Using Bayesian Game Model for Intrusion Detection in Wireless Ad Hoc Networks

Size: px
Start display at page:

Download "Using Bayesian Game Model for Intrusion Detection in Wireless Ad Hoc Networks"

Transcription

1 Int J Communcatons, Network an ystem cences, 21, 3, o:14236/jcns21378 Publshe Onlne July 21 ( Usng Bayesan Game Moel for Intruson Detecton n Wreless A Hoc Networks Abstract Hua We, Hao un Department of Apple Mathematcs, Northwestern Polytechncal Unversty, X'an, Chna E-mal: wh86127@163com, hsun@nwpueucn Receve Aprl 12, 21; revse May 15, 21; accepte June 22, 21 Wreless a hoc network s becomng a new research fronter, n whch securty s an mportant ssue Usually some noes act malcously an they are able to o fferent kns of Denal of ervce (Dos) Because of the lmte resource, ntruson etecton system (ID) runs all the tme to etect ntruson of the attacker whch s a costly overhea We use game theory to moel the nteractons between the ntruson etecton system an the attacker, an a realstc moel s gven by usng Bayesan game We solve the game by fnng the Bayesan Nash equlbrum The results of our analyss show that the ID coul work ntermttently wthout compromsng ts effectveness At the en of ths paper, we prove an experment to verfy the ratonalty an effectveness of the propose moel Keywors: Wreless A Hoc Networks, Game Theory, Intruson Detecton ystem, Bayesan Nash Equlbrum 1 Introucton A wreless a hoc network (WANET) s a collecton of moble noes n whch the noes communcate wth each other wthout the help of any fxe nfrastructure [1] Noes wthn each other's rao range communcate rectly va wreless lnks, whle those that are far apart use other noes as relays Because of the lmte resource, some noes may act selfshness A hoc network msbehavor maybe nflcte by malcous noes, each of whch ams at harmng the network operaton; consequently, mechansms that enforce securty present a partcular challenge In orer to avo the harm of malcous noes, one way s the use of an ntruson etecton system, whch watches out for any ntruson an sets out an alarm when an ntruson s etecte The ntruson etecton an response mechansm s escrbe n [2] In recent years, we have seen researchers usng game theory n the area of a hoc networks It s a powerful tool n that t can be use to moel any system whch exhbts the characterstcs of a game In WANET, moble noes typcally have selfsh motvatons, lack of cooperaton among themselves, an have conflctng nterests wth each other These characterstcs make game theory (GT) a promsng tool to moel, analyze, an esgn varous aspects of WANET We have gven a two-player game to moel the nteractons between an ntruson etecton system an an attacker n wreless a hoc network Each efener s equppe wth an ntruson etecton system (ID) n orer to montor the actveness of an attacker The rest of the paper s organze as follows ecton 2 scusses relate work ecton 3 escrbes the one-stage game an mult-stage game, an Bayesan Nash equlbrum solutons are nvestgate ecton 4 presents numercal examples to verfy the effectveness of the propose game The concluson of the paper s n secton 5 2 Relate Work Game theory has been successfully apple to many scplnes nclung economcs, poltcal scence, an computer scence Game theory usually consers a multplayer ecson problem where multple players wth fferent objectves can compete an nteract wth each other In the context of ntruson etecton, several game theoretc approaches have been propose to wre networks, sensor networks, an a hoc networks Yenumula B Rey [3] scuss currently avalable ntruson etecton technques, attack moels usng game theory, an then propose a new framework to etect malcous noes n wreless sensor networks usng zero sum game approach for noes n the forwar ata path The frst part of the research proves the game moel wth probablty of energy requre for transferrng the ata packets The secon part erves the moel to etect the malcous noes usng probablty of acknowlegement at source Yuhan Moon, Volet R yrotuk [4] present CCM-MAC, a cooperatve CDMA-base mult-channel Copyrght 21 cres IJCN

2 H WEI ET AL 63 meum access control (MAC) protocol for moble a hoc networks (MANET) n whch each noe has one half- uplex transcever They prove an analyss of the maxmum throughput of CCM-MAC an valate t through smulaton n MATLAB, an also compare the throughput t acheves to IEEE 8211, a mult-channel MAC protocol, an a CDMA-base MAC protocol In [4] Ha Otrok et al aress the problem of ncreasng the effectveness of an ntruson etecton system (ID) for a cluster of noes n a hoc networks, an formulate a zero-sum non-cooperatve game between the leaer an ntruer They solve the game by fnng the Bayesan Nash equlbrum where the leaer s optmal etecton strategy s etermne Fnally, emprcal results are prove to support ther solutons Yu Lu, Crstna Comancu an Hong Man [5] have use statc Bayesan game an ynamc Bayesan game to moel the nteractons between attacker an efener n a hoc networks They have shown that the statc game leas to a mxe-strategy Bayesan nash equlbrum when the efener s belef of the attacker beng malcous s hgh, an the ynamc game has a mxestrategy Perfect bayesan equlbrum In [6], they have use game theory for evelopng effcent efense strateges for a network wth multple IDs They have formulate a non-zero-sum, noncooperatve attacker/efener game where the payoffs of players are non-strctly compettve They have showe that the game acheves at least a Nash equlbrum that leas to a efense strategy for the efener A two-player, non-cooperatve, non-zero-sum game has also been stue by Agah et al [7] an Alpan an Basar [8] to aress attack-efense problems n sensor networks In ther moels, each player s optmal strategy epens only on the payoff functon of the opponent an the game s assume to have complete nformaton [9-11] have gven the smlar moel, but the game s assume to have ncomplete nformaton Our moel s smlar to the ones mentone n the aforementone works n that t s a two-player, nonzero-sum an noncooperatve game However, our work s not ame at gvng the best strategy of the efener In ths paper, we have gven a one-stage game an mult-stage game In the propose works, the ID of efener runs all the tme, whch s a costly overhea for a battery-powere moble evce snce noes have lmte resource The results of our moel show that the ID coul work ntermttently 3 Bayesan Game 31 Game Moel In ths secton we present our game moel An ID attempts to etect ntruson from an attacker Hence, we may look at ths as a game between two players, the ID an the attacker The attacker s enote by an ID s enote by j The player s ntent s to attack the network wthout gettng caught, whereas that of the player j s to etect ntruson when the attacker attacks There s no cooperaton whatsoever between the two players Player has two types, regular that s enote by an malcous s enote by 1 Noe s type s hs prvate nformaton an ID s uncertan about ts opponent s type ID has only one type, that s regular or j an t s common knowlege for both players To present our moel, we make the followng assumptons An ID nees not be runnng all the tme urng whch the wreless a hoc network s up The pure strategy space of ths player s enote by = (Montor t of The frst strategy of player j epcts the stuaton when the ID s actve for some percentage (enote by t ) For example, f the ID etects by montorng the traffc, the ID perocally montors the traffc an the rest of the tme, t sts le Lkewse, an attacker nee not be tryng to attack the tme, Not montor), t, 1 1% of the tme The malcous type of player has two pure strateges: Attack s of the tme an Not attack, s, 1 The regular type of player has one pure strategy: Not attack The two players choose ther strateges smultaneously at the begnnng of the game, assumng common knowlege about the game (costs an belefs) We frst conser the scenaro of the ID Tables 1-2 llustrate the payoff matrx of the game n strategc form In the matrx, a represents the etecton rate of the ID, b represents the false alarm rate of the ID, an ab,,1 In the Table 1(a), the payoff matrx for the Table 1 The type of player (a) Payoff matrx of ID j s malcous \ j (2a1) tsm(1 t) sl tc sl btn tc (b) Payoff matrx of attacker \ j (1 2 atsm ) (1 tsl ) sca sl sca Table 2 The type of player s regular \ j (, btn tc ) (, ) Copyrght 21 cres IJCN

