University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ICC.2006.

Size: px
Start display at page:

Download "University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ICC.2006."

Transcription

1 Kaya, I., & Kocak, T. (2006). Energy-efficient pipelined bloo filters for network intrusion detection. IEEE International Conference on Counications, 5, DOI: /ICC Peer reviewed version Link to published version (if available): /ICC Link to publication record in Explore Bristol Research PDF-docuent University of Bristol - Explore Bristol Research General rights This docuent is ade available in accordance with publisher policies. Please cite only the published version using the reference above. Full ters of use are available:

2 Energy-Efficient Pipelined Bloo Filters for Network Intrusion Detection Ilhan Kaya and Taskin Kocak Departent of Electrical and Coputer Engineering University of Central Florida Orlando, FL e-ail: {ikaya, Abstract Software-based detection techniques are coonly used to identify the predefined signatures in network streas. However, the software-based techniques can not keep up with the speeds that network bandwidth increases. Hence, hardwarebased systes have started to eerge. Bloo filters are frequently used to identify alicious content like viruses in high speed networks. However, architectures proposed to ipleent Bloo filters are not power efficient. We propose a new Bloo filter architecture that exploits the well-known pipelining technique. Through extensive power analysis we show that pipelining can reduce the power consuption of Bloo filters up to 90 %, which leads to the energy-efficient ipleentation of network intrusion detection systes. I. INTRODUCTION Nowadays, there are plenty of software progras installed to keep coputer systes clean. Many of the are used in ipleentation of network intrusion detection systes(nids). These progras have to identify the alicious content such as internet wors and viruses in network packets. Applications providing intrusion detection, virus prevention, and content filtering have not kept pace with the increase in network speeds since they lack hardware functionality supporting the. There is a need to scan entire network packets bit by bit to deterine predefined signatures for viruses and wors. Before the packets are processed by the upper OSI layers, alicious packets has to be dropped by a device. Bloo filters [2] are used in such devices to atch strings, like snort rules [11]. Bloo filters have been used for any network applications like web cache sharing [6], resource routing [5], string atching [1] [7]. A hardware syste, consisting of Bloo filters to detect alignant content, is described in [7]. A detailed survey of Bloo filters for networking applications can be found in [3]. Although Bloo filters have found wide spread usage in networking applications, they are not conservative in ters of power. In order to decrease power consuption of Bloo filters, we eploy pipelining technique in the architecture of Bloo filters. The new type of Bloo filters are called as pipelined Bloo filters. In this paper, we propose a hardware syste consisting of pipelined Bloo filters as an energyefficient network intrusion detection syste. Furtherore, after atheatical analysis, intrusion detection syste is shown to be uch power efficient than the one consists of regular Bloo filters so far. II. PIPELINED BLOOM FILTERS In this section, first we introduce Bloo filters, and then we go on to explain pipelined Bloo filters architecture. Power analysis will follow in a coparative anner. A. Bloo Filters A Bloo filter is a data structure that stores a given set of signatures. In addition, it provides efficient ebership queries on the signature set. Two operations on the Bloo filters are defined as prograing and querying. Fig. 1. A Bloo Filter with k hash functions A typical Bloo filter is illustrated in Fig. 1. First, a Bloo filter coputes k any hash functions on each eber of the signature set. Consequently, it sets the bits on the -bit long lookup vector at the indices pointed by hash values. As for the querying, the Bloo filter coputes the sae hash functions used in the prograing for each input. Then it looks up the bit values located on the offsets (coputed hash values) on the bit vector, and, if it finds any bit unset at those addresses, it declares the input string to be a noneber of the signature set, which is called a isatch. Otherwise, if it finds all the bits are set, it concludes that input string ay be a eber of the signature set with a certain probability (false positive probability). This is called a atch. In [7], the false positive probability f is calculated by, ) k f = (1 e nk (1) /06/$20.00 (c) 2006 IEEE

3 where n is the nuber of signatures prograed into the bloo filter, is the length of the lookup vector, and k is the nuber of hash functions used to ipleent the Bloo filter. In addition, the authors find an optiu value of the nuber of hash functions, k=35, for an average nuber of bits allocated to per signature n = 50. Furtherore, they show that the false positive probability is on the orders of A single Bloo filter uses k any hash functions in order to ake a decision on the input. Hence the power consuption of a Bloo filter shown in Fig. 1 is a suation of the power consuptions of each of the hash functions, P Hi, with the lookup operation, P L, followed, plus an AND operation. P BFregular = (P Hi + P L )+P AND (2) Power consuption of an AND gate is ignored hereafter, since it is inial copared to the power used by the hash functions. The power consuption equation for a single Bloo filter siply becoes the total power used up by the hash functions and the power consued by querying the -bit vector for each hash value. P BFregular = (P Hi + P L ) (3) Hash functions used in the Bloo filters are generally of type universal hash functions [4]. The perforance of universal hash functions are explored by Raakrishna et al [9]. The power consuptions of different hash function ipleentations in hardware have been easured by Yuksel [12]. Yuksel akes use of the ulti-hashing [10] technique. Multi-hashing divides the input into saller pieces. Different universal hash functions fro the sae faily applied to these input pieces. Eventually results are concatenated to for the desired hash value without increasing the hash collision probability. Yuksel has coe up with different hash function ipleentations over word sizes of 64 bits, 32 bits, 16 bits. Aongst the different hash functions analyzed in [12], the ost power efficient hash function for a fixed frequency is Weighted NH Polynoial with Reduction, WH. This hash function is a derivative of the Universal Hash functions. Hence we use 16-bit, 32-bit, 64-bit WH faily of hash functions in the Bloo filters whenever hash functions are able to process the input fed to the syste. A WH faily of hash functions can process input as twice as longer than the word size used in ipleentation, for instance a 16-bit WH can process up to 32-bit strings including 32-bit input. In order to copare the power consuption of regular Bloo filters to that of a pipelined Bloo filter, we use 16- bit ipleentation of hash functions. All of the k any hash functions are of type 16-bit WH hash functions, so Equ. 3 becoes P BFregular = (P + P Hi(WH16 ) L)=k.(P WH16 + P L ) (4) B. Pipelined Bloo Filters Basically, a pipelined Bloo filter, as shown in Fig. 2, consists of two groups of hash functions. The first stage always coputes the hash values. By contrast, the second stage of hash functions only copute the hash values if in the first stage there is a atch between the input and the signature sought. Fig. 2. A 2-Stage pipelined Bloo filter The pipelined Bloo filters will have the sae nuber of hash functions as the regular Bloo filters. A pipelined Bloo filter exploits the virus free nature of the network traffic at ost of the tie. At worst, it will operate like a regular Bloo filter, which uses all of the hash functions before aking a decision on the type of the input. However, ost of the tie the first group of hash functions will result in a isatch. The advantage of using a pipelined Bloo filter is if the first stage catches a isatch, there is no need to use the second stage in order to decide whether the input string is a eber of the signature set. By following a siilar analysis of [8], we begin to derive the total power consuption of the pipelined Bloo filter. We assue that the hash functions used in each Bloo filter is perfectly rando. Overall, we have k-any rando universal hash functions in a pipelined Bloo filter. In the first stage, r-any of the are utilized. The nuber of signatures sought in a Bloo filter is given as n as before. Let us first derive the probability of atch in the first stage. The probability that a bit is still unset after all the signatures are prograed into the pipelined Bloo filter by using k- any independent hash functions is α. α = ( 1 1 ) kn e kn (for large ) (5) where 1 represents any one of the bits set by a single hash function operating on a single signature. Then ( ) 1 1 is the probability that the bit is unset after a single hash value coputation with a single signature. For it to reain unset, it should not be set by any of the k-any hash functions each 2383

