Security in Distributed Storage Systems by Communicating a Logarithmic Number of Bits
|
|
- Isaac Houston
- 5 years ago
- Views:
Transcription
1 Secuity in Distibuted Stoage Systems by Communicating a Logaithmic Numbe of Bits Theodoos K. Dikaliotis Depatment of lectical ngineeing Alexandos G. Dimakis Depatment of lectical ngineeing Tacey Ho Depatment of lectical ngineeing axiv: v1 [cs.cr] 4 May 2010 Califonia Institute of Technology Univesity of Southen Califonia Califonia Institute of Technology mail: tdikal@caltech.edu mail: dimakis@usc.edu mail: tho@caltech.edu Abstact We investigate the poblem of maintaining an encoded distibuted stoage system when some nodes contain advesaial eos. Using the eo-coection capabilities that ae built into the existing edundancy of the system, we popose a simple linea hashing scheme to detect eos in the stoage nodes. Ou main esult is that fo stoing a data object of total size M using an (n,k) MDS code ove a finite field F q, up to t 1 = (n k)/2 eos can be detected, with pobability of failue smalle than 1/M, by communicating only O(n(n k)logm) bits to a tusted veifie. Ou esult constucts small pojections of the data that peseve the eos with high pobability and builds on a pseudoandom geneato that fools linea functions. The tansmission ate achieved by ou scheme is asymptotically equal to the min-cut capacity between the souce and any eceive. I. INTRODUCTION We study the secuity and data integity of distibuted stoage systems that use coding fo edundancy. It is well known that maximum distance sepaable (MDS) codes can offe maximum eliability fo a given stoage ovehead and can be used fo distibuted stoage in data centes and pee-to-pee stoage systems like OceanStoe [1], Total Recall [2], and FS2You [3], that use nodes acoss the Intenet fo distibuted file stoage and shaing. In this pape we ae inteested in dealing with eos in the encoded epesentation. The eos could be intoduced eithe though (unlikely) had dive undetected failues o though a malicious o compomised seve in the stoage netwok. This second theat is much moe eminent when the system uses netwok coding to maintain the edundancy of the encoded system as poposed ecently [4]. To illustate this conside a lage data object that has size M bits. If this object is to be stoed on n seves, depending on the desied edundancy, an (n,k) linea MDS code can be used, dividing the object into k packets of size M/k each, and stoing an encoded packet at each seve. Assuming the code is ove a finite field F q, equiing logq bits to epesent each symbol, each seve will also need to keep a heade denoting the coding coefficients of the linea combinations stoed on the seve (see section II fo the details) and the size of this heade is lage than the size of the useful data if the code is used only once. Fo this eason it was poposed that the same code is used seveal times [5] by dividing each 0 This wok has been suppoted patially by NSF gant CNS , patially by the Ai Foce Office of Scientific Reseach unde gant FA and Caltech s Lee Cente fo Advanced Netwoking
2 Fig. 1. A (4,2) MDS code along with the epai of the fist stoage node. ach node stoes two packets and any two nodes contain enough infomation to ecove all fou data packets. In this example the fist node leaves the system and a new node is fomed by communicating linea combinations f 2,f 3,f 4 which can be used to solve fo x 1,x 2 at the new node. packet into N symbols of logq bits and epeating the same code N times. If N >> n the ovehead of stoing the coefficients becomes negligible. We efe to this as the N extended vesion of an MDS code, shown in Figue 2 fo the (4,2) code used in Figue 1. Obseve that in this example, each node is stoing two linea combinations, (ows) as opposed to one. This sub-packetization is pefomed to facilitate epai though netwok coding as poposed in [4]. The poblem of epai consists of constucting a new encoded node by accessing as little infomation fom existing encoded nodes. In the example of Figue 1, we assume that the fist stoage node failed and the edundancy of the system needs to be efeshed. This is achieved by communicating small linea combinations f 2,f 3,f 4 of the encoded packets fom nodes 2,3, and 4 each of size 1/2 of what each node is stoing, which as poven in [4], is infomation theoetically minimal. As stoage nodes leave the system and new ones ae added, this foms a dynamic stoage netwok that keeps a fixed edundancy and eliability by building new encoded packets fom aleady existing ones. The poblem of secuity should now be clea: even if a single node in this stoage system is compomised and paticipates in this epai pocess, then it can send incoect linea combinations that will ceate eoneous packets at the new nodes. All new nodes using these linea equations will have incoect data and soon the whole system will be contaminated with nodes having eoneous data.
3 Ou contibution: Since the poblem of epaiing a code is equivalent to wieline netwok coding [4], existing techniques fo netwok eo coection can be used to detect and coect the eos [6], [7]. These techniques ae designed to wok fo geneal netwoks and always guaantee a tansmission ate of C 2z, whee C is the min-cut capacity fom the souce to the destination and z is the numbe of links contaminated by the advesay. Ou appoach, that is ceating and communicating small linea hashes which peseve the stuctue of the code, allows the detection of eos and achieves a tansmission ate that can be asymptotically equal to C (by having the eceive connecting to all the non-eoneous nodes) since it takes advantage of the specific stuctue of the netwok and the set of links an advesay can contaminate. To explain ou scheme, conside the (4,2) MDS code of Figue 1 and assume one of the fou nodes contains eos (say in both ows). A tusted veifie that communicates with all fou nodes can find this eo by getting the 8 equations contained in each of the 4 = 6 node pais. Since this is a (4,2) MDS code, the combinations of equations that come fom eo-fee 2 nodes will be full ank and give a consistent solution wheeas the othe sets will give diffeent solutions (o might not even be full ank). This is, of couse, just using the eo-coection capability of the code to detect an eo. Ou contibution involves using this idea to the N-extended vesion of a code, by ceating a linea pojection (hash) of each ow on the same andom vecto. The key obsevation is that if the same andom pojection is used, this ceates an eo-coecting code fo the hashes which can be communicated to the veifie. The benefit is that each hash has size only 1/N of the data in each ow educing the amount of communication to the veifie. One complication is that each node needs to poject its data on the same andom vecto of length N, which equies N logq bits of common andomness. Subsequently the poblem at the veifie is to decode an eo-coecting code unde advesaial eos. This decoding task can be computationally inefficient but we do not addess this issue hee, assuming that the veifie can detect the eos if they ae within the eo coecting capabilities of the code as dictated by the minimum distance (half the minimum distance). Ou analysis investigates unde which conditions the small pojected hash code will