Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits

Size: px
Start display at page:

Download "Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits"

Transcription

1 Secuity in Distibuted Stoage Systems by Communicating a Logaithmic Numbe of Bits Theodoos K. Dikaliotis Depatment of lectical ngineeing Alexandos G. Dimakis Depatment of lectical ngineeing Tacey Ho Depatment of lectical ngineeing axiv: v1 [cs.cr] 4 May 2010 Califonia Institute of Technology Univesity of Southen Califonia Califonia Institute of Technology mail: tdikal@caltech.edu mail: dimakis@usc.edu mail: tho@caltech.edu Abstact We investigate the poblem of maintaining an encoded distibuted stoage system when some nodes contain advesaial eos. Using the eo-coection capabilities that ae built into the existing edundancy of the system, we popose a simple linea hashing scheme to detect eos in the stoage nodes. Ou main esult is that fo stoing a data object of total size M using an (n,k) MDS code ove a finite field F q, up to t 1 = (n k)/2 eos can be detected, with pobability of failue smalle than 1/M, by communicating only O(n(n k)logm) bits to a tusted veifie. Ou esult constucts small pojections of the data that peseve the eos with high pobability and builds on a pseudoandom geneato that fools linea functions. The tansmission ate achieved by ou scheme is asymptotically equal to the min-cut capacity between the souce and any eceive. I. INTRODUCTION We study the secuity and data integity of distibuted stoage systems that use coding fo edundancy. It is well known that maximum distance sepaable (MDS) codes can offe maximum eliability fo a given stoage ovehead and can be used fo distibuted stoage in data centes and pee-to-pee stoage systems like OceanStoe [1], Total Recall [2], and FS2You [3], that use nodes acoss the Intenet fo distibuted file stoage and shaing. In this pape we ae inteested in dealing with eos in the encoded epesentation. The eos could be intoduced eithe though (unlikely) had dive undetected failues o though a malicious o compomised seve in the stoage netwok. This second theat is much moe eminent when the system uses netwok coding to maintain the edundancy of the encoded system as poposed ecently [4]. To illustate this conside a lage data object that has size M bits. If this object is to be stoed on n seves, depending on the desied edundancy, an (n,k) linea MDS code can be used, dividing the object into k packets of size M/k each, and stoing an encoded packet at each seve. Assuming the code is ove a finite field F q, equiing logq bits to epesent each symbol, each seve will also need to keep a heade denoting the coding coefficients of the linea combinations stoed on the seve (see section II fo the details) and the size of this heade is lage than the size of the useful data if the code is used only once. Fo this eason it was poposed that the same code is used seveal times [5] by dividing each 0 This wok has been suppoted patially by NSF gant CNS , patially by the Ai Foce Office of Scientific Reseach unde gant FA and Caltech s Lee Cente fo Advanced Netwoking

2 Fig. 1. A (4,2) MDS code along with the epai of the fist stoage node. ach node stoes two packets and any two nodes contain enough infomation to ecove all fou data packets. In this example the fist node leaves the system and a new node is fomed by communicating linea combinations f 2,f 3,f 4 which can be used to solve fo x 1,x 2 at the new node. packet into N symbols of logq bits and epeating the same code N times. If N >> n the ovehead of stoing the coefficients becomes negligible. We efe to this as the N extended vesion of an MDS code, shown in Figue 2 fo the (4,2) code used in Figue 1. Obseve that in this example, each node is stoing two linea combinations, (ows) as opposed to one. This sub-packetization is pefomed to facilitate epai though netwok coding as poposed in [4]. The poblem of epai consists of constucting a new encoded node by accessing as little infomation fom existing encoded nodes. In the example of Figue 1, we assume that the fist stoage node failed and the edundancy of the system needs to be efeshed. This is achieved by communicating small linea combinations f 2,f 3,f 4 of the encoded packets fom nodes 2,3, and 4 each of size 1/2 of what each node is stoing, which as poven in [4], is infomation theoetically minimal. As stoage nodes leave the system and new ones ae added, this foms a dynamic stoage netwok that keeps a fixed edundancy and eliability by building new encoded packets fom aleady existing ones. The poblem of secuity should now be clea: even if a single node in this stoage system is compomised and paticipates in this epai pocess, then it can send incoect linea combinations that will ceate eoneous packets at the new nodes. All new nodes using these linea equations will have incoect data and soon the whole system will be contaminated with nodes having eoneous data.

3 Ou contibution: Since the poblem of epaiing a code is equivalent to wieline netwok coding [4], existing techniques fo netwok eo coection can be used to detect and coect the eos [6], [7]. These techniques ae designed to wok fo geneal netwoks and always guaantee a tansmission ate of C 2z, whee C is the min-cut capacity fom the souce to the destination and z is the numbe of links contaminated by the advesay. Ou appoach, that is ceating and communicating small linea hashes which peseve the stuctue of the code, allows the detection of eos and achieves a tansmission ate that can be asymptotically equal to C (by having the eceive connecting to all the non-eoneous nodes) since it takes advantage of the specific stuctue of the netwok and the set of links an advesay can contaminate. To explain ou scheme, conside the (4,2) MDS code of Figue 1 and assume one of the fou nodes contains eos (say in both ows). A tusted veifie that communicates with all fou nodes can find this eo by getting the 8 equations contained in each of the 4 = 6 node pais. Since this is a (4,2) MDS code, the combinations of equations that come fom eo-fee 2 nodes will be full ank and give a consistent solution wheeas the othe sets will give diffeent solutions (o might not even be full ank). This is, of couse, just using the eo-coection capability of the code to detect an eo. Ou contibution involves using this idea to the N-extended vesion of a code, by ceating a linea pojection (hash) of each ow on the same andom vecto. The key obsevation is that if the same andom pojection is used, this ceates an eo-coecting code fo the hashes which can be communicated to the veifie. The benefit is that each hash has size only 1/N of the data in each ow educing the amount of communication to the veifie. One complication is that each node needs to poject its data on the same andom vecto of length N, which equies N logq bits of common andomness. Subsequently the poblem at the veifie is to decode an eo-coecting code unde advesaial eos. This decoding task can be computationally inefficient but we do not addess this issue hee, assuming that the veifie can detect the eos if they ae within the eo coecting capabilities of the code as dictated by the minimum distance (half the minimum distance). Ou analysis investigates unde which conditions the small pojected hash code will detect any eo in the lage amount of data stoed at the nodes. In paticula, we pove the following Theoem 1: In a distibuted stoage system stoing a total ofmbits, using ann extended(n,k) MDS code ovef q, with the n stoage nodes shaing O(M) bits of common andomness, ou andom hashing scheme can detect up to t t 1 (n k)/2 eos by communicating a total of n(n k)(logm+logt 1 ) bits to a veifie, with pobability of failue P[F] 1 M. One impotant weakness of the pevious esult is the lage common andomness equied which is compaable to the total size of the data object stoed (1/k(n k) faction of the M bits). Note that these bits do not have to be a secet, they only need to be ealized afte the eo has been intoduced to the new disk. Thei lage numbe, howeve, makes it impactical to geneate them at one node and then communicate them to the othes. Ou second contibution involves showing how to use only O(log M) bits of common andomness to achieve almost the same pefomance: Theoem 2: In a distibuted stoage system stoing a total of M bits, using an N extended (n,k) MDS code ove F q, with the n stoage nodes shaing O(log M) bits of common andomness, ou pseudoandom hashing scheme can detect up to

4 Fig. 2. Illustation of the 3 extended vesion of the (4,2) MDS code shown in Figue 1. ach of the thee columns stoed on the souce nodes is coded by epeatedly using the (4,2) MDS of Figue 1. Duing veification, each ow is pojected on the vecto T = (1 1 1) and the coesponding poducts S 1,...,S 4 fom a codewod of the initial (4,2) MDS code. Fo example, the eos at the fist ow of the fist node will not be absobed by the pojection as long as (e 11 e 12 e 13 ) (1 1 1) T 0 t 1 = (n k)/2 eos by communicating a total of O(n(n k)logm) bits to the veifie, with pobability of failue P[F ] 1 M. If thee is no common andomness, the veifie can geneate the O(logM) andom bits and communicate these to all the nodes equiing a total of O(n log M) exta communicated bits. Notice that in this case the total numbe of bits communicated scales only logaithmically in M, to achieve a pobability of failue that scales like 1/M. Ou constuction elies on the pseudoandom small-bias geneato used in [8] which can expand logn andom symbols of F q (which equie logn logq andom bits to geneate), into N pseudoandom symbols that can fool any linea function 1. The only modification to ou algoithm is pojecting each stoed ow on this pseudoandom vecto to geneate each hash and this induces only a small addition to the pobability of eo. Notice that ou wok does not ely on any cyptogaphic assumptions and guaantees that eos inseted in the distibuted stoage system will be detected with high pobability if they ae within the capabilities of the code used. Using the eo-coection capability of the code fo distibuted stoage has been suggested befoe as a way to detect eos [10], [11] and identify fee ides within the netwok. A diffeent appoach to find eos injected in distibuted stoage and content distibution systems is the use of signatues and hash functions. Refeence [12] intoduced the use of homomophic hashing functions that enables a nodes to pefom on-the-fly veification of easue-encoded blocks. Gkantsidis et al. [13] used the computationally less expensive secue andom checksums to detect polluted packets in content distibution system that use netwok coding while [14], [15] used a method of subspace signatues based on diffeent cyptogaphic pimitives. See also [16], [17], [18] fo othe elated wok on secuity and distibuted stoage.

