Using Bayesian Game Model for Intrusion Detection in Wireless Ad Hoc Networks
|
|
- Russell West
- 6 years ago
- Views:
Transcription
1 Int J Communcatons, Network an ystem cences, 21, 3, o:14236/jcns21378 Publshe Onlne July 21 ( Usng Bayesan Game Moel for Intruson Detecton n Wreless A Hoc Networks Abstract Hua We, Hao un Department of Apple Mathematcs, Northwestern Polytechncal Unversty, X'an, Chna E-mal: wh86127@163com, hsun@nwpueucn Receve Aprl 12, 21; revse May 15, 21; accepte June 22, 21 Wreless a hoc network s becomng a new research fronter, n whch securty s an mportant ssue Usually some noes act malcously an they are able to o fferent kns of Denal of ervce (Dos) Because of the lmte resource, ntruson etecton system (ID) runs all the tme to etect ntruson of the attacker whch s a costly overhea We use game theory to moel the nteractons between the ntruson etecton system an the attacker, an a realstc moel s gven by usng Bayesan game We solve the game by fnng the Bayesan Nash equlbrum The results of our analyss show that the ID coul work ntermttently wthout compromsng ts effectveness At the en of ths paper, we prove an experment to verfy the ratonalty an effectveness of the propose moel Keywors: Wreless A Hoc Networks, Game Theory, Intruson Detecton ystem, Bayesan Nash Equlbrum 1 Introucton A wreless a hoc network (WANET) s a collecton of moble noes n whch the noes communcate wth each other wthout the help of any fxe nfrastructure [1] Noes wthn each other's rao range communcate rectly va wreless lnks, whle those that are far apart use other noes as relays Because of the lmte resource, some noes may act selfshness A hoc network msbehavor maybe nflcte by malcous noes, each of whch ams at harmng the network operaton; consequently, mechansms that enforce securty present a partcular challenge In orer to avo the harm of malcous noes, one way s the use of an ntruson etecton system, whch watches out for any ntruson an sets out an alarm when an ntruson s etecte The ntruson etecton an response mechansm s escrbe n [2] In recent years, we have seen researchers usng game theory n the area of a hoc networks It s a powerful tool n that t can be use to moel any system whch exhbts the characterstcs of a game In WANET, moble noes typcally have selfsh motvatons, lack of cooperaton among themselves, an have conflctng nterests wth each other These characterstcs make game theory (GT) a promsng tool to moel, analyze, an esgn varous aspects of WANET We have gven a two-player game to moel the nteractons between an ntruson etecton system an an attacker n wreless a hoc network Each efener s equppe wth an ntruson etecton system (ID) n orer to montor the actveness of an attacker The rest of the paper s organze as follows ecton 2 scusses relate work ecton 3 escrbes the one-stage game an mult-stage game, an Bayesan Nash equlbrum solutons are nvestgate ecton 4 presents numercal examples to verfy the effectveness of the propose game The concluson of the paper s n secton 5 2 Relate Work Game theory has been successfully apple to many scplnes nclung economcs, poltcal scence, an computer scence Game theory usually consers a multplayer ecson problem where multple players wth fferent objectves can compete an nteract wth each other In the context of ntruson etecton, several game theoretc approaches have been propose to wre networks, sensor networks, an a hoc networks Yenumula B Rey [3] scuss currently avalable ntruson etecton technques, attack moels usng game theory, an then propose a new framework to etect malcous noes n wreless sensor networks usng zero sum game approach for noes n the forwar ata path The frst part of the research proves the game moel wth probablty of energy requre for transferrng the ata packets The secon part erves the moel to etect the malcous noes usng probablty of acknowlegement at source Yuhan Moon, Volet R yrotuk [4] present CCM-MAC, a cooperatve CDMA-base mult-channel Copyrght 21 cres IJCN
2 H WEI ET AL 63 meum access control (MAC) protocol for moble a hoc networks (MANET) n whch each noe has one half- uplex transcever They prove an analyss of the maxmum throughput of CCM-MAC an valate t through smulaton n MATLAB, an also compare the throughput t acheves to IEEE 8211, a mult-channel MAC protocol, an a CDMA-base MAC protocol In [4] Ha Otrok et al aress the problem of ncreasng the effectveness of an ntruson etecton system (ID) for a cluster of noes n a hoc networks, an formulate a zero-sum non-cooperatve game between the leaer an ntruer They solve the game by fnng the Bayesan Nash equlbrum where the leaer s optmal etecton strategy s etermne Fnally, emprcal results are prove to support ther solutons Yu Lu, Crstna Comancu an Hong Man [5] have use statc Bayesan game an ynamc Bayesan game to moel the nteractons between attacker an efener n a hoc networks They have shown that the statc game leas to a mxe-strategy Bayesan nash equlbrum when the efener s belef of the attacker beng malcous s hgh, an the ynamc game has a mxestrategy Perfect bayesan equlbrum In [6], they have use game theory for evelopng effcent efense strateges for a network wth multple IDs They have formulate a non-zero-sum, noncooperatve attacker/efener game where the payoffs of players are non-strctly compettve They have showe that the game acheves at least a Nash equlbrum that leas to a efense strategy for the efener A two-player, non-cooperatve, non-zero-sum game has also been stue by Agah et al [7] an Alpan an Basar [8] to aress attack-efense problems n sensor networks In ther moels, each player s optmal strategy epens only on the payoff functon of the opponent an the game s