LOKS: Low-Overhead Forward and Backward Key Secrecy in WSNs

Size: px
Start display at page:

Download "LOKS: Low-Overhead Forward and Backward Key Secrecy in WSNs"

Transcription

1 LOKS: Low-Overhead Forward and Backward Key Seecy n WSNs Malvka Ashok CSE Department M. M. Engneerng College M. M. Unversty Mullana, Ambala, Haryana, Inda-3307 Roht Vad CSE Department M. M. Engneerng College M. M. Unversty Mullana, Ambala, Haryana, Inda-3307 ABSTRACT Securty plays an mportant role n desgnng a wreless sensor networks (WSNs. As the medum s wreless n nature whch s more vulnerable to adversares attacks n the network. Key management s used to acheve securty n WSNs. If symmetrc key s used n the network then one key s more enough to secure the network but the ssue s that once the key s compromsed, entre network gets compromsed. On the other hand, f an ndvdual key s provded to every sensor n the network then sensor to sensor communcaton s not possble n the network. Therefore sensors are grouped together to form a cluster. Each cluster s assgns a cluster key shared by every cluster member of the group. If ths key s fxed then key compromsng affects the securty prncple n the entre group. So to avod ths type of attack, key s updated after a fx nterval of tme. But f key updatng s done by the base staton, communcaton overheads n updatng the keys are neased n the network. Therefore resource constraned wreless sensor networks; the concept of key generaton s used nstead of key dstrbuton. In key generaton process, the key s generated by applyng a one way hash functon on a gven seet. But the problem s that f ths seet s compromsed, all the keys whch are generated n past or to be generated n the future are mmedately compromsed. In ths research paper, we present a LOKS: Low-Overhead Forward and Backward Key Seecy scheme to secure WSNs. Ths scheme updates the keys of each cluster n the network wth reslency to attack. Smulaton results proves that presented scheme takes less number of communcaton overheads as compared to exstng schemes gven n lterature to update the group keys for every groups after every round. Keywords Backward Seecy, Cluster Head, Forward Seecy, Key Generaton, Key Seecy, Sensor nodes, WSNs.. INTRODUCTION Due to the advancements n the technology wreless networks are used n ntense and dffcult stuatons where humans can t reach easly. Due to ts self-confgured nature t s used n varous applcatons. But sensor networks are resource constraned, so the man challenge n these networks s to provde secure communcaton n an effcent manner. There are many protocols that have been developed to utlze these knds of networks n an effcent way so to nease the lfe tme of the network. One of such technque s also presented n ths paper to provde secure communcaton over the network wth low communcaton overhead. As the sensor network s more prone to nsde and outsde attacks because the medum s wreless. So Securty s one of the bg ssues n Wreless sensor network. As the data s communcated through the wreless medum so the attacker or ntruder can easly hack or tamper the data, make the nodes to be compromsed, ntroduce malcous nodes n the network. All these actvtes make the network less secure and also deease the lfetme of the network as they work on battery. So t becomes very mportant to make the network secure and generate the methods whch should nease the network lfetme. To provde securty, t s very mportant that the data that s beng communcated must be enypted and verfed. The data enypton means hdng the data or nformaton nto some code words so that no unauthorzed person could harm the data. The same data when reached securely to the recever sde t s deypted frst.e. changng the data nto ts orgnal form. But the problem s how to secure the nformaton between the sender and the recever and how to keep the network away from the reach of the attackers or ntruders. All ths process of enypton and deypton nvolves the keys. Keys are the seet number or code that s used to provde securty to the nformaton n the network.. Forward and Backward Key Seecy The process of key generaton s shown n Fg. The key whch s used n each round by dfferent sensor node n a partcular round s generated by applyng a one way hash functon on round key of prevous round,.e. th round key s used to generate the round key of (+ th round. Key generaton s used n replace of key dstrbuton to reduce complexty n the network. Fg : Key Generaton Process The drawback of key generaton scheme s that once a key of some round s compromsed, the key of any round s easly calculated by an attacker as the functon used to generate a key s statc n nature and s open to all sensors. The problem s shown n Fg where the key of th round s compromsed whch results to dsclose the round key of all the rounds. 36

2 Current Round Seed value generated by sensor node S S S 3 S 3 Seed value generated by sensor node S Table. Key Updatng [5] Sensor node S send the enypted value to sensor node S S0 Sensor node S send the enypted value to sensor node S S Generaton of round Key S S S S S S Key ( S S S S, S S S S, S Key ( S, S S S S S S Key ( 3 3 S 3 S3 : : : : : : : : : : : : : : : : : : th S 3 3 S3 S S S S, S S S S, S Key ( S, S S and smlarly sensor node S generates ts own random seed value S. Now S enypts S wth the help of a S 0 and send t to S as shown n Eq.. Fg : All key of the System are compromsed due to one key compromsng So the process of key generaton s mplemented n such a way that the prncple of Forward and Backward Seecy s mantaned n the network. Accordng to the prncple of Forward Seecy, the compromse of a key does not dsclose the round key of any round that s used n future. Smlarly the prncple of Backward Seecy states that compromse of a key does not dsclose the round key of any round that s used n past. The prncple of Forward and Backward Seecy s shown n Fg 3. The system s hghly secured by ths technque. S0 S S ( Smlarly S enypts S wth the help of as shown n Eq.. S S and send t to S S S ( Now both sensor nodes generates a round key used n frst round by applyng a one way hash functon as shown n Eq. 3. S Key ( (3 So now n round sensor node S generates ts random seed value S and enypt t wth S and send t to sensor node S as shown n Eq. 4. S S S, S (4 Fg 3: Forward and Backward Key Seecy. EXISTING SCHEME TO ACHIEVE FORWARD AND BACKWARD KEY SECRECY IN WSNs [5] Let there are two sensor nodes S and S deployed n wreless sensor networks. These two sensor nodes want to share a round key K n round wth each other. Every sensor node generates a random seed value n each round. Ths seed value s used n generatng the round key of current round n whch t s generated. Let S s the ntal seed value generated by 0 sensor node S before the startng of frst round and smlarly S s the seed value generated by sensor node S n round. Let S0 s the ntal seed value generated by sensor node S before the startng of frst round and smlarly S s the seed value generated by sensor node S n round. It s also assumed that both sensor nodes already share ts own seed value wth other sensor before the startng of frst round. In frst round sensor node S generates ts random seed value Smlarly S enypts S wth the help of as shown n Eq. 5. S and send t to S S S S, S (5 Now both sensor nodes generates a round key used n round by applyng a one way hash functon as shown n Eq. 6. Key ( S, S (6 Proceedng n ths way the nodes generate new key n every round and use that key to communcate wth each-others. The key updatng method s shown n Table.. Issues n Exstng Scheme The exstng system works well wth two nodes only. As soon as the number of nodes n the network neases, the complexty of the system neases very hgh. The number of messages that communcates between all the nodes n the network to share and generates the key also neases. If the exstng scheme to generate the keys s used then key generaton n the system becomes the bottleneck of the network and becomes more dffcult to exchange key generaton parameters n the network. Each node generates ts 37