5 II. MODL As stated, we conside a data object of size M bits that is divided into k pieces (of size M/k bits each) and these ae coded into n (> k) encoded pieces though a linea (n, k) maximum distance sepaable (MDS) code. These encoded pieces ae stoed on n distinct stoage nodes along with a heade denoting the exact linea combination saved at all the stoage nodes. Since the size of the code (n,k) will be much smalle than N, the ovehead of stoing the code desciption eveywhee (including the veifie) is minimal. This simplifies the model and we can now assume that the eos occu only at the data, since an eo at the heade would be immediately detected. We assume that the oiginal infomation (of size M bits) is oganized into a matix X with k(n k) ows and N columns. The elements of this matix ae elements of the finite field F q, i.e., X F k(n k) N q whee q is a pime o an intege powe of a pime. ach column Xi c F q k(n k) 1 (i {1,...,N}) of matix X will be sepaately encoded with the use of an (n,k) MDS code with geneato matix G F n(n k) k(n k) q and all the columns GXi c F n(n k) 1 q deived by this encoding will be stoed on the n diffeent stoage nodes of the distibuted stoage system. We will call this code applied to the N diffeent columns of matix X as the N extended MDS code. The oveall effect that the N extended MDS code has upon the infomation matix X is captued by the matix multiplication GX. Figue 2 shows such a code fo N = 3 whee the MDS code used is the same as the one shown in Figue 1. The stoage nodes of the distibuted stoage system ae assumed to have limited computational capabilities allowing them only to pefom inexpensive opeations ove the finite field F q. Some of these stoage nodes ae assumed to stoe eoneous infomation, whee these eos might be eithe andom due to hadwae failues o inseted advesaially by a malicious use. The malicious use can be computationally unbounded, have knowledge of all the infomation stoed on the distibuted stoage system and can inset eos to any t of the stoage nodes. We assume the existence of a special node called the veifie that is assigned to check the integity of the data stoed on diffeent stoage nodes. The veifie does not have access to the initial data object (othe than the desciption of the code) and theefoe has to ely on the communicated infomation to check which nodes contain eos. III. RANDOM HASHS A. Illustating example Assume that in the distibuted stoage system shown in Figue 2 with fou stoage nodes it is known that one of them (the fist in this example) stoes eoneous infomation. The goal of the veifie that ovelooks the state of the whole system is fist to find the eoneous disk with the minimum data exchange and second to epai it by using the infomation stoed on the othe disks. Since all thee columns stoed on the distibuted stoage system ae codewods of a (4,2) MDS code with at most one eo (some columns might be eo fee) and minimum distance d = 3, the naïve appoach to find the eoneous disk is to download all data fom diffeent disks and then by using minimum distance decoding on each sepaate column one would be able to find the eoneous disk. 1 Fist intoduced by Nao and Nao in [9] fo linea functions in F 2.

6 The naïve appoach would cetainly find the faulty disk but it would equie the tansfe of double the size of the file stoed ( n km bits of infomation in geneal). So as the size of the file inceases this appoach will become pohibitively expensive in bandwidth. Instead of tansmitting all the infomation stoed on the distibuted stoage system, the cental node could choose a vecto with each component chosen independently and unifomly at andom fom F q and have each stoage node tansmit the inne poduct (called the hash poduct) between the andomly chosen vecto and each of the ows stoed at the disks. In the absence of eos, these hash poducts will fom a codewod of the MDS code used to encode the diffeent columns of the infomation matix. In case thee ae eos, as in the case of the fist node in Figue 2, the multiplication with the andom vecto will not obscue these eos unless S ei = 0 e i1 +e i2 +e i3 = 0, fo i = {1,2}. The eason why the chosen vecto should be andom is so that the advesay can not delibeately choose the eos to make them disappea afte the vecto multiplication. B. Geneal case The initial infomation matix X F n(n k) N q is coded with the use of an N-extended MDS code with geneato matix G F n(n k) k(n k) q. Some of the stoage nodes contain eos and theefoe what is actually stoed on the distibuted stoage system is Y = GX+ whee Y, F n(n k) N q and is the eo matix. The veifie wants to identify all eoneous disks by sending hash poduct equests to all nodes. Then the following theoem holds: Poof of Theoem 1: All stoage nodes shae N logq bits of common andomness and theefoe they can ceate the same andom vecto F N 1 q with each component of vecto dawn unifomly at andom fom F q. Afte the andom vecto is computed, each stoage node calculates the hash poduct inne poduct between the andom vecto and its content on evey ow. These n(n k) hash poducts ae equal to: H = Y = (GX +) H = G(X)+e (1) whee e = F n(n k) 1 q is a column vecto with at most t m non-zeo components epesenting the eoneous disks (these non-zeo components must coespond to the position of at most t m stoage nodes with eos). The key obsevation is that the pojection will not identify an eo patten at a specific ow if vecto is othogonal to that ow of. Intuitively, a andomly selected will be non-othogonal to an abitay ow of with high pobability and this is the pobability we need to analyze. Fom equation (1) it can be seen that the ode of applying the MDS encoding on the diffeent columns of the infomation matix X and the calculation of the hash poducts can be intechanged ((GX) = G(X)) making the pocess of identifying the eoneous disks equivalent to finding the eo positions in a egula MDS code that is guaanteed to succeed if the minimum distance of the code (n k +1) is lage than twice the numbe of eos 2t (that is indeed satisfied by the assumptions of Theoem 1). The set of indices that coespond to the components of vecto e that come fom disk i is R i = {(i 1)(n k)+1,...,i(n k)}. We ae inteested in vecto e since this gives us the positions of the faulty disks. One complication that might aise is the fact that disk i might contain an eo, meaning that ows {j,j R i} of the eo matix ae not all zeo wheeas the

7 coesponding components of vecto e ({e j,j R i }) tun out to be zeo and theefoe ou scheme fails to detect that eo. Assume that the set of eoneous disks is W {1,2,...,n} and define P[F] to be the pobability of failing to detect some eos. We get P[F] = P ( j = 0 ) i W j R i P (j = 0) 1 q n k 2 t 1 q q i W j R i i W (2) whee inequality ( ) holds due to the fact that the pobability that some stoage node with eos poduce zeo hash poducts is less than 1/q f whee f is the numbe of linealy independent eos ows saved at its disk. So by assuming that the advesay has poduced linealy dependent eos would only incease the pobability of failue. If the advesay has saved eo vectos at stoage node i with ank 1 then the pobability P[ (j = 0)] in equation j Ri (2) educes to an equation fo a single ow (assuming ow k): P e kf f = 0 = P f = e kf f = 1 e kf q e kf 0 whee we only took the tems with a non-zeo eo coefficient e kf. The numbes (e kf /e kf ) f (e kf is any non-zeo eo element fom the k th ow) ae independent and unifom ove F q and so is thei sum accoding to Lemma 1. So the last equality e kf 0 holds since two independent unifomly distibuted ove F q andom numbes ae equal with pobability 1/q. When the eos have ank f > 1 then the pobability P[ j Ri ( j = 0)] can be evaluated by disegading the linealy dependent ows. By looking only at the linealy independent ones and by choosing f columns we can fomulate an invetible submatix Êi F q f f and similaly to the pevious analysis we have that P[ j Ri ( j = 0)] = P[Êiˆ =ˆb] whee ˆ,ˆb F f 1 whee ˆ ae the components of the andom vecto that coespond to the columns whee the submatix Êi was fomed. Since ˆb is unifomly andom, due to the pevious analysis P[ ʈ = b] = 1/q f. ach of the n stoage nodes has to convey to the veifie the esult of the hash poduct fom all its (n-k) ows, so that the total size of the hash communicated is H = n(n k)logq, wheeas the size of the file M = k(n k)n logq. By substituting the field q equal to n k 2 M we conclude the poof of Theoem 1. Lemma 1: The sum of any numbe of independent unifomly distibuted andom vaiables gives a unifomly distibuted andom vaiable. Poof: Without loss of geneality we will pove Lemma 1 only fo the case of two andom vaiables. Assume that x,y F q ae two independent and unifomly distibuted andom vaiables. We will pove that x + y is also unifomly distibuted, indeed t 1,t 2 F q : P[x+y = t 1 ] = P[x = t 1 y y = t 2 ]P[y = t 2 ] t 2 F q

