University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ICC.2006.
|
|
- Aleesha Griffith
- 5 years ago
- Views:
Transcription
1 Kaya, I., & Kocak, T. (2006). Energy-efficient pipelined bloo filters for network intrusion detection. IEEE International Conference on Counications, 5, DOI: /ICC Peer reviewed version Link to published version (if available): /ICC Link to publication record in Explore Bristol Research PDF-docuent University of Bristol - Explore Bristol Research General rights This docuent is ade available in accordance with publisher policies. Please cite only the published version using the reference above. Full ters of use are available:
2 Energy-Efficient Pipelined Bloo Filters for Network Intrusion Detection Ilhan Kaya and Taskin Kocak Departent of Electrical and Coputer Engineering University of Central Florida Orlando, FL e-ail: {ikaya, Abstract Software-based detection techniques are coonly used to identify the predefined signatures in network streas. However, the software-based techniques can not keep up with the speeds that network bandwidth increases. Hence, hardwarebased systes have started to eerge. Bloo filters are frequently used to identify alicious content like viruses in high speed networks. However, architectures proposed to ipleent Bloo filters are not power efficient. We propose a new Bloo filter architecture that exploits the well-known pipelining technique. Through extensive power analysis we show that pipelining can reduce the power consuption of Bloo filters up to 90 %, which leads to the energy-efficient ipleentation of network intrusion detection systes. I. INTRODUCTION Nowadays, there are plenty of software progras installed to keep coputer systes clean. Many of the are used in ipleentation of network intrusion detection systes(nids). These progras have to identify the alicious content such as internet wors and viruses in network packets. Applications providing intrusion detection, virus prevention, and content filtering have not kept pace with the increase in network speeds since they lack hardware functionality supporting the. There is a need to scan entire network packets bit by bit to deterine predefined signatures for viruses and wors. Before the packets are processed by the upper OSI layers, alicious packets has to be dropped by a device. Bloo filters [2] are used in such devices to atch strings, like snort rules [11]. Bloo filters have been used for any network applications like web cache sharing [6], resource routing [5], string atching [1] [7]. A hardware syste, consisting of Bloo filters to detect alignant content, is described in [7]. A detailed survey of Bloo filters for networking applications can be found in [3]. Although Bloo filters have found wide spread usage in networking applications, they are not conservative in ters of power. In order to decrease power consuption of Bloo filters, we eploy pipelining technique in the architecture of Bloo filters. The new type of Bloo filters are called as pipelined Bloo filters. In this paper, we propose a hardware syste consisting of pipelined Bloo filters as an energyefficient network intrusion detection syste. Furtherore, after atheatical analysis, intrusion detection syste is shown to be uch power efficient than the one consists of regular Bloo filters so far. II. PIPELINED BLOOM FILTERS In this section, first we introduce Bloo filters, and then we go on to explain pipelined Bloo filters architecture. Power analysis will follow in a coparative anner. A. Bloo Filters A Bloo filter is a data structure that stores a given set of signatures. In addition, it provides efficient ebership queries on the signature set. Two operations on the Bloo filters are defined as prograing and querying. Fig. 1. A Bloo Filter with k hash functions A typical Bloo filter is illustrated in Fig. 1. First, a Bloo filter coputes k any hash functions on each eber of the signature set. Consequently, it sets the bits on the -bit long lookup vector at the indices pointed by hash values. As for the querying, the Bloo filter coputes the sae hash functions used in the prograing for each input. Then it looks up the bit values located on the offsets (coputed hash values) on the bit vector, and, if it finds any bit unset at those addresses, it declares the input string to be a noneber of the signature set, which is called a isatch. Otherwise, if it finds all the bits are set, it concludes that input string ay be a eber of the signature set with a certain probability (false positive probability). This is called a atch. In [7], the false positive probability f is calculated by, ) k f = (1 e nk (1) /06/$20.00 (c) 2006 IEEE
3 where n is the nuber of signatures prograed into the bloo filter, is the length of the lookup vector, and k is the nuber of hash functions used to ipleent the Bloo filter. In addition, the authors find an optiu value of the nuber of hash functions, k=35, for an average nuber of bits allocated to per signature n = 50. Furtherore, they show that the false positive probability is on the orders of A single Bloo filter uses k any hash functions in order to ake a decision on the input. Hence the power consuption of a Bloo filter shown in Fig. 1 is a suation of the power consuptions of each of the hash functions, P Hi, with the lookup operation, P L, followed, plus an AND operation. P BFregular = (P Hi + P L )+P AND (2) Power consuption of an AND gate is ignored hereafter, since it is inial copared to the power used by the hash functions. The power consuption equation for a single Bloo filter siply becoes the total power used up by the hash functions and the power consued by querying the -bit vector for each hash value. P BFregular = (P Hi + P L ) (3) Hash functions used in the Bloo filters are generally of type universal hash functions [4]. The perforance of universal hash functions are explored by Raakrishna et al [9]. The power consuptions of different hash function ipleentations in hardware have been easured by Yuksel [12]. Yuksel akes use of the ulti-hashing [10] technique. Multi-hashing divides the input into saller pieces. Different universal hash functions fro the sae faily applied to these input pieces. Eventually results are concatenated to for the desired hash value without increasing the hash collision probability. Yuksel has coe up with different hash function ipleentations over word sizes of 64 bits, 32 bits, 16 bits. Aongst the different hash functions analyzed in [12], the ost power efficient hash function for a fixed frequency is Weighted NH Polynoial with Reduction, WH. This hash function is a derivative of the Universal Hash functions. Hence we use 16-bit, 32-bit, 64-bit WH faily of hash functions in the Bloo filters whenever hash functions are able to process the input fed to the syste. A WH faily of hash functions can process input as twice as longer than the word size used in ipleentation, for instance a 16-bit WH can process up to 32-bit strings including 32-bit input. In order to copare the power consuption of regular Bloo filters to that of a pipelined Bloo filter, we use 16- bit ipleentation of hash functions. All of the k any hash functions are of type 16-bit WH hash functions, so Equ. 3 becoes P BFregular = (P + P Hi(WH16 ) L)=k.