Primary User Enters the Game: Performance of Dynamic Spectrum Leasing in Cognitive Radio Networks
|
|
- Augustus Robbins
- 5 years ago
- Views:
Transcription
1 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO., DECEMBER 365 Primary User Enters the Game: Performance of Dynamic Sectrum Leasing in Cognitive Radio Networks Gonzalo Vazquez-Vilar, Student Member, IEEE, Carlos Mosquera, Member, IEEE, and Sudharman K. Jayaweera, Senior Member, IEEE Abstract Dynamic sectrum leasing DSL) is one of the schemes roosed for dynamic sectrum sharing DSS) in cognitive radio networks. In DSL, sectrum owners, denoted as rimary users, dynamically adjust the amount of secondary interference they are willing to tolerate in resonse to the demand from secondary transmitters. In this corresondence we investigate how much can be gained by rimary users if this limited interaction with secondary system is allowed, comared to a scheme in which the interference ca allowed by rimary users is fixed arioriby a regulatory authority. To that end, we define erformance metrics for both rimary and secondary systems based on the theoretically achievable multiuser sum-rate of the secondary system and analyze both schemes behavior with resect to different system arameters. This analysis shows that i) in dynamic environments DSL based schemes may resent an imortant advantage over other schemes with fixed interference constraints, and ii) DSL schemes are robust against inaccurate arioriinformation that may degrade system erformance. Index Terms Cognitive radio, DSL, dynamic sectrum sharing, dynamic sectrum leasing, game theory, multiuser decoding. I. INTRODUCTION RECENT studies [], [] have showed that the aradox of aarent scarcity of radio sectrum while most of the bands are underutilized occurs mainly due to the inefficiency of traditional static sectrum allocation olicies. This has romted roosals for various dynamic sectrum sharing DSS) aroaches, such as dynamic sectrum leasing DSL) [3] [5]. As oosed to assive sectrum sharing by the rimary users considered in many revious DSS roosals, leasing, as roosed in [3] [5], means that the rimary users have an incentive e.g. monetary rewards as leasing ayments) to allow secondary users to access their licensed sectrum. Therefore, the rimary user lays an active role in interference management and dynamically controls how much interference Manuscrit received June 7, ; revised Setember, ; acceted Setember 5,. The associate editor coordinating the review of this letter and aroving it for ublication was C. Cordeiro. G. Vazquez-Vilar and C. Mosquera are with the Deartamento de Teoría de la Señal y Comunicaciones, Universidad de Vigo, 363 Vigo, Sain {gvazquez, mosquera}@gts.tsc.uvigo.es). S. K. Jayaweera is with the Deartment of Electrical and Comuter Engineering, University of New Mexico, Albuquerque, NM 873-, USA jayaweera@ece.unm.edu). This research was suorted in art by the Sanish Government and the Euroean Regional Develoment Fund ERDF) under rojects SPROACTIVE ref. TEC C-/TCM) and COMONSENS CONSOLIDER- INGENIO CSD8-). University of New Mexico s contribution was suorted by the Air Force Research Laboratory AFRL) Sace Vehicles Directorate. Digital Object Identifier.9/TWC /$5. c IEEE must be allowed from the secondary system. In DSL the rimary user is assumed to adat its interference ca IC), denoted by Q [, Q ], which is the maximum total interference the rimary user is willing to tolerate from secondary transmissions at any given time. While in [4], [5] we roosed a game theoretical framework in order to model and analyze a ractical DSL scheme, in this work we are interested in the best erformance achievable by a general DSL scheme. Hence, we investigate the erformance imrovement that can be exected by a DSL based aradigm with resect to assive sectrum sharing schemes which do not allow dynamic rimary-secondary network interaction based on roactive rimary systems. The roosed analysis results into a Stackelberg game formulation of the interactions between rimary and secondary systems. Stackelberg games have been reviously used to model cognitive radio systems. A cooerative scheme in which secondary users actively collaborate with the rimary user transmissions was roosed in [6]. However a high degree of awareness and global synchronization is required by the two in rincile heterogeneous systems. A Stackelberg game formulation is also used in [7], [8] to describe the high level interactions within the network. However these works do not consider hysical layer issues such as modulation used or imact of the rimary / secondary interference in the attainable rates of the system. As oosed to revious works, in the resent corresondence we use erformance metrics based on the multiuser sum-rate attainable by the secondary system. We choose this erformance metric because it is a fundamental limit against which ractical schemes can be comared, while it is indeendent of articular DSL imlementations. Most information theoretic work on the cognitive radio channel assumes a certain amount of knowledge by the secondary system on the transmitted rimary codeword that allows the use of dirty aer coding by the secondary system see i.e. [9]). In this work, however, we relax this assumtion and treat rimary transmission urely as noise. The rest of this aer is organized as follows: In Section II we introduce a signal model and the assumed decoding strategies emloyed by rimary and secondary users. Next, in Section III we roose a general family of erformance metrics for both rimary and secondary users and quantitatively show the erformance gain of a DSL based scheme In ractical systems strict causality hinders the arioriknowledge of the rimary user s codeword at secondary transmitters. On the other hand, at secondary receivers rimary signals cannot be reliably decoded due to SNR considerations or synchronization issues.