8 ( ) = P[x = t 1 t 2 ] 1 q = q 1 q = q 1 q 2 = 1 q t 2 F q t 2 F q 1 whee equality (*) holds due to the independence between x and y. Befoe we continue to pove Theoem 2 we need to give the following definition (extension of Definition 2.1 in [8] to non-pime numbes): Definition 1: a) Let q be a pime o an intege powe of a pime. Fo a andom vaiable X with values in F q, let the bias of X be defined by bias(x) = (q 1)P[X = 0] P[X 0] A andom vaiable X F q is ǫ-biased if bias(x) ǫ. b) The sample space S F q l is ǫ-biased if fo all c F q and each sequence β = (β 1,...,β l ) F q n \{0 l } the following is valid: if a sequence X = (x 1,...,x l ) S is chosen unifomly at andom fom S, then the andom vaiable ( l i=1 β ix i +c) is ǫ-biased. Poof of Theoem 2: All stoage nodes execute the algoithm descibed in Poposition of [8] and poduces a pseudoandom vecto F q N 1 with N components. The quantity m in the algoithm (and consequently the field size F q m too) is chosen so that the bias (q 1)(N 1)/q m is equal to 1 and theefoe q m = (q 1)(N 1) o m = O(logN). The size of the necessay seed that needs to be povided at all the stoage nodes so that they can stat the algoithm is two elements fom F q m chosen unifomly at andom o equivalently 2mlogq O(logN) andom bits. Once all stoage nodes have constucted the same pseudoandom vecto they compute the inne poduct between vecto and the content stoed on each ow of the stoage nodes. These pseudoandom poducts ae all sent to the veifie to identify the eoneous disks. The whole analysis is identical to the poof of Theoem 1 with one majo diffeence in the calculation of failue pobability P[F ]. Fo the case of a pseudoandom vecto, using the same notation as in the poof of Theoem 1: P[F ] = P ( j = 0 ) i W j R i P ( j = 0 ) P ( j = 0 ) i W j R i i W j R i (n k) n k 2 2 q 2(n k)t 1 q whee inequality ( ) holds since P ( j = 0 ) = 2/q. Indeed the bias of the space constucted by the pseudoandom pocedue is 1 that means: (q 1)P ( j = 0 ) P ( j 0 ) 1 (q 1)P ( j = 0 ) [ 1 P ( j = 0 )] 1 2 This algoithm is descibed fo q pime but it is eadily extensible to q equal to an intege powe of a pime.

9 qp ( j = 0 ) 1 1 P ( j = 0 ) 2 q By setting q = 2(n k)t 1 M we conclude the poof. We would like to undeline hee that both theoems above exhibit the same behavio on the pobability. In Theoem 2 the size of the equied common andomness is deceased in the expense of an inceased field size. Moeove the use of pseudoandom geneatos incus the additional computational cost at each stoage node of O(Nm 2 ) o O(MlogM) opeations in F q to geneate the pseudoandom vecto. ACKNOWLDGMNT The authos would like to thank Pofesso Leonad Schulman fo his insights on pseudoandom geneatos. RFRNCS [1] S. Rhea, C. Wells, P. aton, D. Geels, B. Zhao, H. Weathespoon, and J. Kubiatowicz, Maintenance-fee global data stoage, I Intenet Computing, vol. 5, no. 5, pp , [2] R. Bhagwan, K. Tati, Y.-C. Cheng, S. Savage, and G. M. Voelke, Total ecall: System suppot fo automated availability management, in Poc. of the Netwok Systems Design and Implementation, 2004, pp [3] Y. Sun, F. Liu, B. Li, Li, B. Li, and X. Zhang, Fs2you: Pee-assisted semi-pesistent online stoage at a lage scale, in Poc. of the I Confeence on Compute Communications, Apil [4] A. G. Dimakis, P. B. Godfey, Y. Wu, M. O. Wainwight, and K. Ramchandan, Netwok coding fo distibuted stoage systems, Submitted fo jounal publication. Peliminay vesion appeaed in Infocom [5] P. A. Chou, Y. Wu, and K. Jain, Pactical netwok coding, in Poc. of 41st Annual Alleton Confeence on Communication, Contol, and Computing, [6] S. Jaggi, M. Langbeg, S. Katti, T. Ho, D. Katabi, and M. Médad, Resilient netwok coding in the pesence of byzantine advesaies, in Poc. I INFOCOM 2007, Anchoage, AK, May [7] R. Koette and F. R. Kschischang, Coding fo eos and easues in andom netwok coding, I Tansactions on Infomation Theoy, 2007, submitted. [8] C. Betam-Ketzbeg and H. Lefmann, MOD p-tests, almost independence and small pobability spaces, Random Stuctues & Algoithms, vol. 16, no. 4, pp , [9] J. Nao and M. Nao, Small-bias pobability spaces: fficient constuctions and applications, SIAM Jounal on Computing, vol. 22, pp , [10] T. S. J. Schwaz and. L. Mille, Stoe, foget, and check: Using algebaic signatues to check emotely administeed stoage, in Poc. of ICDCS, [11] W. Litwin and T. Schwaz, Algebaic signatues fo scalable distibuted data stuctues, in Poc. of the I Intenational Confeence on Data ngineeing (ICD 04, 2002, pp [12] M. Kohn, M. Feedman, and D. Maziees, On-the-fly veification of ateless easue codes fo efficient content distibution, in Poc. of the I Symposium on Secuity and Pivacy, May 2004, pp [13] C. Gkantsidis and P. Rodiguez, Coopeative secuity fo netwok coding file distibution, in Poc. of I Intenational Confeence on Compute Communications, Apil 2006, pp [14] F. Zhao, T. Kalke, M. Médad, and K. J. Han, Signatues fo content distibution with netwok coding, in Poc. of the I Intenational Symposium on Infomation Theoy (ISIT), [15] D. Chales, K. Jain, and K. Laute, Signatues fo netwok coding, in Annual Confeence on Infomation Sciences and Systems, Mach 2006, pp [16] J. P. Vilela, L. Lima, and J. Baos, Lightweight secuity fo netwok coding, in Poc. of the I Intenational Confeence on Communications, May 2008.

10 [17]. Kehdi and B. Li, Null keys: Limiting malicious attacks via null space popeties of netwok coding, in Poc. of the I Confeence on Compute Communications, Apil [18] A. Le and A. Makopoulou, Locating byzantine attackes in inta-session netwok coding using spacemac, in Poc. of NetCod, June 2010.

where and are polynomials with real coefficients and of degrees m and n, respectively. Assume that and have no zero on axis.

where and are polynomials with real coefficients and of degrees m and n, respectively. Assume that and have no zero on axis. function whee is an unknown constant epesents fo the un-modeled dynamics The pape investigates the position contol of electical moto dives that can be configued as stuctue of Fig 1 This poblem is fomulated

More information

N2-1. The Voltage Source. V = ε ri. The Current Source

N2-1. The Voltage Source. V = ε ri. The Current Source DC Cicuit nalysis The simplest cicuits to undestand and analyze ae those that cay diect cuent (DC). n this note we continue ou study of DC cicuits with the topics of DC voltage and cuent souces, the idea

More information

Optimal Strategies in Jamming Resistant Uncoordinated Frequency Hopping Systems. Bingwen Zhang

Optimal Strategies in Jamming Resistant Uncoordinated Frequency Hopping Systems. Bingwen Zhang Optimal Stategies in Jamming Resistant Uncoodinated Fequency Hopping Systems by Bingwen Zhang A Thesis Submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE in patial fulfillment of the equiements

