2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
|
|
- Byron Turner
- 5 years ago
- Views:
Transcription
1 200 IEEE. Personal use of this material is ermitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including rerinting/reublishing this material for advertising or romotional uroses, creating new collective works, for resale or redistribution to servers or lists, or reuse of any coyrighted comonent of this work in other works.
2 200 24th IEEE International Conference on Advanced Information Networking and Alications owards rust Establishment for Sectrum Selection in Cognitive Radio Networks Sazia Parvin, Song Han, Li Gao, Farookh Hussain and Elizabeth Chang Digital Ecosystems & Business Intelligence Institute Curtin University of echnology, Australia Perth, Australia {sazia.arvin, {Song. Han, Farookh.Hussain, Abstract Cognitive Radio (CR) has been considered as a romising concet for imroving the utilization of limited radio sectrum resources for future wireless communications and mobile comuting. As cognitive radio network (CRN) is a general wireless heterogeneous network, it is very essential for detecting the misbehaving or false nodes in the network. So in this aer we roose a trust aware model which rovides a reliable aroach to establish trust for CRN. his aroach combines all kinds of trust values together, including the direct trust and indirect trust value for the secondary users. Deending on this trust value, it is decided that whether the secondary user can user the rimary user s sectrum band or not. he mathematical results show that our trust model can efficiently take decision for assigning sectrums to the users. Keywords-cognitive radio networks; sectrum; trust; rimary user; secondary user I. INRODUCION Among different kinds of wireless technology suorting Internet access and other services, a very effective idea is to merge different wireless networks and to use one of them aroriately deending on the communication environments and the alication requirements. Cognitive radio ioneered by J.Mitola iii [] from software defined radio (SDR) was originally considered to imrove sectrum utilization. here is an ever increasing demand of sectrum for emerging wireless alications and there is a shortage of sectrum for the wireless alications. Considering these things Federal Communications Commission (FCC) has considered to make the licensed sectrum available to the unlicensed users. So the unlicensed users can use the fallow sectrum rovided they cause no interference to the licensed users. Most of the radio systems today are now aware of the radio sectrum. Cognitive radio is a aradigm for wireless communication in which either a network or a wireless node changes its transmission or recetion arameters to communicate efficiently avoiding interference with licensed or unlicensed users. A cognitive radio senses the available sectrum, occuies it and can vacate the sectrum on sensing the return of the rimary user. We can call future wireless networks as cognitive radio networks (CRN), which is retty much consistent of Haykins s definition of cognitive radio [2]: Cognitive radio is an intelligent wireless communication system that is aware of its surrounding environment (i.e., outside world), and uses the methodology of understandingsby-building to learn from the environment and adat its internal states to statistical variations in the incoming RF stimuli by making corresonding changes in certain oerating arameters (e.g., transmit ower, carriesfrequency, and modulation strategy) in real time, with two rimary objectives in mind: highly reliable communication whenever and wherever needed, efficient utilization of the radio sectrum. As referenced by [3, 4] once cognitive radios can find the oortunities using the sectrum holes for communications, cognitive radio networking to transort ackets on to of cognitive radio links is a must to successfully facilitate useful alications and services. A mobile terminal with cognitive radio caabilities can sense the communication environments (e.g. sectrum holes, geograhic location, available wire/wireless communication system or networks, available services), analyse and learn information from the environments with user s references and demands, and reconfigure itself by adjusting system arameters on forming to certain olicies and regulations. For examle, when a cognitive radio mobile terminal sensed that there WIFI and GSM systems nearby while sectrum holes exist in the frequency band of digital V, it may decide to download files from a certain WiFi A, make a hone call through GSM system and communicate with other cognitive radio users using those sectrum holes. Cognitive radio technology could also facilitate interoerability among different communication systems in which frequency bands and/or formats differ [4]. Cognitive radio, on the other hand, sits above the SDR (Software Defined Radio) and is the intelligence that lets an SDR determine which mode of oeration and arameters to use. Actually an SDR is simly a radio that uts most of the Radio Frequency (RF) and Intermediate frequency (IF) functionality, including waveform synthesis, into the digital (rather than the analog) domain, allowing great flexibility in the modes of radio oeration (called ersonalities ) []. A cognitive radio network is thus not just another network to interconnect cognitive radios. he CNRs are comosed of various kinds of communication systems and networks, and can be views as a sort of heterogeneous networks. he X/0 $ IEEE DOI 0.09/AINA
