Efficiently Fuzzy Controlling with Dynamic Window in Elliptic Curve Cryptography Sensor Networks

Size: px
Start display at page:

Download "Efficiently Fuzzy Controlling with Dynamic Window in Elliptic Curve Cryptography Sensor Networks"

Transcription

1 Efficienty Fuzzy Controing with Dynamic Window in Eiptic Curve Cryptography Sensor Networks Xu Huang, Dharmendra Sharma and Pritam Gakumar Shah Abstract It is noted that the wireess sensor networks (WSN) based on the rapid progress of wireess communications and embedded micro eectro mechanica systems technoogies are becoming important part in our daiy ife. However, the security of the WSN becomes one of the maor concerns in its appications. Even eiptic curve cryptography (ECC) prominenty offers great potentia benefits for WSN security there is sti a ot of work needs to be done due to WSN has very restraint running conditions such as imited energy source, capabiity of computing, etc. Aso it is we known that scaar mutipication operation in ECC accounts for about 8% of key cacuation time on wireess sensor network motes. In our current paper we present an optimized dynamic window based on our previous research works. The whoe quaity of service (QoS) has been improved under this agorism in particuary the power consuming is more efficienty. The simuation resuts showed that the average cacuation time, due to fuzzy conditions decreased from previous 26 to current 9 as a whoe the cacuation time, decreased by approximatey 17% in comparison to our previous agorithms in an ECC wireess sensor network. environmenta monitoring e.g. vocano detection [2,3], distributed contro systems [4], agricutura and farm management [5], detection of radioactive sources [6], and computing patform for tomorrows internet [7]. Generay speaking, a typica WSN architecture can be shown in Figure 1. Contrast to traditiona networks, a wireess sensor network normay has many resource constraints [4] due to the imited size. As an exampe, the MICA2 mote consists of an 8 bit ATMega 128L microcontroer working on 7.3 MHz. As a resut nodes of WSN have imited computationa power. Radio transceiver of MICA motes can normay achieve maximum data rate of 25 Kbits/s, which restricts avaiabe communication resources. The fash memory that is avaiabe on the MICA mote is ony 512 Kbyte. Apart from these imitations, the onboard battery is 3.3.V with 2A- Hr capacity. Therefore, the above restrictions with the current state of art protocos and agorithms are expensive for sensor networks due to their high communication overhead. Index Terms Eiptic curve cryptography (ECC), scaar mutipication, non-adacent form, side window, fuzzy T I. INTRODUCTION HE high demand for various appications shows the fact that the rapid progress of wireess communications has become popuar in our daiy ife. With the growth in very arge scae integrated (VLSI) technoogy, embedded systems and micro eectro mechanica systems (MEMS) has enabed production of inexpensive sensor nodes, which can transit data over a distances with free media and efficient use of power [1, 22, 23]. In the WSN systems, the sensor node wi detect the interested information, processes it with the hep of an in-buit microcontroer and communicates resuts to a sink or base station. Normay the base station is a more powerfu node, which can be inked to a centra station via sateite or internet communication to form a network. There are many depoyments for wireess sensor networks depending on various appications such as Xu Huang is with Facuty of Information Sciences and Engineering, University of Canberra, Austraia. (e-mai: Xu.Huang@canberra.edu.au). Dharmendra Sharma is with Facuty of Information Sciences and Engineering, University of Canberra, Austraia. (e-mai: Dharmendra.Sharma@canberra.edu.au). Pritam Gakumar Shah is a PhD candidate at the Facuty of Information Sciences and Engineering, University of Canberra, Austraia. (e-mai: Pritam.Shah@canberra.edu.au). Figure 1: A Typica WSN architecture Recaed that the Eiptic Curve Cryptography was first introduced by Nea Kobitz [9] and Victor Mier [1] independenty in the eary eighties. The advantage of ECC over other pubic key cryptography techniques such as RSA, Diffie-Heman is that the best known agorithm for soving eiptic curve discrete ogarithm probem (ECDLP) which is the underying hard mathematica probem in ECC which wi take the fuy exponentia time. On the other hand the best agorithm for soving RSA and Diffie-Heman takes sub exponentia time [11]. In summary, the ECC probem can ony be soved in exponentia time and, to date, there is a ack of sub exponentia methods to attack ECC.

2 An eiptic curve E over GF(p) can be defined by y 2 = x 3 + ax + b where a, b GF(p) and 3 2 4a + 27b in the GF(p). The point (x, y) on the curve satisfies the above equation and the point at infinity denoted by is said to be on the curve. If there are two points on the curve namey, P (x 1, y 1 ), Q (x 2, y 2 ) and their sum is given by point R(x 3, y 3 ) the agebraic formuas for point addition and point doubing are given by foowing equations: 2 We have: x3 = λ x1 x2 y = λ ( x x y 3 1 3) y2 y1 λ =, x x x + a λ =, 2 y 1 1 if P Q if P = Q showed that 85% of execution time is spent on scaar mutipication. Scaar Mutipication is the operation of mutipying point P on an eiptic curve E defined over a fied GF(p) with positive integer k which invoves point addition and point doubing. Operationa efficiency of kp is affected by the type of coordinate system used for point P on the eiptic curve and the agorithm used for recoding of integer k in scaar mutipication. This research paper proposes an innovative agorithm based on one s compement for representation of integer k which acceerates the computation of scaar mutipication in wireess sensor networks. The number of point doubing and point addition operations in scaar mutipication depends on the recoding of integer k. Expressing integer k in binary format highight this dependency. Figure 3: Diffie-Heman protoco based on ECC (a) Addition: P + Q = R (b) Doubing: P+P = R Figure 2: Point addition and point doubing on eiptic curve. Here, the addition, subtraction, mutipication and inverse are the arithmetic operations over GF(p), which can be shown in Figure 2. II. ELLIPTIC CURVE DIFFIE-HELLMAN SCHEME (ECDH) PROPOSED FOR WSN Before we get into our innovation method, we need to have a coser ook at the popuar egacy scheme for WSN. As per [13] the origina Diffie-Heman agorithm with RSA requires a key of 124 bits to achieve sufficient security but Diffie Heman based on ECC can achieve the same security eve with ony 16 bit key size. The cassica Eiptic Curve Diffie Heman scheme operates as shown in the Fig. 3 Initiay Aice and Bob agree on a particuar curve with base point P. They generate their pubic keys by mutipying P with their private keys namey K A and K B. After sharing pubic keys, they generate a shared secret key by mutipying pubic keys by their private keys. The secret key is R = K A *Q A = K B *Q B. With the known vaues of Q A, Q B and P, it is computationay intractabe for an eavesdropper to cacuate K A and K B which are the private keys of Aice and Bob. As a resut, adversaries cannot cacuate R the shared secret key. In ECC two heaviy used operations are invoved: scaar mutipication and moduar reduction. Gura et. a. [14] The number of zeros and number of ones in the binary form, their paces and the tota number of bits wi affect the computationa cost of scaar mutipications. The Hamming weight as represented by the number of non-zero eements, determines the number of point additions and bit ength of integer K determines the number of point doubings operations in scaar mutipication. One point addition when P Q requires one fied inversion and three fied mutipications [13]. Squaring is counted as reguar mutipication. This cost is denoted by 1I + 3M, where I denotes the cost of inversion and M denotes the cost of mutipication. One point doubing when P = Q requires 1I + 4M as we can negect the cost of fied additions as we as the cost of mutipications by sma constant 2 and 3 in the above formuae. Binary Method Scaar mutipication is the computation of the form Q = kp, where P and Q are the eiptic curve points and k is positive integer. This is obtained by repeated eiptic curve point addition and doubing operations. In binary method the integer k is represented in binary form: 1 = k K 2, K = {,1} The cost of mutipication when using binary method depends on the number of non-zero eements and the ength of the binary representation of k. If the representation has k - 1 then binary method require ( 1 ) point doubings and (W 1) where is the ength of the binary expansion of k, and W is the Hamming weight of k (i.e., the number of nonzero eements in expansion of k). For exampe, if k = 629 = (111111) 2, it wi require (W 1) = 6 1 = 5 point

