MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM

Size: px
Start display at page:

Download "MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM"

Transcription

1 XIX IMEKO World Congress Fundamental and Appled Metrology September 6 11, 2009, Lsbon, Portugal MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM Potr Blsk 1,2, Wesław Wneck 2 1 Warsaw Unversty of Lfe Scences, Faculty of Appled Informatcs and Mathematcs, Warsaw, Poland, potr_blsk@sggw.pl, pblsk@elka.pw.edu.pl 2 Warsaw Unversty of Technology, Insttute of Radoelectroncs, Warsaw, Poland, W.Wneck@re.pw.edu.pl Abstract The paper presents the mplementaton of the Advanced Encrypton Algorthm (AES) n the measurement system, where the vrtual nstruments equpped wth the mult-core processors are used. The encrypton algorthm s frst presented, then ts modfcaton to take advantage over the mult-core processor s descrbed. Implementaton of the latter n the vrtual nstrument workng under the Real-Tme (RT) mode s presented. Fnally, test vectors are used to verfy the valdty of the modfed algorthm and comparson between the tradtonal algorthm and the verson usng the parallel computatons s performed. the measured quanttes are converted nto the form acceptable by the computer system, they must be sent to the second element of the system,.e. data processng server. It s the central node of the system, responsble for storng the gathered nformaton and performng the data processng. The scheme of the system s presented n Fg. 1. Keywords: vrtual nstrumentaton, cryptography, Real- Tme systems 1. INTRODUCTION The nfluence of the computer technologes on the modern measurement systems s steadly ncreasng. Multple solutons not only allow connectng the tradtonal devces to the computers, but requre the computer network or processors to perform calculatons on the acqured data. As the dstrbuted measurement systems are a common mplementaton, the problem becomes the securty of the data transferred between the nodes of the system. The threats related to the tradtonal computer network are well dentfed and complete software and hardware solutons were mplemented. Securty of the dstrbuted measurement systems s stll not clearly defned, but numerous ncdents ndcate that n the near future all the data n such a system wll have to be secured from the unauthorzed access. The most popular method of the data securty s the mplementaton of the cryptographc algorthms. In the measurement systems nvolvng the software (for example, vrtual nstruments - VI), mplementaton of the algorthm n the applcaton run by the processor s the correct approach. The measurement system can be supplemented wth the encrypton schemes n two ways, related to ts structure. Generally, there are two types of the nodes. The frst one are measurement nodes, where the data acquston (DAQ) operatons are performed. They are usually sensory networks or general purpose computers equpped wth the DAQ hardware, etc. The nature of the measurements deps on the character of the analyzed phenomenon: temperature, pressure, voltage, current and smlar. When Fg. 1. Archtecture of the dstrbuted computer measurement system. Introducton of the encrypton schemes nto the system s asymmetrc. When the DAQ nodes gather measured data, they must be encrypted before sng to the server. Unfortunately, a very lmted computng power s avalable here, such as sngle core processors of lower frequences. The cryptographc algorthms are usually computatonally expensve, and may be dffcult to mplement n the small mcrocontrollers, such as Intel On the other sde there s the hgh performance computng machne workng as a server. Although t has greater processng abltes, ts responsblty s the smultaneous decrypton of the measurement data sent from multple nodes and encrypton of the confguraton data sent to them. It s often mportant to acqure the data from the sensors and process them wthn the predefned tme lmts. To ensure such determnsm, the RT system s needed. The latter can easly be mplemented on the server (personal computer), and operate the measurement applcaton desgned n on of the ntegrated programmng envronments, such as Natonal Instruments LabVIEW, or Aglent VEE. One of the newest achevements n the measurement systems s the ablty to use the mult-core processors n the RT mode. Ths gves the opportunty to ncrease the speed