2 366 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO., DECEMBER over schemes in which the amount of interference tolerated by the rimary system is fixed. A ractical examle with two concrete erformance metric functions is resented in Section IV. Finally, Section V concludes this aer. II. SYSTEM AND SIGNAL MODEL In this work, for simlicity of exosition, we assume uncorrelated block fading channels and the existence of a single rimary link and a single secondary receiver of interest. K secondary transmitters are interested in accessing this sectrum band to the maximum ossible extent. While Matched filter MF) decoding is a oular decoding structure due to its simlicity and erforms reasonably well in systems with weak cross-channels, in an interference limited regime it is clearly subotimal and it is outerformed by joint decoding of multile users. We will consider here the otimal joint maximum likelihood multiuser decoder ML MUD) []. Note that multile schemes exist today for the ractical imlementation of multiuser decoding, such as successive interference cancellation hard) or multiuser turbo decoding soft). We require a limited awareness by the rimary receiver of the secondary system. Therefore secondary transmissions are considered as noise in the rimary decoding rocess. On the other hand, the base station of the secondary system is assumed to have a MUD for the K secondary transmissions while the rimary signal is assumed to be undecodable and thus treated as noise. A. Signal model The rimary user is denoted as user while the secondary transmitters are labeled as users through K. Adiscretetime reresentation of the received signals at the rimary and secondary receivers can be written as r [n] =h s [n]+ h k [n] s k [n]+σ n [n]; ) r s [l] =h s s [l]+ h sk [l]s k [l]+σ s n s [l] ) where n and l reresent the discrete samling times at rimary and secondary receivers resectively, h k and h sk are the effective channels from k-th transmitter to the rimary and secondary receivers resectively. If s k t) denotes the signal transmitted by the k-th user, then s k [n] denotes a synchronously samled and s k [n] an asynchronously samled version of s k t). Finally n [n] and n s [n] are iid Gaussian rocesses normalized to have variance so that σ and σ s reresent the noise ower levels at the rimary and secondary receivers, resectively. We denote the transmit ower of the k-th user as k. = E{ s k [n] }. = E{ s k [n] } for k =,,...,K. Note that this assumes that any deviations on the received ower due to front-end and bandwidth differences are absorbed into the effective channel coefficients. Then it is straightforward to see While in the schemes resented in [4], [5] more comlex set-us were emloyed, here we consider a simlified scenario to better illustrate the theoretical advantage of DSL over schemes that emloy fixed interference ca levels. R s) Q = Q =8 Q =6 Q =4 Q = R s) Saturation due to ower constraint Fig.. Secondary system -user rate region for different values of Q. that the actual interference ower generated by the secondary system at the rimary user is given by. K = h k k. 3) I B. Decoding strategy Primary user. The maximum achievable rate er channel use assuming secondary interference as noise at the rimary system is given by R W log + h ) I + σ 4) where W reresents the bandwidth emloyed by rimary transmissions and the transmitted ower is determined by the required quality of service QoS) and the interference ca selected. Secondary user. If otimal multiuser decoding is used in the secondary system with bandwidth W s, the maximum achievable sum rate at the secondary receiver treating rimary transmissions as noise is, see e.g. Sec in [], ) K R s <W s log + h sk k h s + σs 5) for each of the allowed secondary ower assignments k with k =,...,K, which are determined by the maximum interference allowed at the rimary user I Q and secondary user individual ower constraints k < k. The rate region obtained with this scheme is similar to the one obtained in a Gaussian Multile Access Channel, with the eculiarity that on to of having individual ower constraints, secondary users have a weighted global ower constraint. The individual rates achieved by each secondary user will deend on the articular coding/decoding strategy used. From the constraint I Q and given the definition of I we have that the term K h sk k in 5) is uer bounded by a monotonically increasing affine function of Q.Then it is aarent from 5) that while the uer bound on the secondary sum-rate is monotonically increasing with Q,the growth rate decreases with Q due to the logarithmic relation
3 VAZQUEZ-VILAR et al.: PRIMARY USER ENTERS THE GAME: PERFORMANCE OF DYNAMIC SPECTRUM LEASING IN COGNITIVE RADIO NETWORKS 367 with K h sk k. Figure shows an examle of the rate region obtained in a two user secondary system where the channel from user to rimary is much weaker than the one from user for different values of Q. While in general the region is increasing with Q, the effect of the individual ower constraints of the secondary nodes translates into the artial saturation of the achievable rate region. III. PERFORMANCE COMPARISON Although erformance evaluation of cognitive radio systems is imortant in comaring and ranking different aradigms, it has received only a limited attention in current literature []. Even for the relatively simle model considered in this work, there exist several ossible evaluation metrics: maximum achievable sum-rates at rimary and secondary systems R and R s resectively, ower dissiated by a given user k, interference generated at the rimary user I, robability of rimary outage rob{i > Q }, fairness among users, and sectral efficiency, among others. Therefore, an adequate utility function must first be defined in order to comare DSL based aradigms with other schemes. A. Performance metric While in our model a natural erformance metric for the secondary system should be an increasing function of the attained sum rate R s, the rimary user s utility needs further considerations. Since the rimary user suffers from a ermitted) interference I from the secondary system, in order to maintain its QoS the rimary user transmitted ower is increased with resect to an exclusive use of the frequency band I =). We denote this increment in the transmitted ower by Δ. Hence the rimary user needs an incentive to allow secondary users to use its managed sectrum. We assume here that the secondary system comensates the rimary user with a ayment monetary or of other nature) related to the generated interference I. As a result, the utility functions for rimary and secondary systems can be written as: U = u I, Δ ), 6) U s = u s R s,i ) 7) where rimary utility u ) is growing with I and decreasing with Δ, while secondary utility u s ) grows with R s.we additionally assume that when the interference constraint is violated, that is when I >Q, the enalization imosed by the rimary system to the secondary system imlies U =, U s =. This enalty discourages the secondary system from violating the allowed interference ca. B. Performance gain For a given interference ca Q the secondary utility U s is maximized for the secondary ower vector =[. K ] T rovided that Q ) = arg max {u sr s,q ),I ))} 8) subject to I ) Q, where we defined. = [ K ] T and the oerator denotes element by element comarison. Here we have exlicitly shown the deendence of R s on Q. We define the corresonding rimary and secondary utilities as U Q ) =. U Q ),Q ) and Us Q ) =. U s Q ),Q ), resectively. If the rimary user fixes ariorithe interference ca Q in a time varying environment its exected utility is given by E[U Q )] where the exectation is taken with resect to the channel realizations. On the other hand, in a DSL scheme we allow the rimary system to dynamically adjust the allowed interference ca Q. We can now comute the maximum achievable utility for both tyes of schemes: Schemes with fixed Q : If the rimary user chooses the value of Q that maximizes the exected utility and uses it for all channel realizations, its utility is given by U fixed =max Q {E[U Q )]}. 