Reliable Local Broadcast in a Wireless Network Prone to Byzantine Failures

Size: px
Start display at page:

Download "Reliable Local Broadcast in a Wireless Network Prone to Byzantine Failures"

Transcription

1 Reliable Local Broadcat in a Wirele Network Prone to Byzantine Failure ABSTRACT Vartika Bhandari Dept. of Computer Science, and Coordinated Science Laboratory Univerity of Illinoi at Urbana-Champaign vbhandar@uiuc.edu Reliable broadcat can be a very ueful primitive for many ditributed application, epecially in the context of enoractuator network. Recently, the iue of reliable broadcat ha been addreed in the context of the radio network model that i characterized by a hared channel, and where a tranmiion i heard by all node within the ender neighborhood. Thi baic defining feature of the radio network model can be termed a the reliable local broadcat aumption. However, in actuality, wirele network do not exhibit uch perfect and predictable behavior. Thu any attempt at ditributed protocol deign for multi-hop wirele network baed on the idealized radio network model require the availability of a reliable local broadcat primitive that can provide guarantee of uch idealized behavior. We preent a imple proof-of-concept approach toward the implementation of a reliable local broadcat primitive with probabilitic guarantee, with the intent to highlight the potential for lightweight calable olution to achieve probabilitic reliable local broadcat in a wirele network. Categorie and Subject Decriptor C.2.1 [Computer Communication Network]: Network Architecture and Deign Wirele communication; C.2.4 [Computer-Communication Network]: Ditributed Sytem; C.4 [Performance of Sytem]: Fault Tolerance General Term Algorithm, Reliability Keyword Wirele Network, Byzantine failure, Local Broadcat, Fault Tolerance Thi reearch wa upported in part by the National Science Foundation, US Army Reearch Office grant W911NF , and a Vodafone Graduate Fellowhip. Permiion to make digital or hard copie of all or part of thi work for peronal or claroom ue i granted without fee provided that copie are not made or ditributed for profit or commercial advantage and that copie bear thi notice and the full citation on the firt page. To copy otherwie, to republih, to pot on erver or to reditribute to lit, require prior pecific permiion and/or a fee. Copyright 200X ACM X-XXXXX-XX-X/XX/XX...$5.00. Nitin H. Vaidya Dept. of Electrical and Computer Eng., and Coordinated Science Laboratory Univerity of Illinoi at Urbana-Champaign nhv@uiuc.edu 1. INTRODUCTION A deployment and ue of wirele network for variou role, ranging from community meh network to enor network, become increaingly common, the reliability of communication in thee network i of growing concern. Reliable communication in wirele network i fairly non-trivial, in large part due to ignificant time-variation in channel quality and the poibility of interference/colliion becaue of the hared nature of the medium. One of the iue in thi regard i that of achieving reliable broadcat in a wirele network, given that ome node may exhibit Byzantine failure. The ability to perform thi operation can be extremely ueful, epecially in the context of enor-actuator network, where node may need to perform ome coordinated action baed on a conitent view of event ened by individual node. Recent theoretical work on Byzantine fault-tolerant broadcat in radio network [11], [1], [2], [3] aume that if a node tranmit a meage it i received by each and every node within a deignated neighborhood in it patial vicinity. Thi eliminate the potential for duplicity and enure local agreement a follow: when the ender i non-faulty, agreement i trivial, ince all non-faulty neighbor of a nonfaulty ender receive the meage directly. If the ender i faulty and end multiple conflicting copie of the meage, all non-faulty neighbor receive all meage in the ame order, and can agree on one (ay the firt). While thi model reflect the hared nature of the wirele medium, it fail to capture it unreliability. The wirele medium can be extremely unreliable, and how highly variable channel quality over time, due to factor uch a fading. Thi lead to ignificant fluctuation in received ignal, and hence there i a non-negligible probability of unucceful reception, even in the abence of maliciou colliion-cauing behavior. Thu, any attempt at deigning reliable broadcat protocol baed on theoretical radio network reult mut begin with an effort to implement a reliable local broadcat primitive in a calable manner. One might enviion implementing local broadcat by running a point-to-point Byzantine agreement protocol, with retranmiion over every loy (point-to-point) link to handle channel error. However, uch a olution lack calability, a the underlying medium i hared and thu the operation of nearby (point-to-point) link mut be erialized. While the iue of reliable broadcat and conenu in the preence of a bounded number of colliion/poofing ha been addreed in previou work, uch a [12] and [9], probabilitic channel loe have not been factored in. Random

2 tranient Byzantine failure that include colliion-cauing i examined in [19]. Though alo of a probabilitic nature, their model i different in that node either fail to tranmit, tranmit a wrong value or tranmit out of turn, with a certain probability, in each round. In thi work we addre channel unreliability, while auming fault-free phyical(phy) and medium-acce control(mac) layer (i.e., node do not deliberately caue colliion or poof MAC addree). We decribe a imple proofof-concept approach toward implementing reliable local broadcat with probabilitic guarantee in a local broadcat domain. We alo briefly dicu how the propoed reliable local broadcat olution can be optimized further, and alo be ued a a ub-protocol in a global broadcat algorithm for multi-hop network. Our primary intent in thi paper i to highlight the potential for lighweight calable olution to achieve probabilitic reliable local broadcat in the face of a loy wirele channel, by exploiting looe ynchronization between the clock of nearby node. 2. RELATED WORK Since the eminal reult of Peae, Shotak and Lamport [17], [14], there ha been much work on Byzantine agreement. In recent time, there ha been a focu on agreement/conenu problem in broadcat/multicat channel. Such model can be ueful for reaoning about wirele network. Byzantine agreement in k-cat channel ha been conidered in [8]. However thi model i not directly relevant to wirele network. a it doe not capture the patially dependent connectivity that characterize thee network. Reliable broadcat in radio network deployed a an infinite regular grid wa tudied in [11]. A locally-bounded fault model wa propoed wherein an adverary wa allowed to place fault ubject to the contraint that no neighborhood have more than t fault. It wa hown that under a Byzantine failure model, reliable broadcat i not achievable for t 1 r(2r + 1) in the L metric. Thi wa later etablihed a an exact threhold for the L metric in [1]. Ad- 2 ditionally, an approximate threhold wa etablihed for the L 2 metric. In [18], locally bounded fault were tudied in arbitrary graph. While the dicuion mention both radio and meagepaing network, there i an aumption that duplicity (ending different meage to different neighbor) i impoible, which eem to tem from the radio network model. Upper and lower bound for achievability of reliable broadcat were preented, baed on graph-theoretic parameter, for arbitrary graph. Probabilitic tranient failure were conidered in [19] which examine the cae of both meage-paing and radio network. The conidered model aume arbitrary graph topologie. Probabilitic permanent Byzantine failure were examined in [3], [4]. Two network model were conidered: a regular grid and a randomly deployed network. Neceary and ufficient condition were etablihed for the critical tranmiion range (and hence node degree) to tolerate failure probabilitie trictly le than 1. 2 The cae of an adverary capable of cauing a bounded number of colliion in an infinite (or finite-toroidal) grid network wa conidered in [12], and it wa hown that the ability to caue a bounded number of colliion or addrepoofing doe not yield the adverary any additional power in thwarting broadcat, i.e., the tolerable fault threhold remain the ame a for the no-colliion cae of [11] and [1]. However thi reult i baed on the aumption that nonfaulty node are not hindered by energy-limitation, and can retranmit meage a many time a needed. The impact of an energy-budget on conenu wa tudied for a ingle-hop etting in [9], and it wa proved that non-faulty node would require at leat incrementally larger budget than faulty node to arrive at a conenu. The tranient failure behavior aumed in [19] alo include the poibility of node cauing colliion. Much of the theoretical work mentioned earlier aume that the wirele channel itelf i perfectly reliable. The random loy nature of the channel i not accounted for, and thu many of thee reult are not directly applicable to a real-world cenario. A propoal to reconcile the theory and practice of wirele broadcat ha been made in [6]. They identify certain propertie that a reliable local broadcat hould have. They introduce ome model to capture the nature of loe and colliion, viz., the No-Colliion(NC) model, the Eventual No-Colliion (ENC) model, the Total Colliion (TC) model, and the Partial Colliion (PC) Model. Of thee the TC-model mot cloely reemble the reliable local broadcat aumption, in that if a meage i received by one recipient, then it i received by all recipient. It wa hown in [6] that in a ingle-hop network conforming to the TC-model conenu i achievable with any number of Byzantine/crah-top failure. Thi i akin to the trivial local agreement property of the reliable local broadcat aumption. However, practical realization of the TC model i not delved into in detail in [6] (though they mention the poibility of uing ignal-jamming technique to achieve TC propertie). On a related note, conenu in ingle-hop wirele network with crah-prone node i conidered in [7]. Alo relevant to our work i the notion of reliable multicat with probabilitic guarantee [5], [15] which alo eek to achieve a calable olution with probabilitic guarantee. 3. HOW A LOSSY WIRELESS CHANNEL INHIBITS RELIABLE LOCAL BROAD- CAST In thi ection we briefly dicu how an unreliable wirele channel can affect the achievability of reliable local broadcat. Conider a ource that originate a meage, which need to be locally broadcat to it neighbor. However, a the channel i loy, each neighbor uccefully receive the meage only with a certain probability. Reultantly, it i poible that a tranmiion may only be heard by ome ubet of neighbor. If were non-faulty, thi iue i readily reolved by having retranmit the meage ufficient time to enure that each neighbor receive at leat one copy with high probability (w.h.p.). However conider what might tranpire if i faulty, and eek to leverage the channel unreliability to create confuion amongt it neighbor. Suppoe that initially ent a meage m with value 0. Some of it neighbor do not receive it, i.e., it i received by ome ubet N 1 of neighbor. It then end another copy of the ame meage, containing a value 1. Thi meage i received by ome ubet N 2. If N 1 N 2 i non-empty, there are certain node that will aume that ent only one value,