(P WH16 + P L ) (4) B. Pipelined Bloo Filters Basically, a pipelined Bloo filter, as shown in Fig. 2, consists of two groups of hash functions. The first stage always coputes the hash values. By contrast, the second stage of hash functions only copute the hash values if in the first stage there is a atch between the input and the signature sought. Fig. 2. A 2-Stage pipelined Bloo filter The pipelined Bloo filters will have the sae nuber of hash functions as the regular Bloo filters. A pipelined Bloo filter exploits the virus free nature of the network traffic at ost of the tie. At worst, it will operate like a regular Bloo filter, which uses all of the hash functions before aking a decision on the type of the input. However, ost of the tie the first group of hash functions will result in a isatch. The advantage of using a pipelined Bloo filter is if the first stage catches a isatch, there is no need to use the second stage in order to decide whether the input string is a eber of the signature set. By following a siilar analysis of [8], we begin to derive the total power consuption of the pipelined Bloo filter. We assue that the hash functions used in each Bloo filter is perfectly rando. Overall, we have k-any rando universal hash functions in a pipelined Bloo filter. In the first stage, r-any of the are utilized. The nuber of signatures sought in a Bloo filter is given as n as before. Let us first derive the probability of atch in the first stage. The probability that a bit is still unset after all the signatures are prograed into the pipelined Bloo filter by using k- any independent hash functions is α. α = ( 1 1 ) kn e kn (for large ) (5) where 1 represents any one of the bits set by a single hash function operating on a single signature. Then ( ) 1 1 is the probability that the bit is unset after a single hash value coputation with a single signature. For it to reain unset, it should not be set by any of the k-any hash functions each 2383
4 operating on all of the n-any signatures in the signature set. Consequently, the probability that any one of the bits is set is (1 α) 1 e kn (6) In order for the first stage to produce a atch, the bits indexed by all r of the independent rando hash functions should be set. So the atch probability of the first stage is, represented as p, p = r (1 α) =(1 α) r (1 e kn ) r With a probability of (1-p) the first stage of the hash functions in the pipelined Bloo filter will produce a isatch. Otherwise, the first stage produces a atch, then the second stage is used to copare the input with the signature sought. Therefore the power consuption of a pipelined Bloo filter is given by P BF pipeline = P 1st stage + P {atch} P 2nd stage P BF pipeline = (P Hi + P L )+p (P Hj + P L ) (7) +P AND (8) By oitting P AND and selecting P Hi, j are of type 16-bit WH, and substituting Equ. 7 into Equ. 8 power consuption of a pipelined Bloo filter becoes P BFpipeline = (P + P Hi(WH16 ) L) +(1 e kn ) r = r.(p WH16 + P L )+ (P Hj(WH16 ) + P L) (1 e kn ) r (k r)(p WH16 + P L ) (9) The power saving ratio, PSR, in a single Bloo filter by deploying pipelining technique can be calculated as PSR = (P regular P pipelined ) Pregular (10) By substituting Equ. 4 and Equ. 9 into Equ. 10, the average power saving ratio, PSR, is given by ( [ ] ) k A r +(1 e kn ) r (k r) A PSR = k A (11) where A =(P WH16 +P L ). After siplifying As, PSR, is found out to be PSR = kn k r +(r k)(1 e ) r For different values of the nuber of bits allocated to per signature, n, power savings over the nuber of hash functions utilized in the first stage are illustrated in Fig. 3. k Power Saving Ratio, PSR /n=25 /n=50 /n= Nuber of hash functions in the first stage of pipelined Bloo filters, r Fig. 3. Power saving ratio in pipelined Bloo filters w.r.t. nuber of hash functions utilized in the first stage As it is shown in Fig. 3, the nuber of bits per signature, n, increases, the aount of power conserved in the syste increases. In other words, the power saving ratio becoes larger as n increases. This is because, the lesser are the nuber of hash functions deployed in first stage copared to the overall syste, the ore the power is saved. Another fact illustrated in Fig. 3 is that as the nuber of hash functions utilized in the first stage increases, the power saving ratio, PSR, first increases to an optiu PSR value, thereafter it drops gradually. The increase in the power saving ratio to an threshold value stes fro the fact that increasing the nuber of hash functions in the first stage increases the probability of isatch, thus second stage is not utilized to decide on an input. After this optiu is exceeded, PSR decreases steadily. If we increase the nuber of hash functions used in the first stage to such a degree that all hash functions in the syste deployed in the first stage, there reain no power gain at all (i.e., the syste behaves just like a regular Bloo filter.) III. POWER CONSUMPTION ANALYSIS OF AN INTRUSION DETECTION SYSTEM BASED ON PIPELINED BLOOM FILTERS In this section, we analyze the power consuption of a Bloo filter based NIDS given in [7]. The syste block diagra is illustrated in Fig. 4. The syste consists of parallel Bloo filters prograed to detect a group of predefined signatures. Each Bloo filter operates on a different length of input. The length of the input scanned by a Bloo filter is constricted by the length of the signature sought. All Bloo filters onitor the network traffic which enters into syste with a rate of one byte per cycle. Syste verifies whether there is a alicious content hidden in the packet payload. Power analysis of the syste follows in two sections. A. Syste relying on regular Bloo Filters In this case, the syste illustrated in Fig. 4 consists of regular bloo filters. Each Bloo filter operates on different length of inputs. Total power consuption of the syste is 2384
5 Fig. 4. Syste view of a Bloo filter engine [7] the suation of the power used by individual Bloo filters. There are (L ax L in ) Bloo filters in the syste. L ax is the axiu length of input, and L in is the iniu length of input processed by a Bloo filter. Hence the total power consuption is given by P TOTAL = L ax i=l in P BFi (14) where P BFi is the power dissipated through the i th Bloo filter. Let s develop the Equ. 14 as follows P TOTAL = P BFlin +P +P BF(lin +1) BF +...+P (lin +2) BF (l ax) (15) where P BFlin stands for the total power dissipated through the Bloo filter processing L in long input. Each Bloo filter in the syste takes different length inputs as pointed out before. By substituting Equ. 3 into the Equ. 14, P TOTAL = P lin + P (lin+1) +... P lax (16) P lin is the power dissipation of the i th hash function located inside the Bloo filter processing l in long input. We consider a syste with l in =3bytes and l ax = 32 bytes. We assue that lookup power is ignorable in the following analysis. We begin the analysis with calculating the power consuption of a 3-byte input processing Bloo filter. 3-byte input length is saller than 32-bit, which can be processed by a WH 16 type of hash function. We can divide the input into two halves. 