9) DSL schemes: On the other hand, in a DSL-based system, the rimary will choose the interference ca Q to maximize its own utility for each channel realization. The best exected rimary utility achievable in this dynamic environment is U dsl = E[max{U Q )}]. ) Q dsl fixed It is easy to see from 9) and ) that U U, with equality if and only if the otimal Q is constant for all channel realizations. In the next section we will use a simle examle to show that indeed the gain obtained by a DSL scheme can be significant. Remark: In deriving ) we imlicitly formulated the interaction between the rimary and secondary systems as a Stackelberg game [3], in which the rimary user acts as Stackelberg leader and the secondary system acts as follower. While this is a natural model for cognitive radio systems in which the rimary can always act unilaterally while secondary users have to adat their actions to the imosed constraint [4], ractical imlementations that achieve this behavior are a toic of further research. C. Practical considerations While in the revious analysis we did not discuss how a ractical scheme could achieve the derived erformance, we resent here some ractical issues that need to be taken into account. In the roosed Stackelberg game we assumed that both rimary and secondary systems have erfect knowledge of all system arameters, and thus they can otimize their erformance by maximizing their own utilities. However, even for classical schemes with fixed interference ca it is difficult for a secondary system to determine how much interference it causes to a rimary receiver. A ractical imlementation would require secondary users to estimate their channels to the rimary receivers. This could be erformed in dulex rimary systems with recirocal ulink and downlink channels by monitoring the rimary signal levels. On the other hand, DSL based schemes could achieve the oerating oint redicted by the Stackelberg equilibrium without requiring full knowledge of the system arameters. For examle, if the utilities are such that the Stackelberg equilibrium coincides with the unique Nash equilibrium of the
4 368 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO., DECEMBER game, it can be achieved via an iterative game between the rimary and secondary systems. The ractical DSL scheme roosed in [4] only requires the rimary system to broadcast the values of I and Q. Even though this aroach requires a certain degree of awareness about the secondary network by the rimary system, it results in a ractical scheme that can easily be imlemented in ractice. Due to sace limitations, in the following we will focus on theoretically achievable erformance and disregard ractical imlementation considerations. IV. EXAMPLE For illustration uroses, in this section we assume that the utilities associated with rimary and secondary users are resectively U = I μ P Δ, ) U s = μ R R s I ) with the additional restriction that I Q. That is, the rimary system obtains a reward roortional to the suffered interference I through the corresonding charge to the secondary system. Without loss of generality we assume here the ayoff er unit of interference equal to. The rimary user has a cost associated to the extra ower Δ required to maintain its desired QoS, riced at the rate of μ P. The reward for the secondary system is roortional to the achievable sum rate R s riced at the rate of μ R. Note that whereas these utilities kee the sirit of 6) and 7), they are also simle enough to obtain analytical results. A. Analysis Assuming equality in 5) we may rewrite ) as K h sk h U s = μ R W s log + k k σs + h s k 3). wherewehavedefined k = hk k >. In order to maximize U s with resect to k we first note that for fixed K k = I, U s is growing with resect to a convex combination of the ositive) ratios h sk /I h k ). Hence, for a fixed I, U s is maximized when all the allowed secondary interference I is allocated to the secondary transmitters with the largest ratios h sk / h k u to their individual ower constraints. Formally, if we define the indexes of the sorted effective channels as {i,i,...,i K } such that h si h i h si h i h si K h ik, 4) the otimal ower assignment is given by h ik ik, δ k <I,. i k = I δ k, δ k I δ k, 5), elsewhere,. k where we defined δ k = l= h i l il. Then we may define the instantaneous channel ratio η as η. = K h sk h k k I. 6) Note that when the secondary individual ower constraints are not active I h i i, hence η reduces to the largest channel ratio air: η =max k { h sk / h k }.Otherwiseη is a convex combination of the strongest channel ratio airs. Remark: While the simle utility ) leads to an oortunistic access scheme that does not take into account fairness among secondary users, in the general setting U s could take a more comlex form in order to guarantee fairness. However this analysis lies out of the scoe of the resent work. Using 6) and substituting 5) in 3) we have that U s = μ R W s log + ηi σ s + h s ) I. 7) Equating the derivative of 7) with resect to I to zero, we obtain the global U s maximizer. Taking into account the additional constraint I <Q, one obtains that the otimal I is given by I Q )=min Q,W s μ R +σ s + h s )/η ). 8) As in [4], we will assume here that = γq +σ )/ h where γ is the target rimary SINR to assure a required QoS. Then it follows that U Q )=I μ P Δ and 9) Us Q ηi ) )=μ R W s log + σs + h s I, ) where we omitted the deendence of I on Q. The maximal rimary utility is achieved by a DSL system maximizing U Q ). Given the restriction I Q and since U is growing with I and decreasing with Q it can be shown that U Q ) is maximized when I = Q. Hence the otimal instantaneous Q is given by Q = ηw sμ R h s h γσ σs. ) η + hs h γ Note that, as can be seen from ) above, the otimal strategy for the rimary user is heavily deendent on the scenario and thus cannot be fixed a riori. In order to comute the exected gain in a dynamic environment for a DSL based scheme over dsl fixed a aradigm with fixed Q,givenby U U,wefurther need to define a channel model and comute the average of 9) with resect to all channel realizations. Although, in general, the exected gain cannot be comuted in a closed form, it can easily be evaluated numerically for any given set of arameters. B. Numerical results We assume that channels to secondary receiver h k and h sk are Rayleigh distributed with E{ h k } = E{ h sk } =. The remaining system arameters are K =3, k =, Q =, σ = σ s =while the transmitters are considered fixed with h = h s =. We emloy normalized bandwidth W = W s =,targetsinr γ =and resource rizes initially set to μ P =. and μ R =. Figure shows the comarison between a DSL based scheme and a scheme in which the allowed interference ca Q is fixed for the given set of system arameters. In Fig. a)