3 heterogeneity exists in wireless access technologies, networks, user terminals, alications and service roviders [5]. So free sectrum sensing is a key characteristic used in CRNs. hrough this sensing rocess, unlicensed user can determine whether the radio can be used or not. But if the unlicensed user is not a trust worthy node, then it can break down the normal activities of the CRNs by injecting some malicious attacks. hat s why establishing trust for CRN is an oen and challenging issue. In this aer, we roose a trust aware model which rovides a reliable aroach to establish trust for the sectrum selection in CRNs. he organization of this aer is as follows: In section 2, related works is reviewed. In section 3, system architecture of our roosed model is described. In section 4 and 5, we show how trust is calculated and sectrum allocation decision is based on the result. We conclude the aer in section 6 including future remarks. II. RELAED WORKS Now-a-days trust in the human society has become the most imortant thing for human being s communications, work and lives. However trust can be regarded as criteria for making a judgment under comlex social conditions and can be used to guide further actions [6]. rust and security are very closely interrelated and indeendent that is difficult to searate each other. But, nowadays, establishing trust for CRN is an oen and challenging issue. rust has been widely mentioned in literatures regarding trusted comuting and web comuting, ad hoc networks and even social science [7-0].However, trust for CRN is comletely different from all of these scenarios. rust is critical in CRN oeration and beyond security design, as security usually needs communication overhead in advance. he authors [] describes the trust in CRN as follows: A cognitive radio senses a sectrum hole and to dynamically access the sectrum for transmission requires trust from originally existing system (i.e. rimary system) and regulator, even without creating interference to PS. A cognitive radio may want to leverage another existing cognitive radio to route its ackets, even though another CR is not the targeted recient terminal. It requires trust from another CR. A cognitive radio can even leverage PS to forward its ackets to realize the goal of acket switching networks. It needs trust from the PS, not only at network level but also in service rovider. Because of all these reasons, the idea of alying trust and reutation model in a CRN has recently attracted research interest. he imact of trust model on CRN is discussed briefly in [2]. In this aer, the authors suggested otential ways for incororating trust modeling to CRNs including identity management, the trust building rocess and ossible mechanisms for disseminating the trust information. But no exerimental results were established for these discussions. he authors in [3] integrated trust and reutation for the threat mitigation of Sectrum Sensing Data Falsification (SSDF) attack on CRNs. But trust modeling was not the meeting oint of their aer. In this aer, we integrated direct trust and indirect trust for using the rimary user s sectrum band if the sectrum is available to use. III. SYSEM ARCHIECURE Cognitive radio (CR) is a novel aroach for imroving the utilization for making it ossible for a grou of secondary (unlicensed) users (SUs) to access the sectrum band which is not being by the rimary (licensed) users (PUs) in some geograhical location. A. A CRN Architecture As like Wireless Networks, CRNs can be deloyed in various kinds of network configurations such as Centralized, Ad-hoc and Mesh Architecture. In our aer we imlement an infrastructure-based CRN with centralized network entities. Figure shows a general architecture of CRNs as deicted in [3]. Figure.A general cognitive radio network architecture [4] Figure 2. System Architecture of Proosed Model 580
4 As referred by [5], we assume that PUs coexist with SUs in some geograhical area and PUs are controlled by a fixed PU base station (PUBS). In this CRN, SUs are also distributed in the coverage area of a fixed SU base station (SUBS). SUs can only communicate with each other through the SUBS within the transmission range of the SUBS. he SUs and PUs are not able to communicate between themselves. But the communication between SUBS and PUBS is ossible. Figure 2 shows the architecture of our system model. If one SU wants to use the PU s sectrum band, then at first the SU needs to sense the sectrum. During the sensing rocess, each SU senses the PU sectrum bands individually and reorts the results to the SUBS. By integrating the sensing results reorted by the SUs with its own sensing result, the SUBS determines the activity states of each PU sectrum band and allocates resources to SUs within its range. In this aer, we strongly assume that PUs, PUBS and SUBS are trustworthy entities in the CRN. B. Architecture of rust Model In a CRN, secondary user needs the service rovided by rimary users. A secondary user can sense the sectrum band of rimary user, if it is free then the secondary user will send sensing information to the SUBS. Every user can be denoted by User <User ID, A, V> where ID denotes the identity of the user, A denotes the attribute set of user ID, V denotes the value set of the attributes. As soon as the cooeration rocess starts that means the secondary user senses the rimary user s sectrum band and sends the sensing result to the SUBS, the trust relationsh is set u among the SUs and PUBS. In our trust model, a user is denoted by User <ID, A, V, >, where denotes the set of the trust values associated with the attributes as every attribute has its own trust value. C. rust Model Our trust model is a trust a modification of the trust model [6]. Han s model comutes trust for wireless sensor network. In our new model, we build trust model for cognitive radio networks considering that the networks consisting of PUs, SUs, SUBS, and PUBS. he architecture of our trust model is shown in the following figure. As shown in the figure, when the secondary user (Ex. SU) tries to use one rimary user s sectrum band, at first SU needs to sense the PU s sectrum band to check whether it is free or is in using. After sensing the sectrum band, the SU will send the sensing result to the SUBS. hen the SUBS will get the direct trust value for that SU and indirect trust value from other SUs. When the SUBS gets the direct and indirect trust value, the integrated trust module combines both the trust value and the indirect trust value to calculate the integrated trust value. Figure 3. System Model of Proosed Scheme IV. CALCULAION OF RUS As referred by [2], in our trust model, trust is reresented by a real number ranging from 0 (comlete distrust) to (comlete trust). he trust exists in the user, thus the trust value among the users can also be divided into three categories: direct trust value, indirect trust value and integrated trust value. Direct trust value is the tye of trust value can be established between SU and SUBS. And this is denoted by Directtrust. Indirect trust is established when SU 2.SU n rovide its trust value of SU to SUBS. Integrated trust value can be calculated by the SUBS based on the direct trust value of SU and the indirect trust value of SU from other SUs, denoted by Integtrust. A. Direct rust Calculation he direct trust value of secondary user can be determined by its multi-attribute trust value. he conditions of a User are always changing, thus the SUBS always need to evaluate trust value of the SU based on its multi-attribute trust value. he information about the ast cooeration is assembled in a table of cooeration record among the Users, as shown in the table. As referred by [2], each attribute has three relevant values : the number of the successes (S i, i =,2,.n), the number of failures (F i, i =,2 n) and the number of the cooeration (C i, i =,2, n). In order to simly our analysis, we assume that the cooeration/non-cooeration behavior is of equal value during the communication rocess between the Users. 58