8 bits are zero padded to the second half, which does not change the hash value coputed, since bitwise AND operation akes contribution of these bits 0. P BF3 byte = P Hi(WH 16) = k.p WH16 (17) Siilarly, 4-byte processing Bloo filter uses WH-16 type of hash functions without the input padding. P BF4 byte = P Hi(WH 16) = k.p WH16 (18) 5-byte are larger than 32 bits, and can t be processed by a WH 16. This type of input requires WH 32, which can process up to 8 byte. The reaining 24 bits are zero padded to the input. Hence, P BF5 byte = P Hi(WH 32) = k.p WH32 (19) A WH 32 is used in the construction of 6-byte, 7-byte and 8- byte long input processing Bloo filters. Power consuption of Bloo filters corresponding to these length input is equal to the 5-byte input processing Bloo filter. P BF6 byte = P Hi(WH 32) = k.p WH32 = P BF7 byte = P BF8 byte (20) As for the 9-byte input processing Bloo filter, a WH 32 can t be enough without ulti-hashing. Hence, WH 64 is needed with zero padded input. P BF9 byte = P Hi(WH 64) = k.p WH64 (21) Since a WH with a word size of 64 bit can process up to 128 bits long input, all the Bloo filters processing input in the range of 9 byte to 16 byte, including the 16 byte, can be ipleented with a WH 64. Their power consuptions are equal. P BF10 byte = P Hi(WH 64) = k.p WH64 P BF9 byte = P BF10 byte =... = P BF16 byte (22) After 128 bit long input we have to use the ulti-hashing ethod, and divide the input into 32 bit long and 128 bit long input, and ake zero padding if necessary until input length exceeds 160. By this way, it is possible that one WH 64 and one WH 16 will be enough to calculate hash function over 17 to 20 byte long inputs. So the power consuption of the Bloo filters operating on 17-byte to 20 byte long input is P BF17 byte = (P Hi(WH 64)+P Hi(WH 16)) = k.p WH64 + k.p WH16 P BF17 byte = P BF18 byte =... = P BF20 byte (23) In a siilar anner, again by aking use of ulti-hashing and zero padding whenever necessary, hash functions inside in Bloo filters operating on range of 21 to 24 byte input, ake use of one WH 64 and one WH 32. All the Bloo filters calculating hash values over the inputs fro 21 bytes long 2385
6 till 24 bytes, consues the sae power as 21-byte long input processing Bloo filter, which is shown below. P BF21 byte = (P Hi(WH 64)+P Hi(WH 32)) = k.p WH64 + k.p WH32 (24) = P BF21 byte = P BF22 byte =... = P BF24 byte 25-byte long input requires two WH 64 s. 200 bits exceed the capacity given by one WH 64 and one WH 32, which adds up to 24-byte input processing. Two WH 64 s are capable of processing 32-byte input strings, so all the Bloo filter engines operating on the range of input 25 bytes to 32 bytes long consues the sae aount of power. Again ulti-hashing is used to copute hash values over such long input streas. P BF25 byte = (P Hi(WH 64)+P Hi(WH 64)) =2.k.P WH64 P BF25 byte = P BF26 byte =... = P BF32 byte (25) By substituting the above values into the total power consuption Equ.16, power consuption of the Bloo filter engine shown in Fig. 4 is given as P TOTAL = P BF3 byte + P BF4 byte + P BF5 byte P BF(32 byte) P TOTAL = k.p WH16 + k.p WH16 + [3 4] k.p WH k.p WH32 [5 8] k.p WH k.p WH64 [9 16] k.(p WH64 + P WH16 ) k.(p WH64 + P WH16 ) + [17 20] k.(p WH64 + P WH32 ) k.(p WH64 + P WH32 ) + [21 24] 2.k.P WH k.(P WH64 ) (26) [25 32] which siplifies to Equ. 27 P TOTAL = k.(6.p WH16 +8.P WH P WH64 ) (27) B. Syste relying on pipelined Bloo Filters By following a siilar approach used in the regular Bloo filter analysis, we will calculate the total power consuption of the pipelined Bloo filter architecture shown in Fig. 4. The total power consuption in the syste is given as in Equ. 16. Each individual power consuption of pipelined Bloo filters is calculated based on the length of the input that enters into each pipelined Bloo filter. 3-byte long input is processed by a WH 16 owing to ultihashing. The power consuption of a pipelined 3-byte input processing Bloo filter, P PBF3 byte, can be calculated by using Equ. 8 P PBF3 byte = (P Hi(WH 16))+p + + P Hj(WH 16) = r.p WH16 + p.(k r)p WH16 (28) In order to process 4-byte input, WH 16 is used as hash function ipleentation. Hence, they consue the sae power as 3-byte input case. P PBF3 byte = P PBF4 byte (29) As for the 40 bits input, a WH 16 can not process the input, thus a WH 32 can handle that long input as uch as 64 bits long. As a result, 5-byte long input processing Bloo filter consues the sae power as 6, 7,and 8-byte long input processing ones. P PBF5 byte = (P Hi(WH 32))+p P Hj(WH 32) = r.p WH32 + p (k r)p WH32 P PBF5 byte = P PBF6 byte =... = P PBF8 byte (30) 9-byte input processing can not be handled with a WH 32, but a WH 64 type of hash function can handle as uch as 16- byte inputs, so all the Bloo filters processing input length of 9 to 16 bytes, are using a single WH 64 as hash function ipleentation. P PBF9 byte = (P Hi(WH 64))+p = r.p WH64 + p (k r)p WH64 P Hj(WH 64) P PBF9 byte = P PBF10 byte =... = P PBF16 byte (31) 17-byte input processing will require ulti-hashing, by using WH 64 and WH 16, in parallel, coputes hash values on input strings of length varying fro 17 to 20 bytes. P PBF17 byte = (P Hi(WH 64)+P Hi(WH 16))+ p = r.(p WH16 + P WH64 )+ (P Hj(WH 64) + P Hj(WH 16)) p (k r)(p WH16 + P WH64 ) P PBF17 byte = P PBF18 byte =... = P PBF20 byte (32) In a siilar anner, 21-byte to 24-byte input processing can be done by using a WH 64 and WH 32 in parallel due to the principle of ulti-hashing. Power consuption of 21 to 24 bytes long input processing Bloo filter is equal to each other and given by P PBF21 byte = (P Hi(WH 64)+P Hi(WH 32))+ p = r.(p WH32 + P WH64 )+ (P Hj(WH 64) + P Hj(WH 32)) p (k r)(p WH32 + P WH64 ) P PBF21 byte = P PBF22 byte =... = P PBF24 byte (33) 2386
7 25-byte long input requires two WH 64 in parallel. Pipelined Bloo filters operating in range 25 bytes to 32 bytes have the sae power consuption, and the power consuption is given by P PBF25 byte = (2.P Hi(WH 64))+ p (2.P Hj(WH 64)) = r.2.p WH64 + p (k r)2.p WH64 P PBF25 byte = P PBF26 byte =... = P PBF32 byte (34) Total power consuption of the syste consisting of pipelined Bloo filters is given by, P TOTAL = 6.[r + p(k r)].p WH [r + p(k r)].p WH [r + p.(k r)].p WH64 P TOTAL = [r + p.