Radial basis function networks for fast contingency ranking

Size: px
Start display at page:

Download "Radial basis function networks for fast contingency ranking"

Transcription

1 Eectrica Power and Energy Systems ) 387±395 Radia basis function networks for fast contingency ranking D. Devaraj a, *, B. Yegnanarayana b, K. Ramar a a Department of Eectrica Engineering, Indian Institute of Technoogy, Madras , India b Department of Computer Science and Engineering, Indian Institute of Technoogy, Madras , India Received 1 December 2000; revised 28 February 2001; accepted 2 Apri 2001 Abstract This paper presents an arti cia neura network-based approach for static-security assessment. The proposed approach uses radia basis function RBF) networks to predict the system severity eve foowing a given ist of contingencies. The RBF networks are trained off-ine to capture the noninear reationship between the pre-contingency ine ows and the post-contingency severity index. A method based on mutua information is proposed for seecting the input features of the networks. Mutua information has the advantage of measuring the genera reationship between the independent variabes and the dependent variabe as against the inear reationship measured by the correation-based methods. The performance of the proposed approach is demonstrated through contingency ranking in IEEE 30-bus test system. q 2002 Esevier Science Ltd. A rights reserved. Keywords: Static-security; Radia basis function network; Contingency ranking; Mutua information 1. Introduction Security assessment is one of the key issues in power system operation and panning. Assessment of static-security of a power system enabes us to detect, through simuation, any potentia ine ow vioations or an out-of-imit votage foowing a given ist of contingencies. For arge power systems, due to the time constraint invoved in reatime operation, those contingency cases which are potentiay harmfu to the system must be identi ed and detaied anaysis are carried out for these cases aone. This process of seecting the contingencies according to their severity is referred to as contingency seection. Over the years a number of agorithmic contingency seection methods have been proposed to speed up the process of contingency anaysis. They can be broady cassi ed into two categories: sensitivity-based ranking methods [1,2] and screening methods [3,4]. Ranking methods utiize an approximate system-wide scaar performance index PI) to quantify the severity of each contingency. The PI is used to rank a the contingencies. Screening methods use approximate or partia network soutions. Some of the soutions suggested incude DC oad ow, one iteration of AC oad ow, oca soution methods, etc. Sensitivity-based * Corresponding author. Te.: E-mai address: deva@neuron.iitm.ernet.in D. Devaraj). ranking methods are ef cient but vunerabe to misrankings, whie screening methods are accurate but inef cient. Recenty, arti cia neura networks ANN) have been proposed as toos for contingency screening and ranking [5±9]. Most of the authors have used feedforward neura networks with sigmoida noninearities, for mode deveopment. Any continuous function can be approximated to within an arbitrary accuracy by carefuy choosing the parameters in the network provided the network structure is suf cienty arge. But the shortcoming of this network is that it takes ong time for training. Aso, feedforward network with sigmoida activation function in the hidden nodes has no inherent abiity to detect the outiers. Even though training is done in off-ine, short training time is preferred as one may have to retrain the networks on a reguar basis as the topoogy or the system condition changes. Outiers can occur in practice, because it is hard to produce a compete training set representing a possibe operating conditions of a power system. In this paper, we propose radia basis function RBF) networks [10] to capture the noninear reationship between the pre-contingency system state and the post-contingency severity eve foowing a contingency. RBF networks take ess time for training and the distance-based activation function used in the hidden nodes gives the abiity to detect the outiers during estimation. Input feature seection pays an important roe in ANNbased approaches. Various statistica methods have been /02/$ - see front matter q 2002 Esevier Science Ltd. A rights reserved. PII: S )

2 388 D. Devaraj et a. / Eectrica Power and Energy Systems ) 387±395 contingency to ine overoad is expressed by the foowing scaar PI: proposed for feature seection in contingency seection modes. Pang et a. [11] used cass separation capabiity secure/insecure) of the variabes as the criterion to seect the input features of their statistica security cassi er. The foowing index was used to measure the intercassdistance: F i ˆ Fig. 1. Schematic representation of the earning stage. m S i s S 2 i 2 m I i 1 s I 2 i where m S i and m I i are the mean of the variabe i for the secure and insecure cass and s S i and s I i are their variances. In Refs. [5,9] aso the authors have used the same intercass-distance measure for feature seection in their ANN-based contingency seection modes. Ghosh and Chowdhury [7] used the correation coef cient between the input variabes and the output severity measure to seect the input features for their feedforward neura network mode. The intercass-distance measure assumes Gaussianity in the input domain. If a variabe x has norma or Gaussian distribution, its distribution is competey characterized by its mean and variance. If this assumption is not true, serious errors may occur in feature seection. Aso, methods based on inear dependence ike correation) cannot measure arbitrary reations between the independent and dependent variabes. In this paper, we propose mutua information [12] between the dependent and independent variabes as the criterion to seect the input features of the RBF networks. 2. Proposed methodoogy for contingency seection The proposed method for contingency seection is based on RBF neura networks. The objective is to estimate the severity eves for each contingency. The study presented in this paper focuses on singe ine outages. The severity of a 1 " # PI MVA ˆ XN S post 2m 2 ˆ1 S max where S post is the post-contingency MVA ow in ine, S max the MVA rating of ine, N the no of ines in the system and m is the integer exponent. The contingencies can then be ranked according to the order of their severity. Foowing a contingency, any ine which is overoaded wi make a contribution of greater than unity to the PI, whereas a ine whose ow is beow its rating wi make a contribution of ess than unity. A sma vaue of m in Eq. 2) woud resut in `masking effect' and a very high vaue of m may cause the na ordering to become worse due to increased noninearity [7]. For the IEEE 30-bus system considered in this paper, we have xed the vaue of m as 5. These PI vaues wi be used as target vaues for the ANN during training. It is possibe to train a singe network to estimate the PI vaues of a the contingencies by taking the system state variabes as the input and the system severity eves as the output of the network. But, as the dimension of the input vector increases, the number of basis functions hidden ayer nodes) required to approximate the given function rises exponentiay [10]. Such arge networks are inef cient and sensitive to over tting and exhibit poor performances. So, the probem of estimating the post-contingency severity eve using ANN is decomposed into severa networks, with each one deaing with one contingency. Whie training a network dedicated to a contingency, the ocaized nature of contingencies coud be expoited in the form of dimension reduction through proper feature seection. The schematic representation of the earning stage of the mode for PI estimation is shown in Fig. 1. For mode deveopment, a arge number of training data is generated through off-ine power system simuation. Pre-contingency state power ows are the input to the modes and the PI vaue foowing a contingency is the output of the mode. A mutua information-based feature seection technique is appied to identify the reevant attributes from the set of system state variabes for each contingency mode. By seecting ony the reevant variabes as input features and excuding irreevant ones, higher performance is expected with smaer computationa effort. The seected input features and the output are normaized between 0and 1 and presented to the RBF networks for training. Once the networks are trained, they are ready for contingency ranking at various oad conditions. The detais of mutua information-based feature seection and the architecture and training of RBF network are presented in the foowing sections. 3. Feature seection One of the important issues in ANN-based approach is the

