s FC is defined so that the otimal strategy π = u / I. The layers best resonse functions are then B FW,π ) = W,π ), FW, and11) B FC ) = C ), FC. 1) Of course, no algorithm that relies only on first-order information can be guaranteed to converge to a global or even local otimum if the otimization roblem is non-concave.

4 In the F game, each user Kin the original ad hoc networ is slit into two fictitious layers, one in set FW who controls ower and the other one in set FC who controls rice π. Although users in the networ cooerate with each other by exchanging interference information instead of choosing rices to imize their surlus), each fictitious layer in the F game is selfish and imizes its own ayoff function. In the rest of the aer, a user refers to one of the K transmitter-receiver airs in set K, and a layer refers to one of the K fictitious layers in the set FW FC. It follows from 11) and 1) that the AD algorithm 6) and 7)) can be interreted as if the layers in the F game emloy an asynchronous myoic best resonse MBS) udates, i.e. the layers udate their strategies according their best resonses assug the other users strategies are fixed at the time of the udates. It is nown that the fixed oints of MBS udates are the same as the NEs of a game see Lemma 4..1 in [6]). Lemma 3:, π ) F AD if and only if, π ) is a NE of the F game. It follows that roving the convergence of MBS udates of the F game are sufficient to rove the convergence of the AD algorithm to a solution of KKT conditions. We next analyze this convergence using suermodular game theory [6]. We first introduce some definitions 3. A twice differentiable function f has increasing differences between variables x, t) if f/ x t 0 for any feasible x and t. 4 AgameG = [K, { }, {s }] is suermodular if for each layer K, the strategy sace is a nonemty and comact subset of R, the ayoff function s is continuous in all layers strategies, and s has increasing differences between layer s strategy and any other layer s strategy. Several imortant roerties of suermodular games are summarized in the following theorem. Theorem 1: In a suermodular game G =[K, { }, {s }], a) There exists a NE. In case of multile NEs, there is a smallest one and largest one comonent-wise). b) If the users best resonses are single-valued functions, and each user starts from the smallest largest) element of the strategy sace and uses MBS udates, then the strategies monotonically converge to the smallest largest) NE. c) If each user starts from any feasible strategy and uses MBS udates, then the strategies will eventually lie in the set bounded comonent-wise by the smallest and largest NE. If there exists a unique NE, then the users strategies globally converge to that NE from any choice of initial strategies. roerties a) follows from Lemma 4..1 and 4.. in [6]; b) follows from Theorem 1 of [10] and c) can be shown by Theorem 8 in [16]. Next we show that by an aroriate strategy sace transformation, certain instances of the F game are equivalent 3 More general definitions related to suermodular games are given in [6]. 4 If we choose x to imize a twice differentiable function f x, t), then the first order condition gives f x, t) / x x=x =0, and the otimal value x increases with t if f/ x t > 0. to suermodular games, and so Theorem 1 alies. We first study a simle two-user networ, then extend the results to a K-user networ. A. Two-user networs Consider a networ with only two users. There are four layers in the corresonding F game, two in FW and two in FC. First, we chec whether the F game is a suermodular game. It is obvious that each user FW has a nonemty and comact strategy set, and so does each user FCif π <. This bounded rice restriction is not satisfied with some utilities such as u γ )=θ γ α /α with α [ 1, 0), since π = θ γ α+1 / h B) is not bounded as 0. However, since no user would transmit with zero ower at the NE otherwise the ayoff is ), we can bound π byalarge number that would never be reached by the AD algorithm. This would not imact any of the users choices, and so not change any of these results. The remaining increasing difference condition for the layers ayoff functions does not hold with the original definition of strategies, π) in the F game. For examle, from 9), / π j = h j < 0 for any j =, e.g. a higher rice leads the other users to decrease their owers. However, if we define π j = π j and let each user j FCchoose a π j from the strategy set [ π j, 0], then s FW / π j = h j > 0, s FW i.e. s FW ) has increasing differences between the strategies,π j or equivalently j, π j )). If we can redefine users strategies so that each layer s ayoff function has increasing differences between his transformed strategy and any other layer s transformed strategy, then the transformed F game will be suermodular. Let γ ={γ ) : j j, j K}and γ = {γ ) : j j, j K} for all K. Also define G γ )= γ u γ )/u γ ). Then, an increasing and strictly concave utility function u γ ) is defined to be Tye I if G γ ) [1, ], γ [ ] γ,γ ; Tye II if G γ ) 0, 1], γ [ ] γ,γ. The term G γ ) is called the coefficient of relative ris aversion in economics [15] and measures the relative concaveness of u γ ). Many common utility functions are either Tye I or Tye II. Examles of Tye I utility functions include u γ )=θ log γ ) and θ γ α /α with α [ 1, 0). Examles of Tye II utility functions include θ log γ ), θ log 1 + γ ), 1 e θ γ with θ <n 0 / h ))and θ γ α /α with α 0, 1]. The logarithmic utility function is both Tye I and II. A Tye I utility function is more concave than a Tye II one. Namely, an increase in one user s transmission ower would induce the other users to increase their owers i.e., s FW / j 0 for j =); a Tye II utility would have the oosite effect i.e., s FW / j 0 for j =). The strategy saces must be redefined in different ways for these two tyes of utility functions to satisfy the requirements of a suermodular game.