(k r)] (6P WH16 +8P WH32 +32P WH64 ) (35) By substituting p fro Equ. 7 into the total power consuption in Equ. 35, ] P TOTAL = [r +(1 e kn ) r (k r) (6P WH16 +8P WH32 +32P WH64 ) (36) After substituting the power consuption values of 16 bits, 32 bits, and 64 bits WH type of hash functions fro [12], the total power consuption of a pipelined Bloo filter based NIDS is plotted in Fig. 5. For different values of bits per signature, n, total power consuption vs. nuber of hash functions in the first stage is illustrated. The total power consuption iniized for all of the n values when the nuber of hash functions in the first stage is approxiately 5. Before this threshold value, the atch probability is such large that ost of the tie second stage of hash functions are used to deterine the outcoe of the filter, so the total power consuption increases. After the threshold value, the nuber of hash functions utilized in the first stage increases, which results in the increase of the overall the power consuption of the syste. IV. CONCLUSION We propose to pipeline the hash functions in the Bloo filters that are used in network intrusion detection systes. Analytical results show that pipelining technique significantly decreases the total power consuption of a Bloo filter up to 90%. These type of Bloo filters are especially power efficient when the network is not alignantly congested. It is shown that the less the nuber of hash functions is ipleented in the fist stage of a pipelined Bloo filter, the ore the power consuption is. It is also true that the nuber of bits allocated to per signature, n, affects the power saving ratio in a pipelined Bloo filter. The pipelined Bloo filters are ore Total Power Consuption, µw Total Power Consuption, µw /n=100 /n=50 /n= Nuber of hash functions in the first stage, r /n=100 /n=50 /n= Nuber of hash functions in the first stage, r Fig. 5. Total power consuption w.r.t. the nuber of hash functions utilized in the first stage appropriate when ipleenting network intrusion detection systes, since they are consuing less power copared to the regular Bloo filters. The selection of the hash functions to be deployed in the first stage of a pipelined Bloo filter is another crucial aspect, and it is left as a future work. REFERENCES [1] M. Attig, S. Dharapurikar, and J.L. Lockwood. Ipleentation Results of Bloo Filters for String Matching, Proc. of IEEE Syposiu on Field-Prograable Custo Coputing Machines, pp Washington, DC., [2] B. Bloo, Space/Tie Trade-Offs in Hash Coding with Allowable Errors, Coun. ACM, vol. 13, no. 7, pp , July [3] A. Broder and M. Mitzenacher, Network Applications of Bloo Filters: A Survey, Internet Matheatics, vol. 1, no. 4, pp , July [4] J. L. Carter and M. Wegan, Universal classes of hash functions, Journal of Coputer and Syste Sciences, vol. 18, pp , [5] S. Czerwinski, B. Y. Zhao, T. Hodes, A. D. Joseph, and R. Katz. An Architecture for a Secure Service Discovery Service, Proc. ACM/IEEE International Conference on Mobile Coputing and Networking Transactions on Networking, pp New York, [6] L. Fan, P. Cao, J. Aleida, A. Z. Broder. Suary Cache: A Scalable Wide-Area Web Cache Sharing Protocol, IEEE/ACM Transactions on Networking, vol. 8, no. 3, pp , [7] S. Dharapurikar, P. Krishnaurthy, T.S. Sproull, and J. W. Lockwood, Deep Packet Inspection Using Parallel Bloo Filters, IEEE Micro, vol. 24, no. 1, pp , [8] M. Mitzenacher, Copressed Bloo filters, IEEE/ACM Transactions on Networking, vol. 10, no. 5, pp , October, [9] M. Raakrishna, E. Fu, and E. Bahcekapili, Efficient Hardware Hashing Functions for High Perforance Coputers, IEEE Transactions on Coputers, vol. 48, no. 12, pp , [10] P. Rogaway, Bucket Hashing and Its Application to Fast Message Authentication, Journal of Cryptology, vol. 12, no. 2, pp , [11] The Sourcefire Vulnerability Research Tea, Official Snort Ruleset, Sourcefire, Inc., Colubia, MD, August (web: [12] K. Yuksel, Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications, MS Thesis,Worcester Polytechnic Institute,
Adaptive Harmonic IIR Notch Filter with Varying Notch Bandwidth and Convergence Factor
Journal of Counication and Coputer (4 484-49 doi:.765/548-779/4.6. D DAVID PUBLISHING Adaptive Haronic IIR Notch Filter with Varying Notch Bandwidth and Convergence Factor Li Tan, Jean Jiang, and Liango
More informationA New Localization and Tracking Algorithm for Wireless Sensor Networks Based on Internet of Things
Sensors & Transducers 203 by IFSA http://www.sensorsportal.co A New Localization and Tracking Algorith for Wireless Sensor Networks Based on Internet of Things, 2 Zhang Feng, Xue Hui-Feng, 2 Zhang Yong-Heng,
More informationImplementation of Adaptive Viterbi Decoder
Ipleentation of Adaptive Viterbi Decoder Devendra Made #1 VIII Se B.E.(Etrx) K.D.K.College of Engineering, Nagpur, Maharashtra(I) Asst. Prof. R.B. Khule *2 M.Tech V.L.S.I. K.D.K.College of Engineering,
More informationAllocation of Multiple Services in Multi-Access Wireless Systems
Allocation of Multiple Serices in Multi-Access Wireless Systes Anders Furuskär Wireless@KTH, Royal Institute of Technology, Sweden and Ericsson Research anders.furuskar@era.ericsson.se Abstract This paper
More informationPower Improvement in 64-Bit Full Adder Using Embedded Technologies Er. Arun Gandhi 1, Dr. Rahul Malhotra 2, Er. Kulbhushan Singla 3
Power Iproveent in 64-Bit Full Adder Using Ebedded Technologies Er. Arun Gandhi 1, Dr. Rahul Malhotra 2, Er. Kulbhushan Singla 3 1 Departent of ECE, GTBKIET, Chhapianwali Malout, Punjab 2 Director, Principal,
More informationIntermediate-Node Initiated Reservation (IIR): A New Signaling Scheme for Wavelength-Routed Networks with Sparse Conversion
Interediate-Node Initiated Reservation IIR): A New Signaling Schee for Wavelength-Routed Networks with Sparse Conversion Kejie Lu, Jason P. Jue, Tiucin Ozugur, Gaoxi Xiao, and Irich Chlatac The Center
More informationKeywords: International Mobile Telecommunication (IMT) Systems, evaluating the usage of frequency bands, evaluation indicators
2nd International Conference on Advances in Mechanical Engineering and Industrial Inforatics (AMEII 206) Entropy Method based Evaluation for Spectru Usage Efficiency of International Mobile Telecounication
More informationPower Optimal Signaling for Fading Multi-access Channel in Presence of Coding Gap
Power Optial Signaling for Fading Multi-access Channel in Presence of Coding Gap Ankit Sethi, Prasanna Chaporkar, and Abhay Karandikar Abstract In a ulti-access fading channel, dynaic allocation of bandwidth,
More informationDesign and Implementation of Block Based Transpose Form FIR Filter
Design and Ipleentation of Bloc Based Transpose For FIR Filter O. Venata rishna 1, Dr. C. Venata Narasihulu 2, Dr.. Satya Prasad 3 1 (ECE, CVR College of Engineering, Hyderabad, India) 2 (ECE, Geethanjali
More informationAlternative Encoding Techniques for Digital Loudspeaker Arrays
Alternative Encoding Techniques for Digital Loudspeaer Arrays Fotios Kontoichos, Nicolas Alexander Tatlas, and John Mourjopoulos Audio and Acoustic Technology Group, Wire Counications Laboratory, Electrical
More informationTESTING OF ADCS BY FREQUENCY-DOMAIN ANALYSIS IN MULTI-TONE MODE
THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volue 5, Nuber /004, pp.000-000 TESTING OF ADCS BY FREQUENCY-DOMAIN ANALYSIS IN MULTI-TONE MODE Daniel BELEGA
More informationDSI3 Sensor to Master Current Threshold Adaptation for Pattern Recognition
International Journal of Signal Processing Systes Vol., No. Deceber 03 DSI3 Sensor to Master Current Threshold Adaptation for Pattern Recognition David Levy Infineon Austria AG, Autootive Power Train Systes,
More informationIntroduction Traditionally, studying outage or cellular systes has been based on the signal-to-intererence ratio (SIR) dropping below a required thres
Miniu Duration Outages in Rayleigh Fading Channels Jie Lai and Narayan B. Mandaya WINLAB, Rutgers University 73 Brett Rd., Piscataway, NJ 8854-86 Eail: jlai@winlab.rutgers.edu, narayan@winlab.rutgers.edu
More informationA 1.2V rail-to-rail 100MHz amplifier.