3 D. Devaraj et a. / Eectrica Power and Energy Systems ) 387± proper seection of input features to the mode. The probem of feature seection is stated as foows: given an initia set of n features, nd the subset with k, n features that is `maximay informative' about the output. As most of the contingencies are ocaized in nature, a the variabes in the input vector may not exert equa in uence on the post-contingency PI vaues. Irreevant and redundant attributes in the input not ony compicate the network structure, but aso degrade the performance of the networks. By seecting ony the reevant variabes as input features and excuding irreevant ones, higher performance is expected with smaer computationa effort. This section presents the detais of input feature seection based on mutua information. known and the best we can do is to use the histogram of the data. The steps invoved in cacuating the mutua information from the histogram of the data are given beow: 1. Arrange a the PI vaues in the descending order and divide them into N y casses equay. 2. Cacuate the initia entropy using Eq. 3). 3. Sort the data points in the rst input variabe in the descending order. Divide the sorted patterns into N x groups equay. 4. Compute the conditiona entropy, given the input vector 1 using Eq. 4) and cacuate the mutua information using Eq. 5). 5. Repeat steps 3 and 4 for the remaining variabes aso De nition of mutua information Consider a stochastic system with input X and output Y. Let the discrete variabe X has N x possibe vaues and Y has N y possibe vaues. Now the initia uncertainty about Y is given by the entropy H Y) which is de ned as [13] H Y ˆ2 XN y p j og p j where p j ˆ P Y ˆ y j is the probabiity of occurrence of the event Y ˆ y j : The amount of uncertainty remaining about the system output Y after knowing the input X is given by the conditiona entropy H YuX) which is de ned as 0 1 H YuX ˆ2 XN x X N y p p ji og p ji A 4 iˆ1 where p i ˆ P X ˆ x i is the probabiity of occurrence of the event X ˆ x i and p ji is the conditiona probabiity for output y j given the input x i. Now the difference H Y) 2 H YuX) represents the uncertainty about the system output that is resoved by knowing the input. This quantity is caed the mutua information between the random variabes X and Y. Denoting it by I Y;X), we may thus write I Y; X ˆH Y 2 H YuX The mutua information is therefore the amount by which the knowedge provided by the feature vector decreases the uncertainty about the output Seecting the features with the mutua information Mutua information between two random variabes measures the amount of common information contained in these variabes. The probem of seecting input features which contain much of the information of output can be soved by computing the mutua information between each variabe and output and seecting those variabes having higher mutua information vaues. To compute mutua information the probabiity distribution function of variabes is needed which in practice is not RBF networks RBF network is a cass of singe hidden ayer feed forward neura network [10,14]. The input nodes pass the input to the hidden nodes directy and the rst ayer connections are not weighted. The transfer functions in the hidden nodes are simiar to the mutivariate Gaussian density function f j x ˆexp 2 ix 2 m ji 2! 6 2s 2 j where m j is the vector determining the center of basis function f j and s j are their widths. Each RBF unit has a signi cant activation over a speci c region determined by m j and s j ; thus each RBF represents a unique oca neighborhood in the input space. The connections in the second ayer are weighted and the output nodes are inear summation units. The vaue of the kth output node y k is given by y k x ˆXh w kj f j x 1 w k0 where w kj is the connection weight between the output and jth hidden node and w k0 is the bias term. The training in RBF networks can be decomposed quite naturay and the earning is done in three sequentia stages as against the singe optimization procedure foowed in backpropagation network training. The rst stage of the earning consists of determining the unit centers m j by the K-means custering agorithm, see Appendix A). Next, we determine the unit widths s j using a heuristic approach that ensures the smoothness and continuity of the tted function. The width of any hidden node is taken as the maximum Eucidean distance between the identi ed centers. Finay, the weights of the second ayer connections are determined by inear regression using a east-squares objective function. RBF networks can be viewed as an aternative too for earning in neura networks. Whie RBF networks exhibit 7

4 390 D. Devaraj et a. / Eectrica Power and Energy Systems ) 387±395 Fig. 2. IEEE 30-bus test system. the same properties as backpropagation networks such as generaization abiity and robustness, they aso have the additiona advantage of fast earning and abiity to detect outiers during estimation. 5. Simuation resuts To demonstrate the appicabiity of the proposed RBF network-based approach for contingency ranking, IEEE 30-bus system shown in Fig. 2 is seected as the test system. The transmission ine parameters, generator ratings and base oad condition are given in Ref. [15]. The system has six generators and 41 transmission ines. Forty singe ine outages except ines 25±26 are chosen for contingency anaysis. The various steps invoved in deveoping and evauating the system for contingency ranking and seection are presented beow Training data generation In machine earning approaches training data is the ony avaiabe information to buid the mode, and so they shoud represent the compete operating conditions of the system. For contingency anaysis mode deveopment, input±output patterns are generated as per the foowing procedure: a) First, a range of situations is generated by randomy perturbing the oad at a buses between 70and 140% of their base case vaue and by adjusting the generator output in proportion to the output in the base case condition. b) For each oad-generation pattern pre-contingency ine ows are obtained by soving the oad ow equations using Newton±Raphson agorithm. c) Aso, for each oad-generation pattern, the singe ineoutages speci ed in the contingency ist are simuated sequentiay and their PI vaues evauated by conducting AC oad ow. Based on the above simuation procedure, a training set consisting of 750input±output pairs was created. Additionay, a test set of 250data pairs was generated in order to evauate the earning and generaization abiities of the networks. In a the 1000 patterns it was noticed that the PI MVA vaues are very ow for 31 contingencies. These contingencies are not considered for mode deveopment and the modes are deveoped for the remaining nine cases aone Feature seection Pre-contingency ine ows in a the ines are chosen as the input to the networks and they are 41 in number. The PI corresponding to a contingency is the output of the network.