3 additions and 1 = 1 1 = 9 point doubings operations. The binary method scans the bits of K either from eft-toright or right-to-eft. The binary method for the computation of kp is given in the foowing agorithm 1, as shown beow: Agorithm 1: Left to right binary method for point mutipication Input: A point P E (F q ), an 1 = k K 2, K = o {,1} bits integer Output: Q = kp 1. Q 2. For = 1 to do: 2.1 Q 2 Q, 2.2 if k = 1 the Q Q + P. 3. Return Q. Signed Digit Representation Method The subtraction has virtuay the same cost as addition in the eiptic curve group. The negative of point (x, y) is (x, y) for odd characters. This eads to scaar mutipication methods based on addition subtraction chains, which hep to reduce the number of curve operations. When integer k is represented with the foowing form, it is a binary signed digit representation. k = = S 2, S {1,, 1} When a signed-digit representation has no adacent non zero digits, i.e. S S +1 = for a it is caed a nonadacent form (NAF). The foowing agorithm 2 computes the NAF of a positive integer given in binary representation. Agorithm 2: Conversion from Binary to NAF Input: An integer 1 = k K 2, K = {,1} k = S 2, S {1,, 1} = Output: NAF 1. C 2. For = to do: 3. C +1 [(K + K +1 + C )/2] 4. S K + C 2C Return (S S ) NAF usuay has fewer non-zero digits than binary representations. The average hamming weight for NAF form is (n 1)/3.. So generay it requires (n 1) point doubings and (n 1) /3. point additions. The binary method can be revised accordingy and is given another agorithm for NAF, and this modified method is caed the Addition Subtraction method. III. DYNAMITIC WINDOW WITH FUZZY CONTROLLER IN ECC PROPOSED ALGORITHM BASED We are going to use the agorithm based on subtraction by utiization of the 1 s compement is most common in binary arithmetic. The 1 s compement of any binary number may be found by the foowing equation [19-22]: a C1 = (2 1) N (1) where C 1 = 1 s compement of the binary number, a = number of bits in N in terms of binary form, N = binary number From a coser observation of the equation (1), it reveas the that any positive integer can be represented by using minima non-zero bits in its 1 s compement form provided that it has a minimum of 5% Hamming weight. The minima non-zero bits in positive integer scaar are very important to reduce the number of intermediate operations of mutipication, squaring and inverse cacuations used in eiptica curve cryptography as we have seen in previous sections. The equation (1) can therefore be modified as per beow: N = a ( 2 C 1 1) (2) For exampe, we may take N =1788 then it appears N= ( ) 2 in its binary form C 1 = 1 s Compement of the number of N= (111) 2 a is in binary form so we have a = 11 After putting a the above vaues in the equation (2) we have: 1788 = , this can be reduced as beow: 1788 = (3) So we have 1788= As is evident from equation (3), the Hamming weight of scaar N has reduced from 8 to 5 which wi save 3 eiptic curve addition operations. The above recoding method based on one s compement subtraction combined with siding window method provides a more optimized resut. Let us compute [763] P (in other words k = 763) as an exampe, with a siding window agorithm with K recoded in binary form and window sizes ranging from 2 to 1. It is observed that as the window size increases the number of pre-computations aso increases geometricay. At the same time number of additions and doubing operations decrease. Now we present the detais for the different window size to find out the optima window size using the foowing exampe: Window Size w = = ( ) 2 No of precomputations = 2 w 1 = = [3] P 763 = The intermediate vaues of Q are P, 2P 4P, 8P, 11P, 22P, 44P, 47P, 94P, 95P, 19P, 38P, 76P, 763P Computationa cost = 9 doubings, 4 additions, and 1 precomputation.

4 We continue to derive the remaining cacuations for Window Size w = 6, Window Size w = 7, Window Size w = 8, Window Size w = 9, and Window Size w = 1. The resuts for a cacuations are presented in Tabe 1. The effects of doubings and additions as shown in Tabe 1 are further considered in the next section. size is obtained by tradeoff between pre-computation and computation cost. Agorithm for siding window scaar mutipication on eiptic curves. 1. Q P and i -1 2.whie i do 3.if n i = then Q [2]Q and i 4.ese 5. s max ( i - k + 1,) 6. whie n s = do s s for h = 1 to i - s + 1 do Q [2]Q 8 u (n i... n s ) 2 [n i = n s = 1 and 9. Q Q [u]p [u is odd 1. i s return Q i -1 i - s + 1 k] so that [u]p is precompute TABLE 1 WINDOW SIZE VS NO OF DOUBLINGS, ADDITIONS AND PRE COMPUTATIONS Window Size No of Doubings No of Additions It is interesting to note that Figure 4 shows the charts obtained from tabe 1(in order to see the reation ceary, we used so-caed ampified chart because of the range is ony imited to 1 in window size). As we woud ike to know the further detais about the reations between Doubing and Addition, from Figure 4 it ceary shows that the Pre-computation and doubing are the dominated factors hence we need to focus on this factor in our discussion of window size. IV. FUZZY CONTROLLER SYSTEM IN ECC It is cear, from above description that there is a tradeoff between the computationa cost and the window size as shown in Tabe 1. However, this tradeoff is underpinned by the baance between computing cost (or the RAM cost) and the pre-computing (or the ROM cost) of the node in the network. It is aso cear that, from above description that the variety of wireess network working states wi make this contro compex and cacuations coud be reativey more expensive. Therefore, we propose a fuzzy dynamic contro system, to provide dynamic contro to ensure the optimum window d] No of Pre computations Fig. 4: ampified chart (focus on imited range) for the Tabe 1 The fuzzy decision probem introduced by Beman and Zadeh has as a goa the maximization of the minimum vaue of the membership functions of the obectives to be optimized. Accordingy, the fuzzy optimization mode can be represented as a muti-obective programming probem as foows [21]: Max : min{ μ ( D)}& min{ μ ( U )} s S & L such that A C s r RP x rs = 1 L, p P & s S, xrs = or 1 r R & s S In above equation, the obective is to maximize the minimum membership function of a deays, denoted by D, and the difference between the recommend vaue and the measured vaue, denoted by U. The Fuzzy contro system is extended from and shown in Figure 5. For accurate contro, we designed a three inputs fuzzy controer. The first input is storage room, which has three statuses, showing storage room in one of the three, namey (a) ow, (b) average, and (c) high. The second input is pre-computing working oad (PreComputing) in one of three states, namey (a) ow, (b) average, and (c) high. The third input is Doubing, expressing how much working oad for the cacuation doubing which has three cases, namey (a) ow, (b) average, and (c) high. The output is one, caed WindowSize, to express the next window size shoud be moved in which way, which has three states for the window sizes, namey (a) down, (b) stay, and (c) up. Figure 5: Three inputs fuzzy window contro system There are ony 9 Fuzzy Rues isted as foows (weight