University of Michigan, EECS413 Final project. A 1.2V rail-to-rail 100MHz aplifier. 1 A 1.2V rail-to-rail 100MHz aplifier. Mark Ferriss, Junghwan Han, Joshua Jaeyoung Kang, University of Michigan. Abstract
More informationAnalysis on DV-Hop Algorithm and its variants by considering threshold
Analysis on DV-Hop Algorith and its variants by considering threshold Aanpreet Kaur 1, Pada Kuar 1, Govind P Gupta 2 1 Departent of Coputer Science & Engineering Jaypee Institute of Inforation Technology,
More informationELEC2202 Communications Engineering Laboratory Frequency Modulation (FM)
ELEC Counications Engineering Laboratory ---- Frequency Modulation (FM) 1. Objectives On copletion of this laboratory you will be failiar with: Frequency odulators (FM), Modulation index, Bandwidth, FM
More informationDistributed Resource Allocation for Proportional Fairness in Multi-Band Wireless Systems
Distributed Resource Allocation for Proportional Fairness in Multi-Band Wireless Systes I-Hong Hou CSL and Departent of CS University of Illinois Urbana, IL 61801, USA ihou2@illinois.edu Piyush Gupta Bell
More informationUNIT - II CONTROLLED RECTIFIERS (Line Commutated AC to DC converters) Line Commutated Converter
UNIT - II CONTROLLED RECTIFIERS (Line Coutated AC to DC converters) INTRODUCTION TO CONTROLLED RECTIFIERS Controlled rectifiers are line coutated ac to power converters which are used to convert a fixed
More informationInterference Management in LTE Femtocell Systems Using Fractional Frequency Reuse
Interference Manageent in LTE Fetocell Systes Using Fractional Frequency Reuse Poongup Lee and Jitae Shin School of Inforation and Counication Engineering Sungyunwan University, Suwon, 440-746, Korea {poongup,
More informationPerformance Analysis of Reversible Fast Decimal Adders
Proceedings of the World Congress on Engineering and Coputer Science 7 WCECS 7, October 4-6, 7, San rancisco, USA Perforance Analysis of Reversible ast Decial Adders Rekha K. Jaes, Shahana T. K., K. Poulose
More informationInvestigating Multiple Alternating Cooperative Broadcasts to Enhance Network Longevity
Investigating Multiple Alternating Cooperative Broadcasts to Enhance Network Longevity Aravind Kailas School of Electrical and Coputer Engineering Georgia Institute of Technology Atlanta, Georgia 3033-050,
More informationFORWARD MASKING THRESHOLD ESTIMATION USING NEURAL NETWORKS AND ITS APPLICATION TO PARALLEL SPEECH ENHANCEMENT
FORWARD MASKING THRESHOLD ESTIMATION USING NEURAL NETWORKS AND ITS APPLICATION TO PARALLEL SPEECH ENHANCEMENT T. S. GUNAWAN 1, O. O. KHALIFA 1, E. AMBIKAIRAJAH 2 1 Electrical and Coputer Engineering Departent,
More informationExperiment 7: Frequency Modulation and Phase Locked Loops October 11, 2006
Experient 7: Frequency Modulation and Phase ocked oops October 11, 2006 Frequency Modulation Norally, we consider a voltage wave for with a fixed frequency of the for v(t) = V sin(ω c t + θ), (1) where
More informationCOMBINED FREQUENCY AND SPATIAL DOMAINS POWER DISTRIBUTION FOR MIMO-OFDM TRANSMISSION
The 8th nnual IEEE International Syposiu on Personal, Indoor and Mobile Radio Counications (PIMRC 07) COMINED FREQUENCY ND SPTIL DOMINS POWER DISTRIUTION FOR MIMO-OFDM TRNSMISSION Wladiir ocquet, Kazunori
More informationDistributed Power Delivery for Energy Efficient and Low Power Systems
Distributed Power Delivery for Energy Efficient and Low Power Systes Selçuk Köse Departent of Electrical Engineering University of South Florida Tapa, Florida 33620 kose@usf.edu Eby G. Friedan Departent
More informationA New Simple Model for Land Mobile Satellite Channels
A New Siple Model for Land Mobile Satellite Channels A. Abdi, W. C. Lau, M.-S. Alouini, and M. Kaveh Dept. of Elec. and Cop. Eng., University of Minnesota, Minneapolis, MN 55455 Eails: {abdi, wlau, alouini,
More informationEnergy-Efficient Cellular Communications Powered by Smart Grid Technology
Energy-Efficient Cellular Counications Powered by Sart Grid Technology Itiaz Nasi, Mostafa Zaan Chowdhury, and Md. Syadus Sefat Departent of Electrical and Electronic Engineering Khulna University of Engineering
More informationTransmit Power and Bit Allocations for OFDM Systems in a Fading Channel
Transit Power and Bit Allocations for OFD Systes in a Fading Channel Jiho Jang *, Kwang Bok Lee, and Yong-Hwan Lee * Sasung Electronics Co. Ltd., Suwon P.O.Box, Suwon-si, Gyeonggi-do 44-74, Korea School
More informationReal Time Etch-depth Measurement Using Surface Acoustic Wave Sensor
Australian Journal of Basic and Applied Sciences, (8): -7, 1 ISSN 1991-8178 Real Tie Etch-depth Measureent Using Surface Acoustic Wave Sensor 1 Reza Hosseini, Navid Rahany, 3 Behrad Soltanbeigi, Rouzbeh
More informationA New Worm Exploiting IPv4-IPv6 Dual-stack Networks
A New Wor Exploiting IPv4-IPv6 Dual-stack Networks Qinhua Zheng 1, Ting Liu 1, Xiaohong Guan 1, 2, Yu Qu 1, Na Wang 1 1 SKLMS Lab and MOE KLNNIS Lab, Xi an Jiaotong University, P. R. China 2 Center for
More informationEQUALIZED ALGORITHM FOR A TRUCK CABIN ACTIVE NOISE CONTROL SYSTEM
EQUALIZED ALGORITHM FOR A TRUCK CABIN ACTIVE NOISE CONTROL SYSTEM Guangrong Zou, Maro Antila, Antti Lanila and Jari Kataja Sart Machines, VTT Technical Research Centre of Finland P.O. Box 00, FI-0 Tapere,
More informationCompensated Single-Phase Rectifier
Copensated Single-Phase Rectifier Jānis DoniĦš Riga Technical university jdonins@gail.co Abstract- Paper describes ethods of rectified DC pulsation reduction adding a ensation node to a single phase rectifier.
More informationComparison Between PLAXIS Output and Neural Network in the Guard Walls
Coparison Between PLAXIS Output and Neural Network in the Guard Walls Ali Mahbod 1, Abdolghafar Ghorbani Pour 2, Abdollah Tabaroei 3, Sina Mokhtar 2 1- Departent of Civil Engineering, Shahid Bahonar University,
More informationA State-of-the-Art PMU and MATLAB Based GUI Development towards Power System State Estimation on Real Time Basis
I J E E E International Journal of Electrical, Electronics ISSN No. (Online) : 77-66 and oputer Engineering (): 40-45(0) Special Edition for Best Papers of Michael Faraday IET India Suit-0, MFIIS- State-of-the-rt
More informationPower-Efficient Resource Allocation for MC-NOMA with Statistical Channel State Information
Power-Efficient Resource Allocation for MC-NOMA with Statistical Channel State Inforation Zhiqiang Wei, Derrick Wing Kwan Ng, and Jinhong Yuan School of Electrical Engineering and Telecounications, The
More informationESTIMATION OF OVERCOVERAGE IN THE CENSUS OF CANADA USING AN AUTOMATED APPROACH. Claude Julien, Statistics Canada Ottawa, Ontario, Canada K1A 0T6
ESTMATON OF OVERCOVERAGE N THE CENSUS OF CANADA USNG AN AUTOMATED APPROACH Claude Julien, Statistics Canada Ottawa, Ontario, Canada K1A 0T6 KEY WORDS: Coverage evaluation, two-phase design, stratification
More informationCOMPARISON OF TOKEN HOLDING TIME STRATEGIES FOR A STATIC TOKEN PASSING BUS. M.E. Ulug
COMPARISON OF TOKEN HOLDING TIME STRATEGIES FOR A STATIC TOKEN PASSING BUS M.E. Ulug General Electric Corporate Research and Developent Schenectady, New York 1245 ABSTRACT Waiting ties have been calculated
More informationMismatch error correction for time interleaved analog-to-digital converter over a wide frequency range
Misatch error correction for tie interleaved analog-to-digital converter over a wide frequency range Zouyi Jiang,,2 Lei Zhao,,2,a) Xingshun Gao,2, Ruoshi Dong,2, Jinxin Liu,2, and Qi An,2 State Key Laboratory
More informationLecture 36: MOSFET Common Drain (Source Follower) Amplifier.