detect any eo in the lage amount of data stoed at the nodes. In paticula, we pove the following Theoem 1: In a distibuted stoage system stoing a total ofmbits, using ann extended(n,k) MDS code ovef q, with the n stoage nodes shaing O(M) bits of common andomness, ou andom hashing scheme can detect up to t t 1 (n k)/2 eos by communicating a total of n(n k)(logm+logt 1 ) bits to a veifie, with pobability of failue P[F] 1 M. One impotant weakness of the pevious esult is the lage common andomness equied which is compaable to the total size of the data object stoed (1/k(n k) faction of the M bits). Note that these bits do not have to be a secet, they only need to be ealized afte the eo has been intoduced to the new disk. Thei lage numbe, howeve, makes it impactical to geneate them at one node and then communicate them to the othes. Ou second contibution involves showing how to use only O(log M) bits of common andomness to achieve almost the same pefomance: Theoem 2: In a distibuted stoage system stoing a total of M bits, using an N extended (n,k) MDS code ove F q, with the n stoage nodes shaing O(log M) bits of common andomness, ou pseudoandom hashing scheme can detect up to
4 Fig. 2. Illustation of the 3 extended vesion of the (4,2) MDS code shown in Figue 1. ach of the thee columns stoed on the souce nodes is coded by epeatedly using the (4,2) MDS of Figue 1. Duing veification, each ow is pojected on the vecto T = (1 1 1) and the coesponding poducts S 1,...,S 4 fom a codewod of the initial (4,2) MDS code. Fo example, the eos at the fist ow of the fist node will not be absobed by the pojection as long as (e 11 e 12 e 13 ) (1 1 1) T 0 t 1 = (n k)/2 eos by communicating a total of O(n(n k)logm) bits to the veifie, with pobability of failue P[F ] 1 M. If thee is no common andomness, the veifie can geneate the O(logM) andom bits and communicate these to all the nodes equiing a total of O(n log M) exta communicated bits. Notice that in this case the total numbe of bits communicated scales only logaithmically in M, to achieve a pobability of failue that scales like 1/M. Ou constuction elies on the pseudoandom small-bias geneato used in [8] which can expand logn andom symbols of F q (which equie logn logq andom bits to geneate), into N pseudoandom symbols that can fool any linea function 1. The only modification to ou algoithm is pojecting each stoed ow on this pseudoandom vecto to geneate each hash and this induces only a small addition to the pobability of eo. Notice that ou wok does not ely on any cyptogaphic assumptions and guaantees that eos inseted in the distibuted stoage system will be detected with high pobability if they ae within the capabilities of the code used. Using the eo-coection capability of the code fo distibuted stoage has been suggested befoe as a way to detect eos [10], [11] and identify fee ides within the netwok. A diffeent appoach to find eos injected in distibuted stoage and content distibution systems is the use of signatues and hash functions. Refeence [12] intoduced the use of homomophic hashing functions that enables a nodes to pefom on-the-fly veification of easue-encoded blocks. Gkantsidis et al. [13] used the computationally less expensive secue andom checksums to detect polluted packets in content distibution system that use netwok coding while [14], [15] used a method of subspace signatues based on diffeent cyptogaphic pimitives. See also [16], [17], [18] fo othe elated wok on secuity and distibuted stoage.
5 II. MODL As stated, we conside a data object of size M bits that is divided into k pieces (of size M/k bits each) and these ae coded into n (> k) encoded pieces though a linea (n, k) maximum distance sepaable (MDS) code. These encoded pieces ae stoed on n distinct stoage nodes along with a heade denoting the exact linea combination saved at all the stoage nodes. Since the size of the code (n,k) will be much smalle than N, the ovehead of stoing the code desciption eveywhee (including the veifie) is minimal. This simplifies the model and we can now assume that the eos occu only at the data, since an eo at the heade would be immediately detected. We assume that the oiginal infomation (of size M bits) is oganized into a matix X with k(n k) ows and N columns. The elements of this matix ae elements of the finite field F q, i.e., X F k(n k) N q whee q is a pime o an intege powe of a pime. ach column Xi c F q k(n k) 1 (i {1,...,N}) of matix X will be sepaately encoded with the use of an (n,k) MDS code with geneato matix G F n(n k) k(n k) q and all the columns GXi c F n(n k) 1 q deived by this encoding will be stoed on the n diffeent stoage nodes of the distibuted stoage system. We will call this code applied to the N diffeent columns of matix X as the N extended MDS code. The oveall effect that the N extended MDS code has upon the infomation matix X is captued by the matix multiplication GX. Figue 2 shows such a code fo N = 3 whee the MDS code used is the same as the one shown in Figue 1. The stoage nodes of the distibuted stoage system ae assumed to have limited computational capabilities allowing them only to pefom inexpensive opeations ove the finite field F q. Some of these stoage nodes ae assumed to stoe eoneous infomation, whee these eos might be eithe andom due to hadwae failues o inseted advesaially by a malicious use. The malicious use can be computationally unbounded, have knowledge of all the infomation stoed on the distibuted stoage system and can inset eos to any t of the stoage nodes. We assume the existence of a special node called the veifie that is assigned to check the integity of the data stoed on diffeent stoage nodes. The veifie does not have access to the initial data object (othe than the desciption of the code) and theefoe has to ely on the communicated infomation to check which nodes contain eos. III. RANDOM HASHS A. Illustating example Assume that in the distibuted stoage system shown in Figue 2 with fou stoage nodes it is known that one of them (the fist in this example) stoes eoneous infomation. The goal of the veifie that ovelooks the state of the whole system is fist to find the eoneous disk with the minimum data exchange and second to epai it by using the infomation stoed on the othe disks. Since all thee columns stoed on the distibuted stoage system ae codewods of a (4,2) MDS code with at most one eo (some columns might be eo fee) and minimum distance d = 3, the naïve appoach to find the eoneous disk is to download all data fom diffeent disks and then by using minimum distance decoding on each sepaate column one would be able to find the eoneous disk. 1 Fist intoduced by Nao and Nao in [9] fo linea functions in F 2.