5 are unit) due to StorageRoom in Figure 5 can be ignored due to the resuts of Figure 4 athough it is a factor needs to be appeared in terms of this contro system. 1. If (PreComputing is ow) and (Doubing is ow) then (WindowSize is Up) 2. If (PreComputing is ow) and (Doubing is average) then (WindowSize is Up) 3. If (PreComputing is ow) and (Doubing is high) 4. If (PreComputing is average) and (Doubing is ow) then (WindowSize is Up) 5. If (PreComputing is average) and (Doubing is average) then (WindowSize is Up) 6. If (PreComputing is average) and (Doubing is high) 7. If (PreComputing is high) and (Doubing is ow) then (WindowSize is Up) 8. If (PreComputing is high) and (Doubing is average) 9. If (PreComputing is high) and (Doubing is high) The number at each fuzzy condition with a bracket is the weight number, currenty it is unit. Later we sha change it with different number according to the running situations as described in the next. The three inputs with 9 fuzzy rues in Mamdani mode running fuzzy controer part. The three inputs are StorageRoom, PreComputing and Doubing. The output is WindowSize. It is noted if we did not take the advantage of Figure 4, there wi be at east 26 fuzzy rues need to be considered as shown in our previous paper [23]. This is because that the StorageRoom has ow, average, high with other two parameters s combinations. The output with StorageRoom and PreComputing is shown in Figure 6. The surface StorageRoom vs. Doubing is shown in Figure 7. is getting big, it woud be nice to have arger window size for the doubing. Now if we change the weight for above fuzzy rues as such the rues 1,5 1, 13, 14, 15, 16, 18, 2,21, 22, 23, 25, and 26 are set in.5 (the rest wi keep the same) due to the maor functions are controed by the storage room, and doubing wi rapidy increasing by the window size arger. The outputs wi changed as the average storage room wi increased.4% and the other two inputs are decreased by.2% the output become window staying a itte wider side by.3%. Figure 7: The output of the surface for the StorageRoom vs. Doubing. It is cear that this fuzzy controer for the dynamic window is aso invoved a tradeoff between accuracy and contro costs. For exampe the same system may go further for the second order parameters, not ust check the changes about the input variabes but aso check the change tendencies of the variabes, which wi be discussed in another paper. Figure 6: The output of the surface for the StorageRoom vs. PreComputing. From above figures, it is ceary observed that in the ow window size side, if the storage room is ow the dominated function of doubing wi pay roe as Figure 6 shown but if the window size is at the high side, the storage room wi be fairy stay at the midde either for PreComputing or Doubing, which is the doubing wi sharpy increased when window size a itte bit arger that aso can be shown from Tabe 1. From Figure 7 it is ceary to show when the storage room Figure 8: The output of the surface for the StorageRoom = constant (.4) and PrecComputing vs. Doubing. If we keep the StorageRoom constant, e.g. StorageRoom =.4, and the output of the PreComputing vs. Doubing is shown in Figure 8. Now in order to show the StorageRoom is not dominated factor as we discussed above, we took another vaue, StorageRoom =.8 and the output of the PreComputing vs. Doubing is shown in Figure 9. It is observed that the output of the PreComputing vs. Doubing is not much difference between Figures 8 and 9.

6 From Figures 6 and 7 we can observe that the dominated factor is not the members of the StorageRoom in Figure 8 due to the fact that the StorageRoom goes to arge than 4% (or.4) the factors PreComputing and Doubing are dominated in Fig. 6 and Fig. 7 separatey. The StorageRoom cannot pay a roe in the process of the dynamic window, which is underpinned by the fact that has been shown in Figures 4. The simuations of the exampe described in above were impemented. Aso it is noted that with equation (2), the computationa cost has been reduced from 3 additions as in the binary method to ony 1 addition in one s compement subtraction form. The number of precomputations has remained the same. Figure 9: The output of the surface for the StorageRoom = constant (.8) and PreComputing vs. Doubing. In our simuations, the proposed method together with a fuzzy window size controer makes the ECC cacuation in the current agorism is about 17% more efficient than the methods in [23] with the same QoS eve. V. CONCLUSION The positive integer in point mutipication may be recorded with one s compement subtraction to reduce the computationa cost invoved in this heavy mathematica operation for wireess sensor network patforms. As the NAF method invoves moduar inversion operation to get the NAF of binary number, the one s compement subtraction can provide a very simpe way of recoding the integer. There is aways a decision between pre-computing and computing, the former is reated to the storage and the atter is associated with computing capabiity and capacity. The window size may be the subect of trade-off between the avaiabe RAM and ROM at a particuar instance on a sensor node, which can be controed by fuzzy controer. The fina simuation in a sensor wireess network shows that about 17% more efficient than our previous method [23] can be obtained with an ECC sensor network. [3] G. Werner-Aen, K. Lorincz, M. Ruiz, O. Marcio, J. Johnson, J. Lees, and M. Wesh, "Depoying a wireess sensor network on an active vocano," IEEE Internet Computing, vo. 1, pp , 26. [4] B. Sinopoi, C. Sharp, L. Schenato, S. Schaffert, and S. S. Sastry, "Distributed contro appications within sensor networks," Proceedings of the IEEE, vo. 91, pp , 23. [5] P. Sikka, P. Corke, P. Vaencia, C. Crossman, D. Swain, and G. Bishop-Hurey, "Wireess ad hoc sensor and actuator networks on the farm," 26, pp [6] D. L. Stephens, Jr. and A. J. Peurrung, "Detection of moving radioactive sources using sensor networks," Nucear Science, IEEE Transactions on, vo. 51, pp , 24. [7] Z. Feng, "Wireess sensor networks: a new computing patform for tomorrow's Internet," 24, pp. I-27 Vo.1. [8] I. F. Akyidiz, Weiian Su, Yogesh Sankarasubramaniam, and E. Cayirci, "A Survey on Sensor Networks in IEEE Communication Magazine. vo. 4, August 22, pp [9] N.Kobitz, "Eiptic Curve Cryptosystems," Mathematics of Computation, vo. 48, pp , [1] V. S. Mier, "Use of Eiptic Curves in Cryptography," in Advances in Cryptoogy - CRYPTO '85: Proceedings. vo. 218: Springer-Verag, 1986, pp [11] J. Lopez and R. Dahab., " An overview of eiptic curve cryptography," Technica report,institute of Computing, Sate University of Campinas, Sao Pauo, Brazi, May 2. [12] K. Lauter, "The advantages of eiptic curve cryptography for wireess security," Wireess Communications, IEEE [see aso IEEE Persona Communications], vo. 11, pp , 24. [13] H. Wang, B. Sheng, and Q. Li, "Eiptic curve cryptography-based access contro in sensor networks," Int. J. Security and Networks,, vo. 1, pp , 26. [14] N. Gura, A. Pate, and A. Wander, "Comparing eiptic curve cryptography and RSA on 8-bit CPUs," in Proceedings of the 24 Workshop on Cryptographic Hardware and Embedded Systems (CHES) August 24. [15] [16] D. J. Maan, M. Wesh, and M. D. Smith, "A pubic-key infrastructure for key distribution in TinyOS based on eiptic curve cryptography," in 2nd IEEE Internationa Conference on Sensor and Ad Hoc Communications and Networks (SECON 24)2nd IEEE Internationa Conference on Sensor and Ad Hoc Communications and Networks (SECON 24), 24, pp [17] I. Bake, G. Seroussi, and N. Smart, Eiptic Curves in Cryptography vo. 265, [18] D. Hankerson, J. L. Hernandez, and A. Menezes, "Software Impementation of Eiptic Curve Cryptography over Binary Fieds, CHES," 2. [19] Angeo C Giie, Binary Arithmetic and Booean agebra, McGRAW-HILL Book Company, pp53. [2] H R. Beman and L.A. Zadeh, Decision-making in a fuzzy environment, Management Science 17 (197), [21] Xu Huang, Shirantha Wiesekera, and Dharmendra Sharma, Fuzzy Dynamic Switching in Quantum Key Distribution for Wi-Fi Networks, 6 th Internationa Conference on Fuzzy Systems and Knowedge Discovery, August 29, Tianin, China. Proceeding pp [22] Xu Huang, Pritam Gakumar Shah and Dharmendra Sharma, Muti- Agent System Protecting from Attacking with Eiptic Curve Cryptography, the 2 nd Internationa Symposium on Inteigent Decision Technoogies, Batimore, USA, 28-3 Juy 21. Accepted to be pubished. [23] Xu Huang and Dharmendra Sharma, Fuzzy Controer for a Dynamic Window in Eiptic Curve Cryptography Wireess Networks for Scaar Mutipication APCC 21. The 16 th Asia-Pacific Conference on Communications, 31 October 3 November 21, Langham Hote, Auckand, New Zeaand, ISBN: pp REFERENCES [1] I. F. Akyidiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireess sensor networks: a survey," Computer Networks, vo. 38, pp , 22. [2] C. Chung-Kuo, J. M. Overhage, and J. Huang, "An appication of sensor networks for syndromic surveiance," 25, pp