assume to have complete nformaton [9-11] have gven the smlar moel, but the game s assume to have ncomplete nformaton Our moel s smlar to the ones mentone n the aforementone works n that t s a two-player, nonzero-sum an noncooperatve game However, our work s not ame at gvng the best strategy of the efener In ths paper, we have gven a one-stage game an mult-stage game In the propose works, the ID of efener runs all the tme, whch s a costly overhea for a battery-powere moble evce snce noes have lmte resource The results of our moel show that the ID coul work ntermttently 3 Bayesan Game 31 Game Moel In ths secton we present our game moel An ID attempts to etect ntruson from an attacker Hence, we may look at ths as a game between two players, the ID an the attacker The attacker s enote by an ID s enote by j The player s ntent s to attack the network wthout gettng caught, whereas that of the player j s to etect ntruson when the attacker attacks There s no cooperaton whatsoever between the two players Player has two types, regular that s enote by an malcous s enote by 1 Noe s type s hs prvate nformaton an ID s uncertan about ts opponent s type ID has only one type, that s regular or j an t s common knowlege for both players To present our moel, we make the followng assumptons An ID nees not be runnng all the tme urng whch the wreless a hoc network s up The pure strategy space of ths player s enote by = (Montor t of The frst strategy of player j epcts the stuaton when the ID s actve for some percentage (enote by t ) For example, f the ID etects by montorng the traffc, the ID perocally montors the traffc an the rest of the tme, t sts le Lkewse, an attacker nee not be tryng to attack the tme, Not montor), t, 1 1% of the tme The malcous type of player has two pure strateges: Attack s of the tme an Not attack, s, 1 The regular type of player has one pure strategy: Not attack The two players choose ther strateges smultaneously at the begnnng of the game, assumng common knowlege about the game (costs an belefs) We frst conser the scenaro of the ID Tables 1-2 llustrate the payoff matrx of the game n strategc form In the matrx, a represents the etecton rate of the ID, b represents the false alarm rate of the ID, an ab,,1 In the Table 1(a), the payoff matrx for the Table 1 The type of player (a) Payoff matrx of ID j s malcous \ j (2a1) tsm(1 t) sl tc sl btn tc (b) Payoff matrx of attacker \ j (1 2 atsm ) (1 tsl ) sca sl sca Table 2 The type of player s regular \ j (, btn tc ) (, ) Copyrght 21 cres IJCN
3 64 H WEI ET AL player j when player s malcous s gven m enotes the overall gan of the player for etectng the attack, an l s the overall loss for not etectng the attack urng the whole lfetme Costs of attackng an montorng are enote by an urng the whole pero In our moel, we assume that m l an l c a, c s reasonable snce otherwse the player oes not have ncentve to attack an the player j oes not have ncentve to montor The player j montors t of the tme, the player attacks s of the tme The probablty of the player j montorng when the attack s on s ts, urng whch the player j gets a gan of tsm mlarly, the probablty of the player j not montorng when the attack occurs s because of whch the player j loses an amount of (1 tsl ) tc s the cost ncurre ue to montorng The expecte payoff of etectng the attack epens on the value of a, whch s (2a1) tsm(1 t) sltc When the player j s not actve an there s an attack, so the payoff of the player j s sl The entry at poston (row 2, column 1) s c a c (1 t) s btn tc n s the overall loss ncurre by the player j for the false etecton The rest of the entry of the matrx s zero as the player plays Not attack The payoff matrx for the player when the player s malcous s efne as shown n Table 1(b) In contrast, the gan of player s the loss of player j, whch s (1 2a)tsm + (1 t)sl The entry at (row 1 column 2) s the same as n prevous scenaro For the other entres, when the player plays (Not attack), hs payoff s always The payoff matrx for the player when t s regular s gven n Table 2 The player has only one strategy when t s regular The payoff of player s always If player eces not to montor, hs payoff s ; f he eces to play j, he has the montorng cost tc an an expecte loss btn ue to the false alarm, so hs payoff s btn tc 32 One-tage Game The ntent of both players s to maxmze ther own payoff Ths mples that we assume that both players are ratonal uppose player j assgns a pror probablty to player s malcous In the followng, we use Bayesan Nash equlbrum (BNE) to analyze the game moel, base on the assumpton that s a common pror If player plays hs pure strategy par (Attack s of the tme f malcous, Not attack f regular), then the expecte payoff of player j s Ej ( j) ( atsm(1 a) tsm(1 t) sl tc) (1 )( btn tc ) E ( ( 2)) sl j j bn c o f, Ej( j) Ej( j), 2asm sm sl bn then the best strategy of player j s to play Montor t of the tme However, f player j plays ths strategy, Attack s of the tme wll not be the best strategy f player s malcous, an he wll transfer to play Not attack nstea Hence, ((Attack s of the tme f malcous, Not attack f regular), Montor t of the tme, ) s not a bn c BNE If, ((Attack s of the tme 2asm sm sl bn f malcous, Not attack f regular), Not montor, ) s a BNE mlarly, ((Not attack s of the tme f malcous, Not attack f regular), Not montor, ) s not a BNE THEOREM 1: In the escrbe game-theoretc moel, there s no pure-strategy BNE when satsfes the nequalty bn c 2asm sm sl bn We prevously showe that no pure-strategy BNE exsts for the game when bn c But 2asm sm sl bn there s a mxe-strategy BNE Let p be the probablty wth whch the player plays ts frst strategy Hence, (1 p) s the probablty wth whch t plays the secon strategy mlarly, let q be the probablty wth whch the player j plays ts frst strategy Hence, (1 q) s the probablty wth whch t plays the secon strategy Then the expecte payoff of player j s E j ( j) p ( atsm (1 a) tsm (1 t) sl tc) (1 p) ( btn tc) (1 )( btn tc) Ej( j( 2)) psl From Ej( j) E j ( j ), we get that the malcous type of player s equlbrum strategy s to play frst strategy wth probablty * bn c p (2asm ) sm sl bn an the expecte payoff of player s E( ) q( atsm (1 a) tsm (1 t) sl tca) (1 q)( slsc a ) E( ) Copyrght 21 cres IJCN