More information

Multiagent Reinforcement Learning Dynamic Spectrum Access in Cognitive Radios

Multiagent Reinforcement Learning Dynamic Spectrum Access in Cognitive Radios Sensos & Tansduces 204 by IFSA Publishing, S L http://wwwsensospotalcom Multiagent Reinfocement Leaning Dynamic Spectum Access in Cognitive Radios Wu Chun, 2 Yin Mingyong, 2 Ma Shaoliang, Jiang Hong School

More information

STACK DECODING OF LINEAR BLOCK CODES FOR DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM

STACK DECODING OF LINEAR BLOCK CODES FOR DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM H PRASHANTHA KUMAR et. al.: STACK DECODING OF LINEAR BLOCK CODES FOR DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM DOI:.297/ijct.22.69 STACK DECODING OF LINEAR BLOCK CODES FOR DISCRETE MEMORYLESS CHANNEL

More information

Optimal Design of Smart Mobile Terminal Antennas for Wireless Communication and Computing Systems

Optimal Design of Smart Mobile Terminal Antennas for Wireless Communication and Computing Systems Optimal Design of Smat Mobile Teminal Antennas fo Wieless Communication and Computing Systems Autho Lu, Junwei, Yang, Shiyou Published 2007 Confeence Title 2007 4th Intenational Symposium on Electomagnetic

More information

HYBRID FUZZY PD CONTROL OF TEMPERATURE OF COLD STORAGE WITH PLC

HYBRID FUZZY PD CONTROL OF TEMPERATURE OF COLD STORAGE WITH PLC Jounal of Theoetical and Applied Infomation Technology 28 th Febuay 2013. Vol. 48 No.3 2005-2013 JATIT & LLS. All ights eseved. ISSN: 1992-8645 www.jatit.og E-ISSN: 1817-3195 HYBRID FUZZY PD CONTROL OF

More information

Spectrum Sharing between Public Safety and Commercial Users in 4G-LTE

Spectrum Sharing between Public Safety and Commercial Users in 4G-LTE 1 Spectum Shaing between Public Safety and Commecial Uses in 4G-LTE Haya Shajaiah, Ahmed Abdel-Hadi and Chales Clancy Badley Depatment of Electical and Compute Engineeing Viginia Tech, Alington, VA, 22203,

More information

Analysis of Occurrence of Digit 0 in Natural Numbers Less Than 10 n

Analysis of Occurrence of Digit 0 in Natural Numbers Less Than 10 n meican Intenational Jounal of Reseach in Fomal, pplied & Natual Sciences vailable online at http://www.iasi.net ISSN (Pint): 2328-3777, ISSN (Online): 2328-3785, ISSN (CD-ROM): 2328-3793 IJRFNS is a efeeed,

More information

An Efficient Control Approach for DC-DC Buck-Boost Converter

An Efficient Control Approach for DC-DC Buck-Boost Converter 2016 Published in 4th Intenational Symposium on Innovative Technologies in Engineeing and Science 3-5 Novembe 2016 (ISITES2016 Alanya/Antalya - Tukey) An Efficient Contol Appoach fo DC-DC Buck-Boost Convete

More information

Binary Systematic Network Coding for Progressive Packet Decoding

Binary Systematic Network Coding for Progressive Packet Decoding Binay Systematic etwok Coding fo Pogessive Packet Decoding Andew L. Jones, Ioannis Chatzigeogiou and Andea Tassi School of Computing and Communications, Lancaste Univesity, United Kingdom Email: {a.jones2,

More information

VLSI Implementation of Low Complexity MIMO Detection Algorithms

VLSI Implementation of Low Complexity MIMO Detection Algorithms , Impact Facto :.643 eissn : 349-000 & pissn : 394-4544 Intenational Jounal of Reseach and Applications (Ap-Jun 015 Tansactions) (6): 309-313 Intenational Confeence on Emeging Tends in Electonics & Telecommunications

More information

INCREMENTAL REDUNDANCY (IR) SCHEMES FOR W-CDMA HS-DSCH

INCREMENTAL REDUNDANCY (IR) SCHEMES FOR W-CDMA HS-DSCH ICREMETAL REDUDACY (IR) SCHEMES FOR W-CDMA HS-DSCH Amitava Ghosh 1, Kenneth Stewat, Rapeepat Ratasuk 1, Eoin Buckley, and Raa Bachu 1 Advanced Radio Technology, GTSS, Motoola, Alington Heights, IL, USA

More information

10! !. 3. Find the probability that a five-card poker hand (i.e. 5 cards out of a 52-card deck) will be:

10! !. 3. Find the probability that a five-card poker hand (i.e. 5 cards out of a 52-card deck) will be: MATH 0(001 Fall 2018 Homewok 2 Solutions Please infom you instucto if you find any eos in the solutions 1 Suppose that thee ae duck huntes, each with a pefect shot A flock of ducks fly ove, and each hunte

More information

Steve Alpern, Thomas Lidbetter, Alec Morton, and Katerina Papadaki Patrolling a pipeline

Steve Alpern, Thomas Lidbetter, Alec Morton, and Katerina Papadaki Patrolling a pipeline Steve Alpen, Thomas Lidbette, Alec Moton, and Kateina Papadaki Patolling a pipeline Book section Oiginal citation: Oiginally published in Alpen, Steven, Lidbette, Thomas, Moton, Alec and Papadaki, Kateina

More information

Efficient Power Control for Broadcast in Wireless Communication Systems

Efficient Power Control for Broadcast in Wireless Communication Systems Efficient Powe Contol fo Boadcast in Wieless Communication Systems A. T. Chonopoulos Compute Science Depatment Univesity of Texas at San Antonio San Antonio, TX Email:atc@cs.utsa.edu P. Cotae Depatment

More information

Distributed Spectrum Allocation via Local Bargaining

Distributed Spectrum Allocation via Local Bargaining Distibuted Spectum Allocation via Local Bagaining Lili Cao Shanghai Jiaotong Univesity, Shanghai, P.R. China Email: cao li li@yahoo.com Haitao Zheng Micosoft Reseach Asia, Beijing, P.R. China Email: htzheng@ieee.og

More information

Low-Complexity Time-Domain SNR Estimation for OFDM Systems

Low-Complexity Time-Domain SNR Estimation for OFDM Systems Low-Complexity Time-Domain SR Estimation fo OFDM Systems A. jaz, A.B. Awoseyila and B.G. Evans A low-complexity SR estimation algoithm fo OFDM systems in fequency-selective fading channels is poposed.

More information

Demosaicking using Adaptive Bilateral Filters

Demosaicking using Adaptive Bilateral Filters Demosaicking using Adaptive Bilateal Filtes Ekine Akuiyibo Timothy Atobatele EE 362, Winte 2006 0. Abstact Digital cameas sample the continuous spectum using an aay of colo filtes such that each pixel

More information

Cyclic Constellation Mapping Method for PAPR Reduction in OFDM system

Cyclic Constellation Mapping Method for PAPR Reduction in OFDM system 2013 8th Intenational Confeence on Communications and Netwoking in China (CHINACOM) Cyclic Constellation Mapping Method fo PAPR Reduction in OFDM system Yong Cheng, Jianhua Ge, Jun Hou, and Fengkui Gong

More information

ABSTRACTT FFT FFT-' Proc. of SPIE Vol U-1

ABSTRACTT FFT FFT-' Proc. of SPIE Vol U-1 Phase econstuction stategies in phase-locking system based on multi-apetue wave font sensos P.A. Semenov, S.D. Pol skikh Shvabe-Reseach, Moscow, Russian Fedeation; e-mail: pite@bk.u ABSTRACTT System of

More information

Variance? which variance? R squared effect size measures in simple mediation models

Variance? which variance? R squared effect size measures in simple mediation models Vaiance? which vaiance? squaed effect size measues in simple mediation models M This is it? med di X de Heus, P. (01). squaed effect size measues and ovelap between diect and indiect effect in mediation

More information

IEEE Broadband Wireless Access Working Group < Modifications to the Feedback Methodologies in UL Sounding

IEEE Broadband Wireless Access Working Group <  Modifications to the Feedback Methodologies in UL Sounding Poject Title Date Submitted IEEE 802.16 Boadband Wieless Access Woking Goup Modifications to the Feedback Methodologies in UL Sounding 2008-01-14 Souce(s) Fed Vook, Jeff Zhuang,