Improving the Active Power Filter Performance with a Prediction Based Reference Generation

Improving the Active Power Filter Performance with a Prediction Based Reference Generation Improving the Active Power Fiter Performance with a Prediction Based Reference Generation M. Routimo, M. Sao and H. Tuusa Abstract In this paper a current reference generation method for a votage source

More information

P H O T O CD I N F O R M A T I O N B U L L E T I N

P H O T O CD I N F O R M A T I O N B U L L E T I N PCD 077 Juy, 1994 Copyright, Eastman Kodak Company, 1994 P H O T O CD I N F O R M A T I O N B U L L E T I N Fuy Utiizing Photo CD Images Maintaining Coor Consistency When Creating KODAK Photo CD Portfoio

More information

GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCLES

GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCLES VO. 10, NO. 18, OCTOBER 2015 ISSN 1819-6608 GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCES Henny Widowati 1, Suistyo Puspitodjati 2 and Djati Kerami 1 Department of System Information, Facuty

More information

LIGHTNING PROTECTION OF MEDIUM VOLTAGE OVERHEAD LINES WITH COVERED CONDUCTORS BY ANTENNA-TYPE LONG FLASHOVER ARRESTERS

LIGHTNING PROTECTION OF MEDIUM VOLTAGE OVERHEAD LINES WITH COVERED CONDUCTORS BY ANTENNA-TYPE LONG FLASHOVER ARRESTERS C I R E D 17 th Internationa Conference on Eectricity Distribution Barceona, 12-15 May 23 LIGHTNING PROTECTION OF MEDIUM VOLTAGE OVERHEAD LINES WITH COVERED CONDUCTORS BY ANTENNA-TYPE LONG FLASHOVER ARRESTERS

More information

Joint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition

Joint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 10.1109/TMC.2018.2861859,

More information

Utility-Proportional Fairness in Wireless Networks

Utility-Proportional Fairness in Wireless Networks IEEE rd Internationa Symposium on Persona, Indoor and Mobie Radio Communications - (PIMRC) Utiity-Proportiona Fairness in Wireess Networks G. Tychogiorgos, A. Gkeias and K. K. Leung Eectrica and Eectronic

More information

Fast Hybrid DFT/DCT Architecture for OFDM in Cognitive Radio System

Fast Hybrid DFT/DCT Architecture for OFDM in Cognitive Radio System Fast Hybrid DF/D Architecture for OFDM in ognitive Radio System Zhu hen, Moon Ho Lee, Senior Member, EEE, hang Joo Kim 3 nstitute of nformation&ommunication, honbuk ationa University, Jeonju, 56-756,Korea

More information

ADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL

ADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL ADATIV ITRATION SCHM OF TURBO COD USING HYSTRSIS CONTROL Chih-Hao WU, Kenichi ITO, Yung-Liang HUANG, Takuro SATO Received October 9, 4 Turbo code, because of its remarkabe coding performance, wi be popuar

More information

A Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access

A Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access 0 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA, VOL. 5, NO., JUNE 007 A Low Compexity VCS Method for PAPR Reduction in Muticarrier Code Division Mutipe Access Si-Si Liu, Yue iao, Qing-Song Wen,

More information

Iterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels

Iterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels Journa of Communications Vo. 0 No. February 0 Iterative Transceiver Design for Opportunistic Interference Aignment in MIMO Interfering Mutipe-Access Channes Weipeng Jiang ai Niu and Zhiqiang e Schoo of

More information

DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION

DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION Undergraduate Research Opportunity Project (UROP ) DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION Student: Nguyen, Tran Thanh Binh Schoo of Eectrica & Eectronic Engineering Nayang Technoogica University

More information

Comparison of One- and Two-Way Slab Minimum Thickness Provisions in Building Codes and Standards

Comparison of One- and Two-Way Slab Minimum Thickness Provisions in Building Codes and Standards ACI STRUCTURAL JOURNAL Tite no. 107-S15 TECHNICAL PAPER Comparison of One- and Two-Way Sab Minimum Thickness Provisions in Buiding Codes and Standards by Young Hak Lee and Andrew Scanon Minimum thickness

More information

Joint Optimal Power Allocation and Relay Selection with Spatial Diversity in Wireless Relay Networks

Joint Optimal Power Allocation and Relay Selection with Spatial Diversity in Wireless Relay Networks Proceedings of SDR'11-WInnComm-Europe, 22-24 Jun 2011 Joint Optima Power Aocation and Reay Seection with Spatia Diversity in Wireess Reay Networks Md Habibu Isam 1, Zbigniew Dziong 1, Kazem Sohraby 2,

More information

BER Performance Analysis of Cognitive Radio Physical Layer over Rayleigh fading Channel

BER Performance Analysis of Cognitive Radio Physical Layer over Rayleigh fading Channel Internationa Journa of Computer ppications (0975 8887) Voume 5 No.11, Juy 011 BER Performance naysis of Cognitive Radio Physica Layer over Rayeigh fading mandeep Kaur Virk Dr. B R mbedkar Nationa Institute

More information

Dealing with Link Blockage in mmwave Networks: D2D Relaying or Multi-beam Reflection?

Dealing with Link Blockage in mmwave Networks: D2D Relaying or Multi-beam Reflection? Deaing with Lin Bocage in mmwave etwors: DD Reaying or Muti-beam Refection? Mingjie Feng, Shiwen Mao Dept. Eectrica & Computer Engineering Auburn University, Auburn, AL 36849-5, U.S.A. Tao Jiang Schoo

More information

SCHEDULING the wireless links and controlling their

SCHEDULING the wireless links and controlling their 3738 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 7, JULY 2014 Minimum Length Scheduing With Packet Traffic Demands in Wireess Ad Hoc Networks Yacin Sadi, Member, IEEE, and Sinem Coeri Ergen,

More information

Resource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks

Resource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks Resource Aocation via Linear Programming for Muti-Source, Muti-Reay Wireess Networs Nariman Farsad and Andrew W Ecford Dept of Computer Science and Engineering, Yor University 4700 Keee Street, Toronto,

More information

THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN

THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN A CDMA SYSTEM Yan Zhang, Laurence B. Mistein, and Pau H. Siege Department of ECE, University of Caifornia, San Diego

More information

COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS

COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE80.15.3A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS Ms. Jina H. She PG Student C.C.E.T, Wadhwan, Gujarat, Jina_hshet@yahoo.com Dr. K. H. Wandra Director

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks roceedings of the 46th IEEE Conference on Decision and Contro New Oreans, LA, USA, Dec. 12-14, 27 FrB2.5 ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao,

More information

SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS

SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS A. Heiß Energie-AG (EAM), Kasse G. Bazer Darmstadt University of Technoogy O. Schmitt ABB Caor Emag Schatanagen, Mannheim B. Richter

More information

Implementation of the Neumann Formula for Calculating the Mutual Inductance between Planar PCB Inductors Sonntag, C.L.W.; Lomonova, E.; Duarte, J.L.