3 own random number and broadcast n the network. Fg 4 shows that the sensor node A transmttng ts random number Ra to each sensor n the network. Fg 4: Sensor node A broadcast ts random number n the Network Ths random number s enypted wth the random number of frst sensor node wth the help of a random number generated n prevous round by frst sensor node and transmtted to frst sensor node then sensor node A enypts Ra wth the help of a random number generated by second sensor node n prevous round and transmt to second sensor node and so on. Ths process s acheved by all the sensors n the network. Each sensor generates ts random number and sent t to each and every sensor one by one as shown n Fg 5. round. But the drawback of ths scheme s that once a key of any round s compromsed, the prncple of Forward and Backward Seecy s not mantaned n the network. So broadcastng s not used n ths system. If each sensor broadcast ts random number wth the round key of prevous round. The second method to broadcast the random number s that each sensor node enypts ts random number wth the help of ts own random number that s used n prevous round, as random number of all the sensor n prevous round are known to each sensor n the network.. Communcaton Overheads n Exstng Scheme Let there are n number of sensors n the network that wants and generate a key shared among all of them. To generate a key wth the gven scheme, each sensor node sent the random number by enyptng ths random number wth the prevous round random number of ndvdual sensor. Ths way each sensor transmts ts random number to all the other sensors n the network one by one. So each sensor sent expectedly n- number of messages n the network, thus total n*n- messages communcated n the network as shown n Fg 6. As the number of sensors neases n the network, the communcaton overheads nease at very hgh speed. So ths scheme s not effcent for more than two sensors. Fg 5: Each sensor nodes broadcastng ts random number n the network The drawback of ths scheme s that broadcastng s not possble n ths system, as the random numbers of each sensor n prevous round are dfferent. Only the round key of prevous round s common between all the sensors. So the only method to broadcast the ransom number of current round s to enypt t wth the help of a round key used n prevous Fg 6: Communcaton Overheads n Exstng Scheme Table. Lst of abbrevatons S. No Name Despton CH Cluster head for current round CH Cluster head n next round CH Cluster head n prevous round R Random number generated by cluster head of current round R Random number generated by cluster head of next round R Random number generated by cluster head of prevous round K Round key used n current round 8. E k Enypton key 38

4 3. PRESENTED KEY GENERATION SCHEME WITH FORWARD AND BACKWARD KEY SECRECY The problem n the exstng system was the complexty. As the number of nodes n the system neases the system becomes more and more complex. The presented scheme for key generaton s very effcent n terms of communcaton overheads by mantanng the prncple of Forward and Backward Key Seecy n the network. Varous notatons used n understandng the presented scheme are gven n Table. In presented system, communcaton overheads are reduced by lmt the number of nodes parcpatng n key generaton process to three only. In each round all the nodes n the group does not partcpate n generatng the random number that s used n key generaton process, only three nodes wll generate the random numbers. These three nodes are cluster head nodes n three dfferent consecutve rounds,.e. cluster head of prevous round ( CH, cluster head of current round ( CH and cluster head n next round ( CH. CH becomes CH n round number (+. So n every round a new cluster head s elected that s known as cluster head of next round ( CH. Ths cluster head becomes the current cluster head n round number (+. But n frst round only two cluster heads are choosen whch partcpate n key generaton process by generatng ther random numbers. From these two cluster heads, one cluster head plays the role of current cluster head and other play ther role of next round cluster head. In ths round there s no prevous round cluster head. In ths round, CH sends the generated random number ( RCH to CH as shown n Fg 7. Fg 8: Prevous and next round CH sendng random numbers to th round CH Fg 8 shows the concept of three cluster heads. In ths fgure, cluster head CH and CH sent seed values to cluster head CH. Now after recevng the random numbers from CH and CH, the cluster head of current round CH generate the key K used n current round by applyng a one way hash functon on the values RCH, RCH and RCH. After generatng the round key, CH broadcast ths round key ( K n the network as shown n Fg 9. Fg 7: Next round CH sendng ts random number to current CH Fg 9: CH broadcastng key to all sensors n the network Ths round key s broadcasted n the network n enypted form. Ths key s enypted wth enypton key. Ths enypton key ( KE s generated by applyng a one way hash functon on round key of prevous round and seed value of current round as shown n Eq. 8. Where seed value n each round s generated by apply a one way hash functon on seed 39