6 The naïve appoach would cetainly find the faulty disk but it would equie the tansfe of double the size of the file stoed ( n km bits of infomation in geneal). So as the size of the file inceases this appoach will become pohibitively expensive in bandwidth. Instead of tansmitting all the infomation stoed on the distibuted stoage system, the cental node could choose a vecto with each component chosen independently and unifomly at andom fom F q and have each stoage node tansmit the inne poduct (called the hash poduct) between the andomly chosen vecto and each of the ows stoed at the disks. In the absence of eos, these hash poducts will fom a codewod of the MDS code used to encode the diffeent columns of the infomation matix. In case thee ae eos, as in the case of the fist node in Figue 2, the multiplication with the andom vecto will not obscue these eos unless S ei = 0 e i1 +e i2 +e i3 = 0, fo i = {1,2}. The eason why the chosen vecto should be andom is so that the advesay can not delibeately choose the eos to make them disappea afte the vecto multiplication. B. Geneal case The initial infomation matix X F n(n k) N q is coded with the use of an N-extended MDS code with geneato matix G F n(n k) k(n k) q. Some of the stoage nodes contain eos and theefoe what is actually stoed on the distibuted stoage system is Y = GX+ whee Y, F n(n k) N q and is the eo matix. The veifie wants to identify all eoneous disks by sending hash poduct equests to all nodes. Then the following theoem holds: Poof of Theoem 1: All stoage nodes shae N logq bits of common andomness and theefoe they can ceate the same andom vecto F N 1 q with each component of vecto dawn unifomly at andom fom F q. Afte the andom vecto is computed, each stoage node calculates the hash poduct inne poduct between the andom vecto and its content on evey ow. These n(n k) hash poducts ae equal to: H = Y = (GX +) H = G(X)+e (1) whee e = F n(n k) 1 q is a column vecto with at most t m non-zeo components epesenting the eoneous disks (these non-zeo components must coespond to the position of at most t m stoage nodes with eos). The key obsevation is that the pojection will not identify an eo patten at a specific ow if vecto is othogonal to that ow of. Intuitively, a andomly selected will be non-othogonal to an abitay ow of with high pobability and this is the pobability we need to analyze. Fom equation (1) it can be seen that the ode of applying the MDS encoding on the diffeent columns of the infomation matix X and the calculation of the hash poducts can be intechanged ((GX) = G(X)) making the pocess of identifying the eoneous disks equivalent to finding the eo positions in a egula MDS code that is guaanteed to succeed if the minimum distance of the code (n k +1) is lage than twice the numbe of eos 2t (that is indeed satisfied by the assumptions of Theoem 1). The set of indices that coespond to the components of vecto e that come fom disk i is R i = {(i 1)(n k)+1,...,i(n k)}. We ae inteested in vecto e since this gives us the positions of the faulty disks. One complication that might aise is the fact that disk i might contain an eo, meaning that ows {j,j R i} of the eo matix ae not all zeo wheeas the
7 coesponding components of vecto e ({e j,j R i }) tun out to be zeo and theefoe ou scheme fails to detect that eo. Assume that the set of eoneous disks is W {1,2,...,n} and define P[F] to be the pobability of failing to detect some eos. We get P[F] = P ( j = 0 ) i W j R i P (j = 0) 1 q n k 2 t 1 q q i W j R i i W (2) whee inequality ( ) holds due to the fact that the pobability that some stoage node with eos poduce zeo hash poducts is less than 1/q f whee f is the numbe of linealy independent eos ows saved at its disk. So by assuming that the advesay has poduced linealy dependent eos would only incease the pobability of failue. If the advesay has saved eo vectos at stoage node i with ank 1 then the pobability P[ (j = 0)] in equation j Ri (2) educes to an equation fo a single ow (assuming ow k): P e kf f = 0 = P f = e kf f = 1 e kf q e kf 0 whee we only took the tems with a non-zeo eo coefficient e kf. The numbes (e kf /e kf ) f (e kf is any non-zeo eo element fom the k th ow) ae independent and unifom ove F q and so is thei sum accoding to Lemma 1. So the last equality e kf 0 holds since two independent unifomly distibuted ove F q andom numbes ae equal with pobability 1/q. When the eos have ank f > 1 then the pobability P[ j Ri ( j = 0)] can be evaluated by disegading the linealy dependent ows. By looking only at the linealy independent ones and by choosing f columns we can fomulate an invetible submatix Êi F q f f and similaly to the pevious analysis we have that P[ j Ri ( j = 0)] = P[Êiˆ =ˆb] whee ˆ,ˆb F f 1 whee ˆ ae the components of the andom vecto that coespond to the columns whee the submatix Êi was fomed. Since ˆb is unifomly andom, due to the pevious analysis P[ ʈ = b] = 1/q f. ach of the n stoage nodes has to convey to the veifie the esult of the hash poduct fom all its (n-k) ows, so that the total size of the hash communicated is H = n(n k)logq, wheeas the size of the file M = k(n k)n logq. By substituting the field q equal to n k 2 M we conclude the poof of Theoem 1. Lemma 1: The sum of any numbe of independent unifomly distibuted andom vaiables gives a unifomly distibuted andom vaiable. Poof: Without loss of geneality we will pove Lemma 1 only fo the case of two andom vaiables. Assume that x,y F q ae two independent and unifomly distibuted andom vaiables. We will pove that x + y is also unifomly distibuted, indeed t 1,t 2 F q : P[x+y = t 1 ] = P[x = t 1 y y = t 2 ]P[y = t 2 ] t 2 F q
8 ( ) = P[x = t 1 t 2 ] 1 q = q 1 q = q 1 q 2 = 1 q t 2 F q t 2 F q 1 whee equality (*) holds due to the independence between x and y. Befoe we continue to pove Theoem 2 we need to give the following definition (extension of Definition 2.1 in [8] to non-pime numbes): Definition 1: a) Let q be a pime o an intege powe of a pime. Fo a andom vaiable X with values in F q, let the bias of X be defined by bias(x) = (q 1)P[X = 0] P[X 0] A andom vaiable X F q is ǫ-biased if bias(x) ǫ. b) The sample space S F q l is ǫ-biased if fo all c F q and each sequence β = (β 1,...,β l ) F q n \{0 l } the following is valid: if a sequence X = (x 1,...,x l ) S is chosen unifomly at andom fom S, then the andom vaiable ( l i=1 β ix i +c) is ǫ-biased. Poof of Theoem 2: All stoage nodes execute the algoithm descibed in Poposition of [8] and poduces a pseudoandom vecto F q N 1 with N components. The quantity m in the algoithm (and consequently the field size F q m too) is chosen so that the bias (q 1)(N 1)/q m is equal to 1 and theefoe q m = (q 1)(N 1) o m = O(logN). The size of the necessay seed that needs to be povided at all the stoage nodes so that they can stat the algoithm is two elements fom F q m chosen unifomly at andom o equivalently 2mlogq O(logN) andom bits. Once all stoage nodes have constucted the same pseudoandom vecto they compute the inne poduct between vecto and the content stoed on each ow of the stoage nodes. These pseudoandom poducts ae all sent to the veifie to identify the eoneous disks. The whole analysis is identical to the poof of Theoem 1 with one majo diffeence in the calculation of failue pobability P[F ]. Fo the case of a pseudoandom vecto, using the same notation as in the poof of Theoem 1: P[F ] = P ( j = 0 ) i W j R i P ( j = 0 ) P ( j = 0 ) i W j R i i W j R i (n k) n k 2 2 q 2(n k)t 1 q whee inequality ( ) holds since P ( j = 0 ) = 2/q. Indeed the bias of the space constucted by the pseudoandom pocedue is 1 that means: (q 1)P ( j = 0 ) P ( j 0 ) 1 (q 1)P ( j = 0 ) [ 1 P ( j = 0 )] 1 2 This algoithm is descibed fo q pime but it is eadily extensible to q equal to an intege powe of a pime.