5 ABLE I. COOPERAION RECORD ABLE = int egtrustγ SUBS + ( int egtrust ) M R M τ Γ τ Where W realiable + W = and W, W [0,] strange realiable strange C = S + F, i =,2,.n. he trust value for In table, i i i attribute A i can be comuted based on the table as follows: i Ci hus, the overall trust value for the SU with n attributes A, i =, 2,... n (denoted by node ) can be comuted using i as follows: User = n n n Since all, i =,2,., n can be calculated using data in table, the trust value of Secondary User who wants to sense and use Primary User s sectrum band, can be easily calculated by the SUBS. B. Indirect rust Calculation When the SUBS sends the cooeration request to other secondary users, three kinds of trust values from reliable nodes, the strange nodes (the node never cooerate with the SUBS before) and the unreliable nodes, are returned to SUBS. he trust value of reliable nodes ( reliable ) and strange nodes ( Strange ) can be ket, and the trust value of the unreliable nodes must be discarded. he SUBS assign some weight value to reliable nodes, strange nodes. hus the indirect trust can be calculated as follows: = S + ( ) C. Integrated rust here are different kinds of cooeration among secondary users and SUBS. So the SUBS can automatically assigns the different weights value based on the requirements of a certain task in our trust model. he weight of the direct trust is denoted by W directtrust, the weight of the indirect trust is denoted by W indirecttrust. he integrated trust value can be calculated by the following equation: W = + W, int egtrust directtrust directtrust indirecttrust indirecttrust Where Wdirecttrust + Windirecttrust = and W, W [0,] directtrust indirecttrust V. DECISION CALCULAION FOR ASSIGNING SPECRUM When the SUBS calculates the integrated trust value, then it will send this trust value to PUBS. hen the PUBS will take decision whether SU is able to use Primary user s sectrum or not deending on the following equation: = Γ + ( ) int egtrust SUBS int egtrust M R M τ Γ Where R is the overall sensing result from PUBS for PU sectrum band ; int egtrust is the trust value for the SU from the SUBS; Γ SUBS is the sensing result rovided by the SUBS; τ is the trustworthiness of SU i in the context of PU sectrum band ; τ 582
6 Γ is the sensing result for PU sectrum band rovided by SU i ; M is the number of SUs whose trustworthiness with resect to PU sectrum band is above a redefined threshold η. In the case when the variance in trustworthiness of each SU is the context of a rimary sectrum band is not considered, τ are set to. hen the is set to 0 and all second term in this equation reduces to a simle average of all the sensing results obtained from the SUs. It is effectively a weighted sum of the SUBS sensing result and a majority voting from all the SUs who choose to articate in the distributed sensing oeration. he final decision D is made based on the sign of R, D, R < 0 = 0, R = 0, R > 0 Whenever D =, that time the SU will be able to use the rimary user s frequency sectrum band. VI. CONCLUSION AND FUURE WORKS In this aer, we roose a trust aware hybrid sectrum sensing scheme for CRN. In the CRN, some misbehaviouring SUs may want to access the PU s available sectrum band. Such malicious SUs can seriously imact on the whole network erformance. So in this aer, we roose the combination of all kinds of trust values together, including the direct trust and indirect trust value for the secondary users. Deending on this trust value, it is decided that whether the secondary user can user the rimary user s sectrum band or not. In the future work, we want to erform the simulation deending on the mathematical terms. Conference, Network and Parallel Comuting Workshos, NPC Workshos [7]. Ghosh, N. Pissinou, and K. Makki, owards designing a trusted routing solution in mobile ad hoc networks. Mobile Networks and Alications, (6): [8] P. Naldurg and R.H. Cambell. Dynamic Access Control: Preserving Safety and rust in Network Defense Oeration,. in Proceedings of the Eighth ACM Symosium in Access Control Models and echnologies (ACM SACMA 2003) [9] G. heodorakooulos and J.S. Baras, On rust Models and rust Evaluation Metrics for Ad-Hoc Networks, IEEE Journal on Selected Areas in Communications, (2): [0] A.A. Pirzada, C. McDonald, Establishing trust in ure ad-hoc networks,. in Proceedings of the 27th Australasian conference on Comuter science [] K.Chen,Y.Peng,N.Prasad,Y.Kiang,S.Sun, Cognitive radio network architecture: art II -- trusted network layer structure, in Conference On Ubiquitous Information Management And Communication 2008, ACM: Suwon, Korea [2].C.G. Clancy,, N. Goergen, Security in Cognitive Radio Networks: hreats and Mitigation, in Cognitive Radio Oriented Wireless Networks and Communications, [3] R. Chen, et al., oward secure distributed sectrum sensing in cognitive radio networks, in IEEE Communications Magazine Secial Issue on Cognitive Radio Communications [4] I.F. kyildiz, NeXt generation/dynamic sectrum access/cognitive radio wireless networks : A surve,. Comuter Networks, : [5]. Qin,, et al., owards a trust aware cognitive radio architecture., ACM SIGMOBILE Mobile Comuting and Communications Review (2): [6] G. Han,, et al. A Reliable Aroach of Establishing rust for Wireless Sensor Networks, in International Conference on Network and Parallel Comuting Workshos 2007: IEEE Comuter Society. REFERENCES [] J.Mitola, Cognitive Radio: An Integrated Agent Architecture for Software Defined Radio, PhD thesis,, in Royal Institute of echnology (KH) [2] S.Haykin, Cognitive radio: brain-emowered wireless communications,ieee Journal on Selected Areas in Communications, (2): [3] K.Chen,Y.Peng,N.Prasad,Y.Kiang,S.Sun, Cognitive radio network architecture: art I -- general structure, in Proceedings of the 2nd international conference on Ubiquitous information management and communication Suwon, Korea ACM. [4] FCC, E Docket No Notice of Proosed rule making and order. December, [5] X.Gao, G.Wu, and.miki, End-to-end quality of service rovisioning over heterogeneous networks. IEEE Wireless Communication, (3): [6] G.Han, D. Choi, and W. Lim. A Reliable Aroach of Establishing rust for Wireless Sensor Networks. in IFIP International 583
