Network Control by Bayesian Broadcast

Size: px
Start display at page:

Download "Network Control by Bayesian Broadcast"

Transcription

1 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. IT-33, NO. 3, MAY Network Contro by Bayesian Broadcast RONALD L. RIVEST Abstract-A transmission contro strategy is described for sotted- ALOHA-type broadcast channes with ternary feedback. At each time sot, each station estimates the probabiity that n stations are ready to transmit a packet for each n, using Bayes rue and the observed history of coisions, successfu transmissions, and hoes (empty sots). A station transmits a packet in a probabiistic manner based on these estimates. Tbis strategy is caed Bayesian broadcast. An eegant and very practica strategy-pseudo-bayesian broadcast-is then derived by approximating the probabiity estimates with a Poisson distribution with mean Y and further simpifying. Each station keeps a copy of V, transmits a packet with probabiity 1 / Y, and then updates Y in two steps:. For coisions, increment v by (e - 2)- = *.*. For successes and hoes, decrement Y by 1. Set Y to max (V + x, ), where x is an estimate of the arriva rate A of new packets into the system. Simuation resuts are presented showing that pseudo-bayesian broadcast performs we in practice, and methods that can be used to prove that certain versions of pseudo-bayesian broadcast are stabe for X < e - are discussed. W I. IIwR~IXJCTI~N E PROPOSE a new strategy for the probem of controing traffic on a oca-area or sateite broadcast communications network. We begin by first presenting a strategy (caed Bayesian broadcast) which is powerfu but unikey to be cost effective in practice. The name Bayesian broadcast was chosen because each station uses Bayes rue to estimate dynamicay the probabiity that n stations are active, for each n. The stations cacuate a broadcast (or transmissio: probabiity that is optimum given the avaiabe goba information. This strategy is essentiay equivaent to a proposa of An and Geenbe [, pp , based on earier work by Sega [2]. Our new strategy (which we ca pseudo-bayesian broadcast) is an extremey simpe and eegant approximation to Bayesian broadcast. We give simuation resuts showing that pseudo-bayesian broadcast is exceptionay effective and stabe in practice. Consider a network with some number (possiby infinite) of stations. Each station is given packets to transmit by an associated processor. In practice a station may have a queue of packets ready to send if its processor is generating packets more quicky than the station can transmit them. However, we assume that each station has at most one packet to transmit at any time. We say a station is Manuscript received September 30, This work was supported by the Nationa Science Foundation under Grant MCS The author is with the MIT Laboratory for Computer Science, Room N&%3-324, 545 Technoogy Square, Cambridge, MA 02139, USA. IEEE Log Number /87/ $ IEEE active if it has a packet to transmit; otherwise, it is inactive. We assume time is divided into sots, each ong enough to transmit one packet (the sotted ALOHA or S- ALOHA mode). Our procedures generaize for other modes; however, we do not treat these issues here. When a sot begins each active station must decide, either deterministicay or stochasticay, whether or not to transmit its packet. There are three possibe outcomes: a hoe if no stations transmit; 0 a success if one station transmits; or a coision if more than one station transmits. We assume that each station in the network can te which of the three possibe outcomes has occurred-this is the ternary feedback mode. We assume that the network objective is to minimize the average deay experienced by a packet between the time it is given to a station and the time it is successfuy transmitted; by Litte s resut [3] this is equivaent to minimizing the average backog in the network. Each station wi have a common contro strategy specifying how often it wi transmit packets, incuding how often it wi retransmit a packet which was invoved in a coision. Our approach has the foowing genera form. Just before sot t begins, each station k in the network computes a vaue for its broadcast probabiity b,,,. Then station k wi transmit a packet (if it has one) with probabiity b, f, independent of whether previous attempts had been made to transmit that packet. We assume that each station k computes b,,, from the gobay avaiabe network history, indicating whether each sot was a hoe, a success, or a coision. Since the stations ony use goba information to compute the broadcast probabiities b,, 1, each station wi compute the same vaue b, for b,,,, and our Bayesian updating procedure wi be reativey straightforward. In Section II we deveop the theory of Bayesian broadcast, showing how each station can choose a broadcast probabiity for each sot which is optimum given the avaiabe goba information. However, the fu Bayesian broadcast is a bit demanding to impement, so in Section III we provide a very simpe practica impementation based on these ideas, which we ca pseudo-bayesian broadcast. In Section IV we present some very encouraging experimenta resuts on the average backog when using pseudo-bayesian broadcast. In Section V of this paper we review reated work on this probem, and reate our resuts to this work.

2 324 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. IT-33, NO. 3, MAY 1987 Let Nt denote the number of active stations at time t (i.e., the number of stations which are ready to transmit a packet). This vaue wi decrease with successes and increase when a processor gives an inactive station packet. To motivate our deveopment, we begin by considering the compete knowedge case where each station knows the vaue of N, before sot t begins. This is unreaistic, since N, cannot be determined from the avaiabe information, but it is of interest to determine how the stations shoud act in this case. How ikey is it to have a hoe, success, or coision for a given broadcast probabiity b, ( and waiting probabiity w, = 1 - b,) and given vaue N, = n? The probabiities are P (hoe IN, = n) = H,,(n) = WY (1) P (success IN, = n) = S,,(n) = n * b, * WY- (2) P (coision II. BAYESIAN BROADCAST IN, = n) = C,,(n) = 1 - Hb(n) - S,,(n). The optimum vaue for b, is b, = /N,; (4 this maximizes S,,(N,). Note that b, depends ony on N,. If b, is chosen optimay as /N,, the expected number of stations attempting to transmit wi be one, and the probabiities of hoes, successes, and coisions wi be c,n,(nt) = - H,N,(Nt) - s,nttnt) = - f- t7) (3) (6) (The approximations hod for arge N,.) However, the stations wi typicay not know the correct vaue for N,. For exampe, some inactive stations may have received newy generated packets during sot t - 1 which they wi be ready to transmit during sot t. In the first procedure we describe, which we ca the Bayesian broadcast agorithm, each station wi use the evidence avaiabe up to time t to estimate the ikeihood P n,i that N, = n for each n 2 0. That is, P n.t = Pr(N, = n), for n = 0,... (8) given the avaiabe evidence. We ca this procedure Bayesian broadcast, since it reies on Bayesian reasoning to estimate j, = ( po, 1, p, f,... ). The Bayesian broadcast procedure described here is not new; it is essentiay the same as the proposa of An and Geenbe [, pp based on the technique proposed by Sega[2] to estimate recursivey the number of stations waiting to transmit a packet. The ony difference between our formuation and theirs is that in our version new packets are not transmitted immediatey with probabiity one, but rather with the same transmission probabiity that is used for the backogged packets. In the Bayesian broadcast procedure, each station begins with the initia distribution PO = (LO, 0,. ** )-it assumes that a stations are inactive. Each station wi compute the same vector j?, using the avaiabe goba feedback information. The vector p, = ( po, [, * * *) summarizes the goba information avaiabe about N,. With the Bayesian broadcast procedure, each station performs the foowing four steps during each time sot. Compute the optima broadcast probabiity b, from the initia probabiity vector pt. If the station is active, transmit its packet with probabiity b,. Perform a Bayesian update of j, (the initia probabiity distribution for N,) to obtain j: (the fina probabiity distribution for N,), using the evidence (hoe, success, or coision) observed in time sot t. Convert the fina probabiities & for N, into initia probabiities P,+t for N,,, by considering the generation of new packets and the fact that a packet may have been successfuy transmitted during time sot t (i.e., modeing the fow of packets into and out of the system). In Sections II-A-C beow we consider the detais invoved in the preceding steps. A. Computing the Broadcast Probabiity One can choose b, to maximize the expected chance of a success, even though there is uncertainty about N, as summarized in jt, since E(P( successat timet)) = Cp,,; S,,(n). (9) n Given jt, this is a poynomia in the unknown variabe b,. In practice there woud be at most a finite number of nonzero coefficients at any time, so that we can compute the vaue 6, which maximizes (9) by differentiating and root finding. (In practice the computation required to compute b, woud probaby be excessive. One coud use the approximation (E(N,))-. However, we beieve that in practice the pseudo-bayesian broadcast agorithm to be described ater wi be the best choice.) B. Bayesian Updating of the Probabiity Vector We now describe how each station computes its fina probabiity distribution for N,, given that sot t was a hoe, a success, or a coision. This probem is we suited for an appication of Bayes rue: P@HPW) 00) P(H1E) = P(E). (The fina probabiity P(HIE) of a hypothesis H, after evidence E is received, is equa to the initia probabiity P(H) of H times the probabiity P(EIH) that E wi

