Secure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption
|
|
- Randell Elliott
- 5 years ago
- Views:
Transcription
1 Secure Power Schedulng Aucton for Smart Grds Usng Homomorphc Encrypton Haya Shajaah, Student Member, IEEE, Ahmed Abdelhad, Senor Member, IEEE, and Charles Clancy, Senor Member, IEEE Abstract In ths paper, we ntroduce a secure energy tradng aucton approach to schedule the power plant lmted resources durng peak hours tme slots. In the proposed aucton model, the power plant servng a power grd shares wth the smart meters ts avalable amount of resources that s expected durng the next future peak tme slot; smart meters expectng a demand for addtonal power durng future peak hours partcpate n the power aucton by submttng bds of ther offered prce for ther requested amount of power. In order to secure the power aucton and protect smart meters prvacy, homomorphc encrypton s used to secure the bddng values and ensure avodng possble nsncere behavors of smart meters or the grd operator (.e. the auctoneer) to manpulate the aucton for ther own benefts. We propose an effcent power schedulng mechansm to dstrbute the operator s lmted resources among smart meters partcpatng n the power aucton. Fnally, we present smulaton results for the performance of our secure power schedulng aucton mechansm. Index Terms Power Schedulng Aucton, Homomorphc Encrypton, Smart Grd I. INTRODUCTION Many power grds experence a faster grow n the consumpton of electrc power compared to the expanson rates of generaton unts. Therefore, mantanng a suffcent relablty of power grds durng peak tme perods has been gven sgnfcant attenton recently [1]. Demand response n smart grds s one of the promsng approaches to mprove power grds relablty. It controls the consumpton of electrc power by users durng peak tme perods and usually provdes lower overall costs. Prce based demand response s the most commonly used approach whch controls and manages users consumpton of electrc power by adoptng a day ahead [2], [3] or real tme [4], [5] desgns for electrcty prces. In ths paper we ntroduce a new secure electrc power management and prcng approach by desgnng a secure power schedulng aucton to schedule the power grd s lmted resources for future peak tme perods. We have focused on desgnng a power aucton that has the followng aucton s favorable economc propertes: ncentve compatble, Pareto effcent and ndvdual ratonal. An effcent aucton desgn needs to make sure that all bdders submt ther true evaluaton bddng values n order to ensure truthfulness n the power aucton. The proposed power aucton uses a payment method that s based on Vckrey-Clarke- Groves (VCG) aucton snce VCG s the only aucton that has proved to satsfy the above economc propertes whle maxmzng the auctoneer s revenue [6], [7]. Even though H. Shajaah, A. Abdelhad, and C. Clancy are wth the Hume Center for Natonal Securty and Technology, Vrgna Tech, Arlngton, VA, USA e-mal: {hayajs, aabdelhad, tcc}@vt.edu. Ths research s based upon work supported by the Natonal Scence Foundaton under Grant No VCG aucton has the aforementoned good propertes, t s vulnerable to back-room dealng between an nsncere auctoneer and greedy bdders who collude wth each other to manpulate the aucton for ther own benefts. For example, the auctoneer may carry out frauds when he overcharges the wnnng bdder f that bdder cannot verfy the actual submtted bds from other bdders. On the other hand, bd rggng occurs when the auctoneer shares the value of the wnnng bd wth certan bdder (a greedy bdder) so that the greedy bdder bds more than hs true evaluaton value to enable the auctoneer to ncrease hs revenue and share the spols wth the greedy bdder. Therefore, VCG aucton cannot be drectly used n the power aucton and provdng a secure power aucton desgn s becomng necessary. In order to ensure bdders prvacy and avod possble back room dealngs, a successful secure aucton desgn needs to enable the auctoneer to decde the wnners and ther chargng prce wthout knowng the bdders actual bds. In ths paper, we desgn a secure power schedulng aucton mechansm to schedule the power plant s lmted electrc power resources durng peak hours tme slots. The proposed mechansm allows the power grd operator to schedule hs expected future avalable resources to the smart grds and charge them for the scheduled resources. It provdes a framework for the power plant s operator, who plays the role of an auctoneer, to manage hs lmted resources effcently and securely. It uses homomorphc encrypton to ensure users prvacy and secure the power aucton whch s vulnerable to fraud of an nsncere auctoneer and bd rggng. II. SYSTEM MODEL AND DESIGN ASSUMPTIONS We consder a power grd consstng