5 D. Devaraj et a. / Eectrica Power and Energy Systems ) 387± with wide ranges than to those with narrow ranges. To overcome this probem, input data is normaized before presenting it to the custering agorithm. The input data is normaized between 0and 1 using x n ˆ x 2 x min 8 x max 2 x min where x min and x max are the minimum and maximum of the variabe x. Simiary, output data is aso normaized between 0and Network training and evauation Fig. 3. Mutua information for variabes in mode 1±3. To seect the input features of each mode, input feature space is partitioned into ve and the output is divided into three groups. Mutua information of each variabe with respect to the output is evauated foowing the steps given in Section 3.2. For iustration, the mutua information between the input variabes and the output for contingency mode 1±3 is shown through a bar graph in Fig. 3. From this gure it is evident that ony a few variabes are having signi cant information to estimate the PI, and the remaining variabes have very ess amount of information. The rst few variabes that have high mutua information vaue are seected as features to train the networks. The features seected for satisfactoriy training the networks are given in Tabe Data normaization The rst stage of RBF network earning is the identi cation of the custer centers through K-means custering agorithm, which uses Eucidean distance as a measure of dissimiarity. Distance norms are sensitive to variations in the numerica ranges of the different features. For exampe, the Eucidean distance assigns more weighting to features For the prediction of PI for each ine outage, separate RBF network is trained. The seected variabes after normaization are presented to the network. Twenty iterations of the custering agorithm foowed by inear regression are performed to estimate the parameters of the network. As the vaue of h is not known in advance, a tria-and-error procedure is foowed to seect the optimum number of basis functions. After training, the generaization performance of the networks are evauated with the 250test data. The resuts of training and testing phase for a the nine modes are presented in Tabe 1. The resuts ceary show that the training of the RBF networks has been successfu and the correct estimation of PI has been achieved by the RBF network even for previousy unseen data. Tabe 2 presents the PI vaues estimated for one particuar oad condition with the ranking of the contingencies given in the parenthesis. For comparison, the actua vaues of PI cacuated from AC oad ow study are aso presented. The resut shows the agreement between the actua ranking and the ranking based on the output of the RBF networks Comparison with mutiayer perceptron network To compare the performance of the proposed RBF network-based approach with the commony used neura network architecture, mutiayer perceptron MLP) networks are deveoped to estimate the PI vaues. The networks are trained with the conjugate gradient agorithm [10] to reach the same error eve achieved by the RBF Tabe 1 Resuts of RBF networks S. No. Line outage Seected features S ; ˆ 1; 2; ¼; 41 No. of basis functions Training time s) Testing error mse) ,2,4, : ,2,4, : ,2,4, : ,5,8, : ,2,4,6,7, : ,5,8, : ,14,18,21,27, : ,14,18,22,23,24, : ,36,37,38,39, :

6 392 Tabe 2 PI estimation Line outage PI vaue D. Devaraj et a. / Eectrica Power and Energy Systems ) 387±395 Tabe 3 Resuts of MLP networks Line outage Hidden nodes Training time s) Testing error mse) networks during training. After training, the networks are tested with the test data. The resuts of training and testing for the MLP networks are presented in Tabe 3. Based on the information presented in Tabes 1 and 3, it is observed that RBF networks take ess time for training, but they require more number of hidden nodes as compared to MLP networks. Apart from that RBF network exhibits better generaization performance than the MLP network in most of the cases. 6. Concusions This paper has presented a neura network-based fast contingency seection method for power system staticsecurity assessment. A set of RBF networks has been trained to map the noninear reationship between the pre-contingency operating state and the post-contingency security indices. An effective feature seection method has been proposed to reduce the dimension of the input patterns. Simuation resuts on the IEEE 30-bus test system shows the proposed RBF network-based approach that provides an accurate estimation of post-contingency PI vaues for various operating conditions. When compared with MLP networks trained with backpropagation agorithm, the proposed approach signi canty reduces the deveopment time with improved estimation accuracy. Appendix A A.1. K-means custering agorithm The agorithm partition the data points x n, n ˆ 1; 2; ¼; N; into K disjoint custers C j containing N j data points, in such a way as to minimize the sum-of-squares custering function given by J ˆ XK X n[c j ix n 2 m j i 2 RBFN output Load ow resut ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) ) where m j is the mean of the data points in custer C j. A : : : : : : : : : The agorithm iterativey determines the custer centers m j as foows: 1. Initiaize the custer centers m j, j ˆ 1; 2; ¼; K by randomy seecting K data points from among a of the data points. 2. Generate a new partition by assigning each pattern to its cosest custer center. 3. Compute new custer centers as the centroids of the custers. 4. Compute the cost function according to Eq. A1). Stop if either it is beow a certain toerance vaue or its improvement over previous iteration is beow a certain threshod, otherwise go to step 2. References [1] Ejebe GC, Woenberg BF. Automatic contingency seection. IEEE Trans Power Apparatus Syst 1979;PAS-98 1):97±109. [2] Irisarri G, Sasson AM, Levner D. Automatic contingency seection for on-ine security anaysis-rea-time tests. IEEE Trans Power Apparatus Syst 1979;PAS-98 5):1552±9. [3] Brandwajn V. Ef cient bounding method for inear contingency anaysis. IEEE Trans Power Syst 1988;3 1):38±43. [4] Brandwajn V, Lauby MG. Compete bounding method for A.C. contingency screening. IEEE Trans Power Syst 1989;4 2):724±9. [5] Weerasooriya S, E-Sharkawi MA, Damborg M, Marks RJ. Towards static-security assessment of a arge-scae power system using neura networks. IEE Proc-C 1992;139 1):64±70. [6] Ray D, Chakravorti S, Mukherjee PK. An appication of arti cia neura network for power system security evauation. Inst Engr India) 1994;75:131±5. [7] Ghosh S, Chowdhury BH. Design of arti cia neura network for fast ine ow contingency ranking. Eectrica Power Energy 1996;18 5):271±7. [8] Testa A, Menniti D, Picardi C, Sorrent N. Steady state security prediction in presence of oad uncertainty. Eur Trans Eectric Power 1998;8 2):97±104. [9] Lo KL, Peng LJ, Macqueen JF, Ekwue AO, Cheng DTY. Fast rea power contingency ranking using a counterpropagation network. IEEE Trans Power Syst 1998;13:1259±64. [10] Bishop CM. Neura networks for pattern recognition. Oxford: Oxford University Press, [11] Pang CK, Prabhakara FS, E-Abiad AH. Security evauation in power systems using pattern recognition. IEEE Trans Power Apparatus Syst 1974;PAS-93 2):969±76.

7 D. Devaraj et a. / Eectrica Power and Energy Systems ) 387± [12] Battiti R. Using mutua information for seecting features in supervised neura net earning. IEEE Trans Neura Networks 1994;5 4):537±50. [13] Haykin S. Neura networks Ð a comprehensive foundation. New Jersey: Prentice Ha, [14] Yegnanarayana B. Arti cia neura networks. India: Prentice Ha, [15] Asac O, Scott B. Optima oad ow with steady state security. IEEE Trans Power Syst 1974;PAS-93:745±51.

Improving the Active Power Filter Performance with a Prediction Based Reference Generation

Improving the Active Power Filter Performance with a Prediction Based Reference Generation Improving the Active Power Fiter Performance with a Prediction Based Reference Generation M. Routimo, M. Sao and H. Tuusa Abstract In this paper a current reference generation method for a votage source

More information

DESIGN OF SHIP CONTROLLER AND SHIP MODEL BASED ON NEURAL NETWORK IDENTIFICATION STRUCTURES

DESIGN OF SHIP CONTROLLER AND SHIP MODEL BASED ON NEURAL NETWORK IDENTIFICATION STRUCTURES DESIGN OF SHIP CONROLLER AND SHIP MODEL BASED ON NEURAL NEWORK IDENIFICAION SRUCURES JASMIN VELAGIC, FACULY OF ELECRICAL ENGINEERING SARAJEVO, BOSNIA AND HERZEGOVINA, asmin.veagic@etf.unsa.ba ABSRAC his

More information

Minimizing Distribution Cost of Distributed Neural Networks in Wireless Sensor Networks