3 RIVEST: NETWORK CONTROL BY BAYESIAN BROADCAST 325 occur given H, divided by the overa probabiity P(E) of evidence E.) We have a hypothesis N, = n, for each n 2 0. The vaues p,, f are the initia probabiities of these hypotheses before the evidence from time sot t is considered. Let p,, f denote the fina probabiity P( N, = n IE,) where E, is the sot t evidence (hoe, success, or coision), and et K = (P&t9P;,t7... ) (11) denote the corresponding fina probabiity vector. The p;, f are easiy obtained using Bayes rue by mutipying each initia probabiity p,,, r by the appropriate ikeihood Hb,( n), S$,(n), or C,!(n) according to whether a hoe, success, or coision was observed, and then normaizing so that the P n,t add up to one. This competes our description of how each station incorporates the sot t evidence into its probabiity distribution for N,. The resuting distribution makes the best possibe use of the gobay avaiabe information; one cannot improve over this appication of Bayes rue. (See [4, ch. 391.) However, it may be possibe to achieve better resuts by using information oca to the transmitting processors, or by somehow using a strategy to minimize the ong-run deay which is not a one-step ook-ahead strategy as is Bayesian broadcast. We do not pursue these possibiities here. C. Converting the Fina Probabiities j: into the Initia Probabiities ji,, 1 Finay, we convert j&!, the fina probabiity distribution for N,, into an initia distribution for N,,,. Why might Pi, tt be different than P;,~? First, if sot t was a success, the expected number of active stations wi decrease by one. Second, we expect some inactive stations to receive new packets from their processors during sot t, so the expected number of active stations wi increase for this reason. 1) Modeing Successfu Packet Transmission: We mode the effect of successes as foows. We et p$ denote a station s estimate of the probabiity that the number of active stations is n, taking into account the evidence from the channe, incuding the effect of a success on the number of active stations. If time sot t contained a success, then we set P n,t = P, +1, f> forn = ;.. (12) (note that p,$, f = 0 if E, = success); otherwise, we set P n,f = PA,,, forn = 0,.... (13) The vector p; = (p&, P;,~,... ) is used as input into the next step, where the generation of new packets is taken into account. 2) Modeing the Generation of New Packets: There are many ways to mode the generation of new packets. We are actuay concerned with the rate at which stations become active, i.e., convert from having no packet to send during time sot t to having a packet to send during time sot t + 1. We take the usua approach and assume that new packets arrive according to a Poisson distribution with parameter A, and that X i,s estimated reasonaby accuratey (et us ca the estimate A). We can compute the initia probabiities for N, + i : P n,t+ = i Pi: 1. Px(n -A. (14 j=o Here Pi( n - j) denotes the vaue of the Poisson density function at point n - j; i.e., the estimated probabiity that n -j new packets wi arrive during a time sot. This competes our description of the Bayesian broadcast procedure since we now have our initia estimates for the distribution of N,,, for the next time sot. III. THE PSEUDO-BAYESIAN BROADCAST ALGORITHM We now present a practica impementation of the above ideas, which we ca the pseudo-bayesian broadcast agorithm. We derive this agorithm by assuming that j, can be reasonaby approximated by a Poisson distribution with mean v; the station s vaue of v at time t represents the station s estimate of N,. We use the notation v rather than the subscripted form v for convenience in this section: v now denotes a changeabe contro parameter for the stations. Let --Y n P,(n) = y (15) denote the Poisson density at n for Poisson parameter v. Each station wi keep ony v, rather than the vector j,, and wi approximate the initia probabiity p,,, f by P,,(n). To deveop the pseudo-bayesian broadcast and probabiity updating procedure, we first consider the equations that woud be used for a,true Bayesian update of the Poisson approximation for j, if b, is the actua broadcast probabiity (and w, = 1 - b,). These equations represent the unnormaized fina probabiity vaues: PV(n). H,,(n) = epybt. P,,,(n) (16) P,(n). S,,(n) = vb,. evb + PVWr(n - 1) (17) Pv(n). cb,(n> = dn> ( - Hb,(n) - sb,(n)). (18) From (9) and (17) it is easy to compute the best broadcast probabiity: (19) no compicated root-finding is needed. Thus we have derived our first practica benefit from the Poisson approximation: it becomes triva to compute the desired broadcast probabiity b,. We next consider the probem of updating v in as Bayesian a manner as possibe, whie preserving our Poisson approximation. We sha see that for hoes and successes we can use Bayes rue exacty, whie for coisions we must introduce an approximation error to preserve the Poisson approximation.

4 326 IEEE TRANSACTIONS ON INFORMATION THEORY,VOL.IT-33,N0. 3,MAY1987 From (16) we see that for hoes the Bayesian updating takes a simpe form since the resuting distribution wi aso be Poisson with mean VW, = max (v -,O). In other words, when a hoe occurs, the stations reduce their estimate of the expected number of active stations by one, uness v is aready ess than one, in which case they set v to zero. From (17) we see that for successes the Bayesian updating and success modeing aso takes a simpe form. Here (17) wi yied a Poisson distribution with mean v - 1 shifted one pace to the right. However, the effect of modeing a successfu transmission shifts the distribution one pace to the eft. The net resut is that the Poisson assumption remains vaid, and each station shoud decrement its state variabe v by 1. If there is a coision, Bayes rue wi not yied a Poisson distribution for the fina probabiities. However; we approximate the resut by a Poisson distribution by setting v to be the mean of the resuting distribution, which is (using x to denote v. b,): v+ II XL ex - x- which simpifies in the case v 2 1, b, = /v to (20) 1 v+---- e-2 (21) (It is somewhat surprising that we get a constant increment to v in this case.) For v < 1, (20) is reasonaby we approximated by (22) which is the vaue (20) yieds for v = 1. Using (22) is equivaent to requiring that v 2 1 at a times. The foowing agorithm makes this simpification. We now summarize the above anaysis, assumptions, and approximations in the foowing presentation of the pseudo-bayesian broadcast agorithm. The Pseudo-Bayesian Broadcast Procedure: Each station maintains a copy of v and, during each sot, a a broadcasts with probabiity /v if it has a packet; decrements v by 1 if the current sot is a hoe or a success, and increments v by (e - 2)- = if the current sot is a coision; sets v to maxa(v + i, ), where fi is an estimate of the arriva rate h of new packets into the system. (For exampe, one might estimate the arriva rate by the observed average success rate, or use the constant vaue x = e-. See Section V for some discussion of this issue.) We note that the pseudo-bayesian broadcast procedure actuay ony needs binary feedback since it ony needs to distinguish coisions from noncoisions. We note that since each station now ony maintains a singe parameter v, it woud be simpe to broadcast v with every packet. In this way stations which have just powered-up can synchronize easiy. IV. EXPERIMENTALRESULTS The pseudo-bayesian broadcast procedure was simuated for o6 time sots (40 trias of steps each) for a number of different Poisson arriva rates A. For each tria the average backog (i.e., the average of N, over the steps) was computed as a sampe data point. The mean Nr and standard deviation ur of these 40 sampe points are given in Tabe I. TABLE1 MEANANDSTANDARDDEVIATIONFORBACKLOG x NY 0: For these experiments the arriva rate X was estimated by setting i to initiay and then using the recursion A = 0.995r; s (23) where s = 1 if the current sot contained a success, and s = 0 otherwise. This estimates the average success rate, which wi ony be a good estimate of the average arriva rate when the scheme is acting in a stabe manner. Tsitsikis [5] discusses this issue further. In Tabe II we give Fy, the average (over the 40 trias) frequency of having no backog during a tria of steps, and Ly,, the average ast step number when there was no backog. The ast statistic supports the view that the method is stabe for h = 0.36 and unstabe for X = TABLE11 FREQUENCYOFNOBACKLOGANDLASTINSTANCEOFNOBACKLOG x F,a LT It is cear from (6) that we shoud not expect to be abe to hande X > e- = We see that the agorithm becomes unstabe for X > e-, as expected.