More information

ScienceDirect. Simplified Generation of Electromagnetic Field within EMC Immunity Test Area

ScienceDirect. Simplified Generation of Electromagnetic Field within EMC Immunity Test Area Available online at www.sciencediect.com ScienceDiect Pocedia Engineeing 69 ( 014 ) 7 34 4th DAAAM Intenational Symposium on Intelligent Manufactuing and Automation, 013 Simplified Geneation of Electomagnetic

More information

Spread Spectrum Codes Identification by Neural Networks

Spread Spectrum Codes Identification by Neural Networks in "Systems and Contol: heoy and Applications", published by WSES, 2, pp. 257-262, ISBN 96-852-4 Spead Spectum Codes Identification by Neual Netwoks Céline BOUDER, Gilles BUREL Laboatoie d Electonique

More information

An Improved Implementation of Activity Based Costing Using Wireless Mesh Networks with MIMO Channels

An Improved Implementation of Activity Based Costing Using Wireless Mesh Networks with MIMO Channels Poceedings of the 10th WSEAS Intenational Confenence on APPLIED MATHEMATICS, Dallas, Texas, USA, Novembe 1-3, 2006 262 An Impoved Implementation of Activity Based Costing Using Wieless Mesh Netwoks with

More information

Small Loop Antenna and Duality Theorem

Small Loop Antenna and Duality Theorem Small Loop Antenna and Duality Theoem Page 1 Small Loop Antenna and Duality Theoem Having studied the ideal electic dipole we now tun ou attention to an inteesting antenna closely elated to the electic

More information

Near-field Computation and. Uncertainty Estimation using Basic. Cylindrical-Spherical Formulae

Near-field Computation and. Uncertainty Estimation using Basic. Cylindrical-Spherical Formulae Nea-field Computation and Uncetainty Estimation using Basic Cylindical-Spheical Fomulae Poject... IEC 63 Subject... Basic Nea-Field Computation Document numbe... N/A Revision... 3 Autho... F.D. du Plessis

More information

Modulation and Coding Classification for Adaptive Power Control in 5G Cognitive Communications

Modulation and Coding Classification for Adaptive Power Control in 5G Cognitive Communications Modulation and Coding Classification fo Adaptive Powe Contol in 5G Cognitive Communications Anestis Tsakmalis, Symeon Chatzinotas and Bjön Ottesten SnT - secuityandtust.lu, Univesity of Luxemboug Email:{anestis.tsakmalis,

More information

Design of A Circularly Polarized E-shaped Patch Antenna with Enhanced Bandwidth for 2.4 GHz WLAN Applications

Design of A Circularly Polarized E-shaped Patch Antenna with Enhanced Bandwidth for 2.4 GHz WLAN Applications VNU Jounal of Science: Comp. Science & Com. Eng., Vol. 31, No. 2 (2015) 1-7 Design of A Ciculaly Polaized E-shaped Patch Antenna with Enhanced Bandwidth fo 2.4 GHz WLAN Applications Hong Van Tam 1, Luong

More information

Analysis of a Fractal Microstrip Patch Antenna

Analysis of a Fractal Microstrip Patch Antenna 124 Analysis of a Factal Micostip Patch Antenna Vibha Rani Gupta and Nisha Gupta* Bila Institute of Technology, Mesa, Ranchi-835215, Jhakhand, India. vgupta@bitmesa.ac.in, ngupta@bitmesa.ac.in Abstact-

More information

Configurable M-factor VLSI DVB-S2 LDPC decoder architecture with optimized memory tiling design

Configurable M-factor VLSI DVB-S2 LDPC decoder architecture with optimized memory tiling design RESEARCH Open Access Configuable M-facto VLSI DVB-S2 LDPC decode achitectue with optimized memoy tiling design Gabiel Falcao 1,2*, Maco Gomes 1,2, Vito Silva 1,2, Leonel Sousa 3,4 and Joao Cacheia 2 Abstact

More information

Assignment 0/0 2 /0 8 /0 16 Version: 3.2a Last Updated: 9/20/ :29 PM Binary Ones Comp Twos Comp

Assignment 0/0 2 /0 8 /0 16 Version: 3.2a Last Updated: 9/20/ :29 PM Binary Ones Comp Twos Comp * Dynamic Memoy *Big O Notation*Stacks *Exteme Pogamming*Selection Sot*Insetion Sot*Watefall Model Sting*Aays*AayList*Client Seve*Atificial Intelligence*Inheitance*Files*Video Games*Shot cicuit evaluation*

More information

Figure Geometry for Computing the Antenna Parameters.

Figure Geometry for Computing the Antenna Parameters. Spheical Coodinate Systems Definitions Figue 1.2.1 Geomety fo Computing the Antenna Paametes. Antenna Radiation Patten: The distibution of adiated enegy fom an antenna ove a suface of constant adius centeed

More information

MIMO OTA Testing in Small Multi-Probe Anechoic Chamber Setups Llorente, Ines Carton; Fan, Wei; Pedersen, Gert F.

MIMO OTA Testing in Small Multi-Probe Anechoic Chamber Setups Llorente, Ines Carton; Fan, Wei; Pedersen, Gert F. Aalbog Univesitet MIMO OTA Testing in Small Multi-Pobe Anechoic Chambe Setups Lloente, Ines Caton; Fan, Wei; Pedesen, Get F. Published in: I E E E Antennas and Wieless Popagation Lettes DOI (link to publication

More information

Derangements. Brian Conrey and Tom Davis and March 23, 2000

Derangements. Brian Conrey and Tom Davis and   March 23, 2000 Deangements Bian Coney and Tom Davis coney@aimath.og and tomdavis@eathlink.net http://www.geomete.og/mathcicles Mach 23, 2000 Seating Mixup Imagine that Yankee Stadium is completely sold out, but when

More information

Controller Design of Discrete Systems by Order Reduction Technique Employing Differential Evolution Optimization Algorithm

Controller Design of Discrete Systems by Order Reduction Technique Employing Differential Evolution Optimization Algorithm Contolle Design of Discete Systems by Ode Reduction Technique Employing Diffeential Evolution Optimization Algoithm J. S. Yadav, N. P. Patida, and J. Singhai Abstact One of the main objectives of ode eduction

More information

School of Electrical and Computer Engineering, Cornell University. ECE 303: Electromagnetic Fields and Waves. Fall 2007

School of Electrical and Computer Engineering, Cornell University. ECE 303: Electromagnetic Fields and Waves. Fall 2007 School of Electical and Compute Engineeing, Conell Univesity ECE 303: Electomagnetic Fields and Waves Fall 007 Homewok 1 Due on Nov. 8, 007 by 5:00 PM Reading Assignments: i) Review the lectue notes. ii)

More information

Performance analysis of ARQ Go-Back-N protocol in fading mobile radio channels

Performance analysis of ARQ Go-Back-N protocol in fading mobile radio channels MILCOM 95, SAN IEGO, CA, NOV. 995 Pefomance analysis of ARQ Go-Back-N potocol in fading mobile adio channels Michele Zozi y, Ramesh R. Rao z, Lauence B. Milstein z y ipatimento di Elettonica e Infomazione,

More information

HISTORY AND PROGRESS OF THE TOW THOMAS BI-QUADRATIC FILTER. PART I. GENERATION AND OP AMP REALIZATIONS

HISTORY AND PROGRESS OF THE TOW THOMAS BI-QUADRATIC FILTER. PART I. GENERATION AND OP AMP REALIZATIONS Jounal of icuits, Systems, and omputes Vol. 7, No. (2008) 33 54 c Wold Scientific Publishing ompany HISTOY ND POGESS OF THE TOW THOMS BIQUDTI FILTE. PT I. GENETION ND OP MP ELIZTIONS HMED M. SOLIMN Electonics

More information

Sliding Mode Control for Half-Wave Zero Current Switching Quasi-Resonant Buck Converter

Sliding Mode Control for Half-Wave Zero Current Switching Quasi-Resonant Buck Converter Sliding Mode Contol fo Half-Wave Zeo Cuent Switching Quasi-Resonant Buck Convete M. Ahmed, Student membe, IEEE, M. Kuisma, P. Silventoinen Abstact This pape focuses on the pactical implementation of sliding

More information

A Transmission Scheme for Continuous ARQ Protocols over Underwater Acoustic Channels