Minimizing Distribution Cost of Distributed Neural Networks in Wireless Sensor Networks 1 Minimizing Distribution Cost of Distributed Neura Networks in Wireess Sensor Networks Peng Guan and Xiaoin Li Scaabe Software Systems Laboratory, Department of Computer Science Okahoma State University,

More information

Joint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems

Joint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 0.09/ACCESS.07.70008,

More information

Utility-Proportional Fairness in Wireless Networks

Utility-Proportional Fairness in Wireless Networks IEEE rd Internationa Symposium on Persona, Indoor and Mobie Radio Communications - (PIMRC) Utiity-Proportiona Fairness in Wireess Networks G. Tychogiorgos, A. Gkeias and K. K. Leung Eectrica and Eectronic

More information

PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER FDMA SYSTEMS

PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER FDMA SYSTEMS PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER SYSTEMS Junsung Lim, Hyung G. Myung, Kyungjin Oh and David J. Goodman Dept. of Eectrica and Computer Engineering, Poytechnic University 5 Metrotech

More information

Dealing with Link Blockage in mmwave Networks: D2D Relaying or Multi-beam Reflection?

Dealing with Link Blockage in mmwave Networks: D2D Relaying or Multi-beam Reflection? Deaing with Lin Bocage in mmwave etwors: DD Reaying or Muti-beam Refection? Mingjie Feng, Shiwen Mao Dept. Eectrica & Computer Engineering Auburn University, Auburn, AL 36849-5, U.S.A. Tao Jiang Schoo

More information

SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS

SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS A. Heiß Energie-AG (EAM), Kasse G. Bazer Darmstadt University of Technoogy O. Schmitt ABB Caor Emag Schatanagen, Mannheim B. Richter

More information

An Approach to use Cooperative Car Data in Dynamic OD Matrix

An Approach to use Cooperative Car Data in Dynamic OD Matrix An Approach to use Cooperative Car Data in Dynamic OD Matrix Estimation L. Montero and J. Barceó Department of Statistics and Operations Research Universitat Poitècnica de Cataunya UPC-Barceona Tech Abstract.

More information

Performance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2

Performance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2 ISSN 319-8885 Vo.3,Issue.39 November-14, Pages:7859-7863 www.ijsetr.com Performance Comparison of Cyco-stationary Detectors with Matched Fiter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 1 PG Schoar,

More information

Model of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobile Ad Hoc Network

Model of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobile Ad Hoc Network Mode of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobie Ad Hoc Network Igor Konstantinov, Kostiantyn Poshchykov, Sergej Lazarev, and Oha Poshchykova Begorod State University, Pobeda Street 85,

More information

ADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL

ADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL ADATIV ITRATION SCHM OF TURBO COD USING HYSTRSIS CONTROL Chih-Hao WU, Kenichi ITO, Yung-Liang HUANG, Takuro SATO Received October 9, 4 Turbo code, because of its remarkabe coding performance, wi be popuar

More information

Effect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels

Effect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels Internationa Journa of Appied Engineering Research ISSN 973-456 Voume 3, Number 5 (8) pp. 77-83 Research India Pubications. http://www.ripubication.com Effect of Estimation Error on Adaptive -MRC Receiver

More information

Resource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks

Resource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks Resource Aocation via Linear Programming for Muti-Source, Muti-Reay Wireess Networs Nariman Farsad and Andrew W Ecford Dept of Computer Science and Engineering, Yor University 4700 Keee Street, Toronto,

More information

Availability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique

Availability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique Progress In Eectromagnetics Research Symposium Proceedings, Guangzhou, China, Aug. 25 28, 2014 849 Avaiabiity Anaysis for Eastic Optica Networks with Muti-path Virtua Concatenation Technique Xiaoing Wang

More information

Optimum Fault Current Limiter Placement

Optimum Fault Current Limiter Placement Optimum aut urrent Limiter acement Jen-Hao Teng han-an Lu Abstract: Due to the difficuty in power network reinforcement and the interconnection of more distributed generations, faut current eve has become

More information

NEW RISK ANALYSIS METHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE

NEW RISK ANALYSIS METHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE The 14 th Word Conference on Earthquake Engineering NEW RISK ANALYSIS ETHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE Satoru Nishikawa 1, Sei ichiro Fukushima 2 and Harumi Yashiro 3 ABSTRACT

More information

Channel Division Multiple Access Based on High UWB Channel Temporal Resolution

Channel Division Multiple Access Based on High UWB Channel Temporal Resolution Channe Division Mutipe Access Based on High UWB Channe Tempora Resoution Rau L. de Lacerda Neto, Aawatif Menouni Hayar and Mérouane Debbah Institut Eurecom B.P. 93 694 Sophia-Antipois Cedex - France Emai:

More information

Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits

Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits Secure Physica Layer Key Generation Schemes: Performance and Information Theoretic Limits Jon Waace Schoo of Engineering and Science Jacobs University Bremen, Campus Ring, 879 Bremen, Germany Phone: +9

More information

A Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access

A Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access 0 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA, VOL. 5, NO., JUNE 007 A Low Compexity VCS Method for PAPR Reduction in Muticarrier Code Division Mutipe Access Si-Si Liu, Yue iao, Qing-Song Wen,

More information

GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCLES

GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCLES VO. 10, NO. 18, OCTOBER 2015 ISSN 1819-6608 GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCES Henny Widowati 1, Suistyo Puspitodjati 2 and Djati Kerami 1 Department of System Information, Facuty

More information

Joint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition

Joint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 10.1109/TMC.2018.2861859,

More information

SCHEDULING the wireless links and controlling their

SCHEDULING the wireless links and controlling their 3738 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 7, JULY 2014 Minimum Length Scheduing With Packet Traffic Demands in Wireess Ad Hoc Networks Yacin Sadi, Member, IEEE, and Sinem Coeri Ergen,

More information

LSTM TIME AND FREQUENCY RECURRENCE FOR AUTOMATIC SPEECH RECOGNITION

LSTM TIME AND FREQUENCY RECURRENCE FOR AUTOMATIC SPEECH RECOGNITION LSTM TIME AND FREQUENCY RECURRENCE FOR AUTOMATIC SPEECH RECOGNITION Jinyu Li, Abderahman Mohamed, Geoffrey Zweig, and Yifan Gong Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 { jinyi, asamir,

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks roceedings of the 46th IEEE Conference on Decision and Contro New Oreans, LA, USA, Dec. 12-14, 27 FrB2.5 ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao,

More information

Estimation and Control of Lateral Displacement of Electric Vehicle Using WPT Information

Estimation and Control of Lateral Displacement of Electric Vehicle Using WPT Information Estimation and Contro of Latera Dispacement of Eectric Vehice Using WPT Information Pakorn Sukprasert Binh Minh Nguyen Hiroshi Fujimoto Department of Eectrica Engineering and Information Systems, The University

More information

Spatial Reuse in Dense Wireless Areas: A Cross-layer Optimization Approach via ADMM