A Pricing-Based Cooperative Spectrum Sharing Stackelberg Game
A Pricing-Based Cooerative Sectrum Sharing Stackelberg Game Ramy E. Ali, Karim G. Seddik, Mohammed Nafie, and Fadel F. Digham? Wireless Intelligent Networks Center (WINC), Nile University, Smart Village,
More informationEvolutionary Circuit Design: Information Theory Perspective on Signal Propagation
Evolutionary Circuit Design: Theory Persective on Signal Proagation Denis Poel Deartment of Comuter Science, Baker University, P.O. 65, Baldwin City, KS 66006, E-mail: oel@ieee.org Nawar Hakeem Deartment
More informationOperating Characteristics of Underlay Cognitive Relay Networks
Oerating Characteristics of Underlay Cognitive Relay Networks Ankit Kaushik, Ralh Tanbourgi, Friedrich Jondral Communications Engineering Lab Karlsruhe Institute of Technology (KIT) {Ankit.Kaushik, Ralh.Tanbourgi,
More informationHigh resolution radar signal detection based on feature analysis
Available online www.jocr.com Journal of Chemical and Pharmaceutical Research, 4, 6(6):73-77 Research Article ISSN : 975-7384 CODEN(USA) : JCPRC5 High resolution radar signal detection based on feature
More informationOptimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm
o Otimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm Nirvana S. Antonio, Cícero F. F. Costa Filho, Marly G. F. Costa, Rafael Padilla Abstract In 4-sided dominoes,
More informationServo Mechanism Technique based Anti-Reset Windup PI Controller for Pressure Process Station
Indian Journal of Science and Technology, Vol 9(11), DOI: 10.17485/ijst/2016/v9i11/89298, March 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Servo Mechanism Technique based Anti-Reset Windu
More informationCognitive Radio: Smart Use of Radio Spectrum
Cognitive Radio: Smart Use of Radio Spectrum Miguel López-Benítez Department of Electrical Engineering and Electronics University of Liverpool, United Kingdom M.Lopez-Benitez@liverpool.ac.uk www.lopezbenitez.es,
More informationProperties of Mobile Tactical Radio Networks on VHF Bands
Proerties of Mobile Tactical Radio Networks on VHF Bands Li Li, Phil Vigneron Communications Research Centre Canada Ottawa, Canada li.li@crc.gc.ca / hil.vigneron@crc.gc.ca ABSTRACT This work extends a
More informationPrimary User Enters the Game: Performance of Dynamic Spectrum Leasing in Cognitive Radio Networks
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO., DECEMBER 365 Primary User Enters the Game: Performance of Dynamic Sectrum Leasing in Cognitive Radio Networks Gonzalo Vazquez-Vilar, Student Member,
More informationInvestigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation
International Journal Of Comutational Engineering Research (ijceronline.com) Vol. 2 Issue. Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation Rajbir Kaur 1, Charanjit
More informationAn Overview of Substrate Noise Reduction Techniques
An Overview of Substrate Noise Reduction Techniques Shahab Ardalan, and Manoj Sachdev ardalan@ieee.org, msachdev@ece.uwaterloo.ca Deartment of Electrical and Comuter Engineering University of Waterloo
More informationEfficient Importance Sampling for Monte Carlo Simulation of Multicast Networks
Efficient Imortance Samling for Monte Carlo Simulation of Multicast Networks P. Lassila, J. Karvo and J. Virtamo Laboratory of Telecommunications Technology Helsinki University of Technology P.O.Box 3000,
More informationAnalysis of Pseudorange-Based DGPS after Multipath Mitigation
International Journal of Scientific and Research Publications, Volume 7, Issue 11, November 2017 77 Analysis of Pseudorange-Based DGPS after Multiath Mitigation ThilanthaDammalage Deartment of Remote Sensing
More informationRandom Access Compressed Sensing in Underwater Sensor Networks
Random Access Comressed Sensing in Underwater Sensor Networks Fatemeh Fazel Northeastern University Boston, MA 2115 Email: ffazel@ece.neu.edu Maryam Fazel University of Washington Seattle, WA 98195 Email:
More informationCHAPTER 5 INTERNAL MODEL CONTROL STRATEGY. The Internal Model Control (IMC) based approach for PID controller
CHAPTER 5 INTERNAL MODEL CONTROL STRATEGY 5. INTRODUCTION The Internal Model Control (IMC) based aroach for PID controller design can be used to control alications in industries. It is because, for ractical
More informationSelf-Driven Phase Shifted Full Bridge Converter for Telecom Applications
Self-Driven Phase Shifted Full Bridge Converter for Telecom Alications SEVILAY CETIN Technology Faculty Pamukkale University 7 Kinikli Denizli TURKEY scetin@au.edu.tr Abstract: - For medium ower alications,
More informationControl of Grid Integrated Voltage Source Converters under Unbalanced Conditions
Jon Are Suul Control of Grid Integrated Voltage Source Converters under Unbalanced Conditions Develoment of an On-line Frequency-adative Virtual Flux-based Aroach Thesis for the degree of Philosohiae Doctor
More informationControl issues in cognitive networks. Marko Höyhtyä and Tao Chen CWC-VTT-Gigaseminar 4th December 2008
Control issues in cognitive networks Marko Höyhtyä and Tao Chen CWC-VTT-Gigaseminar 4th December 2008 Outline Cognitive wireless networks Cognitive mesh Topology control Frequency selection Power control
More informationUniversity of Twente
University of Twente Faculty of Electrical Engineering, Mathematics & Comuter Science Design of an audio ower amlifier with a notch in the outut imedance Remco Twelkemeijer MSc. Thesis May 008 Suervisors:
More informationApplication of Notch Filtering under Low Sampling Rate for Broken Rotor Bar Detection with DTFT and AR based Spectrum Methods
Alication of Notch Filtering under Low Samling Rate for Broken Rotor Bar Detection with DTFT and AR based Sectrum Methods B. Ayhan H. J. Trussell M.-Y. Chow M.-H. Song IEEE Student Member IEEE Fellow IEEE
More informationPerformance Analysis of Battery Power Management Schemes in Wireless Mobile. Devices