9 qp ( j = 0 ) 1 1 P ( j = 0 ) 2 q By setting q = 2(n k)t 1 M we conclude the poof. We would like to undeline hee that both theoems above exhibit the same behavio on the pobability. In Theoem 2 the size of the equied common andomness is deceased in the expense of an inceased field size. Moeove the use of pseudoandom geneatos incus the additional computational cost at each stoage node of O(Nm 2 ) o O(MlogM) opeations in F q to geneate the pseudoandom vecto. ACKNOWLDGMNT The authos would like to thank Pofesso Leonad Schulman fo his insights on pseudoandom geneatos. RFRNCS [1] S. Rhea, C. Wells, P. aton, D. Geels, B. Zhao, H. Weathespoon, and J. Kubiatowicz, Maintenance-fee global data stoage, I Intenet Computing, vol. 5, no. 5, pp , [2] R. Bhagwan, K. Tati, Y.-C. Cheng, S. Savage, and G. M. Voelke, Total ecall: System suppot fo automated availability management, in Poc. of the Netwok Systems Design and Implementation, 2004, pp [3] Y. Sun, F. Liu, B. Li, Li, B. Li, and X. Zhang, Fs2you: Pee-assisted semi-pesistent online stoage at a lage scale, in Poc. of the I Confeence on Compute Communications, Apil [4] A. G. Dimakis, P. B. Godfey, Y. Wu, M. O. Wainwight, and K. Ramchandan, Netwok coding fo distibuted stoage systems, Submitted fo jounal publication. Peliminay vesion appeaed in Infocom [5] P. A. Chou, Y. Wu, and K. Jain, Pactical netwok coding, in Poc. of 41st Annual Alleton Confeence on Communication, Contol, and Computing, [6] S. Jaggi, M. Langbeg, S. Katti, T. Ho, D. Katabi, and M. Médad, Resilient netwok coding in the pesence of byzantine advesaies, in Poc. I INFOCOM 2007, Anchoage, AK, May [7] R. Koette and F. R. Kschischang, Coding fo eos and easues in andom netwok coding, I Tansactions on Infomation Theoy, 2007, submitted. [8] C. Betam-Ketzbeg and H. Lefmann, MOD p-tests, almost independence and small pobability spaces, Random Stuctues & Algoithms, vol. 16, no. 4, pp , [9] J. Nao and M. Nao, Small-bias pobability spaces: fficient constuctions and applications, SIAM Jounal on Computing, vol. 22, pp , [10] T. S. J. Schwaz and. L. Mille, Stoe, foget, and check: Using algebaic signatues to check emotely administeed stoage, in Poc. of ICDCS, [11] W. Litwin and T. Schwaz, Algebaic signatues fo scalable distibuted data stuctues, in Poc. of the I Intenational Confeence on Data ngineeing (ICD 04, 2002, pp [12] M. Kohn, M. Feedman, and D. Maziees, On-the-fly veification of ateless easue codes fo efficient content distibution, in Poc. of the I Symposium on Secuity and Pivacy, May 2004, pp [13] C. Gkantsidis and P. Rodiguez, Coopeative secuity fo netwok coding file distibution, in Poc. of I Intenational Confeence on Compute Communications, Apil 2006, pp [14] F. Zhao, T. Kalke, M. Médad, and K. J. Han, Signatues fo content distibution with netwok coding, in Poc. of the I Intenational Symposium on Infomation Theoy (ISIT), [15] D. Chales, K. Jain, and K. Laute, Signatues fo netwok coding, in Annual Confeence on Infomation Sciences and Systems, Mach 2006, pp [16] J. P. Vilela, L. Lima, and J. Baos, Lightweight secuity fo netwok coding, in Poc. of the I Intenational Confeence on Communications, May 2008.
10 [17]. Kehdi and B. Li, Null keys: Limiting malicious attacks via null space popeties of netwok coding, in Poc. of the I Confeence on Compute Communications, Apil [18] A. Le and A. Makopoulou, Locating byzantine attackes in inta-session netwok coding using spacemac, in Poc. of NetCod, June 2010.
where and are polynomials with real coefficients and of degrees m and n, respectively. Assume that and have no zero on axis.
function whee is an unknown constant epesents fo the un-modeled dynamics The pape investigates the position contol of electical moto dives that can be configued as stuctue of Fig 1 This poblem is fomulated
More informationN2-1. The Voltage Source. V = ε ri. The Current Source
DC Cicuit nalysis The simplest cicuits to undestand and analyze ae those that cay diect cuent (DC). n this note we continue ou study of DC cicuits with the topics of DC voltage and cuent souces, the idea
More informationOptimal Strategies in Jamming Resistant Uncoordinated Frequency Hopping Systems. Bingwen Zhang
Optimal Stategies in Jamming Resistant Uncoodinated Fequency Hopping Systems by Bingwen Zhang A Thesis Submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE in patial fulfillment of the equiements
More informationMultiagent Reinforcement Learning Dynamic Spectrum Access in Cognitive Radios
Sensos & Tansduces 204 by IFSA Publishing, S L http://wwwsensospotalcom Multiagent Reinfocement Leaning Dynamic Spectum Access in Cognitive Radios Wu Chun, 2 Yin Mingyong, 2 Ma Shaoliang, Jiang Hong School
More informationSTACK DECODING OF LINEAR BLOCK CODES FOR DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM
H PRASHANTHA KUMAR et. al.: STACK DECODING OF LINEAR BLOCK CODES FOR DISCRETE MEMORYLESS CHANNEL USING TREE DIAGRAM DOI:.297/ijct.22.69 STACK DECODING OF LINEAR BLOCK CODES FOR DISCRETE MEMORYLESS CHANNEL
More informationOptimal Design of Smart Mobile Terminal Antennas for Wireless Communication and Computing Systems
Optimal Design of Smat Mobile Teminal Antennas fo Wieless Communication and Computing Systems Autho Lu, Junwei, Yang, Shiyou Published 2007 Confeence Title 2007 4th Intenational Symposium on Electomagnetic
More informationHYBRID FUZZY PD CONTROL OF TEMPERATURE OF COLD STORAGE WITH PLC
Jounal of Theoetical and Applied Infomation Technology 28 th Febuay 2013. Vol. 48 No.3 2005-2013 JATIT & LLS. All ights eseved. ISSN: 1992-8645 www.jatit.og E-ISSN: 1817-3195 HYBRID FUZZY PD CONTROL OF
More informationSpectrum Sharing between Public Safety and Commercial Users in 4G-LTE
1 Spectum Shaing between Public Safety and Commecial Uses in 4G-LTE Haya Shajaiah, Ahmed Abdel-Hadi and Chales Clancy Badley Depatment of Electical and Compute Engineeing Viginia Tech, Alington, VA, 22203,
More informationAnalysis of Occurrence of Digit 0 in Natural Numbers Less Than 10 n
meican Intenational Jounal of Reseach in Fomal, pplied & Natual Sciences vailable online at http://www.iasi.net ISSN (Pint): 2328-3777, ISSN (Online): 2328-3785, ISSN (CD-ROM): 2328-3793 IJRFNS is a efeeed,
More informationAn Efficient Control Approach for DC-DC Buck-Boost Converter
2016 Published in 4th Intenational Symposium on Innovative Technologies in Engineeing and Science 3-5 Novembe 2016 (ISITES2016 Alanya/Antalya - Tukey) An Efficient Contol Appoach fo DC-DC Buck-Boost Convete
More informationBinary Systematic Network Coding for Progressive Packet Decoding
Binay Systematic etwok Coding fo Pogessive Packet Decoding Andew L. Jones, Ioannis Chatzigeogiou and Andea Tassi School of Computing and Communications, Lancaste Univesity, United Kingdom Email: {a.jones2,
More informationVLSI Implementation of Low Complexity MIMO Detection Algorithms
, Impact Facto :.643 eissn : 349-000 & pissn : 394-4544 Intenational Jounal of Reseach and Applications (Ap-Jun 015 Tansactions) (6): 309-313 Intenational Confeence on Emeging Tends in Electonics & Telecommunications
More informationINCREMENTAL REDUNDANCY (IR) SCHEMES FOR W-CDMA HS-DSCH
ICREMETAL REDUDACY (IR) SCHEMES FOR W-CDMA HS-DSCH Amitava Ghosh 1, Kenneth Stewat, Rapeepat Ratasuk 1, Eoin Buckley, and Raa Bachu 1 Advanced Radio Technology, GTSS, Motoola, Alington Heights, IL, USA
More information10! !. 3. Find the probability that a five-card poker hand (i.e. 5 cards out of a 52-card deck) will be:
MATH 0(001 Fall 2018 Homewok 2 Solutions Please infom you instucto if you find any eos in the solutions 1 Suppose that thee ae duck huntes, each with a pefect shot A flock of ducks fly ove, and each hunte
More informationSteve Alpern, Thomas Lidbetter, Alec Morton, and Katerina Papadaki Patrolling a pipeline
Steve Alpen, Thomas Lidbette, Alec Moton, and Kateina Papadaki Patolling a pipeline Book section Oiginal citation: Oiginally published in Alpen, Steven, Lidbette, Thomas, Moton, Alec and Papadaki, Kateina
More informationEfficient Power Control for Broadcast in Wireless Communication Systems
Efficient Powe Contol fo Boadcast in Wieless Communication Systems A. T. Chonopoulos Compute Science Depatment Univesity of Texas at San Antonio San Antonio, TX Email:atc@cs.utsa.edu P. Cotae Depatment
More informationDistributed Spectrum Allocation via Local Bargaining
Distibuted Spectum Allocation via Local Bagaining Lili Cao Shanghai Jiaotong Univesity, Shanghai, P.R. China Email: cao li li@yahoo.com Haitao Zheng Micosoft Reseach Asia, Beijing, P.R. China Email: htzheng@ieee.og
More informationLow-Complexity Time-Domain SNR Estimation for OFDM Systems
Low-Complexity Time-Domain SR Estimation fo OFDM Systems A. jaz, A.B. Awoseyila and B.G. Evans A low-complexity SR estimation algoithm fo OFDM systems in fequency-selective fading channels is poposed.