4 H WEI ET AL 65 From E( ) E( ), we get that the equlbrum strategy of player j s to play frst strategy wth probablty * l c q a 2atm tm tl THEOREM 2: In the escrbe game-theoretc moel, the strategy par ((Attack s of the tme wth probablty * p f malcous, Not attack f regular), Montor t of * the tme wth probablty q, ) s a mxe-strategy BNE The above escrbe game s a statc game, for whch the players maxmze ther utltes base on the payoff matrx for the game Due to the ffculty of assgnng accurate pror probabltes for player s type, we exten the statc to ynamc game, where the player j can upate hs belefs accorng to the Bayes rule 33 Mult-tage Game The aforesa one-stage game s statc Bayesan game, for whch the player j maxmzes hs payoff base on a fxe pror about the malcousness of hs opponent The lfetme of the network coul be broken own nto ntervals of the tme an our game coul be use as a repeate game over these ntervals o, we exten the one-stage game to mult-stage game We assume that the one-stage game s repeately playe n each tme pero t k, where k =, 1, An nterval of T secons maybe selecte for each stage game In orer to get a smple moel, we assume that T = 1 The payoffs of the players n each stage game are the same as n the proceeng one-stage game, an we assume that there s no scount factor wth respect to the payoffs of the players The extensve form of each stage game can be represente n a smlar manner as for the statc one-stage game In our moel, the player j 's type s known to all the player whle the player 's type s selecte from the type set ={malcous, regular} Knowng that the player 's type s a prvate nformaton Bayesan equlbrum [12] ctates that the player 's acton epens on hs type By observng the behavor of the player, the player j can calculate the posteror belef evaluaton functon ( ( )) t k 1 a t k usng the followng Bayes' rule t ( ( )) ( ( ) ) k a tk P a tk t ( ( )) k a t k t ( ( )) ( ( ) k a tk P a t k ) tk k where ( a ( t )) an Pa ( ( t) ) s the probablty that strategy a ( t ) k k s observe at ths stage of the game gven the type of the player From the assumpton of escrbe game, we know that P( a ( t ) Attack 1) ap b( 1 p) k P( a( tk) Not Attack 1) (1 a) p (1 b)(1 p ) Pa ( ( t) Attack ) a k P( a( tk) Not Attack ) 1 b LEMMA 1: the mult-stage game satsfes the four Bayesan contons -(4) 1) Posteror belefs are nepenent, an all types of player j have the same belefs, an even unexpecte events wll not change the nepenence assumpton for the type of the opponents 2) Bayes rule s use to upate belefs from t ( ( ) k a tk ) to t ( ( 1 1) k a t k ) whenever possble 3) The players o not sgnal what they o not know 4) All players must have the same belef about the type of another player Proof: conton s trvally satsfe because player j has only one type We can see that the multstage game satsfes from Equaton In our multstage game context, player 's sgnal s part of attack actons, thus (3) s satsfe Because there are only two players n the game at any stage, the conton (4) s satsfe THEOREM 3: The mult-stage game has a perfect Bayesan equlbrum (PBE) At stage game t k, uo to the upate belef (), the probablty p s also upate contnuously From the prevous analyss of secton 32, the malcous type of player 's equlbrum strategy s to play hs frst strategy wth probablty bn c p ()(2 asm sm sl bn) the equlbrum strategy of player j s to play hs frst strategy wth probablty l c q a (3) 2atm tm tl o the PBE of the game s gven as ( p, q, ()), wth ( p, q, ()) gven by Equatons -(3) 4 Example For each experment, we assume that m l 1, n 1 Fgures 1 an 2 assume s 85, t 85, c 5, Fgure 3 assumes t 85, c 5, a 9, b 2, an Fgure 4 assumes s 9, t 9, a 95, b 14 Fgure 5 assumes s 9, t 5, Copyrght 21 cres IJCN
5 66 H WEI ET AL a 95, b 2, c 5 For all four scenaros player j 's pror probablty 5 From Fgure 1, we see that the hgher a s, the faster posteror belef converges to 1 By contrast, Fgure 2 shows that the lower b s, the faster posteror belef converges to 1 In other wors, the etecton accuracy of the ID affects the convergence spee of player j 's posteror belef From Fgure 3, we see that the lower tme of attackng, the faster posteror belef converges to 1 From Fgure 4, we see that the hgher c, the faster the convergence spee of player j 's posteror belef wll be Fgure 5 shows the posteror belef of the player j for these two scenaros The belef for the frst scenaro Fgure 3 Convergence of player j s posteror belefs gven the observatons of a sequence of a sequence of consecutve Attack actons uner varous s Fgure 1 Convergence of player j s posteror belefs gven the observatons of a sequence of a sequence of consecutve Attack actons uner varous a Fgure 4 Convergence of player j s posteror belefs gven the observatons of a sequence of a sequence of consecutve Attack actons uner varous c converges to 1 faster than the secon scenaro Ths s because n the frst scenaro the player starts to attack earler compare to the secon scenaro Once the belef reaches 1, t oes not go own even f the player s not attackng snce the type has alreay been entfe 5 Conclusons Fgure 2 Convergence of player j s posteror belefs gven the observatons of a sequence of a sequence of consecutve Attack actons uner varous b In ths paper, our goal s to etermne whether t s essental to always keep the ID runnng wthout compromsng on ts effectveness Frst of all, we assume that the ID works ntermttently Then, we moel the nteracton between ntruson etecton system an an attacker as a one-stage game, an show that ths game has two Bayes an Nash equlbrums econ, we moel ths game as a mult-stage game, where ID oes not have fxe pror Copyrght 21 cres IJCN