4 operating on all of the n-any signatures in the signature set. Consequently, the probability that any one of the bits is set is (1 α) 1 e kn (6) In order for the first stage to produce a atch, the bits indexed by all r of the independent rando hash functions should be set. So the atch probability of the first stage is, represented as p, p = r (1 α) =(1 α) r (1 e kn ) r With a probability of (1-p) the first stage of the hash functions in the pipelined Bloo filter will produce a isatch. Otherwise, the first stage produces a atch, then the second stage is used to copare the input with the signature sought. Therefore the power consuption of a pipelined Bloo filter is given by P BF pipeline = P 1st stage + P {atch} P 2nd stage P BF pipeline = (P Hi + P L )+p (P Hj + P L ) (7) +P AND (8) By oitting P AND and selecting P Hi, j are of type 16-bit WH, and substituting Equ. 7 into Equ. 8 power consuption of a pipelined Bloo filter becoes P BFpipeline = (P + P Hi(WH16 ) L) +(1 e kn ) r = r.(p WH16 + P L )+ (P Hj(WH16 ) + P L) (1 e kn ) r (k r)(p WH16 + P L ) (9) The power saving ratio, PSR, in a single Bloo filter by deploying pipelining technique can be calculated as PSR = (P regular P pipelined ) Pregular (10) By substituting Equ. 4 and Equ. 9 into Equ. 10, the average power saving ratio, PSR, is given by ( [ ] ) k A r +(1 e kn ) r (k r) A PSR = k A (11) where A =(P WH16 +P L ). After siplifying As, PSR, is found out to be PSR = kn k r +(r k)(1 e ) r For different values of the nuber of bits allocated to per signature, n, power savings over the nuber of hash functions utilized in the first stage are illustrated in Fig. 3. k Power Saving Ratio, PSR /n=25 /n=50 /n= Nuber of hash functions in the first stage of pipelined Bloo filters, r Fig. 3. Power saving ratio in pipelined Bloo filters w.r.t. nuber of hash functions utilized in the first stage As it is shown in Fig. 3, the nuber of bits per signature, n, increases, the aount of power conserved in the syste increases. In other words, the power saving ratio becoes larger as n increases. This is because, the lesser are the nuber of hash functions deployed in first stage copared to the overall syste, the ore the power is saved. Another fact illustrated in Fig. 3 is that as the nuber of hash functions utilized in the first stage increases, the power saving ratio, PSR, first increases to an optiu PSR value, thereafter it drops gradually. The increase in the power saving ratio to an threshold value stes fro the fact that increasing the nuber of hash functions in the first stage increases the probability of isatch, thus second stage is not utilized to decide on an input. After this optiu is exceeded, PSR decreases steadily. If we increase the nuber of hash functions used in the first stage to such a degree that all hash functions in the syste deployed in the first stage, there reain no power gain at all (i.e., the syste behaves just like a regular Bloo filter.) III. POWER CONSUMPTION ANALYSIS OF AN INTRUSION DETECTION SYSTEM BASED ON PIPELINED BLOOM FILTERS In this section, we analyze the power consuption of a Bloo filter based NIDS given in [7]. The syste block diagra is illustrated in Fig. 4. The syste consists of parallel Bloo filters prograed to detect a group of predefined signatures. Each Bloo filter operates on a different length of input. The length of the input scanned by a Bloo filter is constricted by the length of the signature sought. All Bloo filters onitor the network traffic which enters into syste with a rate of one byte per cycle. Syste verifies whether there is a alicious content hidden in the packet payload. Power analysis of the syste follows in two sections. A. Syste relying on regular Bloo Filters In this case, the syste illustrated in Fig. 4 consists of regular bloo filters. Each Bloo filter operates on different length of inputs. Total power consuption of the syste is 2384

5 Fig. 4. Syste view of a Bloo filter engine [7] the suation of the power used by individual Bloo filters. There are (L ax L in ) Bloo filters in the syste. L ax is the axiu length of input, and L in is the iniu length of input processed by a Bloo filter. Hence the total power consuption is given by P TOTAL = L ax i=l in P BFi (14) where P BFi is the power dissipated through the i th Bloo filter. Let s develop the Equ. 14 as follows P TOTAL = P BFlin +P +P BF(lin +1) BF +...+P (lin +2) BF (l ax) (15) where P BFlin stands for the total power dissipated through the Bloo filter processing L in long input. Each Bloo filter in the syste takes different length inputs as pointed out before. By substituting Equ. 3 into the Equ. 14, P TOTAL = P lin + P (lin+1) +... P lax (16) P lin is the power dissipation of the i th hash function located inside the Bloo filter processing l in long input. We consider a syste with l in =3bytes and l ax = 32 bytes. We assue that lookup power is ignorable in the following analysis. We begin the analysis with calculating the power consuption of a 3-byte input processing Bloo filter. 3-byte input length is saller than 32-bit, which can be processed by a WH 16 type of hash function. We can divide the input into two halves. 8 bits are zero padded to the second half, which does not change the hash value coputed, since bitwise AND operation akes contribution of these bits 0. P BF3 byte = P Hi(WH 16) = k.p WH16 (17) Siilarly, 4-byte processing Bloo filter uses WH-16 type of hash functions without the input padding. P BF4 byte = P Hi(WH 16) = k.p WH16 (18) 5-byte are larger than 32 bits, and can t be processed by a WH 16. This type of input requires WH 32, which can process up to 8 byte. The reaining 24 bits are zero padded to the input. Hence, P BF5 byte = P Hi(WH 32) = k.p WH32 (19) A WH 32 is used in the construction of 6-byte, 7-byte and 8- byte long input processing Bloo filters. Power consuption of Bloo filters corresponding to these length input is equal to the 5-byte input processing Bloo filter. P BF6 byte = P Hi(WH 32) = k.p WH32 = P BF7 byte = P BF8 byte (20) As for the 9-byte input processing Bloo filter, a WH 32 can t be enough without ulti-hashing. Hence, WH 64 is needed with zero padded input. P BF9 byte = P Hi(WH 64) = k.p WH64 (21) Since a WH with a word size of 64 bit can process up to 128 bits long input, all the Bloo filters processing input in the range of 9 byte to 16 byte, including the 16 byte, can be ipleented with a WH 64. Their power consuptions are equal. P BF10 byte = P Hi(WH 64) = k.p WH64 P BF9 byte = P BF10 byte =... = P BF16 byte (22) After 128 bit long input we have to use the ulti-hashing ethod, and divide the input into 32 bit long and 128 bit long input, and ake zero padding if necessary until input length exceeds 160. By this way, it is possible that one WH 64 and one WH 16 will be enough to calculate hash function over 17 to 20 byte long inputs. So the power consuption of the Bloo filters operating on 17-byte to 20 byte long input is P BF17 byte = (P Hi(WH 64)+P Hi(WH 16)) = k.p WH64 + k.p WH16 P BF17 byte = P BF18 byte =... = P BF20 byte (23) In a siilar anner, again by aking use of ulti-hashing and zero padding whenever necessary, hash functions inside in Bloo filters operating on range of 21 to 24 byte input, ake use of one WH 64 and one WH 32. All the Bloo filters calculating hash values over the inputs fro 21 bytes long 2385