3 i.e., 0. If N 2 N 1 i non-empty, there are certain node that will aume that ent only one value, i.e., 1. Node in N 1 N 2 receive both value, and are in a poition to detect duplicity. Thee node can chooe a default value, e.g., the firt value ent by. However, there till remain the iue of enuring that the other node do the ame. One approach might conit in the raiing of an alarm by node in N 1 N 2, but would require a mean for the other node to reolve whether the alarm() are to be truted. Thu, one may prefer to have a more lightweight approach to enure agreement of all node on a common value (and potentially rely on the fact that after a number of duplicitou tranmiion by, all node would at ome time detect it duplicity themelve, and could be univerally identified a untrutworthy). 4. CAUSAL ORDERING AND PHYSICAL CLOCKS In thi ection, we briefly review notion of clock and ordering that are relevant to the dicuion in thi paper. We aume the exitence of ome frame of reference external to the ytem. The phyical time in thi frame of reference i conidered to be an abolute meaure of phyical time, for the purpoe of our dicuion. Thu at time intant t, the external clock value i t. Each node u in the ytem ha it own phyical clock. The clock value of a node u at time intant t i denoted by C u(t). When we refer to external ynchronization within bound D, we imply ynchronization to thi ideal external clock within bound D, i.e., at each time intant t: C u(t) t D. Clock drift i modeled a being linear, i.e., if the true time elaped i T, the oberved elaped time lie in the range [(1 δ)t, (1 + δ)t], where δ i the drift per unit time (alo referred to a drift-rate). When we refer to internal ynchronization within bound D, we imply that at any time intant t, the clock of two internally ynchronized node u, w atify: C u(t) C w(t) D. When we refer to a node adjuting it clock, we imply that the node applie a correction to it clock value. In hi eminal paper [13], Lamport propoed that the key goal in a ditributed ytem hould be to enure that caual relationhip are repected. Thi cauality could be captured in a happened-before relation, which impoe a partial order on ytem event. Thu a b implie that a happened-before b, and b may be caually affected by a. Let C(a) denote the time oberved for an event a a per a clock C. A atifactory clock C mut then atify the following: Clock Condition [13]. For any event a, b: a b = C(a) < C(b). To thi effect, Lamport logical clock were propoed in [13]. An anomalou cenario wa alo conidered whereby out-of-ytem meage exchange could lead to violation of the Clock Condition. Thu one might conider a Strong Clock Condition whereby caual ordering i preerved even taking into account out-of-ytem meage. It wa oberved in [13] that if clock drift rate δ, maximum clock kew (or ynchronization bound) D and minimum meage tranmiion D 1 δ time T l atify the relation: T l, then the ytem of phyical clock atifie the Strong Clock Condition. It wa alo hown that a imple ynchronization algorithm uffice to enure that clock kew i bounded by a uitable D. The notion of leveraging phyical clock rather than logical clock ha wider ignificance. Conider a ytem where ome procee may exhibit Byzantine behavior. Then their logical clock value cannot be truted, and they may affix incorrect logical clock value to meage they end, in order to taint the logical clock of other procee. If one could enure that the phyical clock of non-faulty node atify certain ordering condition, thi could be quite beneficial. A imilar intuition underlie our approach toward reliable local broadcat. 5. LOOSE SYNCHRONIZATION AND LO- CAL BROADCAST In thi ection we decribe the baic aumption and approach behind leveraging the exitence of looe ynchronization to facilitate a certain ordering condition between locally broadcat meage. In Section 6, we dicu how the ordering condition can be realized in a wirele network, and ubequently decribe in Section 7 how it i leveraged to achieve reliable local broadcat with probabilitic guarantee. Conider a ytem compriing a node v that i intereted in ending meage, and a et of other node (neighbor of v) capable of receiving meage from v over a hared broadcat medium. Each node i equipped with a ingle half-duplex tranceiver. Thu no node can end and receive meage imultaneouly, and only one meage can be uccefully tranmitted or received at a time by a node. Note that thi i a reaonable model for wirele node equipped with a ingle half-duplex tranceiver and an omnidirectional antenna, and operating on a ingle common channel. Receive-Timetamp. A node i aumed capable of noting it local phyical clock value jut after it finihe receiving a meage (thi i a reaonable aumption; uch a timetamping operation could be implemented in hardware). Thi i termed a the receive-timetamp oberved by the node for the meage. The meage ent in thi ytem have the following property: the minimum (abolute) time the packet tranmiion occupie the channel i T l, and the actual total (abolute) time taken by a meage in tranit (between the time the ending node phyical layer tart ending the meage, and the time the receiving node finihe receiving and take it receive-timetamp) i upper-bounded by T u. Hence T u T l ubume the maximum propagation delay and upper bound on any proceing delay incurred upto the time of taking the timetamp. Thu, the (abolute) time T taken by a meage in tranit from ender to receiver (between timetamping) atifie T l T T u. Note that thi condition i atified by all meage including thoe ent by faulty node. We explain in Section 6 why thi i a reaonable aumption. We define the following condition: Receipt-Order Condition. If a node v end a meage m 1, followed by a meage m 2, then for all non-faulty node u, w (in v neighborhood): the receive-timetamp oberved by u for m 2 i greater than the receive-timetamp oberved by w for m 1. We identify two ituation in which the Receipt-Order Condition hold. The firt one relie on aumption about

4 external clock ynchronization, and the econd one relie on aumption about internal clock ynchronization. Obervation 1. (Externally Synchronized Node) If the phyical clock of all non-faulty node in the ytem are externally ynchronized within bound D, and if 2T l T u > 2D, then the local phyical timetamp oberved by the non-faulty neighbor of v for meage ent by v atify the Receipt- Order Condition. Proof. Suppoe the ender tart ending the two meage m 1, m 2 at time t 1 and t 2 repectively (according to the ideal external clock). Then thoe non-faulty neighbor of v that received m 1 would have received it within the interval (t 1 +T l, t 1 +T u] (a per the external clock), and their oberved receive-timetamp would lie in the range (t 1 +T l D, t 1+T u+d]. Similarly, the oberved receive-timetamp for the econd meage m 2 fall within (t 2+T l D, t 2+T u+d]. Since the two meage are ent by v on the ame medium, they are temporally ordered and eparated in time i.e. t 2 t 1 + T l. Thu (t 2 + T l D) (t 1 + T u + D) = t 2 t 1 T u + T l 2D 2T l 2D T u > 0. Hence, any non-faulty node that receive the firt meage oberve a receive-timetamp that i le than the receive-timetamp for the econd meage oberved by thoe non-faulty node that ee the econd meage. Hence the Receipt-Order Condition hold. Obervation 2. (Internally Synchronized Node) Conider an interval of time in the ytem in which no non-faulty node adjut it phyical clock, the phyical clock of all nonfaulty node tay internally ynchronized within bound D, and drift-rate i upper-bounded by δ. We are intereted in meage ent and received entirely during thi interval. If 2T l T u δ(2t l + T u) > D, then the local phyical timetamp oberved by the non-faulty neighbor of v for meage ent by v atify the Receipt-Order Condition. Proof. The argument i almot the ame a that ued in [13] to argue that a ytem of phyical clock can be made to atify the Strong Clock Condition, except that we now apply it in the context of a broadcat medium with multiple recipient of the ame meage. Denote by E v(m), the event of node v ending meage m, and by C u(e v(m)) the local phyical clock time at ome nonfaulty node u, at the time v tarted the tranmiion. Note that thi doe not imply that node u i aware of the intant at which tranmiion tarted. u may only detect the tranmiion after ome minimum propagation delay. Denote by E r u(m), the event of node u receiving meage m, and by C u(e r u(m)), the receive-timetamp oberved by node u for a meage m received by it (recall that receive timetamp are recorded when the reception ha finihed). Suppoe a node v tart ending a meage m 1 at a time when local time at ome non-faulty neighbor u i C u(e v(m 1)). Thu, from the aumption that clock are internally ynchronized within bound D, the local time at any other nonfaulty neighbor w mut be C w(e v(m 1)) C u(e v(m 1)) + D, and w will oberve a receive-timetamp C w(e r w(m 1)) C w(e v(m 1)) + T u(1 + δ) (C u(e v(m 1)) + D) + T u(1 + δ). If v later tart ending a meage m 2 when local-time at u i C u(e v(m 2)), then C u(e v(m 2)) C u(e v(m 1)) T l (1 δ). Thu the receive-timetamp u oberve for m 2 i at leat C u(e r u(m 2)) C u(e v(m 2)) + T l (1 δ) C u(e v(m 1)) + 2T l (1 δ). Thu, for u and any other non-faulty node w: C u(e r u(m 2)) C u(e v(m 1)) + 2T l (1 δ) = (C u(e v(m 1)) + D+T u(1+δ)) T u(1+δ) D+2T l (1 δ) C w(e r w(m 1))+ (2T l (1 δ) T u(1 + δ) D) = C w(e r w(m 1)) + (2T l T u δ(2t l + T u) D) > C w(e r w(m 1)). Thu the Receipt-Order Condition i atified. 6. NETWORK MODEL Conider a wirele multi-hop network. For the purpoe of our dicuion, we focu on a local broadcat domain within the wirele network, compriing a ender node and node within it tranmiion-range, denoted by nbd() ( i not included in nbd()), to which we wih to enure reliable local broadcat delivery. We denote nbd() by d, and define d o = nbd(x) nbd(). Thu do i the minimum number of min x nbd() common neighbor of and any of it neighbor. 6.1 Fault Model We aume the locally bounded fault model conidered in [11], [1], [18] etc., wherein an adverary may place fault o long a the number of fault in any ingle neighborhood doe not exceed a pecified number b. Faulty node can exhibit Byzantine behavior at higher layer, i.e., they may change the value/emantic of meage. However all PHY/MAC layer are non-faulty and thu faulty node do not deliberately caue colliion or poof MAC addree. Thi i a reaonable aumption in ituation where higher-layer or application code i much more prone to corruption or compromie. 6.2 Communication Model We allow for an unreliable wirele channel where fading and other effect may lead to non-ideal tranmiion characteritic. Accidental colliion and interference are poible, due to an imperfect medium acce mechanim. If a node tranmit a meage, the probability that a neighbor uccefully receive it i p. Packet error due to fading, or accidental interference etc. are ubumed in the error probability (1 p ). The probability of ucceful reception p i aumed independent though identical for each tranmiion and each receiving node. A deired acce probability 0 < p a < 1, and an accordingly large enough timeout T a are choen, uch that if a packet wa put into a node outgoing queue at time t, then with probability at leat p a, by time t + T a, the packet get a chance to be tranmitted by thi node and received by neighbor. Both p and p a are aumed independent of d, d o. Note that T a i a function of the target acce probability p a, a well a the length of packet-queue. All node poe a ingle half-duplex tranceiver with an omnidirectional antenna, and operate on a ingle channel. They alo ue a ingle tranmiion rate 1, and all valid meage are of a predetermined (and equal) ize (a dicued later, thi can be choen to facilitate reliable local broadcat). Note that the ue of a common tranmiion rate r bit/ec and a common meage ize l bit enure that all meage occupy a certain minimum time T l l on the r 1 Even in a multi-rate wirele network, it i poible to tipulate a part of the protocol pecification that all node ue a pecific rate (ay the lowet) for critical meage type that require reliable diemination.