3 64 H WEI ET AL player j when player s malcous s gven m enotes the overall gan of the player for etectng the attack, an l s the overall loss for not etectng the attack urng the whole lfetme Costs of attackng an montorng are enote by an urng the whole pero In our moel, we assume that m l an l c a, c s reasonable snce otherwse the player oes not have ncentve to attack an the player j oes not have ncentve to montor The player j montors t of the tme, the player attacks s of the tme The probablty of the player j montorng when the attack s on s ts, urng whch the player j gets a gan of tsm mlarly, the probablty of the player j not montorng when the attack occurs s because of whch the player j loses an amount of (1 tsl ) tc s the cost ncurre ue to montorng The expecte payoff of etectng the attack epens on the value of a, whch s (2a1) tsm(1 t) sltc When the player j s not actve an there s an attack, so the payoff of the player j s sl The entry at poston (row 2, column 1) s c a c (1 t) s btn tc n s the overall loss ncurre by the player j for the false etecton The rest of the entry of the matrx s zero as the player plays Not attack The payoff matrx for the player when the player s malcous s efne as shown n Table 1(b) In contrast, the gan of player s the loss of player j, whch s (1 2a)tsm + (1 t)sl The entry at (row 1 column 2) s the same as n prevous scenaro For the other entres, when the player plays (Not attack), hs payoff s always The payoff matrx for the player when t s regular s gven n Table 2 The player has only one strategy when t s regular The payoff of player s always If player eces not to montor, hs payoff s ; f he eces to play j, he has the montorng cost tc an an expecte loss btn ue to the false alarm, so hs payoff s btn tc 32 One-tage Game The ntent of both players s to maxmze ther own payoff Ths mples that we assume that both players are ratonal uppose player j assgns a pror probablty to player s malcous In the followng, we use Bayesan Nash equlbrum (BNE) to analyze the game moel, base on the assumpton that s a common pror If player plays hs pure strategy par (Attack s of the tme f malcous, Not attack f regular), then the expecte payoff of player j s Ej ( j) ( atsm(1 a) tsm(1 t) sl tc) (1 )( btn tc ) E ( ( 2)) sl j j bn c o f, Ej( j) Ej( j), 2asm sm sl bn then the best strategy of player j s to play Montor t of the tme However, f player j plays ths strategy, Attack s of the tme wll not be the best strategy f player s malcous, an he wll transfer to play Not attack nstea Hence, ((Attack s of the tme f malcous, Not attack f regular), Montor t of the tme, ) s not a bn c BNE If, ((Attack s of the tme 2asm sm sl bn f malcous, Not attack f regular), Not montor, ) s a BNE mlarly, ((Not attack s of the tme f malcous, Not attack f regular), Not montor, ) s not a BNE THEOREM 1: In the escrbe game-theoretc moel, there s no pure-strategy BNE when satsfes the nequalty bn c 2asm sm sl bn We prevously showe that no pure-strategy BNE exsts for the game when bn c But 2asm sm sl bn there s a mxe-strategy BNE Let p be the probablty wth whch the player plays ts frst strategy Hence, (1 p) s the probablty wth whch t plays the secon strategy mlarly, let q be the probablty wth whch the player j plays ts frst strategy Hence, (1 q) s the probablty wth whch t plays the secon strategy Then the expecte payoff of player j s E j ( j) p ( atsm (1 a) tsm (1 t) sl tc) (1 p) ( btn tc) (1 )( btn tc) Ej( j( 2)) psl From Ej( j) E j ( j ), we get that the malcous type of player s equlbrum strategy s to play frst strategy wth probablty * bn c p (2asm ) sm sl bn an the expecte payoff of player s E( ) q( atsm (1 a) tsm (1 t) sl tca) (1 q)( slsc a ) E( ) Copyrght 21 cres IJCN