5 RIVEST: NETWORK CONTROL BY BAYESIAN BROADCAST 327 V. DISCUSSION In this section we discuss the pseudo-bayesian broadcast strategy in reation to previous work. Gaager [6] provides an exceent overview of the state of the art in mutiaccess channes, and the specia issue of this TRANSACTIONS [7] contains many exceent papers on this topic. Tanenbaum [8] surveys a number of possibe approaches to this probem, in a more genera framework. Note that the S-ALOHA mode used here differs from the more common Ethernet mode [9] since here we have fixed ength packets and fixed ength time sots. In the origina ALOHA scheme [o] a station broadcasts a new packet in the next sot. (A poicy of this sort is caed immediate first transmission (IFT) instead of deayed first transmission (DFT).) If a coision occurred, then the packet becomes backogged and is broadcast in succeeding sots with a fixed probabiity f unti it is successfuy transmitted. We note that in our scheme new packets and backogged packets are treated identicay -the contro poicy does not distinguish them. The idea of decreasing the broadcast probabiities in the event of a coision, and increasing it in the event of a success and/or a coision, is not new. For exampe, Gera and Keinrock [] discuss a number of adaptive strategies for the S-ALOHA network, some of which do not distinguish new from backogged packets, and which may be sensitive to the observed congestion on the channe. An and Geenbe [] discuss other variations, incuding a version of the Bayesian broadcast procedure as noted previousy. Hajek and Van Loon [12] present another adaptive scheme. Their scheme was IFT, and mutipies f (the transmission probabiity for backogged packets) by for hoes, by for successes, and by for coisions (keeping f within some pre-estabished bounds as we). For the agorithm of Hajek and Van Loon [12] it is reported that the average number of backogged packets for X = 0.32 is approximatey 5.0 (To compare our resuts with theirs, subtract X from our vaues of Nr since they do not count newy arrived packets in the backog.) We see that the pseudo-bayesian broadcast agorithm appears to offer significanty improved performance over the Hajek and Van Loon agorithm. (To be fair, we note that their main objective was to prove that their agorithm was stabe for X < e-.) Merakos and Kazakos [13] have made a carefu study of Hajek and Van Loon s scheme and have rederived in a different way the parameters (1.518, 1.000, 0.559) mentioned earier. They aso study the effect of errors in the feedback process on the performance of the scheme. Kumar and Merakos [14] present a reated scheme for updating broadcast probabiities, but which is not provaby stabe for a X < e-. The cosest previous work is that of Key [15]. In his scheme each station maintains a variabe v, which -as in our scheme-is intended to track the vaue of N,, the number of active stations. As in our scheme, an active station transmits with probabiity /v. He considers the cass of schemes parameterized by (a, b, c), where v is increased by a in the case of a hoe, by b in the case of a successfu transmission, and by c in the case of a coision. The pseudo-bayesian broadcast scheme is a member of this cass, with parameters (-1 + A, -1 + i, (e - 2)- + i). This particuar choice of parameters was not mentioned by Key. The most important question is, of course, Is the pseudo-bayesian broadcast scheme stabe for a X < e-? The answer turns out to be a conditiona yes (conditiona on the manner in which the stations compute A). Key [15] has shown that the ratio K = N,/v wi drift towards unity whenever (a, b, c) are chosen so that [(a - c)epk + (b - c)ke- + c] (24) (the expected drift of v) is negative for K < 1 and positive for K > 1, and furthermore that h - Ke- < K[(a - c)e- + (b - c)keek + c] (25) for K > 1. In our case the above inequaities hod for X < e-, assuming that stations use fi = e- uniformy. The drift (24) wi have the correct sign when the stations overestimate the arriva rate X by using the upper bound e-. This anaysis was pointed out in Tsitsikis [5], who suggested as we that using fi = e- may be the most robust approach to estimating X. (The reader may aso want to consut Hajek [16] for a more fuy described version of a drift anaysis of this sort.) Mikhaiov [17] has presented techniques that are capabe of proving the stabiity of this type, according to Key [15] and Tsitsikis [5]. (The author has not seen the detais of these methods.) Tsitsikis [5] has presented a nice direct proof that the pseudo-bayesian broadcast agorithm is, indeed stabe whenever X < e-, assuming that A < A, i.e., that the estimate of X is aways an overestimate. Tsitsikis aso shows that if X > A, then instabiities may arise. VI. CONCLUSION We beieve the proposed pseudo-bayesian broadcast procedure wi be found to be exceptionay effective in practice since it makes neary the best possibe use of the information avaiabe on the network in determining the broadcast probabiities to use. ACKNOWLEDGMENT I woud ike to thank Bard Boom, Robert Gaager, Bruce Hajek, Pierre Humbet, Tom Leighton, Chares Leiserson, and John Tsitsikis for hepfu suggestions and discussions. I woud aso ike to thank Michee Lee and Brian Rogoff for heping to obtain the simuation resuts. Finay, the referees provided invauabe advice and pointers to the reevant iterature.