5 channel. Thi extend to meage ent by faulty node, becaue non-faulty node can chooe to ignore meage that do not conform to the rate/ize pecification, giving faulty node no incentive to deviate from thi etablihed behavior. max The maximum and minimum propagation delay are d prop and d min prop repectively (note that d min prop > 0). Any additional delay in phyical-layer timetamping are upperbounded by t delay, yielding a maximum delay bound of T d = d max prop + t delay. Thu T u = T l + T d. For the ret of our dicuion, we aume that node are externally ynchronized within bound D, o that we may leverage Obervation 1. We eek to enure that the condition of Obervation 1 from Section 5 are atified. Thu we want 2T l T u = T l T d > D, or T l > D + T d. Since T d i independent of T l, thi i alway achievable (albeit at the expene of inefficient bandwidth uage) by padding all meage with extra bit to achieve the deired packetize l (and hence T l ) for the pecified tranmiion rate r. Thu the Receipt-Order Condition can be made to hold. We now provide a brief decription of meage repreentation. In order to ditinguih between different meage, ditinct meage ent by a particular ource (originator) are ditinguihed via identifier, that we hall denote a id. The id i a number in ome range [0, MAX], where MAX i a uitably large number. Individual node chooe the equence of id for their meage in ome privately determined peudorandom manner (uch that id are re-ued only after large interval of time; thu identifier may be conidered unique for all practical purpoe). Thi enure that node have no eay way of anticipating what the equence of id for a given ource node will be. If a node end two conflicting verion of the ame meage, it implie that they both have the ame id, but different value. Original meage are repreented a m(rc, (id, value)). Of thee, the rc field i obtained from the MAC header, and thu contain the true MAC addre of the node that put the packet on air. The (id, value) part i meagecontent. If a meage m i relayed (repeated) by a neighbor, it i repreented a REP EAT(relay rc, (m, timetamp)). Once again, relay rc i the MAC addre of the relay node, obtained from the MAC header. The (m, timetamp) part i meage-content (m denote the (rc, (id, value)) information for the meage; however a thi i now part of meage content, a faulty relay node can modify the rc information if it o chooe, though it cannot affect the correctne of the relay rc field in the MAC header). 7. THE ALGORITHM The goal of the algorithm i to achieve the following agreement condition with high probability (w.h.p.): Agreement Condition. If a local broadcat ource end a meage, then all it non-faulty neighbor hould agree on a ingle value for thi meage. If i non-faulty, thi agreedupon value hould be the one actually ent by. If i faulty and end multiple conflicting verion of the meage, the protocol i deigned to enable node to chooe the firt value that ent. For the ake of implicity and without lo of generality (w.l.o.g.), we aume that the meage m may take one of two value 0 or 1. The algorithm can however be eaily generalized to more than two meage value. Suppoe we have ender. Each other node u follow the following algorithm: On receipt of a meage m(, (i, p)) from directly with (local) receive-timetamp t: If no other earlier verion of thi meage (i.e., of the form m(, (i, q))) wa received directly from, make note of p a a candidate meage value, and re-broadcat a copy of m a REP EAT(u, (m(, i, p), t)). If an earlier verion of the ame meage wa received directly from, dicard thi meage. On receipt of a meage REPEAT(v, (m(, i, p), t v)): If no previou REPEAT(v, m(, i, ), ) 2 ha been received, make note of p a a candidate for meage-id i from, reported by v with timetamp t v. Keep track of all uch copie of m received via REPEAT meage from different repeater along with their reported timetamp. If thi wa the firt meage having the form REPEAT(, m(, i, ), ) received by the node, tart a timer (tagged by (, i)) to expire after a duration T+T u (where T = T a + T r, T a being the pre-defined acce timeout, and T r being an etimated upper bound on proceing time from receiving a meage m to time of generating a REPEAT and enqueueing it in the outgoing packet queue). On expiration of the timer for (, i): Perform a filtration procedure on the received REP EAT meage containing repeated meage of the form m(, (i, )), and determine the value of m for which the highet number of repeated copie were received. Commit to thi meage value. Timetamp-baed filtration and majority determination: The filtration and majority determination involve application of the following procedure: Let u refer to the value with highet repeated copy count a c 1, and the other one a c 2. If the number of copie of c 2 i le than or equal to b, chooe c 1 a the correct value. If the number of copie of c 2 i greater than b: dicard any meage with value c 1 whoe timetamp t i greater than the timetamp of more than b copie of c 2. Commit to the majority value from amongt the remaining copie of c 1 and c 2. Theorem 1. Conider a local broadcat domain in the wirele network compriing {} nbd() for ome node. Aume that the phyical clock of all non-faulty node at- ify the Receipt-Order Condition. If at mot b = 1+ d o node in any ingle neighborhood are faulty (where p ap 2 ǫ, and ǫ > 0 i a contant), then the above algorithm enure that all non-faulty neighbor of v hall be able to achieve the previouly decribed agreement condition for v meage with error probability at mot dexp( (1 pap 2 ) 2 p ap 2 do ), which i mall if d o i large, and d o >> ln d. Proof. There are two cae: i non-faulty or i faulty: 2 i a placeholder for any value.

6 i non-faulty: tranmit exactly one verion of the meage (call it m 1 = m(, (i, q m1 ))). Since any u nbd() ha at mot b faulty node in nbd(u), it may receive up to a maximum of b puriou repeat of meage. If the number of REPEAT copie of the meage received from non-faulty node (and thu containing the correct value) i greater than b, thi uffice to ditinguih the legitimate value from a puriou one. i faulty: If i faulty, it may leverage the unreliability of the channel, and attempt to create confuion by ending more than one verion of the meage, each containing different value. We how that depite thi, under the aumed condition, reliable broadcat will till be achieved. By aumption, the phyical clock of all non-faulty node atify the Receipt-Order Condition. Then, in the algorithm decribed earlier, copie of the econd meage received from non-faulty neighbor get filtered out a follow: Suppoe the ender end the two meage-verion m 1 = m(, (i, q m1 )) and m 2 = m(, (i, q m2 )) at abolute time t 1 and t 2 repectively. Hence, any non-faulty node that receive the firt meage oberve a receive-timetamp that i le than the receivetimetamp for the econd meage oberved by thoe nonfaulty node that ee the econd meage. All non-faulty node attach the correct oberved timetamp to any REP EAT meage they end, and non-faulty node that receive the REP EAT meage record the timetamp along with the meage encapulated in the REPEAT. Recall that the firt meage-verion ent out by i m 1 and the econd i m 2. Alo, the meage-verion with highet pre-filtration count i referred to a c 1 and the other one i referred to a c 2. We how that if more than b REPEAT copie of m 1 were received from non-faulty node, the agreement condition i achieved. Thereafter we how that more than b copie of m 1 are received from non-faulty node w.h.p. Suppoe more than b copie of m 1 were received from nonfaulty node, i.e., more than b correct copie of m 1 were received. Then the following cae may arie: If c 1 = m 1, and at mot b copie of m 2 were received: m 1 will win the majority vote, and get choen immediately. If c 1 = m 1, i.e., m 1 ha the highet pre-filtration count, and greater than b copie of m 2 were received: A non-faulty node will only end a REPEAT of m 2 if it receive the meage m 2 directly from, and it will affix a correct receive-timetamp to it REPEAT. Since the Receipt-Order Condition hold, the timetamp reported in any uch REPEAT copy of m 2 will be greater than the timetamp reported in any of the correct REPEAT copie of m 1. Thu, no more than b copie of c 2 = m 2 can bear a fale earlier timetamp. Reultantly, no copy of m 1 ent by a non-faulty node will get filtered out erroneouly, and m 1 will win the majority vote. If c 1 = m 2 i.e. m 2 ha the highet pre-filtration count: Since greater than b copie of m 1 were received from non-faulty node, then from the Receipt-Order Condition, any copy (REPEAT) of m 2 ent by a non-faulty node ha a reported timetamp greater than the reported timetamp on the greater-than-b correct copie of m 1, and the timetamp filtration rule enure that all copie of m 2 ent by non-faulty node get filtered out. Thi leave only upto b copie of m 2 ent by faulty node. Thu, if the correct REPEAT copie of m 1 are greater than b, m 1 will win the majority vote. Hence, the algorithm definitely make the correct deciion if more than b copie of m 1 were received from non-faulty node. Thi i the ame a the ufficient condition we earlier tated for correct deciion with a non-faulty ource. When b or fewer copie of m 1 are received from non-faulty node, the deciion may be correct or wrong, depending on how many copie of m 2 were received. To bound the error probability, we aume the wort, i.e., it i alway wrong if b or fewer copie of m 1 are received from non-faulty node. We repreent the copie of m 1 repeated by non-faulty node that were received by a node u a a random variable Z. Then, the requirement i that Z > b for both the cae (recall that in the firt cae, the ource i non-faulty, and o it end only one meage-verion m 1, but upto b puriou REP EAT meage containing wrong value may till be received from faulty node). Let the number of non-faulty mutual neighbor of and u be g. Then g d o b. Z i the um of g i.i.d. Bernoulli(p ap 2 ) random variable, ince a repeated copy of m 1 i received from a non-faulty neighbor if that neighbor received m 1 directly from (probability p ), it wa able to tranmit the REPEAT packet before timeout (probability p a), and the REPEAT wa uccefully received by u (probability p ). Thi allow u to apply the following pecial form of the Chernoff bound [16]: Pr[Z (1 β)e[z]] exp( β2 E[Z] ), 0 < β < 1 (1) 2 Thu, knowing that b = do g, we can et β = 1 1+ p ap 2 to obtain b (1 β)e[z]. Thu application of the Chernoff bound yield: Pr[Z > b] 1 Pr[Z (1 β)e[z]] 1 exp( (1 p ap ) 2 p 2 ap 2 g ) 2 1 exp( (1 p ap ) 2 p 2 ap 2 d o ) (2) 2(1 + ) Since 0 < β < 1, the contraint on i that p ap 2 ǫ with ǫ > 0. Thu (which give a meaure of the proportion of tolerable fault) can be large when the probability of ucceful receipt (p ap 2 ) i large, and can only be mall when p ap 2 i mall. Applying the union bound over all d neighbor of ender, probability that any node make an error i le than dexp( (1 pap 2 ) 2 p ap 2 do ), which i mall for large d o, and d o >> ln d. Note that, a d increae, the timeout component T a mut alo increae to maintain a ufficiently high value of p a (due to increaed contention for the hared channel). However, in