2 of computatons and overcome the problem of the RT data processng. The paper presents the mplementaton of the AES algorthm n the RT measurement server. The former was desgned usng the LabVIEW envronment and run on the four-core Intel processor. Organzaton of the paper s as follows. In secton 2 the AES algorthm s presented. Secton 3 contans dscusson of the modfcaton of the orgnal algorthm to take advantage of the multple cores. In secton 4 mplementaton of the algorthm n LabVIEW envronment s descrbed. Secton 5 contans the verfcaton of the algorthm and measurements of ts effcency. In secton 6 there are conclusons and future prospects. 2. THE AES ALGORITHM DESCRIPTION The AES algorthm s the most popular symmetrc block cpher, approved by the Natonal Insttute of Standards and Technology n 20 [1]. The purpose of the algorthm s to replace the older and less relable algorthms, such as Data Encrypton Standard (DES). The algorthm operates on the 128-bt (16-byte) data blocks (called plan text, n the measurement system the latter can be represented by the acqured samples, arrays etc.) and uses 128-, 192-, or 256- bt key to obtan 128-bt cpher. Applcaton of the algorthm conssts of encrypton (transformaton of the plan text nto the cpher) and decrypton (the opposte transformaton). In both operatons, the same key s used. The hardware and software requrements are relatvely small, makng the AES the most popular symmetrc standard [2]. Therefore t can be successfully used n the smple measurement nodes of the dstrbuted system, where sensors and DAQ hardware gather the desred quanttes, then create blocks, encrypt them and s to the server. The mplementaton of the algorthm s based on the substtuton-permutaton network AES encrypton scheme The pseudocode for the AES encrypton s presented n Fg. 1. It transforms the nput data (IN measurements) nto the cpher (OUT) usng the expanded key W. AEScpher(IN(4 Nb), OUT(4 Nb), W[Nb (Nr+1)]) begn [4,Nb] = IN AddRoundKey(, W[0, Nb-1]) for = 1 to Nr-1 SubBytes() ShftRows() MxColumns() AddRoundKey(, W[ Nb, (+1) Nb-1]) SubBytes() ShftRows() AddRoundKey(, W[Nr Nb, (Nr+1) Nb-1]) OUT = Fg. 2. Pseudocode of the AES encrypton [1]. where Nb s the number of the processed bytes (here four), Nr s the number of the algorthm s teratons (depng on the length of the key, equal to 10, 12, or 14 respectvely), IN s the 128-bts long plan text, OUT s the output vector (cpher, 128-bts long), W s the expanded key (the sequence of Nb (Nr+1) bytes generated from the ntal Nk bytes of the key K) and s the matrx (consstng of 4 rows and 32 bts n each row). Operatons performed durng the encrypton nclude: Assgnment of the IN vector to the matrx and the matrx to the OUT vector. The nput bytes vector s transformed nto the array, accordng to (1): [ row, column] = IN[ row + 4 column] (1) The output bytes vector s obtaned from the accordng to (2): OUT [ row + 4 column] = [ row, column] (2) AddRoundKey the xor operaton performed on every column of the array, usng the partcular bytes of the expanded key (3): [*, column] = [*, column] W[ Nb + column] (3) b SubBytes operaton of exchangng the elements of the matrx nto the new values, usng the structure called s-box. The latter s the array 16x16, contanng the substtuton values. The substtuton s performed accordng to (4): = b c (4) ( + 4) mod8 ( + 5) mod8 ( + 6) mod8 ( + 7) mod8 where c s the bt of the byte {1001}. ShftRows operaton of rotatng rght the rows of the array at postons, where =(0,1,2,3). Ths means that the frst row s not changed, and the fourth row has the form: {a 3,3 a 3,0 a 3,1 a 3,2 }. MxColumns n ths operaton every column of the array s transformed usng the equaton (5): 02 = AES decrypton scheme The decrypton algorthm s smlar to the encrypton, but contans the nverse array operatons, whch are also n dfferent order than n the encrypton scheme. It wll be used by the data processng server do decrypt the ncomng measurement data and by the DAQ nodes to decrypt the nstructons from the control nodes or the server. The generc decrypton procedure [1] s presented n Fg. 3. The addtonal operatons are as follows: InvShftRows operaton of rotatng left the rows of the array at postons, where =(0,1,2,3). Agan, the frst row s not changed, and the fourth row has the form: {a 3,1 a 3,2 a 3,3 a 3,0 }. (5)

3 InvSubBytes the nverse operaton of exchangng the elements of the matrx nto the new values, usng the nverted s-box. InvMxColumns n ths operaton every column of the array s transformed usng the equaton (6): 0e = 09 0d 0b 0b 0e 09 0d 0d 0b 0e d 0b 0e AESnvcpher(IN(4 Nb), OUT(4 Nb), W[Nb (Nr+1)]) begn [4,Nb] = IN AddRoundKey(, W[Nr Nb, (Nr+1) Nb-1]) for = Nr-1 to 1 InvShftRows() InvSubBytes() AddRoundKey(, W[ Nb, (+1) Nb-1]) InvMxColumns() InvShftRows() InvSubBytes() AddRoundKey(, W[0, Nb-1]) OUT = Fg. 3. Pseudocode of the AES decrypton [1] Expanded key generaton scheme The last element of the AES scheme s the expanson of the key W. It takes the ntal cpher key K and generates from t Nb (Nr+1) bytes, further used n the algorthms presented n Fg. 2 and 3. AESkeyexpanson(K(4 Nk), W[Nb (Nr+1)], Nk) begn = 0 whle ( < Nk) W[] = [K[4 ] K[4 +1] K[4 +2] K[4 +3]] = + 1 = Nk whle ( < Nb (Nr+1)) temp = W[-1] f (mod(, Nk)==0) temp = xor(subword(rotword(temp)),rcon[/nk]) elsef (Nk > 6 & mod(, Nk) == 4) temp = SubWord(temp) W[] = xor(w[-nk], temp) = I + 1 Fg. 4. Pseudocode of the key expanson [1]. (6) The algorthm s performed before the encrypton or decrypton takes place. Its man operatons are: SubWord the operaton smlar to SubBytes, as t transforms the nput four bytes nto the output bytes usng the s-box. RotWord the operaton of a cyclc permutaton, changng the poston of the bytes n the sequence, accordng to the followng schema: {a 0 a 1 a 2 a 3 } {a 1 a 2 a 3 a 0 }. Rcon a constant word array, that has the followng form: {x -1 {00} {00} {00}}, where x -1 s the power of {02} n the feld GF(2 8 ) The detaled nformaton about all the algorthms can be found n [1]. 3. THE AES ALGORITHM MODIFICATIONS The algorthms presented n secton 2 can be used n any node of the dstrbuted system. However, to take advantage of the multprocessng unts present n the nodes responsble for the data processng, ther modfcatons must be proposed. Accordng to the parallel computatons paradgms [3], the ndepent parts of the algorthms must be dentfed and then prepared to work n separate threads. One of two approaches should be appled here. Both are based on the observaton that the algorthms from secton 2 perform ndepent matrx row or column transformatons, whch can be performed concurrently. Secton 3.1 presents the overall approach to the smultaneous block encrypton and decrypton assumng that multple processor cores are avalable (so each core processes ts own block). In secton 3.2 addtonal parallelsm of the algorthms operatons are presented. The effcency of the latter soluton s lmted to the sze of the matrces and works best wth four cores Concurrent block encrypton and decrypton The frst modfcaton of the orgnal algorthm does not requre any changes n the algorthm tself. The procedure nvolves dvdng the nput, plantext bytes nto blocks that can be encrypted and decrypted ndepently. Ths way multple blocks can be processed smultaneously. The procedure s multpled and every copy processes every -th block, accordng to (6): AES = f ( IN ) j mod(,4) (6) j j = where j = {1,,n}, n s the number of the copes of the AES procedure (performng n smultaneous blocks processng) and ={1,,m}, m s the number of the plan text blocks. The frst operaton here s separatng the plan text or cpher blocks nto ndepent streams and then applyng the AES encrypton or decrypton procedures. The expected ncrease of the computatonal effcency deps on the number of the appled copes of the procedure. Implementaton of the modfcaton n the programmng language requres mult-threadng mechansm. The example of the encrypton usng the multple copes of the encryptng procedure s n Fg. 5.