6 328 REFERENCES PI B. T. An and E. Geenbe, Etude et simuation de reseaux de diffusion sous controe, RA IRO Informatique/Comput. Sci., vo. 11, pp , PI A Sega, Recursive estimation from discrete-time point processes, IEEE Trans. Inform. Theorv. vo. IT-22. vv , Juy [31 L. Keinrock, *Queueing systems, vo. -i Theory. New York: Wiey, [41 P. Whitte, Optimization over Time, vo. II. New York: Wiey, 1983, ch. 39. [51 J. N. Tsitsikis, Anaysis of a mutiaccess contro scheme, MIT LIDS Rep. LIDS-P [61 R. G. Gaager, A perspective on mutiaccess channes, IEEE Trans. Inform. Theory, vo. IT-31, pp , Mar [71 J. L. Massey, Ed., Spkia Issue on kxndom-access Communications, IEEE Trans. Inform. Theory, vo. IT-31, Mar PI A. S. Tanenbaum, Network protocos, Computing Surveys, vo. 13, pp , Dec t91 R. M. Metcafe and D. R. Boggs, Ethernet: Distributed packet switching for oca computer networks, Commun. Ass. Compu?. IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. IT-33, NO. 3, MAY 1987 Mach., vo. 19, pp , Juy WI N. Abramson, Packet switching with sateites, in Proc. AFZPS Nat. Computer Conf., vo. 42, 1973, pp M. Gera and L. Keinrock, Cosed oop stabiity contros for S-ALOHA sateite communications, in Proc. Fifth Data Communications Symp., Sept. 1977, pp WI B. Hajek and T. Van Loon, Decentraized dynamic contro of a mutiaccess broadcast channe, IEEE Trans. Automat. Contr., vo. AC-27, pp , June L. Merakos and D. Kazakos, On retransmission contro poicies in mutipe-access communication networks, IEEE Trans. Automat. Contr., vo. AC-30, pp , Feb P41 P. R. S. Kumar and L. Merakos, in Proc. 23rd IEEE Conf. Decision and Contro, Dec. 1984, pp AX. [I51 F. P. Key, Stochastic modes of computer communication systems, J. Roy. Statist. Sot., Series B, vo. 47, pp , PI B. Hajek, Hitting-time and occupation time bounds impied by drift anaysis with appications, in Advances App. Probab., vo. 14, pp ,1982. ii71 V. A. Mikhaiov, Methods of random mutipe access, Candidate Eng. thesis, Moscow Inst. of Physics and Techno., Moscow, USSR, 1979.

Rateless Codes for the Gaussian Multiple Access Channel

Rateless Codes for the Gaussian Multiple Access Channel Rateess Codes for the Gaussian Mutipe Access Channe Urs Niesen Emai: uniesen@mitedu Uri Erez Dept EE, Te Aviv University Te Aviv, Israe Emai: uri@engtauaci Devavrat Shah Emai: devavrat@mitedu Gregory W

More information

AN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS

AN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS SIAM J. COMPUT. c 1998 Society for Industria and Appied Mathematics Vo. 27, No. 3, pp. 702 712, June 1998 008 AN Ω(D og(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS EYAL KUSHILEVITZ AND YISHAY MANSOUR

More information

Channel Division Multiple Access Based on High UWB Channel Temporal Resolution

Channel Division Multiple Access Based on High UWB Channel Temporal Resolution Channe Division Mutipe Access Based on High UWB Channe Tempora Resoution Rau L. de Lacerda Neto, Aawatif Menouni Hayar and Mérouane Debbah Institut Eurecom B.P. 93 694 Sophia-Antipois Cedex - France Emai:

More information

Announcements. Tuesday April 15 covers material from chapters: 1-3, 5-6 emphasis on material since last midterm

Announcements. Tuesday April 15 covers material from chapters: 1-3, 5-6 emphasis on material since last midterm Announcements Reading Today: 4.1 & 4.2 (skip 4.2.4 and 4.2.5) Second Midterm: Tuesday Apri 15 covers materia from chapters: 1-3, 5-6 emphasis on materia since ast midterm CMSC 417 - S97 (ect 18) copyright

More information

Satellite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic

Satellite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic Sateite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic Jing Zhu and Sumit Roy Department of Eectrica Engineering, University of Washington Box 352500, Seatte, WA 98195, USA

More information

Improving the Active Power Filter Performance with a Prediction Based Reference Generation

Improving the Active Power Filter Performance with a Prediction Based Reference Generation Improving the Active Power Fiter Performance with a Prediction Based Reference Generation M. Routimo, M. Sao and H. Tuusa Abstract In this paper a current reference generation method for a votage source

More information

Resource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks

Resource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks Resource Aocation via Linear Programming for Muti-Source, Muti-Reay Wireess Networs Nariman Farsad and Andrew W Ecford Dept of Computer Science and Engineering, Yor University 4700 Keee Street, Toronto,

More information

ADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL

ADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL ADATIV ITRATION SCHM OF TURBO COD USING HYSTRSIS CONTROL Chih-Hao WU, Kenichi ITO, Yung-Liang HUANG, Takuro SATO Received October 9, 4 Turbo code, because of its remarkabe coding performance, wi be popuar

More information

GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCLES

GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCLES VO. 10, NO. 18, OCTOBER 2015 ISSN 1819-6608 GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCES Henny Widowati 1, Suistyo Puspitodjati 2 and Djati Kerami 1 Department of System Information, Facuty

More information

Comparison of One- and Two-Way Slab Minimum Thickness Provisions in Building Codes and Standards

Comparison of One- and Two-Way Slab Minimum Thickness Provisions in Building Codes and Standards ACI STRUCTURAL JOURNAL Tite no. 107-S15 TECHNICAL PAPER Comparison of One- and Two-Way Sab Minimum Thickness Provisions in Buiding Codes and Standards by Young Hak Lee and Andrew Scanon Minimum thickness

More information

COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS

COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE80.15.3A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS Ms. Jina H. She PG Student C.C.E.T, Wadhwan, Gujarat, Jina_hshet@yahoo.com Dr. K. H. Wandra Director

More information

A Distributed Utility Max-Min Flow Control Algorithm

A Distributed Utility Max-Min Flow Control Algorithm A Distributed tiity Max-Min Fow Contro Agorithm Hyang-Won Lee and Song Chong Department of Eectrica Engineering and Computer Science Korea Advanced Institute of Science and Technoogy (KAIST) mshw@netsys.kaist.ac.kr,

More information

Cooperative Caching in Dynamic Shared Spectrum Networks

Cooperative Caching in Dynamic Shared Spectrum Networks Fina version appears in IEEE Trans. on Wireess Communications, 206. Cooperative Caching in Dynamic Shared Spectrum Networs Dibaar Das, Student Member, IEEE, and Ahussein A. Abouzeid, Senior Member, IEEE

More information

Performance Measures of a UWB Multiple-Access System: DS/CDMA versus TH/PPM

Performance Measures of a UWB Multiple-Access System: DS/CDMA versus TH/PPM Performance Measures of a UWB Mutipe-Access System: DS/CDMA versus TH/PPM Aravind Kaias and John A. Gubner Dept. of Eectrica Engineering University of Wisconsin-Madison Madison, WI 53706 akaias@wisc.edu,

More information

Run to Potential: Sweep Coverage in Wireless Sensor Networks

Run to Potential: Sweep Coverage in Wireless Sensor Networks Run to Potentia: Sweep Coverage in Wireess Sensor Networks Min Xi,KuiWu,Yong Qi,Jizhong Zhao, Yunhao Liu,MoLi Department of Computer Science, Xi an Jiaotong University, China Department of Computer Science,

More information

Cross-layer queuing analysis on multihop relaying networks with adaptive modulation and coding K. Zheng 1 Y. Wang 1 L. Lei 2 W.