5 VAZQUEZ-VILAR et al.: PRIMARY USER ENTERS THE GAME: PERFORMANCE OF DYNAMIC SPECTRUM LEASING IN COGNITIVE RADIO NETWORKS 369 U Us a) Q DSL Fixed Q b) Q DSL Fixed Q Fig.. Primary/secondary users average erformance in a time varying environment. a) Primary user erformance. b) Secondary user erformance. we can see that even if a fixed system were to use the otimal Q.5, the rimary utility attainable by a DSL based scheme is about 5% larger than the one of the fixed scheme. On the other hand, if we look at the secondary utility obtained by a DSL based scheme comared to a scheme with fixed Q, as shown in Fig. b), we can see that while fixed schemes erform better than DSL for a small range of Q values, for the otimal oerating oint of the fixed scheme Q.5) DSL erforms slightly better than the fixed scheme. That is, in this setting both rimary and secondary users can benefit from the use of a DSL scheme. Moreover in a DSL based scheme the allowed interference at the rimary is comuted on line, and thus it does not need to be fixed ariori. Hence, DSL schemes can be robust against inaccurate knowledge of the system arameters that may degrade both rimary and secondary erformance at the exense of the extra comlexity required for dynamically setting the value of Q. Note from Fig. that a small change in the Q value for the fixed scheme can significantly degrade the global system erformance. However, as we ointed out above the advantage of DSL based schemes vanishes if the otimal rimary user action Q is indeendent from the channel realization. If we assume high reward for the secondary system sum rate, that is μ R =, the best resonses for both rimary and secondary users turn to be I = Q = Q, not deending on the channel realization. In this case DSL and fixed schemes with Q = Q turn out to be equivalent achieving U 8.99 and U s 35. V. CONCLUSIONS In this corresondence we analyzed the erformance gain that a rimary user can exect by allowing a limited interaction with secondary systems. For a family of erformance metrics based on the secondary user sum-rate we showed that DSL based schemes can outerform classical schemes in dynamic environments. Moreover, since the allowed interference at the rimary is comuted on-line, DSL schemes are robust to inaccuracies on the arioriknowledge on system arameters that can degrade both rimary and secondary erformances. These results advocate the design of ractical dynamic sectrum sharing schemes based on DSL tye architectures with a limited interaction between rimary and secondary systems, as oosed to reviously roosed fixed interference ca frameworks. REFERENCES [] FCC, Reort of the sectrum efficiency working grou," FCC Sectrum Policy Task Force, Tech. Re., Nov.. [], ET docket no 3-3 notice of roosed rulemaking and order," Tech. Re., Dec. 3. [3] S. K. Jayaweera and T. Li, Dynamic sectrum leasing in cognitive radio networks via rimary-secondary user ower control games," IEEE Trans. Wireless Commun., vol. 8, no. 6, , June 9. [4] S. Jayaweera, G. Vazquez-Vilar, and C. Mosquera, Dynamic sectrum leasing: a new aradigm for sectrum sharing in cognitive radio networks," IEEE Trans. Veh. Technol., vol. 59, no. 5, , June. [5] K. Hakim, S. K. Jayaweera, G. El-howayek, and C. Mosquera, Efficient dynamic sectrum sharing in cognitive radio networks: centralized dynamic sectrum leasing C-DSL)," IEEE Trans. Wireless Commun., vol. 9, no. 9, , Se.. [6] J. Zhang and Q. Zhang, Stackelberg game for utility-based cooerative cognitiveradio networks," in Proc. th ACM International Sym. Mobile Ad Hoc Netw. Comut., 9, [7] A. Ercan, J. Lee, S. Pollin, and J. Rabaey, A revenue enhancing Stackelberg game for owners in oortunistic sectrum access," in Proc. 3rd IEEE Sym. New Frontiers Dynamic Sectrum Access Netw. 8, Oct. 8,. -8. [8] A. Al Daoud, T. Alcan, S. Agarwal, and M. Alanyali, A Stackelberg game for ricing ulink ower in wide-band cognitive radio networks," in Proc. IEEE Conf. Decision Control 8, Dec. 8, [9] P. Cheng, G. Yu, Z. Zhang, H.-H. Chen, and P. Qiu, On the achievable rate region of Gaussian cognitive multile access channel," IEEE Commun. Lett., vol., no. 5, , May 7. [] S. Verdu, Multiuser Detection. Cambridge University Press, 998. [] T. M. Cover and J. A. Thomas, Elements of Information Theory, nd edition. Wiley-Interscience, 6. [] Y. Zhao, S. Mao, J. Neel, and J. Reed, Performance evaluation of cognitive radios: metrics, utility functions, and methodology," Proc. IEEE, vol. 97, no. 4, , Ar. 9. [3] D. Fugenberg and J. Tirole, Game Theory. MIT Press, 99. [4] O. Simeone, I. Stanojev, S. Savazzi, Y. Bar-Ness, U. Sagnolini, and R. Pickholtz, Sectrum leasing to cooerating secondary ad hoc networks," IEEE J. Sel. Areas Commun., vol. 6, no.,. 3-3, Jan. 8.
A Pricing-Based Cooperative Spectrum Sharing Stackelberg Game
A Pricing-Based Cooerative Sectrum Sharing Stackelberg Game Ramy E. Ali, Karim G. Seddik, Mohammed Nafie, and Fadel F. Digham? Wireless Intelligent Networks Center (WINC), Nile University, Smart Village,
More informationEvolutionary Circuit Design: Information Theory Perspective on Signal Propagation
Evolutionary Circuit Design: Theory Persective on Signal Proagation Denis Poel Deartment of Comuter Science, Baker University, P.O. 65, Baldwin City, KS 66006, E-mail: oel@ieee.org Nawar Hakeem Deartment
More informationA Game-theoretic Framework for Dynamic Spectrum Leasing (DSL) in Cognitive Radios
A Game-theoretic Framewor for Dynamic Spectrum Leasing DSL in Cognitive Radios Sudharman K. Jayaweera, Kamrul Haim Department of Electrical and Computer Engineering University of New Mexico Albuquerque,
More informationTransmitter Antenna Diversity and Adaptive Signaling Using Long Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1
Transmitter Antenna Diversity and Adative Signaling Using ong Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1 Shengquan Hu, Tugay Eyceoz, Alexandra Duel-Hallen North Carolina State University
More informationIN RECENT YEARS, it has been observed that the scarcity
2328 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 5, JUNE 2010 Dynamic Spectrum Leasing: A New Paradigm for Spectrum Sharing in Cognitive Radio Networs Sudharman K. Jayaweera, Senior Member,
More informationA toy-model for the regulation of cognitive radios
A toy-model for the regulation of cognitive radios Kristen Woyach and Anant Sahai Wireless Foundations Deartment of EECS University of California at Berkeley Email: {kwoyach, sahai}@eecs.berkeley.edu Abstract
More informationCapacity Gain From Two-Transmitter and Two-Receiver Cooperation
3822 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 Caacity Gain From Two-Transmitter and Two-Receiver Cooeration Chris T. K. Ng, Student Member, IEEE, Nihar Jindal, Member, IEEE,
More informationEfficient Importance Sampling for Monte Carlo Simulation of Multicast Networks
Efficient Imortance Samling for Monte Carlo Simulation of Multicast Networks P. Lassila, J. Karvo and J. Virtamo Laboratory of Telecommunications Technology Helsinki University of Technology P.O.Box 3000,
More informationANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM
ANALYSIS OF ROBUST MILTIUSER DETECTION TECHNIQUE FOR COMMUNICATION SYSTEM Kaushal Patel 1 1 M.E Student, ECE Deartment, A D Patel Institute of Technology, V. V. Nagar, Gujarat, India ABSTRACT Today, in
More informationAntenna Selection Scheme for Wireless Channels Utilizing Differential Space-Time Modulation
Antenna Selection Scheme for Wireless Channels Utilizing Differential Sace-Time Modulation Le Chung Tran and Tadeusz A. Wysocki School of Electrical, Comuter and Telecommunications Engineering Wollongong
More informationPerformance Analysis of LTE Downlink under Symbol Timing Offset
Performance Analysis of LTE Downlink under Symbol Timing Offset Qi Wang, Michal Šimko and Markus Ru Institute of Telecommunications, Vienna University of Technology Gusshausstrasse 25/389, A-1040 Vienna,
More informationInvestigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation
International Journal Of Comutational Engineering Research (ijceronline.com) Vol. 2 Issue. Investigation on Channel Estimation techniques for MIMO- OFDM System for QAM/QPSK Modulation Rajbir Kaur 1, Charanjit
More informationPerformance Analysis of MIMO System using Space Division Multiplexing Algorithms
Performance Analysis of MIMO System using Sace Division Multilexing Algorithms Dr.C.Poongodi 1, Dr D Deea, M. Renuga Devi 3 and N Sasireka 3 1, Professor, Deartment of ECE 3 Assistant Professor, Deartment
More informationUplink Scheduling in Wireless Networks with Successive Interference Cancellation
1 Ulink Scheduling in Wireless Networks with Successive Interference Cancellation Majid Ghaderi, Member, IEEE, and Mohsen Mollanoori, Student Member, IEEE, Abstract In this aer, we study the roblem of
More informationA Game Theoretic Analysis of Distributed Power Control for Spread Spectrum Ad Hoc Networks
A Game Theoretic Analysis of Distributed ower Control for Sread Sectrum Ad Hoc Networs Jianwei Huang, Randall A. Berry, Michael L. Honig Deartment of Electrical & Comuter Engineering, Northwestern University,