4 s possble. However, the analyss of the operatons nsde of these steps shows that the matrx operatons can be broken nto ndepent parts. The SubBytes and ShftRows are the operatons that transform the ndvdual rows n the array each row can be processed separately. Moreover, as these operatons are put one after another n the algorthm, there s no need to treat them as the separate subprocedures. They can be used nsde one program functon. The result of the optmzaton s presented n Fg. 6. Fg. 5. Exemplary encrypton usng concurrent AES procedures for n=3 and m=6. Ths modfcaton s especally useful n the data processng server, whch obtans multple data from many DAQ nodes. Also, large amount of data sent from one node (for example, long waveforms of thousands of samples) must be dvded nto blocks Modfcaton nsde the algorthm The modfcaton presented n secton 3.1 s smple and requres lttle tol from the desgner of the measurement system. However, a more effcent approach may be the modfcaton made nsde the algorthm to make every subprocedure nsde the AES schedule to be able to run on the ndepent processor cores. Ths mght also be necessary when the plan text or cpher blocks are processed n relaton to the values obtaned n the prevous teratons. To modfy the orgnal algorthm, the analyss of the scheme presented n Fg. 2, 3 and 4 was conducted. The general soluton s presented on the exemplary encrypton scheme. The decrypton and key expanson algorthms are performed the same way. Note that the parallelsm of the whole scheme requres frstly row, then column operatons. Fg. 6. Concurrent SubBytes and ShftRows operatons. Frstly, the steps of the algorthms that are n a sequence can not be modfed to be run smultaneously, as ther results dep on the results obtaned from the precedng operatons. Therefore, the steps nsde the for loop (SubBytes, ShftRows, MxColumns and AddRoundKey) must be processed sequentally, and no concurrent executon Fg. 7. Concurrent MxColumns and AddRoundKey operatons. Smlarly, MxColumns and AddRoundKey can be decomposed nto the smultaneously processed parts, but ths tme the latter operate on columns. The soluton s presented n Fg IMPLEMENTATION OF THE ALGORITHM The proposed modfcatons were mplemented n the exemplary measurement system, where the presented operatons could be tested. It conssted of two nodes DAQ and processng, whch justfes applcaton of the encrypton and decrypton schemes. The algorthm was mplemented n the LabVIEW programmng envronment. To run the parallel tasks under the RT system, RT module was used. Because the cryptographc algorthms for LabVIEW are currently avalable thanks to the Crypto-G lbrary [4], the AES mplementaton from the latter was exploted as the reference applcaton. To ensure the parallel computatons, the algorthm mplementaton was modfed to run under the RT module. The abltes of the latter of runnng smultaneously computaton-demandng tasks were verfed durng the prevous research [5]. In the desgned software the operatons must be dvded nto separate threads (to reflect the concurrent data processng see secton 3). Two approaches to mplement the latter were tred. The frst one uses the tmed sequences [6],.e. programmng structures allowng determnaton of the order of the partcular functons executon and assgn the processor cores to these tasks. In every subprocedure presented n secton 3, the array was decomposed nto the ndepent parts, and then nserted nto the tmed sequence, assgned to the partcular core. Fnally, the ndepent rows or columns were put together, restorng the array. Note that usng the tmed

5 structures (desgned especally for the RT operatng system (RTOS)) makes the AES procedure runnable only under the latter. The example of the algorthm mplementaton usng the tmed sequence s n Fg. 8. The second approach s based on the ablty of the RTOS to automatcally assgn the partcular tasks to the processor s cores. Ths tme the array operatons are smply dvded nto the separate data streams, wthout any explct core assgnment. The example of the code wthout the tmed structures s presented n Fg. 9. The man advantage of such mplementaton s the ablty to run the functons both under the general purpose operatng system (GPOS) and RTOS. standard network card. The verson of the LabVIEW envronment used to desgn and mplement the algorthm was 8.5 (the frst one supportng the multcore programmng technques under the RTOS). Networkng nfrastructure used to ensure the communcaton between the control node and RT target. Both computers must be equpped wth the network cards, whch are also connected to the swtch. The laboratory test stand s presented n Fg. 10. Fg. 10. Laboratory test stand. Fg. 8. Fragment of the MxColumns procedure usng the tmed sequence. Fg. 9. Fragment of the MxColumns procedure wthout the tmed structures. Durng tests both mplementatons were verfed wth respect to the correctness of the encrypton and decrypton, and the speed of computatons. To obtan the latter the measurement mechansms of the RT module were exploted,.e. tmestamp measurements wth the mcrosecond accuracy. The frst one s used to take the tme of the encrypton and decrypton computatons. The second s used to observe, how the processor s cores are used to perform the measurement of applcaton s computatons. To test the algorthm the followng laboratory confguraton was assembled (smlar to [7]): RT target a computer run under the RTOS and executng the AES algorthm mplemented n the LabVIEW envronment. It s equpped wth the Intel Core2Quad processor, 2 GB of RAM, 160 GB hard dsk drve wth FAT32 partton and the network card accepted by the system. control node a computer run under Wndows XP operatng system, controllng the RT node. It s used to desgn the software part of the vrtual nstrument and deploy t on the RT node. It s equpped wth the Athlon XP processor, 2 GB of RAM and 5. TESTS AND MEASUREMENTS All versons of the algorthm were verfed usng the standard test vectors, ncludng 16-byte plan texts and and 32-byte long keys. The tests ncluded both encrypton and decrypton to compare the tmes of both operatons. The example of the tme analyss of processng one 16-byte word usng all types of the keys s presented n Table 1. The algorthm verson wth the mplct core assgnment - ICA (see Fg. 8) s the fastest one, the verson wth explct core assgnment (ECA) requres too much overhead for the tmed structures to be effectve aganst the sngle block. However, for larger data structures t may be much faster. The encrypton and decrypton operatons have smlar tme of executon, because both consst of dentcal number of analogous matrx operatons. Table 1. Speed of dfferent versons of the AES encrypton and decrypton for the sngle plan text block and dfferent key lengths. Key length Basc ICA ECA AES ,35 ms 45,78 ms 118,74 ms AES ,74 ms 51,59 ms 150,36 ms AES ,65 ms 57,35 ms 181,55 ms The reference algorthm from the Crypto-G lbrary worked correctly under GPOS, but dd not work under RTOS. On the other hand, the algorthm desgned for the RTOS usng the tme sequences dd not run well under the GPOS. The verson of the algorthm desgned wthout the RT programmng elements worked under both OS. Another experment conssted n the block encrypton and decrypton of the whole waveform gathered n the node (see secton 3.1). Ths tme the encryptons mode must be used. In the smplest case, ECB, each dentcal sample would be encrypted the same way, producng the same