Implementation of the Neumann Formula for Calculating the Mutual Inductance between Planar PCB Inductors Sonntag, C.L.W.; Lomonova, E.; Duarte, J.L. Impementation of the Neumann Formua for Cacuating the Mutua Inductance between Panar PCB Inductors Sonntag, C.L.W.; Lomonova, E.; Duarte, J.L. Pubished in: Proc. The 18th Internationa Conference on Eectrica

More information

Fuzzy Model Predictive Control Applied to Piecewise Linear Systems

Fuzzy Model Predictive Control Applied to Piecewise Linear Systems 10th Internationa Symposium on Process Systems Engineering - PSE2009 Rita Maria de Brito Aves, Caudio Augusto Oer do Nascimento and Evaristo Chabaud Biscaia Jr. (Editors) 2009 Esevier B.V. A rights reserved.

More information

Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks

Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Energy-Aware Scheduing with Quaity of Surveiance Guarantee in Wireess Sensor Networks Jaehoon Jeong, Sarah Sharafkandi, and David H.C. Du Dept. of Computer Science and Engineering, University of Minnesota

More information

Run to Potential: Sweep Coverage in Wireless Sensor Networks

Run to Potential: Sweep Coverage in Wireless Sensor Networks Run to Potentia: Sweep Coverage in Wireess Sensor Networks Min Xi,KuiWu,Yong Qi,Jizhong Zhao, Yunhao Liu,MoLi Department of Computer Science, Xi an Jiaotong University, China Department of Computer Science,

More information

Rate-Allocation Strategies for Closed-Loop MIMO-OFDM

Rate-Allocation Strategies for Closed-Loop MIMO-OFDM Rate-Aocation Strategies for Cosed-Loop MIMO-OFDM Joon Hyun Sung and John R. Barry Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy, Atanta, Georgia 30332 0250, USA Emai: {jhsung,barry}@ece.gatech.edu

More information

Top Down Design of Joint MODEM and CODEC Detection Schemes for DSRC Coded-FSK Systems over High Mobility Fading Channels

Top Down Design of Joint MODEM and CODEC Detection Schemes for DSRC Coded-FSK Systems over High Mobility Fading Channels Top Down Design of Joint MODEM and CODEC Detection Schemes for DSRC Coded-FSK Systems over High Mobiity Fading Channes Juinn-Horng Deng, Feng-Chin Hsiao, and Yi-Hsin Lin Department of Communications Engineering

More information

A Distributed Utility Max-Min Flow Control Algorithm

A Distributed Utility Max-Min Flow Control Algorithm A Distributed tiity Max-Min Fow Contro Agorithm Hyang-Won Lee and Song Chong Department of Eectrica Engineering and Computer Science Korea Advanced Institute of Science and Technoogy (KAIST) mshw@netsys.kaist.ac.kr,

More information

STUDY ON AOTF-BASED NEAR-INFRARED SPECTROSCOPY ANALYSIS SYSTEM OF FARM PRODUCE QUALITY

STUDY ON AOTF-BASED NEAR-INFRARED SPECTROSCOPY ANALYSIS SYSTEM OF FARM PRODUCE QUALITY STUDY ON AOTF-BASED NEAR-INFRARED SPECTROSCOPY ANALYSIS SYSTEM OF FARM PRODUCE QUALITY Xiaochao Zhang *, Xiaoan Hu, Yinqiao Zhang, Hui Wang, Hui Zhang 1 Institute of Mechatronics Technoogy and Appication,

More information

Wireless Communications

Wireless Communications Wireess Communications Ceuar Concept Hamid Bahrami Reference: Rappaport Chap3 Eectrica & Computer Engineering Statements of Probems Soving the probem of Spectra congestion System Capacity A system-eve

More information

IJEET Number 2, May - July (2011), pp I A E M E IAEME,

IJEET Number 2, May - July (2011), pp I A E M E IAEME, Internationa Journa of of Eectrica Engineering and Technoogy (IJEET), ISSN 0976 6545(Print), and ISSN Technoogy 0976 6553(Onine) (IJEET), Voume ISSN 2, 0976 Number 6545(Print) 2, May - Juy (2011), IAEME

More information

Channel Division Multiple Access Based on High UWB Channel Temporal Resolution

Channel Division Multiple Access Based on High UWB Channel Temporal Resolution Channe Division Mutipe Access Based on High UWB Channe Tempora Resoution Rau L. de Lacerda Neto, Aawatif Menouni Hayar and Mérouane Debbah Institut Eurecom B.P. 93 694 Sophia-Antipois Cedex - France Emai:

More information

Georgia Institute of Technology. simulating the performance of a 32-bit interconnect bus. referenced to non-ideal planes. A transient simulation

Georgia Institute of Technology. simulating the performance of a 32-bit interconnect bus. referenced to non-ideal planes. A transient simulation Power ntegrity/signa ntegrity Co-Simuation for Fast Design Cosure Krishna Srinivasan1, Rohan Mandrekar2, Ege Engin3 and Madhavan Swaminathan4 Georgia nstitute of Technoogy 85 5th St NW, Atanta GA 30308

More information

LBI Mobile Communications. EDACS TM Jessica. PBX Gateway. Operator s Manual

LBI Mobile Communications. EDACS TM Jessica. PBX Gateway. Operator s Manual Mobie Communications EDACS TM Jessica PBX Gateway Operator s Manua TABLE OF CONTENTS 1. SCOPE... 3 2. QUICK USAGE GUIDE... 4 2.1. Making Phone Cas From An EDACS Radio... 4 2.2. Caing EDACS Radios From

More information

Satellite remote sensing of oil spills at sea

Satellite remote sensing of oil spills at sea Sateite remote sensing of oi spis at sea Good practice guideines for the appication of sateite remote sensing during oi spi response operations The goba oi and gas industry association for environmenta

More information

AN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS

AN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS SIAM J. COMPUT. c 1998 Society for Industria and Appied Mathematics Vo. 27, No. 3, pp. 702 712, June 1998 008 AN Ω(D og(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS EYAL KUSHILEVITZ AND YISHAY MANSOUR

More information

Current Mirrors and Biasing Prof. Ali M. Niknejad Prof. Rikky Muller

Current Mirrors and Biasing Prof. Ali M. Niknejad Prof. Rikky Muller EECS 105 Spring 2017, Modue 4 Current Mirrors and Biasing Prof. Ai M. Niknejad Department of EECS Announcements HW9 due on Friday 2 Load Impedance 3 Courtesy M.H. Perrott Issue: Headroom Limitations 4

More information

Multi-stage Amplifiers Prof. Ali M. Niknejad Prof. Rikky Muller

Multi-stage Amplifiers Prof. Ali M. Niknejad Prof. Rikky Muller EECS 105 Spring 2017, Modue 4 Muti-stage Ampifiers Prof. Ai M. Niknejad Department of EECS Announcements HW10 due on Friday Lab 5 due this week 2 weeks of ecture eft! 2 Mutistage Ampifiers Why cascade

More information

Estimation and Control of Lateral Displacement of Electric Vehicle Using WPT Information

Estimation and Control of Lateral Displacement of Electric Vehicle Using WPT Information Estimation and Contro of Latera Dispacement of Eectric Vehice Using WPT Information Pakorn Sukprasert Binh Minh Nguyen Hiroshi Fujimoto Department of Eectrica Engineering and Information Systems, The University

More information

Model of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobile Ad Hoc Network

Model of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobile Ad Hoc Network Mode of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobie Ad Hoc Network Igor Konstantinov, Kostiantyn Poshchykov, Sergej Lazarev, and Oha Poshchykova Begorod State University, Pobeda Street 85,

More information

Ye Ning *1, 2, Wang Ru-chuan *2, 3,Ma Shou-ming *2,Wang Zhi-li *1 *1

Ye Ning *1, 2, Wang Ru-chuan *2, 3,Ma Shou-ming *2,Wang Zhi-li *1 *1 Fuzzy Logic Based Middeware Approach for Context Processing Ye Ning, Wang Ru-chuan,Ma Shou-ming,Wang Zhi-i Fuzzy Logic Based Middeware Approach for Context Processing Ye Ning 1, 2, Wang Ru-chuan 2, 3,Ma