4 H WEI ET AL 65 From E( ) E( ), we get that the equlbrum strategy of player j s to play frst strategy wth probablty * l c q a 2atm tm tl THEOREM 2: In the escrbe game-theoretc moel, the strategy par ((Attack s of the tme wth probablty * p f malcous, Not attack f regular), Montor t of * the tme wth probablty q, ) s a mxe-strategy BNE The above escrbe game s a statc game, for whch the players maxmze ther utltes base on the payoff matrx for the game Due to the ffculty of assgnng accurate pror probabltes for player s type, we exten the statc to ynamc game, where the player j can upate hs belefs accorng to the Bayes rule 33 Mult-tage Game The aforesa one-stage game s statc Bayesan game, for whch the player j maxmzes hs payoff base on a fxe pror about the malcousness of hs opponent The lfetme of the network coul be broken own nto ntervals of the tme an our game coul be use as a repeate game over these ntervals o, we exten the one-stage game to mult-stage game We assume that the one-stage game s repeately playe n each tme pero t k, where k =, 1, An nterval of T secons maybe selecte for each stage game In orer to get a smple moel, we assume that T = 1 The payoffs of the players n each stage game are the same as n the proceeng one-stage game, an we assume that there s no scount factor wth respect to the payoffs of the players The extensve form of each stage game can be represente n a smlar manner as for the statc one-stage game In our moel, the player j 's type s known to all the player whle the player 's type s selecte from the type set ={malcous, regular} Knowng that the player 's type s a prvate nformaton Bayesan equlbrum [12] ctates that the player 's acton epens on hs type By observng the behavor of the player, the player j can calculate the posteror belef evaluaton functon ( ( )) t k 1 a t k usng the followng Bayes' rule t ( ( )) ( ( ) ) k a tk P a tk t ( ( )) k a t k t ( ( )) ( ( ) k a tk P a t k ) tk k where ( a ( t )) an Pa ( ( t) ) s the probablty that strategy a ( t ) k k s observe at ths stage of the game gven the type of the player From the assumpton of escrbe game, we know that P( a ( t ) Attack 1) ap b( 1 p) k P( a( tk) Not Attack 1) (1 a) p (1 b)(1 p ) Pa ( ( t) Attack ) a k P( a( tk) Not Attack ) 1 b LEMMA 1: the mult-stage game satsfes the four Bayesan contons -(4) 1) Posteror belefs are nepenent, an all types of player j have the same belefs, an even unexpecte events wll not change the nepenence assumpton for the type of the opponents 2) Bayes rule s use to upate belefs from t ( ( ) k a tk ) to t ( ( 1 1) k a t k ) whenever possble 3) The players o not sgnal what they o not know 4) All players must have the same belef about the type of another player Proof: conton s trvally satsfe because player j has only one type We can see that the multstage game satsfes from Equaton In our multstage game context, player 's sgnal s part of attack actons, thus (3) s satsfe Because there are only two players n the game at any stage, the conton (4) s satsfe THEOREM 3: The mult-stage game has a perfect Bayesan equlbrum (PBE) At stage game t k, uo to the upate belef (), the probablty p s also upate contnuously From the prevous analyss of secton 32, the malcous type of player 's equlbrum strategy s to play hs frst strategy wth probablty bn c p ()(2 asm sm sl bn) the equlbrum strategy of player j s to play hs frst strategy wth probablty l c q a (3) 2atm tm tl o the PBE of the game s gven as ( p, q, ()), wth ( p, q, ()) gven by Equatons -(3) 4 Example For each experment, we assume that m l 1, n 1 Fgures 1 an 2 assume s 85, t 85, c 5, Fgure 3 assumes t 85, c 5, a 9, b 2, an Fgure 4 assumes s 9, t 9, a 95, b 14 Fgure 5 assumes s 9, t 5, Copyrght 21 cres IJCN

5 66 H WEI ET AL a 95, b 2, c 5 For all four scenaros player j 's pror probablty 5 From Fgure 1, we see that the hgher a s, the faster posteror belef converges to 1 By contrast, Fgure 2 shows that the lower b s, the faster posteror belef converges to 1 In other wors, the etecton accuracy of the ID affects the convergence spee of player j 's posteror belef From Fgure 3, we see that the lower tme of attackng, the faster posteror belef converges to 1 From Fgure 4, we see that the hgher c, the faster the convergence spee of player j 's posteror belef wll be Fgure 5 shows the posteror belef of the player j for these two scenaros The belef for the frst scenaro Fgure 3 Convergence of player j s posteror belefs gven the observatons of a sequence of a sequence of consecutve Attack actons uner varous s Fgure 1 Convergence of player j s posteror belefs gven the observatons of a sequence of a sequence of consecutve Attack actons uner varous a Fgure 4 Convergence of player j s posteror belefs gven the observatons of a sequence of a sequence of consecutve Attack actons uner varous c converges to 1 faster than the secon scenaro Ths s because n the frst scenaro the player starts to attack earler compare to the secon scenaro Once the belef reaches 1, t oes not go own even f the player s not attackng snce the type has alreay been entfe 5 Conclusons Fgure 2 Convergence of player j s posteror belefs gven the observatons of a sequence of a sequence of consecutve Attack actons uner varous b In ths paper, our goal s to etermne whether t s essental to always keep the ID runnng wthout compromsng on ts effectveness Frst of all, we assume that the ID works ntermttently Then, we moel the nteracton between ntruson etecton system an an attacker as a one-stage game, an show that ths game has two Bayes an Nash equlbrums econ, we moel ths game as a mult-stage game, where ID oes not have fxe pror Copyrght 21 cres IJCN