5 value of prevous round and round key of prevous round as shown n Eq. 9. K Hf ( RCH, RCH, RCH (7 KE Hf ( K, sd (8 sd Hf ( K, sd (9 3 After recevng the enypted key, ndvdual sensor deypt t wth the deypton key to get the round key of current round. Deypton key s generated wth same technque that s choosen by the current round cluster head as shown n Eq. 7. As enypted key s broadcasted n the network so there s no chance that ths key s hacked by the adversary because the enypton key s generated wth the help of a seed value whch s never communcated over the network. So the presented system provdes a scalable forward and backward key seecy n WSNs. 3. Key Generaton Process The followng algorthm shows the steps nvolved n presented key generaton scheme A. B. C. CH CH : RCH Cluster head n prevous round sendng ts random number to current round cluster head. CH CH : RCH Cluster head for next round sendng ts random number to current round cluster head. CH : RCH Cluster head n current round generatng ts random number n current round. D. CH : K Hf ( RCH, RCH, RCH Cluster head n current round generatng the current round key by applyng one wat hash functon on the random numbers of prevous, current and next round cluster heads. E. CH KE Hf ( K, sd : Cluster head n current round generatng key Enypton key for current round by applyng one way hash functon on prevous round key and the current round seed value. F. CH KE ( K : Current round cluster head broadcastng current round key to all ts cluster members by enyptng the key wth the enypton key G. sd Hf 3( K, sd Every sensor updates ts seed value for next round by applyng a one way hash functon on current round key and the current round seed value. In ths way n each round new cluster head s selected and new key s generated for the new round. The seed value s never communcated on the network, t always reman hdden from the adversary. So f an adversary somehow hack the medum and gets the random number of any sensor node, t may never be able to generate the key. Due to the seed value that s nvolved n the enypton key the adversary may not be able to get the keys of any round nor past nether future keys. So the network s secure and the concept of forward and backward seecy s mantaned n the network. 4. COMMUNICATION OVERHEADS Communcaton overheads n the proposed scheme are reduced due to number of sensors nvolved n key generaton process s lmted to three only. So n presented scheme, communcaton overheads are gven below n Eq. 0. CO=+ (n- (0 Where CO s the communcaton overhead and n s the total number of sensor nodes n the network. Fg 0: Communcaton overheads n presented system Fg 0 shows the communcaton overheads n presented system wth varable number of sensors n the network. Comparson between communcaton overheads n presented v/s exstng scheme s shown n Fg. Fg : Communcaton overhead n presented v/s exstng scheme 5. CONCLUSION In ths paper, we present a model to acheve the prncple technque of forward and backward key seecy n the WSNs. The presented model s scalable for large network wth hgh number of sensor nodes. Presented scheme reduces the number of communcaton overheads as compared to exstng scheme wth reducng number of communcaton overheads. The scheme s very benefcal for cluster based approach where a group of nodes share a key wth cluster head node. In ths scheme, cluster heads are selected n each round where a current head of current round s responsble for generatng and 40

6 broadcastng a round key n entre cluster. In future, the scheme s appled for dynamc clusterng where a node moves from one cluster to another cluster by ossng the cluster boundary. 6. REFERENCES [] Al Bagherna, Akbar Bemana, Sohrab Hojjatkhah and Al Jouharpourr, A Key Management Approach for Wreless Sensor Networks, IJITMC, pp. -9, 04. [] Baojang Cu, Zyue Wang, Bng Zhao, Xaobng Lang and Yuemn Dng, Enhanced Key Management Protocols for Wreless Sensor Networks, pp. -0, September 04 [3] Han Alzad, DongGook Park, Juan Gonzalez Neto, Coln Boyd and Ernest Foo, A Forward & Backward Secure Key Management n Wreless Sensor Networks for PCS/SCADA, Volume 4,, pp 66-8, 00. [4] Roberto D Petro, Lug V. Mancn and Sushl Jajoda, Provdng seecy n key management protocols for large wreless sensors networks, Elsever, Vol., pp , November 003. [5] Vnayak Nak, Ansh Arora, Sandeep Bapat and Mohamed Gouda, Whsper: Local Seet Mantenance n Sensor Networks, pp. -6, 003. [6] Reza Azarderskhsh and Arash Reyhan-Masoleh, Secure Clusterng and Symmetrc Key Establshment n HeterogeneousWreless Sensor Networks, Hndaw Publshng Corporaton EURASIP Journal onwreless Communcatons and Networkng, pp. -, October, 00. [7] Wensheng Zhang, Mnh Tran, Sencun Zhu and Guohong Cao, A Random Perturbaton-Based Scheme for Parwse Key Establshment n Sensor Networks, ACM , pp. -0, Sept 007. [8] Erc Ke Wang, Lucas C.K HUI and S.M. Yu, A New Key Establshment Scheme for Wreless Sensor Networks, Internatonal Journal of Network Securty and ts Applcatons(IJNSA, Vol., No., pp. 7-7, July 009. [9] Wenlang Du, Jng Deng, Yunghsang S.Han, Pramod K. Varshney, Jonathan Katz and Aram Khall, A Parwse Key Pre-Dstrbuton Scheme for Wreless Sensor Networks, ACM Journal Name, Vol.4, pp. -9, September 9, 00. [0] Mu Kun and L L, An Effcent Parwse Key Predstrbuton Scheme for Wreless Sensor Networks, JOURNAL OF NETWORKS, Vol. 9, No., pp. -6, February 04. [] Donggang Lu, Peng Nng, Establshng Parwse Keys n Dstrbuted Sensor Networks, ACM , 003. [] Seyt Ahmet Camtepe, Bulent Yener, Mot Yung, Expander Graph based Key Dstrbuton Mechansms n Wreless Sensor Networks, IEEE Internatonal Conference, pp. -6, 006. [3] Wenlang Du, Jng Deng, Pramod K. Varshney, et al., A Parwse Key Pre-Dstrbuton Scheme for Wreless Sensor Networks, ACM Journal Name, Vol. V, pp. 8-58, May 005. [4] Ch Yuan Chen and Han Cheh Chao, A survey of key dstrbuton n wreless sensor networks, Wley Onlne Lbrary, pp. -4, 0. [5] Roht Vad and Vjay Kumar, Securty ssues and Remedes n Wreless Sensor Networks- A Survey, Internatonal Journal of Computer Applcatons, Vol. 79, No. 4, October 03. [6] Saurabh Sngh, Dr. Harsh Kumar Verma, Securty for Wreless Sensor Network, Internatonal Journal for Computer Scence and Engneerng (IJCSE, Vol. 3, No. 6, pp. -7, 0. IJCA TM : 4