6 till 24 bytes, consues the sae power as 21-byte long input processing Bloo filter, which is shown below. P BF21 byte = (P Hi(WH 64)+P Hi(WH 32)) = k.p WH64 + k.p WH32 (24) = P BF21 byte = P BF22 byte =... = P BF24 byte 25-byte long input requires two WH 64 s. 200 bits exceed the capacity given by one WH 64 and one WH 32, which adds up to 24-byte input processing. Two WH 64 s are capable of processing 32-byte input strings, so all the Bloo filter engines operating on the range of input 25 bytes to 32 bytes long consues the sae aount of power. Again ulti-hashing is used to copute hash values over such long input streas. P BF25 byte = (P Hi(WH 64)+P Hi(WH 64)) =2.k.P WH64 P BF25 byte = P BF26 byte =... = P BF32 byte (25) By substituting the above values into the total power consuption Equ.16, power consuption of the Bloo filter engine shown in Fig. 4 is given as P TOTAL = P BF3 byte + P BF4 byte + P BF5 byte P BF(32 byte) P TOTAL = k.p WH16 + k.p WH16 + [3 4] k.p WH k.p WH32 [5 8] k.p WH k.p WH64 [9 16] k.(p WH64 + P WH16 ) k.(p WH64 + P WH16 ) + [17 20] k.(p WH64 + P WH32 ) k.(p WH64 + P WH32 ) + [21 24] 2.k.P WH k.(P WH64 ) (26) [25 32] which siplifies to Equ. 27 P TOTAL = k.(6.p WH16 +8.P WH P WH64 ) (27) B. Syste relying on pipelined Bloo Filters By following a siilar approach used in the regular Bloo filter analysis, we will calculate the total power consuption of the pipelined Bloo filter architecture shown in Fig. 4. The total power consuption in the syste is given as in Equ. 16. Each individual power consuption of pipelined Bloo filters is calculated based on the length of the input that enters into each pipelined Bloo filter. 3-byte long input is processed by a WH 16 owing to ultihashing. The power consuption of a pipelined 3-byte input processing Bloo filter, P PBF3 byte, can be calculated by using Equ. 8 P PBF3 byte = (P Hi(WH 16))+p + + P Hj(WH 16) = r.p WH16 + p.(k r)p WH16 (28) In order to process 4-byte input, WH 16 is used as hash function ipleentation. Hence, they consue the sae power as 3-byte input case. P PBF3 byte = P PBF4 byte (29) As for the 40 bits input, a WH 16 can not process the input, thus a WH 32 can handle that long input as uch as 64 bits long. As a result, 5-byte long input processing Bloo filter consues the sae power as 6, 7,and 8-byte long input processing ones. P PBF5 byte = (P Hi(WH 32))+p P Hj(WH 32) = r.p WH32 + p (k r)p WH32 P PBF5 byte = P PBF6 byte =... = P PBF8 byte (30) 9-byte input processing can not be handled with a WH 32, but a WH 64 type of hash function can handle as uch as 16- byte inputs, so all the Bloo filters processing input length of 9 to 16 bytes, are using a single WH 64 as hash function ipleentation. P PBF9 byte = (P Hi(WH 64))+p = r.p WH64 + p (k r)p WH64 P Hj(WH 64) P PBF9 byte = P PBF10 byte =... = P PBF16 byte (31) 17-byte input processing will require ulti-hashing, by using WH 64 and WH 16, in parallel, coputes hash values on input strings of length varying fro 17 to 20 bytes. P PBF17 byte = (P Hi(WH 64)+P Hi(WH 16))+ p = r.(p WH16 + P WH64 )+ (P Hj(WH 64) + P Hj(WH 16)) p (k r)(p WH16 + P WH64 ) P PBF17 byte = P PBF18 byte =... = P PBF20 byte (32) In a siilar anner, 21-byte to 24-byte input processing can be done by using a WH 64 and WH 32 in parallel due to the principle of ulti-hashing. Power consuption of 21 to 24 bytes long input processing Bloo filter is equal to each other and given by P PBF21 byte = (P Hi(WH 64)+P Hi(WH 32))+ p = r.(p WH32 + P WH64 )+ (P Hj(WH 64) + P Hj(WH 32)) p (k r)(p WH32 + P WH64 ) P PBF21 byte = P PBF22 byte =... = P PBF24 byte (33) 2386

7 25-byte long input requires two WH 64 in parallel. Pipelined Bloo filters operating in range 25 bytes to 32 bytes have the sae power consuption, and the power consuption is given by P PBF25 byte = (2.P Hi(WH 64))+ p (2.P Hj(WH 64)) = r.2.p WH64 + p (k r)2.p WH64 P PBF25 byte = P PBF26 byte =... = P PBF32 byte (34) Total power consuption of the syste consisting of pipelined Bloo filters is given by, P TOTAL = 6.[r + p(k r)].p WH [r + p(k r)].p WH [r + p.(k r)].p WH64 P TOTAL = [r + p.(k r)] (6P WH16 +8P WH32 +32P WH64 ) (35) By substituting p fro Equ. 7 into the total power consuption in Equ. 35, ] P TOTAL = [r +(1 e kn ) r (k r) (6P WH16 +8P WH32 +32P WH64 ) (36) After substituting the power consuption values of 16 bits, 32 bits, and 64 bits WH type of hash functions fro [12], the total power consuption of a pipelined Bloo filter based NIDS is plotted in Fig. 5. For different values of bits per signature, n, total power consuption vs. nuber of hash functions in the first stage is illustrated. The total power consuption iniized for all of the n values when the nuber of hash functions in the first stage is approxiately 5. Before this threshold value, the atch probability is such large that ost of the tie second stage of hash functions are used to deterine the outcoe of the filter, so the total power consuption increases. After the threshold value, the nuber of hash functions utilized in the first stage increases, which results in the increase of the overall the power consuption of the syste. IV. CONCLUSION We propose to pipeline the hash functions in the Bloo filters that are used in network intrusion detection systes. Analytical results show that pipelining technique significantly decreases the total power consuption of a Bloo filter up to 90%. These type of Bloo filters are especially power efficient when the network is not alignantly congested. It is shown that the less the nuber of hash functions is ipleented in the fist stage of a pipelined Bloo filter, the ore the power consuption is. It is also true that the nuber of bits allocated to per signature, n, affects the power saving ratio in a pipelined Bloo filter. The pipelined Bloo filters are ore Total Power Consuption, µw Total Power Consuption, µw /n=100 /n=50 /n= Nuber of hash functions in the first stage, r /n=100 /n=50 /n= Nuber of hash functions in the first stage, r Fig. 5. Total power consuption w.r.t. the nuber of hash functions utilized in the first stage appropriate when ipleenting network intrusion detection systes, since they are consuing less power copared to the regular Bloo filters. The selection of the hash functions to be deployed in the first stage of a pipelined Bloo filter is another crucial aspect, and it is left as a future work. REFERENCES [1] M. Attig, S. Dharapurikar, and J.L. Lockwood. Ipleentation Results of Bloo Filters for String Matching, Proc. of IEEE Syposiu on Field-Prograable Custo Coputing Machines, pp Washington, DC., [2] B. Bloo, Space/Tie Trade-Offs in Hash Coding with Allowable Errors, Coun. ACM, vol. 13, no. 7, pp , July [3] A. Broder and M. Mitzenacher, Network Applications of Bloo Filters: A Survey, Internet Matheatics, vol. 1, no. 4, pp , July [4] J. L. Carter and M. Wegan, Universal classes of hash functions, Journal of Coputer and Syste Sciences, vol. 18, pp , [5] S. Czerwinski, B. Y. Zhao, T. Hodes, A. D. Joseph, and R. Katz. An Architecture for a Secure Service Discovery Service, Proc. ACM/IEEE International Conference on Mobile Coputing and Networking Transactions on Networking, pp New York, [6] L. Fan, P. Cao, J. Aleida, A. Z. Broder. Suary Cache: A Scalable Wide-Area Web Cache Sharing Protocol, IEEE/ACM Transactions on Networking, vol. 8, no. 3, pp , [7] S. Dharapurikar, P. Krishnaurthy, T.S. Sproull, and J. W. Lockwood, Deep Packet Inspection Using Parallel Bloo Filters, IEEE Micro, vol. 24, no. 1, pp , [8] M. Mitzenacher, Copressed Bloo filters, IEEE/ACM Transactions on Networking, vol. 10, no. 5, pp , October, [9] M. Raakrishna, E. Fu, and E. Bahcekapili, Efficient Hardware Hashing Functions for High Perforance Coputers, IEEE Transactions on Coputers, vol. 48, no. 12, pp , [10] P. Rogaway, Bucket Hashing and Its Application to Fast Message Authentication, Journal of Cryptology, vol. 12, no. 2, pp , [11] The Sourcefire Vulnerability Research Tea, Official Snort Ruleset, Sourcefire, Inc., Colubia, MD, August (web: [12] K. Yuksel, Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications, MS Thesis,Worcester Polytechnic Institute,

Adaptive Harmonic IIR Notch Filter with Varying Notch Bandwidth and Convergence Factor

Adaptive Harmonic IIR Notch Filter with Varying Notch Bandwidth and Convergence Factor Journal of Counication and Coputer (4 484-49 doi:.765/548-779/4.6. D DAVID PUBLISHING Adaptive Haronic IIR Notch Filter with Varying Notch Bandwidth and Convergence Factor Li Tan, Jean Jiang, and Liango

More information

A New Localization and Tracking Algorithm for Wireless Sensor Networks Based on Internet of Things

A New Localization and Tracking Algorithm for Wireless Sensor Networks Based on Internet of Things Sensors & Transducers 203 by IFSA http://www.sensorsportal.co A New Localization and Tracking Algorith for Wireless Sensor Networks Based on Internet of Things, 2 Zhang Feng, Xue Hui-Feng, 2 Zhang Yong-Heng,

More information

Implementation of Adaptive Viterbi Decoder

Implementation of Adaptive Viterbi Decoder Ipleentation of Adaptive Viterbi Decoder Devendra Made #1 VIII Se B.E.(Etrx) K.D.K.College of Engineering, Nagpur, Maharashtra(I) Asst. Prof. R.B. Khule *2 M.Tech V.L.S.I. K.D.K.College of Engineering,