7 mot cae of practical interet, d will not be unduly large, and a moderate value for T can uffice. Beide, the protocol i till reaonably calable, a it only require one meage to be ent by each node. In our analyi, we have aumed that whenever the number of copie of m 1 received from non-faulty node i le than b, a wrong deciion i made. In actuality, if the number of copie of m 1 received from non-faulty node i le than b, there may till be ituation where a correct deciion may be made (it i poible that the total number of received copie containing q m2 (from faulty or non-faulty node) be much le than b, ince thee tranmiion are alo ubject to reception error). Thu the preented analyi etablihe a rather conervative upper bound on the error probability. 8. POSSIBLE OPTIMIZATIONS From a practical perpective, one can conider many poible enhancement/optimization to the baic algorithm. 1. Each node can be made to retranmit it REPEAT meage k time. Thi can help improve lo-reilience, without cauing duplication problem, a (in abence of addre poofing) two receipt of the ame meage are eaily identified by the repeater addre. 2. One could conider triggering the reliable local broadcat algorithm only if at leat one warning meage i heard from a node claiming to have heard two inconitent meage ent by (thi would work only if it i very likely that a fair number of node will receive both variant of meage). Alo, while faulty node can raie fale alarm, that i no wore that proactively uing the algorithm each time. 9. DISCUSSION ON SYNCHRONIZATION REQUIREMENTS The ynchronization aumption required to enure the Receipt-Order Condition hold may actually be practically feaible in many etting. It i poible that in the near-future, wirele node may be equipped with on-chip atomic clock [10] with very low drift. Thu, if the clock are ynchronized with an external time ource at time of deployment, then one might bound the total kew over the entire operational lifetime of the network, and thi would not be overly large. Alternatively, node might be GPS-equipped, thu providing an out-ofband mean of external ynchronization. In uch cenario, the condition for Obervation 1 can be made to hold. In the abence of on-chip atomic clock or GPS-equipped device, it may not be poible to enure that all node in the network be ynchronized to an external clock within ome contant bound D. However, it i till quite feaible to enure that each node i internally ynchronized within contant bound D with it two-hop neighbor. One could enviage a ituation where node are initially ynchronized at time of deployment, and thereafter periodically run a reynchronization protocol, to enure that any any two node within two-hop of each other alway tay internally ynchronized within the bound D. A lightweight Byzantine time ynchronization protocol hould potentially uffice for thi. In the period between two conecutive reynchronization, the condition of Obervation 2 can thu be made to hold for every local broadcat domain in the network. 10. USING THE PRIMITIVE FOR MULTI- HOP BROADCAST We briefly dicu how the propoed primitive could potentially be ued a a building block in a protocol to achieve broadcat in a multi-hop etting. It wa oberved in [12] that the algorithm of [1] require neighbor of the original ender to agree on the value it ent, even if the original ender i faulty; for other node in the network, correctne only require that neighbor of non-faulty node agree on the meage they ent. Thu, if one i uing a global broadcat protocol with imilar propertie, one could conider uing the reliable local broadcat primitive in the neighborhood of the original ender, and merely tipulate that other node retranmit their meage a ufficient number of time. Otherwie, if the protocol require that neighbor of all node agree on what they ent, one could proceed a follow: Let u conider a multi-hop network of n node, where the minimum node degree i d min, maximum node degree i d max, and d o = min min nbd(x) nbd(y). Thu do i the x y nbd(x) minimum number of common neighbor hared by any two neighbor. The number of faulty node in any ingle neighborhood i at mot b = 1+ do where pap2 ǫ(ǫ > 0). Through exchange of periodic hello meage, node maintain a lit of neighbor. Neighbor are added/removed only if more than a certain number of HELLO meage have been conecutively received/lot. Thi help maintain a degree of tability in the neighborhood information, in the face of hort-term ignal fluctuation. Suppoe we have a global multi-hop broadcat protocol that aume reliable local broadcat, and require a total of O(n m ) meage to be ent (m i a contant), i.e. ha meage complexity polynomial in n. Then, for each tep of the protocol that require a node to perform a local broadcat, the reliable local broadcat primitive protocol i run in the local broadcat domain compriing the node and it neighbor. Following the proof argument of Theorem 1, we can obtain that the probability local broadcat i achieved reliably i at leat 1 d max exp( (1 pap 2 ) 2 p ap 2 do ) = 1 exp( (1 pap 2 ) 2 p ap 2 do + ln d max). Since n m uch ucceful local broadcat are needed, if d o = c 1mlog n for a uitably choen contant c 1 >, and d max c 2 log n for (1 pap 2 ) 2 p ap 2 another uitable contant c 2 (note that c 2 c 1m by definition), then by applying the union bound, one may ee that the global broadcat will alo ucceed with probability at leat 1 n m exp( (1 pap 2 ) 2 p ap 2 do + ln d max), which approache 1 for large n. The tolerable number of per-neighborhood fault i given by the minimum of the tolerance threhold for the global protocol, and the local broadcat primitive. 11. OPEN ISSUES The algorithm we have outlined in thi paper i primarily a proof-of-concept approach, whereby we eek to highlight that one can leverage the hared nature of the medium, and information from lower-layer (in thi cae, timetamp), to deign calable probabilitic olution to the local broadcat problem. However, there are till numerou outtanding iue that need to be addreed. One iue i that of uing a uitable Byzantine time yn-

8 chronization protocol to enure internal ynchronization between neighboring node (ee Section 9). It might be poible to leverage exiting work in thi area, e.g., [20]. Another iue i that one might wih to eliminate the requirement in Obervation 2 that during the interval in which the local broadcat i occurring, node do not adjut their clock. Thi would require a ynchronization algorithm that can run imultaneouly with the local broadcat algorithm without affecting the Receipt-Order Condition. Additionally, the decribed algorithm aume i.i.d. lo probabilitie. If channel loe exhibit patial correlation, the algorithm may need to be modified to handle uch ituation. A major hortcoming of the algorithm i the need to etimate the timeout T baed on acce probability p a, average length of outgoing packet-queue, and proceing time to generate a REPEAT. It would be preferable to have an algorithm where node decide to invoke the filtration and majority determination procedure baed on ome event, e.g., receipt of certain meage. 12. DISCUSSION Many of the aumption in thi paper are jutified by auming a network with a ingle channel and omnidirectional antenna. One might wih to conider alternative cenario where multiple channel or beamforming antenna are available. We remark that uage of multiple channel or directional antenna tend to alter the broadcat nature of the wirele medium, and make the network look increaingly like a point-to-point network. Thu, algorithm baed on the point-to-point abtraction may increaingly eem uitable in uch cenario. 13. CONCLUSION In thi paper, we have conidered the iue of implementing reliable local broadcat in a wirele network with a loy channel. We have propoed a imple proof-of-concept approach toward thi end, with the intent to highlight the potential for obtaining lightweight probabilitic olution to the problem. 14. REFERENCES [1] V. Bhandari and N. H. Vaidya. On reliable broadcat in a radio network. In PODC 05: Proceeding of the twenty-fourth annual ACM SIGACT-SIGOPS ympoium on Principle of ditributed computing, page ACM Pre, [2] V. Bhandari and N. H. Vaidya. On reliable broadcat in a radio network: A implified characterization. Technical Report, CSL, UIUC, May [3] V. Bhandari and N. H. Vaidya. Reliable Broadcat in Wirele Network with Probabilitic Failure. In Proceeding of IEEE INFOCOM, page , Anchorage, Alaka, May [4] V. Bhandari and N. H. Vaidya. Reliable broadcat in wirele network with probabilitic failure. Technical Report, CSL, UIUC, Jan [5] K. P. Birman, M. Hayden, O. Okaap, Z. Xiao, M. Budiu, and Y. Minky. Bimodal multicat. Tranaction on Computer Sytem (TOCS), 17(2):41 88, May [6] G. Chockler, M. Demirba, S. Gilbert, N. Lynch, C. Newport, and T. Nolte. Reconciling the theory and practice of (un)reliable wirele broadcat. In ICDCSW 05: Proceeding of the Fourth International Workhop on Aurance in Ditributed Sytem and Network (ADSN) (ICDCSW 05), page IEEE Computer Society, [7] G. Chockler, M. Demirba, S. Gilbert, C. Newport, and T. Nolte. Conenu and colliion detector in wirele ad hoc network. In PODC 05: Proceeding of the twenty-fourth annual ACM ympoium on Principle of ditributed computing, page ACM Pre, [8] J. Conidine, L. A. Levin, and D. Metcalf. Byzantine agreement with faulty majority uing bounded broadcat. CoRR, c.dc/ , [9] S. Gilbert, R. Guerraoui, and C. Newport. Of maliciou mote and upiciou enor. In Proc. of OPODIS, [10] S. Knappe, L. Liew, V. Shah, P. Schwindt, J. Moreland, L. Hollberg, and J. Kitching. A microfabricated atomic clock. Appl. Phy. Lett., 85, [11] C.-Y. Koo. Broadcat in radio network tolerating byzantine adverarial behavior. In PODC 04: Proceeding of the twenty-third annual ACM ympoium on Principle of ditributed computing, page ACM Pre, [12] C.-Y. Koo, V. Bhandari, J. Katz, and N. H. Vaidya. Reliable broadcat in radio network: The bounded colliion cae. In Proceeding of ACM PODC 2006, [13] L. Lamport. Time, clock, and the ordering of event in a ditributed ytem. Commun. ACM, 21(7): , [14] L. Lamport, R. Shotak, and M. Peae. The byzantine general problem. ACM Tran. Program. Lang. Syt., 4(3): , [15] J. Luo, P. Eugter, and J.-P. Hubaux. Route driven goip: Probabilitic reliable multicat in ad hoc network. In Proc. of INFOCOM 2003, [16] M. Mitzenmacher and E. Upfal. Probability and computing. Cambridge Univerity Pre, [17] M. Peae, R. Shotak, and L. Lamport. Reaching agreement in the preence of fault. J. ACM, 27(2): , [18] A. Pelc and D. Peleg. Broadcating with locally bounded byzantine fault. Information Proceing Letter, 93(3): , Feb [19] A. Pelc and D. Peleg. Feaibility and complexity of broadcating with random tranmiion failure. In PODC 05: Proceeding of the twenty-fourth annual ACM SIGACT-SIGOPS ympoium on Principle of ditributed computing, page , [20] T. K. Srikanth and S. Toueg. Optimal clock ynchronization. J. ACM, 34(3): , 1987.