5 roosition 1: The F game for a two-user networ is a suermodular game in the transformed strategies 1,, π 1, π ) if both users have Tye I utility functions. roosition : The F game for a two-user networ is a suermodular game in the transformed strategies 1,,π 1, π ) if both users have Tye II utility functions. The roof of these roositions consist of checing the increasing differences conditions for each layer s ayoff function. These results along with Theorem 1 enable us to characterize the convergence of the AD algorithm. For examle, if the two users have Tye II utility functions and π 1, π < ), then F AD is nonemty. In case of multile fixed oints, there exist two extreme ones L, π L) and R, π R), which are the smallest and largest fixed oints in terms of the strategies 1,,π 1, π ). That is, for any fixed oint, π ), 1 [ ] L 1, R 1 and [ ] R, L. Similar relations hold for the rices. If users initialize 0), π 0)) at ) 1,, 0, π or 1,, π 1, 0 ), the ower and rices converge monotonically to L, π L) or R, π R), resectively. If users start from arbitrary initial ower and rices, then the strategies will eventually lie in the sace bounded by L, π L) and R, π R). Similar arguments can be made with Tye I utility functions with the corresonding strategy transformation. Transforg the F game into a suermodular game shows that the AD algorithm is a stable feedbac mechanism in the sense that the changes in owers and rices reinforce each other until a fixed oint is reached. Convergence of the transmit owers under both tyes of utilities is illustrated in Fig.. AD trajectories R Fixed oints Set L Initializations AD trajectories L Fixed oints Set R Initializations Fig.. A two-user networ with Tye I left) or Tye II right) utility functions. AD trajectories illustrate the monotonic convergence of the transmit owers. Convergence of the rices is not shown here.) Here we assume 1 = =0. B. K-user Networs roosition 1 can be easily generalized to a networ with K> users: Corollary 1: For a K-user networ, if all users have Tye I utilities, then G F is suermodular in the transformed strategies, π). In contrast, the transformed strategy used in roosition cannot be alied with K>users while assuring that the increasing differences roerty holds for every air of users. With logarithmic utility functions, it is shown in [5] that roblem 1 is a strictly concave imization roblem over the transformed variables y =log. In this case roblem 1 has a unique otimal solution, which is the only oint satisfying the KKT conditions. Thus, G F has a unique NE corresonding to this otimal solution, and the AD algorithm will converge to this oint from any initial choice of owers and rices. With some or additional conditions, the next roosition states that these roerties generalize to other Tye I utility functions. roosition 3: If for all K, > 0, andg γ ) [a, b] for all γ [γ,γ ], where[a, b] is a strict subset of [1, ], then roblem 1 has a unique otimal solution to which the AD algorithm globally converges. V. CONCLUSIONS We have resented a distributed ower control algorithm for SS wireless ad hoc networs. Each user announces a rice, which is associated with the KKT conditions for the total utility imization roblem. This leads to an asynchronous ower and rice adation algorithm, which requires only local nowledge of channel gains by each user. By interreting the algorithm as myoic best resonse udates of a fictitious game, convergence can be roved with an aroriate strategy transformation using suermodular game theory. For users with logarithmic utilities, the algorithm globally converges to the unique socially otimal solution. REFERENCES [1] F.. Kelly, A. Maulloo, and D. Tan, Rate control for communication networs: Shadow rices, roortional fairness and stability, Journal of Oerations Research Society, vol. 49, no. 3,. 37 5, March [] Y. Qiu and. Marbach, Bandwidth allocation in ad hoc networs: A rice-based aroach, in IEEE INFOCOM, 003. [3]. Marbach and R. Berry, Downlin resource allocation and ricing for wireless networs, in IEEE INFOCOM 00, New Yor, NY, 00. [4] T. M. Heiinen, On congestion ricing in a wireless networ, Wireless Networs, vol. 8, , 00. [5] M. Chiang, Balancing transort and hysical layers in wireless multiho networs: Jointly otimal congestion control and ower control, IEEE Journal on Selected Areas in Communications, vol. 3, no. 1, , Jan 005. [6] D. M. Tois, Suermodularity and Comlementarity. rinceton University ress, [7] E. Altman, T. Boulogne, R. El-Azouzi, T. Jimenez, and L. Wynter, A survey on networing games in telecommunications, Comuters and Oerations Research, in ress. [8] C. W. Sung and W. S. Wong, Lectures on Systems, Control and Information, Lectures at the Morningside Center of Mathematics. American Mathematical Society/International ress, 000, ch. Mathematical asects of the ower control roblem in mobile communication systems. [9] C. Saraydar, N. B. Mandayam, and D. J. Goodman, Efficient ower control via ricing in wireless data networs, IEEE Trans. on Communications, vol. 50, no., , Feb. 00. [10] E. Altman and Z. Altman, S-modular games and ower control in wireless networs, IEEE Trans. on Automatic Control, vol. 48, no. 5, , May 003. [11] T. Alcan, T. Basar, R. Sriant, and E. Altman, CDMA ulin ower control as a noncooerative game, Wireless Networs, vol. 8, , 00. [1] N. Shroff, M. Xiao, and E. Chong, Utility based ower control in cellular radio systems, in IEEE INFOCOM, Anchorage, USA, 001. [13] T. Holliday, A. J. Goldsmith,, and. Glynn, Distributed ower control for time varying wireless networs: Otimality and convergence, in roceedings: Allerton Conference on Communications, Control, and Comuting, 003. [14] D. Bertseas, Nonlinear rogramg, nd ed. Belmont, Massachusetts: Athena Scientific, [15] A. Mas-Colell, M. D. Whinston, and J. R. Green, Microeconomic Theory. Oxford University ress, [16]. Milgrom and J. Roberts, Rationalizability, learning and equilibrium in games with strategic comlementarities, Econometrica,vol.58,no.6, , 1990.