6 cpher, as each block s encrypted separately here. If perodcal sgnals are measured, the ECB mode compromses the cpher wthout the knowledge of the keys. Therefore the more sophstcated mode, CBC s used. Here the cpher from the prevous teraton s mxed wth the next plantext block (usng the XOR operaton) and then put to the encrypton procedure. The sequence of blocks s the sequence of measured values of the waveform. Each sample has a double representaton,.e. requres 32 bts. AES works wth nput sequences of four 32-bt long words, therefore sequences of four words must be put as the nput of the AES scheme. The method was tested on the RT target, whch receved waveforms of dfferent length. For encrypton all three key lengths were used. Before the data s processed, the converson between the numercal values and ther bnary representaton must be performed. The samples vector was also decomposed nto subvectors, each of whch was encrypted by the separate core. The recprocal operaton s requred to be performed on the other sde of the transmsson lne, when the data must be decrypted. Results of the encrypton/decrypton scheme for the exemplary 1024-samples long waveform are n Table 2. Table 2. Speed of dfferent versons of the algorthm for the 1024 samples waveform and dfferent key lengths. Key length Basc ICA ECA AES-128 9,83 s 4,74 s 16,21 s AES ,84 s 8,03 s 21,99 s AES ,98 s 11,21 s 28,88 s The relaton between the partcular versons of the AES scheme s smlar to the one from Table 1. Agan, the mplct core assgnment s the most effectve. To successfully transmt all samples between the nodes n the dstrbuted system, the overall tme wll be requred: t = t + t + t + t + t (7) ovr conv enc net dec conv where t ovr s the overall tme of sng the data, t conv s the tme of convertng the numbers to the byte arrays (1024 total conversons) and dvdng the samples vector nto four concurrent vectors, t enc s the tme of the whole vector encrypton, t net s the tme requred for successful network transmsson, t dec s the decrypton tme of the whole samples vector. The largest amount of tme s requred for encrypton and decrypton. In the Basc mplementaton (where no multthreadng for the matrx operatons s nvolved), each operaton lasts for about 50 ms. The optmal mplementaton requres about 30 ms. Note that the tmes of the overall waveform encrypton are 64 tmes the sngle block encrypton/decrypton tme, because the 1024 samples vector s decomposed nto four 256-element subvectors. Each four subsequent elements of the partcular subvector are the nput of the AES scheme (to form 128-bt sequence). The nfluence of the waveform length on the encrypton and decrypton effcency s presented n Fg. 11. The most effcent s the ICA verson of the algorthm. Fg. 11. Tme of the AES scheme executon for dfferent lengths of samples vectors. 6. CONCLUSIONS The mplemented AES algorthm works well under the RTOS and can be used n both the measurement server, gatherng the encrypted data from the nodes of the system, and DAQ node equpped wth the mult-core processor (such as PXI-8110 [8]). The mproved mplementaton of the algorthm may be useful n the future relable measurement systems, where not only the effcency and determnsm wll be mportant, but also safety of transmtted data. The tme analyss of the presented algorthm shows that the RT verson s more effcent than the straghtforward verson from the Crypto-G lbrary. Ths mples that the smlar approaches to mplement addtonal cryptographc algorthms should be made n the future. The power of the hardware responsble for the algorthm realzaton strongly affects the effcency of encrypton/decrypton scheme. Therefore the desgner must assess computatonal requrements of hs system and prepare the computers capable of fulfllng them. Also, the am of the upcomng research may be the full cryptographc lbrary suted for the RT systems. REFERENCES [1] Announcng the Advanced Encrypton Standard (AES), Avalable: [2] T. Good, M. Benassa, AES on FPGA: from the fastest to the smallest, Proceedngs CHES, Ednburgh, UK. Aug. 29 -Sept. 1, 2005, pp [3] H. Kasahara, S. Narta, "Practcal Multprocessor Schedulng Algorthms for Effcent Parallel Processng," IEEE Trans. Comput., Vol.c-33, No.11,pp ,Nov [4] Vartor Crypto-G lbrary, avalable at [5] W. Wneck and P. Blsk, "Mult-Core Programmng Approach n the Real-Tme Vrtual Instrumentaton", Proceedngs IEEE I2MTC, Vctora, Brtsh Columba, Canada, May, 2008, pp [6] Multcore Programmng wth LabVIEW Techncal Resource Gude, avalable at: ftp://ftp.n.com/evaluaton/labvew/ekt/multcore_programm ng_resource_gude.pdf [7] P. Blsk, W. Wneck, Dstrbuted Real-Tme Measurement System Usng Tme-Trggered Network Approach, Internatonal Journal of Computng, 2008, Vol. 7, pp [8] Natonal Instruments Announces PXI U Quad-Core Embedded Controller for PXI System, avalable at:

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,

More information

Revision of Lecture Twenty-One

Revision of Lecture Twenty-One Revson of Lecture Twenty-One FFT / IFFT most wdely found operatons n communcaton systems Important to know what are gong on nsde a FFT / IFFT algorthm Wth the ad of FFT / IFFT, ths lecture looks nto OFDM

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

Understanding the Spike Algorithm

Understanding the Spike Algorithm Understandng the Spke Algorthm Vctor Ejkhout and Robert van de Gejn May, ntroducton The parallel soluton of lnear systems has a long hstory, spannng both drect and teratve methods Whle drect methods exst

More information

Graph Method for Solving Switched Capacitors Circuits

Graph Method for Solving Switched Capacitors Circuits Recent Advances n rcuts, ystems, gnal and Telecommuncatons Graph Method for olvng wtched apactors rcuts BHUMIL BRTNÍ Department of lectroncs and Informatcs ollege of Polytechncs Jhlava Tolstého 6, 586

More information

Prevention of Sequential Message Loss in CAN Systems

Prevention of Sequential Message Loss in CAN Systems Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS Journal of Engneerng Scence and echnology Vol. 7, No. 4 ( 55-56 School of Engneerng, aylor s Unversty SECURE COMMUNICAION BY USING MULIPLE KEYS HAVING VARIABLE LENGH IN A REAL IME ENVIRONMEN FOR MULIPLE

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

Chinese Remainder. Discrete Mathematics Andrei Bulatov

Chinese Remainder. Discrete Mathematics Andrei Bulatov Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators

More information

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13 A Hgh Gan DC - DC Converter wth Soft Swtchng and Power actor Correcton for Renewable Energy Applcaton T. Selvakumaran* and. Svachdambaranathan Department of EEE, Sathyabama Unversty, Chenna, Inda. *Correspondng

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

Beam quality measurements with Shack-Hartmann wavefront sensor and M2-sensor: comparison of two methods

Beam quality measurements with Shack-Hartmann wavefront sensor and M2-sensor: comparison of two methods Beam qualty measurements wth Shack-Hartmann wavefront sensor and M-sensor: comparson of two methods J.V.Sheldakova, A.V.Kudryashov, V.Y.Zavalova, T.Y.Cherezova* Moscow State Open Unversty, Adaptve Optcs

More information

Application of Intelligent Voltage Control System to Korean Power Systems

Application of Intelligent Voltage Control System to Korean Power Systems Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon

More information

Learning Ensembles of Convolutional Neural Networks

Learning Ensembles of Convolutional Neural Networks Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

VRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) ,

VRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) , VRT014 User s gude V0.8 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

High Speed ADC Sampling Transients

High Speed ADC Sampling Transients Hgh Speed ADC Samplng Transents Doug Stuetzle Hgh speed analog to dgtal converters (ADCs) are, at the analog sgnal nterface, track and hold devces. As such, they nclude samplng capactors and samplng swtches.

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

Priority based Dynamic Multiple Robot Path Planning

Priority based Dynamic Multiple Robot Path Planning 2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna

More information

The Dynamic Utilization of Substation Measurements to Maintain Power System Observability

The Dynamic Utilization of Substation Measurements to Maintain Power System Observability 1 The Dynamc Utlzaton of Substaton Measurements to Mantan Power System Observablty Y. Wu, Student Member, IEEE, M. Kezunovc, Fellow, IEEE and T. Kostc, Member, IEEE Abstract-- In a power system State Estmator

More information

A Current Differential Line Protection Using a Synchronous Reference Frame Approach

A Current Differential Line Protection Using a Synchronous Reference Frame Approach A Current Dfferental Lne rotecton Usng a Synchronous Reference Frame Approach L. Sousa Martns *, Carlos Fortunato *, and V.Fernão res * * Escola Sup. Tecnologa Setúbal / Inst. oltécnco Setúbal, Setúbal,

More information

Latency Insertion Method (LIM) for IR Drop Analysis in Power Grid

Latency Insertion Method (LIM) for IR Drop Analysis in Power Grid Abstract Latency Inserton Method (LIM) for IR Drop Analyss n Power Grd Dmtr Klokotov, and José Schutt-Ané Wth the steadly growng number of transstors on a chp, and constantly tghtenng voltage budgets,

More information

Accelerated Modular Multiplication Algorithm of Large Word Length Numbers with a Fixed Module

Accelerated Modular Multiplication Algorithm of Large Word Length Numbers with a Fixed Module Accelerated Modular Multplcaton Algorthm of Large Word Length Numbers wth a Fxed Module Nkolaos Bards 1, Athanasos Drgas 1, Alexander Markovskyy, and John Vrettaros 1 1 Natonal Centre for Scentfc Research

More information

problems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance

problems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance palette of problems Davd Rock and Mary K. Porter 1. If n represents an nteger, whch of the followng expressons yelds the greatest value? n,, n, n, n n. A 60-watt lghtbulb s used for 95 hours before t burns

More information

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and

More information

Ensemble Evolution of Checkers Players with Knowledge of Opening, Middle and Endgame

Ensemble Evolution of Checkers Players with Knowledge of Opening, Middle and Endgame Ensemble Evoluton of Checkers Players wth Knowledge of Openng, Mddle and Endgame Kyung-Joong Km and Sung-Bae Cho Department of Computer Scence, Yonse Unversty 134 Shnchon-dong, Sudaemoon-ku, Seoul 120-749