Comm 502: Communication Theory. Lecture 5. Intersymbol Interference FDM TDM

Comm 502: Communication Theory. Lecture 5. Intersymbol Interference FDM TDM Lecture 5 Interymbol Interference FDM TDM 1 Time Limited Waveform Time-Limited Signal = Frequency Unlimited Spectrum Square Pule i a Time-Limited Signal Fourier Tranform 0 T S -3/T S -2/T S -1/T S 0 1/T

More information

Frequency Calibration of A/D Converter in Software GPS Receivers

Frequency Calibration of A/D Converter in Software GPS Receivers Frequency Calibration of A/D Converter in Software GPS Receiver L. L. Liou, D. M. Lin, J. B. Tui J. Schamu Senor Directorate Air Force Reearch Laboratory Abtract--- Thi paper preent a oftware-baed method

More information

Subcarrier exclusion techniques

Subcarrier exclusion techniques Subcarrier excluion technique for coded OFDM ytem Kai-Uwe Schmidt, Jochen Ertel, Michael Benedix, and Adolf Finger Communication Laboratory, Dreden Univerity of Technology, 62 Dreden, Germany email: {chmidtk,

More information

RESEARCH ON NEAR FIELD PASSIVE LOCALIZATION BASED ON PHASE MEASUREMENT TECHNOLOGY BY TWO TIMES FREQUENCY DIFFERENCE

RESEARCH ON NEAR FIELD PASSIVE LOCALIZATION BASED ON PHASE MEASUREMENT TECHNOLOGY BY TWO TIMES FREQUENCY DIFFERENCE RESEARCH ON NEAR FIED PASSIVE OCAIZATION BASED ON PHASE MEASUREMENT TECHNOOGY BY TWO TIMES FREQUENCY DIFFERENCE Xuezhi Yan, Shuxun Wang, Zhongheng Ma and Yukuan Ma College of Communication Engineering

More information

II. SYSTEM MODEL. A. Link and path model

II. SYSTEM MODEL. A. Link and path model HARQ I. INTRODUCTION ARQ (automatic repeat-requet i a link layer protocol ued for packet error detection and retranmiion. Errordetection bit (uch a CRC bit are attached and tranmitted along with the meage

More information

Sampling Theory MODULE XIII LECTURE - 41 NON SAMPLING ERRORS

Sampling Theory MODULE XIII LECTURE - 41 NON SAMPLING ERRORS Sampling Theory MODULE XIII LECTURE - 41 NON SAMPLING ERRORS DR. SHALABH DEPARTMENT OF MATHEMATICS AND STATISTICS INDIAN INSTITUTE OF TECHNOLOG KANPUR 1 It i a general aumption in ampling theory that the

More information

Hashiwokakero. T. Morsink. August 31, 2009

Hashiwokakero. T. Morsink. August 31, 2009 Hahiwokakero T. Morink Augut 31, 2009 Content 1 Introduction 3 2 What i Hahiwokakero? 3 2.1 The rule............................. 3 2.2 Eay olving tatement..................... 4 3 Building an Own Solver

More information

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Stability Analyi in a Cognitive Radio Sytem with Cooperative Beamforming Mohammed Karmooe, Ahmed Sultan, Moutafa Youef Department of Electrical Engineering, Alexandria Univerity, Alexandria, Egypt Wirele

More information

MIMO Systems: Multiple Antenna Techniques

MIMO Systems: Multiple Antenna Techniques ADVANCED MIMO SYSTEMS MIMO Sytem: Multiple Antenna Technique Yiqing ZOU, Zhengang PAN, Kai-Kit WONG Dr, Senior Member of IEEE, Aociate Editor, IEEE TWirele, IEEE CL, and JoC (AP), Senior Lecturer, Department

More information

CHAPTER 2 WOUND ROTOR INDUCTION MOTOR WITH PID CONTROLLER

CHAPTER 2 WOUND ROTOR INDUCTION MOTOR WITH PID CONTROLLER 16 CHAPTER 2 WOUND ROTOR INDUCTION MOTOR WITH PID CONTROLLER 2.1 INTRODUCTION Indutrial application have created a greater demand for the accurate dynamic control of motor. The control of DC machine are

More information

DIGITAL COMMUNICATION

DIGITAL COMMUNICATION DEPARTMENT OF ELECTRICAL &ELECTRONICS ENGINEERING DIGITAL COMMUNICATION Spring 2010 Yrd. Doç. Dr. Burak Kelleci OUTLINE Line Code Differential Encoding Regeneration, Decoding and Filtering Delta Modulation

More information

Analysis. Control of a dierential-wheeled robot. Part I. 1 Dierential Wheeled Robots. Ond ej Stan k

Analysis. Control of a dierential-wheeled robot. Part I. 1 Dierential Wheeled Robots. Ond ej Stan k Control of a dierential-wheeled robot Ond ej Stan k 2013-07-17 www.otan.cz SRH Hochchule Heidelberg, Mater IT, Advanced Control Engineering project Abtract Thi project for the Advanced Control Engineering

More information

MIMO Enabled Efficient Mapping of Data in WiMAX Networks

MIMO Enabled Efficient Mapping of Data in WiMAX Networks MIMO Enabled Efficient Mapping of Data in WiMAX Network Penumarthi Phani Krihna, R. Saravana Manickam, and C. Siva Ram Murthy Department of Computer Science and Engineering Indian Intitute of Technology

More information

Kalman Filtering Based Object Tracking in Surveillance Video System

Kalman Filtering Based Object Tracking in Surveillance Video System (669 -- 917) Proceeding of the 3rd (2011) CUSE International Conference Kalman Filtering Baed Object racking in Surveillance Video Sytem W.L. Khong, W.Y. Kow, H.. an, H.P. Yoong, K..K. eo Modelling, Simulation

More information

Parallel DCMs APPLICATION NOTE AN:030. Introduction. Sample Circuit

Parallel DCMs APPLICATION NOTE AN:030. Introduction. Sample Circuit APPLICATION NOTE AN:030 Parallel DCM Ugo Ghila Application Engineering Content Page Introduction 1 Sample Circuit 1 Output Voltage Regulation 2 Load Sharing 4 Startup 5 Special Application: Optimizing

More information

REAL-TIME IMPLEMENTATION OF A NEURO-AVR FOR SYNCHRONOUS GENERATOR. M. M. Salem** A. M. Zaki** O. P. Malik*

REAL-TIME IMPLEMENTATION OF A NEURO-AVR FOR SYNCHRONOUS GENERATOR. M. M. Salem** A. M. Zaki** O. P. Malik* Copyright 2002 IFAC 5th Triennial World Congre, Barcelona, Spain REAL-TIME IMPLEMENTATION OF A NEURO- FOR SYNCHRONOUS GENERATOR M. M. Salem** A. M. Zaki** O. P. Malik* *The Univerity of Calgary, Canada

More information

Active vibration isolation for a 6 degree of freedom scale model of a high precision machine

Active vibration isolation for a 6 degree of freedom scale model of a high precision machine Active vibration iolation for a 6 degree of freedom cale model of a high preciion machine W.B.A. Boomma Supervior Report nr : Prof. Dr. Ir. M. Steinbuch : DCT 8. Eindhoven Univerity of Technology Department

More information

Voltage Analysis of Distribution Systems with DFIG Wind Turbines

Voltage Analysis of Distribution Systems with DFIG Wind Turbines 1 Voltage Analyi of Ditribution Sytem with DFIG Wind Turbine Baohua Dong, Sohrab Agarpoor, and Wei Qiao Department of Electrical Engineering Univerity of Nebraka Lincoln Lincoln, Nebraka 68588-0511, USA

More information

The Central Limit Theorem

The Central Limit Theorem Objective Ue the central limit theorem to olve problem involving ample mean for large ample. The Central Limit Theorem In addition to knowing how individual data value vary about the mean for a population,

More information

Reinforcement Learning Based Anti-jamming with Wideband Autonomous Cognitive Radios

Reinforcement Learning Based Anti-jamming with Wideband Autonomous Cognitive Radios 1 Reinforcement Learning Baed Anti-jamming with Wideband Autonomou Cognitive Radio Stephen Machuzak, Student Member, IEEE, and Sudharman K. Jayaweera, Senior Member, IEEE Communication and Information

More information

Self-Programmable PID Compensator for Digitally Controlled SMPS

Self-Programmable PID Compensator for Digitally Controlled SMPS 6 IEEE COMPEL Workhop, Renelaer Polytechnic Intitute, Troy, NY, USA, July 16-19, 6 Self-Programmable PID Compenator for Digitally Controlled SMPS Zhenyu Zhao and Alekandar Prodi Univerity of Toronto Toronto,

More information

Control of Electromechanical Systems using Sliding Mode Techniques

Control of Electromechanical Systems using Sliding Mode Techniques Proceeding of the 44th IEEE Conference on Deciion and Control, and the European Control Conference 25 Seville, Spain, December 2-5, 25 MoC7. Control of Electromechanical Sytem uing Sliding Mode Technique

More information

AN EVALUATION OF DIGILTAL ANTI-ALIASING FILTER FOR SPACE TELEMETRY SYSTEMS

AN EVALUATION OF DIGILTAL ANTI-ALIASING FILTER FOR SPACE TELEMETRY SYSTEMS AN EVALUATION OF DIGILTAL ANTI-ALIASING FILTER FOR SPACE TELEMETRY SYSTEMS Alion de Oliveira Morae (1), Joé Antonio Azevedo Duarte (1), Sergio Fugivara (1) (1) Comando-Geral de Tecnologia Aeroepacial,

More information

International Journal of Engineering Research & Technology (IJERT) ISSN: Vol. 1 Issue 6, August

International Journal of Engineering Research & Technology (IJERT) ISSN: Vol. 1 Issue 6, August ISSN: 2278-08 Vol. Iue 6, Augut - 202 The Turbo Code and an Efficient Decoder Implementation uing MAP Algorithm for Software Defined Radio Mr Rupeh Singh (Principal), Dr. Nidhi Singh (Aociate Profeor)

More information

Adaptive Space/Frequency Processing for Distributed Aperture Radars

Adaptive Space/Frequency Processing for Distributed Aperture Radars Adaptive Space/Frequency Proceing for Ditributed Aperture Radar Raviraj Adve a, Richard Schneible b, Robert McMillan c a Univerity of Toronto Department of Electrical and Computer Engineering 10 King College