Whites, EE 320 Lecture 36 Page 1 of 11 Lecture 36: MOSFET Coon Drain (Source Follower) Aplifier. The third, and last, discrete-for MOSFET aplifier we ll consider in this course is the coon drain aplifier.
More informationBoris Krnic Nov 15, ECE 1352F. Phase Noise of VCOs
Boris Krnic Nov 15, 93 187 13 ECE 135F Phase Noise of VCOs. ABSTRACT The ain purpose of this paper is to present siplified first order noise analysis techniques as applied to ring VCOs. The scarcity of
More informationNotes on Orthogonal Frequency Division Multiplexing (OFDM)
Notes on Orthogonal Frequency Division Multiplexing (OFDM). Discrete Fourier ransfor As a reinder, the analytic fors of Fourier and inverse Fourier transfors are X f x t t, f dt x t exp j2 ft dt (.) where
More informationRelation between C/N Ratio and S/N Ratio
Relation between C/N Ratio and S/N Ratio In our discussion in the past few lectures, we have coputed the C/N ratio of the received signals at different points of the satellite transission syste. The C/N
More informationDepartment of Mechanical and Aerospace Engineering, Case Western Reserve University, Cleveland, OH, 2
Subission International Conference on Acoustics, Speech, and Signal Processing (ICASSP ) PARAMETRIC AND NON-PARAMETRIC SIGNAL ANALYSIS FOR MAPPING AIR FLOW IN THE EAR-CANALTO TONGUE MOVEMENT: A NEW STRATEGY
More informationSECURITY AND BER PERFORMANCE TRADE-OFF IN WIRELESS COMMUNICATION SYSTEMS APPLICATIONS
Latin Aerican Applied Research 39:187-192 (2009) SECURITY AND BER PERFORMANCE TRADE-OFF IN WIRELESS COMMUNICATION SYSTEMS APPLICATIONS L. ARNONE, C. GONZÁLEZ, C. GAYOSO, J. CASTIÑEIRA MOREIRA and M. LIBERATORI
More informationPart 9: Basic AC Theory
Part 9: Basic AC Theory 9.1 Advantages Of AC Systes Dealing with alternating current (AC) supplies is on the whole ore coplicated than dealing with DC current, However there are certain advantages of AC
More informationAn orthogonal multi-beam based MIMO scheme. for multi-user wireless systems
An orthogonal ulti-bea based IO schee for ulti-user wireless systes Dong-chan Oh o and Yong-Hwan Lee School of Electrical Engineering and IC, Seoul ational University Kwana P.O. Box 34, Seoul, 151-600,
More informationBeacon-driven Leader Based Protocol over a GE Channel for MAC Layer Multicast Error Control
I. J. Counications, Network and Syste Sciences, 2008, 2, 05-206 Published Online May 2008 in Scies (http://www.spublishing.org/journal/ijcns/. Beacon-driven Leader Based Protocol over a GE Channel for
More informationSpeech Enhancement using Temporal Masking and Fractional Bark Gammatone Filters
PAGE 420 Speech Enhanceent using Teporal Masking and Fractional Bark Gaatone Filters Teddy Surya Gunawan, Eliathaby Abikairajah School of Electrical Engineering and Telecounications The University of New
More informationRadio Resource Management in a Coordinated Cellular Distributed Antenna System By Using Particle Swarm Optimization
Radio Resource Manageent in a Coordinated Cellular Distributed Antenna Syste By Using Particle Swar Optiization Oer Haliloglu (1), Cenk Toker (1), Gurhan Bulu (1), Hali Yanikoeroglu (2) (1) Departent of
More informationNINTH INTERNATIONAL CONGRESS ON SOUND AND VIBRATION, ICSV9 PASSIVE CONTROL OF LAUNCH NOISE IN ROCKET PAYLOAD BAYS
first nae & faily nae: Rick Morgans Page nuber: 1 NINTH INTERNATIONAL CONGRESS ON SOUND AND VIBRATION, ICSV9 PASSIVE CONTROL OF LAUNCH NOISE IN ROCKET PAYLOAD BAYS Rick Morgans, Ben Cazzolato, Anthony
More informationDesign of Ring Oscillator based VCO with Improved Performance
Abstract Design of Ring Oscillator based VCO with Iproved Perforance Vaishali, Shruti Suan, K.. Shara, P. K. hosh ECE Departent Faculty of Engineering and Technology Mody University of Science and Technology
More informationARecent report pointed out that in 2014 the amount of data
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, JANUARY 2XX 1 QoS-Aware Energy Efficient Association and Resource Scheduling for HetNets Taewoon Ki and J. Morris Chang, Senior Meber, IEEE Abstract
More informationTorsion System. Encoder #3 ( 3 ) Third encoder/disk for Model 205a only. Figure 1: ECP Torsion Experiment
Torsion Syste Introduction This lab experient studies dynaics of a torsional syste with single and ultiple degrees of freedo. The effects of various control configurations are studied in later part of
More informationOn-line Discrete Wavelet Transform in EMTP Environment and Applications in Protection Relaying
On-line Discrete Wavelet Transfor in EMTP Environent and Applications in Protection Relaying N. Perera, A.D. Rajapakse and R.P. Jayasinghe Abstract--This paper describes the developent of an on-line discrete
More informationRandomized Scheduling Algorithms for Wireless Sensor Networks
Randoized Scheduling Algoriths for Wireless Sensor etworks abhendra Bisnik, eeraj Jaggi Rensselaer Polytechnic Institute Troy, Y 80 bisnin@rpiedu, jaggin@rpiedu I ITRODUCTIO A wireless sensor network WS
More informationSecondary-side-only Simultaneous Power and Efficiency Control in Dynamic Wireless Power Transfer System
069060 Secondary-side-only Siultaneous Power and Efficiency Control in Dynaic Wireless Power Transfer Syste 6 Giorgio ovison ) Daita Kobayashi ) Takehiro Iura ) Yoichi Hori ) ) The University of Tokyo,
More informationKalman Filtering for NLOS Mitigation and Target Tracking in Indoor Wireless Environment
16 Kalan Filtering for NLOS Mitigation and Target Tracking in Indoor Wireless Environent Chin-Der Wann National Sun Yat-Sen University Taiwan 1. Introduction Kalan filter and its nonlinear extension, extended
More informationSimplified Analysis and Design of MIMO Ad Hoc Networks
Siplified Analysis and Design of MIMO Ad Hoc Networks Sunil Srinivasa and Martin Haenggi Departent of Electrical Engineering University of Notre Dae Notre Dae, IN 46556, USA Eail: {ssriniv, haenggi}@nd.edu
More informationOPTIMIZE THE POWER CONTROL AND NETWORK LIFETIME USING ZERO - SUM GAME THEORY FOR WIRELESS SENSOR NETWORKS
OTIMIZE THE OWER CONTROL AND NETWORK LIFETIME USING ZERO - SUM GAME THEORY FOR WIRELESS SENSOR NETWORKS Vinoba.V 1, Chithra.S.M 1 Departent of Matheatics, K.N. Governent Arts college, Tail Nadu,( India.)