Cross-layer queuing analysis on multihop relaying networks with adaptive modulation and coding K. Zheng 1 Y. Wang 1 L. Lei 2 W. www.ietd.org Pubished in IET Communications Received on 18th June 2009 Revised on 30th Juy 2009 ISSN 1751-8628 Cross-ayer queuing anaysis on mutihop reaying networks with adaptive moduation and coding

More information

On the Relationship Between Queuing Delay and Spatial Degrees of Freedom in a MIMO Multiple Access Channel

On the Relationship Between Queuing Delay and Spatial Degrees of Freedom in a MIMO Multiple Access Channel On the Reationship Between Queuing Deay and Spatia Degrees of Freedom in a IO utipe Access Channe Sriram N. Kizhakkemadam, Dinesh Rajan, andyam Srinath Dept. of Eectrica Engineering Southern ethodist University

More information

Effect of Interfering Users on the Modulation Order and Code Rate for UWB Impulse-Radio Bit-Interleaved Coded M-ary PPM

Effect of Interfering Users on the Modulation Order and Code Rate for UWB Impulse-Radio Bit-Interleaved Coded M-ary PPM Effect of Interfering Users on the Moduation Order and Code Rate for UWB Impuse-Radio Bit-Intereaved Coded M-ary PPM Ruben Merz and Jean-Yves Le Boudec EPFL, Schoo of Computer and Communication Sciences

More information

Fox-1E (RadFxSat-2) Telemetry and Whole Orbit Data Simulation. Burns Fisher, W2BFJ Carl Wick, N3MIM

Fox-1E (RadFxSat-2) Telemetry and Whole Orbit Data Simulation. Burns Fisher, W2BFJ Carl Wick, N3MIM Fox-1E (RadFxSat-2) Teemetry and Whoe Orbit Data Simuation Burns Fisher, W2BFJ Car Wick, N3MIM 1 Review: Fox-1 DUV Teemetry Fox-1A through Fox-1D are FM Repeater Sateites» Ony a singe downink frequency»

More information

Joint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition

Joint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 10.1109/TMC.2018.2861859,

More information

For 2-5 players Ages 8 and above Minutes

For 2-5 players Ages 8 and above Minutes For 2-5 payers Ages and above 30-90 Minutes CN Rues V2 EN DEF 2015_Mise en page 1 19/05/15 15:39 Page2 COmpOnents Setting up t Macao and Ports where trading occurs Macao with its Back Market A port and

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks roceedings of the 46th IEEE Conference on Decision and Contro New Oreans, LA, USA, Dec. 12-14, 27 FrB2.5 ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao,

More information

Rate-Allocation Strategies for Closed-Loop MIMO-OFDM

Rate-Allocation Strategies for Closed-Loop MIMO-OFDM Rate-Aocation Strategies for Cosed-Loop MIMO-OFDM Joon Hyun Sung and John R. Barry Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy, Atanta, Georgia 30332 0250, USA Emai: {jhsung,barry}@ece.gatech.edu

More information

Fast Hybrid DFT/DCT Architecture for OFDM in Cognitive Radio System

Fast Hybrid DFT/DCT Architecture for OFDM in Cognitive Radio System Fast Hybrid DF/D Architecture for OFDM in ognitive Radio System Zhu hen, Moon Ho Lee, Senior Member, EEE, hang Joo Kim 3 nstitute of nformation&ommunication, honbuk ationa University, Jeonju, 56-756,Korea

More information

Marketing tips and templates

Marketing tips and templates For financia adviser use ony. Not approved for use with customers. Marketing tips and tempates Heping you to grow your equity reease business The growing equity reease market can offer many opportunities

More information

FOR energy limited data networks, e.g., sensor networks,

FOR energy limited data networks, e.g., sensor networks, 578 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO., DECEMBER 009 An Optima Power Aocation Scheme for the STC Hybrid ARQ over Energy Limited Networks Hongbo Liu, Member, IEEE, Leonid Razoumov,

More information

Utility-Proportional Fairness in Wireless Networks

Utility-Proportional Fairness in Wireless Networks IEEE rd Internationa Symposium on Persona, Indoor and Mobie Radio Communications - (PIMRC) Utiity-Proportiona Fairness in Wireess Networks G. Tychogiorgos, A. Gkeias and K. K. Leung Eectrica and Eectronic

More information

An Approach to use Cooperative Car Data in Dynamic OD Matrix

An Approach to use Cooperative Car Data in Dynamic OD Matrix An Approach to use Cooperative Car Data in Dynamic OD Matrix Estimation L. Montero and J. Barceó Department of Statistics and Operations Research Universitat Poitècnica de Cataunya UPC-Barceona Tech Abstract.

More information

Radial basis function networks for fast contingency ranking

Radial basis function networks for fast contingency ranking Eectrica Power and Energy Systems 24 2002) 387±395 www.esevier.com/ocate/ijepes Radia basis function networks for fast contingency ranking D. Devaraj a, *, B. Yegnanarayana b, K. Ramar a a Department of

More information

Wireless Communications

Wireless Communications Wireess Communications Ceuar Concept Hamid Bahrami Reference: Rappaport Chap3 Eectrica & Computer Engineering Statements of Probems Soving the probem of Spectra congestion System Capacity A system-eve

More information

Joint Optimal Power Allocation and Relay Selection with Spatial Diversity in Wireless Relay Networks

Joint Optimal Power Allocation and Relay Selection with Spatial Diversity in Wireless Relay Networks Proceedings of SDR'11-WInnComm-Europe, 22-24 Jun 2011 Joint Optima Power Aocation and Reay Seection with Spatia Diversity in Wireess Reay Networks Md Habibu Isam 1, Zbigniew Dziong 1, Kazem Sohraby 2,

More information

Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits

Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits Secure Physica Layer Key Generation Schemes: Performance and Information Theoretic Limits Jon Waace Schoo of Engineering and Science Jacobs University Bremen, Campus Ring, 879 Bremen, Germany Phone: +9

More information

On optimizing low SNR wireless networks using network coding

On optimizing low SNR wireless networks using network coding On optimizing ow SNR wireess networks using network coding Mohit Thakur Institute for communications engineering, Technische Universität München, 80290, München, Germany. Emai: mohit.thakur@tum.de Murie

More information

A Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access

A Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access 0 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA, VOL. 5, NO., JUNE 007 A Low Compexity VCS Method for PAPR Reduction in Muticarrier Code Division Mutipe Access Si-Si Liu, Yue iao, Qing-Song Wen,

More information

Iterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels

Iterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels Journa of Communications Vo. 0 No. February 0 Iterative Transceiver Design for Opportunistic Interference Aignment in MIMO Interfering Mutipe-Access Channes Weipeng Jiang ai Niu and Zhiqiang e Schoo of

More information

Distribution of Path Durations in Mobile Ad-Hoc Networks and Path Selection

Distribution of Path Durations in Mobile Ad-Hoc Networks and Path Selection Distribution of ath Durations in Mobie Ad-Hoc Networks and ath Seection Richard J. La and Yijie Han Abstract We investigate the issue of path seection in mutihop wireess networks with the goa of identifying

More information

Non-Preemptive Interrupt Scheduling for Safe Reuse of Legacy Drivers in Real-Time Systems

Non-Preemptive Interrupt Scheduling for Safe Reuse of Legacy Drivers in Real-Time Systems Non-Preemptive Interrupt Scheduing for Safe Reuse of Legacy Drivers in Rea-Time Systems Tuio Facchinetti, Giorgio Buttazzo, Mauro Marinoni, and Giacomo Guidi University of Pavia, Itay {tuio.facchinetti,giorgio.buttazzo,

More information

LIGHTNING PROTECTION OF MEDIUM VOLTAGE OVERHEAD LINES WITH COVERED CONDUCTORS BY ANTENNA-TYPE LONG FLASHOVER ARRESTERS

LIGHTNING PROTECTION OF MEDIUM VOLTAGE OVERHEAD LINES WITH COVERED CONDUCTORS BY ANTENNA-TYPE LONG FLASHOVER ARRESTERS C I R E D 17 th Internationa Conference on Eectricity Distribution Barceona, 12-15 May 23 LIGHTNING PROTECTION OF MEDIUM VOLTAGE OVERHEAD LINES WITH COVERED CONDUCTORS BY ANTENNA-TYPE LONG FLASHOVER ARRESTERS

More information

Fuzzy Model Predictive Control Applied to Piecewise Linear Systems

Fuzzy Model Predictive Control Applied to Piecewise Linear Systems 10th Internationa Symposium on Process Systems Engineering - PSE2009 Rita Maria de Brito Aves, Caudio Augusto Oer do Nascimento and Evaristo Chabaud Biscaia Jr. (Editors) 2009 Esevier B.V. A rights reserved.