6 H WEI ET AL 67 Fgure 5 Posteror belef probabltes about the type of ts opponent an can upate ts belef at the en of each stage of the game, an show that ths game has a mxe-strategy perfect Bayesan equlbrum The results of the propose two games show that ID coul work ntermttently whle gettng the same effectveness 6 Acknowlegements The paper s supporte by the Natonal Natural cence Founaton of Chna uner Grant Nos an References [1] R Ramanathan an J Re, A Bref Overvew of A Hoc Networks: Challenges an Drectons, IEEE Communcatons Magzne, Vol 4, No 5, 22, pp 2-22 [2] Y G Zhang an W Lee, Intruson Detecton n Wreless A-Hoc Networks, Proceengs of the 6 th Annual Internatonal Conference on Moble Computng an Networkng, Boston, 2, pp [3] Y B Rey, A Game Theory Approach to Detecton Mmalcous Noes n Wreless ensor Networks, Proceengs of the 29 Thr Internatonal Conference on ensor Technologes an Applcatons, Athens, June 18-23, 29, pp [4] H Otrok, N Mohamme, L Y Wang, M Debbab an P Bhattacharya, A Game-Theoretcal Intruson Detecton Moel for Moble A Hoc Networks, Computer Communcatons, Vol 31, No 4, 28, pp [5] Y Lu, C Comancu an H Man, A Bayesan Game Approach for Intruson Deteton n Wreless A Hoc Networks, Proceengs from the 26 Workshop on Game Theory for Communcatons an Networks, Psa, Italy, October 14, 26, pp 1-12 [6] Y Lu, H Man an C Comancu, A Game Theoretc Approach to Effcent Mxe trateges for Intruson Detecton, IEEE Internatonal Conference on Communcatons, Istanbul, 26, pp [7] A Agah, K Das, K Basu an M Asa, Intruson Detecton n ensor Networks: A Non-Cooperatve Game Approach, Proceengs of the Thr IEEE Internatonal ymposum on Network Computng an Applcatons, Boston, August-eptember 24, pp [8] T Alpcan an T Basar, A Game Theoretc Approach to Decson an Analyss n Network Intruson Detecton, Proceengs of the 42n IEEE Conference on Decson an Control, Mau, Hawa, December 23, pp [9] N Marchang an R Trpath, A Game Theoretcal Approach for Effcent Deployment of Intruson Detecton ystem n Moble A Hoc Networks, Proceengs of the 15th Internatonal Conference on Avance Computng an Communcatons, Guwahat, 27, pp [1] T Poongotha an K Jayara, A Noncooperatve Game Approach for Intruson Detecton n Moble A Hoc Networks, Proceengs of the 28 Internatonal Conference on Computng Communcaton an Networkng, t Thomas, VI, December 18-2, 28, pp 1-4 [11] A Patcha an J-M Park, A Game Theoretc Approach to Moelng Intruson Detecton n Moble A Hoc Networks, Proceengs of the 24 IEEE Workshop on Informaton Assurance an ecurty, Unte tates Mltary Acaemy, West Pont, NY, June 1-11, 24, pp 3-34 [12] M Wllem, Mnmax Theorem, Brkhauser, Boston, 1996 Copyrght 21 cres IJCN
2005 Journal of Software. . Ad hoc ), ) A Delay Oriented Adaptive Routing Protocol for Mobile Ad hoc Networks
-985/5/6(9)66 5 Journal of Software Vol6, No9 A hoc,,,+,,,, (, 37) ( ), 37) A Delay Orente Aaptve Routng Protocol for Moble A hoc Networks XIE Fe,, ZHANG Xn-Mng,+, GUO Ja-Feng,, CHEN Guo-Lang, (Department
More informationAn Improved Weighted Centroid Localization Algorithm
Internatonal Journal of Future Generaton Communcaton an Networng Vol.6, No.5 (203), pp.45-52 http://x.o.org/0.4257/fgcn.203.6.5.05 An Improve Weghte Centro Localzaton Algorthm L Bn, Dou Zheng*, Nng Yu
More informationTile Values of Information in Some Nonzero Sum Games
lnt. ournal of Game Theory, Vot. 6, ssue 4, page 221-229. Physca- Verlag, Venna. Tle Values of Informaton n Some Nonzero Sum Games By P. Levne, Pars I ), and ZP, Ponssard, Pars 2 ) Abstract: The paper
More informationNetworked Estimation for Event-Based Sampling Systems with Packet Dropouts
Sensors 009, 9, 3078-3089; o:10.3390/s90403078 OPEN ACCESS sensors ISSN 144-80 www.mp.com/journal/sensors Artcle Networke Estmaton for Event-Base Samplng Sstems wth Packet Dropouts Vnh Hao Nguen an Young
More informationComparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate
Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com
More informationTest 2. ECON3161, Game Theory. Tuesday, November 6 th
Test 2 ECON36, Game Theory Tuesday, November 6 th Drectons: Answer each queston completely. If you cannot determne the answer, explanng how you would arrve at the answer may earn you some ponts.. (20 ponts)
More informationParameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation
1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected
More informationDISCUSSION ON THE APPLICATION OF WIRELESS ACTIVE SENSING UNIT
4 th Worl Conference on Structural Control an Montorng 4WCSCM-26 DISCUSSION ON HE APPLICAION OF WIRELESS ACIVE SENSING UNI FOR SRUCURAL CONROL C.H. Loh an K.C. Lu Natonal awan Unversty, ape 06-7,awan lohc0220@ntu.eu.tw,
More informationUNIT 11 TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT
UNIT TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT Structure. Introducton Obectves. Key Terms Used n Game Theory.3 The Maxmn-Mnmax Prncple.4 Summary.5 Solutons/Answers. INTRODUCTION In Game Theory, the word
More informationDistributed Uplink Scheduling in EV-DO Rev. A Networks