Spatial Reuse in Dense Wireless Areas: A Cross-layer Optimization Approach via ADMM IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Spatia Reuse in Dense Wireess Areas: A Cross-ayer Optimization Approach via ADMM Haeh Tabrizi, Member, IEEE, Borja Peeato, Member, IEEE, Gonaz Farhadi, Member,

More information

THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN

THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN A CDMA SYSTEM Yan Zhang, Laurence B. Mistein, and Pau H. Siege Department of ECE, University of Caifornia, San Diego

More information

arxiv: v4 [physics.soc-ph] 31 Dec 2013

arxiv: v4 [physics.soc-ph] 31 Dec 2013 A Cascading Faiure Mode by Quantifying Interactions Junjian Qi and Shengwei Mei Department of Eectrica Engineering, Tsinghua University, Beijing, China 100084 arxiv:1301.2055v4 [physics.soc-ph] 31 Dec

More information

3-D BSS Geometric Indicator for WLAN Planning

3-D BSS Geometric Indicator for WLAN Planning 3-D BSS Geometric Indicator for WLAN Panning Aexandre Gondran, Oumaya Baaa, Aexandre Caminada and Haim Mabed University of Technoogy Befort-Montbéiard, SET Lab, 90010 Befort, France E-mai: {aexandre.gondran,

More information

Georgia Institute of Technology. simulating the performance of a 32-bit interconnect bus. referenced to non-ideal planes. A transient simulation

Georgia Institute of Technology. simulating the performance of a 32-bit interconnect bus. referenced to non-ideal planes. A transient simulation Power ntegrity/signa ntegrity Co-Simuation for Fast Design Cosure Krishna Srinivasan1, Rohan Mandrekar2, Ege Engin3 and Madhavan Swaminathan4 Georgia nstitute of Technoogy 85 5th St NW, Atanta GA 30308

More information

Wireless Communications

Wireless Communications Wireess Communications Ceuar Concept Hamid Bahrami Reference: Rappaport Chap3 Eectrica & Computer Engineering Statements of Probems Soving the probem of Spectra congestion System Capacity A system-eve

More information

A Distributed Utility Max-Min Flow Control Algorithm

A Distributed Utility Max-Min Flow Control Algorithm A Distributed tiity Max-Min Fow Contro Agorithm Hyang-Won Lee and Song Chong Department of Eectrica Engineering and Computer Science Korea Advanced Institute of Science and Technoogy (KAIST) mshw@netsys.kaist.ac.kr,

More information

AN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS

AN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS SIAM J. COMPUT. c 1998 Society for Industria and Appied Mathematics Vo. 27, No. 3, pp. 702 712, June 1998 008 AN Ω(D og(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS EYAL KUSHILEVITZ AND YISHAY MANSOUR

More information

Joint Optimal Power Allocation and Relay Selection with Spatial Diversity in Wireless Relay Networks

Joint Optimal Power Allocation and Relay Selection with Spatial Diversity in Wireless Relay Networks Proceedings of SDR'11-WInnComm-Europe, 22-24 Jun 2011 Joint Optima Power Aocation and Reay Seection with Spatia Diversity in Wireess Reay Networks Md Habibu Isam 1, Zbigniew Dziong 1, Kazem Sohraby 2,

More information

Rate-Allocation Strategies for Closed-Loop MIMO-OFDM

Rate-Allocation Strategies for Closed-Loop MIMO-OFDM Rate-Aocation Strategies for Cosed-Loop MIMO-OFDM Joon Hyun Sung and John R. Barry Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy, Atanta, Georgia 30332 0250, USA Emai: {jhsung,barry}@ece.gatech.edu

More information

COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS

COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE80.15.3A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS Ms. Jina H. She PG Student C.C.E.T, Wadhwan, Gujarat, Jina_hshet@yahoo.com Dr. K. H. Wandra Director

More information

ARTI: An Adaptive Radio Tomographic Imaging System

ARTI: An Adaptive Radio Tomographic Imaging System 1 ARTI: An Adaptive Radio Tomographic Imaging System Ossi Katiokaio, Riku Jäntti Senior Member, IEEE and Nea Patwari Member, IEEE Abstract Radio tomographic imaging systems use received signa strength

More information

Time-domain Techniques in EMI Measuring Receivers. Technical and Standardization Requirements

Time-domain Techniques in EMI Measuring Receivers. Technical and Standardization Requirements Time-domain Techniques in EMI Measuring Receivers Technica and Standardization Requirements CISPR = Huge, Sow, Compex, CISPR = Internationa Specia Committee on Radio Interference Technica committee within

More information

Sparse Beamforming Design for Network MIMO System with Per-Base-Station Backhaul Constraints

Sparse Beamforming Design for Network MIMO System with Per-Base-Station Backhaul Constraints Sparse Beamforming Design for Networ MIMO System with Per-Base-Station Bachau Constraints Binbin Dai and Wei Yu Department of Eectrica and Computer Engineering University of Toronto, Toronto, Ontario M5S

More information

OpenStax-CNX module: m Inductance. OpenStax College. Abstract

OpenStax-CNX module: m Inductance. OpenStax College. Abstract OpenStax-CNX modue: m42420 1 Inductance OpenStax Coege This work is produced by OpenStax-CNX and icensed under the Creative Commons Attribution License 3.0 Cacuate the inductance of an inductor. Cacuate

More information

Best Relay Selection Using SNR and Interference Quotient for Underlay Cognitive Networks

Best Relay Selection Using SNR and Interference Quotient for Underlay Cognitive Networks IEEE ICC 1 - Wireess Communications Symposium Best Reay Seection Using SNR and Interference Quotient for Underay Cognitive Networks Syed Imtiaz Hussain 1, Mohamed M. Abdaah 1, Mohamed-Sim Aouini 1,, Mazen

More information

Marketing tips and templates

Marketing tips and templates For financia adviser use ony. Not approved for use with customers. Marketing tips and tempates Heping you to grow your equity reease business The growing equity reease market can offer many opportunities

More information

Satellite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic

Satellite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic Sateite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic Jing Zhu and Sumit Roy Department of Eectrica Engineering, University of Washington Box 352500, Seatte, WA 98195, USA

More information

The Cognitive Coprocessor Architecture for Interactive User Interfaces

The Cognitive Coprocessor Architecture for Interactive User Interfaces The Cognitive Coprocessor Architecture for Interactive User Interfaces George G. Robertson, Stuart I

More information

Comparison of One- and Two-Way Slab Minimum Thickness Provisions in Building Codes and Standards

Comparison of One- and Two-Way Slab Minimum Thickness Provisions in Building Codes and Standards ACI STRUCTURAL JOURNAL Tite no. 107-S15 TECHNICAL PAPER Comparison of One- and Two-Way Sab Minimum Thickness Provisions in Buiding Codes and Standards by Young Hak Lee and Andrew Scanon Minimum thickness

More information

Run to Potential: Sweep Coverage in Wireless Sensor Networks

Run to Potential: Sweep Coverage in Wireless Sensor Networks Run to Potentia: Sweep Coverage in Wireess Sensor Networks Min Xi,KuiWu,Yong Qi,Jizhong Zhao, Yunhao Liu,MoLi Department of Computer Science, Xi an Jiaotong University, China Department of Computer Science,