More informationDemosaicking using Adaptive Bilateral Filters
Demosaicking using Adaptive Bilateal Filtes Ekine Akuiyibo Timothy Atobatele EE 362, Winte 2006 0. Abstact Digital cameas sample the continuous spectum using an aay of colo filtes such that each pixel
More informationCyclic Constellation Mapping Method for PAPR Reduction in OFDM system
2013 8th Intenational Confeence on Communications and Netwoking in China (CHINACOM) Cyclic Constellation Mapping Method fo PAPR Reduction in OFDM system Yong Cheng, Jianhua Ge, Jun Hou, and Fengkui Gong
More informationABSTRACTT FFT FFT-' Proc. of SPIE Vol U-1
Phase econstuction stategies in phase-locking system based on multi-apetue wave font sensos P.A. Semenov, S.D. Pol skikh Shvabe-Reseach, Moscow, Russian Fedeation; e-mail: pite@bk.u ABSTRACTT System of
More informationVariance? which variance? R squared effect size measures in simple mediation models
Vaiance? which vaiance? squaed effect size measues in simple mediation models M This is it? med di X de Heus, P. (01). squaed effect size measues and ovelap between diect and indiect effect in mediation
More informationIEEE Broadband Wireless Access Working Group < Modifications to the Feedback Methodologies in UL Sounding
Poject Title Date Submitted IEEE 802.16 Boadband Wieless Access Woking Goup Modifications to the Feedback Methodologies in UL Sounding 2008-01-14 Souce(s) Fed Vook, Jeff Zhuang,
More informationScienceDirect. Simplified Generation of Electromagnetic Field within EMC Immunity Test Area
Available online at www.sciencediect.com ScienceDiect Pocedia Engineeing 69 ( 014 ) 7 34 4th DAAAM Intenational Symposium on Intelligent Manufactuing and Automation, 013 Simplified Geneation of Electomagnetic
More informationSpread Spectrum Codes Identification by Neural Networks
in "Systems and Contol: heoy and Applications", published by WSES, 2, pp. 257-262, ISBN 96-852-4 Spead Spectum Codes Identification by Neual Netwoks Céline BOUDER, Gilles BUREL Laboatoie d Electonique
More informationAn Improved Implementation of Activity Based Costing Using Wireless Mesh Networks with MIMO Channels
Poceedings of the 10th WSEAS Intenational Confenence on APPLIED MATHEMATICS, Dallas, Texas, USA, Novembe 1-3, 2006 262 An Impoved Implementation of Activity Based Costing Using Wieless Mesh Netwoks with
More informationSmall Loop Antenna and Duality Theorem
Small Loop Antenna and Duality Theoem Page 1 Small Loop Antenna and Duality Theoem Having studied the ideal electic dipole we now tun ou attention to an inteesting antenna closely elated to the electic
More informationNear-field Computation and. Uncertainty Estimation using Basic. Cylindrical-Spherical Formulae
Nea-field Computation and Uncetainty Estimation using Basic Cylindical-Spheical Fomulae Poject... IEC 63 Subject... Basic Nea-Field Computation Document numbe... N/A Revision... 3 Autho... F.D. du Plessis
More informationModulation and Coding Classification for Adaptive Power Control in 5G Cognitive Communications
Modulation and Coding Classification fo Adaptive Powe Contol in 5G Cognitive Communications Anestis Tsakmalis, Symeon Chatzinotas and Bjön Ottesten SnT - secuityandtust.lu, Univesity of Luxemboug Email:{anestis.tsakmalis,
More informationDesign of A Circularly Polarized E-shaped Patch Antenna with Enhanced Bandwidth for 2.4 GHz WLAN Applications
VNU Jounal of Science: Comp. Science & Com. Eng., Vol. 31, No. 2 (2015) 1-7 Design of A Ciculaly Polaized E-shaped Patch Antenna with Enhanced Bandwidth fo 2.4 GHz WLAN Applications Hong Van Tam 1, Luong
More informationAnalysis of a Fractal Microstrip Patch Antenna
124 Analysis of a Factal Micostip Patch Antenna Vibha Rani Gupta and Nisha Gupta* Bila Institute of Technology, Mesa, Ranchi-835215, Jhakhand, India. vgupta@bitmesa.ac.in, ngupta@bitmesa.ac.in Abstact-
More informationConfigurable M-factor VLSI DVB-S2 LDPC decoder architecture with optimized memory tiling design
RESEARCH Open Access Configuable M-facto VLSI DVB-S2 LDPC decode achitectue with optimized memoy tiling design Gabiel Falcao 1,2*, Maco Gomes 1,2, Vito Silva 1,2, Leonel Sousa 3,4 and Joao Cacheia 2 Abstact
More informationAssignment 0/0 2 /0 8 /0 16 Version: 3.2a Last Updated: 9/20/ :29 PM Binary Ones Comp Twos Comp
* Dynamic Memoy *Big O Notation*Stacks *Exteme Pogamming*Selection Sot*Insetion Sot*Watefall Model Sting*Aays*AayList*Client Seve*Atificial Intelligence*Inheitance*Files*Video Games*Shot cicuit evaluation*
More informationFigure Geometry for Computing the Antenna Parameters.
Spheical Coodinate Systems Definitions Figue 1.2.1 Geomety fo Computing the Antenna Paametes. Antenna Radiation Patten: The distibution of adiated enegy fom an antenna ove a suface of constant adius centeed
More informationMIMO OTA Testing in Small Multi-Probe Anechoic Chamber Setups Llorente, Ines Carton; Fan, Wei; Pedersen, Gert F.