Dstrbuted Uplnk Schedulng n EV-DO ev. A Networks Ashwn Srdharan (Sprnt Nextel) amesh Subbaraman, och Guérn (ESE, Unversty of Pennsylvana) Overvew of Problem Most modern wreless systems Delver hgh performance
More informationMultirate Anypath Routing in Wireless Mesh Networks
Multrate Anypath Routng n Wreless Mesh Networks Rafael Laufer an Leonar Klenrock Computer Scence Department Unversty of Calforna at Los Angeles August 9, Techncal Report UCLA-CSD-TR arxv:9.6v [cs.ni] 9
More informationEfficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques
The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department
More informationTECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf
TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to
More informationCalculation of the received voltage due to the radiation from multiple co-frequency sources
Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons
More informationEnergy Efficiency Resource Allocation for Device-to-Device. Communication Underlaying Cellular Networks
Energy Effcency Resource Allocaton for Devce-to-Devce Communcaton Unerlayng Cellular Networks AO-ZHOU YU AND QI ZHU The Key Wreless Laboratory of Jangsu rovnce School of Telecommuncaton an Informaton Engneerng
More informationDistributed Relay Selection and Power Allocation Using Stackelberg and Auction Games in Multi-user Multi-relay Networks
ensors & Transducers 013 by IFA http://www.sensorsportal.com Dstrbuted Relay electon and Power Allocaton Usng tackelberg and Aucton Games n Mult-user Mult-relay Networks Erqng ZHANG xng YIN Lang YIN hufang
More informationResource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks
Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty
More informationNOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION
NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona
More informationA Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results
AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of
More informationThe Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System
Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng
More informationDesign and Simulation of PD and PID Controller for Hybrid Actuator
3-5 พฤษภาคม 554, โรงแรม Phuet Orch Resort an Sa หาดกะรน จ งหว ดภ เก ต Desgn an Smulaton of PD an PID Controller for Hybr Actuator Boontan Srboonrueng 1 1 Deartment of Inustral Eucaton Faculty of Inustral
More informationModified Takagi-Sugeno Fuzzy Logic Based Controllers for a Static Compensator in a Multimachine Power System
Mofe Takag-Sugeno Fuzzy Logc Base Controllers for a Statc Compensator n a Multmachne Power System Salman Mohaghegh, Ronal G. Harley* School of Electrcal an Computer Engneerng Georga Insttute of Technology
More informationOptimizing a System of Threshold-based Sensors with Application to Biosurveillance
Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?
More informationDynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University
Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout
More informationOptimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation
T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and
More informationUtility-based Routing
Utlty-based Routng Je Wu Dept. of Computer and Informaton Scences Temple Unversty Roadmap Introducton Why Another Routng Scheme Utlty-Based Routng Implementatons Extensons Some Fnal Thoughts 2 . Introducton
More informationDesign and analysis of an infrared range sensor system for floor-state estimation
Journal of Mechancal Scence an Technology 5 (4) (011) 1043~1050 www.sprngerlnk.com/content/1738-494x DOI 10.1007/s106-011-0141-5 Desgn an analyss of an nfrare range sensor system for floor-state estmaton
More informationA Robust Adaptive Carrier Frequency Offset Estimation Algorithm for OFDM
Amercan Journal of Sgnal Processng 015, 5(A): 6-31 DOI: 10.593/s.ajsp.01501.04 A Robust Aaptve Carrer Frequency Offset Estmaton Algorthm for OFDM Azam Khall *, Amr Rastegarna, Bahareh Darvsh Department
More informationGAME THEORETIC FLOW AND ROUTING CONTROL FOR COMMUNICATION NETWORKS. Ismet Sahin. B.S., Cukurova University, M.S., University of Florida, 2001
GAME THEORETIC FLOW AND ROUTING CONTROL FOR COMMUNICATION NETWORKS by Ismet Sahn B.S., Cukurova Unversty, 996 M.S., Unversty of Florda, 00 Submtted to the Graduate Faculty of School of Engneerng n partal
More informationProceedings of the 2007 IEEE International Conference on Signal Processing and Communications (ICSPC 2007)
Energy effcent wreless sensor networks Author M. Abbosh, Amn, Thel, Dav Publshe 2007 Conference Ttle Proceengs of the 2007 EEE nternatonal Conference on Sgnal Processng an Communcatons (CSPC 2007) DO https://o.org/10.1109/cspc.2007.472830
More informationA RELIABLE SEMI-DISTRIBUTED LOAD BALANCING ARCHITECTURE OF HETEROGENEOUS WIRELESS NETWORKS
Internatonal Journal of Computer Networks & Communcatons (IJCNC) Vol.4, No., January 0 A RELIABLE SEMI-DISTRIBUTED LOAD BALANCING ARCHITECTURE OF HETEROGENEOUS WIRELESS NETWORKS M. Golam Rabul Alam, Chayan
More informationAn Energy-aware Awakening Routing Algorithm in Heterogeneous Sensor Networks
An Energy-aware Awakenng Routng Algorthm n Heterogeneous Sensor Networks TAO Dan 1, CHEN Houjn 1, SUN Yan 2, CEN Ygang 3 1. School of Electronc and Informaton Engneerng, Bejng Jaotong Unversty, Bejng,
More informationCooperative perimeter surveillance with a team of mobile robots under communication constraints
213 IEEE/RSJ Internatonal Conference on Intellgent Robots and Systems (IROS) November 3-7, 213. Toyo, Japan Cooperatve permeter survellance wth a team of moble robots under communcaton constrants J.J.