6 H WEI ET AL 67 Fgure 5 Posteror belef probabltes about the type of ts opponent an can upate ts belef at the en of each stage of the game, an show that ths game has a mxe-strategy perfect Bayesan equlbrum The results of the propose two games show that ID coul work ntermttently whle gettng the same effectveness 6 Acknowlegements The paper s supporte by the Natonal Natural cence Founaton of Chna uner Grant Nos an References [1] R Ramanathan an J Re, A Bref Overvew of A Hoc Networks: Challenges an Drectons, IEEE Communcatons Magzne, Vol 4, No 5, 22, pp 2-22 [2] Y G Zhang an W Lee, Intruson Detecton n Wreless A-Hoc Networks, Proceengs of the 6 th Annual Internatonal Conference on Moble Computng an Networkng, Boston, 2, pp [3] Y B Rey, A Game Theory Approach to Detecton Mmalcous Noes n Wreless ensor Networks, Proceengs of the 29 Thr Internatonal Conference on ensor Technologes an Applcatons, Athens, June 18-23, 29, pp [4] H Otrok, N Mohamme, L Y Wang, M Debbab an P Bhattacharya, A Game-Theoretcal Intruson Detecton Moel for Moble A Hoc Networks, Computer Communcatons, Vol 31, No 4, 28, pp [5] Y Lu, C Comancu an H Man, A Bayesan Game Approach for Intruson Deteton n Wreless A Hoc Networks, Proceengs from the 26 Workshop on Game Theory for Communcatons an Networks, Psa, Italy, October 14, 26, pp 1-12 [6] Y Lu, H Man an C Comancu, A Game Theoretc Approach to Effcent Mxe trateges for Intruson Detecton, IEEE Internatonal Conference on Communcatons, Istanbul, 26, pp [7] A Agah, K Das, K Basu an M Asa, Intruson Detecton n ensor Networks: A Non-Cooperatve Game Approach, Proceengs of the Thr IEEE Internatonal ymposum on Network Computng an Applcatons, Boston, August-eptember 24, pp [8] T Alpcan an T Basar, A Game Theoretc Approach to Decson an Analyss n Network Intruson Detecton, Proceengs of the 42n IEEE Conference on Decson an Control, Mau, Hawa, December 23, pp [9] N Marchang an R Trpath, A Game Theoretcal Approach for Effcent Deployment of Intruson Detecton ystem n Moble A Hoc Networks, Proceengs of the 15th Internatonal Conference on Avance Computng an Communcatons, Guwahat, 27, pp [1] T Poongotha an K Jayara, A Noncooperatve Game Approach for Intruson Detecton n Moble A Hoc Networks, Proceengs of the 28 Internatonal Conference on Computng Communcaton an Networkng, t Thomas, VI, December 18-2, 28, pp 1-4 [11] A Patcha an J-M Park, A Game Theoretc Approach to Moelng Intruson Detecton n Moble A Hoc Networks, Proceengs of the 24 IEEE Workshop on Informaton Assurance an ecurty, Unte tates Mltary Acaemy, West Pont, NY, June 1-11, 24, pp 3-34 [12] M Wllem, Mnmax Theorem, Brkhauser, Boston, 1996 Copyrght 21 cres IJCN

2005 Journal of Software. . Ad hoc ), ) A Delay Oriented Adaptive Routing Protocol for Mobile Ad hoc Networks

2005 Journal of Software. . Ad hoc ), ) A Delay Oriented Adaptive Routing Protocol for Mobile Ad hoc Networks -985/5/6(9)66 5 Journal of Software Vol6, No9 A hoc,,,+,,,, (, 37) ( ), 37) A Delay Orente Aaptve Routng Protocol for Moble A hoc Networks XIE Fe,, ZHANG Xn-Mng,+, GUO Ja-Feng,, CHEN Guo-Lang, (Department

More information

An Improved Weighted Centroid Localization Algorithm

An Improved Weighted Centroid Localization Algorithm Internatonal Journal of Future Generaton Communcaton an Networng Vol.6, No.5 (203), pp.45-52 http://x.o.org/0.4257/fgcn.203.6.5.05 An Improve Weghte Centro Localzaton Algorthm L Bn, Dou Zheng*, Nng Yu

More information

Tile Values of Information in Some Nonzero Sum Games

Tile Values of Information in Some Nonzero Sum Games lnt. ournal of Game Theory, Vot. 6, ssue 4, page 221-229. Physca- Verlag, Venna. Tle Values of Informaton n Some Nonzero Sum Games By P. Levne, Pars I ), and ZP, Ponssard, Pars 2 ) Abstract: The paper

More information

Networked Estimation for Event-Based Sampling Systems with Packet Dropouts

Networked Estimation for Event-Based Sampling Systems with Packet Dropouts Sensors 009, 9, 3078-3089; o:10.3390/s90403078 OPEN ACCESS sensors ISSN 144-80 www.mp.com/journal/sensors Artcle Networke Estmaton for Event-Base Samplng Sstems wth Packet Dropouts Vnh Hao Nguen an Young

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

Test 2. ECON3161, Game Theory. Tuesday, November 6 th

Test 2. ECON3161, Game Theory. Tuesday, November 6 th Test 2 ECON36, Game Theory Tuesday, November 6 th Drectons: Answer each queston completely. If you cannot determne the answer, explanng how you would arrve at the answer may earn you some ponts.. (20 ponts)

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

DISCUSSION ON THE APPLICATION OF WIRELESS ACTIVE SENSING UNIT

DISCUSSION ON THE APPLICATION OF WIRELESS ACTIVE SENSING UNIT 4 th Worl Conference on Structural Control an Montorng 4WCSCM-26 DISCUSSION ON HE APPLICAION OF WIRELESS ACIVE SENSING UNI FOR SRUCURAL CONROL C.H. Loh an K.C. Lu Natonal awan Unversty, ape 06-7,awan lohc0220@ntu.eu.tw,

More information

UNIT 11 TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT

UNIT 11 TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT UNIT TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT Structure. Introducton Obectves. Key Terms Used n Game Theory.3 The Maxmn-Mnmax Prncple.4 Summary.5 Solutons/Answers. INTRODUCTION In Game Theory, the word

More information

Distributed Uplink Scheduling in EV-DO Rev. A Networks

Distributed Uplink Scheduling in EV-DO Rev. A Networks Dstrbuted Uplnk Schedulng n EV-DO ev. A Networks Ashwn Srdharan (Sprnt Nextel) amesh Subbaraman, och Guérn (ESE, Unversty of Pennsylvana) Overvew of Problem Most modern wreless systems Delver hgh performance

More information

Multirate Anypath Routing in Wireless Mesh Networks

Multirate Anypath Routing in Wireless Mesh Networks Multrate Anypath Routng n Wreless Mesh Networks Rafael Laufer an Leonar Klenrock Computer Scence Department Unversty of Calforna at Los Angeles August 9, Techncal Report UCLA-CSD-TR arxv:9.6v [cs.ni] 9

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

Energy Efficiency Resource Allocation for Device-to-Device. Communication Underlaying Cellular Networks