Performance Analysis of Battery Power Management Schemes in Wireless Mobile Devices Balakrishna J Prabhu, A Chockalingam and Vinod Sharma Det of ECE, Indian Institute of Science, Bangalore, INDIA Abstract
More informationState-of-the-Art Verification of the Hard Driven GTO Inverter Development for a 100 MVA Intertie
State-of-the-Art Verification of the Hard Driven GTO Inverter Develoment for a 100 MVA Intertie P. K. Steimer, H. Grüning, J. Werninger R&D Drives and Power Electronics ABB Industrie AG CH-5300 Turgi,
More informationIMPROVED POLYNOMIAL TRANSITION REGIONS ALGORITHM FOR ALIAS-SUPPRESSED SIGNAL SYNTHESIS
IMPROVED POLYNOMIAL TRANSITION REGIONS ALGORITHM FOR ALIAS-SUPPRESSED SIGNAL SYNTHESIS Dániel Ambrits and Balázs Bank Budaest University of Technology and Economics, Det. of Measurement and Information
More informationBeamformings for Spectrum Sharing in Cognitive Radio Networks
Raungrong Suleesathira, Satit Puranachieeree Beamformings for Sectrum Sharing in Cognitive Radio Networs Raungrong Suleesathira * and Satit Puranachieeree Deartment of Electronic and Telecommunication
More informationInitial Ranging for WiMAX (802.16e) OFDMA
Initial Ranging for WiMAX (80.16e) OFDMA Hisham A. Mahmoud, Huseyin Arslan Mehmet Kemal Ozdemir Electrical Engineering Det., Univ. of South Florida Logus Broadband Wireless Solutions 40 E. Fowler Ave.,
More informationReport of the NIST Workshop on Data Exchange Standards at the Construction Job Site 1
Reort of the NIST Worksho on Data Exchange Standards at the Construction Job Site 1 by Kamel S. Saidi 2, Alan M. Lytle 2, William C. Stone 2 ABSTRACT: The Building and Fire Research Laboratory of the National
More informationA New ISPWM Switching Technique for THD Reduction in Custom Power Devices
A New ISPWM Switching Technique for THD Reduction in Custom Power Devices S. Esmaeili Jafarabadi, G. B. Gharehetian Deartment of Electrical Engineering, Amirkabir University of Technology, 15914 Tehran,
More informationA toy-model for the regulation of cognitive radios
A toy-model for the regulation of cognitive radios Kristen Woyach and Anant Sahai Wireless Foundations Deartment of EECS University of California at Berkeley Email: {kwoyach, sahai}@eecs.berkeley.edu Abstract
More informationJournal of Asian Scientific Research DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE
Journal of Asian Scientific Research ISSN(e): 2223-1331/ISSN(p): 2226-5724 URL: www.aessweb.com DEVELOPMENT OF A COGNITIVE RADIO MODEL USING WAVELET PACKET TRANSFORM - BASED ENERGY DETECTION TECHNIQUE
More informationEfficient Method of Secondary Users Selection Using Dynamic Priority Scheduling
Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling ABSTRACT Sasikumar.J.T 1, Rathika.P.D 2, Sophia.S 3 PG Scholar 1, Assistant Professor 2, Professor 3 Department of ECE, Sri
More informationEXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER
YEDITEPE UNIVERSITY ENGINEERING & ARCHITECTURE FACULTY INDUSTRIAL ELECTRONICS LABORATORY EE 432 INDUSTRIAL ELECTRONICS EXPERIMENT 6 CLOSED-LOOP TEMPERATURE CONTROL OF AN ELECTRICAL HEATER Introduction:
More informationAnalysis of Mean Access Delay in Variable-Window CSMA
Sensors 007, 7, 3535-3559 sensors ISSN 44-80 007 by MDPI www.mdi.org/sensors Full Research Paer Analysis of Mean Access Delay in Variable-Window CSMA Marek Miśkowicz AGH University of Science and Technology,
More informationComparative Evaluation of Three-Phase Isolated Matrix-Type PFC Rectifier Concepts for High Efficiency 380VDC Supplies of Future Telco and Data Centers
214 IEEE Proceedings of the 16th Euroean Conference on Power Electronics and Alications (EPE 214 - ECCE Euroe), Laeenranta, Finland, August 26-28, 214 Comarative Evaluation of Three-Phase Isolated Matrix-Tye
More informationPractical Evaluation of Cooperative Communication for Ultra-Reliability and Low-Latency
Practical Evaluation of Cooerative Communication for Ultra-Reliability and Low-Latency Martin Serror, Sebastian Vaaßen, Klaus Wehrle, James Gross Chair of Communication and Distributed Systems, RWTH Aachen
More informationAn Alternative Single Parameter Functional Form for Lorenz Curve
Crawford School of Public Policy Crawford School working aers An Alternative Single Parameter Functional Form for Lorenz Curve Crawford School Working Paer 7 Setember 07 Satya Paul Amrita University, India
More informationAn Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ
An Efficient VLSI Architecture Parallel Prefix Counting With Domino Logic Λ Rong Lin y Koji Nakano z Stehan Olariu x Albert Y. Zomaya Abstract We roose an efficient reconfigurable arallel refix counting
More informationSoftware for Modeling Estimated Respiratory Waveform
Software for Modeling Estimated Resiratory Waveform Aleksei E. Zhdanov, Leonid G. Dorosinsky Abstract In the imaging of chest or abdomen, motion artifact is an unavoidable roblem. In the radiation treatment,
More informationMeasurement of Field Complex Noise Using a Novel Acoustic Detection System
Southern Illinois University Carbondale OenSIUC Conference Proceedings Deartment of Electrical and Comuter Engineering Fall 04 Measurement of Field Comlex Noise Using a Novel Acoustic Detection System
More informationCapacity Gain From Two-Transmitter and Two-Receiver Cooperation
3822 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 Caacity Gain From Two-Transmitter and Two-Receiver Cooeration Chris T. K. Ng, Student Member, IEEE, Nihar Jindal, Member, IEEE,
More informationDelivery Delay Analysis of Network Coded Wireless Broadcast Schemes
22 IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes Amy Fu and Parastoo Sadeghi The Australian National
More informationA Novel Image Component Transmission Approach to Improve Image Quality and Energy Efficiency in Wireless Sensor Networks
Journal of Comuter Science 3 (5: 353-360, 2007 ISSN 1549-3636 2007 Science Publications A Novel Image Comonent Transmission Aroach to Imrove Image Quality and nergy fficiency in Wireless Sensor Networks
More informationSeries PID Pitch Controller of Large Wind Turbines Generator
SERBIAN JOURNAL OF ELECRICAL ENGINEERING Vol. 1, No., June 015, 183-196 UDC: 61.311.4:681.5 DOI: 10.98/SJEE150183M Series PID Pitch Controller of Large Wind urbines Generator Aleksandar D. Micić 1, Miroslav
More informationComparison of image-based functional monitoring through resampling and compression Steven J. Simske, Margaret Sturgill, Jason S.