More informationOperating Characteristics of Underlay Cognitive Relay Networks
Oerating Characteristics of Underlay Cognitive Relay Networks Ankit Kaushik, Ralh Tanbourgi, Friedrich Jondral Communications Engineering Lab Karlsruhe Institute of Technology (KIT) {Ankit.Kaushik, Ralh.Tanbourgi,
More informationOptimal p-persistent MAC algorithm for event-driven Wireless Sensor Networks
Otimal -ersistent MAC algorithm for event-driven Wireless Sensor Networks J. Vales-Alonso,E.Egea-Lóez, M. V. Bueno-Delgado, J. L. Sieiro-Lomba, J. García-Haro Deartment of Information Technologies and
More informationEconomics of Strategy (ECON 4550) Maymester 2015 Foundations of Game Theory
Economics of Strategy (ECON 4550) Maymester 05 Foundations of Game Theory Reading: Game Theory (ECON 4550 Courseak, Page 95) Definitions and Concets: Game Theory study of decision making settings in which
More informationPerformance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional Spread-Spectrum Systems
I TRANSACTIONS ON CIRCUITS AND SYTMS I: FUNDAMNTAL THORY AND APPLICATIONS, VOL. 50, NO., NOVMBR 2003 475 Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional
More informationIndirect Channel Sensing for Cognitive Amplify-and-Forward Relay Networks
Indirect Channel Sensing for Cognitive Amlify-and-Forward Relay Networs Yieng Liu and Qun Wan Abstract In cognitive radio networ the rimary channel information is beneficial. But it can not be obtained
More informationProduct Accumulate Codes on Fading Channels
Product Accumulate Codes on Fading Channels Krishna R. Narayanan, Jing Li and Costas Georghiades Det of Electrical Engineering Texas A&M University, College Station, TX 77843 Abstract Product accumulate
More informationServo Mechanism Technique based Anti-Reset Windup PI Controller for Pressure Process Station
Indian Journal of Science and Technology, Vol 9(11), DOI: 10.17485/ijst/2016/v9i11/89298, March 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Servo Mechanism Technique based Anti-Reset Windu
More informationUltra Wideband System Performance Studies in AWGN Channel with Intentional Interference
Ultra Wideband System Performance Studies in AWGN Channel with Intentional Interference Matti Hämäläinen, Raffaello Tesi, Veikko Hovinen, Niina Laine, Jari Iinatti Centre for Wireless Communications, University
More informationInitial Ranging for WiMAX (802.16e) OFDMA
Initial Ranging for WiMAX (80.16e) OFDMA Hisham A. Mahmoud, Huseyin Arslan Mehmet Kemal Ozdemir Electrical Engineering Det., Univ. of South Florida Logus Broadband Wireless Solutions 40 E. Fowler Ave.,
More information2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
200 IEEE. Personal use of this material is ermitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including rerinting/reublishing this material for advertising
More informationUniversity of Twente
University of Twente Faculty of Electrical Engineering, Mathematics & Comuter Science Design of an audio ower amlifier with a notch in the outut imedance Remco Twelkemeijer MSc. Thesis May 008 Suervisors:
More informationData-precoded algorithm for multiple-relayassisted
RESEARCH Oen Access Data-recoded algorithm for multile-relayassisted systems Sara Teodoro *, Adão Silva, João M Gil and Atílio Gameiro Abstract A data-recoded relay-assisted (RA scheme is roosed for a
More informationAn Overview of Substrate Noise Reduction Techniques
An Overview of Substrate Noise Reduction Techniques Shahab Ardalan, and Manoj Sachdev ardalan@ieee.org, msachdev@ece.uwaterloo.ca Deartment of Electrical and Comuter Engineering University of Waterloo
More informationControl of Grid Integrated Voltage Source Converters under Unbalanced Conditions
Jon Are Suul Control of Grid Integrated Voltage Source Converters under Unbalanced Conditions Develoment of an On-line Frequency-adative Virtual Flux-based Aroach Thesis for the degree of Philosohiae Doctor
More informationLDPC-Coded MIMO Receiver Design Over Unknown Fading Channels
LDPC-Coded MIMO Receiver Design Over Unknown Fading Channels Jun Zheng and Bhaskar D. Rao University of California at San Diego Email: juzheng@ucsd.edu, brao@ece.ucsd.edu Abstract We consider an LDPC-coded
More informationSecondary Transceiver Design in the Presence of Frequency Offset between OFDM-based Primary and Secondary Systems
Secondary Transceiver Design in the Presence of Frequency Offset between OFDM-based Primary and Secondary Systems Zhikun Xu and Chenyang Yang School of Electronics and Information Engineering, Beihang
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singaore. Title Author(s) Citation Relative hase noise estimation and mitigation in Raman amlified coherent otical communication
More informationHigh resolution radar signal detection based on feature analysis
Available online www.jocr.com Journal of Chemical and Pharmaceutical Research, 4, 6(6):73-77 Research Article ISSN : 975-7384 CODEN(USA) : JCPRC5 High resolution radar signal detection based on feature
More informationPerformance Analysis of Battery Power Management Schemes in Wireless Mobile. Devices
Performance Analysis of Battery Power Management Schemes in Wireless Mobile Devices Balakrishna J Prabhu, A Chockalingam and Vinod Sharma Det of ECE, Indian Institute of Science, Bangalore, INDIA Abstract
More informationModeling of power autotransformer
Modeling of ower autotransformer VLADMÍR VOLČKO, ŽAETA ELEHOVÁ, ATO BELÁŇ, PETER JAGA, DOMK VGLAŠ, MROLAVA MTKOVÁ Deartment of Electrical Power Engineering lovak niversity of Technology in Bratislava lkovičova,
More informationSelf-Driven Phase Shifted Full Bridge Converter for Telecom Applications
Self-Driven Phase Shifted Full Bridge Converter for Telecom Alications SEVILAY CETIN Technology Faculty Pamukkale University 7 Kinikli Denizli TURKEY scetin@au.edu.tr Abstract: - For medium ower alications,
More informationJoint Frame Design, Resource Allocation and User Association for Massive MIMO Heterogeneous Networks with Wireless Backhaul
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL.XXX, NO.XXX, MONTH YEAR 1 Joint Frame Design, Resource Allocation and User Association for Massive MIMO Heterogeneous Networks with Wireless Backhaul Mingjie
More informationDelivery Delay Analysis of Network Coded Wireless Broadcast Schemes
22 IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes Amy Fu and Parastoo Sadeghi The Australian National
More informationMulti-period Channel Assignment
Multi-eriod Channel Assignment Hakim Mabed, Alexandre Caminada and Jin-Kao Hao 2 France Télécom R&D, 6 Avenue des Usines, BP 382, 97 Belfort, France {hakim.mabed,alexandre.caminada}@francetelecm.com Tel:
More informationAdaptive Pilot Design for Massive MIMO HetNets with Wireless Backhaul
Adative Pilot Design for Massive MIMO HetNets with Wireless Backhaul Mingjie Feng and Shiwen Mao Det. Electrical & Comuter Engineering, Auburn University, Auburn, AL 36849-5201, USA Email: mzf0022@auburn.edu,
More informationCHAPTER 5 INTERNAL MODEL CONTROL STRATEGY. The Internal Model Control (IMC) based approach for PID controller
CHAPTER 5 INTERNAL MODEL CONTROL STRATEGY 5. INTRODUCTION The Internal Model Control (IMC) based aroach for PID controller design can be used to control alications in industries. It is because, for ractical
More informationAnalysis of Mean Access Delay in Variable-Window CSMA
Sensors 007, 7, 3535-3559 sensors ISSN 44-80 007 by MDPI www.mdi.org/sensors Full Research Paer Analysis of Mean Access Delay in Variable-Window CSMA Marek Miśkowicz AGH University of Science and Technology,
More informationOptimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm
o Otimization of an Evaluation Function of the 4-sided Dominoes Game Using a Genetic Algorithm Nirvana S. Antonio, Cícero F. F. Costa Filho, Marly G. F. Costa, Rafael Padilla Abstract In 4-sided dominoes,
More informationand assigned priority levels in accordance with the QoS requirements of their applications.
Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm Vasco Quintyne *, Adrian Als Deartment of Comuter Science, Physics and Mathematics University of the West Indies
More informationThe online muon identification with the ATLAS experiment at the LHC
32 he online muon identification with the ALAS exeriment at the LHC Abstract he Large Hadron Collider (LHC) at CERN is a roton-roton collider roviding the highest energy and the highest instantaneous luminosity
More informationA Novel, Robust DSP-Based Indirect Rotor Position Estimation for Permanent Magnet AC Motors Without Rotor Saliency
IEEE TANSACTIONS ON POWE EECTONICS, VO. 18, NO. 2, MACH 2003 539 A Novel, obust DSP-Based Indirect otor Position Estimation for Permanent Magnet AC Motors Without otor Saliency i Ying and Nesimi Ertugrul,
More informationFOUNTAIN codes [1], [2] have been introduced to achieve
Controlled Flooding of Fountain Codes Waqas bin Abbas, Paolo Casari, Senior Member, IEEE, Michele Zorzi, Fellow, IEEE Abstract We consider a multiho network where a source node must reliably deliver a
More informationTHE HELMHOLTZ RESONATOR TREE
THE HELMHOLTZ RESONATOR TREE Rafael C. D. Paiva and Vesa Välimäki Deartment of Signal Processing and Acoustics Aalto University, School of Electrical Engineering Esoo, Finland rafael.dias.de.aiva@aalto.fi
More informationTO IMPROVE BIT ERROR RATE OF TURBO CODED OFDM TRANSMISSION OVER NOISY CHANNEL
TO IMPROVE BIT ERROR RATE OF TURBO CODED TRANSMISSION OVER NOISY CHANNEL 1 M. K. GUPTA, 2 VISHWAS SHARMA. 1 Deartment of Electronic Instrumentation and Control Engineering, Jagannath Guta Institute of
More informationInterference Management via Sliding-Window Superposition Coding
Globecom 24 Worksho - Emerging Technologies for 5G Wireless Cellular Networks Interference Management via Sliding-Window Suerosition Coding Hosung ark, Young-Han Kim, Lele Wang University of California,
More informationPareto Optimization for Uplink NOMA Power Control
Pareto Optimization for Uplink NOMA Power Control Eren Balevi, Member, IEEE, and Richard D. Gitlin, Life Fellow, IEEE Department of Electrical Engineering, University of South Florida Tampa, Florida 33620,
More informationApplication of Notch Filtering under Low Sampling Rate for Broken Rotor Bar Detection with DTFT and AR based Spectrum Methods
Alication of Notch Filtering under Low Samling Rate for Broken Rotor Bar Detection with DTFT and AR based Sectrum Methods B. Ayhan H. J. Trussell M.-Y. Chow M.-H. Song IEEE Student Member IEEE Fellow IEEE
More informationSPACE-FREQUENCY CODED OFDM FOR UNDERWATER ACOUSTIC COMMUNICATIONS
SPACE-FREQUENCY CODED OFDM FOR UNDERWATER ACOUSTIC COMMUNICATIONS E. V. Zorita and M. Stojanovic MITSG 12-35 Sea Grant College Program Massachusetts Institute of Technology Cambridge, Massachusetts 02139
More information3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007
3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,
More informationDecorrelation distance characterization of long term fading of CW MIMO channels in urban multicell environment
Decorrelation distance characterization of long term fading of CW MIMO channels in urban multicell environment Alayon Glazunov, Andres; Wang, Ying; Zetterberg, Per Published in: 8th International Conference
More informationAn Overview of PAPR Reduction Optimization Algorithm for MC-CDMA System
RESEARCH ARTICLE OPEN ACCESS An Overview of PAPR Reduction Otimization Algorithm for MC-CDMA System Kanchan Singla*, Rajbir Kaur**, Gagandee Kaur*** *(Deartment of Electronics and Communication, Punjabi
More informationProperties of Mobile Tactical Radio Networks on VHF Bands
Proerties of Mobile Tactical Radio Networks on VHF Bands Li Li, Phil Vigneron Communications Research Centre Canada Ottawa, Canada li.li@crc.gc.ca / hil.vigneron@crc.gc.ca ABSTRACT This work extends a
More informationRandom Access Compressed Sensing in Underwater Sensor Networks
Random Access Comressed Sensing in Underwater Sensor Networks Fatemeh Fazel Northeastern University Boston, MA 2115 Email: ffazel@ece.neu.edu Maryam Fazel University of Washington Seattle, WA 98195 Email:
More informationIEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 3, MARCH
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 3, MARCH 13 951 SHARP: Sectrum Harvesting with ARQ Retransmission and Probing in Cognitive Radio James C. F. Li, Member, IEEE, Wei Zhang, Senior Member,
More informationAn Alternative Single Parameter Functional Form for Lorenz Curve
Crawford School of Public Policy Crawford School working aers An Alternative Single Parameter Functional Form for Lorenz Curve Crawford School Working Paer 7 Setember 07 Satya Paul Amrita University, India
More informationAdaptive Switching between Spatial Diversity and Multiplexing: a Cross-layer Approach
Adative Switching between Satial Diversity and ultilexing: a Cross-layer Aroach José Lóez Vicario and Carles Antón-Haro Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) c/ Gran Caità -4, 08034
More informationEnergy Efficient Configuration for QoS in Reliable Parallel Servers
Proc. of the Fifth Euroean Deendable Comuting Conference, Ar. 2005 Energy Efficient Configuration for QoS in Reliable Parallel Servers Dakai Zhu 1, Rami Melhem 2, and Daniel Mossé 2 1 University of Texas
More informationJOINT COMPENSATION OF OFDM TRANSMITTER AND RECEIVER IQ IMBALANCE IN THE PRESENCE OF CARRIER FREQUENCY OFFSET
JOINT COMPENSATION OF OFDM TRANSMITTER AND RECEIVER IQ IMBALANCE IN THE PRESENCE OF CARRIER FREQUENCY OFFSET Deeaknath Tandur, and Marc Moonen ESAT/SCD-SISTA, KULeuven Kasteelark Arenberg 10, B-3001, Leuven-Heverlee,
More informationA Genetic Algorithm Approach for Sensorless Speed Estimation by using Rotor Slot Harmonics
A Genetic Algorithm Aroach for Sensorless Seed Estimation by using Rotor Slot Harmonics Hayri Arabaci Abstract In this aer a sensorless seed estimation method with genetic algorithm for squirrel cage induction