More information

Allocation of Multiple Services in Multi-Access Wireless Systems

Allocation of Multiple Services in Multi-Access Wireless Systems Allocation of Multiple Serices in Multi-Access Wireless Systes Anders Furuskär Wireless@KTH, Royal Institute of Technology, Sweden and Ericsson Research anders.furuskar@era.ericsson.se Abstract This paper

More information

Power Improvement in 64-Bit Full Adder Using Embedded Technologies Er. Arun Gandhi 1, Dr. Rahul Malhotra 2, Er. Kulbhushan Singla 3

Power Improvement in 64-Bit Full Adder Using Embedded Technologies Er. Arun Gandhi 1, Dr. Rahul Malhotra 2, Er. Kulbhushan Singla 3 Power Iproveent in 64-Bit Full Adder Using Ebedded Technologies Er. Arun Gandhi 1, Dr. Rahul Malhotra 2, Er. Kulbhushan Singla 3 1 Departent of ECE, GTBKIET, Chhapianwali Malout, Punjab 2 Director, Principal,

More information

Intermediate-Node Initiated Reservation (IIR): A New Signaling Scheme for Wavelength-Routed Networks with Sparse Conversion

Intermediate-Node Initiated Reservation (IIR): A New Signaling Scheme for Wavelength-Routed Networks with Sparse Conversion Interediate-Node Initiated Reservation IIR): A New Signaling Schee for Wavelength-Routed Networks with Sparse Conversion Kejie Lu, Jason P. Jue, Tiucin Ozugur, Gaoxi Xiao, and Irich Chlatac The Center

More information

Keywords: International Mobile Telecommunication (IMT) Systems, evaluating the usage of frequency bands, evaluation indicators

Keywords: International Mobile Telecommunication (IMT) Systems, evaluating the usage of frequency bands, evaluation indicators 2nd International Conference on Advances in Mechanical Engineering and Industrial Inforatics (AMEII 206) Entropy Method based Evaluation for Spectru Usage Efficiency of International Mobile Telecounication

More information

Power Optimal Signaling for Fading Multi-access Channel in Presence of Coding Gap

Power Optimal Signaling for Fading Multi-access Channel in Presence of Coding Gap Power Optial Signaling for Fading Multi-access Channel in Presence of Coding Gap Ankit Sethi, Prasanna Chaporkar, and Abhay Karandikar Abstract In a ulti-access fading channel, dynaic allocation of bandwidth,

More information

Design and Implementation of Block Based Transpose Form FIR Filter

Design and Implementation of Block Based Transpose Form FIR Filter Design and Ipleentation of Bloc Based Transpose For FIR Filter O. Venata rishna 1, Dr. C. Venata Narasihulu 2, Dr.. Satya Prasad 3 1 (ECE, CVR College of Engineering, Hyderabad, India) 2 (ECE, Geethanjali

More information

Alternative Encoding Techniques for Digital Loudspeaker Arrays

Alternative Encoding Techniques for Digital Loudspeaker Arrays Alternative Encoding Techniques for Digital Loudspeaer Arrays Fotios Kontoichos, Nicolas Alexander Tatlas, and John Mourjopoulos Audio and Acoustic Technology Group, Wire Counications Laboratory, Electrical

More information

TESTING OF ADCS BY FREQUENCY-DOMAIN ANALYSIS IN MULTI-TONE MODE

TESTING OF ADCS BY FREQUENCY-DOMAIN ANALYSIS IN MULTI-TONE MODE THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volue 5, Nuber /004, pp.000-000 TESTING OF ADCS BY FREQUENCY-DOMAIN ANALYSIS IN MULTI-TONE MODE Daniel BELEGA

More information

DSI3 Sensor to Master Current Threshold Adaptation for Pattern Recognition

DSI3 Sensor to Master Current Threshold Adaptation for Pattern Recognition International Journal of Signal Processing Systes Vol., No. Deceber 03 DSI3 Sensor to Master Current Threshold Adaptation for Pattern Recognition David Levy Infineon Austria AG, Autootive Power Train Systes,

More information

Introduction Traditionally, studying outage or cellular systes has been based on the signal-to-intererence ratio (SIR) dropping below a required thres

Introduction Traditionally, studying outage or cellular systes has been based on the signal-to-intererence ratio (SIR) dropping below a required thres Miniu Duration Outages in Rayleigh Fading Channels Jie Lai and Narayan B. Mandaya WINLAB, Rutgers University 73 Brett Rd., Piscataway, NJ 8854-86 Eail: jlai@winlab.rutgers.edu, narayan@winlab.rutgers.edu

More information

A 1.2V rail-to-rail 100MHz amplifier.

A 1.2V rail-to-rail 100MHz amplifier. University of Michigan, EECS413 Final project. A 1.2V rail-to-rail 100MHz aplifier. 1 A 1.2V rail-to-rail 100MHz aplifier. Mark Ferriss, Junghwan Han, Joshua Jaeyoung Kang, University of Michigan. Abstract

More information

Analysis on DV-Hop Algorithm and its variants by considering threshold

Analysis on DV-Hop Algorithm and its variants by considering threshold Analysis on DV-Hop Algorith and its variants by considering threshold Aanpreet Kaur 1, Pada Kuar 1, Govind P Gupta 2 1 Departent of Coputer Science & Engineering Jaypee Institute of Inforation Technology,

More information

ELEC2202 Communications Engineering Laboratory Frequency Modulation (FM)

ELEC2202 Communications Engineering Laboratory Frequency Modulation (FM) ELEC Counications Engineering Laboratory ---- Frequency Modulation (FM) 1. Objectives On copletion of this laboratory you will be failiar with: Frequency odulators (FM), Modulation index, Bandwidth, FM

More information

Distributed Resource Allocation for Proportional Fairness in Multi-Band Wireless Systems

Distributed Resource Allocation for Proportional Fairness in Multi-Band Wireless Systems Distributed Resource Allocation for Proportional Fairness in Multi-Band Wireless Systes I-Hong Hou CSL and Departent of CS University of Illinois Urbana, IL 61801, USA ihou2@illinois.edu Piyush Gupta Bell

More information

UNIT - II CONTROLLED RECTIFIERS (Line Commutated AC to DC converters) Line Commutated Converter

UNIT - II CONTROLLED RECTIFIERS (Line Commutated AC to DC converters) Line Commutated Converter UNIT - II CONTROLLED RECTIFIERS (Line Coutated AC to DC converters) INTRODUCTION TO CONTROLLED RECTIFIERS Controlled rectifiers are line coutated ac to power converters which are used to convert a fixed

More information

Interference Management in LTE Femtocell Systems Using Fractional Frequency Reuse

Interference Management in LTE Femtocell Systems Using Fractional Frequency Reuse Interference Manageent in LTE Fetocell Systes Using Fractional Frequency Reuse Poongup Lee and Jitae Shin School of Inforation and Counication Engineering Sungyunwan University, Suwon, 440-746, Korea {poongup,

More information

Performance Analysis of Reversible Fast Decimal Adders

Performance Analysis of Reversible Fast Decimal Adders Proceedings of the World Congress on Engineering and Coputer Science 7 WCECS 7, October 4-6, 7, San rancisco, USA Perforance Analysis of Reversible ast Decial Adders Rekha K. Jaes, Shahana T. K., K. Poulose

More information

Investigating Multiple Alternating Cooperative Broadcasts to Enhance Network Longevity

Investigating Multiple Alternating Cooperative Broadcasts to Enhance Network Longevity Investigating Multiple Alternating Cooperative Broadcasts to Enhance Network Longevity Aravind Kailas School of Electrical and Coputer Engineering Georgia Institute of Technology Atlanta, Georgia 3033-050,

More information

FORWARD MASKING THRESHOLD ESTIMATION USING NEURAL NETWORKS AND ITS APPLICATION TO PARALLEL SPEECH ENHANCEMENT

FORWARD MASKING THRESHOLD ESTIMATION USING NEURAL NETWORKS AND ITS APPLICATION TO PARALLEL SPEECH ENHANCEMENT FORWARD MASKING THRESHOLD ESTIMATION USING NEURAL NETWORKS AND ITS APPLICATION TO PARALLEL SPEECH ENHANCEMENT T. S. GUNAWAN 1, O. O. KHALIFA 1, E. AMBIKAIRAJAH 2 1 Electrical and Coputer Engineering Departent,