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET) A Novel Optmzaton of the Dstance Source Routng (DSR) Protocol for the Moble Ad Hoc Networs (MANET) Syed S. Rzv 1, Majd A. Jafr, and Khaled Ellethy Computer Scence and Engneerng Department Unversty of Brdgeport

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

Procedia Computer Science

Procedia Computer Science Proceda Computer Scence 3 (211) 714 72 Proceda Computer Scence (21) Proceda Computer Scence www.elsever.com/locate/proceda www.elsever.com/locate/proceda WCIT-21 Performance evaluaton of data delvery approaches

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

An Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards

An Efficient Ownership Transfer Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards Journal of Computers Vol. 27, No. 3, 2016, pp. 41-51 do:10.3966/199115592016102703005 An Effcent Ownershp Transfer Protocol for RFID Conformng to EPC Class 1 Generaton 2 Standards Fan-Shuo Lu 1 Ha-Bng

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

Genetic Algorithm for Sensor Scheduling with Adjustable Sensing Range

Genetic Algorithm for Sensor Scheduling with Adjustable Sensing Range Genetc Algorthm for Sensor Schedulng wth Adjustable Sensng Range D.Arvudanamb #, G.Sreekanth *, S.Balaj # # Department of Mathematcs, Anna Unversty Chenna, Inda arvu@annaunv.edu skbalaj8@gmal.com * Department

More information

A Predictive QoS Control Strategy for Wireless Sensor Networks

A Predictive QoS Control Strategy for Wireless Sensor Networks The 1st Worshop on Resource Provsonng and Management n Sensor Networs (RPMSN '5) n conjuncton wth the 2nd IEEE MASS, Washngton, DC, Nov. 25 A Predctve QoS Control Strategy for Wreless Sensor Networs Byu

More information

Rational Secret Sharing without Broadcast

Rational Secret Sharing without Broadcast Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept

More information

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

Micro-grid Inverter Parallel Droop Control Method for Improving Dynamic Properties and the Effect of Power Sharing

Micro-grid Inverter Parallel Droop Control Method for Improving Dynamic Properties and the Effect of Power Sharing 2015 AASRI Internatonal Conference on Industral Electroncs and Applcatons (IEA 2015) Mcro-grd Inverter Parallel Droop Control Method for Improvng Dynamc Propertes and the Effect of Power Sharng aohong

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

An efficient cluster-based power saving scheme for wireless sensor networks

An efficient cluster-based power saving scheme for wireless sensor networks RESEARCH Open Access An effcent cluster-based power savng scheme for wreless sensor networks Jau-Yang Chang * and Pe-Hao Ju Abstract In ths artcle, effcent power savng scheme and correspondng algorthm

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

Priority based Dynamic Multiple Robot Path Planning

Priority based Dynamic Multiple Robot Path Planning 2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna

More information

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent

More information

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,

More information

COMPARISON OF DIFFERENT BROADCAST SCHEMES FOR MULTI-HOP WIRELESS SENSOR NETWORKS 1

COMPARISON OF DIFFERENT BROADCAST SCHEMES FOR MULTI-HOP WIRELESS SENSOR NETWORKS 1 Internatonal Journal of Computer Networks & Communcatons (IJCNC), Vol., No.4, July 1 COMARISON OF DIFFERENT BROADCAST SCHEMES FOR MULTI-HO WIRELESS SENSOR NETWORKS 1 S. Mehta and K.S. Kwak UWB Wreless

More information

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem

Broadcast Authentication for Wireless Sensor Networks Using Nested Hashing and the Chinese Remainder Theorem Sensors 2010, 10, 8683-8695; do:10.3390/s100908683 OPEN CCESS sensors ISSN 1424-8220 www.mdp.com/ournal/sensors rtcle roadcast uthentcaton for Wreless Sensor Networks Usng Nested Hashng and the Chnese

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

Design of Shunt Active Filter for Harmonic Compensation in a 3 Phase 3 Wire Distribution Network

Design of Shunt Active Filter for Harmonic Compensation in a 3 Phase 3 Wire Distribution Network Internatonal Journal of Research n Electrcal & Electroncs Engneerng olume 1, Issue 1, July-September, 2013, pp. 85-92, IASTER 2013 www.aster.com, Onlne: 2347-5439, Prnt: 2348-0025 Desgn of Shunt Actve

More information

Context-aware Cluster Based Device-to-Device Communication to Serve Machine Type Communications

Context-aware Cluster Based Device-to-Device Communication to Serve Machine Type Communications Context-aware Cluster Based Devce-to-Devce Communcaton to Serve Machne Type Communcatons J Langha, Lu Man, Hans D. Schotten Char of Wreless Communcaton, Unversty of Kaserslautern, Germany {j,manlu,schotten}@et.un-kl.de

More information

An Energy-aware Awakening Routing Algorithm in Heterogeneous Sensor Networks

An Energy-aware Awakening Routing Algorithm in Heterogeneous Sensor Networks An Energy-aware Awakenng Routng Algorthm n Heterogeneous Sensor Networks TAO Dan 1, CHEN Houjn 1, SUN Yan 2, CEN Ygang 3 1. School of Electronc and Informaton Engneerng, Bejng Jaotong Unversty, Bejng,

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

Adaptive Distributed Topology Control for Wireless Ad-Hoc Sensor Networks

Adaptive Distributed Topology Control for Wireless Ad-Hoc Sensor Networks Adaptve Dstrbuted Topology Control for Wreless Ad-Hoc Sensor Networks Ka-Tng Chu, Chh-Yu Wen, Yen-Cheh Ouyang, and Wllam A. Sethares Abstract Ths paper presents a decentralzed clusterng and gateway selecton

More information

An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks

An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks An Energy Effcent Herarchcal Clusterng Algorthm for Wreless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette, IN, USA {seema,

More information

Topology Control for C-RAN Architecture Based on Complex Network

Topology Control for C-RAN Architecture Based on Complex Network Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton

More information

Research Article Performance Evaluation of Uplink Delay-Tolerant Packet Service in IEEE Based Networks