Energy Efficiency Resource Allocation for Device-to-Device. Communication Underlaying Cellular Networks Energy Effcency Resource Allocaton for Devce-to-Devce Communcaton Unerlayng Cellular Networks AO-ZHOU YU AND QI ZHU The Key Wreless Laboratory of Jangsu rovnce School of Telecommuncaton an Informaton Engneerng

More information

Distributed Relay Selection and Power Allocation Using Stackelberg and Auction Games in Multi-user Multi-relay Networks

Distributed Relay Selection and Power Allocation Using Stackelberg and Auction Games in Multi-user Multi-relay Networks ensors & Transducers 013 by IFA http://www.sensorsportal.com Dstrbuted Relay electon and Power Allocaton Usng tackelberg and Aucton Games n Mult-user Mult-relay Networks Erqng ZHANG xng YIN Lang YIN hufang

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

Design and Simulation of PD and PID Controller for Hybrid Actuator

Design and Simulation of PD and PID Controller for Hybrid Actuator 3-5 พฤษภาคม 554, โรงแรม Phuet Orch Resort an Sa หาดกะรน จ งหว ดภ เก ต Desgn an Smulaton of PD an PID Controller for Hybr Actuator Boontan Srboonrueng 1 1 Deartment of Inustral Eucaton Faculty of Inustral

More information

Modified Takagi-Sugeno Fuzzy Logic Based Controllers for a Static Compensator in a Multimachine Power System

Modified Takagi-Sugeno Fuzzy Logic Based Controllers for a Static Compensator in a Multimachine Power System Mofe Takag-Sugeno Fuzzy Logc Base Controllers for a Statc Compensator n a Multmachne Power System Salman Mohaghegh, Ronal G. Harley* School of Electrcal an Computer Engneerng Georga Insttute of Technology

More information

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and

More information

Utility-based Routing

Utility-based Routing Utlty-based Routng Je Wu Dept. of Computer and Informaton Scences Temple Unversty Roadmap Introducton Why Another Routng Scheme Utlty-Based Routng Implementatons Extensons Some Fnal Thoughts 2 . Introducton

More information

Design and analysis of an infrared range sensor system for floor-state estimation

Design and analysis of an infrared range sensor system for floor-state estimation Journal of Mechancal Scence an Technology 5 (4) (011) 1043~1050 www.sprngerlnk.com/content/1738-494x DOI 10.1007/s106-011-0141-5 Desgn an analyss of an nfrare range sensor system for floor-state estmaton

More information

A Robust Adaptive Carrier Frequency Offset Estimation Algorithm for OFDM

A Robust Adaptive Carrier Frequency Offset Estimation Algorithm for OFDM Amercan Journal of Sgnal Processng 015, 5(A): 6-31 DOI: 10.593/s.ajsp.01501.04 A Robust Aaptve Carrer Frequency Offset Estmaton Algorthm for OFDM Azam Khall *, Amr Rastegarna, Bahareh Darvsh Department

More information

GAME THEORETIC FLOW AND ROUTING CONTROL FOR COMMUNICATION NETWORKS. Ismet Sahin. B.S., Cukurova University, M.S., University of Florida, 2001

GAME THEORETIC FLOW AND ROUTING CONTROL FOR COMMUNICATION NETWORKS. Ismet Sahin. B.S., Cukurova University, M.S., University of Florida, 2001 GAME THEORETIC FLOW AND ROUTING CONTROL FOR COMMUNICATION NETWORKS by Ismet Sahn B.S., Cukurova Unversty, 996 M.S., Unversty of Florda, 00 Submtted to the Graduate Faculty of School of Engneerng n partal

More information

Proceedings of the 2007 IEEE International Conference on Signal Processing and Communications (ICSPC 2007)

Proceedings of the 2007 IEEE International Conference on Signal Processing and Communications (ICSPC 2007) Energy effcent wreless sensor networks Author M. Abbosh, Amn, Thel, Dav Publshe 2007 Conference Ttle Proceengs of the 2007 EEE nternatonal Conference on Sgnal Processng an Communcatons (CSPC 2007) DO https://o.org/10.1109/cspc.2007.472830

More information

A RELIABLE SEMI-DISTRIBUTED LOAD BALANCING ARCHITECTURE OF HETEROGENEOUS WIRELESS NETWORKS

A RELIABLE SEMI-DISTRIBUTED LOAD BALANCING ARCHITECTURE OF HETEROGENEOUS WIRELESS NETWORKS Internatonal Journal of Computer Networks & Communcatons (IJCNC) Vol.4, No., January 0 A RELIABLE SEMI-DISTRIBUTED LOAD BALANCING ARCHITECTURE OF HETEROGENEOUS WIRELESS NETWORKS M. Golam Rabul Alam, Chayan

More information

An Energy-aware Awakening Routing Algorithm in Heterogeneous Sensor Networks

An Energy-aware Awakening Routing Algorithm in Heterogeneous Sensor Networks An Energy-aware Awakenng Routng Algorthm n Heterogeneous Sensor Networks TAO Dan 1, CHEN Houjn 1, SUN Yan 2, CEN Ygang 3 1. School of Electronc and Informaton Engneerng, Bejng Jaotong Unversty, Bejng,

More information

Cooperative perimeter surveillance with a team of mobile robots under communication constraints

Cooperative perimeter surveillance with a team of mobile robots under communication constraints 213 IEEE/RSJ Internatonal Conference on Intellgent Robots and Systems (IROS) November 3-7, 213. Toyo, Japan Cooperatve permeter survellance wth a team of moble robots under communcaton constrants J.J.