More information

Experiment 7: Frequency Modulation and Phase Locked Loops October 11, 2006

Experiment 7: Frequency Modulation and Phase Locked Loops October 11, 2006 Experient 7: Frequency Modulation and Phase ocked oops October 11, 2006 Frequency Modulation Norally, we consider a voltage wave for with a fixed frequency of the for v(t) = V sin(ω c t + θ), (1) where

More information

COMBINED FREQUENCY AND SPATIAL DOMAINS POWER DISTRIBUTION FOR MIMO-OFDM TRANSMISSION

COMBINED FREQUENCY AND SPATIAL DOMAINS POWER DISTRIBUTION FOR MIMO-OFDM TRANSMISSION The 8th nnual IEEE International Syposiu on Personal, Indoor and Mobile Radio Counications (PIMRC 07) COMINED FREQUENCY ND SPTIL DOMINS POWER DISTRIUTION FOR MIMO-OFDM TRNSMISSION Wladiir ocquet, Kazunori

More information

Distributed Power Delivery for Energy Efficient and Low Power Systems

Distributed Power Delivery for Energy Efficient and Low Power Systems Distributed Power Delivery for Energy Efficient and Low Power Systes Selçuk Köse Departent of Electrical Engineering University of South Florida Tapa, Florida 33620 kose@usf.edu Eby G. Friedan Departent

More information

A New Simple Model for Land Mobile Satellite Channels

A New Simple Model for Land Mobile Satellite Channels A New Siple Model for Land Mobile Satellite Channels A. Abdi, W. C. Lau, M.-S. Alouini, and M. Kaveh Dept. of Elec. and Cop. Eng., University of Minnesota, Minneapolis, MN 55455 Eails: {abdi, wlau, alouini,

More information

Energy-Efficient Cellular Communications Powered by Smart Grid Technology

Energy-Efficient Cellular Communications Powered by Smart Grid Technology Energy-Efficient Cellular Counications Powered by Sart Grid Technology Itiaz Nasi, Mostafa Zaan Chowdhury, and Md. Syadus Sefat Departent of Electrical and Electronic Engineering Khulna University of Engineering

More information

Transmit Power and Bit Allocations for OFDM Systems in a Fading Channel

Transmit Power and Bit Allocations for OFDM Systems in a Fading Channel Transit Power and Bit Allocations for OFD Systes in a Fading Channel Jiho Jang *, Kwang Bok Lee, and Yong-Hwan Lee * Sasung Electronics Co. Ltd., Suwon P.O.Box, Suwon-si, Gyeonggi-do 44-74, Korea School

More information

Real Time Etch-depth Measurement Using Surface Acoustic Wave Sensor

Real Time Etch-depth Measurement Using Surface Acoustic Wave Sensor Australian Journal of Basic and Applied Sciences, (8): -7, 1 ISSN 1991-8178 Real Tie Etch-depth Measureent Using Surface Acoustic Wave Sensor 1 Reza Hosseini, Navid Rahany, 3 Behrad Soltanbeigi, Rouzbeh

More information

A New Worm Exploiting IPv4-IPv6 Dual-stack Networks

A New Worm Exploiting IPv4-IPv6 Dual-stack Networks A New Wor Exploiting IPv4-IPv6 Dual-stack Networks Qinhua Zheng 1, Ting Liu 1, Xiaohong Guan 1, 2, Yu Qu 1, Na Wang 1 1 SKLMS Lab and MOE KLNNIS Lab, Xi an Jiaotong University, P. R. China 2 Center for

More information

EQUALIZED ALGORITHM FOR A TRUCK CABIN ACTIVE NOISE CONTROL SYSTEM

EQUALIZED ALGORITHM FOR A TRUCK CABIN ACTIVE NOISE CONTROL SYSTEM EQUALIZED ALGORITHM FOR A TRUCK CABIN ACTIVE NOISE CONTROL SYSTEM Guangrong Zou, Maro Antila, Antti Lanila and Jari Kataja Sart Machines, VTT Technical Research Centre of Finland P.O. Box 00, FI-0 Tapere,

More information

Compensated Single-Phase Rectifier

Compensated Single-Phase Rectifier Copensated Single-Phase Rectifier Jānis DoniĦš Riga Technical university jdonins@gail.co Abstract- Paper describes ethods of rectified DC pulsation reduction adding a ensation node to a single phase rectifier.

More information

Comparison Between PLAXIS Output and Neural Network in the Guard Walls

Comparison Between PLAXIS Output and Neural Network in the Guard Walls Coparison Between PLAXIS Output and Neural Network in the Guard Walls Ali Mahbod 1, Abdolghafar Ghorbani Pour 2, Abdollah Tabaroei 3, Sina Mokhtar 2 1- Departent of Civil Engineering, Shahid Bahonar University,

More information

A State-of-the-Art PMU and MATLAB Based GUI Development towards Power System State Estimation on Real Time Basis

A State-of-the-Art PMU and MATLAB Based GUI Development towards Power System State Estimation on Real Time Basis I J E E E International Journal of Electrical, Electronics ISSN No. (Online) : 77-66 and oputer Engineering (): 40-45(0) Special Edition for Best Papers of Michael Faraday IET India Suit-0, MFIIS- State-of-the-rt

More information

Power-Efficient Resource Allocation for MC-NOMA with Statistical Channel State Information

Power-Efficient Resource Allocation for MC-NOMA with Statistical Channel State Information Power-Efficient Resource Allocation for MC-NOMA with Statistical Channel State Inforation Zhiqiang Wei, Derrick Wing Kwan Ng, and Jinhong Yuan School of Electrical Engineering and Telecounications, The

More information

ESTIMATION OF OVERCOVERAGE IN THE CENSUS OF CANADA USING AN AUTOMATED APPROACH. Claude Julien, Statistics Canada Ottawa, Ontario, Canada K1A 0T6

ESTIMATION OF OVERCOVERAGE IN THE CENSUS OF CANADA USING AN AUTOMATED APPROACH. Claude Julien, Statistics Canada Ottawa, Ontario, Canada K1A 0T6 ESTMATON OF OVERCOVERAGE N THE CENSUS OF CANADA USNG AN AUTOMATED APPROACH Claude Julien, Statistics Canada Ottawa, Ontario, Canada K1A 0T6 KEY WORDS: Coverage evaluation, two-phase design, stratification

More information

COMPARISON OF TOKEN HOLDING TIME STRATEGIES FOR A STATIC TOKEN PASSING BUS. M.E. Ulug

COMPARISON OF TOKEN HOLDING TIME STRATEGIES FOR A STATIC TOKEN PASSING BUS. M.E. Ulug COMPARISON OF TOKEN HOLDING TIME STRATEGIES FOR A STATIC TOKEN PASSING BUS M.E. Ulug General Electric Corporate Research and Developent Schenectady, New York 1245 ABSTRACT Waiting ties have been calculated

More information

Mismatch error correction for time interleaved analog-to-digital converter over a wide frequency range

Mismatch error correction for time interleaved analog-to-digital converter over a wide frequency range Misatch error correction for tie interleaved analog-to-digital converter over a wide frequency range Zouyi Jiang,,2 Lei Zhao,,2,a) Xingshun Gao,2, Ruoshi Dong,2, Jinxin Liu,2, and Qi An,2 State Key Laboratory

More information

Lecture 36: MOSFET Common Drain (Source Follower) Amplifier.

Lecture 36: MOSFET Common Drain (Source Follower) Amplifier. Whites, EE 320 Lecture 36 Page 1 of 11 Lecture 36: MOSFET Coon Drain (Source Follower) Aplifier. The third, and last, discrete-for MOSFET aplifier we ll consider in this course is the coon drain aplifier.