Research Article Performance Evaluation of Uplink Delay-Tolerant Packet Service in IEEE Based Networks Hndaw Publshng Corporaton EURASIP Journal on Wreless Communcatons and Networkng Volume 2011, Artcle ID 549492, 12 pages do:10.1155/2011/549492 Research Artcle Performance Evaluaton of Uplnk Delay-Tolerant

More information

Research on Controller of Micro-hydro Power System Nan XIE 1,a, Dezhi QI 2,b,Weimin CHEN 2,c, Wei WANG 2,d

Research on Controller of Micro-hydro Power System Nan XIE 1,a, Dezhi QI 2,b,Weimin CHEN 2,c, Wei WANG 2,d Advanced Materals Research Submtted: 2014-05-13 ISSN: 1662-8985, Vols. 986-987, pp 1121-1124 Accepted: 2014-05-19 do:10.4028/www.scentfc.net/amr.986-987.1121 Onlne: 2014-07-18 2014 Trans Tech Publcatons,

More information

Ad hoc Service Grid A Self-Organizing Infrastructure for Mobile Commerce

Ad hoc Service Grid A Self-Organizing Infrastructure for Mobile Commerce Ad hoc Servce Grd A Self-Organzng Infrastructure for Moble Commerce Klaus Herrmann, Kurt Gehs, Gero Mühl Berln Unversty of Technology Emal: klaus.herrmann@acm.org Web: http://www.vs.tu-berln.de/herrmann/

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Utility-based Routing

Utility-based Routing Utlty-based Routng Je Wu Dept. of Computer and Informaton Scences Temple Unversty Roadmap Introducton Why Another Routng Scheme Utlty-Based Routng Implementatons Extensons Some Fnal Thoughts 2 . Introducton

More information

MULTILAYER PERCEPTRON GUIDED KEY GENERATION THROUGH MUTATION WITH RECURSIVE REPLACEMENT IN WIRELESS COMMUNICATION (MLPKG)

MULTILAYER PERCEPTRON GUIDED KEY GENERATION THROUGH MUTATION WITH RECURSIVE REPLACEMENT IN WIRELESS COMMUNICATION (MLPKG) Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July 2012 MULTILAYER PERCEPTRON GUIDED KEY GENERATION THROUGH MUTATION WITH RECURSIVE REPLACEMENT IN WIRELESS COMMUNICATION (MLPKG)

More information

A Preliminary Study of Information Collection in a Mobile Sensor Network

A Preliminary Study of Information Collection in a Mobile Sensor Network A Prelmnary Study of Informaton ollecton n a Moble Sensor Network Yuemng Hu, Qng L ollege of Informaton South hna Agrcultural Unversty {ymhu@, lqng1004@stu.}scau.edu.cn Fangmng Lu, Gabrel Y. Keung, Bo

More information

Ergodic Capacity of Block-Fading Gaussian Broadcast and Multi-access Channels for Single-User-Selection and Constant-Power

Ergodic Capacity of Block-Fading Gaussian Broadcast and Multi-access Channels for Single-User-Selection and Constant-Power 7th European Sgnal Processng Conference EUSIPCO 29 Glasgow, Scotland, August 24-28, 29 Ergodc Capacty of Block-Fadng Gaussan Broadcast and Mult-access Channels for Sngle-User-Selecton and Constant-Power

More information

AN IMPROVED BIT LOADING TECHNIQUE FOR ENHANCED ENERGY EFFICIENCY IN NEXT GENERATION VOICE/VIDEO APPLICATIONS

AN IMPROVED BIT LOADING TECHNIQUE FOR ENHANCED ENERGY EFFICIENCY IN NEXT GENERATION VOICE/VIDEO APPLICATIONS Journal of Engneerng Scence and Technology Vol., o. 4 (6) 476-495 School of Engneerng, Taylor s Unversty A IMPROVED BIT LOADIG TECHIQUE FOR EHACED EERGY EFFICIECY I EXT GEERATIO VOICE/VIDEO APPLICATIOS

More information

Prevention of Sequential Message Loss in CAN Systems

Prevention of Sequential Message Loss in CAN Systems Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar

More information

An Activity Based Mobility Prediction Strategy Using Markov Modeling for Wireless Networks

An Activity Based Mobility Prediction Strategy Using Markov Modeling for Wireless Networks An Actvty Based Moblty Predcton Strategy Usng Markov Modelng for Wreless Networks R.V. Mathvarun and V.Vadeh Abstract: The foremost objectve of a wreless network s to facltate the communcaton of moble

More information

A Novel DSA-Driven MAC Protocol for Cognitive Radio Networks

A Novel DSA-Driven MAC Protocol for Cognitive Radio Networks Wreless Sensor Networ, 29, 2, 6-2 do:.4236/wsn.29.2 7 Publshed Onlne July 29 (http://www.scrp.org/journal/wsn/). A Novel DSA-Drven MAC Protocol for Cogntve Rado Networs Hua SONG, Xaola LIN School of Informaton

More information

On Sensor Fusion in the Presence of Packet-dropping Communication Channels

On Sensor Fusion in the Presence of Packet-dropping Communication Channels On Sensor Fuson n the Presence of Packet-droppng Communcaton Channels Vjay Gupta, Babak Hassb, Rchard M Murray Abstract In ths paper we look at the problem of multsensor data fuson when data s beng communcated

More information

Ad hoc Service Grid A Self-Organizing Infrastructure for Mobile Commerce

Ad hoc Service Grid A Self-Organizing Infrastructure for Mobile Commerce Ad hoc Servce Grd A Self-Organzng Infrastructure for Moble Commerce Klaus Herrmann Berln Unversty of Technology Emal: klaus.herrmann@acm.org Web: http://www.vs.tu-berln.de/herrmann/ PTB-Semnar, 3./4. November

More information

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels.