More information

SCHEDULING the wireless links and controlling their

SCHEDULING the wireless links and controlling their 3738 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 7, JULY 2014 Minimum Length Scheduing With Packet Traffic Demands in Wireess Ad Hoc Networks Yacin Sadi, Member, IEEE, and Sinem Coeri Ergen,

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /GLOCOM.2003.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /GLOCOM.2003. Coon, J., Siew, J., Beach, MA., Nix, AR., Armour, SMD., & McGeehan, JP. (3). A comparison of MIMO-OFDM and MIMO-SCFDE in WLAN environments. In Goba Teecommunications Conference, 3 (Gobecom 3) (Vo. 6, pp.

More information

Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks

Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Energy-Aware Scheduing with Quaity of Surveiance Guarantee in Wireess Sensor Networks Jaehoon Jeong, Sarah Sharafkandi, and David H.C. Du Dept. of Computer Science and Engineering, University of Minnesota

More information

THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN

THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN A CDMA SYSTEM Yan Zhang, Laurence B. Mistein, and Pau H. Siege Department of ECE, University of Caifornia, San Diego

More information

Coordination Improvement of Directional Overcurrent Relays in a Microgrid Using Modified Particle Swarm Optimization Algorithm

Coordination Improvement of Directional Overcurrent Relays in a Microgrid Using Modified Particle Swarm Optimization Algorithm Internationa Journa of Eectrica Components and Energy Conversion 2018; 4(1): 21-32 http://www.sciencepubishinggroup.com/j/ijecec doi: 10.11648/j.ijecec.20180401.13 ISSN: 2469-8040 (Print); ISSN: 2469-8059

More information

Resource Allocation via Linear Programming for Fractional Cooperation

Resource Allocation via Linear Programming for Fractional Cooperation 1 Resource Aocation via Linear Programming for Fractiona Cooperation Nariman Farsad and Andrew W Ecford Abstract In this etter, resource aocation is considered for arge muti-source, muti-reay networs empoying

More information

Yongxiang Zhao Brookhaven National Laboratory Upton, NY, July 1998 CENTER FOR ACCELERATOR PHYSICS

Yongxiang Zhao Brookhaven National Laboratory Upton, NY, July 1998 CENTER FOR ACCELERATOR PHYSICS BNL CAP CCII, 65685 225-MUON-98C A NEW STRUCTURE OF LINEAR COLLIDER * Yongxiang Zhao Brookhaven Nationa Laboratory Upton, NY, 11973 RECEIVED AIK 1 7 1998 OSTI *This work was supported by the US Department

More information

Development of a LabVIEW-based test facility for standalone PV systems

Development of a LabVIEW-based test facility for standalone PV systems Deveopment of a LabVIEW-based test faciity for standaone PV systems Aex See Kok Bin, Shen Weixiang, Ong Kok Seng, Saravanan Ramanathan and Low I-Wern Monash University Maaysia, Schoo of Engineering No.2,

More information

Power Spectrum Optimization for Interference Mitigation via Iterative Function Evaluation

Power Spectrum Optimization for Interference Mitigation via Iterative Function Evaluation Power Spectrum Optimization for Interference Mitigation via Iterative Function Evauation Hayssam Dahrouj, Wei Yu, Taiwen Tang, and Steve Beaudin Eectrica and Computer Engineering Dept., University of Toronto,

More information

PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER FDMA SYSTEMS

PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER FDMA SYSTEMS PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER SYSTEMS Junsung Lim, Hyung G. Myung, Kyungjin Oh and David J. Goodman Dept. of Eectrica and Computer Engineering, Poytechnic University 5 Metrotech

More information

arxiv: v4 [physics.soc-ph] 31 Dec 2013

arxiv: v4 [physics.soc-ph] 31 Dec 2013 A Cascading Faiure Mode by Quantifying Interactions Junjian Qi and Shengwei Mei Department of Eectrica Engineering, Tsinghua University, Beijing, China 100084 arxiv:1301.2055v4 [physics.soc-ph] 31 Dec

More information

Co-channel Interference Suppression Techniques for STBC OFDM System over Doubly Selective Channel

Co-channel Interference Suppression Techniques for STBC OFDM System over Doubly Selective Channel Co-channe Interference Suppression Techniques for STBC OFDM System over Douby Seective Channe Jyoti P. Patra Dept. of Eectronics and Communication Nationa Institute Of Technoogy Rourkea-769008, India E

More information

Model of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobile Ad Hoc Network

Model of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobile Ad Hoc Network Mode of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobie Ad Hoc Network Igor Konstantinov, Kostiantyn Poshchykov, Sergej Lazarev, and Oha Poshchykova Begorod State University, Pobeda Street 85,

More information

Availability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique

Availability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique Progress In Eectromagnetics Research Symposium Proceedings, Guangzhou, China, Aug. 25 28, 2014 849 Avaiabiity Anaysis for Eastic Optica Networks with Muti-path Virtua Concatenation Technique Xiaoing Wang

More information

P H O T O CD I N F O R M A T I O N B U L L E T I N

P H O T O CD I N F O R M A T I O N B U L L E T I N PCD 077 Juy, 1994 Copyright, Eastman Kodak Company, 1994 P H O T O CD I N F O R M A T I O N B U L L E T I N Fuy Utiizing Photo CD Images Maintaining Coor Consistency When Creating KODAK Photo CD Portfoio

More information

LTC6993-1/LTC LTC6993-3/LTC TimerBlox: Monostable Pulse Generator (One Shot) Applications. Typical Application

LTC6993-1/LTC LTC6993-3/LTC TimerBlox: Monostable Pulse Generator (One Shot) Applications. Typical Application Features n Puse Width Range: 1µs to 33.6 Seconds n Configured with 1 to 3 Resistors n Puse Width Max Error: 51µs

More information

Theoretical Profile of Ring-Spun Slub Yarn and its Experimental Validation

Theoretical Profile of Ring-Spun Slub Yarn and its Experimental Validation Chong-Qi Ma, Bao-Ming Zhou, Yong Liu, Chuan-Sheng Hu Schoo of Texties, Tianjin Poytechnic University, 399 West Binshui Road, Xiqing District, Tianjin, 300387, China E-mai: iuyong@tjpu.edu.cn Theoretica

More information

Automation of the Solution of Kakuro Puzzles

Automation of the Solution of Kakuro Puzzles Automation of the Soution of Kakuro Puzzes R. P. Davies, P. A. Roach, S. Perkins Department of Computing and Mathematica Sciences, University of Gamorgan, Pontypridd, CF37 1DL, United Kingdom, rpdavies@gam.ac.uk

More information

LBI Mobile Communications. EDACS TM Jessica. PBX Gateway. Operator s Manual

LBI Mobile Communications. EDACS TM Jessica. PBX Gateway. Operator s Manual Mobie Communications EDACS TM Jessica PBX Gateway Operator s Manua TABLE OF CONTENTS 1. SCOPE... 3 2. QUICK USAGE GUIDE... 4 2.1. Making Phone Cas From An EDACS Radio... 4 2.2. Caing EDACS Radios From