More information

PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER FDMA SYSTEMS

PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER FDMA SYSTEMS PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER SYSTEMS Junsung Lim, Hyung G. Myung, Kyungjin Oh and David J. Goodman Dept. of Eectrica and Computer Engineering, Poytechnic University 5 Metrotech

More information

Effect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels

Effect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels Internationa Journa of Appied Engineering Research ISSN 973-456 Voume 3, Number 5 (8) pp. 77-83 Research India Pubications. http://www.ripubication.com Effect of Estimation Error on Adaptive -MRC Receiver

More information

Yongxiang Zhao Brookhaven National Laboratory Upton, NY, July 1998 CENTER FOR ACCELERATOR PHYSICS

Yongxiang Zhao Brookhaven National Laboratory Upton, NY, July 1998 CENTER FOR ACCELERATOR PHYSICS BNL CAP CCII, 65685 225-MUON-98C A NEW STRUCTURE OF LINEAR COLLIDER * Yongxiang Zhao Brookhaven Nationa Laboratory Upton, NY, 11973 RECEIVED AIK 1 7 1998 OSTI *This work was supported by the US Department

More information

Best Relay Selection Using SNR and Interference Quotient for Underlay Cognitive Networks

Best Relay Selection Using SNR and Interference Quotient for Underlay Cognitive Networks IEEE ICC 1 - Wireess Communications Symposium Best Reay Seection Using SNR and Interference Quotient for Underay Cognitive Networks Syed Imtiaz Hussain 1, Mohamed M. Abdaah 1, Mohamed-Sim Aouini 1,, Mazen

More information

Rateless Codes for the Gaussian Multiple Access Channel

Rateless Codes for the Gaussian Multiple Access Channel Rateess Codes for the Gaussian Mutipe Access Channe Urs Niesen Emai: uniesen@mitedu Uri Erez Dept EE, Te Aviv University Te Aviv, Israe Emai: uri@engtauaci Devavrat Shah Emai: devavrat@mitedu Gregory W

More information

TEMPORAL FAIRNESS ENHANCED SCHEDULING FOR COOPERATIVE RELAYING NETWORKS IN LOW MOBILITY FADING ENVIRONMENTS

TEMPORAL FAIRNESS ENHANCED SCHEDULING FOR COOPERATIVE RELAYING NETWORKS IN LOW MOBILITY FADING ENVIRONMENTS TEMPORAL FAIRNESS ENHANCED SCHEDULING FOR COOPERATIVE RELAYING NETWORKS IN LOW MOBILITY FADING ENVIRONMENTS Ingmar Hammerström, Jian Zhao, and Armin Wittneben Swiss Federa Institute of Technoogy (ETH)

More information

Performance Measures of a UWB Multiple-Access System: DS/CDMA versus TH/PPM

Performance Measures of a UWB Multiple-Access System: DS/CDMA versus TH/PPM Performance Measures of a UWB Mutipe-Access System: DS/CDMA versus TH/PPM Aravind Kaias and John A. Gubner Dept. of Eectrica Engineering University of Wisconsin-Madison Madison, WI 53706 akaias@wisc.edu,

More information

Network Control by Bayesian Broadcast

Network Control by Bayesian Broadcast IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. IT-33, NO. 3, MAY 1987 323 Network Contro by Bayesian Broadcast RONALD L. RIVEST Abstract-A transmission contro strategy is described for sotted- ALOHA-type

More information

A Compact Wide Bandpass Filter based on Substrate Integrated Waveguide (SIW) Structure

A Compact Wide Bandpass Filter based on Substrate Integrated Waveguide (SIW) Structure Journa of Communication Engineering, Vo. 4, No., Juy-December 5 3 A Compact Wide Bandpass Fiter based on Substrate Integrated Waveguide (SIW) Structure Mostafa Danaeian, Ai Ganji ashkezari, Kambiz Afrooz

More information

Position Control of Shape Memory Alloy Actuators Using Self Tuning Fuzzy PID Controller

Position Control of Shape Memory Alloy Actuators Using Self Tuning Fuzzy PID Controller 756 Internationa Journa Kyoung of Contro, Kwan Automation, Ahn and Bao and Kha Systems, Nguyen vo. 4, no. 6, pp. 756-762, December 2006 Position Contro of Shape Memory Aoy Actuators Using Sef Tuning Fuzzy

More information

: taking service robots to play soccer

: taking service robots to play soccer Virbot@fied : taking service robots to pay soccer Larena Adaberto, Escaante Boris, Torres Luis, Abad Verónica, Vázquez Lauro Bio-Robotics Laboratory, Department of Eectrica Engineering Universidad Naciona

More information

Performance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2

Performance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2 ISSN 319-8885 Vo.3,Issue.39 November-14, Pages:7859-7863 www.ijsetr.com Performance Comparison of Cyco-stationary Detectors with Matched Fiter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 1 PG Schoar,

More information

Joint Spectrum Access and Pricing in Cognitive Radio Networks with Elastic Traffic

Joint Spectrum Access and Pricing in Cognitive Radio Networks with Elastic Traffic Joint Spectrum Access and Pricing in Cognitive Radio Networks with Eastic Traffic Joceyne Eias University of Bergamo E-mai: joceyne.eias@unibg.it Fabio Martignon University of Bergamo E-mai: fabio.martignon@unibg.it

More information

EXETER CITY COUNCIL PUBLIC ART POLICY AND STRATEGY EXECUTIVE SUMMARY

EXETER CITY COUNCIL PUBLIC ART POLICY AND STRATEGY EXECUTIVE SUMMARY EXETER CITY COUNCIL PUBLIC ART POLICY AND STRATEGY EXECUTIVE SUMMARY 1 EXETER CITY COUNCIL PUBLIC ART POLICY AND STRATEGY EXECUTIVE SUMMARY 1. Introduction and terms of the Summary 1. 1 Exceence in the

More information

Capacity of Data Collection in Arbitrary Wireless Sensor Networks

Capacity of Data Collection in Arbitrary Wireless Sensor Networks This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. 1 Capacity of Data Coection in Arbitrary Wireess

More information

Power Spectrum Optimization for Interference Mitigation via Iterative Function Evaluation

Power Spectrum Optimization for Interference Mitigation via Iterative Function Evaluation Power Spectrum Optimization for Interference Mitigation via Iterative Function Evauation Hayssam Dahrouj, Wei Yu, Taiwen Tang, and Steve Beaudin Eectrica and Computer Engineering Dept., University of Toronto,

More information

Development of a LabVIEW-based test facility for standalone PV systems

Development of a LabVIEW-based test facility for standalone PV systems Deveopment of a LabVIEW-based test faciity for standaone PV systems Aex See Kok Bin, Shen Weixiang, Ong Kok Seng, Saravanan Ramanathan and Low I-Wern Monash University Maaysia, Schoo of Engineering No.2,

More information

BVRIT HYDERABAD College of Engineering for Women Department of Electronics and Communication Engineering

BVRIT HYDERABAD College of Engineering for Women Department of Electronics and Communication Engineering Subject Name: BVRIT HYDERABAD Coege of Engineering for Women Department of Eectronics and Communication Engineering Prepared by (Facuty Name): Hand Out Eectronic Circuit Anaysis Mr. G. Siva SankarVarma,

More information

Group Sparse Beamforming for Green Cloud-RAN

Group Sparse Beamforming for Green Cloud-RAN IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 5, MAY 2014 2809 Group Sparse Beamforming for Green Coud-RAN Yuanming Shi, Student Member, IEEE, Jun Zhang, Member, IEEE, and Khaed B. Letaief,