Comarison of image-based functional monitoring through resamling and comression Steven J. Simse, Margaret Sturgill, Jason S. Aronoff HP Laboratories HPL-2009-145 Keyword(s): Image forensics, counterfeit
More informationTWO-STAGE SPEECH/MUSIC CLASSIFIER WITH DECISION SMOOTHING AND SHARPENING IN THE EVS CODEC
TWO-STAGE SPEECH/MUSIC CLASSIFIER WITH DECISION OOTHING AND SHARPENING IN THE EVS CODEC Vladimir Malenovsky *, Tommy Vaillancourt *, Wang Zhe, Kihyun Choo, Venkatraman Atti *VoiceAge Cor., Huawei Technologies,
More informationFull Bridge Single Stage Electronic Ballast for a 250 W High Pressure Sodium Lamp
Full Bridge Single Stage Electronic Ballast for a 50 W High Pressure Sodium am Abstract In this aer will be reorted the study and imlementation of a single stage High Power Factor (HPF) electronic ballast
More informationMathematical and Computer Modelling. On the characterization of Aloha in underwater wireless networks
Mathematical and Comuter Modelling 53 (2011) 2093 2107 Contents lists available at ScienceDirect Mathematical and Comuter Modelling journal homeage: www.elsevier.com/locate/mcm On the characterization
More informationApplication of combined TOPSIS and AHP method for Spectrum Selection in Cognitive Radio by Channel Characteristic Evaluation
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 10, Number 2 (2017), pp. 71 79 International Research Publication House http://www.irphouse.com Application of
More informationMulti-period Channel Assignment
Multi-eriod Channel Assignment Hakim Mabed, Alexandre Caminada and Jin-Kao Hao 2 France Télécom R&D, 6 Avenue des Usines, BP 382, 97 Belfort, France {hakim.mabed,alexandre.caminada}@francetelecm.com Tel:
More informationThe online muon identification with the ATLAS experiment at the LHC
32 he online muon identification with the ALAS exeriment at the LHC Abstract he Large Hadron Collider (LHC) at CERN is a roton-roton collider roviding the highest energy and the highest instantaneous luminosity
More informationAnalysis of Electronic Circuits with the Signal Flow Graph Method
Circuits and Systems, 207, 8, 26-274 htt://www.scir.org/journal/cs ISSN Online: 253-293 ISSN Print: 253-285 Analysis of Electronic Circuits with the Signal Flow Grah Method Feim Ridvan Rasim, Sebastian
More informationPrediction Efficiency in Predictive p-csma/cd
Prediction Efficiency in Predictive -CSMA/CD Mare Miśowicz AGH University of Science and Technology, Deartment of Electronics al. Miciewicza 30, 30-059 Kraów, Poland misow@agh.edu.l Abstract. Predictive
More informationOptimal p-persistent MAC algorithm for event-driven Wireless Sensor Networks
Otimal -ersistent MAC algorithm for event-driven Wireless Sensor Networks J. Vales-Alonso,E.Egea-Lóez, M. V. Bueno-Delgado, J. L. Sieiro-Lomba, J. García-Haro Deartment of Information Technologies and
More informationThree-Phase Series-Buck Rectifier with Split DC- Bus Based on the Scott Transformer
Three-Phase Series-Buck Rectifier with Slit DC- Bus Based on the Scott Transformer Alceu André Badin and Io Barbi Federal Uniersity of Santa Catarina/Deartment of Electrical Engineering/Power Electronics
More informationSecondary Transceiver Design in the Presence of Frequency Offset between OFDM-based Primary and Secondary Systems
Secondary Transceiver Design in the Presence of Frequency Offset between OFDM-based Primary and Secondary Systems Zhikun Xu and Chenyang Yang School of Electronics and Information Engineering, Beihang
More informationInnovative Science and Technology Publications
Innovative Science and Technology Publications International Journal of Future Innovative Science and Technology, ISSN: 2454-194X Volume-4, Issue-2, May - 2018 RESOURCE ALLOCATION AND SCHEDULING IN COGNITIVE
More information7 April 8, 2015 Public Hearing
7 Aril 8, 2015 Public Hearing CITY OF VIRGINIA BEACH AMENDMENT TO ZONING ORDINANCE WIRELESS COMMUNICATION FACILITIES REQUEST: An Ordinance to Amend City Zoning Ordinance Section 111 by adding definitions
More informationLAB IX. LOW FREQUENCY CHARACTERISTICS OF JFETS
LAB X. LOW FREQUENCY CHARACTERSTCS OF JFETS 1. OBJECTVE n this lab, you will study the -V characteristics and small-signal model of Junction Field Effect Transistors (JFET).. OVERVEW n this lab, we will
More informationPROVIDING ANCILLARY SERVICES IN DISTRIBUTION NETWORKS WITH VANADIUM REDOX FLOW BATTERIES: ALPSTORE PROJECT
PROVIDING ANCILLARY SERVICES IN DISTRIBTION NETWORKS WITH VANADIM REDOX FLOW BATTERIES: ALPSTORE PROJECT Leoold HERMAN Boštjan BLAŽIČ Igor PAČ Faculty of Electrical Engineering, Faculty of Electrical Engineering,
More informationTHE HELMHOLTZ RESONATOR TREE
THE HELMHOLTZ RESONATOR TREE Rafael C. D. Paiva and Vesa Välimäki Deartment of Signal Processing and Acoustics Aalto University, School of Electrical Engineering Esoo, Finland rafael.dias.de.aiva@aalto.fi
More informationPerformance Evaluation of Energy Detector for Cognitive Radio Network
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 8, Issue 5 (Nov. - Dec. 2013), PP 46-51 Performance Evaluation of Energy Detector for Cognitive
More information2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
015 IEEE. Personal use of this material is ermitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including rerinting/reublishing this material for advertising
More informationIndirect Channel Sensing for Cognitive Amplify-and-Forward Relay Networks
Indirect Channel Sensing for Cognitive Amlify-and-Forward Relay Networs Yieng Liu and Qun Wan Abstract In cognitive radio networ the rimary channel information is beneficial. But it can not be obtained