More information

DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION

DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION Undergraduate Research Opportunity Project (UROP ) DESIGN OF A DIPOLE ANTENNA USING COMPUTER SIMULATION Student: Nguyen, Tran Thanh Binh Schoo of Eectrica & Eectronic Engineering Nayang Technoogica University

More information

Capacity of Data Collection in Arbitrary Wireless Sensor Networks

Capacity of Data Collection in Arbitrary Wireless Sensor Networks This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. 1 Capacity of Data Coection in Arbitrary Wireess

More information

Analytical Modeling of Wi-Fi and LTE-LAA Coexistence: Throughput and Impact of Energy Detection Threshold

Analytical Modeling of Wi-Fi and LTE-LAA Coexistence: Throughput and Impact of Energy Detection Threshold Anaytica Modeing of Wi-Fi and LTE-LAA Coexistence: Throughput and Impact of Energy Detection Threshod Morteza Mehrnoush, Vanin Sathya, Sumit Roy, and Monisha Ghosh University of Washington, Seatte, WA-99

More information

Joint Spectrum Access and Pricing in Cognitive Radio Networks with Elastic Traffic

Joint Spectrum Access and Pricing in Cognitive Radio Networks with Elastic Traffic Joint Spectrum Access and Pricing in Cognitive Radio Networks with Eastic Traffic Joceyne Eias University of Bergamo E-mai: joceyne.eias@unibg.it Fabio Martignon University of Bergamo E-mai: fabio.martignon@unibg.it

More information

Georgia Institute of Technology. simulating the performance of a 32-bit interconnect bus. referenced to non-ideal planes. A transient simulation

Georgia Institute of Technology. simulating the performance of a 32-bit interconnect bus. referenced to non-ideal planes. A transient simulation Power ntegrity/signa ntegrity Co-Simuation for Fast Design Cosure Krishna Srinivasan1, Rohan Mandrekar2, Ege Engin3 and Madhavan Swaminathan4 Georgia nstitute of Technoogy 85 5th St NW, Atanta GA 30308

More information

Rectangular-shaped Inductive Proximity Sensor. website

Rectangular-shaped Inductive Proximity Sensor. website 785 Rectanguar-shaped Inductive Proximity Sensor SERIES Reated Information Genera terms and conditions... F-3 Gossary of terms... P.157~ guide... P.781~ Genera precautions... P.1579~ PHOTO PHOTO IGHT FOW

More information

Knowledge Representation and Reasoning in the Design of Composite Systems

Knowledge Representation and Reasoning in the Design of Composite Systems 470 IEEE TRANSACTIONS ON, SOFTWARE ENGINEERING, VOL. 18, NO. h, JUNE 1992 Knowedge Representation and Reasoning in the Design of Composite Systems Stephen Fickas and B. Robert Hem Abstract- Our interest

More information

Effect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels

Effect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels Internationa Journa of Appied Engineering Research ISSN 973-456 Voume 3, Number 5 (8) pp. 77-83 Research India Pubications. http://www.ripubication.com Effect of Estimation Error on Adaptive -MRC Receiver

More information

Joint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems

Joint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 0.09/ACCESS.07.70008,

More information

Information Theoretic Radar Waveform Design for Multiple Targets

Information Theoretic Radar Waveform Design for Multiple Targets 1 Information Theoretic Radar Waveform Design for Mutipe Targets Amir Leshem and Arye Nehorai Abstract In this paper we use information theoretic approach to design radar waveforms suitabe for simutaneousy

More information

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach Distributed Resource Aocation for Reay-Aided Device-to-Device Communication Under Channe Uncertainties: A Stabe Matching Approach Monowar Hasan, Student Member, IEEE, and Ekram Hossain, Feow, IEEE Abstract

More information

Dynamic downlink aggregation carrier scheduling scheme for wireless networks

Dynamic downlink aggregation carrier scheduling scheme for wireless networks Pubished in IET Communications Received on 2nd Apri 2013 Revised on 7th August 2013 Accepted on 6th September 2013 Dynamic downink aggregation carrier scheduing scheme for wireess networks Kan Zheng 1,

More information

NEW RISK ANALYSIS METHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE

NEW RISK ANALYSIS METHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE The 14 th Word Conference on Earthquake Engineering NEW RISK ANALYSIS ETHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE Satoru Nishikawa 1, Sei ichiro Fukushima 2 and Harumi Yashiro 3 ABSTRACT

More information

Copyright 2000 IEEE. IEEE Global Communications Conference (Globecom 2000), November 27 - December 1, 2000, San Francisco, California, USA

Copyright 2000 IEEE. IEEE Global Communications Conference (Globecom 2000), November 27 - December 1, 2000, San Francisco, California, USA Copyright 2000 EEE. EEE Goba Communications Conference (Gobecom 2000), November 27 - December 1, 2000, San Francisco, Caifornia, USA Persona use of this materia is permitted. owever, permission to reprint/repubish

More information

Provides exact fault location to one span

Provides exact fault location to one span TWS Mark VI Traveing wave faut ocator Provides exact faut ocation to one span Reduce down time by getting to the faut site faster Track intermittent sef cearing fauts and focus maintenance at the right

More information

Online, Artificial Intelligence-Based Turbine Generator Diagnostics

Online, Artificial Intelligence-Based Turbine Generator Diagnostics AI Magazine Voume 7 Number 4 (1986) ( AAAI) Robert L. Osborne, Ph. D Onine, Artificia Inteigence-Based Turbine Generator Diagnostics introduction The need for onine diagnostics in the eectric powergeneration

More information

Configuring RolandVersaWorks to print on your HEXIS media

Configuring RolandVersaWorks to print on your HEXIS media PRINTING DIVISION Product Buetin N 4 Configuring RoandVersaWorks to print on your HEXIS media 1. Instaing a media profie suitabe for your HEXIS printing media 1.1. Downoading the media profie 2 1.2. Importing

More information

Appendix A Rolling Average Algorithm

Appendix A Rolling Average Algorithm Appendix A Roing Average Agorith 98 ROLLING AVERAGE ALGORITHM Let be a ink between two reader fied sites with aributes th, the ink threshod for ink,, the current roing average trave tie for ink, and s,

More information

FAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM

FAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM FAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM by Wenchen Wang Bacheor of Engineering, Northeastern University, China 2013 M.S. in Computer Science, University of Pittsburgh, 2017

More information

A Heuristic Method for Bus Rapid Transit Planning Based on the Maximum Trip Service

A Heuristic Method for Bus Rapid Transit Planning Based on the Maximum Trip Service 0 0 A Heuristic Method for Bus Rapid Transit Panning Based on the Maximum Trip Service Zhong Wang Associate professor, Schoo of Transportation & Logistics Daian University of Technoogy No., Linggong Road,

More information

Sparse Beamforming Design for Network MIMO System with Per-Base-Station Backhaul Constraints

Sparse Beamforming Design for Network MIMO System with Per-Base-Station Backhaul Constraints Sparse Beamforming Design for Networ MIMO System with Per-Base-Station Bachau Constraints Binbin Dai and Wei Yu Department of Eectrica and Computer Engineering University of Toronto, Toronto, Ontario M5S

More information

Understanding The HA2500 Horizontal Output Load Test

Understanding The HA2500 Horizontal Output Load Test Understanding The HA2500 Horizonta Output Load Test Horizonta output stages are part of every CRT video dispay incuding cosed circuit monitors, computer monitors, video games, medica monitors, TVs. HDTVs,

More information

R is in the unit of ma/mw or A/W. For semiconductor detectors, the value is approximately, 0.5 ma/mw.