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels. Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 DEC-205 p-issn: 2395-0072 www.rjet.net New Wavelet Based Performance Analyss and Optmzaton of Scalable

More information

Relevance of Energy Efficiency Gain in Massive MIMO Wireless Network

Relevance of Energy Efficiency Gain in Massive MIMO Wireless Network Relevance of Energy Effcency Gan n Massve MIMO Wreless Network Ahmed Alzahran, Vjey Thayananthan, Muhammad Shuab Quresh Computer Scence Department, Faculty of Computng and Informaton Technology Kng Abdulazz

More information

An Alternation Diffusion LMS Estimation Strategy over Wireless Sensor Network

An Alternation Diffusion LMS Estimation Strategy over Wireless Sensor Network Progress In Electromagnetcs Research M, Vol. 70, 135 143, 2018 An Alternaton Dffuson LMS Estmaton Strategy over Wreless Sensor Network Ln L * and Donghu L Abstract Ths paper presents a dstrbuted estmaton

More information

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute

More information

Movement - Assisted Sensor Deployment

Movement - Assisted Sensor Deployment Intro Self Deploy Vrtual Movement Performance Concluson Movement - Asssted Sensor Deployment G. Wang, G. Cao, T. La Porta Dego Cammarano Laurea Magstrale n Informatca Facoltà d Ingegnera dell Informazone,

More information

An Optimal Model and Solution of Deployment of Airships for High Altitude Platforms

An Optimal Model and Solution of Deployment of Airships for High Altitude Platforms An Optmal Model and Soluton of Deployment of Arshps for Hgh Alttude Platforms Xuyu Wang, Xnbo Gao, Ru Zong, Peng Cheng. VIPS Lab, School of Electronc Engneerng, Xdan Unversty, X an 77, Chna. Department

More information

On Channel Estimation of OFDM-BPSK and -QPSK over Generalized Alpha-Mu Fading Distribution

On Channel Estimation of OFDM-BPSK and -QPSK over Generalized Alpha-Mu Fading Distribution Int. J. Communcatons, Network and System Scences, 010, 3, 380-384 do:10.436/jcns.010.34048 Publshed Onlne Aprl 010 (http://www.scrp.org/journal/jcns/) On Channel Estmaton of OFDM-BPSK and -QPSK over Generalzed

More information

On the Feasibility of Receive Collaboration in Wireless Sensor Networks

On the Feasibility of Receive Collaboration in Wireless Sensor Networks On the Feasblty of Receve Collaboraton n Wreless Sensor Networs B. Bantaleb, S. Sgg and M. Begl Computer Scence Department Insttute of Operatng System and Computer Networs (IBR) Braunschweg, Germany {behnam,

More information

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu

More information

Distributed Adaptive Channel Allocation in Multi-Radio Wireless Sensor Networks

Distributed Adaptive Channel Allocation in Multi-Radio Wireless Sensor Networks Journal of Communcatons Vol., No., November 26 Dstrbuted Adaptve Channel Allocaton n Mult-Rado Wreless Sensor Networks We Peng, Dongyan Chen, Wenhu Sun, and Guqng Zhang2,3 School of Control Scence and

More information

Real-Time Transmission Mechanism Design for Wireless IoT Sensors with Energy Harvesting under Power Saving Mode

Real-Time Transmission Mechanism Design for Wireless IoT Sensors with Energy Harvesting under Power Saving Mode 1 Real-Tme Transmsson Mechansm Desgn for Wreless IoT Sensors wth Energy Harvestng under Power Savng Mode Jn Shang, Muhammad Junad Faroo, Student Member, IEEE, and Quanyan Zhu, Member, IEEE arxv:1812.2615v1

More information

An Algorithm Forecasting Time Series Using Wavelet

An Algorithm Forecasting Time Series Using Wavelet IJCSI Internatonal Journal of Computer Scence Issues, Vol., Issue, No, January 04 ISSN (Prnt): 94-084 ISSN (Onlne): 94-0784 www.ijcsi.org 0 An Algorthm Forecastng Tme Seres Usng Wavelet Kas Ismal Ibraheem,Eman

More information

International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015)

International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) Internatonal Conference on Informaton cences, Machnery, Materals and Energy (ICIMME 05) The ystem of Outdoor Vsble ght Communcaton wth Fast Blnd Algorthm Zheng-Guo un, Y-Jun Zhu & Yan-Yu Zhang Department

More information

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal

More information

MODEL ORDER REDUCTION AND CONTROLLER DESIGN OF DISCRETE SYSTEM EMPLOYING REAL CODED GENETIC ALGORITHM J. S. Yadav, N. P. Patidar, J.

MODEL ORDER REDUCTION AND CONTROLLER DESIGN OF DISCRETE SYSTEM EMPLOYING REAL CODED GENETIC ALGORITHM J. S. Yadav, N. P. Patidar, J. ABSTRACT Research Artcle MODEL ORDER REDUCTION AND CONTROLLER DESIGN OF DISCRETE SYSTEM EMPLOYING REAL CODED GENETIC ALGORITHM J. S. Yadav, N. P. Patdar, J. Sngha Address for Correspondence Maulana Azad

More information

Distributed Channel Allocation Algorithm with Power Control

Distributed Channel Allocation Algorithm with Power Control Dstrbuted Channel Allocaton Algorthm wth Power Control Shaoj N Helsnk Unversty of Technology, Insttute of Rado Communcatons, Communcatons Laboratory, Otakaar 5, 0150 Espoo, Fnland. E-mal: n@tltu.hut.f

More information

An Adaptive Over-current Protection Scheme for MV Distribution Networks Including DG

An Adaptive Over-current Protection Scheme for MV Distribution Networks Including DG An Adaptve Over-current Protecton Scheme for MV Dstrbuton Networks Includng DG S.A.M. Javadan Islamc Azad Unversty s.a.m.javadan@gmal.com M.-R. Haghfam Tarbat Modares Unversty haghfam@modares.ac.r P. Barazandeh

More information

Analysis of Lifetime of Large Wireless Sensor Networks Based on Multiple Battery Levels