Aalbog Univesitet MIMO OTA Testing in Small Multi-Pobe Anechoic Chambe Setups Lloente, Ines Caton; Fan, Wei; Pedesen, Get F. Published in: I E E E Antennas and Wieless Popagation Lettes DOI (link to publication
More informationDerangements. Brian Conrey and Tom Davis and March 23, 2000
Deangements Bian Coney and Tom Davis coney@aimath.og and tomdavis@eathlink.net http://www.geomete.og/mathcicles Mach 23, 2000 Seating Mixup Imagine that Yankee Stadium is completely sold out, but when
More informationController Design of Discrete Systems by Order Reduction Technique Employing Differential Evolution Optimization Algorithm
Contolle Design of Discete Systems by Ode Reduction Technique Employing Diffeential Evolution Optimization Algoithm J. S. Yadav, N. P. Patida, and J. Singhai Abstact One of the main objectives of ode eduction
More informationSchool of Electrical and Computer Engineering, Cornell University. ECE 303: Electromagnetic Fields and Waves. Fall 2007
School of Electical and Compute Engineeing, Conell Univesity ECE 303: Electomagnetic Fields and Waves Fall 007 Homewok 1 Due on Nov. 8, 007 by 5:00 PM Reading Assignments: i) Review the lectue notes. ii)
More informationPerformance analysis of ARQ Go-Back-N protocol in fading mobile radio channels
MILCOM 95, SAN IEGO, CA, NOV. 995 Pefomance analysis of ARQ Go-Back-N potocol in fading mobile adio channels Michele Zozi y, Ramesh R. Rao z, Lauence B. Milstein z y ipatimento di Elettonica e Infomazione,
More informationHISTORY AND PROGRESS OF THE TOW THOMAS BI-QUADRATIC FILTER. PART I. GENERATION AND OP AMP REALIZATIONS
Jounal of icuits, Systems, and omputes Vol. 7, No. (2008) 33 54 c Wold Scientific Publishing ompany HISTOY ND POGESS OF THE TOW THOMS BIQUDTI FILTE. PT I. GENETION ND OP MP ELIZTIONS HMED M. SOLIMN Electonics
More informationSliding Mode Control for Half-Wave Zero Current Switching Quasi-Resonant Buck Converter
Sliding Mode Contol fo Half-Wave Zeo Cuent Switching Quasi-Resonant Buck Convete M. Ahmed, Student membe, IEEE, M. Kuisma, P. Silventoinen Abstact This pape focuses on the pactical implementation of sliding
More informationA Transmission Scheme for Continuous ARQ Protocols over Underwater Acoustic Channels
A Tansmission Scheme fo Continuous ARQ Potocols ove Undewate Acoustic Channels Mingsheng Gao 1, Wee-Seng Soh 1 and Meixia Tao 2 1 Dept. of Electical & Compute Engineeing, National Univesity of Singapoe,
More informationStudy and Design of Dual Frequency High Gain and Conformal Microstrip Patch Antenna
, pp.236-243 http://dx.doi.og/10.14257/astl.2017.147.33 Study and Design of Dual Fequency High Gain and Confomal Micostip Patch Antenna S. Auna 1, K. Sinivasa Naik 2, J. Ramesh 2 and D. Madhu 2 1 Andha
More informationAnalysis of the optimized low-nonlinearity lateral effect sensing detector
Jounal of hysics: Confeence Seies Analysis of the optimized low-nonlineaity lateal effect sensing detecto To cite this aticle: Saeed Olyaee et al J. hys.: Conf. Se. 76 4 Related content - Neual netwok
More informationONE-WAY RADAR EQUATION / RF PROPAGATION
ONE-WAY RADAR EQUATION / RF PROPAGATION The one-way (tansmitte to eceive) ada equation is deived in this section. This equation is most commonly used in RWR o ESM type of applications. The following is
More informationDigital Simulation of FM-ZCS-Quasi Resonant Converter Fed DD Servo Drive Using Matlab Simulink
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 2, Novembe 2009, 227-237 UDK: 621.314.1:621.376 Digital Simulation of FM-ZCS-Quasi Resonant Convete Fed DD Sevo Dive Using Matlab Simulink Kattamui
More informationPerformance Analysis of Z-Source Inverter Considering Inductor Resistance
Pefomance Analysis of Z-Souce Invete Consideing Inducto Resistance Fatma A. Khea * and Essam Eddin M. Rashad ** Electic Powe and Machines Engineeing Depatment, Faculty of Engineeing, anta Univesity, anta,
More informationShort-Circuit Fault Protection Strategy of Parallel Three-phase Inverters
Shot-Cicuit Fault Potection Stategy of Paallel Thee-phase Invetes Hongliang Wang, Membe, IEEE, Xuejun Pei, Membe, IEEE, Yu Chen, Membe, IEEE,Yong Kang College of Electical and Electonics Engineeing Huazhong
More informationCCSDS Coding&Synchronization Working Group March Washington DC, USA SLS-C&S_08-CNES02
CCSDS Coding&Synchonization Woking Goup Mach 2008 1 Washington DC, USA DVB-S2 like fame constuction and LDPC codes ate o/and size extension fo use of Vaiable Coding & Modulation suitable fo X and Ka bands
More informationKey Laboratory of Earthquake Engineering and Engineering Vibration, China Earthquake Administration, China
Shake Table Test fo Lage Indiect-Ai-Cooling Towe Stuctue of Fie Powe Plant Pat I Junwu DAI, Yongqiang YANG & Xuan WNG Key Laboatoy of athquake ngineeing and ngineeing Vibation, China athquake Administation,
More informationDesign of an LLC Resonant Converter Using Genetic Algorithm
Design of an LLC Resonant Convete Using Genetic Algoithm H. H. Nien, C. K. Huang, S. K. Changchien, C. H Chan Dept. of Electical Engineeing, Chienkuo Technology Univesity E-mail: nien@ctu.edu.tw Dept,
More informationDesign and Implementation of 4 - QAM VLSI Architecture for OFDM Communication
Design and Implementation of 4 - QAM VLSI Achitectue fo OFDM Communication R. Achitha 1, S. Bhagyalakshmi 2, V. Jaya Suthi 3, D. T. Menakadevi 4 U.G. Students, Depatment of ECE, Adhiyamaan College of Engineeing,
More information1 Performance and Cost
Pefomance and Cost Analysis and Reseach of Ai-Cooled Using Small Diamete Coppe Tubes Wu Yang, Li Changsheng and Deng Bin Abstact Replacing coppe tubes with aluminum tubes and using coppe tubes with smalle
More informationOPTIMUM MEDIUM ACCESS TECHNIQUE FOR NEXT GENERATION WIRELESS SYSTEMS
9 th Febuay. Vol. 3 No. 5 - JATIT & LLS. All ights eseved. ISSN: 99-5 www.jatit.og E-ISSN: 7-395 OPTIMUM MEDIUM ACCESS TECHNIQUE FOR NEXT GENERATION WIRELESS SYSTEMS N.AMUTHA PRABHA, V.MANIANDAN VIT UNIVERSITY,
More informationA New Buck-Boost DC/DC Converter of High Efficiency by Soft Switching Technique
A New Buck-Boost D/D onvete of High Efficiency by Soft Switching Technique Dong-Kul Kwak, Seung-Ho Lee, and Do-Young Jung Pofessional Gaduate School of Disaste Pevention, Kangwon National Univesity, 45-711,
More informationAnti-Forensics of Chromatic Aberration
Anti-Foensics of Chomatic Abeation Owen Maye and Matthew C. Stamm Dept. of Electical and Compute Engineeing, Dexel Univesity, Philadelphia, PA, USA ABSTRACT Ove the past decade, a numbe of infomation foensic
More informationSignal Extraction Technology
Extaction Technology Intoduction Masimo SET pulse oximety is a new and fundamentally distinct method of acquiing, pocessing and epoting ateial oxygen satuation and pulse ate. As illustated below, Masimo
More informationNoise Attenuation Due to Vegetation
Noise Attenuation Due to Vegetation Vasile BACRIA Politehnica Univesity of Timisoaa, Bd. M.Viteazu,1, 300222 Timisoaa, bacia@mec.upt.o Nicolae HERISANU Politehnica Univesity of Timisoaa, Bd. M. Viteazu,
More informationNICKEL RELEASE REGULATIONS, EN 1811:2011 WHAT S NEW?