PERFORMANCE OF DISTRIBUTED UTILITY-BASED POWER CONTROL FOR WIRELESS AD HOC NETWORKS

PERFORMANCE OF DISTRIBUTED UTILITY-BASED POWER CONTROL FOR WIRELESS AD HOC NETWORKS PERFORMANCE OF DISTRIBUTED UTILITY-BASED POWER CONTROL FOR WIRELESS AD HOC NETWORKS Jianwei Huang, Randall Berry, Michael L. Honig Department of Electrical and Computer Engineering Northwestern University

More information

Spectrum Sharing with Distributed Interference Compensation

Spectrum Sharing with Distributed Interference Compensation Spectrum Sharing with Distributed Interference Compensation Jianwei Huang, Randall A. Berry, Michael L. Honig Department of ECE, Northwestern University 45 Sheridan Road, Evanston, IL 68, USA Email: {jianweih,

More information

Distributed Interference Compensation for Multi-channel Wireless Networks

Distributed Interference Compensation for Multi-channel Wireless Networks Distributed Interference Compensation for Multi-channel Wireless Networs Jianwei Huang, Randall Berry, Michael L. Honig Dept. of Electrical and Computer Engineering Northwestern University 2145 Sheridan

More information

A Pricing-Based Cooperative Spectrum Sharing Stackelberg Game

A Pricing-Based Cooperative Spectrum Sharing Stackelberg Game A Pricing-Based Cooerative Sectrum Sharing Stackelberg Game Ramy E. Ali, Karim G. Seddik, Mohammed Nafie, and Fadel F. Digham? Wireless Intelligent Networks Center (WINC), Nile University, Smart Village,

More information

INTERNET PID CONTROLLER DESIGN: M. Schlegel, M. Čech

INTERNET PID CONTROLLER DESIGN:  M. Schlegel, M. Čech INTERNET PID CONTROLLER DESIGN: WWW.PIDLAB.COM M. Schlegel, M. Čech Deartment of Cybernetics, University of West Bohemia in Pilsen fax : + 0403776350, e-mail : schlegel@kky.zcu.cz, mcech@kky.zcu.cz Abstract:

More information

Evolutionary Circuit Design: Information Theory Perspective on Signal Propagation

Evolutionary Circuit Design: Information Theory Perspective on Signal Propagation Evolutionary Circuit Design: Theory Persective on Signal Proagation Denis Poel Deartment of Comuter Science, Baker University, P.O. 65, Baldwin City, KS 66006, E-mail: oel@ieee.org Nawar Hakeem Deartment

More information

Economics of Strategy (ECON 4550) Maymester 2015 Foundations of Game Theory

Economics of Strategy (ECON 4550) Maymester 2015 Foundations of Game Theory Economics of Strategy (ECON 4550) Maymester 05 Foundations of Game Theory Reading: Game Theory (ECON 4550 Courseak, Page 95) Definitions and Concets: Game Theory study of decision making settings in which

More information

Uplink Scheduling in Wireless Networks with Successive Interference Cancellation

Uplink Scheduling in Wireless Networks with Successive Interference Cancellation 1 Ulink Scheduling in Wireless Networks with Successive Interference Cancellation Majid Ghaderi, Member, IEEE, and Mohsen Mollanoori, Student Member, IEEE, Abstract In this aer, we study the roblem of

More information

Efficient Importance Sampling for Monte Carlo Simulation of Multicast Networks

Efficient Importance Sampling for Monte Carlo Simulation of Multicast Networks Efficient Imortance Samling for Monte Carlo Simulation of Multicast Networks P. Lassila, J. Karvo and J. Virtamo Laboratory of Telecommunications Technology Helsinki University of Technology P.O.Box 3000,

More information

and assigned priority levels in accordance with the QoS requirements of their applications.

and assigned priority levels in accordance with the QoS requirements of their applications. Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm Vasco Quintyne *, Adrian Als Deartment of Comuter Science, Physics and Mathematics University of the West Indies

More information

Joint Tx/Rx Energy-Efficient Scheduling in Multi-Radio Networks: A Divide-and-Conquer Approach

Joint Tx/Rx Energy-Efficient Scheduling in Multi-Radio Networks: A Divide-and-Conquer Approach Joint Tx/Rx Energy-Efficient Scheduling in Multi-Radio Networs: A Divide-and-Conquer Aroach Qingqing Wu, Meixia Tao, and Wen Chen Deartment of Electronic Engineering, Shanghai Jiao Tong University, Shanghai,

More information

Computational Complexity of Generalized Push Fight

Computational Complexity of Generalized Push Fight Comutational Comlexity of Generalized Push Fight Jeffrey Bosboom Erik D. Demaine Mikhail Rudoy Abstract We analyze the comutational comlexity of otimally laying the two-layer board game Push Fight, generalized

More information

CHAPTER 5 INTERNAL MODEL CONTROL STRATEGY. The Internal Model Control (IMC) based approach for PID controller

CHAPTER 5 INTERNAL MODEL CONTROL STRATEGY. The Internal Model Control (IMC) based approach for PID controller CHAPTER 5 INTERNAL MODEL CONTROL STRATEGY 5. INTRODUCTION The Internal Model Control (IMC) based aroach for PID controller design can be used to control alications in industries. It is because, for ractical

More information

Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation

Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation International Journal Of Comutational Engineering Research (ijceronline.com) Vol. 2 Issue. Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation Rajbir Kaur 1, Charanjit

More information

Random Access Compressed Sensing in Underwater Sensor Networks

Random Access Compressed Sensing in Underwater Sensor Networks Random Access Comressed Sensing in Underwater Sensor Networks Fatemeh Fazel Northeastern University Boston, MA 2115 Email: ffazel@ece.neu.edu Maryam Fazel University of Washington Seattle, WA 98195 Email:

More information

Primary User Enters the Game: Performance of Dynamic Spectrum Leasing in Cognitive Radio Networks

Primary User Enters the Game: Performance of Dynamic Spectrum Leasing in Cognitive Radio Networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO., DECEMBER 365 Primary User Enters the Game: Performance of Dynamic Sectrum Leasing in Cognitive Radio Networks Gonzalo Vazquez-Vilar, Student Member,

More information

Dynamic Gambling under Loss Aversion

Dynamic Gambling under Loss Aversion Dynamic Gambling under Loss Aversion Yair Antler University of Essex November 22, 2017 Abstract A loss-averse gambler faces an infinite sequence of identical unfair lotteries and decides in which of these

More information

Downlink Power Allocation for Multi-class CDMA Wireless Networks

Downlink Power Allocation for Multi-class CDMA Wireless Networks Downlin Power Allocation for Multi-class CDMA Wireless Networs Jang Won Lee, Ravi R. Mazumdar and Ness B. Shroff School of Electrical and Computer Engineering Purdue University West Lafayette, IN 47907,