More informationPrediction Efficiency in Predictive p-csma/cd
Prediction Efficiency in Predictive -CSMA/CD Mare Miśowicz AGH University of Science and Technology, Deartment of Electronics al. Miciewicza 30, 30-059 Kraów, Poland misow@agh.edu.l Abstract. Predictive
More informationDesign of PID Controller Based on an Expert System
International Journal of Comuter, Consumer and Control (IJ3C), Vol. 3, No.1 (014) 31 Design of PID Controller Based on an Exert System Wei Li Abstract For the instability of traditional control systems,
More informationAnalysis of Pseudorange-Based DGPS after Multipath Mitigation
International Journal of Scientific and Research Publications, Volume 7, Issue 11, November 2017 77 Analysis of Pseudorange-Based DGPS after Multiath Mitigation ThilanthaDammalage Deartment of Remote Sensing
More informationA new approach to bit error rate reduction and its impact on telecom performance
Journal of Scientific AHUJA & Industrial & CHAKKA: ResearchA NEW APPROACH TO BIT ERROR RATE REDUCTION ON TELECOM Vol. 72, March 23,. 49-59 49 A new aroach to bit error rate reduction and its imact on telecom
More informationMLSE Diversity Receiver for Partial Response CPM
MLSE Diversity Receiver for Partial Resonse CPM Li Zhou, Philia A. Martin, Desmond P. Taylor, Clive Horn Deartment of Electrical and Comuter Engineering University of Canterbury, Christchurch, New Zealand
More informationCooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach
Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach Haobing Wang, Lin Gao, Xiaoying Gan, Xinbing Wang, Ekram Hossain 2. Department of Electronic Engineering, Shanghai Jiao
More informationTHE USE OF INSULATED WIRES MILLIKEN CONDUCTORS IN HIGH VOLTAGE POWER TRANSMISSION UNDERGROUND AC LINES. x y s ABSTRACT
THE USE OF INSULATED WIRES MILLIKEN CONDUCTORS IN HIGH VOLTAGE POWER TRANSMISSION UNDERGROUND AC LINES David DUBOIS, NEXANS, (France), david.dubois@nexans.com Pierre MIREBEAU, NEXANS, (France), ierre.mirebeau@nexans.com
More informationEstimating the Time-To-First-Fix for GNSS Signals Theory and Simulation Results
Estimating the Time-To-First-Fix for GNSS s Theory and Simulation Results Marco Anghileri, Matteo Paonni, Sten Wallner, José-Ángel Ávila-Rodríguez, Bernd Eissfeller Institute of Geodesy and Navigation,
More informationIMPROVED POLYNOMIAL TRANSITION REGIONS ALGORITHM FOR ALIAS-SUPPRESSED SIGNAL SYNTHESIS
IMPROVED POLYNOMIAL TRANSITION REGIONS ALGORITHM FOR ALIAS-SUPPRESSED SIGNAL SYNTHESIS Dániel Ambrits and Balázs Bank Budaest University of Technology and Economics, Det. of Measurement and Information
More informationDepth of Focus and the Alternating Phase Shift Mask
T h e L i t h o g r a h y E x e r t (November 4) Deth of Focus and the Alternating Phase Shift Mask Chris A. Mack, KLA-Tencor, FINLE Division, Austin, Texas One of the biggest advantages of the use of
More informationInfluence of Earth Conductivity and Permittivity Frequency Dependence in Electromagnetic Transient Phenomena
Influence of Earth Conductivity and Permittivity Frequency Deendence in Electromagnetic Transient Phenomena C. M. Portela M. C. Tavares J. Pissolato ortelac@ism.com.br cristina@sel.eesc.sc.us.br isso@dt.fee.unicam.br
More informationJoint Tx/Rx Energy-Efficient Scheduling in Multi-Radio Networks: A Divide-and-Conquer Approach
Joint Tx/Rx Energy-Efficient Scheduling in Multi-Radio Networs: A Divide-and-Conquer Aroach Qingqing Wu, Meixia Tao, and Wen Chen Deartment of Electronic Engineering, Shanghai Jiao Tong University, Shanghai,
More informationA New Method for Design of Robust Digital Circuits
A New Method for Design of Robust Digital Circuits Dinesh Patil, Sunghee Yun, Seung-Jean Kim, Alvin Cheung, Mark Horowitz and Stehen oyd Deartment of Electrical Engineering, Stanford University, Stanford,
More informationState-of-the-Art Verification of the Hard Driven GTO Inverter Development for a 100 MVA Intertie
State-of-the-Art Verification of the Hard Driven GTO Inverter Develoment for a 100 MVA Intertie P. K. Steimer, H. Grüning, J. Werninger R&D Drives and Power Electronics ABB Industrie AG CH-5300 Turgi,
More informationPROVIDING ANCILLARY SERVICES IN DISTRIBUTION NETWORKS WITH VANADIUM REDOX FLOW BATTERIES: ALPSTORE PROJECT
PROVIDING ANCILLARY SERVICES IN DISTRIBTION NETWORKS WITH VANADIM REDOX FLOW BATTERIES: ALPSTORE PROJECT Leoold HERMAN Boštjan BLAŽIČ Igor PAČ Faculty of Electrical Engineering, Faculty of Electrical Engineering,
More informationAnalysis and Design of Si Terahertz Transit-Time Diodes
Analysis and Design of Si Terahertz Transit-Time Diodes Xiaochuan Bi, Jack R. East, Umberto Ravaioli and George I. Haddad Abstract This aer resents a numerical simulation of a Si MITATT diode working in
More informationOptimal Power Allocation over Fading Channels with Stringent Delay Constraints
1 Optimal Power Allocation over Fading Channels with Stringent Delay Constraints Xiangheng Liu Andrea Goldsmith Dept. of Electrical Engineering, Stanford University Email: liuxh,andrea@wsl.stanford.edu
More informationSemi Blind Channel Estimation: An Efficient Channel Estimation scheme for MIMO- OFDM System
Australian Journal of Basic and Alied Sciences, 7(7): 53-538, 03 ISSN 99-878 Semi Blind Channel Estimation: An Efficient Channel Estimation scheme for MIMO- OFDM System Arathi. Devasia, Dr.G. Ramachandra
More informationD-BLAST Lattice Codes for MIMO Block Rayleigh Fading Channels Λ
D-BLAST Lattice Codes for MIMO Block Rayleigh Fading Channels Λ Narayan Prasad and Mahesh K. Varanasi e-mail: frasadn, varanasig@ds.colorado.edu University of Colorado, Boulder, CO 80309 October 1, 2002
More informationLab 4: The transformer
ab 4: The transformer EEC 305 July 8 05 Read this lab before your lab eriod and answer the questions marked as relaboratory. You must show your re-laboratory answers to the TA rior to starting the lab.