NICKEL RELEASE REGULATIONS, EN 1811:2011 WHAT S NEW? BACKGROUND: EN 1811 is the intenationally ecognised test method which was devised almost 12 yeas ago to detemine the ate of nickel elease fom jewelley,
More informationDesign of FIR Filter using Filter Response Masking Technique
Design of FIR Filte using Filte Response Masking Technique Sandeep Shivastava, Alok Jain, Ram Kuma Soni Abstact- In this pape autho is tying to implement Fequency esponse masking (FRM) technique. In this
More informationThe Periodic Ambiguity Function Its Validity and Value
The Peiodic Ambiguity Function Its Validity and Value Nadav Levanon Dept. of Electical Engineeing Systems Tel Aviv Univesity Tel Aviv, Isael nadav@eng.tau.ac.il Abstact The peiodic ambiguity function (PAF)
More informationOn Reducing Blocking Probability in Cooperative Ad-hoc Networks
On educing Blocking Pobability in Coopeative Ad-hoc Netwoks Ayda Basyouni, Walaa Hamouda ept of Electical and Compute Engineeing Concodia Univesity, Monteal, Canada Email: {a basy,hamouda}@ececoncodiaca
More informationDesign and Characterization of Conformal Microstrip Antennas Integrated into 3D Orthogonal Woven Fabrics
Design and Chaacteization of Confomal Micostip Antennas Integated into 3D Othogonal Woven Fabics Xin Wang 1, Lan Yao 1, Fujun Xu 2, Dongchun Zhou 1, Yiping Qiu 1 1 College of Textiles, Donghua Univesity,
More informationMinimizing Ringing and Crosstalk
Minimizing Ringing and Cosstalk By Glen Dash, Ampyx LLC, GlenDash at alum.mit.edu Copyight 1998, 26 Ampyx LLC When viewed on a schematic, a wie is just a wie. Howeve, when isetimes shink to a few nanoseconds
More informationMitigation of GPS Multipath Using Polarization and Spatial Diversities
Mitigation of GPS Multipath Using Polaization and Spatial ivesities Matthew Benneman, Jade Moton Chun Yang Fank van Gaas Miami Univesity Sigtem Technology, Inc. Ohio Univesity BIOGRAPIES Matthew Benneman
More informationParameterized Complexity of Connected Even/Odd Subgraph Problems
Paameteized Complexity of Connected Even/Odd Subgaph Poblems Fedo V. Fomin 1 and Pet A. Golovach 2 1 Depatment of Infomatics, Univesity of Begen PB 7803, 5020 Begen, Noway fedo.fomin@ii.uib.no 2 School
More information2D Coding for Future Perpendicular and Probe Recording
2D Coding fo Futue Pependicula and Pobe Recoding Joseph A. O Sullivan Naveen Singla Ronald S. Indec Washington Univesity Saint Louis, Missoui s Outline: 2D Coding fo 2D ISI Motivation: 2D Intesymbol Intefeence
More informationInvestigation and Analysis of Inception Voltage and Field Distribution in Power Cables with Internal Cavities in Dielectric
Investigation and Analysis of Inception Voltage and Field Distibution in Powe Cables with Intenal Cavities in Dielectic A. A. Hossam-Eldin Electical Eng. Depatment Faculty of Engineeing Alexandia Univesity,
More informationChamber Influence Estimation for Radiated Emission Testing in the Frequency Range of 1 GHz to 18 GHz
Chambe Influence Estimation fo Radiated Emission Testing in the Fequency Range of 1 GHz to 18 GHz Alexande Kiz Electomagnetic Compatibility and RF-Engineeing ARC eibesdof eseach GmbH eibesdof, Austia alexande.kiz@acs.ac.at
More information51. IWK Internationales Wissenschaftliches Kolloquium International Scientific Colloquium
51. IWK Intenationales Wissenschaftliches Kolloquium Intenational Scientific Colloquium PROCEEDINGS 11-15 Septembe 26 FACULTY OF ELECTRICAL ENGINEERING AND INFORMATION SCIENCE INFORMATION TECHNOLOGY AND
More informationThe reliability of wireless backhaul mesh networks
The eliability of wieless backhaul mesh netwoks Gei Egeland 1, Paal E. Engelstad 2 1 Depatment of Electical and Compute Engineeing, Univesity of Stavange, 4036 Stavange Noway 1 gei.egeland@gmail.com 2
More informationDiscussion #7 Example Problem This problem illustrates how Fourier series are helpful tools for analyzing electronic circuits. Often in electronic
Discussion #7 Example Poblem This poblem illustates how Fouie seies ae helpful tools fo analyzing electonic cicuits. Often in electonic cicuits we need sinusoids of vaious fequencies But we may aleady
More informationSynopsis of Technical Report: Designing and Specifying Aspheres for Manufacturability By Jay Kumler
OPTI 51 Synopsis (Gad Requiement #1) G. Desoches Synopsis of Technical Repot: Designing and Specifying Asphees fo Manufactuability By Jay Kumle Novembe 1, 007 Reviewed by: Gead Desoches Abstact Since asphees
More informationAMERICAN NATIONAL STANDARD
ENGINEERING COMMITTEE Inteface Pactices Subcommittee AMERICAN NATIONAL STANDARD ANSI/SCTE 48-1 2015 Test Method fo Measuing Shielding Effectiveness of Passive and Active Devices Using a GTEM Cell NOTICE
More informationThe Experimental Study of Possibility for Radar Target Detection in FSR Using L1-Based Non-Cooperative Transmitter
The Expeimental Study of Possibility fo Rada Taget Detection in FSR Using L1-Based on-coopeative Tansmitte Ch. Kabakchiev 1, I. Gavanov, V. Beha 3, H. Rohling 4 1 Faculty of Mathematics & Infomatics,Sofia
More informationISSN: [Reddy & Rao* et al., 5(12): December, 2016] Impact Factor: 4.116
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY SIMULATION COMPARISONS OF INDUCTION MOTOR DRIVE WITH ESTIMATOR AND PLL V. Nasi Reddy *, S. Kishnajuna Rao*, S.Nagenda Kuma * Assistant
More informationFeasibility of a triple mode, low SAR material coated antenna for mobile handsets
Loughboough Univesity Institutional Repositoy Feasibility of a tiple mode, low SAR mateial coated antenna fo mobile handsets This item was submitted to Loughboough Univesity's Institutional Repositoy by
More informationDevelopment of Corona Ozonizer Using High Voltage Controlling of Produce Ozone Gas for Cleaning in Cage
Moden Envionmental Science and Engineeing (ISSN 333-58) July 07, Volume 3, No. 7, pp. 505-509 Doi: 0.534/mese(333-58)/07.03.07/0 Academic Sta Publishing Company, 07 www.academicsta.us Development of Coona
More informationPervasive and Mobile Computing. Collaborative jamming and collaborative defense in cognitive radio networks
Pevasive and Mobile Computing 9 (2013) 572 587 Contents lists available at SciVese ScienceDiect Pevasive and Mobile Computing jounal homepage: www.elsevie.com/locate/pmc Fast tack aticle Collaboative jamming