More information

Resource Allocation via Linear Programming for Fractional Cooperation

Resource Allocation via Linear Programming for Fractional Cooperation 1 Resource Aocation via Linear Programming for Fractiona Cooperation Nariman Farsad and Andrew W Ecford Abstract In this etter, resource aocation is considered for arge muti-source, muti-reay networs empoying

More information

Fox-1E (RadFxSat-2) Telemetry and Whole Orbit Data Simulation. Burns Fisher, W2BFJ Carl Wick, N3MIM

Fox-1E (RadFxSat-2) Telemetry and Whole Orbit Data Simulation. Burns Fisher, W2BFJ Carl Wick, N3MIM Fox-1E (RadFxSat-2) Teemetry and Whoe Orbit Data Simuation Burns Fisher, W2BFJ Car Wick, N3MIM 1 Review: Fox-1 DUV Teemetry Fox-1A through Fox-1D are FM Repeater Sateites» Ony a singe downink frequency»

More information

Expert Systems with Applications

Expert Systems with Applications Expert Systems with Appications 37 (010) 340 346 Contents ists avaiabe at ScienceDirect Expert Systems with Appications journa homepage: www.esevier.com/ocate/eswa A neura network approach to target cassification

More information

A Comparative Analysis of Image Fusion Techniques for Remote Sensed Images

A Comparative Analysis of Image Fusion Techniques for Remote Sensed Images roceedings of the Word Congress on Engineering 27 Vo I WCE 27, Juy 2-4, 27, London, U.K. Comparative naysis of Image Fusion Techniques for emote Sensed Images sha Das 1 and K.evathy 2 Department of Computer

More information

Coordination Improvement of Directional Overcurrent Relays in a Microgrid Using Modified Particle Swarm Optimization Algorithm

Coordination Improvement of Directional Overcurrent Relays in a Microgrid Using Modified Particle Swarm Optimization Algorithm Internationa Journa of Eectrica Components and Energy Conversion 2018; 4(1): 21-32 http://www.sciencepubishinggroup.com/j/ijecec doi: 10.11648/j.ijecec.20180401.13 ISSN: 2469-8040 (Print); ISSN: 2469-8059

More information

Fast Factorized Backprojection Algorithm for UWB Bistatic SAR Image Reconstruction

Fast Factorized Backprojection Algorithm for UWB Bistatic SAR Image Reconstruction Fast Factorized Bacprojection Agorithm for UWB Bistatic SA Image econstruction Viet Vu Thomas Sjögren and Mats Pettersson Beinge Institute of Technoogy Karsrona Sweden. Outine Motivation Contribution Deveopment

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /GLOCOM.2003.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /GLOCOM.2003. Coon, J., Siew, J., Beach, MA., Nix, AR., Armour, SMD., & McGeehan, JP. (3). A comparison of MIMO-OFDM and MIMO-SCFDE in WLAN environments. In Goba Teecommunications Conference, 3 (Gobecom 3) (Vo. 6, pp.

More information

On the Effectiveness of Sleep Modes in Backbone Networks with Limited Configurations

On the Effectiveness of Sleep Modes in Backbone Networks with Limited Configurations On the Effectiveness of Seep Modes in Backbone Networks with Limited Configurations Luca Chiaravigio, Antonio Cianfrani 2,3 ) Eectronics and Teecommunications Department, Poitecnico di Torino, Torino,

More information

Cooperative Caching in Dynamic Shared Spectrum Networks

Cooperative Caching in Dynamic Shared Spectrum Networks Fina version appears in IEEE Trans. on Wireess Communications, 206. Cooperative Caching in Dynamic Shared Spectrum Networs Dibaar Das, Student Member, IEEE, and Ahussein A. Abouzeid, Senior Member, IEEE

More information

Performance Measures of a UWB Multiple-Access System: DS/CDMA versus TH/PPM

Performance Measures of a UWB Multiple-Access System: DS/CDMA versus TH/PPM Performance Measures of a UWB Mutipe-Access System: DS/CDMA versus TH/PPM Aravind Kaias and John A. Gubner Dept. of Eectrica Engineering University of Wisconsin-Madison Madison, WI 53706 akaias@wisc.edu,

More information

Rateless Codes for the Gaussian Multiple Access Channel

Rateless Codes for the Gaussian Multiple Access Channel Rateess Codes for the Gaussian Mutipe Access Channe Urs Niesen Emai: uniesen@mitedu Uri Erez Dept EE, Te Aviv University Te Aviv, Israe Emai: uri@engtauaci Devavrat Shah Emai: devavrat@mitedu Gregory W

More information

Fusion of Landsat 8 OLI and Sentinel-2 MSI data

Fusion of Landsat 8 OLI and Sentinel-2 MSI data 1 Fusion of Landsat 8 OLI and Sentine-2 MSI data Qunming Wang a, George Aan Backburn a, Aex O. Onojeghuo a, Jadu Dash b, Lingquan Zhou b, Yihang Zhang c,d, Peter M. Atkinson b,e,f a Lancaster Environment

More information

STUDY ON AOTF-BASED NEAR-INFRARED SPECTROSCOPY ANALYSIS SYSTEM OF FARM PRODUCE QUALITY

STUDY ON AOTF-BASED NEAR-INFRARED SPECTROSCOPY ANALYSIS SYSTEM OF FARM PRODUCE QUALITY STUDY ON AOTF-BASED NEAR-INFRARED SPECTROSCOPY ANALYSIS SYSTEM OF FARM PRODUCE QUALITY Xiaochao Zhang *, Xiaoan Hu, Yinqiao Zhang, Hui Wang, Hui Zhang 1 Institute of Mechatronics Technoogy and Appication,

More information

Energy Efficient Sensor, Relay and Base Station Placements for Coverage, Connectivity and Routing

Energy Efficient Sensor, Relay and Base Station Placements for Coverage, Connectivity and Routing Energy Efficient Sensor, Reay and Base Station Pacements for Coverage, Connectivity and Routing Mauin Pate*, R. Chandrasekaran and S.Venkatesan Teecommunication Engineering Program Erik Jonsson Schoo of

More information

Multi-stage Amplifiers Prof. Ali M. Niknejad Prof. Rikky Muller

Multi-stage Amplifiers Prof. Ali M. Niknejad Prof. Rikky Muller EECS 105 Spring 2017, Modue 4 Muti-stage Ampifiers Prof. Ai M. Niknejad Department of EECS Announcements HW10 due on Friday Lab 5 due this week 2 weeks of ecture eft! 2 Mutistage Ampifiers Why cascade

More information

Lesson Objective Identify the value of a quarter and count groups of coins that include quarters.