More information

Selective Sensing and Transmission for Multi-Channel Cognitive Radio Networks

Selective Sensing and Transmission for Multi-Channel Cognitive Radio Networks IEEE INFOCOM 2 Workshop On Cogntve & Cooperatve Networks Selectve Sensng and Transmsson for Mult-Channel Cogntve Rado Networks You Xu, Yunzhou L, Yfe Zhao, Hongxng Zou and Athanasos V. Vaslakos Insttute

More information

RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING

RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING Vaslos A. Srs Insttute of Computer Scence (ICS), FORTH and Department of Computer Scence, Unversty of Crete P.O. Box 385, GR 7 Heraklon, Crete,

More information

Dynamic Pricing Approach for Spectrum Allocation in Wireless Networks with Selfish Users

Dynamic Pricing Approach for Spectrum Allocation in Wireless Networks with Selfish Users Dynamc Prcng Approach for Spectrum Allocaton n Wreless Networks wth Selfsh Users Zhu J and K. J. Ray Lu Electrcal and Computer Engneerng Department and Insttute for Systems Research Unversty of Maryland,

More information

GNSS Integrity for Railway Transportation

GNSS Integrity for Railway Transportation GSS Integrty for Ralway Transportaton M. Jonáš Faculty of Electrcal Engneerng an Informatcs, Unversty of Parubce, Parubce, Czech Republc * Corresponng author: marek.jonas.stuent@upce.cz DOI: 10.478/v10158-011-0016-6

More information

Resource Control for Elastic Traffic in CDMA Networks

Resource Control for Elastic Traffic in CDMA Networks Resource Control for Elastc Traffc n CDMA Networks Vaslos A. Srs Insttute of Computer Scence, FORTH Crete, Greece vsrs@cs.forth.gr ACM MobCom 2002 Sep. 23-28, 2002, Atlanta, U.S.A. Funded n part by BTexact

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

Modelling Information Warfare as a Game

Modelling Information Warfare as a Game Modellng Informaton Warfare as a ame Jorma Jormakka and Jarmo V. E. Mölsä Department of echnology Natonal Defence College P.O. ox 7 FI-0086 Helsnk Fnland E-mal: orma.ormakka@ml.f Communcatons Laboratory

More information

An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks

An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks An Energy Effcent Herarchcal Clusterng Algorthm for Wreless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette, IN, USA {seema,

More information

CDMA Uplink Power Control as a Noncooperative Game

CDMA Uplink Power Control as a Noncooperative Game Wreless Networks 8, 659 670, 2002 2002 Kluwer Academc Publshers. Manufactured n The Netherlands. CDMA Uplnk Power Control as a Noncooperatve Game TANSU APCAN, TAMER BAŞAR and R. SRIKANT Coordnated Scence

More information

Rational Secret Sharing without Broadcast

Rational Secret Sharing without Broadcast Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept

More information

Traffic balancing over licensed and unlicensed bands in heterogeneous networks

Traffic balancing over licensed and unlicensed bands in heterogeneous networks Correspondence letter Traffc balancng over lcensed and unlcensed bands n heterogeneous networks LI Zhen, CUI Qme, CUI Zhyan, ZHENG We Natonal Engneerng Laboratory for Moble Network Securty, Bejng Unversty

More information

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET) A Novel Optmzaton of the Dstance Source Routng (DSR) Protocol for the Moble Ad Hoc Networs (MANET) Syed S. Rzv 1, Majd A. Jafr, and Khaled Ellethy Computer Scence and Engneerng Department Unversty of Brdgeport

More information

Queuing-Based Dynamic Channel Selection for Heterogeneous Multimedia Applications over Cognitive Radio Networks

Queuing-Based Dynamic Channel Selection for Heterogeneous Multimedia Applications over Cognitive Radio Networks 1 Queung-Based Dynamc Channel Selecton for Heterogeneous ultmeda Applcatons over Cogntve Rado Networks Hsen-Po Shang and haela van der Schaar Department of Electrcal Engneerng (EE), Unversty of Calforna

More information

INCENTIVIZING INFORMATION SHARING IN NETWORKS

INCENTIVIZING INFORMATION SHARING IN NETWORKS 204 IEEE Internatonal Conference on Acoustc, Speech and Sgnal Processng (ICASSP) INCENTIVIZING INFORMATION SHARING IN NETWORKS Je Xu, Yangbo Song, Mhaela van der Schaar Department of Electrcal Engneerng,

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

Journal of Chemical and Pharmaceutical Research, 2016, 8(4): Research Article

Journal of Chemical and Pharmaceutical Research, 2016, 8(4): Research Article Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2016, 8(4):788-793 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 Vrtual Force Coverage Enhancement Optmzaton Algorthm Based

More information

An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks

An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE INFOCOM 2010 proceedngs Ths paper was presented as part of the man Techncal

More information

Improved Detection Performance of Cognitive Radio Networks in AWGN and Rayleigh Fading Environments

Improved Detection Performance of Cognitive Radio Networks in AWGN and Rayleigh Fading Environments Improved Detecton Performance of Cogntve Rado Networks n AWGN and Raylegh Fadng Envronments Yng Loong Lee 1, Wasan Kadhm Saad, Ayman Abd El-Saleh *1,, Mahamod Ismal 1 Faculty of Engneerng Multmeda Unversty

More information

STRATEGIC INFORMATION DISSEMINATION IN ENDOGENOUS NETWORKS

STRATEGIC INFORMATION DISSEMINATION IN ENDOGENOUS NETWORKS Ffty-frst Annual Allerton Conference Allerton House, UIUC, Illnos, USA October 2-3, 203 STRATEGIC IFORMATIO DISSEMIATIO I EDOGEOUS ETWORKS Yu Zhan Department of Electrcal Enneern Unversty of Calforna,

More information

COMMUNICATION networks are expected to serve a. Delay-Aware Cross-Layer Design for Network Utility Maximization in Multi-Hop Networks

COMMUNICATION networks are expected to serve a. Delay-Aware Cross-Layer Design for Network Utility Maximization in Multi-Hop Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 5, MAY 2011 951 Delay-Aware Cross-Layer Desgn for Network Utlty Maxmzaton n Mult-Hop Networks Haozh Xong, Ruogu L, Atlla Erylmaz, an Eylem

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

A Preliminary Study of Information Collection in a Mobile Sensor Network

A Preliminary Study of Information Collection in a Mobile Sensor Network A Prelmnary Study of Informaton ollecton n a Moble Sensor Network Yuemng Hu, Qng L ollege of Informaton South hna Agrcultural Unversty {ymhu@, lqng1004@stu.}scau.edu.cn Fangmng Lu, Gabrel Y. Keung, Bo