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

Adaptive Fault Tolerance in Real-Time Information Systems

Adaptive Fault Tolerance in Real-Time Information Systems Shubnsky I.B., Rozenberg I.N., Papc L. Adaptve Fault Tolerance n Real-Tme Informaton Systems Shubnsky I.B., Rozenberg I.N., Papc L. Russa, Moscow, JSC NIIAS, Serba, Prjevor, ICDQM Abstract Real-tme nformaton

More information

MASTER TIMING AND TOF MODULE-

MASTER TIMING AND TOF MODULE- MASTER TMNG AND TOF MODULE- G. Mazaher Stanford Lnear Accelerator Center, Stanford Unversty, Stanford, CA 9409 USA SLAC-PUB-66 November 99 (/E) Abstract n conjuncton wth the development of a Beam Sze Montor

More information

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,

More information

@IJMTER-2015, All rights Reserved 383

@IJMTER-2015, All rights Reserved 383 SIL of a Safety Fuzzy Logc Controller 1oo usng Fault Tree Analyss (FAT and realablty Block agram (RB r.-ing Mohammed Bsss 1, Fatma Ezzahra Nadr, Prof. Amam Benassa 3 1,,3 Faculty of Scence and Technology,

More information

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014 Gudelnes for CCPR and RMO Blateral Key Comparsons CCPR Workng Group on Key Comparson CCPR-G5 October 10 th, 2014 These gudelnes are prepared by CCPR WG-KC and RMO P&R representatves, and approved by CCPR,

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

Implementation Complexity of Bit Permutation Instructions

Implementation Complexity of Bit Permutation Instructions Implementaton Complexty of Bt Permutaton Instructons Zhje Jerry Sh and Ruby B. Lee Department of Electrcal Engneerng, Prnceton Unversty, Prnceton, NJ 085 USA {zsh, rblee}@ee.prnceton.edu Abstract- Several

More information

Multichannel Frequency Comparator VCH-315. User Guide

Multichannel Frequency Comparator VCH-315. User Guide Multchannel Frequency Comparator VCH-315 User Gude Table of contents 1 Introducton... 3 2 The workng prncple of the Comparator... 6 3 The computed functons... 8 3.1 Basc ratos... 8 3.2 Statstcal functons...

More information

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

Research on the Process-level Production Scheduling Optimization Based on the Manufacturing Process Simplifies

Research on the Process-level Production Scheduling Optimization Based on the Manufacturing Process Simplifies Internatonal Journal of Smart Home Vol.8, No. (04), pp.7-6 http://dx.do.org/0.457/sh.04.8.. Research on the Process-level Producton Schedulng Optmzaton Based on the Manufacturng Process Smplfes Y. P. Wang,*,

More information

Monitoring large-scale power distribution grids

Monitoring large-scale power distribution grids Montorng large-scale power dstrbuton grds D. Gavrlov, M. Gouzman, and S. Lury Center for Advanced Technology n Sensor Systems, Stony Brook Unversty, Stony Brook, NY 11794 Keywords: smart grd; sensor network;

More information

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain.

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain. Journal of Advances n Computer Research Quarterly pissn: 2345-606x eissn: 2345-6078 Sar Branch, Islamc Azad Unversty, Sar, I.R.Iran (Vol. 7, No. 3, August 2016), Pages: 67-76 www.jacr.ausar.ac.r Audo Sgnal

More information

Rational Secret Sharing without Broadcast

Rational Secret Sharing without Broadcast Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept

More information

FPGA Implementation of Ultrasonic S-Scan Coordinate Conversion Based on Radix-4 CORDIC Algorithm

FPGA Implementation of Ultrasonic S-Scan Coordinate Conversion Based on Radix-4 CORDIC Algorithm IACSIT Internatonal Journal of Engneerng and Technology, Vol. 7, No. 3, June 25 FPGA Implementaton of Ultrasonc S-Scan Coordnate Converson Based on Radx-4 CORDIC Algorthm Ruobo Ln, Guxong Lu, and Wenmng

More information

A High-Speed Multiplication Algorithm Using Modified Partial Product Reduction Tree

A High-Speed Multiplication Algorithm Using Modified Partial Product Reduction Tree World Academy of Scence, Engneerng and Technology Internatonal Journal of Electrcal and Computer Engneerng Vol:4, No:, 200 A Hgh-Speed Multplcaton Algorthm Usng Modfed Partal Product educton Tree P Asadee

More information

In-system Jitter Measurement Based on Blind Oversampling Data Recovery

In-system Jitter Measurement Based on Blind Oversampling Data Recovery RADIOENGINEERING, VOL. 1, NO. 1, APRIL 01 403 In-system Jtter Measurement Based on Blnd Oversamplng Data Recovery Mchal KUBÍČEK, Zdeněk KOLKA Dept. of Rado Electroncs, Brno Unversty of Technology, Purkyňova

More information

Decision aid methodologies in transportation

Decision aid methodologies in transportation Decson ad methodologes n transportaton Lecture 7: More Applcatons Prem Kumar prem.vswanathan@epfl.ch Transport and Moblty Laboratory Summary We learnt about the dfferent schedulng models We also learnt

More information

RC Filters TEP Related Topics Principle Equipment

RC Filters TEP Related Topics Principle Equipment RC Flters TEP Related Topcs Hgh-pass, low-pass, Wen-Robnson brdge, parallel-t flters, dfferentatng network, ntegratng network, step response, square wave, transfer functon. Prncple Resstor-Capactor (RC)

More information

Utility-based Routing

Utility-based Routing Utlty-based Routng Je Wu Dept. of Computer and Informaton Scences Temple Unversty Roadmap Introducton Why Another Routng Scheme Utlty-Based Routng Implementatons Extensons Some Fnal Thoughts 2 . Introducton