Lesson Objective Identify the value of a quarter and count groups of coins that include quarters. LESSON 9.9C Hands On Quarters PROFESSIONAL PROFESSIONAL DEVELOPMENT DEVELOPMENT LESSON AT A GLANCE Mathematics Forida Standard Te and write time. MAFS.MD.a.a Identify and combine vaues of money in cents

More information

Capacity of Data Collection in Arbitrary Wireless Sensor Networks

Capacity of Data Collection in Arbitrary Wireless Sensor Networks This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. 1 Capacity of Data Coection in Arbitrary Wireess

More information

DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION

DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION Undergraduate Research Opportunity Project (UROP ) DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION Student: Nguyen, Tran Thanh Binh Schoo of Eectrica & Eectronic Engineering Nayang Technoogica University

More information

13th COTA International Conference of Transportation Professionals (CICTP 2013)

13th COTA International Conference of Transportation Professionals (CICTP 2013) Avaiabe onine at www.sciencedirect.com ScienceDirect Procedia - Socia and Behaviora Scien ce s 96 ( 03 ) 383 394 3th COTA Internationa Conference of Transportation Professionas (CICTP 03) Optima design

More information

Path Delay Estimation using Power Supply Transient Signals: A Comparative Study using Fourier and Wavelet Analysis

Path Delay Estimation using Power Supply Transient Signals: A Comparative Study using Fourier and Wavelet Analysis Path Deay Estimation using Power Suppy Transient Signas: A Comparative Study using Fourier and Waveet Anaysis Abhishek Singh, Jitin Tharian and Jim Pusqueic VLSI Research Laboratory Department of Computer

More information

Generalized constrained energy minimization approach to subpixel target detection for multispectral imagery

Generalized constrained energy minimization approach to subpixel target detection for multispectral imagery Generaized constrained energy minimization approach to subpixe target detection for mutispectra imagery Chein-I Chang, MEMBER SPIE University of Maryand Batimore County Department of Computer Science and

More information

A Heuristic Method for Bus Rapid Transit Planning Based on the Maximum Trip Service

A Heuristic Method for Bus Rapid Transit Planning Based on the Maximum Trip Service 0 0 A Heuristic Method for Bus Rapid Transit Panning Based on the Maximum Trip Service Zhong Wang Associate professor, Schoo of Transportation & Logistics Daian University of Technoogy No., Linggong Road,

More information

Group Sparse Beamforming for Green Cloud-RAN

Group Sparse Beamforming for Green Cloud-RAN IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 5, MAY 2014 2809 Group Sparse Beamforming for Green Coud-RAN Yuanming Shi, Student Member, IEEE, Jun Zhang, Member, IEEE, and Khaed B. Letaief,

More information

An Exact Algorithm for Power Grid Interdiction Problem with Line Switching

An Exact Algorithm for Power Grid Interdiction Problem with Line Switching 1 An Exact Agorithm for Power Grid Interdiction Probem with Line Switching Long Zhao, Student Member, IEEE, and Bo Zeng, Member, IEEE, Abstract Power grid vunerabiity anaysis is often performed through

More information

Understanding The HA2500 Horizontal Output Load Test

Understanding The HA2500 Horizontal Output Load Test Understanding The HA2500 Horizonta Output Load Test Horizonta output stages are part of every CRT video dispay incuding cosed circuit monitors, computer monitors, video games, medica monitors, TVs. HDTVs,

More information

Blind Multiuser Detection in Asynchronous DS-CDMA Systems over Nakagami-m Fading Channels

Blind Multiuser Detection in Asynchronous DS-CDMA Systems over Nakagami-m Fading Channels Bind Mutiuser Detection in Asynchronous DS-CDMA Systems over akagami-m Fading Channes Vinay Kumar Pamua JU Kakinada, Andhra Pradesh, India 533 003 pamuavk@yahoo.com ABSRAC his paper presents a technique

More information

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach Distributed Resource Aocation for Reay-Aided Device-to-Device Communication Under Channe Uncertainties: A Stabe Matching Approach Monowar Hasan, Student Member, IEEE, and Ekram Hossain, Feow, IEEE Abstract

More information

Implementation of the Neumann Formula for Calculating the Mutual Inductance between Planar PCB Inductors Sonntag, C.L.W.; Lomonova, E.; Duarte, J.L.

Implementation of the Neumann Formula for Calculating the Mutual Inductance between Planar PCB Inductors Sonntag, C.L.W.; Lomonova, E.; Duarte, J.L. Impementation of the Neumann Formua for Cacuating the Mutua Inductance between Panar PCB Inductors Sonntag, C.L.W.; Lomonova, E.; Duarte, J.L. Pubished in: Proc. The 18th Internationa Conference on Eectrica

More information

Short Notes Lg Q in the Eastern Tibetan Plateau

Short Notes Lg Q in the Eastern Tibetan Plateau Buetin of the Seismoogica Society of America, Vo. 92, No. 2, pp. 87 876, March 2002 Short Notes Q in the Eastern Tibetan Pateau by Jiakang Xie Abstract spectra are coected from the 99 992 Tibetan Pateau

More information

Fuzzy Model Predictive Control Applied to Piecewise Linear Systems

Fuzzy Model Predictive Control Applied to Piecewise Linear Systems 10th Internationa Symposium on Process Systems Engineering - PSE2009 Rita Maria de Brito Aves, Caudio Augusto Oer do Nascimento and Evaristo Chabaud Biscaia Jr. (Editors) 2009 Esevier B.V. A rights reserved.

More information

: taking service robots to play soccer

: taking service robots to play soccer Virbot@fied : taking service robots to pay soccer Larena Adaberto, Escaante Boris, Torres Luis, Abad Verónica, Vázquez Lauro Bio-Robotics Laboratory, Department of Eectrica Engineering Universidad Naciona

More information

Coverage and Rate Analysis for Millimeter Wave Cellular Networks

Coverage and Rate Analysis for Millimeter Wave Cellular Networks Coverage and Rate Anaysis for Miimeter Wave Ceuar Networks Tianyang Bai and Robert W. Heath, Jr. arxiv:42.643v3 cs.it 8 Oct 24 Abstract Miimeter wave mmwave) hods promise as a carrier frequency for fifth

More information

RESEARCH OF UHV CIRCUIT BREAKER TRANSIENT RECOVERY VOLTAGE CHARACTERISTIC

RESEARCH OF UHV CIRCUIT BREAKER TRANSIENT RECOVERY VOLTAGE CHARACTERISTIC .P.B. Sci. Bu., Series C, Vo. 79, Iss. 3, 217 ISSN 2286-354 RESEARCH OF HV CIRCIT BREAKER TRANSIENT RECOVERY VOLTAGE CHARACTERISTIC Baina HE 1, Yunwei HAO 2 The most critica transient a circuit breaker

More information

Pulsed RF Signals & Frequency Hoppers Using Real Time Spectrum Analysis

Pulsed RF Signals & Frequency Hoppers Using Real Time Spectrum Analysis Pused RF Signas & Frequency Hoppers Using Rea Time Spectrum Anaysis 1 James Berry Rohde & Schwarz Pused Rea Time and Anaysis Frequency Seminar Hopper Agenda Pused Signas & Frequency Hoppers Characteristics