More information

Graph Method for Solving Switched Capacitors Circuits

Graph Method for Solving Switched Capacitors Circuits Recent Advances n rcuts, ystems, gnal and Telecommuncatons Graph Method for olvng wtched apactors rcuts BHUMIL BRTNÍ Department of lectroncs and Informatcs ollege of Polytechncs Jhlava Tolstého 6, 586

More information

Characterization and Analysis of Multi-Hop Wireless MIMO Network Throughput

Characterization and Analysis of Multi-Hop Wireless MIMO Network Throughput Characterzaton and Analyss of Mult-Hop Wreless MIMO Network Throughput Bechr Hamdaou EECS Dept., Unversty of Mchgan 226 Hayward Ave, Ann Arbor, Mchgan, USA hamdaou@eecs.umch.edu Kang G. Shn EECS Dept.,

More information

Priority based Dynamic Multiple Robot Path Planning

Priority based Dynamic Multiple Robot Path Planning 2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

ENERGY EFFICIENT MILLIMETER WAVE RADIO LINK ESTABLISHMENT WITH SMART ARRAY ANTENNAS

ENERGY EFFICIENT MILLIMETER WAVE RADIO LINK ESTABLISHMENT WITH SMART ARRAY ANTENNAS ENERGY EFFICIENT MILLIMETER WVE RDIO LINK ESTLISHMENT WITH SMRT RRY NTENNS ehnam Neekzad, John S. aras Insttute for Systems Research and Electrcal and Computer Engneerng Department Unversty of Maryland

More information

Sliding Mode Controller with RBF Neural Network for Manipulator Trajectory Tracking

Sliding Mode Controller with RBF Neural Network for Manipulator Trajectory Tracking IAENG Internatonal Journal of Apple Mathematcs, 5:, IJAM_5 Slng Moe Controller wth RBF Neural Network for Manpulator rajectory rackng Hatao Zhang, Mengmeng Du an Wenshao Bu Abstract In orer to ecrease

More information

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game 8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang

More information

N( E) ( ) That is, if the outcomes in sample space S are equally likely, then ( )

N( E) ( ) That is, if the outcomes in sample space S are equally likely, then ( ) Stat 400, secton 2.2 Axoms, Interpretatons and Propertes of Probablty notes by Tm Plachowsk In secton 2., we constructed sample spaces by askng, What could happen? Now, n secton 2.2, we begn askng and

More information

The Investigation of the Obstacle Avoidance for Mobile Robot Based on the Multi Sensor Information Fusion technology

The Investigation of the Obstacle Avoidance for Mobile Robot Based on the Multi Sensor Information Fusion technology Internatonal Journal of Materals, Mechancs an Manufacturng, Vol. 1, o. 4, ovember 2013 The Investgaton of the Obstacle Avoance for Moble Robot Base on the Mult Sensor Informaton Fuson technology Qu Dongyue,

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

Multiband Jamming Strategies with Minimum Rate Constraints

Multiband Jamming Strategies with Minimum Rate Constraints Multband Jammng Strateges wth Mnmum Rate Constrants Karm Banawan, Sennur Ulukus, Peng Wang, and Bran Henz Department of Electrcal and Computer Engneerng, Unversty of Maryland, College Park, MD 7 US Army

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

Genetic Algorithm for Sensor Scheduling with Adjustable Sensing Range

Genetic Algorithm for Sensor Scheduling with Adjustable Sensing Range Genetc Algorthm for Sensor Schedulng wth Adjustable Sensng Range D.Arvudanamb #, G.Sreekanth *, S.Balaj # # Department of Mathematcs, Anna Unversty Chenna, Inda arvu@annaunv.edu skbalaj8@gmal.com * Department

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

Interdependent Relationships in Game Theory: A Generalized Model

Interdependent Relationships in Game Theory: A Generalized Model Interdependent elatonshps n Game Theory: A Generalzed Model Jawe L Independent researcher, Nottngham, UK Emal: Jawemchaell@gmalcom Abstract: A generalzed model of games s proposed, wth whch both cooperatve

More information

Multi-sensor optimal information fusion Kalman filter with mobile agents in ring sensor networks

Multi-sensor optimal information fusion Kalman filter with mobile agents in ring sensor networks Mult-sensor optmal nformaton fuson Kalman flter wth moble agents n rng sensor networs Behrouz Safarneadan *, Kazem asanpoor ** *Shraz Unversty of echnology, safarnead@sutech.ac.r ** Shraz Unversty of echnology,.hasanpor@gmal.com

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

Improved Cuckoo Search Algorithm with Novel Searching Mechanism for Solving Unconstrained Function Optimization Problem

Improved Cuckoo Search Algorithm with Novel Searching Mechanism for Solving Unconstrained Function Optimization Problem IAENG Internatonal Journal o Computer Scence, 44:, IJ_44 0 Improve Cuckoo Search Algorthm wth Novel Searchng Mechansm or Solvng Unconstrane Functon Optmzaton Problem Shu-Xa L, an Je-Sheng Wang Abstract

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,

More information

Use of ANFIS Control Approach for SSSC based Damping Controllers Applied in a Two-area Power System

Use of ANFIS Control Approach for SSSC based Damping Controllers Applied in a Two-area Power System Use of ANFIS Control Approach for SSSC base ampng Controllers Apple n a Two-area Power System. Mural, M. Rajaram 2 epartment of Electrcal an Electroncs Engneerng, Government College of Engneerng, Salem,

More information

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart Control Chart - hstory Control Chart Developed n 920 s By Dr. Walter A. Shewhart 2 Process n control A phenomenon s sad to be controlled when, through the use of past experence, we can predct, at least

More information

King s Research Portal

King s Research Portal Kng s Research Portal DOI: 10.1109/TWC.2015.2460254 Document Verson Peer revewed verson Lnk to publcaton record n Kng's Research Portal Ctaton for publshed verson (APA): Shrvanmoghaddam, M., L, Y., Dohler,