More information

Boris Krnic Nov 15, ECE 1352F. Phase Noise of VCOs

Boris Krnic Nov 15, ECE 1352F. Phase Noise of VCOs Boris Krnic Nov 15, 93 187 13 ECE 135F Phase Noise of VCOs. ABSTRACT The ain purpose of this paper is to present siplified first order noise analysis techniques as applied to ring VCOs. The scarcity of

More information

Notes on Orthogonal Frequency Division Multiplexing (OFDM)

Notes on Orthogonal Frequency Division Multiplexing (OFDM) Notes on Orthogonal Frequency Division Multiplexing (OFDM). Discrete Fourier ransfor As a reinder, the analytic fors of Fourier and inverse Fourier transfors are X f x t t, f dt x t exp j2 ft dt (.) where

More information

Relation between C/N Ratio and S/N Ratio

Relation between C/N Ratio and S/N Ratio Relation between C/N Ratio and S/N Ratio In our discussion in the past few lectures, we have coputed the C/N ratio of the received signals at different points of the satellite transission syste. The C/N

More information

Department of Mechanical and Aerospace Engineering, Case Western Reserve University, Cleveland, OH, 2

Department of Mechanical and Aerospace Engineering, Case Western Reserve University, Cleveland, OH, 2 Subission International Conference on Acoustics, Speech, and Signal Processing (ICASSP ) PARAMETRIC AND NON-PARAMETRIC SIGNAL ANALYSIS FOR MAPPING AIR FLOW IN THE EAR-CANALTO TONGUE MOVEMENT: A NEW STRATEGY

More information

SECURITY AND BER PERFORMANCE TRADE-OFF IN WIRELESS COMMUNICATION SYSTEMS APPLICATIONS

SECURITY AND BER PERFORMANCE TRADE-OFF IN WIRELESS COMMUNICATION SYSTEMS APPLICATIONS Latin Aerican Applied Research 39:187-192 (2009) SECURITY AND BER PERFORMANCE TRADE-OFF IN WIRELESS COMMUNICATION SYSTEMS APPLICATIONS L. ARNONE, C. GONZÁLEZ, C. GAYOSO, J. CASTIÑEIRA MOREIRA and M. LIBERATORI

More information

Part 9: Basic AC Theory

Part 9: Basic AC Theory Part 9: Basic AC Theory 9.1 Advantages Of AC Systes Dealing with alternating current (AC) supplies is on the whole ore coplicated than dealing with DC current, However there are certain advantages of AC

More information

An orthogonal multi-beam based MIMO scheme. for multi-user wireless systems

An orthogonal multi-beam based MIMO scheme. for multi-user wireless systems An orthogonal ulti-bea based IO schee for ulti-user wireless systes Dong-chan Oh o and Yong-Hwan Lee School of Electrical Engineering and IC, Seoul ational University Kwana P.O. Box 34, Seoul, 151-600,

More information

Beacon-driven Leader Based Protocol over a GE Channel for MAC Layer Multicast Error Control

Beacon-driven Leader Based Protocol over a GE Channel for MAC Layer Multicast Error Control I. J. Counications, Network and Syste Sciences, 2008, 2, 05-206 Published Online May 2008 in Scies (http://www.spublishing.org/journal/ijcns/. Beacon-driven Leader Based Protocol over a GE Channel for

More information

Speech Enhancement using Temporal Masking and Fractional Bark Gammatone Filters

Speech Enhancement using Temporal Masking and Fractional Bark Gammatone Filters PAGE 420 Speech Enhanceent using Teporal Masking and Fractional Bark Gaatone Filters Teddy Surya Gunawan, Eliathaby Abikairajah School of Electrical Engineering and Telecounications The University of New

More information

Radio Resource Management in a Coordinated Cellular Distributed Antenna System By Using Particle Swarm Optimization

Radio Resource Management in a Coordinated Cellular Distributed Antenna System By Using Particle Swarm Optimization Radio Resource Manageent in a Coordinated Cellular Distributed Antenna Syste By Using Particle Swar Optiization Oer Haliloglu (1), Cenk Toker (1), Gurhan Bulu (1), Hali Yanikoeroglu (2) (1) Departent of

More information

NINTH INTERNATIONAL CONGRESS ON SOUND AND VIBRATION, ICSV9 PASSIVE CONTROL OF LAUNCH NOISE IN ROCKET PAYLOAD BAYS

NINTH INTERNATIONAL CONGRESS ON SOUND AND VIBRATION, ICSV9 PASSIVE CONTROL OF LAUNCH NOISE IN ROCKET PAYLOAD BAYS first nae & faily nae: Rick Morgans Page nuber: 1 NINTH INTERNATIONAL CONGRESS ON SOUND AND VIBRATION, ICSV9 PASSIVE CONTROL OF LAUNCH NOISE IN ROCKET PAYLOAD BAYS Rick Morgans, Ben Cazzolato, Anthony

More information

Design of Ring Oscillator based VCO with Improved Performance

Design of Ring Oscillator based VCO with Improved Performance Abstract Design of Ring Oscillator based VCO with Iproved Perforance Vaishali, Shruti Suan, K.. Shara, P. K. hosh ECE Departent Faculty of Engineering and Technology Mody University of Science and Technology

More information

ARecent report pointed out that in 2014 the amount of data

ARecent report pointed out that in 2014 the amount of data IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, JANUARY 2XX 1 QoS-Aware Energy Efficient Association and Resource Scheduling for HetNets Taewoon Ki and J. Morris Chang, Senior Meber, IEEE Abstract

More information

Torsion System. Encoder #3 ( 3 ) Third encoder/disk for Model 205a only. Figure 1: ECP Torsion Experiment

Torsion System. Encoder #3 ( 3 ) Third encoder/disk for Model 205a only. Figure 1: ECP Torsion Experiment Torsion Syste Introduction This lab experient studies dynaics of a torsional syste with single and ultiple degrees of freedo. The effects of various control configurations are studied in later part of

More information

On-line Discrete Wavelet Transform in EMTP Environment and Applications in Protection Relaying

On-line Discrete Wavelet Transform in EMTP Environment and Applications in Protection Relaying On-line Discrete Wavelet Transfor in EMTP Environent and Applications in Protection Relaying N. Perera, A.D. Rajapakse and R.P. Jayasinghe Abstract--This paper describes the developent of an on-line discrete

More information

Randomized Scheduling Algorithms for Wireless Sensor Networks

Randomized Scheduling Algorithms for Wireless Sensor Networks Randoized Scheduling Algoriths for Wireless Sensor etworks abhendra Bisnik, eeraj Jaggi Rensselaer Polytechnic Institute Troy, Y 80 bisnin@rpiedu, jaggin@rpiedu I ITRODUCTIO A wireless sensor network WS

More information

Secondary-side-only Simultaneous Power and Efficiency Control in Dynamic Wireless Power Transfer System

Secondary-side-only Simultaneous Power and Efficiency Control in Dynamic Wireless Power Transfer System 069060 Secondary-side-only Siultaneous Power and Efficiency Control in Dynaic Wireless Power Transfer Syste 6 Giorgio ovison ) Daita Kobayashi ) Takehiro Iura ) Yoichi Hori ) ) The University of Tokyo,

More information

Kalman Filtering for NLOS Mitigation and Target Tracking in Indoor Wireless Environment

Kalman Filtering for NLOS Mitigation and Target Tracking in Indoor Wireless Environment 16 Kalan Filtering for NLOS Mitigation and Target Tracking in Indoor Wireless Environent Chin-Der Wann National Sun Yat-Sen University Taiwan 1. Introduction Kalan filter and its nonlinear extension, extended

More information

Simplified Analysis and Design of MIMO Ad Hoc Networks

Simplified Analysis and Design of MIMO Ad Hoc Networks Siplified Analysis and Design of MIMO Ad Hoc Networks Sunil Srinivasa and Martin Haenggi Departent of Electrical Engineering University of Notre Dae Notre Dae, IN 46556, USA Eail: {ssriniv, haenggi}@nd.edu

More information

OPTIMIZE THE POWER CONTROL AND NETWORK LIFETIME USING ZERO - SUM GAME THEORY FOR WIRELESS SENSOR NETWORKS

OPTIMIZE THE POWER CONTROL AND NETWORK LIFETIME USING ZERO - SUM GAME THEORY FOR WIRELESS SENSOR NETWORKS OTIMIZE THE OWER CONTROL AND NETWORK LIFETIME USING ZERO - SUM GAME THEORY FOR WIRELESS SENSOR NETWORKS Vinoba.V 1, Chithra.S.M 1 Departent of Matheatics, K.N. Governent Arts college, Tail Nadu,( India.)