More informationLETTER Adaptive Multi-Stage Parallel Interference Cancellation Receiver for Multi-Rate DS-CDMA System
IEICE TRANS. COMMUN., VOL.E87 B, NO.8 AUGUST 2004 2401 LETTER Adaptive Multi-Stage Parallel Interference Cancellation Receiver for Multi-Rate DS-CDMA Syste Seung Hee HAN a), Student Meber and Jae Hong
More informationOTC Statistics of High- and Low-Frequency Motions of a Moored Tanker. sensitive to lateral loading such as the SAL5 and
OTC 61 78 Statistics of High- and Low-Frequency Motions of a Moored Tanker by J.A..Pinkster, Maritie Research Inst. Netherlands Copyright 1989, Offshore Technology Conference This paper was presented at
More informationRAKE Receiver. Tommi Heikkilä S Postgraduate Course in Radio Communications, Autumn II.
S-72333 Postgraduate Course in Radio Counications, Autun 2004 1 RAKE Receiver Toi Heikkilä toiheikkila@teliasoneraco Abstract RAKE receiver is used in CDMA-based (Code Division Multiple Access) systes
More informationINTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION ITU-T J.133 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (07/2002) SERIES J: CABLE NETWORKS AND TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA
More informationSound recording with the application of microphone arrays
Coputer Applications in Electrical Engineering Sound recording with the application of icrophone arrays Eugeniusz Kornatowski West Poeranian University of Technology 7-26 Szczecin, 26 Kwietnia, e-ail:
More informationPREDICTING SOUND LEVELS BEHIND BUILDINGS - HOW MANY REFLECTIONS SHOULD I USE? Apex Acoustics Ltd, Gateshead, UK
PREDICTING SOUND LEVELS BEHIND BUILDINGS - HOW MANY REFLECTIONS SHOULD I USE? W Wei A Cooke J Havie-Clark Apex Acoustics Ltd, Gateshead, UK Apex Acoustics Ltd, Gateshead, UK Apex Acoustics Ltd, Gateshead,
More informationFast Node Cardinality Estimation and Cognitive MAC Protocol Design for Heterogeneous M2M Networks
Fast Node Cardinality Estiation and Cognitive MAC Protocol Design for Heterogeneous MM Networks Sachin Kada, Chaitanya S. Raut and Gaurav S. Kasbekar Abstract Machine-to-Machine MM networks are an eerging
More informationA.C. FUNDA- MENTALS. Learning Objectives
C H A P T E R Learning Objectives Generation of Alternating Voltages and Currents Alternate Method for the Equations of Alternating Voltages and currents Siple Wavefors Cycle Different Fors of E.M.F. Equation
More informationNew Characteristics Analysis Considering Transmission Distance and Load Variation in Wireless Power Transfer via Magnetic Resonant Coupling
New Characteristics nalysis Considering Transission Distance and oad Variation in Wireless Power Transfer via Magnetic Resonant Coupling Masaki Kato, Takehiro ura, Yoichi Hori The Departent of dvanced
More informationDesign and Implementation of Serial Port Ultrasonic Distance Measurement System Based on STC12 Jian Huang
International Conference on Education, Manageent and Coputer Science (ICEMC 2016) Design and Ipleentation of Serial Port Ultrasonic Distance Measureent Syste Based on STC12 Jian Huang Xijing University,
More informationUplink blocking probability calculation for cellular systems with WCDMA radio interface and finite source population
Uplin blocing probability calculation for cellular systes with WCDMA radio interface and finite source population Mariusz Głąbowsi *, Macie Stasia *, Aradiusz Wiśniewsi and Piotr Zwierzyowsi * * Institute
More informationFundamental study for measuring microflow with Michelson interferometer enhanced by external random signal
Bulletin of the JSME Journal of Advanced Mechanical Design, Systes, and Manufacturing Vol.8, No.4, 2014 Fundaental study for easuring icroflow with Michelson interferoeter enhanced by external rando signal
More informationContent-Centric Multicast Beamforming in Cache-Enabled Cloud Radio Access Networks
Content-Centric Multicast Beaforing in Cache-Enabled Cloud Radio Access Networks Hao Zhou, Meixia Tao, Erkai Chen,WeiYu *Dept. of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China
More informationYield Enhancement Techniques for 3D Memories by Redundancy Sharing among All Layers
Yield Enhanceent Techniques for 3D Meories by Redundancy Sharing aong All Layers Joohwan Lee, Kihyun Park, and Sungho Kang Three-diensional (3D) eories using through-silicon vias (TSVs) will likely be
More informationAutomated Decentralized Smart Sensor Network for Modal Analysis
Autoated Decentralized Sart Sensor Network for Modal Analysis S. H. Si a, B. F. Spencer a, Jr., M. Zhang b, and H. Xie c a Dept. of Civil and Environental Engineering, University of Illinois at Urbana-Chapaign,
More informationUltrasonic Beamforming with Delta-Sigma Modulators
Proceedings of the 10th WSEAS International Conference on CIRCUITS, Vouliageni, Athens, Greece, July 10-1, 006 (pp344-349) Ultrasonic Beaforing with Delta-Siga Modulators IOAN LIE *, MIHAIL EUGEN TANASE
More informationA Wireless Transmission Technique for Remote Monitoring and Recording System on Power Devices by GPRS Network
Proceedings of the 6th WSEAS International Conference on Instruentation, Measureent, Circuits & Systes, Hangzhou, China, April 15-17, 007 13 A Wireless Transission Technique for Reote Monitoring and Recording
More informationEXPERIMENTAL VERIFICATION OF SINUSOIDAL APPROXIMATION IN ANALYSIS OF THREE-PHASE TWELVE-PULSE OUTPUT VOLTAGE TYPE RECTIFIERS
th INTERNATIONAL SYPOSIU on POWER ELECTRONICS - Ee 9 XV eđunarodni sipoziju Energetska elektronika Ee 9 NOVI SAD, REPUBLIC OF SERBIA, October 8 th - th, 9 EXPERIENTAL VERIFICATION OF SINUSOIDAL APPROXIATION
More informationWIRELESS video sensor networks (WVSNs) are capable
1182 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 60, NO. 3, MARCH 2011 Lifetie and Distortion Optiization With Joint Source/Channel Rate Adaptation and Network Coding-Based Error Control in Wireless
More informationInternational Journal of Electronics and Electrical Engineering Vol. 1, No. 3, September, 2013 MC-DS-CDMA
International Journal of Electronics and Electrical Engineering Vol. 1, No. 3, Septeber, 2013 Analysis of Carrier Frequency Selective Offset Estiation - Using Zero-IF and ZCZ In MC-DS-CDMA Venkatachala.