More information

Energy-Efficient Power and Rate Control with QoS Constraints: A Game-Theoretic Approach

Energy-Efficient Power and Rate Control with QoS Constraints: A Game-Theoretic Approach Energy-Efficient Power and Rate Control with QoS Constraints: A Game-Theoretic Approach Farhad Meshati, H. Vincent Poor, Stuart C. Schwartz Department of Electrical Engineering Princeton University, Princeton,

More information

An Overview of PAPR Reduction Optimization Algorithm for MC-CDMA System

An Overview of PAPR Reduction Optimization Algorithm for MC-CDMA System RESEARCH ARTICLE OPEN ACCESS An Overview of PAPR Reduction Otimization Algorithm for MC-CDMA System Kanchan Singla*, Rajbir Kaur**, Gagandee Kaur*** *(Deartment of Electronics and Communication, Punjabi

More information

Prediction Efficiency in Predictive p-csma/cd

Prediction Efficiency in Predictive p-csma/cd Prediction Efficiency in Predictive -CSMA/CD Mare Miśowicz AGH University of Science and Technology, Deartment of Electronics al. Miciewicza 30, 30-059 Kraów, Poland misow@agh.edu.l Abstract. Predictive

More information

Capacity Gain From Two-Transmitter and Two-Receiver Cooperation

Capacity Gain From Two-Transmitter and Two-Receiver Cooperation 3822 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 Caacity Gain From Two-Transmitter and Two-Receiver Cooeration Chris T. K. Ng, Student Member, IEEE, Nihar Jindal, Member, IEEE,

More information

Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes

Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes 22 IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes Amy Fu and Parastoo Sadeghi The Australian National

More information

Indirect Channel Sensing for Cognitive Amplify-and-Forward Relay Networks

Indirect Channel Sensing for Cognitive Amplify-and-Forward Relay Networks Indirect Channel Sensing for Cognitive Amlify-and-Forward Relay Networs Yieng Liu and Qun Wan Abstract In cognitive radio networ the rimary channel information is beneficial. But it can not be obtained

More information

Analysis of Mean Access Delay in Variable-Window CSMA

Analysis of Mean Access Delay in Variable-Window CSMA Sensors 007, 7, 3535-3559 sensors ISSN 44-80 007 by MDPI www.mdi.org/sensors Full Research Paer Analysis of Mean Access Delay in Variable-Window CSMA Marek Miśkowicz AGH University of Science and Technology,

More information

Product Accumulate Codes on Fading Channels

Product Accumulate Codes on Fading Channels Product Accumulate Codes on Fading Channels Krishna R. Narayanan, Jing Li and Costas Georghiades Det of Electrical Engineering Texas A&M University, College Station, TX 77843 Abstract Product accumulate

More information

Joint Frame Design, Resource Allocation and User Association for Massive MIMO Heterogeneous Networks with Wireless Backhaul

Joint Frame Design, Resource Allocation and User Association for Massive MIMO Heterogeneous Networks with Wireless Backhaul IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL.XXX, NO.XXX, MONTH YEAR 1 Joint Frame Design, Resource Allocation and User Association for Massive MIMO Heterogeneous Networks with Wireless Backhaul Mingjie

More information

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)

More information

A Genetic Algorithm Approach for Sensorless Speed Estimation by using Rotor Slot Harmonics

A Genetic Algorithm Approach for Sensorless Speed Estimation by using Rotor Slot Harmonics A Genetic Algorithm Aroach for Sensorless Seed Estimation by using Rotor Slot Harmonics Hayri Arabaci Abstract In this aer a sensorless seed estimation method with genetic algorithm for squirrel cage induction

More information

Wireless Network Pricing Chapter 7: Network Externalities

Wireless Network Pricing Chapter 7: Network Externalities Wireless Network Pricing Chapter 7: Network Externalities Jianwei Huang & Lin Gao Network Communications and Economics Lab (NCEL) Information Engineering Department The Chinese University of Hong Kong

More information

SPACE-FREQUENCY CODED OFDM FOR UNDERWATER ACOUSTIC COMMUNICATIONS

SPACE-FREQUENCY CODED OFDM FOR UNDERWATER ACOUSTIC COMMUNICATIONS SPACE-FREQUENCY CODED OFDM FOR UNDERWATER ACOUSTIC COMMUNICATIONS E. V. Zorita and M. Stojanovic MITSG 12-35 Sea Grant College Program Massachusetts Institute of Technology Cambridge, Massachusetts 02139

More information

The Optimization Model and Algorithm for Train Connection at Transfer Stations in Urban Rail Transit Network

The Optimization Model and Algorithm for Train Connection at Transfer Stations in Urban Rail Transit Network Send Orders for Rerints to rerints@benthamscienceae 690 The Oen Cybernetics & Systemics Journal, 05, 9, 690-698 Oen Access The Otimization Model and Algorithm for Train Connection at Transfer Stations

More information

EE 462: Laboratory Assignment 5 Biasing N- channel MOSFET Transistor

EE 462: Laboratory Assignment 5 Biasing N- channel MOSFET Transistor EE 46: Laboratory Assignment 5 Biasing N channel MOFET Transistor by r. A.V. adun and r... onohue (/1/07 Udated ring 008 by tehen Maloney eartment of Elecical and Comuter Engineering University of entucky

More information

University of Twente

University of Twente University of Twente Faculty of Electrical Engineering, Mathematics & Comuter Science Design of an audio ower amlifier with a notch in the outut imedance Remco Twelkemeijer MSc. Thesis May 008 Suervisors:

More information

Optimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm

Optimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm o Otimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm Nirvana S. Antonio, Cícero F. F. Costa Filho, Marly G. F. Costa, Rafael Padilla Abstract In 4-sided dominoes,

More information

Adaptive Pilot Design for Massive MIMO HetNets with Wireless Backhaul

Adaptive Pilot Design for Massive MIMO HetNets with Wireless Backhaul Adative Pilot Design for Massive MIMO HetNets with Wireless Backhaul Mingjie Feng and Shiwen Mao Det. Electrical & Comuter Engineering, Auburn University, Auburn, AL 36849-5201, USA Email: mzf0022@auburn.edu,