More information

LETTER Adaptive Multi-Stage Parallel Interference Cancellation Receiver for Multi-Rate DS-CDMA System

LETTER Adaptive Multi-Stage Parallel Interference Cancellation Receiver for Multi-Rate DS-CDMA System IEICE TRANS. COMMUN., VOL.E87 B, NO.8 AUGUST 2004 2401 LETTER Adaptive Multi-Stage Parallel Interference Cancellation Receiver for Multi-Rate DS-CDMA Syste Seung Hee HAN a), Student Meber and Jae Hong

More information

OTC Statistics of High- and Low-Frequency Motions of a Moored Tanker. sensitive to lateral loading such as the SAL5 and

OTC Statistics of High- and Low-Frequency Motions of a Moored Tanker. sensitive to lateral loading such as the SAL5 and OTC 61 78 Statistics of High- and Low-Frequency Motions of a Moored Tanker by J.A..Pinkster, Maritie Research Inst. Netherlands Copyright 1989, Offshore Technology Conference This paper was presented at

More information

RAKE Receiver. Tommi Heikkilä S Postgraduate Course in Radio Communications, Autumn II.

RAKE Receiver. Tommi Heikkilä S Postgraduate Course in Radio Communications, Autumn II. S-72333 Postgraduate Course in Radio Counications, Autun 2004 1 RAKE Receiver Toi Heikkilä toiheikkila@teliasoneraco Abstract RAKE receiver is used in CDMA-based (Code Division Multiple Access) systes

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION ITU-T J.133 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (07/2002) SERIES J: CABLE NETWORKS AND TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA

More information

Sound recording with the application of microphone arrays

Sound recording with the application of microphone arrays Coputer Applications in Electrical Engineering Sound recording with the application of icrophone arrays Eugeniusz Kornatowski West Poeranian University of Technology 7-26 Szczecin, 26 Kwietnia, e-ail:

More information

PREDICTING SOUND LEVELS BEHIND BUILDINGS - HOW MANY REFLECTIONS SHOULD I USE? Apex Acoustics Ltd, Gateshead, UK

PREDICTING SOUND LEVELS BEHIND BUILDINGS - HOW MANY REFLECTIONS SHOULD I USE? Apex Acoustics Ltd, Gateshead, UK PREDICTING SOUND LEVELS BEHIND BUILDINGS - HOW MANY REFLECTIONS SHOULD I USE? W Wei A Cooke J Havie-Clark Apex Acoustics Ltd, Gateshead, UK Apex Acoustics Ltd, Gateshead, UK Apex Acoustics Ltd, Gateshead,

More information

Fast Node Cardinality Estimation and Cognitive MAC Protocol Design for Heterogeneous M2M Networks

Fast Node Cardinality Estimation and Cognitive MAC Protocol Design for Heterogeneous M2M Networks Fast Node Cardinality Estiation and Cognitive MAC Protocol Design for Heterogeneous MM Networks Sachin Kada, Chaitanya S. Raut and Gaurav S. Kasbekar Abstract Machine-to-Machine MM networks are an eerging

More information

A.C. FUNDA- MENTALS. Learning Objectives

A.C. FUNDA- MENTALS. Learning Objectives C H A P T E R Learning Objectives Generation of Alternating Voltages and Currents Alternate Method for the Equations of Alternating Voltages and currents Siple Wavefors Cycle Different Fors of E.M.F. Equation

More information

New Characteristics Analysis Considering Transmission Distance and Load Variation in Wireless Power Transfer via Magnetic Resonant Coupling

New Characteristics Analysis Considering Transmission Distance and Load Variation in Wireless Power Transfer via Magnetic Resonant Coupling New Characteristics nalysis Considering Transission Distance and oad Variation in Wireless Power Transfer via Magnetic Resonant Coupling Masaki Kato, Takehiro ura, Yoichi Hori The Departent of dvanced

More information

Design and Implementation of Serial Port Ultrasonic Distance Measurement System Based on STC12 Jian Huang

Design and Implementation of Serial Port Ultrasonic Distance Measurement System Based on STC12 Jian Huang International Conference on Education, Manageent and Coputer Science (ICEMC 2016) Design and Ipleentation of Serial Port Ultrasonic Distance Measureent Syste Based on STC12 Jian Huang Xijing University,

More information

Uplink blocking probability calculation for cellular systems with WCDMA radio interface and finite source population

Uplink blocking probability calculation for cellular systems with WCDMA radio interface and finite source population Uplin blocing probability calculation for cellular systes with WCDMA radio interface and finite source population Mariusz Głąbowsi *, Macie Stasia *, Aradiusz Wiśniewsi and Piotr Zwierzyowsi * * Institute

More information

Fundamental study for measuring microflow with Michelson interferometer enhanced by external random signal

Fundamental study for measuring microflow with Michelson interferometer enhanced by external random signal Bulletin of the JSME Journal of Advanced Mechanical Design, Systes, and Manufacturing Vol.8, No.4, 2014 Fundaental study for easuring icroflow with Michelson interferoeter enhanced by external rando signal

More information

Content-Centric Multicast Beamforming in Cache-Enabled Cloud Radio Access Networks

Content-Centric Multicast Beamforming in Cache-Enabled Cloud Radio Access Networks Content-Centric Multicast Beaforing in Cache-Enabled Cloud Radio Access Networks Hao Zhou, Meixia Tao, Erkai Chen,WeiYu *Dept. of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China

More information

Yield Enhancement Techniques for 3D Memories by Redundancy Sharing among All Layers

Yield Enhancement Techniques for 3D Memories by Redundancy Sharing among All Layers Yield Enhanceent Techniques for 3D Meories by Redundancy Sharing aong All Layers Joohwan Lee, Kihyun Park, and Sungho Kang Three-diensional (3D) eories using through-silicon vias (TSVs) will likely be

More information

Automated Decentralized Smart Sensor Network for Modal Analysis

Automated Decentralized Smart Sensor Network for Modal Analysis Autoated Decentralized Sart Sensor Network for Modal Analysis S. H. Si a, B. F. Spencer a, Jr., M. Zhang b, and H. Xie c a Dept. of Civil and Environental Engineering, University of Illinois at Urbana-Chapaign,

More information

Ultrasonic Beamforming with Delta-Sigma Modulators

Ultrasonic Beamforming with Delta-Sigma Modulators Proceedings of the 10th WSEAS International Conference on CIRCUITS, Vouliageni, Athens, Greece, July 10-1, 006 (pp344-349) Ultrasonic Beaforing with Delta-Siga Modulators IOAN LIE *, MIHAIL EUGEN TANASE

More information

A Wireless Transmission Technique for Remote Monitoring and Recording System on Power Devices by GPRS Network

A Wireless Transmission Technique for Remote Monitoring and Recording System on Power Devices by GPRS Network Proceedings of the 6th WSEAS International Conference on Instruentation, Measureent, Circuits & Systes, Hangzhou, China, April 15-17, 007 13 A Wireless Transission Technique for Reote Monitoring and Recording

More information

EXPERIMENTAL VERIFICATION OF SINUSOIDAL APPROXIMATION IN ANALYSIS OF THREE-PHASE TWELVE-PULSE OUTPUT VOLTAGE TYPE RECTIFIERS

EXPERIMENTAL VERIFICATION OF SINUSOIDAL APPROXIMATION IN ANALYSIS OF THREE-PHASE TWELVE-PULSE OUTPUT VOLTAGE TYPE RECTIFIERS th INTERNATIONAL SYPOSIU on POWER ELECTRONICS - Ee 9 XV eđunarodni sipoziju Energetska elektronika Ee 9 NOVI SAD, REPUBLIC OF SERBIA, October 8 th - th, 9 EXPERIENTAL VERIFICATION OF SINUSOIDAL APPROXIATION

More information

WIRELESS video sensor networks (WVSNs) are capable

WIRELESS video sensor networks (WVSNs) are capable 1182 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 60, NO. 3, MARCH 2011 Lifetie and Distortion Optiization With Joint Source/Channel Rate Adaptation and Network Coding-Based Error Control in Wireless

More information

International Journal of Electronics and Electrical Engineering Vol. 1, No. 3, September, 2013 MC-DS-CDMA

International Journal of Electronics and Electrical Engineering Vol. 1, No. 3, September, 2013 MC-DS-CDMA International Journal of Electronics and Electrical Engineering Vol. 1, No. 3, Septeber, 2013 Analysis of Carrier Frequency Selective Offset Estiation - Using Zero-IF and ZCZ In MC-DS-CDMA Venkatachala.