Analysis of Lifetime of Large Wireless Sensor Networks Based on Multiple Battery Levels I. J. Communcatons, Network and System Scences, 008,, 05-06 Publshed Onlne May 008 n ScRes (http://www.srpublshng.org/journal/jcns/). Analyss of Lfetme of Large Wreless Sensor Networks Based on Multple

More information

VRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) ,

VRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) , VRT014 User s gude V0.8 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

Research Article Capacity of Data Collection in Wireless Sensor Networks Based on Mutual Information and MMSE Estimation

Research Article Capacity of Data Collection in Wireless Sensor Networks Based on Mutual Information and MMSE Estimation Hndaw Publshng Corporaton ISRN Sensor Networks, Artcle ID 38945, 9 pages http://dx.do.org/0.55/04/38945 Research Artcle Capacty of Data Collecton n Wreless Sensor Networks Based on Mutual Informaton and

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

King s Research Portal

King s Research Portal Kng s Research Portal DOI: 10.1109/TWC.2015.2460254 Document Verson Peer revewed verson Lnk to publcaton record n Kng's Research Portal Ctaton for publshed verson (APA): Shrvanmoghaddam, M., L, Y., Dohler,

More information

Intelligent Wakening Scheme for Wireless Sensor Networks Surveillance

Intelligent Wakening Scheme for Wireless Sensor Networks Surveillance The Frst Internatonal Workshop on Cyber-Physcal Networkng Systems Intellgent Wakenng Scheme for Wreless Sensor Networks Survellance Ru Wang, Le Zhang, L Cu Insttute of Computng Technology of the Chnese

More information

Maximizing Lifetime of Sensor-Target Surveillance in Wireless Sensor Networks

Maximizing Lifetime of Sensor-Target Surveillance in Wireless Sensor Networks Maxmzng Lfetme of Sensor-Target Survellance n Wreless Sensor Networks Ha Lu, Xaowen Chu, Yu-Wng Leung Computer Scence, Hong Kong Baptst Unversty Xaohua Ja, Peng-Jun Wan Computer Scence, Cty Unversty of

More information

Cooperative perimeter surveillance with a team of mobile robots under communication constraints

Cooperative perimeter surveillance with a team of mobile robots under communication constraints 213 IEEE/RSJ Internatonal Conference on Intellgent Robots and Systems (IROS) November 3-7, 213. Toyo, Japan Cooperatve permeter survellance wth a team of moble robots under communcaton constrants J.J.

More information

Ensemble Evolution of Checkers Players with Knowledge of Opening, Middle and Endgame

Ensemble Evolution of Checkers Players with Knowledge of Opening, Middle and Endgame Ensemble Evoluton of Checkers Players wth Knowledge of Openng, Mddle and Endgame Kyung-Joong Km and Sung-Bae Cho Department of Computer Scence, Yonse Unversty 134 Shnchon-dong, Sudaemoon-ku, Seoul 120-749

More information

Active and Reactive Power Control of DFIG for Wind Energy Conversion Using Back to Back Converters (PWM Technique)

Active and Reactive Power Control of DFIG for Wind Energy Conversion Using Back to Back Converters (PWM Technique) World Essays Journal / 4 (1): 45-50, 2016 2016 Avalable onlne at www. worldessaysj.com Actve and Reactve Power Control of DFIG for Wnd Energy Converson Usng Back to Back Converters (PWM Technque) Mojtaba

More information

A thesis presented to. the faculty of. the Russ College of Engineering and Technology of Ohio University. In partial fulfillment

A thesis presented to. the faculty of. the Russ College of Engineering and Technology of Ohio University. In partial fulfillment Crcular Trells based Low Densty Party Check Codes A thess presented to the faculty of the Russ College of Engneerng and Technology of Oho Unversty In partal fulfllment of the requrements for the degree

More information

MIMO-OFDM Systems. Team Telecommunication and Computer Networks, FSSM, University Cadi Ayyad, P.O. Box 2390, Marrakech, Morocco.

MIMO-OFDM Systems. Team Telecommunication and Computer Networks, FSSM, University Cadi Ayyad, P.O. Box 2390, Marrakech, Morocco. IJCSI Internatonal Journal of Computer Scence Issues, Vol. 8, Issue 3, ay 2011 ISSN (Onlne: 1694-0814 A Low-complexty Power and Bt Allocaton Algorthm for ultuser IO-OFD Systems Ayad Habb 1, Khald El Baamran

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

Adaptive Phase Synchronisation Algorithm for Collaborative Beamforming in Wireless Sensor Networks

Adaptive Phase Synchronisation Algorithm for Collaborative Beamforming in Wireless Sensor Networks 213 7th Asa Modellng Symposum Adaptve Phase Synchronsaton Algorthm for Collaboratve Beamformng n Wreless Sensor Networks Chen How Wong, Zhan We Sew, Renee Ka Yn Chn, Aroland Krng, Kenneth Tze Kn Teo Modellng,

More information

Low Complexity Duty Cycle Control with Joint Delay and Energy Efficiency for Beacon-enabled IEEE Wireless Sensor Networks

Low Complexity Duty Cycle Control with Joint Delay and Energy Efficiency for Beacon-enabled IEEE Wireless Sensor Networks Low Complexty Duty Cycle Control wth Jont Delay and Energy Effcency for Beacon-enabled IEEE 8254 Wreless Sensor Networks Yun L Kok Keong Cha Yue Chen Jonathan Loo School of Electronc Engneerng and Computer

More information

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr

More information

HIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY

HIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY Internatonal Journal of Electrcal, Electroncs and Computer Systems, (IJEECS) HIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY 1 Supryo Srman, 2 Dptendu Ku. Kundu, 3 Saradndu Panda,

More information

An Improved Weighted Centroid Localization Algorithm

An Improved Weighted Centroid Localization Algorithm Internatonal Journal of Future Generaton Communcaton an Networng Vol.6, No.5 (203), pp.45-52 http://x.o.org/0.4257/fgcn.203.6.5.05 An Improve Weghte Centro Localzaton Algorthm L Bn, Dou Zheng*, Nng Yu

More information

A Mathematical Model for Restoration Problem in Smart Grids Incorporating Load Shedding Concept