More information

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1 Project Ttle Date Submtted IEEE 802.16 Broadband Wreless Access Workng Group Double-Stage DL MU-MIMO Scheme 2008-05-05 Source(s) Yang Tang, Young Hoon Kwon, Yajun Kou, Shahab Sanaye,

More information

Low Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery

Low Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery 017 nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 017) ISBN: 978-1-60595-5-3 Low Samplng Rate Technology for UHF Partal Dscharge Sgnals Based on Sparse Vector Recovery Qang

More information

A Novel Soft-Switching Two-Switch Flyback Converter with a Wide Operating Range and Regenerative Clamping

A Novel Soft-Switching Two-Switch Flyback Converter with a Wide Operating Range and Regenerative Clamping 77 Journal of ower Electroncs, ol 9, No 5, September 009 JE 9-5- A Novel Soft-Swtchng Two-Swtch Flybac Converter wth a Wde Operatng Range and Regeneratve Clampng Marn-Go Km and Young-Seo Jung * Dvson of

More information

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart Control Chart - hstory Control Chart Developed n 920 s By Dr. Walter A. Shewhart 2 Process n control A phenomenon s sad to be controlled when, through the use of past experence, we can predct, at least

More information

An Effective Approach for Distribution System Power Flow Solution

An Effective Approach for Distribution System Power Flow Solution World Academy of Scence, Engneerng and Technology nternatonal Journal of Electrcal and Computer Engneerng ol:, No:, 9 An Effectve Approach for Dstrbuton System Power Flow Soluton A. Alsaad, and. Gholam

More information

A Mathematical Model for Restoration Problem in Smart Grids Incorporating Load Shedding Concept

A Mathematical Model for Restoration Problem in Smart Grids Incorporating Load Shedding Concept J. Appl. Envron. Bol. Sc., 5(1)20-27, 2015 2015, TextRoad Publcaton ISSN: 2090-4274 Journal of Appled Envronmental and Bologcal Scences www.textroad.com A Mathematcal Model for Restoraton Problem n Smart

More information

MIMO-OFDM Systems. Team Telecommunication and Computer Networks, FSSM, University Cadi Ayyad, P.O. Box 2390, Marrakech, Morocco.

MIMO-OFDM Systems. Team Telecommunication and Computer Networks, FSSM, University Cadi Ayyad, P.O. Box 2390, Marrakech, Morocco. IJCSI Internatonal Journal of Computer Scence Issues, Vol. 8, Issue 3, ay 2011 ISSN (Onlne: 1694-0814 A Low-complexty Power and Bt Allocaton Algorthm for ultuser IO-OFD Systems Ayad Habb 1, Khald El Baamran

More information

THE ARCHITECTURE OF THE BROADBAND AMPLIFIERS WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON EMITTER

THE ARCHITECTURE OF THE BROADBAND AMPLIFIERS WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON EMITTER VOL. 0, NO. 8, OCTOBE 205 ISSN 89-6608 2006-205 Asan esearch Publshng Network (APN. All rghts reserved. THE ACHITECTUE OF THE BOADBAND AMPLIFIES WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET) A Novel Optmzaton of the Dstance Source Routng (DSR) Protocol for the Moble Ad Hoc Networs (MANET) Syed S. Rzv 1, Majd A. Jafr, and Khaled Ellethy Computer Scence and Engneerng Department Unversty of Brdgeport

More information

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm Network Reconfguraton n Dstrbuton Systems Usng a Modfed TS Algorthm ZHANG DONG,FU ZHENGCAI,ZHANG LIUCHUN,SONG ZHENGQIANG School of Electroncs, Informaton and Electrcal Engneerng Shangha Jaotong Unversty

More information

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,

More information

Shunt Active Filters (SAF)

Shunt Active Filters (SAF) EN-TH05-/004 Martt Tuomanen (9) Shunt Actve Flters (SAF) Operaton prncple of a Shunt Actve Flter. Non-lnear loads lke Varable Speed Drves, Unnterrupted Power Supples and all knd of rectfers draw a non-snusodal

More information

A New Calibration Method for Current and Voltage Sensors Used in Power Quality Measurements

A New Calibration Method for Current and Voltage Sensors Used in Power Quality Measurements IMTC 26 Instrumentaton and Measurement Technology Conference Sorrento, Italy 24-27 Aprl 26 A New Calbraton Method for and s Used n Power Qualty Measurements Pedro M. Ramos, Nuno B. Brás and A. Cruz Serra

More information

THE GENERATION OF 400 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES *

THE GENERATION OF 400 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES * SLAC PUB 874 3/1999 THE GENERATION OF 4 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES * Sam G. Tantaw, Arnold E. Vleks, and Rod J. Loewen Stanford Lnear Accelerator Center, Stanford Unversty P.O. Box

More information

Relevance of Energy Efficiency Gain in Massive MIMO Wireless Network

Relevance of Energy Efficiency Gain in Massive MIMO Wireless Network Relevance of Energy Effcency Gan n Massve MIMO Wreless Network Ahmed Alzahran, Vjey Thayananthan, Muhammad Shuab Quresh Computer Scence Department, Faculty of Computng and Informaton Technology Kng Abdulazz

More information

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson 37th CDC, Tampa, December 1998 Analyss of Delays n Synchronous and Asynchronous Control Loops Bj rn Wttenmark, Ben Bastan, and Johan Nlsson emal: bjorn@control.lth.se, ben@control.lth.se, and johan@control.lth.se

More information

Control of Chaos in Positive Output Luo Converter by means of Time Delay Feedback

Control of Chaos in Positive Output Luo Converter by means of Time Delay Feedback Control of Chaos n Postve Output Luo Converter by means of Tme Delay Feedback Nagulapat nkran.ped@gmal.com Abstract Faster development n Dc to Dc converter technques are undergong very drastc changes due