More information

THE IMPLEMENTATION OF THE HARTEBEESTHOEK94 CO-ORDINATE SYSTEM IN SOUTH AFRICA

THE IMPLEMENTATION OF THE HARTEBEESTHOEK94 CO-ORDINATE SYSTEM IN SOUTH AFRICA THE IMPLEMENTATION OF THE HARTEBEESTHOEK94 CO-ORDINATE SYSTEM IN SOUTH AFRICA Richard Wonnacott Chief Directorate : Surveys and Mapping South Africa ABSTRACT : The Hartebeesthoek94 co-ordinate syste becae

More information

Performance Analysis of an AMC System with an Iterative V-BLAST Decoding Algorithm

Performance Analysis of an AMC System with an Iterative V-BLAST Decoding Algorithm I. J. Counications, Network and Syste Sciences, 008,, 105-06 Published Online May 008 in SciRes (http://www.srpublishing.org/journal/ijcns/). Perforance Analysis of an AMC Syste with an Iterative V-BLAST

More information

On the field of view of a Galilean telescope

On the field of view of a Galilean telescope Transactions of the Optical Society On the field of view of a Galilean telescope To cite this article: H A Hughes and P F Everitt 1920 Trans. Opt. Soc. 22 15 View the article online for updates and enhanceents.

More information

LOW COST PRODUCTION PHASE NOISE MEASUREMENTS ON MICROWAVE AND MILLIMETRE WAVE FREQUENCY SOURCES

LOW COST PRODUCTION PHASE NOISE MEASUREMENTS ON MICROWAVE AND MILLIMETRE WAVE FREQUENCY SOURCES Page 1 of 10 LOW COST PRODUCTION PHASE NOISE MEASUREMENTS ON MICROWAVE AND MILLIMETRE WAVE FREQUENCY SOURCES Hugh McPherson Spectral Line Systes Ltd, Units 1,2&3 Scott Road, Tarbert, Isle of Harris. www.spectral-line-systes.co.uk

More information

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math Sarter Balanced Assessent Consortiu Clais, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents

More information

Keywords Frequency-domain equalization, antenna diversity, multicode DS-CDMA, frequency-selective fading

Keywords Frequency-domain equalization, antenna diversity, multicode DS-CDMA, frequency-selective fading Joint Frequency-doain Equalization and Antenna Diversity Cobining for Orthogonal Multicode DS-CDMA Signal Transissions in A Frequency-selective Fading Channel Taeshi ITAGAKI *1 and Fuiyui ADACHI *2 Dept.

More information

Green Downlink Radio Management Based Cognitive Radio LTE HetNets

Green Downlink Radio Management Based Cognitive Radio LTE HetNets Green Downlink Radio Manageent Based Cognitive Radio LTE HetNets Ahad Alsharoa, Ahed E. Kaal Departent of Electrical and Coputer Engineering, Iowa State University (ISU), Aes, Iowa, USA, Eail: {alsharoa,

More information

International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Volume 3, Issue 9, September 2014

International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Volume 3, Issue 9, September 2014 International Journal of Advanced Research in Electronics and Counication Engineering Volue 3, Issue 9, Septeber 2014 High Speed Error Detection and Data Recovery Architecture for Video Testing Applications

More information

A Robust Scheme for Distributed Control of Power Converters in DC Microgrids with Time-Varying Power Sharing

A Robust Scheme for Distributed Control of Power Converters in DC Microgrids with Time-Varying Power Sharing A Robust Schee for Distributed Control of Power Converters in DC Microgrids with Tie-Varying Power Sharing Mayank Baranwal,a, Alireza Askarian,b, Srinivasa M. Salapaka,c and Murti V. Salapaka,d Abstract

More information

This is an author-deposited version published in: Eprints ID: 5737

This is an author-deposited version published in:   Eprints ID: 5737 Open Archive Toulouse Archive Ouverte (OATAO) OATAO is an open access repository that collects the work of Toulouse researchers and akes it freely available over the web where possible. This is an author-deposited

More information

ACCURATE DISPLACEMENT MEASUREMENT BASED ON THE FREQUENCY VARIATION MONITORING OF ULTRASONIC SIGNALS

ACCURATE DISPLACEMENT MEASUREMENT BASED ON THE FREQUENCY VARIATION MONITORING OF ULTRASONIC SIGNALS XVII IMEKO World Congress Metrology in 3rd Millenniu June 22 27, 2003, Dubrovnik, Croatia ACCURATE DISPLACEMENT MEASUREMENT BASED ON THE FREQUENCY VARIATION MONITORING OF ULTRASONIC SIGNALS Ch. Papageorgiou

More information

Optimal Modulation Index of the Mach-Zehnder Modulator in a Coherent Optical OFDM System Employing Digital Predistortion

Optimal Modulation Index of the Mach-Zehnder Modulator in a Coherent Optical OFDM System Employing Digital Predistortion Optial Modulation Index of the Mach-Zehnder Modulator in a Coherent Optical OFDM yste Eploying Digital redistortion David Rörich, Xiaojie Wang, Michael Bernhard, Joachi peidel Universität tuttgart, Institut

More information

WIPL-D Pro: What is New in v12.0?

WIPL-D Pro: What is New in v12.0? WIPL-D Pro: What is New in v12.0? Iproveents/new features introduced in v12.0 are: 1. Extended - Extree Liits a. Extreely LOW contrast aterials b. Extended resolution for radiation pattern c. Extreely

More information

Dynamic Model Displacement for Model-mediated Teleoperation

Dynamic Model Displacement for Model-mediated Teleoperation Dynaic Model Displaceent for Model-ediated Teleoperation Xiao Xu Giulia Paggetti Eckehard Steinbach Institute for Media Technology, Technische Universität München, Munich, Gerany ABSTRACT In this paper,

More information

LOCATION Based Service (LBS) has become an indispensable

LOCATION Based Service (LBS) has become an indispensable This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content ay change prior to final publication. Citation inforation: DOI 1.11/TWC.17.777,

More information

Efficient Non-linear Changed Mel-filter Bank VAD Algorithm

Efficient Non-linear Changed Mel-filter Bank VAD Algorithm Matheatical Models and Methods in Modern Science Efficient on-linear Changed Mel-filter Bank VAD Algorith DAMJA VLAJ, ZDRAVKO KAČIČ, MARKO KOS Faculty of Electrical Engineering and Coputer Science University

More information

Spectrum Sensing in Low SNR: Diversity Combining and Cooperative Communications

Spectrum Sensing in Low SNR: Diversity Combining and Cooperative Communications 0 6th International Conference on Industrial and Inforation Systes, ICIIS 0, Aug. 6-9, 0, Sri Lanka Spectru Sensing in Low SR: Diversity Cobining and Cooperative Counications Saan Atapattu, Chintha Tellabura,

More information

A NEW APPROACH TO UNGROUNDED FAULT LOCATION IN A THREE-PHASE UNDERGROUND DISTRIBUTION SYSTEM USING COMBINED NEURAL NETWORKS & WAVELET ANALYSIS

A NEW APPROACH TO UNGROUNDED FAULT LOCATION IN A THREE-PHASE UNDERGROUND DISTRIBUTION SYSTEM USING COMBINED NEURAL NETWORKS & WAVELET ANALYSIS A NEW APPROACH TO UNGROUNDED FAULT LOCATION IN A THREE-PHASE UNDERGROUND DISTRIBUTION SYSTEM USING COMBINED NEURAL NETWORKS & WAVELET ANALYSIS Jaal Moshtagh University of Bath, UK oshtagh79@yahoo.co Abstract

More information

The Research of PV MPPT based on RBF-BP Neural Network Optimized by GA

The Research of PV MPPT based on RBF-BP Neural Network Optimized by GA nternational Conference on Logistics Engineering, Manageent and Coputer Science (LEMCS 215) The Research of PV MPPT based on RBF-BP Neural Network Optiized by GA Jian Liu xxliujian@sjzu.edu.cn iaolin u

More information

ABSTRACT 1. INTRODUCTION

ABSTRACT 1. INTRODUCTION Adaptive characterization of laser daage fro sparse defects Sa Richan *, Alexander R. Martin, Quentin Turchette and Trey Turner RO, 555 Airport Blvd., Boulder, CO, USA 831 ABSTRACT Standard techniques

More information

Texas Transportation Institute The Texas A&M University System College Station, Texas

Texas Transportation Institute The Texas A&M University System College Station, Texas . Report No. FHWA/TX-04/752-4 2. Governent Accession No. 3. Recipient's Catalog No. 4. Title and Subtitle A MODEL FOR EVALUATING INTEGRATION STRATEGIES FOR OPERATING DIAMOND INTERCHANGE AND RAMP METERING

More information