More information

Resource Allocation via Linear Programming for Fractional Cooperation

Resource Allocation via Linear Programming for Fractional Cooperation 1 Resource Aocation via Linear Programming for Fractiona Cooperation Nariman Farsad and Andrew W Ecford Abstract In this etter, resource aocation is considered for arge muti-source, muti-reay networs empoying

More information

Energy Harvesting in Heterogenous Networks with Hybrid Powered Communication Systems

Energy Harvesting in Heterogenous Networks with Hybrid Powered Communication Systems Energy Harvesting in Heterogenous Networks with Hybrid Powered Communication Systems invited paper Ahmad Asharoa, Abdukadir Ceik, Ahmed E. Kama Iowa State University ISU, Ames, Iowa, United States, Emai:

More information

Availability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique

Availability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique Progress In Eectromagnetics Research Symposium Proceedings, Guangzhou, China, Aug. 25 28, 2014 849 Avaiabiity Anaysis for Eastic Optica Networks with Muti-path Virtua Concatenation Technique Xiaoing Wang

More information

An Evaluation of Connectivity in Mobile Wireless Ad Hoc Networks

An Evaluation of Connectivity in Mobile Wireless Ad Hoc Networks An Evauation of Connectivity in Mobie Wireess Ad Hoc Networks Paoo Santi Istituto di Informatica e Teematica Area dea Ricerca de CNR Via G.Moruzzi, 5624 Pisa Itay santi@iit.cnr.it Dougas M. Bough Schoo

More information

CHANNEL MODELLING & PERFORMANCE ANALYSIS OF WIFI

CHANNEL MODELLING & PERFORMANCE ANALYSIS OF WIFI CHANNEL MODELLING & PERFORMANCE ANALYSIS OF WIFI Jivisha, Gaurav Mohta, Saumya Das Siim Manipa Institute of Technoogy Emai Id- gauravmohta.officia@gmai.com; Ph No. +9 9609850304 Abstract Wi-Fi or wireess

More information

Resource Allocation for Network-Integrated Device-to-Device Communications Using Smart Relays

Resource Allocation for Network-Integrated Device-to-Device Communications Using Smart Relays Resource Aocation for Network-Integrated Device-to-Device Communications Using Smart Reays Monowar Hasan and Ekram Hossain Department of Eectrica and Computer Engineering, University of Manitoba, Winnipeg,

More information

FOR energy limited data networks, e.g., sensor networks,

FOR energy limited data networks, e.g., sensor networks, 578 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO., DECEMBER 009 An Optima Power Aocation Scheme for the STC Hybrid ARQ over Energy Limited Networks Hongbo Liu, Member, IEEE, Leonid Razoumov,

More information

Co-channel Interference Suppression Techniques for STBC OFDM System over Doubly Selective Channel

Co-channel Interference Suppression Techniques for STBC OFDM System over Doubly Selective Channel Co-channe Interference Suppression Techniques for STBC OFDM System over Douby Seective Channe Jyoti P. Patra Dept. of Eectronics and Communication Nationa Institute Of Technoogy Rourkea-769008, India E

More information

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication: A Message Passing Approach

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication: A Message Passing Approach Distributed Resource Aocation for Reay-Aided Device-to-Device Communication: A Message Passing Approach Monowar Hasan and Ekram Hossain arxiv:406.323v [cs.ni] 2 Jun 204 Abstract Device-to-device D2D communication

More information

Effect of Interfering Users on the Modulation Order and Code Rate for UWB Impulse-Radio Bit-Interleaved Coded M-ary PPM

Effect of Interfering Users on the Modulation Order and Code Rate for UWB Impulse-Radio Bit-Interleaved Coded M-ary PPM Effect of Interfering Users on the Moduation Order and Code Rate for UWB Impuse-Radio Bit-Intereaved Coded M-ary PPM Ruben Merz and Jean-Yves Le Boudec EPFL, Schoo of Computer and Communication Sciences

More information

Minimizing Distribution Cost of Distributed Neural Networks in Wireless Sensor Networks

Minimizing Distribution Cost of Distributed Neural Networks in Wireless Sensor Networks 1 Minimizing Distribution Cost of Distributed Neura Networks in Wireess Sensor Networks Peng Guan and Xiaoin Li Scaabe Software Systems Laboratory, Department of Computer Science Okahoma State University,

More information

Optimum Fault Current Limiter Placement

Optimum Fault Current Limiter Placement Optimum aut urrent Limiter acement Jen-Hao Teng han-an Lu Abstract: Due to the difficuty in power network reinforcement and the interconnection of more distributed generations, faut current eve has become

More information

Cross-layer queuing analysis on multihop relaying networks with adaptive modulation and coding K. Zheng 1 Y. Wang 1 L. Lei 2 W.

Cross-layer queuing analysis on multihop relaying networks with adaptive modulation and coding K. Zheng 1 Y. Wang 1 L. Lei 2 W. www.ietd.org Pubished in IET Communications Received on 18th June 2009 Revised on 30th Juy 2009 ISSN 1751-8628 Cross-ayer queuing anaysis on mutihop reaying networks with adaptive moduation and coding

More information

Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits

Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits Secure Physica Layer Key Generation Schemes: Performance and Information Theoretic Limits Jon Waace Schoo of Engineering and Science Jacobs University Bremen, Campus Ring, 879 Bremen, Germany Phone: +9

More information

CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS

CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS Susan Joshy and A.V. Babu, Department of Eectronics & Communication Engineering, Nationa Institute

More information

The US ITER Role in Magnet Technology

The US ITER Role in Magnet Technology The US ITER Roe in Magnet Technoogy Timothy A. Antaya Fusion Technoogy and Engineering Division MIT Pasma Science and Fusion Center Representing Many UFA Meeting, Univ. Maryand, 7 May 2003 antaya@psfc.mit.edu

More information

ACTA TECHNICA NAPOCENSIS

ACTA TECHNICA NAPOCENSIS 69 TECHNICAL UNIVERSITY OF CLUJ-NAPOCA ACTA TECHNICA NAPOCENSIS Series: Appied Mathematics, Mechanics, and Engineering Vo. 60, Issue I, March, 07 CAD MODEL OF THE RTTRR MODULAR SMALL-SIZED SERIAL ROBOT

More information

Low Delay Wind Noise Cancellation for Binaural Hearing Aids

Low Delay Wind Noise Cancellation for Binaural Hearing Aids INTER-NOISE 6 Low Deay Wind Noise Canceation for Binaura Hearing Aids Nobuhio HIRUMA ; Ryousue KOUYAMA ; Hidetoshi NAKASHIMA 3 ; Yoh-ichi FUJISAKA 4, 4 Rion Co., Ltd, Japan, 3 Nationa Institute of Technoogy,

More information

Lesson Three Code makers and breakers

Lesson Three Code makers and breakers Lesson Three Code makers and breakers Teachers Materias Code Makers and Breakers Lesson Pan Further Information Lesson Materias Aan Turing and Enigma images Codes to Break Downoad this resource www.cnduk.org/esson-3

More information

Employment and Support Allowance (ESA)

Employment and Support Allowance (ESA) Empoyment and Support Aowance (ESA) Pease read this eafet carefuy This eafet gives you more information about Empoyment and Support Aowance (ESA) and tes you: about the support we can give you, and what

More information

3-D BSS Geometric Indicator for WLAN Planning

3-D BSS Geometric Indicator for WLAN Planning 3-D BSS Geometric Indicator for WLAN Panning Aexandre Gondran, Oumaya Baaa, Aexandre Caminada and Haim Mabed University of Technoogy Befort-Montbéiard, SET Lab, 90010 Befort, France E-mai: {aexandre.gondran,

More information

arxiv: v1 [cs.it] 22 Aug 2007

arxiv: v1 [cs.it] 22 Aug 2007 Voice Service Support in Mobie Ad Hoc Networks Hai Jiang, Ping Wang, H. Vincent Poor, and Weihua Zhuang Dept. of Eec. & Comp. Eng., University of Aberta, Canada, hai.jiang@ece.uaberta.ca Dept. of Eec.