More information

BACKPROPAGATION GENERALIZED DELTA RULE FOR THE SELECTIVE ATTENTION SIGMA IF ARTIFICIAL NEURAL NETWORK

BACKPROPAGATION GENERALIZED DELTA RULE FOR THE SELECTIVE ATTENTION SIGMA IF ARTIFICIAL NEURAL NETWORK Int. J. App. Math. Comput. Sci., 12, Vo. 22, No. 2, 449 459 DOI: 10.2478/v06-012-0034-5 BACPROPAGATION GENERALIZED DELTA RULE FOR THE SELECTIVE ATTENTION SIGMA IF ARTIFICIAL NEURAL NETWOR MACIEJ HU Institute

More information

CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS

CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS Susan Joshy and A.V. Babu, Department of Eectronics & Communication Engineering, Nationa Institute

More information

Australian Journal of Basic and Applied Sciences

Australian Journal of Basic and Applied Sciences AENSI Journas Austraian Journa of Basic and Appied Sciences ISSN:1991-8178 Journa home page: www.ajbasweb.com Improvement of Faut Identification and Locaization Using Gustafson-Kesse Agorithm In Adaptive

More information

Network Control by Bayesian Broadcast

Network Control by Bayesian Broadcast IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. IT-33, NO. 3, MAY 1987 323 Network Contro by Bayesian Broadcast RONALD L. RIVEST Abstract-A transmission contro strategy is described for sotted- ALOHA-type

More information

Adaptive Bit and Power Allocation for Rate and Margin Maximization in V-BLAST System

Adaptive Bit and Power Allocation for Rate and Margin Maximization in V-BLAST System Revista Científica Periódica - Teecomunicações ISSN 56-338 Adaptive Bit and Power Aocation for Rate and argin aximization in V-BAST System Dror eiri and Irving Kaet Aeis Photonics, Netanya, Israe (emai:

More information

Non-Preemptive Interrupt Scheduling for Safe Reuse of Legacy Drivers in Real-Time Systems

Non-Preemptive Interrupt Scheduling for Safe Reuse of Legacy Drivers in Real-Time Systems Non-Preemptive Interrupt Scheduing for Safe Reuse of Legacy Drivers in Rea-Time Systems Tuio Facchinetti, Giorgio Buttazzo, Mauro Marinoni, and Giacomo Guidi University of Pavia, Itay {tuio.facchinetti,giorgio.buttazzo,

More information

Distribution of Path Durations in Mobile Ad-Hoc Networks and Path Selection

Distribution of Path Durations in Mobile Ad-Hoc Networks and Path Selection Distribution of ath Durations in Mobie Ad-Hoc Networks and ath Seection Richard J. La and Yijie Han Abstract We investigate the issue of path seection in mutihop wireess networks with the goa of identifying

More information

Automation of the Solution of Kakuro Puzzles

Automation of the Solution of Kakuro Puzzles Automation of the Soution of Kakuro Puzzes R. P. Davies, P. A. Roach, S. Perkins Department of Computing and Mathematica Sciences, University of Gamorgan, Pontypridd, CF37 1DL, United Kingdom, rpdavies@gam.ac.uk

More information

A Game-theoretic Approach to Power Management in MIMO-OFDM. Ad Hoc Networks. A Dissertation. Submitted to the Faculty. Drexel University.

A Game-theoretic Approach to Power Management in MIMO-OFDM. Ad Hoc Networks. A Dissertation. Submitted to the Faculty. Drexel University. A Game-theoretic Approach to Power Management in MIMO-OFDM Ad Hoc Networks A Dissertation Submitted to the Facuty of Drexe University by Chao Liang in partia fufiment of the requirements for the degree

More information

Iterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels

Iterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels Journa of Communications Vo. 0 No. February 0 Iterative Transceiver Design for Opportunistic Interference Aignment in MIMO Interfering Mutipe-Access Channes Weipeng Jiang ai Niu and Zhiqiang e Schoo of

More information

CAN FD system design

CAN FD system design icc 215 CAN FD system design Dr. - Ing. M. Schreiner Daimer Research and Deveopment Abstract The objective of this paper is to give genera design rues for the physica ayer of CAN FD networks. As an introduction

More information

Information Theoretic Radar Waveform Design for Multiple Targets

Information Theoretic Radar Waveform Design for Multiple Targets 1 Information Theoretic Radar Waveform Design for Mutipe Targets Amir Leshem and Arye Nehorai Abstract In this paper we use information theoretic approach to design radar waveforms suitabe for simutaneousy

More information

A Novel Method for Doppler and DOD- DOA Jointly Estimation Based on FRFT in Bistatic MIMO Radar System

A Novel Method for Doppler and DOD- DOA Jointly Estimation Based on FRFT in Bistatic MIMO Radar System 7 Asia-Pacific Engineering and Technoogy Conference (APETC 7) ISBN: 978--6595-443- A Nove Method for Dopper and DOD- DOA Jointy Estimation Based on FRFT in Bistatic MIMO Radar System Derui Song, Li Li,

More information

An Efficient Adaptive Filtering for CFA Demosaicking

An Efficient Adaptive Filtering for CFA Demosaicking Dev.. Newin et. a. / (IJCSE) Internationa Journa on Computer Science and Engineering An Efficient Adaptive Fitering for CFA Demosaicking Dev.. Newin*, Ewin Chandra Monie** * Vice Principa & Head Dept.

More information

Development of a LabVIEW-based test facility for standalone PV systems

Development of a LabVIEW-based test facility for standalone PV systems Deveopment of a LabVIEW-based test faciity for standaone PV systems Aex See Kok Bin, Shen Weixiang, Ong Kok Seng, Saravanan Ramanathan and Low I-Wern Monash University Maaysia, Schoo of Engineering No.2,

More information

arxiv: v1 [cs.it] 22 Aug 2007

arxiv: v1 [cs.it] 22 Aug 2007 Voice Service Support in Mobie Ad Hoc Networks Hai Jiang, Ping Wang, H. Vincent Poor, and Weihua Zhuang Dept. of Eec. & Comp. Eng., University of Aberta, Canada, hai.jiang@ece.uaberta.ca Dept. of Eec.

More information

Large Scale Real-time Ridesharing with Service Guarantee on Road Networks

Large Scale Real-time Ridesharing with Service Guarantee on Road Networks Large Scae Rea-time Ridesharing with Service Guarantee on Road Networks ABSTRACT Yan Huang University of North Texas huangyan@unt.edu Ruoming Jin Computer Science Kent State University jin@cs.kent.edu

More information

Analysis, Analysis Practices, and Implications for Modeling and Simulation

Analysis, Analysis Practices, and Implications for Modeling and Simulation , Practices, and Impications for Modeing and imuation Amy Henninger The Probem The act of identifying, enumerating, evauating, and mapping known technoogies to inferred program requirements is an important

More information

Implementation of PV and PIV Control for Position Control of Servo Motor

Implementation of PV and PIV Control for Position Control of Servo Motor IJSRD - Internationa Journa for Scientific Research & Deveopment Vo. 5, Issue 1, 2017 ISSN (onine): 2321-0613 Impementation of PV and PIV Contro for Position Contro of Servo Motor J.Priya 1 R.Rambrintha

More information