More information

Procedia Computer Science

Procedia Computer Science Proceda Computer Scence 3 (211) 714 72 Proceda Computer Scence (21) Proceda Computer Scence www.elsever.com/locate/proceda www.elsever.com/locate/proceda WCIT-21 Performance evaluaton of data delvery approaches

More information

FFT Spectrum Analyzer

FFT Spectrum Analyzer THE ANNUAL SYMPOSIUM OF THE INSTITUTE OF SOLID MECHANICS SISOM 22 BUCHAREST May 16-17 ----------------------------------------------------------------------------------------------------------------------------------------

More information

Low Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages

Low Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages Low Swtchng Frequency Actve Harmonc Elmnaton n Multlevel Converters wth Unequal DC Voltages Zhong Du,, Leon M. Tolbert, John N. Chasson, Hu L The Unversty of Tennessee Electrcal and Computer Engneerng

More information

Pneumatic Power Bench Assembly

Pneumatic Power Bench Assembly Pneumatc Power Bench Assembly 58338-1 Instructon Sheet 408-9393 09 AUG 11 Fgure 1 1. INTRODUCTION Pneumatc Power Bench Assembly 58338-1 s a pneumatc power unt desgned to accept a varety of nterchangeable

More information

POLYTECHNIC UNIVERSITY Electrical Engineering Department. EE SOPHOMORE LABORATORY Experiment 1 Laboratory Energy Sources

POLYTECHNIC UNIVERSITY Electrical Engineering Department. EE SOPHOMORE LABORATORY Experiment 1 Laboratory Energy Sources POLYTECHNIC UNIERSITY Electrcal Engneerng Department EE SOPHOMORE LABORATORY Experment 1 Laboratory Energy Sources Modfed for Physcs 18, Brooklyn College I. Oerew of the Experment Ths experment has three

More information

MULTILAYER PERCEPTRON GUIDED KEY GENERATION THROUGH MUTATION WITH RECURSIVE REPLACEMENT IN WIRELESS COMMUNICATION (MLPKG)

MULTILAYER PERCEPTRON GUIDED KEY GENERATION THROUGH MUTATION WITH RECURSIVE REPLACEMENT IN WIRELESS COMMUNICATION (MLPKG) Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July 2012 MULTILAYER PERCEPTRON GUIDED KEY GENERATION THROUGH MUTATION WITH RECURSIVE REPLACEMENT IN WIRELESS COMMUNICATION (MLPKG)

More information

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes 5-95 Fall 08 # Games and Nmbers A. Game 0.5 seconds, 64 megabytes There s a legend n the IT Cty college. A student that faled to answer all questons on the game theory exam s gven one more chance by hs

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

Reflections on Rotators, Or, How to Turn the FEL Upgrade 3F Skew Quad Rotator Into a Skew Quad Rotator

Reflections on Rotators, Or, How to Turn the FEL Upgrade 3F Skew Quad Rotator Into a Skew Quad Rotator JLAB-TN-4-23 4 August 24 Reflectons on Rotators, Or, How to Turn the FEL Upgrade 3F Skew Quad Rotator nto a Skew Quad Rotator D. Douglas ntroducton A prevous note [] descrbes a smple skew quad system that

More information

Research Article Dynamic Relay Satellite Scheduling Based on ABC-TOPSIS Algorithm

Research Article Dynamic Relay Satellite Scheduling Based on ABC-TOPSIS Algorithm Mathematcal Problems n Engneerng Volume 2016, Artcle ID 3161069, 11 pages http://dx.do.org/10.1155/2016/3161069 Research Artcle Dynamc Relay Satellte Schedulng Based on ABC-TOPSIS Algorthm Shufeng Zhuang,

More information

Research on Peak-detection Algorithm for High-precision Demodulation System of Fiber Bragg Grating

Research on Peak-detection Algorithm for High-precision Demodulation System of Fiber Bragg Grating , pp. 337-344 http://dx.do.org/10.1457/jht.014.7.6.9 Research on Peak-detecton Algorthm for Hgh-precson Demodulaton System of Fber ragg Gratng Peng Wang 1, *, Xu Han 1, Smn Guan 1, Hong Zhao and Mngle

More information

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute

More information

Enhancing Throughput in Wireless Multi-Hop Network with Multiple Packet Reception

Enhancing Throughput in Wireless Multi-Hop Network with Multiple Packet Reception Enhancng Throughput n Wreless Mult-Hop Network wth Multple Packet Recepton Ja-lang Lu, Paulne Vandenhove, We Shu, Mn-You Wu Dept. of Computer Scence & Engneerng, Shangha JaoTong Unversty, Shangha, Chna

More information

Ergodic Capacity of Block-Fading Gaussian Broadcast and Multi-access Channels for Single-User-Selection and Constant-Power

Ergodic Capacity of Block-Fading Gaussian Broadcast and Multi-access Channels for Single-User-Selection and Constant-Power 7th European Sgnal Processng Conference EUSIPCO 29 Glasgow, Scotland, August 24-28, 29 Ergodc Capacty of Block-Fadng Gaussan Broadcast and Mult-access Channels for Sngle-User-Selecton and Constant-Power

More information

Modeling Hierarchical Event Streams in System Level Performance Analysis

Modeling Hierarchical Event Streams in System Level Performance Analysis Modelng Herarchcal Event Streams n System Level Performance Analyss IK Report 9 obas Ren, Ka Lampka, Lothar hele Computer Engneerng and Networks Laboratory Swss Federal Instsute of echnology (EH) Zurch,

More information

The Synthesis of Dependable Communication Networks for Automotive Systems

The Synthesis of Dependable Communication Networks for Automotive Systems 06AE-258 The Synthess of Dependable Communcaton Networks for Automotve Systems Copyrght 2005 SAE Internatonal Nagarajan Kandasamy Drexel Unversty, Phladelpha, USA Fad Aloul Amercan Unversty of Sharjah,

More information