More information

Servo Mechanism Technique based Anti-Reset Windup PI Controller for Pressure Process Station

Servo Mechanism Technique based Anti-Reset Windup PI Controller for Pressure Process Station Indian Journal of Science and Technology, Vol 9(11), DOI: 10.17485/ijst/2016/v9i11/89298, March 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Servo Mechanism Technique based Anti-Reset Windu

More information

Antenna Selection Scheme for Wireless Channels Utilizing Differential Space-Time Modulation

Antenna Selection Scheme for Wireless Channels Utilizing Differential Space-Time Modulation Antenna Selection Scheme for Wireless Channels Utilizing Differential Sace-Time Modulation Le Chung Tran and Tadeusz A. Wysocki School of Electrical, Comuter and Telecommunications Engineering Wollongong

More information

MLSE Diversity Receiver for Partial Response CPM

MLSE Diversity Receiver for Partial Response CPM MLSE Diversity Receiver for Partial Resonse CPM Li Zhou, Philia A. Martin, Desmond P. Taylor, Clive Horn Deartment of Electrical and Comuter Engineering University of Canterbury, Christchurch, New Zealand

More information

Operating Characteristics of Underlay Cognitive Relay Networks

Operating Characteristics of Underlay Cognitive Relay Networks Oerating Characteristics of Underlay Cognitive Relay Networks Ankit Kaushik, Ralh Tanbourgi, Friedrich Jondral Communications Engineering Lab Karlsruhe Institute of Technology (KIT) {Ankit.Kaushik, Ralh.Tanbourgi,

More information

Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional Spread-Spectrum Systems

Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional Spread-Spectrum Systems I TRANSACTIONS ON CIRCUITS AND SYTMS I: FUNDAMNTAL THORY AND APPLICATIONS, VOL. 50, NO., NOVMBR 2003 475 Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional

More information

EXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER

EXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER YEDITEPE UNIVERSITY ENGINEERING & ARCHITECTURE FACULTY INDUSTRIAL ELECTRONICS LABORATORY EE 432 INDUSTRIAL ELECTRONICS EXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER Introduction:

More information

Optimal p-persistent MAC algorithm for event-driven Wireless Sensor Networks

Optimal p-persistent MAC algorithm for event-driven Wireless Sensor Networks Otimal -ersistent MAC algorithm for event-driven Wireless Sensor Networks J. Vales-Alonso,E.Egea-Lóez, M. V. Bueno-Delgado, J. L. Sieiro-Lomba, J. García-Haro Deartment of Information Technologies and

More information

Design of PID Controller Based on an Expert System

Design of PID Controller Based on an Expert System International Journal of Comuter, Consumer and Control (IJ3C), Vol. 3, No.1 (014) 31 Design of PID Controller Based on an Exert System Wei Li Abstract For the instability of traditional control systems,

More information

An Overview of Substrate Noise Reduction Techniques

An Overview of Substrate Noise Reduction Techniques An Overview of Substrate Noise Reduction Techniques Shahab Ardalan, and Manoj Sachdev ardalan@ieee.org, msachdev@ece.uwaterloo.ca Deartment of Electrical and Comuter Engineering University of Waterloo

More information

Adaptive Switching between Spatial Diversity and Multiplexing: a Cross-layer Approach

Adaptive Switching between Spatial Diversity and Multiplexing: a Cross-layer Approach Adative Switching between Satial Diversity and ultilexing: a Cross-layer Aroach José Lóez Vicario and Carles Antón-Haro Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) c/ Gran Caità -4, 08034

More information

TO IMPROVE BIT ERROR RATE OF TURBO CODED OFDM TRANSMISSION OVER NOISY CHANNEL

TO IMPROVE BIT ERROR RATE OF TURBO CODED OFDM TRANSMISSION OVER NOISY CHANNEL TO IMPROVE BIT ERROR RATE OF TURBO CODED TRANSMISSION OVER NOISY CHANNEL 1 M. K. GUPTA, 2 VISHWAS SHARMA. 1 Deartment of Electronic Instrumentation and Control Engineering, Jagannath Guta Institute of

More information

Hydro-turbine governor control: theory, techniques and limitations

Hydro-turbine governor control: theory, techniques and limitations University of Wollongong Research Online Faculty of Engineering and Information Sciences - Paers: Part A Faculty of Engineering and Information Sciences 006 Hydro-turbine governor control: theory, techniques

More information

A Multi-View Nonlinear Active Shape Model Using Kernel PCA

A Multi-View Nonlinear Active Shape Model Using Kernel PCA A Multi-View Nonlinear Active Shae Model Using Kernel PCA Sami Romdhani y, Shaogang Gong z and Alexandra Psarrou y y Harrow School of Comuter Science, University of Westminster, Harrow HA1 3TP, UK [rodhams

More information

Joint Rate and Power Control Using Game Theory

Joint Rate and Power Control Using Game Theory This full text paper was peer reviewed at the direction of IEEE Communications Society subect matter experts for publication in the IEEE CCNC 2006 proceedings Joint Rate and Power Control Using Game Theory

More information

ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM

ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM Kaushal Patel 1 1 M.E Student, ECE Deartment, A D Patel Institute of Technology, V. V. Nagar, Gujarat, India ABSTRACT Today, in

More information

Ultra Wideband System Performance Studies in AWGN Channel with Intentional Interference

Ultra Wideband System Performance Studies in AWGN Channel with Intentional Interference Ultra Wideband System Performance Studies in AWGN Channel with Intentional Interference Matti Hämäläinen, Raffaello Tesi, Veikko Hovinen, Niina Laine, Jari Iinatti Centre for Wireless Communications, University

More information

Secondary Transceiver Design in the Presence of Frequency Offset between OFDM-based Primary and Secondary Systems