More informationTHE IMPLEMENTATION OF THE HARTEBEESTHOEK94 CO-ORDINATE SYSTEM IN SOUTH AFRICA
THE IMPLEMENTATION OF THE HARTEBEESTHOEK94 CO-ORDINATE SYSTEM IN SOUTH AFRICA Richard Wonnacott Chief Directorate : Surveys and Mapping South Africa ABSTRACT : The Hartebeesthoek94 co-ordinate syste becae
More informationPerformance Analysis of an AMC System with an Iterative V-BLAST Decoding Algorithm
I. J. Counications, Network and Syste Sciences, 008,, 105-06 Published Online May 008 in SciRes (http://www.srpublishing.org/journal/ijcns/). Perforance Analysis of an AMC Syste with an Iterative V-BLAST
More informationOn the field of view of a Galilean telescope
Transactions of the Optical Society On the field of view of a Galilean telescope To cite this article: H A Hughes and P F Everitt 1920 Trans. Opt. Soc. 22 15 View the article online for updates and enhanceents.
More informationLOW COST PRODUCTION PHASE NOISE MEASUREMENTS ON MICROWAVE AND MILLIMETRE WAVE FREQUENCY SOURCES
Page 1 of 10 LOW COST PRODUCTION PHASE NOISE MEASUREMENTS ON MICROWAVE AND MILLIMETRE WAVE FREQUENCY SOURCES Hugh McPherson Spectral Line Systes Ltd, Units 1,2&3 Scott Road, Tarbert, Isle of Harris. www.spectral-line-systes.co.uk
More informationSmarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math
Sarter Balanced Assessent Consortiu Clais, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents
More informationKeywords Frequency-domain equalization, antenna diversity, multicode DS-CDMA, frequency-selective fading
Joint Frequency-doain Equalization and Antenna Diversity Cobining for Orthogonal Multicode DS-CDMA Signal Transissions in A Frequency-selective Fading Channel Taeshi ITAGAKI *1 and Fuiyui ADACHI *2 Dept.
More informationGreen Downlink Radio Management Based Cognitive Radio LTE HetNets
Green Downlink Radio Manageent Based Cognitive Radio LTE HetNets Ahad Alsharoa, Ahed E. Kaal Departent of Electrical and Coputer Engineering, Iowa State University (ISU), Aes, Iowa, USA, Eail: {alsharoa,
More informationInternational Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Volume 3, Issue 9, September 2014
International Journal of Advanced Research in Electronics and Counication Engineering Volue 3, Issue 9, Septeber 2014 High Speed Error Detection and Data Recovery Architecture for Video Testing Applications
More informationA Robust Scheme for Distributed Control of Power Converters in DC Microgrids with Time-Varying Power Sharing
A Robust Schee for Distributed Control of Power Converters in DC Microgrids with Tie-Varying Power Sharing Mayank Baranwal,a, Alireza Askarian,b, Srinivasa M. Salapaka,c and Murti V. Salapaka,d Abstract
More informationThis is an author-deposited version published in: Eprints ID: 5737
Open Archive Toulouse Archive Ouverte (OATAO) OATAO is an open access repository that collects the work of Toulouse researchers and akes it freely available over the web where possible. This is an author-deposited
More informationACCURATE DISPLACEMENT MEASUREMENT BASED ON THE FREQUENCY VARIATION MONITORING OF ULTRASONIC SIGNALS
XVII IMEKO World Congress Metrology in 3rd Millenniu June 22 27, 2003, Dubrovnik, Croatia ACCURATE DISPLACEMENT MEASUREMENT BASED ON THE FREQUENCY VARIATION MONITORING OF ULTRASONIC SIGNALS Ch. Papageorgiou
More informationOptimal Modulation Index of the Mach-Zehnder Modulator in a Coherent Optical OFDM System Employing Digital Predistortion
Optial Modulation Index of the Mach-Zehnder Modulator in a Coherent Optical OFDM yste Eploying Digital redistortion David Rörich, Xiaojie Wang, Michael Bernhard, Joachi peidel Universität tuttgart, Institut
More informationWIPL-D Pro: What is New in v12.0?
WIPL-D Pro: What is New in v12.0? Iproveents/new features introduced in v12.0 are: 1. Extended - Extree Liits a. Extreely LOW contrast aterials b. Extended resolution for radiation pattern c. Extreely
More informationDynamic Model Displacement for Model-mediated Teleoperation
Dynaic Model Displaceent for Model-ediated Teleoperation Xiao Xu Giulia Paggetti Eckehard Steinbach Institute for Media Technology, Technische Universität München, Munich, Gerany ABSTRACT In this paper,
More informationLOCATION Based Service (LBS) has become an indispensable
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content ay change prior to final publication. Citation inforation: DOI 1.11/TWC.17.777,
More informationEfficient Non-linear Changed Mel-filter Bank VAD Algorithm
Matheatical Models and Methods in Modern Science Efficient on-linear Changed Mel-filter Bank VAD Algorith DAMJA VLAJ, ZDRAVKO KAČIČ, MARKO KOS Faculty of Electrical Engineering and Coputer Science University
More informationSpectrum Sensing in Low SNR: Diversity Combining and Cooperative Communications
0 6th International Conference on Industrial and Inforation Systes, ICIIS 0, Aug. 6-9, 0, Sri Lanka Spectru Sensing in Low SR: Diversity Cobining and Cooperative Counications Saan Atapattu, Chintha Tellabura,
More informationA NEW APPROACH TO UNGROUNDED FAULT LOCATION IN A THREE-PHASE UNDERGROUND DISTRIBUTION SYSTEM USING COMBINED NEURAL NETWORKS & WAVELET ANALYSIS
A NEW APPROACH TO UNGROUNDED FAULT LOCATION IN A THREE-PHASE UNDERGROUND DISTRIBUTION SYSTEM USING COMBINED NEURAL NETWORKS & WAVELET ANALYSIS Jaal Moshtagh University of Bath, UK oshtagh79@yahoo.co Abstract
More informationThe Research of PV MPPT based on RBF-BP Neural Network Optimized by GA
nternational Conference on Logistics Engineering, Manageent and Coputer Science (LEMCS 215) The Research of PV MPPT based on RBF-BP Neural Network Optiized by GA Jian Liu xxliujian@sjzu.edu.cn iaolin u
More informationABSTRACT 1. INTRODUCTION
Adaptive characterization of laser daage fro sparse defects Sa Richan *, Alexander R. Martin, Quentin Turchette and Trey Turner RO, 555 Airport Blvd., Boulder, CO, USA 831 ABSTRACT Standard techniques
More informationTexas Transportation Institute The Texas A&M University System College Station, Texas
. Report No. FHWA/TX-04/752-4 2. Governent Accession No. 3. Recipient's Catalog No. 4. Title and Subtitle A MODEL FOR EVALUATING INTEGRATION STRATEGIES FOR OPERATING DIAMOND INTERCHANGE AND RAMP METERING
More information