More informationSelective Sensing and Transmission for Multi-Channel Cognitive Radio Networks
IEEE INFOCOM 2 Workshop On Cogntve & Cooperatve Networks Selectve Sensng and Transmsson for Mult-Channel Cogntve Rado Networks You Xu, Yunzhou L, Yfe Zhao, Hongxng Zou and Athanasos V. Vaslakos Insttute
More informationRESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING
RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING Vaslos A. Srs Insttute of Computer Scence (ICS), FORTH and Department of Computer Scence, Unversty of Crete P.O. Box 385, GR 7 Heraklon, Crete,
More informationDynamic Pricing Approach for Spectrum Allocation in Wireless Networks with Selfish Users
Dynamc Prcng Approach for Spectrum Allocaton n Wreless Networks wth Selfsh Users Zhu J and K. J. Ray Lu Electrcal and Computer Engneerng Department and Insttute for Systems Research Unversty of Maryland,
More informationGNSS Integrity for Railway Transportation
GSS Integrty for Ralway Transportaton M. Jonáš Faculty of Electrcal Engneerng an Informatcs, Unversty of Parubce, Parubce, Czech Republc * Corresponng author: marek.jonas.stuent@upce.cz DOI: 10.478/v10158-011-0016-6
More informationResource Control for Elastic Traffic in CDMA Networks
Resource Control for Elastc Traffc n CDMA Networks Vaslos A. Srs Insttute of Computer Scence, FORTH Crete, Greece vsrs@cs.forth.gr ACM MobCom 2002 Sep. 23-28, 2002, Atlanta, U.S.A. Funded n part by BTexact
More informationResearch of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b
2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng
More informationModelling Information Warfare as a Game
Modellng Informaton Warfare as a ame Jorma Jormakka and Jarmo V. E. Mölsä Department of echnology Natonal Defence College P.O. ox 7 FI-0086 Helsnk Fnland E-mal: orma.ormakka@ml.f Communcatons Laboratory
More informationAn Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks
An Energy Effcent Herarchcal Clusterng Algorthm for Wreless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette, IN, USA {seema,
More informationCDMA Uplink Power Control as a Noncooperative Game
Wreless Networks 8, 659 670, 2002 2002 Kluwer Academc Publshers. Manufactured n The Netherlands. CDMA Uplnk Power Control as a Noncooperatve Game TANSU APCAN, TAMER BAŞAR and R. SRIKANT Coordnated Scence
More informationRational Secret Sharing without Broadcast
Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept
More informationTraffic balancing over licensed and unlicensed bands in heterogeneous networks
Correspondence letter Traffc balancng over lcensed and unlcensed bands n heterogeneous networks LI Zhen, CUI Qme, CUI Zhyan, ZHENG We Natonal Engneerng Laboratory for Moble Network Securty, Bejng Unversty
More informationA Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)
A Novel Optmzaton of the Dstance Source Routng (DSR) Protocol for the Moble Ad Hoc Networs (MANET) Syed S. Rzv 1, Majd A. Jafr, and Khaled Ellethy Computer Scence and Engneerng Department Unversty of Brdgeport
More informationQueuing-Based Dynamic Channel Selection for Heterogeneous Multimedia Applications over Cognitive Radio Networks
1 Queung-Based Dynamc Channel Selecton for Heterogeneous ultmeda Applcatons over Cogntve Rado Networks Hsen-Po Shang and haela van der Schaar Department of Electrcal Engneerng (EE), Unversty of Calforna
More informationINCENTIVIZING INFORMATION SHARING IN NETWORKS
204 IEEE Internatonal Conference on Acoustc, Speech and Sgnal Processng (ICASSP) INCENTIVIZING INFORMATION SHARING IN NETWORKS Je Xu, Yangbo Song, Mhaela van der Schaar Department of Electrcal Engneerng,
More informationPerformance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme
Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,
More informationDigital Transmission
Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal
More informationReview: Our Approach 2. CSC310 Information Theory
CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages
More informationJournal of Chemical and Pharmaceutical Research, 2016, 8(4): Research Article
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2016, 8(4):788-793 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 Vrtual Force Coverage Enhancement Optmzaton Algorthm Based
More informationAn Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks
Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE INFOCOM 2010 proceedngs Ths paper was presented as part of the man Techncal
More informationImproved Detection Performance of Cognitive Radio Networks in AWGN and Rayleigh Fading Environments
Improved Detecton Performance of Cogntve Rado Networks n AWGN and Raylegh Fadng Envronments Yng Loong Lee 1, Wasan Kadhm Saad, Ayman Abd El-Saleh *1,, Mahamod Ismal 1 Faculty of Engneerng Multmeda Unversty
More informationSTRATEGIC INFORMATION DISSEMINATION IN ENDOGENOUS NETWORKS
Ffty-frst Annual Allerton Conference Allerton House, UIUC, Illnos, USA October 2-3, 203 STRATEGIC IFORMATIO DISSEMIATIO I EDOGEOUS ETWORKS Yu Zhan Department of Electrcal Enneern Unversty of Calforna,
More informationCOMMUNICATION networks are expected to serve a. Delay-Aware Cross-Layer Design for Network Utility Maximization in Multi-Hop Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 5, MAY 2011 951 Delay-Aware Cross-Layer Desgn for Network Utlty Maxmzaton n Mult-Hop Networks Haozh Xong, Ruogu L, Atlla Erylmaz, an Eylem
More informationPRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht
68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly
More informationHigh Speed, Low Power And Area Efficient Carry-Select Adder
Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs
More informationA Preliminary Study of Information Collection in a Mobile Sensor Network
A Prelmnary Study of Informaton ollecton n a Moble Sensor Network Yuemng Hu, Qng L ollege of Informaton South hna Agrcultural Unversty {ymhu@, lqng1004@stu.}scau.edu.cn Fangmng Lu, Gabrel Y. Keung, Bo
More informationGraph Method for Solving Switched Capacitors Circuits
Recent Advances n rcuts, ystems, gnal and Telecommuncatons Graph Method for olvng wtched apactors rcuts BHUMIL BRTNÍ Department of lectroncs and Informatcs ollege of Polytechncs Jhlava Tolstého 6, 586
More informationCharacterization and Analysis of Multi-Hop Wireless MIMO Network Throughput
Characterzaton and Analyss of Mult-Hop Wreless MIMO Network Throughput Bechr Hamdaou EECS Dept., Unversty of Mchgan 226 Hayward Ave, Ann Arbor, Mchgan, USA hamdaou@eecs.umch.edu Kang G. Shn EECS Dept.,
More informationPriority based Dynamic Multiple Robot Path Planning
2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna
More informationUncertainty in measurements of power and energy on power networks
Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:
More informationENERGY EFFICIENT MILLIMETER WAVE RADIO LINK ESTABLISHMENT WITH SMART ARRAY ANTENNAS
ENERGY EFFICIENT MILLIMETER WVE RDIO LINK ESTLISHMENT WITH SMRT RRY NTENNS ehnam Neekzad, John S. aras Insttute for Systems Research and Electrcal and Computer Engneerng Department Unversty of Maryland
More informationSliding Mode Controller with RBF Neural Network for Manipulator Trajectory Tracking
IAENG Internatonal Journal of Apple Mathematcs, 5:, IJAM_5 Slng Moe Controller wth RBF Neural Network for Manpulator rajectory rackng Hatao Zhang, Mengmeng Du an Wenshao Bu Abstract In orer to ecrease
More informationThe Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game
8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang
More informationN( E) ( ) That is, if the outcomes in sample space S are equally likely, then ( )
Stat 400, secton 2.2 Axoms, Interpretatons and Propertes of Probablty notes by Tm Plachowsk In secton 2., we constructed sample spaces by askng, What could happen? Now, n secton 2.2, we begn askng and
More informationThe Investigation of the Obstacle Avoidance for Mobile Robot Based on the Multi Sensor Information Fusion technology
Internatonal Journal of Materals, Mechancs an Manufacturng, Vol. 1, o. 4, ovember 2013 The Investgaton of the Obstacle Avoance for Moble Robot Base on the Mult Sensor Informaton Fuson technology Qu Dongyue,
More informationSecure Transmission of Sensitive data using multiple channels
Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com
More informationMultiband Jamming Strategies with Minimum Rate Constraints
Multband Jammng Strateges wth Mnmum Rate Constrants Karm Banawan, Sennur Ulukus, Peng Wang, and Bran Henz Department of Electrcal and Computer Engneerng, Unversty of Maryland, College Park, MD 7 US Army
More information熊本大学学術リポジトリ. Kumamoto University Repositor
熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng
More informationGenetic Algorithm for Sensor Scheduling with Adjustable Sensing Range
Genetc Algorthm for Sensor Schedulng wth Adjustable Sensng Range D.Arvudanamb #, G.Sreekanth *, S.Balaj # # Department of Mathematcs, Anna Unversty Chenna, Inda arvu@annaunv.edu skbalaj8@gmal.com * Department
More informationTo: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel
To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,
More informationInterdependent Relationships in Game Theory: A Generalized Model
Interdependent elatonshps n Game Theory: A Generalzed Model Jawe L Independent researcher, Nottngham, UK Emal: Jawemchaell@gmalcom Abstract: A generalzed model of games s proposed, wth whch both cooperatve
More informationMulti-sensor optimal information fusion Kalman filter with mobile agents in ring sensor networks
Mult-sensor optmal nformaton fuson Kalman flter wth moble agents n rng sensor networs Behrouz Safarneadan *, Kazem asanpoor ** *Shraz Unversty of echnology, safarnead@sutech.ac.r ** Shraz Unversty of echnology,.hasanpor@gmal.com
More informationA NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems
0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of
More informationFast Code Detection Using High Speed Time Delay Neural Networks
Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department
More informationImproved Cuckoo Search Algorithm with Novel Searching Mechanism for Solving Unconstrained Function Optimization Problem
IAENG Internatonal Journal o Computer Scence, 44:, IJ_44 0 Improve Cuckoo Search Algorthm wth Novel Searchng Mechansm or Solvng Unconstrane Functon Optmzaton Problem Shu-Xa L, an Je-Sheng Wang Abstract
More informationIEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES
IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department
More informationGeneralized Incomplete Trojan-Type Designs with Unequal Cell Sizes
Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,
More informationUse of ANFIS Control Approach for SSSC based Damping Controllers Applied in a Two-area Power System