Secondary Transceiver Design in the Presence of Frequency Offset between OFDM-based Primary and Secondary Systems Secondary Transceiver Design in the Presence of Frequency Offset between OFDM-based Primary and Secondary Systems Zhikun Xu and Chenyang Yang School of Electronics and Information Engineering, Beihang

More information

Transmitter Antenna Diversity and Adaptive Signaling Using Long Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1

Transmitter Antenna Diversity and Adaptive Signaling Using Long Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1 Transmitter Antenna Diversity and Adative Signaling Using ong Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1 Shengquan Hu, Tugay Eyceoz, Alexandra Duel-Hallen North Carolina State University

More information

LDPC-Coded MIMO Receiver Design Over Unknown Fading Channels

LDPC-Coded MIMO Receiver Design Over Unknown Fading Channels LDPC-Coded MIMO Receiver Design Over Unknown Fading Channels Jun Zheng and Bhaskar D. Rao University of California at San Diego Email: juzheng@ucsd.edu, brao@ece.ucsd.edu Abstract We consider an LDPC-coded

More information

Circular Dynamic Stereo and Its Image Processing

Circular Dynamic Stereo and Its Image Processing Circular Dynamic Stereo and Its Image Processing Kikuhito KAWASUE *1 and Yuichiro Oya *2 *1 Deartment of Mechanical Systems Engineering Miyazaki University 1-1, Gakuen Kibanadai Nishi, Miyazaki 889-2192

More information

802.11b White Paper. Table of Contents. VOCAL Technologies, Ltd. Home page

802.11b White Paper. Table of Contents. VOCAL Technologies, Ltd. Home page VOCAL Technologies, Ltd. Home age 802.b White Paer Table of Contents Page. 802.b Glossary... 2 2. Introduction to 802.b... 3 3. 802.b Overview... 6 4. CCK used in 802.b... 7 5. Walsh and Comlementary Codes

More information

Is 1 a Square Modulo p? Is 2?

Is 1 a Square Modulo p? Is 2? Chater 21 Is 1 a Square Modulo? Is 2? In the revious chater we took various rimes and looked at the a s that were quadratic residues and the a s that were nonresidues. For examle, we made a table of squares

More information

Performance Analysis of LTE Downlink under Symbol Timing Offset

Performance Analysis of LTE Downlink under Symbol Timing Offset Performance Analysis of LTE Downlink under Symbol Timing Offset Qi Wang, Michal Šimko and Markus Ru Institute of Telecommunications, Vienna University of Technology Gusshausstrasse 25/389, A-1040 Vienna,

More information

PERFORMANCE IMPROVEMENT OF MANETS

PERFORMANCE IMPROVEMENT OF MANETS PERFORMANCE IMPROVEMENT OF MANETS WITH LINK LIFETIME Merlinda Drini, Queensborough Community College/CUNY; Tare Saadawi, City College of New Yor Abstract There are many different factors in the hysical

More information

Application Note D. Dynamic Torque Measurement

Application Note D. Dynamic Torque Measurement Page 1 of 9 Alication Note 221101D Dynamic Torque Measurement Background Rotary ower sources and absorbers have discrete oles and/or istons and/or gear meshes, etc. As a result, they develo and absorb

More information

Technical and Economic Feasibility of Passive Shielding Used to Mitigate Power Lines Magnetic Fields

Technical and Economic Feasibility of Passive Shielding Used to Mitigate Power Lines Magnetic Fields Technical and Economic Feasibility of Passive Shielding Used to Mitigate Power Lines Magnetic Fields AHMED R. SAYED, HUSSEIN I. ANIS Electrical Power and Machine Deartment Cairo University Giza EGYPT eng_ahmed.rabee@eng.cu.edu.eg,

More information

Chapter 7 Local Navigation: Obstacle Avoidance

Chapter 7 Local Navigation: Obstacle Avoidance Chater 7 Local Navigation: Obstacle Avoidance A mobile robot must navigate from one oint to another in its environment. This can be a simle task, for examle, if a robot can follow an unobstructed line

More information

Influence of Earth Conductivity and Permittivity Frequency Dependence in Electromagnetic Transient Phenomena

Influence of Earth Conductivity and Permittivity Frequency Dependence in Electromagnetic Transient Phenomena Influence of Earth Conductivity and Permittivity Frequency Deendence in Electromagnetic Transient Phenomena C. M. Portela M. C. Tavares J. Pissolato ortelac@ism.com.br cristina@sel.eesc.sc.us.br isso@dt.fee.unicam.br

More information

Study on Power and Rate Control Algorithm for Cognitive Wireless. Networks

Study on Power and Rate Control Algorithm for Cognitive Wireless. Networks WSEAS TANSATONS on OMMUNATONS Qian Hu Zhenzhou Tang Study on Power and ate ontrol Algorithm or ognitive Wireless Networs QAN HU and ZHENZHOU TANG ollege o Physics and Electronic normation Wenzhou University

More information

Multi-period Channel Assignment

Multi-period Channel Assignment Multi-eriod Channel Assignment Hakim Mabed, Alexandre Caminada and Jin-Kao Hao 2 France Télécom R&D, 6 Avenue des Usines, BP 382, 97 Belfort, France {hakim.mabed,alexandre.caminada}@francetelecm.com Tel:

More information

Multi-TOA Based Position Estimation for IR-UWB

Multi-TOA Based Position Estimation for IR-UWB Multi-TOA Based Position Estimation for IR-UWB Genís Floriach, Montse Nájar and Monica Navarro Deartment of Signal Theory and Communications Universitat Politècnica de Catalunya (UPC), Barcelona, Sain

More information

Initial Ranging for WiMAX (802.16e) OFDMA

Initial Ranging for WiMAX (802.16e) OFDMA Initial Ranging for WiMAX (80.16e) OFDMA Hisham A. Mahmoud, Huseyin Arslan Mehmet Kemal Ozdemir Electrical Engineering Det., Univ. of South Florida Logus Broadband Wireless Solutions 40 E. Fowler Ave.,