More information

Wireless Link SNR Mapping Onto An Indoor Testbed

Wireless Link SNR Mapping Onto An Indoor Testbed Wirele Link SNR Mapping Onto An Indoor Tetbed Jing Lei, Roy Yate, Larry Greentein, Hang Liu WINLAB Rutger Univerity 73 Brett Road, Picataway, NJ 8854, USA {michelle, ryate, ljg, hliu}@winlab.rutger.edu

More information

HEURISTIC APPROACHES TO SOLVE THE U-SHAPED LINE BALANCING PROBLEM AUGMENTED BY GENETIC ALGORITHMS. Ulises Martinez William S. Duff

HEURISTIC APPROACHES TO SOLVE THE U-SHAPED LINE BALANCING PROBLEM AUGMENTED BY GENETIC ALGORITHMS. Ulises Martinez William S. Duff Proceeding of the 200 Sytem and Information Engineering Deign Sympoium Matthew H. Jone, Stephen D. Pate, and Barbara E. Tawney, ed. HEURISTIC APPROACHES TO SOLVE THE U-SHAPED LINE BALANCING PROBLEM AUGMENTED

More information

Integral Control AGC of Interconnected Power Systems Using Area Control Errors Based On Tie Line Power Biasing

Integral Control AGC of Interconnected Power Systems Using Area Control Errors Based On Tie Line Power Biasing ISSN (Online) 232 24 ISSN (Print) 232 5526 Vol. 2, Iue 4, April 24 Integral Control AGC of Interconnected Power Sytem Uing Area Control Error Baed On Tie Line Power Biaing Charudatta B. Bangal Profeor,

More information

SCK LAB MANUAL SAMPLE

SCK LAB MANUAL SAMPLE SCK LAB MANUAL SAMPLE VERSION 1.2 THIS SAMPLE INCLUDES: TABLE OF CONTENTS TWO SELECTED LABS FULL VERSION IS PROVIDED FREE WITH KITS Phone: +92 51 8356095, Fax: +92 51 8311056 Email: info@renzym.com, URL:www.renzym.com

More information

Location-based Access Control. Outline. Why do we need location in WSN? SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks

Location-based Access Control. Outline. Why do we need location in WSN? SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks SeRLoc: Secure Range-Independent Localization for Wirele Senor Network Louka Lazo Advior: Radha Poovendran Network Security Lab Univerity of Wahington Outline Motivation Secure Localization Problem SeRLoc

More information

The Performance Analysis of MIMO OFDM System with Different M-QAM Modulation and Convolution Channel Coding

The Performance Analysis of MIMO OFDM System with Different M-QAM Modulation and Convolution Channel Coding The Performance Analyi of MIMO OFDM Sytem with Different M-QAM Modulation and Convolution Channel Coding H. S. Shwetha M.tech, Digital Communication Engineering Siddaganga Intitute of Technology Tumakuru,

More information

Sloppy Addition and Multiplication

Sloppy Addition and Multiplication Sloppy Addition and Multiplication IMM-Technical Report-2011-14 Alberto Nannarelli Dept. Informatic and Mathematical Modelling Technical Univerity of Denmark Kongen Lyngby, Denmark Email: an@imm.dtu.dk

More information

A New Technique to TEC Regional Modeling using a Neural Network.

A New Technique to TEC Regional Modeling using a Neural Network. A New Technique to TEC Regional Modeling uing a Neural Network. Rodrigo F. Leandro Geodetic Reearch Laboratory, Department of Geodey and Geomatic Engineering, Univerity of New Brunwick, Fredericton, Canada

More information

Produced in cooperation with. Revision: May 26, Overview

Produced in cooperation with. Revision: May 26, Overview Lab Aignment 6: Tranfer Function Analyi Reviion: May 6, 007 Produced in cooperation with www.digilentinc.com Overview In thi lab, we will employ tranfer function to determine the frequency repone and tranient

More information

PHLAME: A Physical Layer Aware MAC Protocol for Electromagnetic Nanonetworks

PHLAME: A Physical Layer Aware MAC Protocol for Electromagnetic Nanonetworks t IEEE International Workhop on Molecular and Nano Scale Communication (MoNaCom) PHLAME: A Phyical Layer Aware MAC Protocol for Electromagnetic Nanonetwork Joan Capdevila Pujol, Joep Miquel Jornet and

More information

COST OF TRANSMISSION TRANSACTIONS: Comparison and Discussion of Used Methods

COST OF TRANSMISSION TRANSACTIONS: Comparison and Discussion of Used Methods INTERNATIONAL CONFERENCE ON RENEWABLE ENERGY AND POWER QUALITY (ICREPQ 03) COST OF TRANSMISSION TRANSACTIONS: Comparion and Dicuion of Ued Method Judite Ferreira 1, Zita Vale 2, A. Almeida Vale 3 and Ricardo

More information

Identification of Image Noise Sources in Digital Scanner Evaluation

Identification of Image Noise Sources in Digital Scanner Evaluation Identification of Image Noie Source in Digital Scanner Evaluation Peter D. Burn and Don William Eatman Kodak Company, ocheter, NY USA 4650-95 ABSTACT For digital image acquiition ytem, analyi of image

More information

Revisiting Cross-channel Information Transfer for Chromatic Aberration Correction

Revisiting Cross-channel Information Transfer for Chromatic Aberration Correction Reviiting Cro-channel Information Tranfer for Chromatic Aberration Correction Tiancheng Sun, Yifan Peng 3, Wolfgang Heidrich,3 King Abdullah Univerity of Science and Technology, Thuwal, Saudi Arabia IIIS,

More information

Internet Routing Games

Internet Routing Games Internet Routing Game João P. Hepanha Center for Control Dynamical Sytem an Computation Univerity of California Santa Barbara In collaboration with: S. Bohacek (Univ. Delaware), K. Obraczka (UC Santa Cruz)

More information

Active Harmonic Elimination in Multilevel Converters Using FPGA Control

Active Harmonic Elimination in Multilevel Converters Using FPGA Control Active Harmonic Elimination in Multilevel Converter Uing FPGA Control Zhong Du, Leon M. Tolbert, John N. Chiaon Electrical and Computer Engineering The Univerity of Tenneee Knoxville, TN 7996- E-mail:

More information

A Two-Stage Optimization PID Algorithm

A Two-Stage Optimization PID Algorithm PID' Brecia (Italy), March 8-3, ThB. A Two-Stage Optimization PID Algorithm Gíli Herjólfon Anna Soffía Haukdóttir Sven Þ. Sigurðon Department of Electrical and Computer Engineering,Univerity of Iceland

More information

Fast Thermal Cycling Stress and Degradation in Multilayer Interconnects

Fast Thermal Cycling Stress and Degradation in Multilayer Interconnects Fat Thermal Cycling Stre and Degradation in Multilayer Interconnect H.V. Nguyen 1, C. Salm 1, J. Vroemen 2, J. Voet 2, B. Krabbenborg 2 J. Bichop 2, A. J. Mouthaan 1 and F. G. Kuper 1,2 1 Univerity of

More information

UNIVERSITY OF SASKATCHEWAN EE456: Digital Communications FINAL EXAM, 9:00AM 12:00PM, December 9, 2010 (open-book) Examiner: Ha H.

UNIVERSITY OF SASKATCHEWAN EE456: Digital Communications FINAL EXAM, 9:00AM 12:00PM, December 9, 2010 (open-book) Examiner: Ha H. Name: Page 1 UNIVERSIY OF SASKACHEWAN EE456: Digital Communication FINAL EXAM, 9:00AM 1:00PM, December 9, 010 (open-book) Examiner: Ha H. Nguyen Permitted Material: Only textbook and calculator here are

More information

Mobile Communications TCS 455

Mobile Communications TCS 455 Mobile Communication TCS 455 Dr. Prapun Sukompong prapun@iit.tu.ac.th Lecture 23 1 Office Hour: BKD 3601-7 Tueday 14:00-16:00 Thurday 9:30-11:30 Announcement Read Chapter 9: 9.1 9.5 Section 1.2 from [Bahai,

More information

Basic Study of Radial Distributions of Electromagnetic Vibration and Noise in Three-Phase Squirrel-Cage Induction Motor under Load Conditions

Basic Study of Radial Distributions of Electromagnetic Vibration and Noise in Three-Phase Squirrel-Cage Induction Motor under Load Conditions http://dx.doi.org/0.42/jicem.203.2.2.54 54 Journal of International Conference on Electrical Machine and Sytem Vol. 2, No. 2, pp. 54 ~58, 203 Baic Study of Radial Ditribution of Electromagnetic Vibration

More information

Time-Domain Coupling to a Device on Printed Circuit Board Inside a Cavity. Chatrpol Lertsirimit, David R. Jackson and Donald R.

Time-Domain Coupling to a Device on Printed Circuit Board Inside a Cavity. Chatrpol Lertsirimit, David R. Jackson and Donald R. Time-Domain Coupling to a Device on Printed Circuit Board Inide a Cavity Chatrpol Lertirimit, David R. Jackon and Donald R. Wilton Applied Electromagnetic Laboratory Department of Electrical Engineering,

More information

Optimized BER Performance of Asymmetric Turbo Codes over AWGN Channel

Optimized BER Performance of Asymmetric Turbo Codes over AWGN Channel International Journal of Computer Application (0975 8887) Optimized Performance of Aymmetric Turbo Code over AWGN Channel M.Srinivaa Rao Pvpit, JNTU Kainada Andhra Pradeh, India. G.Vijaya Kumar Pvpit,

More information

Alternating Opportunistic Large Arrays in Broadcasting for Network Lifetime Extension

Alternating Opportunistic Large Arrays in Broadcasting for Network Lifetime Extension IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL 8, NO 6, JUNE 009 831 Alternating Opportunitic Large Array in Broadcating for Network Lifetime Extenion Aravind Kaila and Mary Ann Ingram Abtract We propoe

More information

Lab 7 Rev. 2 Open Lab Due COB Friday April 27, 2018

Lab 7 Rev. 2 Open Lab Due COB Friday April 27, 2018 EE314 Sytem Spring Semeter 2018 College of Engineering Prof. C.R. Tolle South Dakota School of Mine & Technology Lab 7 Rev. 2 Open Lab Due COB Friday April 27, 2018 In a prior lab, we et up the baic hardware

More information

ASSISTING PERSONAL POSITIONING IN INDOOR ENVIRONMENTS USING MAP MATCHING

ASSISTING PERSONAL POSITIONING IN INDOOR ENVIRONMENTS USING MAP MATCHING Archive of Photogrammetry, Cartography and Remote Sening, Vol., 0, pp. 39-49 ISSN 083-4 ASSISTING PERSONAL POSITIONING IN INDOOR ENVIRONMENTS USING MAP MATCHING Mohamed Attia, Adel Moua, ing Zhao 3, Naer