A Transmission Scheme for Continuous ARQ Protocols over Underwater Acoustic Channels A Tansmission Scheme fo Continuous ARQ Potocols ove Undewate Acoustic Channels Mingsheng Gao 1, Wee-Seng Soh 1 and Meixia Tao 2 1 Dept. of Electical & Compute Engineeing, National Univesity of Singapoe,

More information

Study and Design of Dual Frequency High Gain and Conformal Microstrip Patch Antenna

Study and Design of Dual Frequency High Gain and Conformal Microstrip Patch Antenna , pp.236-243 http://dx.doi.og/10.14257/astl.2017.147.33 Study and Design of Dual Fequency High Gain and Confomal Micostip Patch Antenna S. Auna 1, K. Sinivasa Naik 2, J. Ramesh 2 and D. Madhu 2 1 Andha

More information

Analysis of the optimized low-nonlinearity lateral effect sensing detector

Analysis of the optimized low-nonlinearity lateral effect sensing detector Jounal of hysics: Confeence Seies Analysis of the optimized low-nonlineaity lateal effect sensing detecto To cite this aticle: Saeed Olyaee et al J. hys.: Conf. Se. 76 4 Related content - Neual netwok

More information

ONE-WAY RADAR EQUATION / RF PROPAGATION

ONE-WAY RADAR EQUATION / RF PROPAGATION ONE-WAY RADAR EQUATION / RF PROPAGATION The one-way (tansmitte to eceive) ada equation is deived in this section. This equation is most commonly used in RWR o ESM type of applications. The following is

More information

Digital Simulation of FM-ZCS-Quasi Resonant Converter Fed DD Servo Drive Using Matlab Simulink

Digital Simulation of FM-ZCS-Quasi Resonant Converter Fed DD Servo Drive Using Matlab Simulink SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 2, Novembe 2009, 227-237 UDK: 621.314.1:621.376 Digital Simulation of FM-ZCS-Quasi Resonant Convete Fed DD Sevo Dive Using Matlab Simulink Kattamui

More information

Performance Analysis of Z-Source Inverter Considering Inductor Resistance

Performance Analysis of Z-Source Inverter Considering Inductor Resistance Pefomance Analysis of Z-Souce Invete Consideing Inducto Resistance Fatma A. Khea * and Essam Eddin M. Rashad ** Electic Powe and Machines Engineeing Depatment, Faculty of Engineeing, anta Univesity, anta,

More information

Short-Circuit Fault Protection Strategy of Parallel Three-phase Inverters

Short-Circuit Fault Protection Strategy of Parallel Three-phase Inverters Shot-Cicuit Fault Potection Stategy of Paallel Thee-phase Invetes Hongliang Wang, Membe, IEEE, Xuejun Pei, Membe, IEEE, Yu Chen, Membe, IEEE,Yong Kang College of Electical and Electonics Engineeing Huazhong

More information

CCSDS Coding&Synchronization Working Group March Washington DC, USA SLS-C&S_08-CNES02

CCSDS Coding&Synchronization Working Group March Washington DC, USA SLS-C&S_08-CNES02 CCSDS Coding&Synchonization Woking Goup Mach 2008 1 Washington DC, USA DVB-S2 like fame constuction and LDPC codes ate o/and size extension fo use of Vaiable Coding & Modulation suitable fo X and Ka bands

More information

Key Laboratory of Earthquake Engineering and Engineering Vibration, China Earthquake Administration, China

Key Laboratory of Earthquake Engineering and Engineering Vibration, China Earthquake Administration, China Shake Table Test fo Lage Indiect-Ai-Cooling Towe Stuctue of Fie Powe Plant Pat I Junwu DAI, Yongqiang YANG & Xuan WNG Key Laboatoy of athquake ngineeing and ngineeing Vibation, China athquake Administation,

More information

Design of an LLC Resonant Converter Using Genetic Algorithm

Design of an LLC Resonant Converter Using Genetic Algorithm Design of an LLC Resonant Convete Using Genetic Algoithm H. H. Nien, C. K. Huang, S. K. Changchien, C. H Chan Dept. of Electical Engineeing, Chienkuo Technology Univesity E-mail: nien@ctu.edu.tw Dept,

More information

Design and Implementation of 4 - QAM VLSI Architecture for OFDM Communication

Design and Implementation of 4 - QAM VLSI Architecture for OFDM Communication Design and Implementation of 4 - QAM VLSI Achitectue fo OFDM Communication R. Achitha 1, S. Bhagyalakshmi 2, V. Jaya Suthi 3, D. T. Menakadevi 4 U.G. Students, Depatment of ECE, Adhiyamaan College of Engineeing,

More information

1 Performance and Cost

1 Performance and Cost Pefomance and Cost Analysis and Reseach of Ai-Cooled Using Small Diamete Coppe Tubes Wu Yang, Li Changsheng and Deng Bin Abstact Replacing coppe tubes with aluminum tubes and using coppe tubes with smalle

More information

OPTIMUM MEDIUM ACCESS TECHNIQUE FOR NEXT GENERATION WIRELESS SYSTEMS

OPTIMUM MEDIUM ACCESS TECHNIQUE FOR NEXT GENERATION WIRELESS SYSTEMS 9 th Febuay. Vol. 3 No. 5 - JATIT & LLS. All ights eseved. ISSN: 99-5 www.jatit.og E-ISSN: 7-395 OPTIMUM MEDIUM ACCESS TECHNIQUE FOR NEXT GENERATION WIRELESS SYSTEMS N.AMUTHA PRABHA, V.MANIANDAN VIT UNIVERSITY,

More information

A New Buck-Boost DC/DC Converter of High Efficiency by Soft Switching Technique

A New Buck-Boost DC/DC Converter of High Efficiency by Soft Switching Technique A New Buck-Boost D/D onvete of High Efficiency by Soft Switching Technique Dong-Kul Kwak, Seung-Ho Lee, and Do-Young Jung Pofessional Gaduate School of Disaste Pevention, Kangwon National Univesity, 45-711,

More information

Anti-Forensics of Chromatic Aberration

Anti-Forensics of Chromatic Aberration Anti-Foensics of Chomatic Abeation Owen Maye and Matthew C. Stamm Dept. of Electical and Compute Engineeing, Dexel Univesity, Philadelphia, PA, USA ABSTRACT Ove the past decade, a numbe of infomation foensic

More information

Signal Extraction Technology

Signal Extraction Technology Extaction Technology Intoduction Masimo SET pulse oximety is a new and fundamentally distinct method of acquiing, pocessing and epoting ateial oxygen satuation and pulse ate. As illustated below, Masimo

More information

Noise Attenuation Due to Vegetation

Noise Attenuation Due to Vegetation Noise Attenuation Due to Vegetation Vasile BACRIA Politehnica Univesity of Timisoaa, Bd. M.Viteazu,1, 300222 Timisoaa, bacia@mec.upt.o Nicolae HERISANU Politehnica Univesity of Timisoaa, Bd. M. Viteazu,

More information

NICKEL RELEASE REGULATIONS, EN 1811:2011 WHAT S NEW?

NICKEL RELEASE REGULATIONS, EN 1811:2011 WHAT S NEW? NICKEL RELEASE REGULATIONS, EN 1811:2011 WHAT S NEW? BACKGROUND: EN 1811 is the intenationally ecognised test method which was devised almost 12 yeas ago to detemine the ate of nickel elease fom jewelley,

More information

Design of FIR Filter using Filter Response Masking Technique

Design of FIR Filter using Filter Response Masking Technique Design of FIR Filte using Filte Response Masking Technique Sandeep Shivastava, Alok Jain, Ram Kuma Soni Abstact- In this pape autho is tying to implement Fequency esponse masking (FRM) technique. In this

More information

The Periodic Ambiguity Function Its Validity and Value

The Periodic Ambiguity Function Its Validity and Value The Peiodic Ambiguity Function Its Validity and Value Nadav Levanon Dept. of Electical Engineeing Systems Tel Aviv Univesity Tel Aviv, Isael nadav@eng.tau.ac.il Abstact The peiodic ambiguity function (PAF)

More information

On Reducing Blocking Probability in Cooperative Ad-hoc Networks

On Reducing Blocking Probability in Cooperative Ad-hoc Networks On educing Blocking Pobability in Coopeative Ad-hoc Netwoks Ayda Basyouni, Walaa Hamouda ept of Electical and Compute Engineeing Concodia Univesity, Monteal, Canada Email: {a basy,hamouda}@ececoncodiaca