More information

A toy-model for the regulation of cognitive radios

A toy-model for the regulation of cognitive radios A toy-model for the regulation of cognitive radios Kristen Woyach and Anant Sahai Wireless Foundations Deartment of EECS University of California at Berkeley Email: {kwoyach, sahai}@eecs.berkeley.edu Abstract

More information

Control of Grid Integrated Voltage Source Converters under Unbalanced Conditions

Control of Grid Integrated Voltage Source Converters under Unbalanced Conditions Jon Are Suul Control of Grid Integrated Voltage Source Converters under Unbalanced Conditions Develoment of an On-line Frequency-adative Virtual Flux-based Aroach Thesis for the degree of Philosohiae Doctor

More information

Statistical Evaluation of the Azimuth and Elevation Angles Seen at the Output of the Receiving Antenna

Statistical Evaluation of the Azimuth and Elevation Angles Seen at the Output of the Receiving Antenna IEEE TANSACTIONS ON ANTENNAS AND POPAGATION 1 Statistical Evaluation of the Azimuth and Elevation Angles Seen at the Outut of the eceiving Antenna Cezary Ziółkowski and an M. Kelner Abstract A method to

More information

Postprocessed time-delay interferometry for LISA

Postprocessed time-delay interferometry for LISA PHYSICAL REVIEW D, VOLUME 70, 081101(R) Postrocessed time-delay interferometry for LISA D. A. Shaddock,* B. Ware, R. E. Sero, and M. Vallisneri Jet Proulsion Laboratory, California Institute of Technology,

More information

JOINT COMPENSATION OF OFDM TRANSMITTER AND RECEIVER IQ IMBALANCE IN THE PRESENCE OF CARRIER FREQUENCY OFFSET

JOINT COMPENSATION OF OFDM TRANSMITTER AND RECEIVER IQ IMBALANCE IN THE PRESENCE OF CARRIER FREQUENCY OFFSET JOINT COMPENSATION OF OFDM TRANSMITTER AND RECEIVER IQ IMBALANCE IN THE PRESENCE OF CARRIER FREQUENCY OFFSET Deeaknath Tandur, and Marc Moonen ESAT/SCD-SISTA, KULeuven Kasteelark Arenberg 10, B-3001, Leuven-Heverlee,

More information

IEEE/ACM TRANSACTIONS ON NETWORKING 1

IEEE/ACM TRANSACTIONS ON NETWORKING 1 IEEE/ACM TRANSACTIONS ON NETWORKING 1 Otimal Power Allocation and Scheduling Under Jamming Attacks Salvatore D Oro, Eylem Ekici, and Sergio Palazzo Abstract In this aer, we consider a jammed wireless scenario

More information

Performance Analysis of Battery Power Management Schemes in Wireless Mobile. Devices

Performance Analysis of Battery Power Management Schemes in Wireless Mobile. Devices Performance Analysis of Battery Power Management Schemes in Wireless Mobile Devices Balakrishna J Prabhu, A Chockalingam and Vinod Sharma Det of ECE, Indian Institute of Science, Bangalore, INDIA Abstract

More information

Optimal Resource Allocation for OFDM Uplink Communication: A Primal-Dual Approach

Optimal Resource Allocation for OFDM Uplink Communication: A Primal-Dual Approach Optimal Resource Allocation for OFDM Uplink Communication: A Primal-Dual Approach Minghua Chen and Jianwei Huang The Chinese University of Hong Kong Acknowledgement: R. Agrawal, R. Berry, V. Subramanian

More information

Math 124 Homework 5 Solutions

Math 124 Homework 5 Solutions Math 12 Homework 5 Solutions by Luke Gustafson Fall 2003 1. 163 1 2 (mod 2 gives = 2 the smallest rime. 2a. First, consider = 2. We know 2 is not a uadratic residue if and only if 3, 5 (mod 8. By Dirichlet

More information

Figure 1 7-chip Barker Coded Waveform

Figure 1 7-chip Barker Coded Waveform 3.0 WAVEFOM CODING 3.1 Introduction We now want to loo at waveform coding. We secifically want to loo at hase and frequency coding. Our first exosure to waveform coding was our study of LFM ulses. In that

More information

Beamformings for Spectrum Sharing in Cognitive Radio Networks

Beamformings for Spectrum Sharing in Cognitive Radio Networks Raungrong Suleesathira, Satit Puranachieeree Beamformings for Sectrum Sharing in Cognitive Radio Networs Raungrong Suleesathira * and Satit Puranachieeree Deartment of Electronic and Telecommunication

More information

Power Control and Utility Optimization in Wireless Communication Systems

Power Control and Utility Optimization in Wireless Communication Systems Power Control and Utility Optimization in Wireless Communication Systems Dimitrie C. Popescu and Anthony T. Chronopoulos Electrical Engineering Dept. Computer Science Dept. University of Texas at San Antonio

More information

Underwater acoustic channel model and variations due to changes in node and buoy positions

Underwater acoustic channel model and variations due to changes in node and buoy positions Volume 24 htt://acousticalsociety.org/ 5th Pacific Rim Underwater Acoustics Conference Vladivostok, Russia 23-26 Setember 2015 Underwater acoustic channel model and variations due to changes in node and

More information

Performance Analysis of MIMO System using Space Division Multiplexing Algorithms

Performance Analysis of MIMO System using Space Division Multiplexing Algorithms Performance Analysis of MIMO System using Sace Division Multilexing Algorithms Dr.C.Poongodi 1, Dr D Deea, M. Renuga Devi 3 and N Sasireka 3 1, Professor, Deartment of ECE 3 Assistant Professor, Deartment

More information

Energy-Optimized Low-Complexity Control of Power and Rate in Clustered CDMA Sensor Networks with Multirate Constraints

Energy-Optimized Low-Complexity Control of Power and Rate in Clustered CDMA Sensor Networks with Multirate Constraints Energy-Optimized Low-Complexity Control of Power and Rate in Clustered CDMA Sensor Networs with Multirate Constraints Chun-Hung Liu Department of Electrical and Computer Engineering The University of Texas