Use of ANFIS Control Approach for SSSC base ampng Controllers Apple n a Two-area Power System. Mural, M. Rajaram 2 epartment of Electrcal an Electroncs Engneerng, Government College of Engneerng, Salem,
More informationControl Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart
Control Chart - hstory Control Chart Developed n 920 s By Dr. Walter A. Shewhart 2 Process n control A phenomenon s sad to be controlled when, through the use of past experence, we can predct, at least
More informationKing s Research Portal
Kng s Research Portal DOI: 10.1109/TWC.2015.2460254 Document Verson Peer revewed verson Lnk to publcaton record n Kng's Research Portal Ctaton for publshed verson (APA): Shrvanmoghaddam, M., L, Y., Dohler,
More informationPower Control for Wireless Data
Power Control for Wreless Data Davd Goodman Narayan Mandayam Electrcal Engneerng WINLAB Polytechnc Unversty Rutgers Unversty 6 Metrotech Center 73 Brett Road Brooklyn, NY, 11201, USA Pscataway, NJ 08854
More informationIterative Water-filling for Load-balancing in
Iteratve Water-fllng for Load-balancng n Wreless LAN or Mcrocellular Networks Jeremy K. Chen Theodore S. Rappaport Gustavo de Vecana Wreless Networkng and Communcatons Group (WNCG), The Unversty of Texas
More informationA Strategy-Proof Combinatorial Heterogeneous Channel Auction Framework in Noncooperative Wireless Networks
Ths s the author s verson of an artcle that has been publshed n ths journal. Changes were made to ths verson by the publsher pror to publcaton. The fnal verson of record s avalable at http://dx.do.org/1.119/tmc.214.2343624
More informationReactive Tuning of Target Estimate Accuracy in Multi-Sensor Data Fusion
eactve unng of arget Estmate Accuracy n Mult-Sensor Data Fuson Nng Xong a,*, enrk Chrstensen a, Per Svensson b a Center for Autonomous Systems, oyal Insttute of echnology, Stockholm b Department of Data
More informationAnalysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson
37th CDC, Tampa, December 1998 Analyss of Delays n Synchronous and Asynchronous Control Loops Bj rn Wttenmark, Ben Bastan, and Johan Nlsson emal: bjorn@control.lth.se, ben@control.lth.se, and johan@control.lth.se
More informationTopology Control for C-RAN Architecture Based on Complex Network
Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton
More informationAdaptive Modulation for Multiple Antenna Channels
Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,
More informationMulti-Robot Map-Merging-Free Connectivity-Based Positioning and Tethering in Unknown Environments
Mult-Robot Map-Mergng-Free Connectvty-Based Postonng and Tetherng n Unknown Envronments Somchaya Lemhetcharat and Manuela Veloso February 16, 2012 Abstract We consder a set of statc towers out of communcaton
More informationThroughput Maximization by Adaptive Threshold Adjustment for AMC Systems
APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal
More informationAn Adaptive Scheduling Algorithm for Set Cover Problem in Wireless Sensor Networks: A Cellular Learning Automata Approach
2 3rd Internatonal Conference on Machne Learnng and Computng (ICMLC 2) n daptve chedulng lgorthm for et Cover Problem n Wreless ensor Networks: Cellular Learnng utomata pproach eza Ghader Computer Engneerng
More informationCOMPARISON OF DIFFERENT BROADCAST SCHEMES FOR MULTI-HOP WIRELESS SENSOR NETWORKS 1
Internatonal Journal of Computer Networks & Communcatons (IJCNC), Vol., No.4, July 1 COMARISON OF DIFFERENT BROADCAST SCHEMES FOR MULTI-HO WIRELESS SENSOR NETWORKS 1 S. Mehta and K.S. Kwak UWB Wreless
More informationQoS Provisioning in Wireless Data Networks under Non-Continuously Backlogged Users
os Provsonng n Wreless Data Networks under Non-Contnuously Backlogged Users Tmotheos Kastrnoganns, and Symeon Papavasslou, Member, IEEE School of Electrcal and Computer Engneerng Natonal Techncal Unversty
More informationA Unified Cross-Layer Framework for Resource Allocation in Cooperative Networks
3000 IEEE TRNSCTIONS ON WIRELESS COMMUNICTIONS, VOL. 7, NO. 8, UGUST 2008 Unfed Cross-Layer Framework for Resource llocaton n Cooperatve Networks We Chen, Member, IEEE, Ln Da, Member, IEEE, Khaled Ben
More informationA Simple Satellite Exclusion Algorithm for Advanced RAIM
A Smple Satellte Excluson Algorthm for Advanced RAIM Juan Blanch, Todd Walter, Per Enge Stanford Unversty ABSTRACT Advanced Recever Autonomous Integrty Montorng s a concept that extends RAIM to mult-constellaton
More informationIntelligent Wakening Scheme for Wireless Sensor Networks Surveillance
The Frst Internatonal Workshop on Cyber-Physcal Networkng Systems Intellgent Wakenng Scheme for Wreless Sensor Networks Survellance Ru Wang, Le Zhang, L Cu Insttute of Computng Technology of the Chnese
More informationAdaptive Modulation and Coding for Utility Enhancement in VMIMO WSN Using Game Theory
Adaptve Modulaton and Codng for Utlty nhancement n VMIMO WSN Usng Game Theory R. Vall and P. Dananjayan mparments. The data transmtted from the sensor nodes s hghly susceptble to error n a wreless envronment
More informationA Game Theoretic Approach for Distributed Resource Allocation and Orchestration of Softwarized Networks
A Game Theoretc Approach for Dstrbuted Resource Allocaton and Orchestraton of Softwarzed Networks Salvatore D Oro, Laura Gallucco, Member, IEEE, Sergo Palazzo, Senor Member, IEEE, Govann Schembra Abstract
More informationWalsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter
Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957
More information