More information

Pre- and Post-DFT Combining Space Diversity Receiver for Wideband Multi-Carrier Systems

Pre- and Post-DFT Combining Space Diversity Receiver for Wideband Multi-Carrier Systems Pre- and Pot- Combining Space Receiver for Wideband Multi-Carrier Sytem Muhammad Imadur Rahman, Suvra Sekhar Da, Frank HP Fitzek, Ramjee Praad Center for TeleInFratruktur (CTiF), Aalborg Univerity, Denmark

More information

NOISE BARRIERS CERC 1. INTRODUCTION

NOISE BARRIERS CERC 1. INTRODUCTION Augut 217 P33/1B/17 NOISE BARRIERS CERC In thi document ADMS refer to ADMS-Road 4.1, ADMS-Urban 4.1 and ADMS-Airport 4.1. Where information refer to a ubet of the lited model, the model name i given in

More information

Gemini. The errors from the servo system are considered as the superposition of three things:

Gemini. The errors from the servo system are considered as the superposition of three things: Gemini Mount Control Sytem Report Prediction Of Servo Error Uing Simulink Model Gemini 9 July 1996 MCSJDW (Iue 3) - Decribe the proce of etimating the performance of the main axi ervo uing the non-linear

More information

Francisco M. Gonzalez-Longatt Juan Manuel Roldan Jose Luis Rueda. Line 5: City, Country

Francisco M. Gonzalez-Longatt Juan Manuel Roldan Jose Luis Rueda. Line 5: City, Country Impact of DC Control Strategie on Dynamic Behaviour of Multi-Terminal Voltage-Source Converter-Baed HVDC after Sudden Diconnection of a Converter Station Francico M. Gonzalez-Longatt Juan Manuel Roldan

More information

Resonant amplifier L A B O R A T O R Y O F L I N E A R C I R C U I T S. Marek Wójcikowski English version prepared by Wiesław Kordalski

Resonant amplifier L A B O R A T O R Y O F L I N E A R C I R C U I T S. Marek Wójcikowski English version prepared by Wiesław Kordalski A B O R A T O R Y O F I N E A R I R U I T S Reonant amplifier 3 Marek Wójcikowki Englih verion prepared by Wieław Kordalki. Introduction Thi lab allow you to explore the baic characteritic of the reonant

More information

Hardware-in-the-loop tuning of a feedback controller for a buck converter using a GA

Hardware-in-the-loop tuning of a feedback controller for a buck converter using a GA SPEEDAM 8 International Sympoium on Power Electronic, Electrical Drive, Automation and Motion Hardware-in-the-loop tuning of a feedback controller for a buck converter uing a GA Mr K. D. Wilkie, Dr M.

More information

Deterministic Deployment for Wireless Image Sensor Nodes

Deterministic Deployment for Wireless Image Sensor Nodes Send Order for Reprint to reprint@benthamcience.ae 668 The Open Electrical & Electronic Engineering Journal, 04, 8, 668-674 Determinitic Deployment for Wirele Image Senor Node Open Acce Junguo Zhang *,

More information

CSS: Conditional State-based Scheduling for Networked Control Systems

CSS: Conditional State-based Scheduling for Networked Control Systems In Proc. of the IEEE International Conference on Embedded and Real-Time Computing Sytem and Application (RTCSA), Seoul, South Korea, Augut 2012. Revied verion. CSS: Conditional State-baed Scheduling for

More information

Adaptive Groundroll filtering

Adaptive Groundroll filtering Adaptive Groundroll filtering David Le Meur (CGGVerita), Nigel Benjamin (CGGVerita), Rupert Cole (Petroleum Development Oman) and Mohammed Al Harthy (Petroleum Development Oman) SUMMARY The attenuation

More information

IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 11, 2016 ISSN (online):

IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 11, 2016 ISSN (online): IJSRD - International Journal for Scientific Reearch & Development Vol. 3, Iue 11, 2016 ISSN (online): 2321-0613 Deign and Analyi of IIR Peak & Notch Ravi Choudhary 1 Pankaj Rai 2 1 M.Tech. Student 2 Aociate

More information

HIGH VOLTAGE DC-DC CONVERTER USING A SERIES STACKED TOPOLOGY

HIGH VOLTAGE DC-DC CONVERTER USING A SERIES STACKED TOPOLOGY HIGH VOLTAGE DC-DC CONVERTER USING A SERIES STACKED TOPOLOGY Author: P.D. van Rhyn, Co Author: Prof. H. du T. Mouton Power Electronic Group (PEG) Univerity of the Stellenboch Tel / Fax: 21 88-322 e-mail:

More information

Observational Uncertainty in Plan Recognition Among Interacting. Robots. Marcus J. Huber. Edmund H. Durfee

Observational Uncertainty in Plan Recognition Among Interacting. Robots. Marcus J. Huber. Edmund H. Durfee Obervational Uncertainty in Plan Recognition Among Interacting Robot Marcu J. Huber Edmund H. Durfee Ditributed Intelligent Agent Group (DIAG) Articial Intelligence Laboratory The Univerity of Michigan

More information

ENHANCEMENT OF FINGER VEIN IMAGE USING MULTIFILTERING ALGORITHM

ENHANCEMENT OF FINGER VEIN IMAGE USING MULTIFILTERING ALGORITHM ENHANCEMENT OF FINGER VEIN IMAGE USING MULTIFILTERING ALGORITHM Kayode A. Akintoye 1, 2, Mohd Shafry Mohd Rahim 1 and Abdul Hanan Abdullah 1 1 Department of Computer Science, Faculty of Computing, Univeriti

More information

Chapter Introduction

Chapter Introduction Chapter-6 Performance Analyi of Cuk Converter uing Optimal Controller 6.1 Introduction In thi chapter two control trategie Proportional Integral controller and Linear Quadratic Regulator for a non-iolated

More information

Available online at ScienceDirect. Procedia Technology 17 (2014 )

Available online at  ScienceDirect. Procedia Technology 17 (2014 ) Available online at www.ciencedirect.com ScienceDirect Procedia Technology 17 (014 ) 791 798 Conference on Electronic, Telecommunication and Computer CETC 013 DC-DC buck converter with reduced impact Miguel

More information

Improvement in Image Reconstruction of Biological Object by EXACT SIRT cell Scanning Technique from Two Opposite sides of the Target

Improvement in Image Reconstruction of Biological Object by EXACT SIRT cell Scanning Technique from Two Opposite sides of the Target Vol. 3, Iue. 3, ay.-june. 2013 pp-1597-1601 ISSN: 2249-6645 Improvement in Image Recontruction of Biological Object by EXACT SIRT cell Scanning Technique from Two Oppoite ide of the Target Kabita Purkait

More information

Phase-Locked Loops (PLL)

Phase-Locked Loops (PLL) Phae-Locked Loop (PLL) Recommended Text: Gray, P.R. & Meyer. R.G., Analyi and Deign of Analog Integrated Circuit (3 rd Edition), Wiley (992) pp. 68-698 Introduction The phae-locked loop concept wa firt

More information

Midterm: In Perspective

Midterm: In Perspective Undertanding and Meauring Speedup Lat Time» Midterm Exam Today» Midterm Summary» Definition of Speedup» Meauring Speedup Reminder/Announcement» New Homework #3 will be out oon (tomorrow?)» Midterm Exam

More information

Mechatronics Laboratory Assignment 5 Motor Control and Straight-Line Robot Driving

Mechatronics Laboratory Assignment 5 Motor Control and Straight-Line Robot Driving Mechatronic Laboratory Aignment 5 Motor Control and Straight-Line Robot Driving Recommended Due Date: By your lab time the week of March 5 th Poible Point: If checked off before your lab time the week

More information

Solution to Tutorial 11

Solution to Tutorial 11 Solution to Tutorial 202/203 Semeter I MA4264 Game Theory Tutor: Xiang Sun November 5, 202 Exercie. Conider the following three-peron game: v( = 0, v(} = 0.2, v(2} = v(3} = 0, v(, 2} =.5, v(, 3} =.6, v(2,

More information

R-R Interval Processing Using BIOPAC s HRV Algorithm Implementation

R-R Interval Processing Using BIOPAC s HRV Algorithm Implementation APPLICATION NOTE 42 Aero Camino, Goleta, CA 93117 Tel (805) 685-0066 Fax (805) 685-0067 info@biopac.com www.biopac.com Updated 01.07.2016 Application Note 246 R-R Interval Proceing Uing BIOPAC HRV Algorithm

More information

A COMPARISON OF METHODS FOR EVALUATING THE TEST ZONE PERFORMANCE OF ANECHOIC CHAMBERS DESIGNED FOR TESTING WIRELESS DEVICES

A COMPARISON OF METHODS FOR EVALUATING THE TEST ZONE PERFORMANCE OF ANECHOIC CHAMBERS DESIGNED FOR TESTING WIRELESS DEVICES A COMPARISON OF METHODS FOR EVALUATING THE TEST ZONE PERFORMANCE OF ANECHOIC CHAMBERS DESIGNED FOR TESTING WIRELESS DEVICES Jame D. Huff John C. Mantovani Carl W. Sirle The Howland Company, Inc. 4540 Atwater

More information

DESIGN OF SECOND ORDER SIGMA-DELTA MODULATOR FOR AUDIO APPLICATIONS

DESIGN OF SECOND ORDER SIGMA-DELTA MODULATOR FOR AUDIO APPLICATIONS DESIGN OF SECOND ORDER SIGMA-DELTA MODULATOR FOR AUDIO APPLICATIONS 1 DHANABAL R, 2 BHARATHI V, 3 NAAMATHEERTHAM R SAMHITHA, 4 G.SRI CHANDRAKIRAN, 5 SAI PRAMOD KOLLI 1 Aitant Profeor (Senior Grade), VLSI

More information

A Real-Time Wireless Channel Emulator For MIMO Systems

A Real-Time Wireless Channel Emulator For MIMO Systems A eal-time Wirele Channel Emulator For MIMO Sytem Hamid Elami, Ahmed M. Eltawil {helami,aeltawil}@uci.edu Abtract: The improvement in channel capacity hailed by MIMO ytem i directly related to intricate

More information

Research Article An Energy and Application Scenario Aware Active RFID Protocol

Research Article An Energy and Application Scenario Aware Active RFID Protocol Hindawi Publihing Corporation EURASIP Journal on Wirele Communication and Networking Volume 0, Article ID 98, 15 page doi:.1155/0/98 Reearch Article An Energy and Application Scenario Aware Active RFID