A Mathematical Model for Restoration Problem in Smart Grids Incorporating Load Shedding Concept J. Appl. Envron. Bol. Sc., 5(1)20-27, 2015 2015, TextRoad Publcaton ISSN: 2090-4274 Journal of Appled Envronmental and Bologcal Scences www.textroad.com A Mathematcal Model for Restoraton Problem n Smart

More information

Utility Maximization for Uplink MU-MIMO: Combining Spectral-Energy Efficiency and Fairness

Utility Maximization for Uplink MU-MIMO: Combining Spectral-Energy Efficiency and Fairness EuCNC-MngtTech 79 7 8 9 7 8 9 7 8 9 7 8 9 7 8 9 7 Utlty Maxmzaton for Uplnk MU-MIMO: Combnng Spectral-Energy Effcency and Farness Le Deng, Wenje Zhang, Yun Ru, Yeo Cha Kat Department of Informaton Engneerng,

More information

Frog Call-Inspired Self-Organizing Anti-Phase Synchronization for Wireless Sensor Networks

Frog Call-Inspired Self-Organizing Anti-Phase Synchronization for Wireless Sensor Networks Frog Call-Inspred Self-Organzng Ant-Phase Synchronzaton for Wreless Sensor Networks Akra Mutazono Graduate School of Informaton Scence and Technology Osaka Unversty -5, Yamadaoka, Suta-sh, Osaka 565-87,

More information

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

Diversion of Constant Crossover Rate DE\BBO to Variable Crossover Rate DE\BBO\L

Diversion of Constant Crossover Rate DE\BBO to Variable Crossover Rate DE\BBO\L , pp. 207-220 http://dx.do.org/10.14257/jht.2016.9.1.18 Dverson of Constant Crossover Rate DE\BBO to Varable Crossover Rate DE\BBO\L Ekta 1, Mandeep Kaur 2 1 Department of Computer Scence, GNDU, RC, Jalandhar

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

Centralized approach for multi-node localization and identification

Centralized approach for multi-node localization and identification Centralzed approach for mult-node localzaton and dentfcaton Ola A. Hasan Electrcal Engneerng Department Unversty of Basrah Basrah, Iraq Lolastar91@gmal.com Ramzy S. Al Electrcal Engneerng Department Unversty

More information

DIMENSIONAL SYNTHESIS FOR WIDE-BAND BAND- PASS FILTERS WITH QUARTER-WAVELENGTH RES- ONATORS

DIMENSIONAL SYNTHESIS FOR WIDE-BAND BAND- PASS FILTERS WITH QUARTER-WAVELENGTH RES- ONATORS Progress In Electromagnetcs Research B, Vol. 17, 213 231, 29 DIMENSIONAL SYNTHESIS FOR WIDE-BAND BAND- PASS FILTERS WITH QUARTER-WAVELENGTH RES- ONATORS Q. Zhang and Y. Lu School of Electrcal and Electroncs

More information

Multicast Transmission Protocol for Multimedia Services in Smart Home

Multicast Transmission Protocol for Multimedia Services in Smart Home Multcast Transmsson rotocol for Multmeda Servces n Smart Home Jeong-Jun Suh, Shan Guo Quan, Jong-Ku ar, Jong Hyu ar 3 and Young Yong Km Department of Electrcal and Electronc Engneerng, Yonse nversty 34

More information

Improving the Authentication Scheme and Access Control Protocol for VANETs

Improving the Authentication Scheme and Access Control Protocol for VANETs Entropy 2014, 16, 6152-6165; do:10.3390/e16116152 OPEN ACCESS entropy ISSN 1099-4300 www.mdp.com/journal/entropy Artcle Improvng the Authentcaton Scheme and Access Control Protocol for VANETs We-Chen Wu

More information

Experimenting an Indoor Bluetooth-based Positioning Service

Experimenting an Indoor Bluetooth-based Positioning Service Expermentng an Indoor Bluetooth-based Postonng Servce G. Anastas, Computer Engneerng Dept., Unversty of Psa, Italy g.anastas@et.unp.t R. Bandellon, Computer Scence Dept. Unversty of Trento, Italy Renata.Bandellon@st.cnr.t

More information

Communication-Aware Distributed PSO for Dynamic Robotic Search

Communication-Aware Distributed PSO for Dynamic Robotic Search Communcaton-Aware Dstrbuted PSO for Dynamc Robotc Search Logan Perreault Montana State Unversty Bozeman, Montana 59715 logan.perreault@cs.montana.edu Mke P. Wtte Montana State Unversty Bozeman, Montana

More information

Optimal Decentralized Kalman Filter

Optimal Decentralized Kalman Filter 17th Medterranean Conference on Control & Automaton Makedona Palace, Thessalonk, Greece June 24-26, 2009 Optmal Decentralzed Kalman Flter S Oruç, J Sjs, PPJ van den Bosch Abstract The Kalman flter s a

More information

An Energy Efficient Distributed Algorithm for Connected Sensor Cover in Sensor Networks

An Energy Efficient Distributed Algorithm for Connected Sensor Cover in Sensor Networks IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.8 No.9, September 28 265 An Energy Effcent Dstrbuted Algorthm for Connected Sensor Cover n Sensor Networks M.Senthamlselv and Dr.N.Devarajan

More information

Available Transfer Capability (ATC) Under Deregulated Power Systems

Available Transfer Capability (ATC) Under Deregulated Power Systems Volume-4, Issue-2, Aprl-2, IN : 2-758 Internatonal Journal of Engneerng and Management Research Avalable at: www.emr.net Page Number: 3-8 Avalable Transfer Capablty (ATC) Under Deregulated Power ystems

More information

sensors ISSN by MDPI

sensors ISSN by MDPI Sensors 2007, 7, 628-648 Full Paper sensors ISSN 1424-8220 2007 by MDPI www.mdp.org/sensors Dstrbuted Partcle Swarm Optmzaton and Smulated Annealng for Energy-effcent Coverage n Wreless Sensor Networks

More information