More informationDesigning for Societal Problems The Role of People. Gabriela Avram
Designing for Societal Problems The Role of Peole Gabriela Avram Introduction to Digital Media 2017 Yesterday and today! htts://youtu.be/f91qitfi9ue But how do we go about designing these things? A. Just
More informationImpact of Inaccurate User and Base Station Positioning on Autonomous Coverage Estimation
Imact of Inaccurate User and Base Station Positioning on Autonomous Coverage Estimation Iman Akbari, Oluwakayode Onireti, Ali Imran, Muhammad Ali Imran and ahim Tafazolli Institute for Communication Systems
More informationUltra Wideband System Performance Studies in AWGN Channel with Intentional Interference
Ultra Wideband System Performance Studies in AWGN Channel with Intentional Interference Matti Hämäläinen, Raffaello Tesi, Veikko Hovinen, Niina Laine, Jari Iinatti Centre for Wireless Communications, University
More informationReputation Aware Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks
Reputation Aware Collaborative Spectrum Sensing for Mobile Cognitive Radio Networks Muhammad Faisal Amjad, Baber Aslam, Cliff C. Zou Department of Electrical Engineering and Computer Science, University
More informationElectronic Ballast with Wide Dimming Range: Matlab-Simulink Implementation of a Double Exponential Fluorescent-Lamp Model
Electronic Ballast with Wide Dimming ange: Matlab-Simulink Imlementation of a Double Exonential Fluorescent-Lam Model Marina Perdigão and E. S. Saraiva Deartamento de Engenharia Electrotécnica Instituto
More informationA Secure Transmission of Cognitive Radio Networks through Markov Chain Model
A Secure Transmission of Cognitive Radio Networks through Markov Chain Model Mrs. R. Dayana, J.S. Arjun regional area network (WRAN), which will operate on unused television channels. Assistant Professor,
More informationLab 4: The transformer
ab 4: The transformer EEC 305 July 8 05 Read this lab before your lab eriod and answer the questions marked as relaboratory. You must show your re-laboratory answers to the TA rior to starting the lab.
More informationImage Processing Based Level Crossing Detection and Foreign Objects Recognition Approach in Railways
International Journal of Alied Mathematics, Electronics and Comuters Advanced Technology and Science ISS:247-8228247-6799 www.atscience.org/ijamec Original Research Paer Image Processing Based Level Crossing
More informationParameter Controlled by Contrast Enhancement Using Color Image
Parameter Controlled by Contrast Enhancement Using Color Image Raguathi.S and Santhi.K Abstract -The arameter-controlled virtual histogram distribution (PCVHD) method is roosed in this roject to enhance
More informationAttack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks
Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University
More informationThe Optimization Model and Algorithm for Train Connection at Transfer Stations in Urban Rail Transit Network
Send Orders for Rerints to rerints@benthamscienceae 690 The Oen Cybernetics & Systemics Journal, 05, 9, 690-698 Oen Access The Otimization Model and Algorithm for Train Connection at Transfer Stations
More informationEconomics of Strategy (ECON 4550) Maymester 2015 Foundations of Game Theory
Economics of Strategy (ECON 4550) Maymester 05 Foundations of Game Theory Reading: Game Theory (ECON 4550 Courseak, Page 95) Definitions and Concets: Game Theory study of decision making settings in which
More informationAn Overview of PAPR Reduction Optimization Algorithm for MC-CDMA System
RESEARCH ARTICLE OPEN ACCESS An Overview of PAPR Reduction Otimization Algorithm for MC-CDMA System Kanchan Singla*, Rajbir Kaur**, Gagandee Kaur*** *(Deartment of Electronics and Communication, Punjabi
More informationReliability and Criticality Analysis of Communication Networks by Stochastic Computation
> EPLACE HIS LINE WIH YOU PAPE IDENIFICAION NUMBE (DOUBLE-CLICK HEE O EDI) < 1 eliability and Criticality Analysis of Communication Networks by Stochastic Comutation Peican Zhu, Jie Han, Yangming Guo and
More informationDynamic Range Enhancement Algorithms for CMOS Sensors With Non-Destructive Readout
IEEE International Worksho on Imaging Systems and Techniques IST 2008 Chania, Greece, Setember 10 12, 2008 Dynamic Range Enhancement Algorithms for CMOS Sensors With Non-Destructive Readout Anton Kachatkou,
More informationA survey on broadcast protocols in multihop cognitive radio ad hoc network
A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels
More informationOpinion Dynamics for Decentralized Decision-Making in a Robot Swarm
Oinion Dynamics for Decentralized Decision-Making in a Robot Swarm Marco A. Montes de Oca, Eliseo Ferrante, Nithin Mathews, Mauro Birattari, and Marco Dorigo IRIDIA, CoDE, Université Libre de Bruxelles,
More informationEffects of Malicious Users on the Energy Efficiency of Cognitive Radio Networks
Effects of Malicious Users on the Energy Efficiency of Cognitive Radio Networks Efe F. Orumwense 1, Thomas J. Afullo 2, Viranjay M. Srivastava 3 School of Electrical, Electronic and Computer Engineering,
More informationIEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 3, MARCH
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 3, MARCH 13 951 SHARP: Sectrum Harvesting with ARQ Retransmission and Probing in Cognitive Radio James C. F. Li, Member, IEEE, Wei Zhang, Senior Member,
More informationPerformance Analysis of MIMO System using Space Division Multiplexing Algorithms