More information

Design and Characterization of Conformal Microstrip Antennas Integrated into 3D Orthogonal Woven Fabrics

Design and Characterization of Conformal Microstrip Antennas Integrated into 3D Orthogonal Woven Fabrics Design and Chaacteization of Confomal Micostip Antennas Integated into 3D Othogonal Woven Fabics Xin Wang 1, Lan Yao 1, Fujun Xu 2, Dongchun Zhou 1, Yiping Qiu 1 1 College of Textiles, Donghua Univesity,

More information

Minimizing Ringing and Crosstalk

Minimizing Ringing and Crosstalk Minimizing Ringing and Cosstalk By Glen Dash, Ampyx LLC, GlenDash at alum.mit.edu Copyight 1998, 26 Ampyx LLC When viewed on a schematic, a wie is just a wie. Howeve, when isetimes shink to a few nanoseconds

More information

Mitigation of GPS Multipath Using Polarization and Spatial Diversities

Mitigation of GPS Multipath Using Polarization and Spatial Diversities Mitigation of GPS Multipath Using Polaization and Spatial ivesities Matthew Benneman, Jade Moton Chun Yang Fank van Gaas Miami Univesity Sigtem Technology, Inc. Ohio Univesity BIOGRAPIES Matthew Benneman

More information

Parameterized Complexity of Connected Even/Odd Subgraph Problems

Parameterized Complexity of Connected Even/Odd Subgraph Problems Paameteized Complexity of Connected Even/Odd Subgaph Poblems Fedo V. Fomin 1 and Pet A. Golovach 2 1 Depatment of Infomatics, Univesity of Begen PB 7803, 5020 Begen, Noway fedo.fomin@ii.uib.no 2 School

More information

2D Coding for Future Perpendicular and Probe Recording

2D Coding for Future Perpendicular and Probe Recording 2D Coding fo Futue Pependicula and Pobe Recoding Joseph A. O Sullivan Naveen Singla Ronald S. Indec Washington Univesity Saint Louis, Missoui s Outline: 2D Coding fo 2D ISI Motivation: 2D Intesymbol Intefeence

More information

Investigation and Analysis of Inception Voltage and Field Distribution in Power Cables with Internal Cavities in Dielectric

Investigation and Analysis of Inception Voltage and Field Distribution in Power Cables with Internal Cavities in Dielectric Investigation and Analysis of Inception Voltage and Field Distibution in Powe Cables with Intenal Cavities in Dielectic A. A. Hossam-Eldin Electical Eng. Depatment Faculty of Engineeing Alexandia Univesity,

More information

Chamber Influence Estimation for Radiated Emission Testing in the Frequency Range of 1 GHz to 18 GHz

Chamber Influence Estimation for Radiated Emission Testing in the Frequency Range of 1 GHz to 18 GHz Chambe Influence Estimation fo Radiated Emission Testing in the Fequency Range of 1 GHz to 18 GHz Alexande Kiz Electomagnetic Compatibility and RF-Engineeing ARC eibesdof eseach GmbH eibesdof, Austia alexande.kiz@acs.ac.at

More information

51. IWK Internationales Wissenschaftliches Kolloquium International Scientific Colloquium

51. IWK Internationales Wissenschaftliches Kolloquium International Scientific Colloquium 51. IWK Intenationales Wissenschaftliches Kolloquium Intenational Scientific Colloquium PROCEEDINGS 11-15 Septembe 26 FACULTY OF ELECTRICAL ENGINEERING AND INFORMATION SCIENCE INFORMATION TECHNOLOGY AND

More information

The reliability of wireless backhaul mesh networks

The reliability of wireless backhaul mesh networks The eliability of wieless backhaul mesh netwoks Gei Egeland 1, Paal E. Engelstad 2 1 Depatment of Electical and Compute Engineeing, Univesity of Stavange, 4036 Stavange Noway 1 gei.egeland@gmail.com 2

More information

Discussion #7 Example Problem This problem illustrates how Fourier series are helpful tools for analyzing electronic circuits. Often in electronic

Discussion #7 Example Problem This problem illustrates how Fourier series are helpful tools for analyzing electronic circuits. Often in electronic Discussion #7 Example Poblem This poblem illustates how Fouie seies ae helpful tools fo analyzing electonic cicuits. Often in electonic cicuits we need sinusoids of vaious fequencies But we may aleady

More information

Synopsis of Technical Report: Designing and Specifying Aspheres for Manufacturability By Jay Kumler

Synopsis of Technical Report: Designing and Specifying Aspheres for Manufacturability By Jay Kumler OPTI 51 Synopsis (Gad Requiement #1) G. Desoches Synopsis of Technical Repot: Designing and Specifying Asphees fo Manufactuability By Jay Kumle Novembe 1, 007 Reviewed by: Gead Desoches Abstact Since asphees

More information

AMERICAN NATIONAL STANDARD

AMERICAN NATIONAL STANDARD ENGINEERING COMMITTEE Inteface Pactices Subcommittee AMERICAN NATIONAL STANDARD ANSI/SCTE 48-1 2015 Test Method fo Measuing Shielding Effectiveness of Passive and Active Devices Using a GTEM Cell NOTICE

More information

The Experimental Study of Possibility for Radar Target Detection in FSR Using L1-Based Non-Cooperative Transmitter

The Experimental Study of Possibility for Radar Target Detection in FSR Using L1-Based Non-Cooperative Transmitter The Expeimental Study of Possibility fo Rada Taget Detection in FSR Using L1-Based on-coopeative Tansmitte Ch. Kabakchiev 1, I. Gavanov, V. Beha 3, H. Rohling 4 1 Faculty of Mathematics & Infomatics,Sofia

More information

ISSN: [Reddy & Rao* et al., 5(12): December, 2016] Impact Factor: 4.116

ISSN: [Reddy & Rao* et al., 5(12): December, 2016] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY SIMULATION COMPARISONS OF INDUCTION MOTOR DRIVE WITH ESTIMATOR AND PLL V. Nasi Reddy *, S. Kishnajuna Rao*, S.Nagenda Kuma * Assistant

More information

Feasibility of a triple mode, low SAR material coated antenna for mobile handsets

Feasibility of a triple mode, low SAR material coated antenna for mobile handsets Loughboough Univesity Institutional Repositoy Feasibility of a tiple mode, low SAR mateial coated antenna fo mobile handsets This item was submitted to Loughboough Univesity's Institutional Repositoy by

More information

Development of Corona Ozonizer Using High Voltage Controlling of Produce Ozone Gas for Cleaning in Cage

Development of Corona Ozonizer Using High Voltage Controlling of Produce Ozone Gas for Cleaning in Cage Moden Envionmental Science and Engineeing (ISSN 333-58) July 07, Volume 3, No. 7, pp. 505-509 Doi: 0.534/mese(333-58)/07.03.07/0 Academic Sta Publishing Company, 07 www.academicsta.us Development of Coona

More information

Pervasive and Mobile Computing. Collaborative jamming and collaborative defense in cognitive radio networks

Pervasive and Mobile Computing. Collaborative jamming and collaborative defense in cognitive radio networks Pevasive and Mobile Computing 9 (2013) 572 587 Contents lists available at SciVese ScienceDiect Pevasive and Mobile Computing jounal homepage: www.elsevie.com/locate/pmc Fast tack aticle Collaboative jamming

More information

Activatable Tiles: Compact, Robust Programmable Assembly and other Applications

Activatable Tiles: Compact, Robust Programmable Assembly and other Applications Activatable Tiles: Compact, obust Pogammable Assembly and othe Applications Umi Majumde, Thomas H. LaBean, John H. eif Depatment of Compute Science, Duke Univesity, Duham, C, USA. {umim, thl, eif}@cs.duke.edu

More information

Statement of Works Data Template Version: 4.0 Date:

Statement of Works Data Template Version: 4.0 Date: Statement of Woks Data Template Vesion: 4.0 Date: 16.08.17 This Statement of Woks (SoW) Data Template is to be completed by Distibution Netwok Opeatos (DNOs) in ode to povide National Gid the equied data

More information

Throughput Maximization of Ad-hoc Wireless Networks Using Adaptive Cooperative Diversity and Truncated ARQ

Throughput Maximization of Ad-hoc Wireless Networks Using Adaptive Cooperative Diversity and Truncated ARQ IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 56, NO. 11, NOVEMBER 008 1907 Thoughput Maimization of Ad-hoc Wieless Netwoks Using Adaptive Coopeative Divesity and Tuncated ARQ Lin Dai, Membe, IEEE, and Khaled