More informationarxiv: v1 [eess.sp] 10 Apr 2018
Sensing Hidden Vehicles by Exloiting Multi-Path V2V Transmission Kaifeng Han, Seung-Woo Ko, Hyukjin Chae, Byoung-Hoon Kim, and Kaibin Huang Det. of EEE, The University of Hong Kong, Hong Kong LG Electronics,
More informationTechnical and Economic Feasibility of Passive Shielding Used to Mitigate Power Lines Magnetic Fields
Technical and Economic Feasibility of Passive Shielding Used to Mitigate Power Lines Magnetic Fields AHMED R. SAYED, HUSSEIN I. ANIS Electrical Power and Machine Deartment Cairo University Giza EGYPT eng_ahmed.rabee@eng.cu.edu.eg,
More informationReduced Complexity MUD-MLSE Receiver for Partially-Overlapping WLAN-Like Interference
Author manuscrit, ublished in "IEEE VTC Sring 2007 (2007)" Reduced Comlexity MUD-MLSE Receiver for Partially-Overlaing WLAN-Like Interference P. Mary 1,2,J.M.Gorce 2, G. Villemaud 2, M. Dohler 1, M. Arndt
More informationGround Clutter Canceling with a Regression Filter
1364 JOURNAL OF ATMOSPHERIC AND OCEANIC TECHNOLOGY VOLUME 16 Ground Clutter Canceling with a Regression Filter SEBASTIÁN M. TORRES Cooerative Institute for Mesoscale Meteorological Studies, Norman, Oklahoma
More information2D Linear Precoded OFDM for future mobile Digital Video Broadcasting
2D inear Precoded OFDM for future mobile Digital Video Broadcasting Oudomsack Pierre Pasquero, Matthieu Crussière, Youssef, Joseh Nasser, Jean-François Hélard To cite this version: Oudomsack Pierre Pasquero,
More informationA FAST WINDOWING TECHNIQUE FOR DESIGNING DISCRETE WAVELET MULTITONE TRANSCEIVERS EXPLOITING SPLINE FUNCTIONS
A FAST WINDOWING TECNIQUE FOR DESIGNING DISCRETE WAVELET ULTITONE TRANSCEIVERS EXPLOITING SPLINE FUNCTIONS Fernando Cruz-Roldán, Pilar artín-artín, anuel Blanco-Velasco, Taio Sarämai Ұ Deartamento Teoría
More informationMMW Radar Scattering Statistics of Terrain At Near Grazing Incidence 1 ABSTRACT
MMW Radar Scattering Statistics of Terrain At Near Grazing Incidence 1 R. D. De Roo, F. T. Ulaby, A. E. El-Rouby, and A. Y. Nashashibi The Radiation Laboratory Deartment of Electrical Engineering and Comuter
More informationApproximated fast estimator for the shape parameter of generalized Gaussian distribution for a small sample size
BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES, Vol. 63, No. 2, 2015 DOI: 10.1515/basts-2015-0046 Aroximated fast estimator for the shae arameter of generalized Gaussian distribution for
More informationMathematical and Computer Modelling. On the characterization of Aloha in underwater wireless networks
Mathematical and Comuter Modelling 53 (2011) 2093 2107 Contents lists available at ScienceDirect Mathematical and Comuter Modelling journal homeage: www.elsevier.com/locate/mcm On the characterization
More informationMulti-TOA Based Position Estimation for IR-UWB
Multi-TOA Based Position Estimation for IR-UWB Genís Floriach, Montse Nájar and Monica Navarro Deartment of Signal Theory and Communications Universitat Politècnica de Catalunya (UPC), Barcelona, Sain
More informationA New ISPWM Switching Technique for THD Reduction in Custom Power Devices
A New ISPWM Switching Technique for THD Reduction in Custom Power Devices S. Esmaeili Jafarabadi, G. B. Gharehetian Deartment of Electrical Engineering, Amirkabir University of Technology, 15914 Tehran,
More informationReliability and Criticality Analysis of Communication Networks by Stochastic Computation
> EPLACE HIS LINE WIH YOU PAPE IDENIFICAION NUMBE (DOUBLE-CLICK HEE O EDI) < 1 eliability and Criticality Analysis of Communication Networks by Stochastic Comutation Peican Zhu, Jie Han, Yangming Guo and
More informationTrellis-Coded-Modulation-OFDMA for Spectrum Sharing in Cognitive Environment
Trellis-Coded-Modulation-OFDMA for Spectrum Sharing in Cognitive Environment Nader Mokari Department of ECE Tarbiat Modares University Tehran, Iran Keivan Navaie School of Electronic & Electrical Eng.
More informationIEEE P Wireless Personal Area Networks. UWB Channel Model for under 1 GHz
Setember, 4 IEEE P85-4/55r Project Title Date Submitted Source Re: Abstract Purose Notice Release IEEE P85 Wireless Personal Area Networks IEEE P85 Working Grou for Wireless Personal Area Networks (WPANs)
More informationRICIAN FADING DISTRIBUTION FOR 40GHZ CHANNELS
Jan 006 RICIAN FADING DISTRIBUTION FOR 40GHZ CHANNELS.0 Background and Theory Amlitude fading in a general multiath environment may follow different distributions deending recisely on the area covered
More informationDynamic Gambling under Loss Aversion
Dynamic Gambling under Loss Aversion Yair Antler University of Essex November 22, 2017 Abstract A loss-averse gambler faces an infinite sequence of identical unfair lotteries and decides in which of these
More information