More information

Automation of the Solution of Kakuro Puzzles

Automation of the Solution of Kakuro Puzzles Automation of the Soution of Kakuro Puzzes R. P. Davies, P. A. Roach, S. Perkins Department of Computing and Mathematica Sciences, University of Gamorgan, Pontypridd, CF37 1DL, United Kingdom, rpdavies@gam.ac.uk

More information

A CPW-Fed Printed Monopole Ultra-Wideband Antenna with E-Shaped Notched Band Slot

A CPW-Fed Printed Monopole Ultra-Wideband Antenna with E-Shaped Notched Band Slot Iraqi Journa of Appied Physics Emad S. Ahmed Department of Eectrica and Eectronic Engineering University of Technoogy, Baghdad, Iraq A CPW-Fed Printed Monopoe Utra-Wideband Antenna with E-Shaped Notched

More information

arxiv: v3 [astro-ph.co] 23 Jun 2009

arxiv: v3 [astro-ph.co] 23 Jun 2009 Poarized CMB power spectrum estimation using the pure pseudo cross-spectrum approach arxiv:0903.2350v3 [astro-ph.co] 23 Jun 2009 J. Grain, 1, 2, M. Tristram, 3, and R. Stompor 1, 1 CNRS, Laboratoire AstroParticue

More information

Provides exact fault location to one span

Provides exact fault location to one span TWS Mark VI Traveing wave faut ocator Provides exact faut ocation to one span Reduce down time by getting to the faut site faster Track intermittent sef cearing fauts and focus maintenance at the right

More information

ARTI: An Adaptive Radio Tomographic Imaging System

ARTI: An Adaptive Radio Tomographic Imaging System 1 ARTI: An Adaptive Radio Tomographic Imaging System Ossi Katiokaio, Riku Jäntti Senior Member, IEEE and Nea Patwari Member, IEEE Abstract Radio tomographic imaging systems use received signa strength

More information

Radial basis function networks for fast contingency ranking

Radial basis function networks for fast contingency ranking Eectrica Power and Energy Systems 24 2002) 387±395 www.esevier.com/ocate/ijepes Radia basis function networks for fast contingency ranking D. Devaraj a, *, B. Yegnanarayana b, K. Ramar a a Department of

More information

Proceedings of Meetings on Acoustics

Proceedings of Meetings on Acoustics Lee et a. Proceedings of Meetings on Acoustics Voume 19, 2013 http://acousticasociety.org/ ICA 2013 Montrea Montrea, Canada 2-7 June 2013 Underwater Acoustics Session 2pUWa: Ocean Ambient Noise 2pUWa13.

More information

Copyright 2000 IEEE. IEEE Global Communications Conference (Globecom 2000), November 27 - December 1, 2000, San Francisco, California, USA

Copyright 2000 IEEE. IEEE Global Communications Conference (Globecom 2000), November 27 - December 1, 2000, San Francisco, California, USA Copyright 2000 EEE. EEE Goba Communications Conference (Gobecom 2000), November 27 - December 1, 2000, San Francisco, Caifornia, USA Persona use of this materia is permitted. owever, permission to reprint/repubish

More information

Coordination Improvement of Directional Overcurrent Relays in a Microgrid Using Modified Particle Swarm Optimization Algorithm

Coordination Improvement of Directional Overcurrent Relays in a Microgrid Using Modified Particle Swarm Optimization Algorithm Internationa Journa of Eectrica Components and Energy Conversion 2018; 4(1): 21-32 http://www.sciencepubishinggroup.com/j/ijecec doi: 10.11648/j.ijecec.20180401.13 ISSN: 2469-8040 (Print); ISSN: 2469-8059

More information

DESIGN OF SHIP CONTROLLER AND SHIP MODEL BASED ON NEURAL NETWORK IDENTIFICATION STRUCTURES

DESIGN OF SHIP CONTROLLER AND SHIP MODEL BASED ON NEURAL NETWORK IDENTIFICATION STRUCTURES DESIGN OF SHIP CONROLLER AND SHIP MODEL BASED ON NEURAL NEWORK IDENIFICAION SRUCURES JASMIN VELAGIC, FACULY OF ELECRICAL ENGINEERING SARAJEVO, BOSNIA AND HERZEGOVINA, asmin.veagic@etf.unsa.ba ABSRAC his

More information

Resource management for network-assisted D2D communication DEMIA DELLA PENDA

Resource management for network-assisted D2D communication DEMIA DELLA PENDA Resource management for network-assisted D2D communication DEMIA DELLA PENDA Licentiate Thesis Stockhom, Sweden 2016 TRITA-EE 2016:035 ISSN 1653-5146 ISBN 978-91-7595-885-9 KTH Roya Institute of Technoogy

More information

An Efficient Adaptive Filtering for CFA Demosaicking

An Efficient Adaptive Filtering for CFA Demosaicking Dev.. Newin et. a. / (IJCSE) Internationa Journa on Computer Science and Engineering An Efficient Adaptive Fitering for CFA Demosaicking Dev.. Newin*, Ewin Chandra Monie** * Vice Principa & Head Dept.

More information

A Game-theoretic Approach to Power Management in MIMO-OFDM. Ad Hoc Networks. A Dissertation. Submitted to the Faculty. Drexel University.

A Game-theoretic Approach to Power Management in MIMO-OFDM. Ad Hoc Networks. A Dissertation. Submitted to the Faculty. Drexel University. A Game-theoretic Approach to Power Management in MIMO-OFDM Ad Hoc Networks A Dissertation Submitted to the Facuty of Drexe University by Chao Liang in partia fufiment of the requirements for the degree

More information

NEW RISK ANALYSIS METHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE

NEW RISK ANALYSIS METHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE The 14 th Word Conference on Earthquake Engineering NEW RISK ANALYSIS ETHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE Satoru Nishikawa 1, Sei ichiro Fukushima 2 and Harumi Yashiro 3 ABSTRACT

More information

Fuzzy Logic System for Opportunistic Spectrum Access using Cognitive Radio

Fuzzy Logic System for Opportunistic Spectrum Access using Cognitive Radio IJCSI Internationa Journa of Computer Science Issues, Vo. 10, Issue 1, No 1, January 2013 ISSN (Print): 1694-0784 ISSN (Onine): 1694-0814 www.ijcsi.org 703 uzzy Logic System for Opportunistic Spectrum

More information

Theoretical Profile of Ring-Spun Slub Yarn and its Experimental Validation

Theoretical Profile of Ring-Spun Slub Yarn and its Experimental Validation Chong-Qi Ma, Bao-Ming Zhou, Yong Liu, Chuan-Sheng Hu Schoo of Texties, Tianjin Poytechnic University, 399 West Binshui Road, Xiqing District, Tianjin, 300387, China E-mai: iuyong@tjpu.edu.cn Theoretica

More information

Pulsed RF Signals & Frequency Hoppers Using Real Time Spectrum Analysis

Pulsed RF Signals & Frequency Hoppers Using Real Time Spectrum Analysis Pused RF Signas & Frequency Hoppers Using Rea Time Spectrum Anaysis 1 James Berry Rohde & Schwarz Pused Rea Time and Anaysis Frequency Seminar Hopper Agenda Pused Signas & Frequency Hoppers Characteristics

More information

COURSE 6 - WRITING PROJECT (DETAILS)

COURSE 6 - WRITING PROJECT (DETAILS) COURSE 6 - WRITING PROJECT (DETAILS) Course Code: DCE 6 Course Tite: Writing Project (Project) The detais for your course work/project are given beow: a) Introduction Course 6 is a Compusory course in

More information