More information

Distributed Approaches for Exploiting Multiuser Diversity in Wireless Networks

Distributed Approaches for Exploiting Multiuser Diversity in Wireless Networks Southern Illinois University Carbondale OpenSIUC Articles Department of Electrical and Computer Engineering 2-2006 Distributed Approaches for Exploiting Multiuser Diversity in Wireless Networks Xiangping

More information

Properties of Mobile Tactical Radio Networks on VHF Bands

Properties of Mobile Tactical Radio Networks on VHF Bands Proerties of Mobile Tactical Radio Networks on VHF Bands Li Li, Phil Vigneron Communications Research Centre Canada Ottawa, Canada li.li@crc.gc.ca / hil.vigneron@crc.gc.ca ABSTRACT This work extends a

More information

THE HELMHOLTZ RESONATOR TREE

THE HELMHOLTZ RESONATOR TREE THE HELMHOLTZ RESONATOR TREE Rafael C. D. Paiva and Vesa Välimäki Deartment of Signal Processing and Acoustics Aalto University, School of Electrical Engineering Esoo, Finland rafael.dias.de.aiva@aalto.fi

More information

Improved Water-Filling Power Allocation for Energy-Efficient Massive MIMO Downlink Transmissions

Improved Water-Filling Power Allocation for Energy-Efficient Massive MIMO Downlink Transmissions INTL JOUNAL OF ELECTONICS AND TELECOMMUNICATIONS, 17, VOL. 63, NO. 1,. 79-84 Manuscrit received October 7, 16; revised December, 16. DOI: 1.1515/eletel-17-11 Imroved Water-Filling ower Allocation for Energy-Efficient

More information

2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 200 IEEE. Personal use of this material is ermitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including rerinting/reublishing this material for advertising

More information

Jamming Games for Power Controlled Medium Access with Dynamic Traffic

Jamming Games for Power Controlled Medium Access with Dynamic Traffic Jamming Games for Power Controlled Medium Access with Dynamic Traffic Yalin Evren Sagduyu Intelligent Automation Inc. Rockville, MD 855, USA, and Institute for Systems Research University of Maryland College

More information

Origins of Stator Current Spectra in DFIGs with Winding Faults and Excitation Asymmetries

Origins of Stator Current Spectra in DFIGs with Winding Faults and Excitation Asymmetries Origins of Stator Current Sectra in DFIGs with Wing Faults and Excitation Asymmetries S. Williamson * and S. Djurović * University of Surrey, Guildford, Surrey GU2 7XH, United Kingdom School of Electrical

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

DOWNLINK TRANSMITTER ADAPTATION BASED ON GREEDY SINR MAXIMIZATION. Dimitrie C. Popescu, Shiny Abraham, and Otilia Popescu

DOWNLINK TRANSMITTER ADAPTATION BASED ON GREEDY SINR MAXIMIZATION. Dimitrie C. Popescu, Shiny Abraham, and Otilia Popescu DOWNLINK TRANSMITTER ADAPTATION BASED ON GREEDY SINR MAXIMIZATION Dimitrie C Popescu, Shiny Abraham, and Otilia Popescu ECE Department Old Dominion University 231 Kaufman Hall Norfol, VA 23452, USA ABSTRACT

More information

Self-Driven Phase Shifted Full Bridge Converter for Telecom Applications

Self-Driven Phase Shifted Full Bridge Converter for Telecom Applications Self-Driven Phase Shifted Full Bridge Converter for Telecom Alications SEVILAY CETIN Technology Faculty Pamukkale University 7 Kinikli Denizli TURKEY scetin@au.edu.tr Abstract: - For medium ower alications,

More information

A Novel, Robust DSP-Based Indirect Rotor Position Estimation for Permanent Magnet AC Motors Without Rotor Saliency

A Novel, Robust DSP-Based Indirect Rotor Position Estimation for Permanent Magnet AC Motors Without Rotor Saliency IEEE TANSACTIONS ON POWE EECTONICS, VO. 18, NO. 2, MACH 2003 539 A Novel, obust DSP-Based Indirect otor Position Estimation for Permanent Magnet AC Motors Without otor Saliency i Ying and Nesimi Ertugrul,

More information

RICIAN FADING DISTRIBUTION FOR 40GHZ CHANNELS

RICIAN FADING DISTRIBUTION FOR 40GHZ CHANNELS Jan 006 RICIAN FADING DISTRIBUTION FOR 40GHZ CHANNELS.0 Background and Theory Amlitude fading in a general multiath environment may follow different distributions deending recisely on the area covered

More information

arxiv: v1 [eess.sp] 10 Apr 2018

arxiv: v1 [eess.sp] 10 Apr 2018 Sensing Hidden Vehicles by Exloiting Multi-Path V2V Transmission Kaifeng Han, Seung-Woo Ko, Hyukjin Chae, Byoung-Hoon Kim, and Kaibin Huang Det. of EEE, The University of Hong Kong, Hong Kong LG Electronics,

More information

Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks

Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Color of Interference and Joint Encoding and Medium Access in Large Wireless Networks Nithin Sugavanam, C. Emre Koksal, Atilla Eryilmaz Department of Electrical and Computer Engineering The Ohio State

More information

An Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ

An Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ An Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ Rong Lin y Koji Nakano z Stehan Olariu x Albert Y. Zomaya Abstract We roose an efficient reconfigurable arallel refix counting

More information

RECOMMENDATION ITU-R SF

RECOMMENDATION ITU-R SF Rec. ITU-R SF.1649-1 1 RECOMMENDATION ITU-R SF.1649-1 Guidance for determination of interference from earth stations on board vessels to stations in the fixed service when the earth station on board vessels

More information

WIRELESS communication channels vary over time

WIRELESS communication channels vary over time 1326 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 4, APRIL 2005 Outage Capacities Optimal Power Allocation for Fading Multiple-Access Channels Lifang Li, Nihar Jindal, Member, IEEE, Andrea Goldsmith,

More information