More informationActivatable Tiles: Compact, Robust Programmable Assembly and other Applications
Activatable Tiles: Compact, obust Pogammable Assembly and othe Applications Umi Majumde, Thomas H. LaBean, John H. eif Depatment of Compute Science, Duke Univesity, Duham, C, USA. {umim, thl, eif}@cs.duke.edu
More informationStatement of Works Data Template Version: 4.0 Date:
Statement of Woks Data Template Vesion: 4.0 Date: 16.08.17 This Statement of Woks (SoW) Data Template is to be completed by Distibution Netwok Opeatos (DNOs) in ode to povide National Gid the equied data
More informationThroughput Maximization of Ad-hoc Wireless Networks Using Adaptive Cooperative Diversity and Truncated ARQ
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 56, NO. 11, NOVEMBER 008 1907 Thoughput Maimization of Ad-hoc Wieless Netwoks Using Adaptive Coopeative Divesity and Tuncated ARQ Lin Dai, Membe, IEEE, and Khaled
More informationExercise 1 (MC Question)
D J Tani -9- Contol Systems II (Sping 8 Solution Execise Set 9 Linea Quadatic Regulato Gioele Zadini, gzadini@ethzch, 7th May 8 Execise (MC Question (I-D, (II-A, (III-C, (IV-B (I-C, (II-A, (III-D, (IV-B
More informationComparison Between Known Propagation Models Using Least Squares Tuning Algorithm on 5.8 GHz in Amazon Region Cities
106 Compaison Between Known Popagation Models Using Least Squaes Tuning Algoithm on 5.8 GHz in Amazon Region Cities Buno S. L. Casto, Mácio R. Pinheio, Gevásio P. S. Cavalcante Fedeal Univesity of Paá
More informationNew Approach for Optimizing Control of Switched Reluctance Generator
New Appoach fo Optimizing Contol of Switched Reluctance Geneato R. Rebbah, A. Bentounsi and H. Benalla Abstact This pape pesents a new switching appoach that detemines the optimal contol of the Switched
More informationPower Minimization in Uni-directional Relay Networks with Cognitive Radio Capabilities
00 5th Intenational Symposium on elecommunications (IS'00) Poe Minimization in Uni-diectional Relay Netoks ith Cognitive Radio Capabilities Adalan Alizadeh Seyed Mohammad-Sajad Sadough Cognitive elecommunication
More informationGRADE 6 FLORIDA. Division WORKSHEETS
GRADE 6 FLORIDA Division WORKSHEETS Mental division stategies invese opeations As we know, multiplication and division ae invese opeations. 8 9 = 7 This means they do the evese of each othe: 7 9 = 8 We
More informationAvailable online at ScienceDirect. Procedia Engineering 100 (2015 )
Available online at www.sciencediect.com ScienceDiect Pocedia Engineeing 1 (215 ) 1 14 25th DAAAM Intenational Symposium on Intelligent Manufactuing and Automation DAAAM 214 Measuement of Complex Pemittivity
More informationGAMMA SHAPED MONOPOLE PATCH ANTENNA FOR TABLET PC
GAMMA SHAPED MONOPOLE PATCH ANTENNA FOR TABLET PC Islam Md. Rafiqul, Mohammad Shawkat Habib and Khaizuan Abdullah Depatment of Electical and Compute Engineeing, Intenational Islamic Univesity Malaysia,
More informationProposal of Circuit Breaker Type Disconnector for Surge Protective Device
Poposal of Cicuit Beake Type Disconnecto fo Suge Potective Device MASAO SHIBAYAMA, HITOSHI KIJIMA Polytechnic Univesity 2-32-1 Ogawanishi, Kodaia, Tokyo, 187-0035 JAPAN hkijima@uitec.ac.jp Abstact: - A
More informationA Simple Improvement to the Viterbi and Viterbi Monomial-Based Phase Estimators
Univesity of New Oleans ScholaWoks@UNO Electical Engineeing Faculty Publications Depatment of Electical Engineeing 006 A Simple Impovement to the Vitebi and Vitebi Monomial-Based Phase Estimatos Kenneth
More informationThe Marginal Utility of Cooperation in Sensor Networks
e Maginal Utility of Coopeation in Senso Netwoks Yu-Ching Tong, Geg Pottie Depatment of Electical Engineeing Univesity of Califonia, Los Angeles Los Angeles, Califonia 99 Email: yuching@ee.ucla.edu, pottie@icsl.ucla.edu
More informationAnalysis of the Radiation Resistance and Gain of Full-Wave Dipole Antenna for Different Feeding Design
Jounal of lectomagnetic Analysis and Applications, 01, 4, 35-4 http://dx.doi.og/10.436/jemaa.01.46033 Published Online June 01 (http://www.scirp.og/jounal/jemaa) 35 Analysis of the Radiation Resistance
More informationMissing Piece Issue and Upload Strategies in Flashcrowds and P2P-assisted Filesharing
Missing Piece Issue and Upload Stategies in Flashcowds and P2P-assisted Fileshaing Fabien Mathieu FT R&D 38, ue du généal Leclec 92 13 Issy le Moulineaux Fance Julien Reynie Goupe TREC, ENS 45, ue d Ulm
More informationA Gain Measurement in the Liquid Based on Friis Transmission Formula in the Near-Field Region
A Gain Measuement in the Liquid Based on Fiis Tansmission Fomula in the Nea-Field Region # Takuhei Akagawa 1, Nozomu Ishii 2,3, Ken-ichi Sato 4, Lia Hamada 3 and Soichi Watanabe 3 1 Gaduate School of Science
More informationOptic Cable Tracking and Positioning Method Based on Distributed Optical Fiber Vibration Sensing
08 5th Intenational Confeence on Electical & Electonics Engineeing and Compute Science (ICEEECS 08) Optic Cable Tacking and Positioning Method Based on Distibuted Optical Fibe Vibation Sensing Zhang Chao,
More informationProceedings of Meetings on Acoustics
Poceedings of Meetings on Acoustics Volume 4, 2 http://acousticalsociety.og/ 62nd Meeting Acoustical Society of Ameica San Diego, Califonia 3 Octobe - 4 Novembe 2 Session 4pEA: Engineeing Acoustics 4pEA8.
More informationDESIGN AND PARAMETRIC EVALUATION OF RECTANGULAR MICROSTRIP PATCH ANTENNA FOR GSM APPLICATION
DESIGN AND PARAMETRIC EVALUATION OF RECTANGULAR MICROSTRIP PATCH ANTENNA FOR GSM APPLICATION RAHUL T. DAHATONDE, SHANKAR B. DEOSARKAR Dept. of E & TC, D. Babasaheb Ambedka Technological Univesity, Lonee,
More informationTECHNICAL REPORT: CVEL Maximum Radiated Emission Calculator: Power Bus EMI Algorithm. Chentian Zhu and Dr. Todd Hubing. Clemson University
TECHNICAL REPORT: CVEL-13-053 Maximum Radiated Emission Calculato: Powe Bus EMI Algoithm Chentian Zhu and D. Todd Hubing Clemson Univesity Octobe 12, 2013 Abstact The Maximum Radiated Electomagnetic Emissions
More informationUNCERTAINTY ESTIMATION OF SIZE-OF-SOURCE EFFECT MEASUREMENT FOR 650 NM RADIATION THERMOMETERS
XIX IMEKO Wold Congess Fundamental and Applied Metology Septembe 6 11, 29, Lisbon, Potugal UNCERTAINTY ESTIMATION OF SIZE-OF-SOURCE EFFECT MEASUREMENT FOR 65 NM RADIATION THERMOMETERS Fumihio Sakuma, Laina
More information