R is in the unit of ma/mw or A/W. For semiconductor detectors, the value is approximately, 0.5 ma/mw. Light Detection Conventiona methods for the detection of ight can be categorized into photo-synthesis, photographic pate, and photoeectric effect. Photo-synthesis and photographic pate are based on ight-induced

More information

LSTM TIME AND FREQUENCY RECURRENCE FOR AUTOMATIC SPEECH RECOGNITION

LSTM TIME AND FREQUENCY RECURRENCE FOR AUTOMATIC SPEECH RECOGNITION LSTM TIME AND FREQUENCY RECURRENCE FOR AUTOMATIC SPEECH RECOGNITION Jinyu Li, Abderahman Mohamed, Geoffrey Zweig, and Yifan Gong Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 { jinyi, asamir,

More information

On the Effectiveness of Sleep Modes in Backbone Networks with Limited Configurations

On the Effectiveness of Sleep Modes in Backbone Networks with Limited Configurations On the Effectiveness of Seep Modes in Backbone Networks with Limited Configurations Luca Chiaravigio, Antonio Cianfrani 2,3 ) Eectronics and Teecommunications Department, Poitecnico di Torino, Torino,

More information

LT1630/LT MHz, 10V/µs, Dual/Quad Rail-to-Rail Input and Output Precision Op Amps. Applications. Typical Application

LT1630/LT MHz, 10V/µs, Dual/Quad Rail-to-Rail Input and Output Precision Op Amps. Applications. Typical Application Features n Gain-Bandwidth Product: 3MHz n Sew Rate: V/µs n Low Suppy Current per Ampifier: 3.5mA n Input Common Mode Range Incudes Both Rais n Output Swings Rai-to-Rai n Input Offset Votage, Rai-to-Rai:

More information

ARTI: An Adaptive Radio Tomographic Imaging System

ARTI: An Adaptive Radio Tomographic Imaging System 1 ARTI: An Adaptive Radio Tomographic Imaging System Ossi Katiokaio, Riku Jäntti Senior Member, IEEE and Nea Patwari Member, IEEE Abstract Radio tomographic imaging systems use received signa strength

More information

On the meaning of computer models of robotenvironment

On the meaning of computer models of robotenvironment University of Woongong Research Onine Facuty of Informatics - Papers (Archive) Facuty of Engineering and Information Sciences 007 On the meaning of computer modes of robotenvironment interaction Urich

More information

2. Modified "Stevenson" Theory

2. Modified Stevenson Theory RADIO SCIENCE Vo. (New Series), No., January 966 Sots in Dieectricay Loaded Waveguide! R. W. Larson and V. M. Powers Radiation Laboratory, University of Michigan, Ann Arbor, Mich. (Received March, 965;

More information

Operation Guide

Operation Guide MO0907-EB Operation Guide 709 713 Getting Acquainted Congratuations upon your seection of this CASO watch. To get the most out of your purchase, be sure to read this manua carefuy. Expose the watch to

More information

Adaptive Bit and Power Allocation for Rate and Margin Maximization in V-BLAST System

Adaptive Bit and Power Allocation for Rate and Margin Maximization in V-BLAST System Revista Científica Periódica - Teecomunicações ISSN 56-338 Adaptive Bit and Power Aocation for Rate and argin aximization in V-BAST System Dror eiri and Irving Kaet Aeis Photonics, Netanya, Israe (emai:

More information

Dealing with Link Blockage in mmwave Networks: D2D Relaying or Multi-beam Reflection?

Dealing with Link Blockage in mmwave Networks: D2D Relaying or Multi-beam Reflection? Deaing with Lin Bocage in mmwave etwors: DD Reaying or Muti-beam Refection? Mingjie Feng, Shiwen Mao Dept. Eectrica & Computer Engineering Auburn University, Auburn, AL 36849-5, U.S.A. Tao Jiang Schoo

More information

CO-ORDINATE POSITION OF SENSOR IN MASS OF CUTTING TOOL

CO-ORDINATE POSITION OF SENSOR IN MASS OF CUTTING TOOL XIV Internationa PhD Worshop OWD 00 3 October 0 CO-ORDINATE POSITION OF SENSOR IN MASS OF CUTTING TOOL G. Tymchi I. Diorditsa S. Murahovsyy R. Tymchi Nationa Technica University of Uraine "Kiev Poytechnic

More information

Performance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2

Performance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2 ISSN 319-8885 Vo.3,Issue.39 November-14, Pages:7859-7863 www.ijsetr.com Performance Comparison of Cyco-stationary Detectors with Matched Fiter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 1 PG Schoar,

More information

Rectangular-shaped Inductive Proximity Sensor GX-F/H SERIES

Rectangular-shaped Inductive Proximity Sensor GX-F/H SERIES 87 PHOTO PHOTO IGHT FOW PARTICUAR Rectanguar-shaped Inductive Proximity Sensor SERIES Reated Information Genera terms and conditions... F-7 Gossary of terms... P.18~ Sensor seection guide... P.83~ Genera

More information

COMDIAL. Digital Telephone System Industry-Standard Telephone. User s Guide (Interfaced through the ATI-D)

COMDIAL. Digital Telephone System Industry-Standard Telephone. User s Guide (Interfaced through the ATI-D) COMDIAL Digita Teephone System Industry-Standard Teephone User s Guide (Interfaced through the ATI-D) This user s guide appies to Industry Standard Singe Line Teephones, such as the Comdia 2500-xx (when

More information

Optimum Fault Current Limiter Placement

Optimum Fault Current Limiter Placement Optimum aut urrent Limiter acement Jen-Hao Teng han-an Lu Abstract: Due to the difficuty in power network reinforcement and the interconnection of more distributed generations, faut current eve has become

More information

BER Performance Analysis of Cognitive Radio Physical Layer over Rayleigh fading Channel

BER Performance Analysis of Cognitive Radio Physical Layer over Rayleigh fading Channel Internationa Journa of Computer ppications (0975 8887) Voume 5 No.11, Juy 011 BER Performance naysis of Cognitive Radio Physica Layer over Rayeigh fading mandeep Kaur Virk Dr. B R mbedkar Nationa Institute

More information

A Sample-Decimation Based Fast Preamble Detection Algorithm

A Sample-Decimation Based Fast Preamble Detection Algorithm A Sampe-Decimation Based Fast Preambe Detection Agorithm Haining Zhang A Thesis in The Department of Eectrica and Computer Engineering Presented in Partia Fufiment of the Requirements for the Degree of

More information

Space-Time Focusing Transmission in Ultra-wideband Cooperative Relay Networks

Space-Time Focusing Transmission in Ultra-wideband Cooperative Relay Networks ICUWB 2009 (September 9-11, 2009) 1 Space-Time Focusing Transmission in Utra-wideband Cooperative Reay Networks Yafei Tian and Chenyang Yang Schoo of Eectronics and Information Engineering, Beihang University

More information

Rectangular-shaped Inductive Proximity Sensor.

Rectangular-shaped Inductive Proximity Sensor. 71 PHOTOEECTRIC PHOTOEECTRIC IGHT FOW PARTICUAR USE SIMPE MEASUREMENT STATIC CONTRO Rectanguar-shaped Inductive Proximity Sensor SERIES Reated Information Genera terms and conditions... F-17 Gossary of

More information

SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS

SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS A. Heiß Energie-AG (EAM), Kasse G. Bazer Darmstadt University of Technoogy O. Schmitt ABB Caor Emag Schatanagen, Mannheim B. Richter

More information