More information

Power Control for Wireless Data

Power Control for Wireless Data Power Control for Wreless Data Davd Goodman Narayan Mandayam Electrcal Engneerng WINLAB Polytechnc Unversty Rutgers Unversty 6 Metrotech Center 73 Brett Road Brooklyn, NY, 11201, USA Pscataway, NJ 08854

More information

Iterative Water-filling for Load-balancing in

Iterative Water-filling for Load-balancing in Iteratve Water-fllng for Load-balancng n Wreless LAN or Mcrocellular Networks Jeremy K. Chen Theodore S. Rappaport Gustavo de Vecana Wreless Networkng and Communcatons Group (WNCG), The Unversty of Texas

More information

A Strategy-Proof Combinatorial Heterogeneous Channel Auction Framework in Noncooperative Wireless Networks

A Strategy-Proof Combinatorial Heterogeneous Channel Auction Framework in Noncooperative Wireless Networks Ths s the author s verson of an artcle that has been publshed n ths journal. Changes were made to ths verson by the publsher pror to publcaton. The fnal verson of record s avalable at http://dx.do.org/1.119/tmc.214.2343624

More information

Reactive Tuning of Target Estimate Accuracy in Multi-Sensor Data Fusion

Reactive Tuning of Target Estimate Accuracy in Multi-Sensor Data Fusion eactve unng of arget Estmate Accuracy n Mult-Sensor Data Fuson Nng Xong a,*, enrk Chrstensen a, Per Svensson b a Center for Autonomous Systems, oyal Insttute of echnology, Stockholm b Department of Data

More information

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson 37th CDC, Tampa, December 1998 Analyss of Delays n Synchronous and Asynchronous Control Loops Bj rn Wttenmark, Ben Bastan, and Johan Nlsson emal: bjorn@control.lth.se, ben@control.lth.se, and johan@control.lth.se

More information

Topology Control for C-RAN Architecture Based on Complex Network

Topology Control for C-RAN Architecture Based on Complex Network Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton

More information

Adaptive Modulation for Multiple Antenna Channels

Adaptive Modulation for Multiple Antenna Channels Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,

More information

Multi-Robot Map-Merging-Free Connectivity-Based Positioning and Tethering in Unknown Environments

Multi-Robot Map-Merging-Free Connectivity-Based Positioning and Tethering in Unknown Environments Mult-Robot Map-Mergng-Free Connectvty-Based Postonng and Tetherng n Unknown Envronments Somchaya Lemhetcharat and Manuela Veloso February 16, 2012 Abstract We consder a set of statc towers out of communcaton

More information

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal

More information

An Adaptive Scheduling Algorithm for Set Cover Problem in Wireless Sensor Networks: A Cellular Learning Automata Approach

An Adaptive Scheduling Algorithm for Set Cover Problem in Wireless Sensor Networks: A Cellular Learning Automata Approach 2 3rd Internatonal Conference on Machne Learnng and Computng (ICMLC 2) n daptve chedulng lgorthm for et Cover Problem n Wreless ensor Networks: Cellular Learnng utomata pproach eza Ghader Computer Engneerng

More information

COMPARISON OF DIFFERENT BROADCAST SCHEMES FOR MULTI-HOP WIRELESS SENSOR NETWORKS 1

COMPARISON OF DIFFERENT BROADCAST SCHEMES FOR MULTI-HOP WIRELESS SENSOR NETWORKS 1 Internatonal Journal of Computer Networks & Communcatons (IJCNC), Vol., No.4, July 1 COMARISON OF DIFFERENT BROADCAST SCHEMES FOR MULTI-HO WIRELESS SENSOR NETWORKS 1 S. Mehta and K.S. Kwak UWB Wreless

More information

QoS Provisioning in Wireless Data Networks under Non-Continuously Backlogged Users

QoS Provisioning in Wireless Data Networks under Non-Continuously Backlogged Users os Provsonng n Wreless Data Networks under Non-Contnuously Backlogged Users Tmotheos Kastrnoganns, and Symeon Papavasslou, Member, IEEE School of Electrcal and Computer Engneerng Natonal Techncal Unversty

More information

A Unified Cross-Layer Framework for Resource Allocation in Cooperative Networks

A Unified Cross-Layer Framework for Resource Allocation in Cooperative Networks 3000 IEEE TRNSCTIONS ON WIRELESS COMMUNICTIONS, VOL. 7, NO. 8, UGUST 2008 Unfed Cross-Layer Framework for Resource llocaton n Cooperatve Networks We Chen, Member, IEEE, Ln Da, Member, IEEE, Khaled Ben

More information

A Simple Satellite Exclusion Algorithm for Advanced RAIM

A Simple Satellite Exclusion Algorithm for Advanced RAIM A Smple Satellte Excluson Algorthm for Advanced RAIM Juan Blanch, Todd Walter, Per Enge Stanford Unversty ABSTRACT Advanced Recever Autonomous Integrty Montorng s a concept that extends RAIM to mult-constellaton

More information

Intelligent Wakening Scheme for Wireless Sensor Networks Surveillance

Intelligent Wakening Scheme for Wireless Sensor Networks Surveillance The Frst Internatonal Workshop on Cyber-Physcal Networkng Systems Intellgent Wakenng Scheme for Wreless Sensor Networks Survellance Ru Wang, Le Zhang, L Cu Insttute of Computng Technology of the Chnese

More information

Adaptive Modulation and Coding for Utility Enhancement in VMIMO WSN Using Game Theory

Adaptive Modulation and Coding for Utility Enhancement in VMIMO WSN Using Game Theory Adaptve Modulaton and Codng for Utlty nhancement n VMIMO WSN Usng Game Theory R. Vall and P. Dananjayan mparments. The data transmtted from the sensor nodes s hghly susceptble to error n a wreless envronment

More information

A Game Theoretic Approach for Distributed Resource Allocation and Orchestration of Softwarized Networks

A Game Theoretic Approach for Distributed Resource Allocation and Orchestration of Softwarized Networks A Game Theoretc Approach for Dstrbuted Resource Allocaton and Orchestraton of Softwarzed Networks Salvatore D Oro, Laura Gallucco, Member, IEEE, Sergo Palazzo, Senor Member, IEEE, Govann Schembra Abstract

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information