More information

Exercise 1 (MC Question)

Exercise 1 (MC Question) D J Tani -9- Contol Systems II (Sping 8 Solution Execise Set 9 Linea Quadatic Regulato Gioele Zadini, gzadini@ethzch, 7th May 8 Execise (MC Question (I-D, (II-A, (III-C, (IV-B (I-C, (II-A, (III-D, (IV-B

More information

Comparison Between Known Propagation Models Using Least Squares Tuning Algorithm on 5.8 GHz in Amazon Region Cities

Comparison Between Known Propagation Models Using Least Squares Tuning Algorithm on 5.8 GHz in Amazon Region Cities 106 Compaison Between Known Popagation Models Using Least Squaes Tuning Algoithm on 5.8 GHz in Amazon Region Cities Buno S. L. Casto, Mácio R. Pinheio, Gevásio P. S. Cavalcante Fedeal Univesity of Paá

More information

New Approach for Optimizing Control of Switched Reluctance Generator

New Approach for Optimizing Control of Switched Reluctance Generator New Appoach fo Optimizing Contol of Switched Reluctance Geneato R. Rebbah, A. Bentounsi and H. Benalla Abstact This pape pesents a new switching appoach that detemines the optimal contol of the Switched

More information

Power Minimization in Uni-directional Relay Networks with Cognitive Radio Capabilities

Power Minimization in Uni-directional Relay Networks with Cognitive Radio Capabilities 00 5th Intenational Symposium on elecommunications (IS'00) Poe Minimization in Uni-diectional Relay Netoks ith Cognitive Radio Capabilities Adalan Alizadeh Seyed Mohammad-Sajad Sadough Cognitive elecommunication

More information

GRADE 6 FLORIDA. Division WORKSHEETS

GRADE 6 FLORIDA. Division WORKSHEETS GRADE 6 FLORIDA Division WORKSHEETS Mental division stategies invese opeations As we know, multiplication and division ae invese opeations. 8 9 = 7 This means they do the evese of each othe: 7 9 = 8 We

More information

Available online at ScienceDirect. Procedia Engineering 100 (2015 )

Available online at  ScienceDirect. Procedia Engineering 100 (2015 ) Available online at www.sciencediect.com ScienceDiect Pocedia Engineeing 1 (215 ) 1 14 25th DAAAM Intenational Symposium on Intelligent Manufactuing and Automation DAAAM 214 Measuement of Complex Pemittivity

More information

GAMMA SHAPED MONOPOLE PATCH ANTENNA FOR TABLET PC

GAMMA SHAPED MONOPOLE PATCH ANTENNA FOR TABLET PC GAMMA SHAPED MONOPOLE PATCH ANTENNA FOR TABLET PC Islam Md. Rafiqul, Mohammad Shawkat Habib and Khaizuan Abdullah Depatment of Electical and Compute Engineeing, Intenational Islamic Univesity Malaysia,

More information

Proposal of Circuit Breaker Type Disconnector for Surge Protective Device

Proposal of Circuit Breaker Type Disconnector for Surge Protective Device Poposal of Cicuit Beake Type Disconnecto fo Suge Potective Device MASAO SHIBAYAMA, HITOSHI KIJIMA Polytechnic Univesity 2-32-1 Ogawanishi, Kodaia, Tokyo, 187-0035 JAPAN hkijima@uitec.ac.jp Abstact: - A

More information

A Simple Improvement to the Viterbi and Viterbi Monomial-Based Phase Estimators

A Simple Improvement to the Viterbi and Viterbi Monomial-Based Phase Estimators Univesity of New Oleans ScholaWoks@UNO Electical Engineeing Faculty Publications Depatment of Electical Engineeing 006 A Simple Impovement to the Vitebi and Vitebi Monomial-Based Phase Estimatos Kenneth

More information

The Marginal Utility of Cooperation in Sensor Networks

The Marginal Utility of Cooperation in Sensor Networks e Maginal Utility of Coopeation in Senso Netwoks Yu-Ching Tong, Geg Pottie Depatment of Electical Engineeing Univesity of Califonia, Los Angeles Los Angeles, Califonia 99 Email: yuching@ee.ucla.edu, pottie@icsl.ucla.edu

More information

Analysis of the Radiation Resistance and Gain of Full-Wave Dipole Antenna for Different Feeding Design

Analysis of the Radiation Resistance and Gain of Full-Wave Dipole Antenna for Different Feeding Design Jounal of lectomagnetic Analysis and Applications, 01, 4, 35-4 http://dx.doi.og/10.436/jemaa.01.46033 Published Online June 01 (http://www.scirp.og/jounal/jemaa) 35 Analysis of the Radiation Resistance

More information

Missing Piece Issue and Upload Strategies in Flashcrowds and P2P-assisted Filesharing

Missing Piece Issue and Upload Strategies in Flashcrowds and P2P-assisted Filesharing Missing Piece Issue and Upload Stategies in Flashcowds and P2P-assisted Fileshaing Fabien Mathieu FT R&D 38, ue du généal Leclec 92 13 Issy le Moulineaux Fance Julien Reynie Goupe TREC, ENS 45, ue d Ulm

More information

A Gain Measurement in the Liquid Based on Friis Transmission Formula in the Near-Field Region

A Gain Measurement in the Liquid Based on Friis Transmission Formula in the Near-Field Region A Gain Measuement in the Liquid Based on Fiis Tansmission Fomula in the Nea-Field Region # Takuhei Akagawa 1, Nozomu Ishii 2,3, Ken-ichi Sato 4, Lia Hamada 3 and Soichi Watanabe 3 1 Gaduate School of Science

More information

Optic Cable Tracking and Positioning Method Based on Distributed Optical Fiber Vibration Sensing

Optic Cable Tracking and Positioning Method Based on Distributed Optical Fiber Vibration Sensing 08 5th Intenational Confeence on Electical & Electonics Engineeing and Compute Science (ICEEECS 08) Optic Cable Tacking and Positioning Method Based on Distibuted Optical Fibe Vibation Sensing Zhang Chao,

More information

Proceedings of Meetings on Acoustics

Proceedings of Meetings on Acoustics Poceedings of Meetings on Acoustics Volume 4, 2 http://acousticalsociety.og/ 62nd Meeting Acoustical Society of Ameica San Diego, Califonia 3 Octobe - 4 Novembe 2 Session 4pEA: Engineeing Acoustics 4pEA8.

More information

DESIGN AND PARAMETRIC EVALUATION OF RECTANGULAR MICROSTRIP PATCH ANTENNA FOR GSM APPLICATION

DESIGN AND PARAMETRIC EVALUATION OF RECTANGULAR MICROSTRIP PATCH ANTENNA FOR GSM APPLICATION DESIGN AND PARAMETRIC EVALUATION OF RECTANGULAR MICROSTRIP PATCH ANTENNA FOR GSM APPLICATION RAHUL T. DAHATONDE, SHANKAR B. DEOSARKAR Dept. of E & TC, D. Babasaheb Ambedka Technological Univesity, Lonee,

More information

TECHNICAL REPORT: CVEL Maximum Radiated Emission Calculator: Power Bus EMI Algorithm. Chentian Zhu and Dr. Todd Hubing. Clemson University

TECHNICAL REPORT: CVEL Maximum Radiated Emission Calculator: Power Bus EMI Algorithm. Chentian Zhu and Dr. Todd Hubing. Clemson University TECHNICAL REPORT: CVEL-13-053 Maximum Radiated Emission Calculato: Powe Bus EMI Algoithm Chentian Zhu and D. Todd Hubing Clemson Univesity Octobe 12, 2013 Abstact The Maximum Radiated Electomagnetic Emissions

More information

UNCERTAINTY ESTIMATION OF SIZE-OF-SOURCE EFFECT MEASUREMENT FOR 650 NM RADIATION THERMOMETERS

UNCERTAINTY ESTIMATION OF SIZE-OF-SOURCE EFFECT MEASUREMENT FOR 650 NM RADIATION THERMOMETERS XIX IMEKO Wold Congess Fundamental and Applied Metology Septembe 6 11, 29, Lisbon, Potugal UNCERTAINTY ESTIMATION OF SIZE-OF-SOURCE EFFECT MEASUREMENT FOR 65 NM RADIATION THERMOMETERS Fumihio Sakuma, Laina

More information