Performance Analysis of MIMO System using Sace Division Multilexing Algorithms Dr.C.Poongodi 1, Dr D Deea, M. Renuga Devi 3 and N Sasireka 3 1, Professor, Deartment of ECE 3 Assistant Professor, Deartment
More informationSimulation and Characterization of UWB system coexistence with traditional communication Systems
Simulation and Characterization of UWB system coexistence with traditional communication Systems Guided research by Oliver Wamanga International University Bremen Under suervision of Prof. Dr. Herald Haas
More informationHydro-turbine governor control: theory, techniques and limitations
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Paers: Part A Faculty of Engineering and Information Sciences 006 Hydro-turbine governor control: theory, techniques
More informationUplink Scheduling in Wireless Networks with Successive Interference Cancellation
1 Ulink Scheduling in Wireless Networks with Successive Interference Cancellation Majid Ghaderi, Member, IEEE, and Mohsen Mollanoori, Student Member, IEEE, Abstract In this aer, we study the roblem of
More informationA METHOD FOR SEAT OCCUPANCY DETECTION FOR AUTOMOBILE SEATS WITH INTEGRATED HEATING ELEMENTS
XIX IMEKO World Congress Fundamental and Alied Metrology Setember 6 11, 2009, Lisbon, Portugal A MEHOD FO SEA OCCUPANCY DEECION FO AUOMOBILE SEAS WIH INEGAED HEAING ELEMENS Boby George, Hubert Zangl, homas
More informationA Realistic Simulation Tool for Testing Face Recognition Systems under Real-World Conditions
A Realistic Simulation Tool for Testing Face Recognition Sstems under Real-World Conditions M. Correa, J. Ruiz-del-Solar, S. Parra-Tsunekawa, R. Verschae Deartment of Electrical Engineering, Universidad
More informationTransmitter Antenna Diversity and Adaptive Signaling Using Long Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1
Transmitter Antenna Diversity and Adative Signaling Using ong Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1 Shengquan Hu, Tugay Eyceoz, Alexandra Duel-Hallen North Carolina State University
More informationThis is a repository copy of Secure D2D Communication in Large-Scale Cognitive Cellular Networks with Wireless Power Transfer.
This is a reository coy of Secure D2D Communication in Large-Scale Cognitive Cellular Networks with Wireless Power Transfer. White Rose Research Online URL for this aer: htt://erints.whiterose.ac.uk/683/
More informationRICIAN FADING DISTRIBUTION FOR 40GHZ CHANNELS
Jan 006 RICIAN FADING DISTRIBUTION FOR 40GHZ CHANNELS.0 Background and Theory Amlitude fading in a general multiath environment may follow different distributions deending recisely on the area covered
More informationSINUSOIDAL PARAMETER EXTRACTION AND COMPONENT SELECTION IN A NON STATIONARY MODEL
Proc. of the 5 th Int. Conference on Digital Audio Effects (DAFx-), Hamburg, Germany, Setember 6-8, SINUSOIDAL PARAMETER EXTRACTION AND COMPONENT SELECTION IN A NON STATIONARY MODEL Mathieu Lagrange, Sylvain
More informationFOUNTAIN codes [1], [2] have been introduced to achieve
Controlled Flooding of Fountain Codes Waqas bin Abbas, Paolo Casari, Senior Member, IEEE, Michele Zorzi, Fellow, IEEE Abstract We consider a multiho network where a source node must reliably deliver a
More informationA Comparative Study on Compensating Current Generation Algorithms for Shunt Active Filter under Non-linear Load Conditions
International Journal of Scientific and Research Publications, Volume 3, Issue 6, June 2013 1 A Comarative Study on Comensating Current Generation Algorithms for Shunt Active Filter under Non-linear Conditions
More informationA Genetic Algorithm Approach for Sensorless Speed Estimation by using Rotor Slot Harmonics
A Genetic Algorithm Aroach for Sensorless Seed Estimation by using Rotor Slot Harmonics Hayri Arabaci Abstract In this aer a sensorless seed estimation method with genetic algorithm for squirrel cage induction
More informationFrequency Structures Vibration Indentified by an Adaptative Filterging Techiques Applied on GPS L1 Signal
Positioning, 213, 4, 137-143 htt://dx.doi.org/1.4236/os.213.4213 Published Online May 213 (htt://www.scir.org/journal/os) 137 Frequency Structures Vibration Indentified by an Adatative Filterging Techiques
More informationPerformance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional Spread-Spectrum Systems
I TRANSACTIONS ON CIRCUITS AND SYTMS I: FUNDAMNTAL THORY AND APPLICATIONS, VOL. 50, NO., NOVMBR 2003 475 Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional
More informationUsable speech detection using a context dependent Gaussian mixture model classifier
From the SelectedWorks of Ananth N Iyer May, 2004 Usable seech detection using a context deendent Gaussian mixture model classifier Robert E Yantorno, Temle University Brett Y Smolenski Ananth N Iyer Jashmin
More informationCreation of Wireless Network using CRN
Creation of 802.11 Wireless Network using CRN S. Elakkiya 1, P. Aruna 2 1,2 Department of Software Engineering, Periyar Maniammai University Abstract: A network is a collection of wireless node hosts forming
More informationAccessing the Hidden Available Spectrum in Cognitive Radio Networks under GSM-based Primary Networks
Accessing the Hidden Available Spectrum in Cognitive Radio Networks under GSM-based Primary Networks Antara Hom Chowdhury, Yi Song, and Chengzong Pang Department of Electrical Engineering and Computer
More informationAvailable online at ScienceDirect. Procedia Manufacturing 11 (2017 )
Available online at www.sciencedirect.com ScienceDirect Procedia Manuacturing 11 (2017 ) 501 508 27th International Conerence on Flexible Automation and Intelligent Manuacturing, FAIM2017, 27-30 June 2017,
More information