More information

Non-Linear UWB Receivers With MLSE Post-Detection

Non-Linear UWB Receivers With MLSE Post-Detection on-linear UWB Receiver With MLSE Pot-Detection Florian roech, homa Zaowki, and Armin Wittneben Communication echnology Laboratory, EH Zurich, 8092 Zurich, Switzerland Email: {troechf,zaowki,wittneben}@nari.ee.ethz.ch

More information

A Flyback Converter Fed Multilevel Inverter for AC Drives

A Flyback Converter Fed Multilevel Inverter for AC Drives 2016 IJRET olume 2 Iue 4 Print IN: 2395-1990 Online IN : 2394-4099 Themed ection: Engineering and Technology A Flyback Converter Fed Multilevel Inverter for AC Drive ABTRACT Teenu Joe*, reepriya R EEE

More information

Time-Sensitive Utility-Based Routing in Duty-Cycle Wireless Sensor Networks with Unreliable Links

Time-Sensitive Utility-Based Routing in Duty-Cycle Wireless Sensor Networks with Unreliable Links Time-Senitive Utility-Bae Routing in Duty-Cycle Wirele Senor Network with Unreliable Link Mingjun Xiao, Jie Wu, an Liuheng Huang School of Computer Science an Technology, Univerity of Science an Technology

More information

GPS signal Rician fading model for precise navigation in urban environment

GPS signal Rician fading model for precise navigation in urban environment Indian Journal of Radio & Space Phyic Vol 42, June 203, pp 92-96 GPS ignal Rician fading model for precie navigation in urban environment G Sai Bhuhana Rao, G Sateeh Kumar $,* & M N V S S Kumar Department

More information

Design of Control for Battery Storage Unit Converter

Design of Control for Battery Storage Unit Converter POSER 2016, PRAGUE MAY 24 1 Deign of Control for Battery Storage Unit Converter Martin GALÁD 1 1 Dept. of Mechatronic and Electronic, Univerity of Žilina, Univezitná 1, 010 26 Žilina, Slovakia martin.galad@fel.uniza.k

More information

Network Coding for Multi-Resolution Multicast

Network Coding for Multi-Resolution Multicast Network Coding for Multi-Reolution Multicat MinJi Kim, Daniel Lucani, Xiaomeng Shi, Fang Zhao, Muriel Médard Maachuett Intitute of Technology, Cambridge, MA 02139, USA Email: {minjikim, dlucani, xhi, zhaof,

More information

SETTING UP A GRID SIMULATOR A. Notholt 1, D. Coll-Mayor 2, A. Engler 1

SETTING UP A GRID SIMULATOR A. Notholt 1, D. Coll-Mayor 2, A. Engler 1 SETTING U A GRID SIMULATOR A. Notholt, D. CollMayor 2, A. Engler Intitut für Solare Energieverorgungtechnik (ISET). Königtor 9. D349 Kael anotholt@iet.unikael.de 2 Department of hyic. Univerity of Balearic

More information

Studies on Novel Anti-jamming Technique of Unmanned Aerial Vehicle Data Link

Studies on Novel Anti-jamming Technique of Unmanned Aerial Vehicle Data Link Chinee Journal of Aeronautic 1(008) 141-148 Chinee Journal of Aeronautic www.elevier.com/locate/cja Studie on ovel Anti-jamming Technique of Unmanned Aerial Vehicle Data Link Huang enzhun a, *, ang Yongheng

More information

AC : TEACHING DIGITAL FILTER IMPLEMENTATIONS US- ING THE 68HC12 MICROCONTROLLER

AC : TEACHING DIGITAL FILTER IMPLEMENTATIONS US- ING THE 68HC12 MICROCONTROLLER AC 2011-549: TEACHING DIGITAL FILTER IMPLEMENTATIONS US- ING THE 68HC12 MICROCONTROLLER Li Tan, Purdue Univerity North Central DR. LI TAN i currently with the College of Engineering and Technology at Purdue

More information

Adaptive Path Planning for Effective Information Collection

Adaptive Path Planning for Effective Information Collection Adaptive Path Planning for Effective Information Collection Ayan Dutta, Prithviraj Dagupta Abtract We conider the problem of information collection from an environment by a multi-robot ytem, where the

More information

ENERGY CONSERVING MODEL FOR THE CHANNEL POWER-GAIN IN WIRELESS MULTI-USER DOWNLINK SCENARIOS

ENERGY CONSERVING MODEL FOR THE CHANNEL POWER-GAIN IN WIRELESS MULTI-USER DOWNLINK SCENARIOS ENERGY CONSERVING MOEL FOR THE CHANNEL POWER-GAIN IN WIRELESS MULTI-USER OWNLIN SCENARIOS Michel T. Ivrlač and Joef A. Noek Intitute for Circuit Theory and Signal Proceing Techniche Univerität München

More information

A Feasibility Study on Frequency Domain ADC for Impulse-UWB Receivers

A Feasibility Study on Frequency Domain ADC for Impulse-UWB Receivers A Feaibility Study on Frequency Domain ADC for Impule-UWB Receiver Rajeh hirugnanam and Dong Sam Ha VV (Virginia ech VLSI for elecommunication Lab Department of Electrical and Computer Engineering Virginia

More information

/09/$ IEEE 472

/09/$ IEEE 472 Bai Puruit for Robut Paive Acoutic Beamforming Ben Shapo and Chri Kreucher Integrity Application Incorporated 900 Victor Way, Suite 220 Ann Arbor, MI 48108 bhapo@integrity-app.com, ckreuche@umich.edu Abtract

More information

Experiment 3 - Single-phase inverter 1

Experiment 3 - Single-phase inverter 1 ELEC6.0 Objective he Univerity of New South Wale School of Electrical Engineering & elecommunication ELEC6 Experiment : Single-phae C-C Inverter hi experiment introduce you to a ingle-phae bridge inverter

More information

Self Resonance Cancellation for Joint Torque Control Using Torque Sensor

Self Resonance Cancellation for Joint Torque Control Using Torque Sensor IEEJ International Workhop on ening, Actuation, Motion Control, and Optimization elf onance Cancellation for Joint Torque Control Uing Torque enor Akiyuki Haegawa tudent Member, Hirohi Fujimoto enior Member

More information

Making Use Of What You Don t See: Negative Information In Markov Localization

Making Use Of What You Don t See: Negative Information In Markov Localization Making Ue Of What You Don t See: Negative Information In Markov Localization Jan Hoffmann, Michael Spranger, Daniel Göhring, and Matthia Jüngel Department of Computer Science Artificial Intelligence Laboratory

More information

MODAL ANALYSIS OF A BEAM WITH CLOSELY SPACED MODE SHAPES

MODAL ANALYSIS OF A BEAM WITH CLOSELY SPACED MODE SHAPES ME 164 Senior Captone Deign The Cooper Union Spring 2011 MODAL ANALYSIS O A BEAM WITH CLOSELY SPACED MODE SHAPES Eglind Myftiu The Cooper Union New York City, NY, USA ABSTRACT Thi paper invetigate the

More information

Protection scheme for transmission lines based on correlation coefficients

Protection scheme for transmission lines based on correlation coefficients International Journal of Energy and Power Engineering 4; 3(): 93- Publihed online May, 4 (http://www.ciencepublihinggroup.com/j/ijepe) doi:.648/j.ijepe.43.8 Protection cheme for tranmiion line baed on

More information

Constant Switching Frequency Self-Oscillating Controlled Class-D Amplifiers

Constant Switching Frequency Self-Oscillating Controlled Class-D Amplifiers http://dx.doi.org/.5755/j.eee..6.773 ELEKTRONIKA IR ELEKTROTECHNIKA, ISSN 39 5, OL., NO. 6, 4 Contant Switching Frequency Self-Ocillating Controlled Cla-D Amplifier K. Nguyen-Duy, A. Knott, M. A. E. Anderen

More information

Before the beginning of the Q wave At the top of the R wave After the end of the S wave

Before the beginning of the Q wave At the top of the R wave After the end of the S wave 334 AcqKnowledge 4 Software Guide Detect and Claify Heartbeat Thi robut QRS detector i tuned for human ECG Lead II ignal. It attempt to locate QRS complexe and place an event near the center of each QRS

More information

Instantaneous Cycle-Slip Detection and Repair of GPS Data Based on Doppler Measurement

Instantaneous Cycle-Slip Detection and Repair of GPS Data Based on Doppler Measurement Intantaneou Cycle-Slip Detection and Repair of GPS Data Baed on Doppler Meaurement Zhoufeng Ren, Liyan Li, Jie Zhong, and Minjian Zhao Abtract In GPS receiver, carrier phae meaurement can be ued to improve

More information

Comparison Study in Various Controllers in Single-Phase Inverters

Comparison Study in Various Controllers in Single-Phase Inverters Proceeding of 2010 IEEE Student Conference on Reearch and Development (SCOReD 2010), 13-14 Dec 2010, Putrajaya, Malayia Comparion Study in ariou Controller in Single-Phae Inverter Shamul Aizam Zulkifli

More information

APPLICATION OF PHASOR MEASUREMENT UNIT IN SMART GRID

APPLICATION OF PHASOR MEASUREMENT UNIT IN SMART GRID APPLICATION OF PHASOR MEASUREMENT UNIT IN SMART GRID 1 Chandarani Sutar, 2 Dr. K. S. Verma 1 RRSIMT Amethi (U.P.), 2 KNIT Sultapur (U.P.) Email: 1 Chandarani_t@yahoo.com, 2 kv211@rediffmail.com, Abtract-A

More information

Adaptive Code Allocation for Interference Exploitation on the Downlink of MC-CDMA Systems

Adaptive Code Allocation for Interference Exploitation on the Downlink of MC-CDMA Systems Adaptive Code Allocation for Interference Exploitation on the Downlink of MC-CDMA Sytem E. Alua and C. Maouro School of Electrical and Electronic Engineering, The Univerity of Mancheter, PO. Box 88, email:

More information

Design, Realization, and Analysis of PIFA for an RFID Mini-Reader

Design, Realization, and Analysis of PIFA for an RFID Mini-Reader Deign, Realization, and Analyi of PIFA for an RFID Mini-Reader SUNG-FEI YANG ; TROY-CHI CHIU ; CHIN-CHUNG NIEN Indutrial Technology Reearch Intitute (ITRI) Rm. 5, Bldg. 5, 95, Sec., Chung Hing Rd., Chutung,

More information