of K smart meters (SM)s, denoted n the set K = {1, 2,..., K}, that purchases electrc power from a power plant operator (grd operator). We consder the stuaton where a set of smart meters N = {1, 2,..., N}, N K, are nterested n purchasng addtonal amount of electrc power (n addton to ts regularly scheduled power) from the power plant operator to satsfy the demands of ther commercal or ndustral users durng the next peak hours tme slot. We express the power tradng mechansm by desgnng a secure power aucton. The grd operator plays the role of an auctoneer that auctons ts spare resources to bdders (.e. smart grds n N ). We assume that the grd operator s able to determne ts expected amount of spare resources (electrc power) denoted by R n KW that wll be avalable durng the next peak tme slot. The amount of resources R s dvded nto M electrc power unts (EPU)s. Let M = {1, 2,..., M} denotes the set of avalable EPUs to be auctoned by the grd operator to the N smart meters n the power grd. We assume
2 that the grd operator runs the power schedulng aucton for future peak hours tme slot durng whch a contngency wll occur. Each smart meter can bd for a sngle or multple EPUs from the set M based on ts demand. In the proposed power aucton model, we consder a secure gateway that plays the role of a mddleman between the auctoneer and the bdders. Fgure 1 shows a power grd that conssts of SMs, power plant and secure gateway. The secure gateway announces to the SMs the number of bdders as well as the number of auctoned EPUs. Once the smart meters receve these nformaton, the nterested smart meters submt ther bds (prce) to the auctoneer. Let A = {β 1, β 2,..., β A } be the set of all possble allocatons for the M EPUs that each SM bds for and A s the number of all possble allocatons. For example, n the case of M = {EPU1, EPU2} and N = {1, 2, 3}, then we have A = {β 1 = (2, 0, 0), β 2 = (0, 2, 0), β 3 = (0, 0, 2), β 4 = (1, 1, 0), β 5 = (1, 0, 1), β 6 = (0, 1, 1)}, e.g., β 1 = (2, 0, 0) denotes an allocaton where EPU1 and EPU2 are scheduled for bdder 1 and nothng s scheduled for bdder 2 and bdder 3. Each SM submts an encrypted bd for each allocatons n A where w = [w (β 1 ), w (β 2 ),...] represents the encrypted bds that bdder n N submts for the allocatons n A, e.g. w 2 = [0, 2, 0, 1, 0, 1] ndcates that SM 2 bds 0 for allocaton β 1, 2 for allocaton β 2, 0 for allocaton β 3, 1 for allocaton β 4, 0 for allocaton β 5 and 1 for allocaton β 6. It s assumed that each SM submts same bds for dfferent allocatons n A f the number of EPUs that corresponds to that SM n these allocatons s the same. The bddng values of each SM represent the prce of the EPUs that the SM s bddng for. Ths prce s traffc dependant [8];.e. ncreases when the demand for more EPUs s hgh. Let v (β) denotes the true evaluaton value (bddng prce) of SM for allocaton β and v = [v (β 1 ), v (β 2 ),...] be the true evaluaton vector for SM. Let p denotes the chargng prce of the auctoneer (grd operator) to SM for the scheduled EPUs. Then the utlty of SM s gven by u = v (β) p ;.e. the dfference between the true evaluaton value and the actual prce that the SM pays to the auctoneer for allocaton β. Furthermore, let Rev = =N =1 p represents the power plant s revenue from sellng the auctoned electrc power R. Provdng an effcent contngency management usng a secure power aucton provdes a far schedulng mechansm and helps the grd operator mprove ts proft. It s mportant to take nto consderaton that the grd operator (auctoneer) s prone to fraud. Therefore, an deal power aucton should prevent possble back room dealng by allowng the auctoneer to determne the wnners and ther payments whle the actual bddng values are kept secret from the auctoneer. III. DESIGN CONSIDERATIONS In ths secton, we dscuss some desred propertes that are taken nto consderaton n the proposed power schedulng aucton. Frst, we dscuss the payment rule that the auctoneer adopts to determne the chargng prce that the SMs pay for the scheduled EPUs. Then we dscuss the securty and prvacy challenges that need to be addressed n the aucton Fg. 1. Power grd that conssts of smart meters, power plant and secure gateway. desgn. Fnally, we provde some background on homomorphc encrypton. Smart Meter A. VCG Based Payment Rule As mentoned before, our goal s to desgn a power schedulng aucton that maxmzes the power plant revenue. Therefore, we adopt the payment rule of VCG aucton snce VCG aucton s proven to be Pareto effcent [9]. In order for a SM to maxmze ts utlty, t has to bd wth ts true evaluaton value regardless of the bddng strateges of other bdders [10]. In the proposed power aucton desgn, we use a payment rule that s based on VCG aucton mechansm [11] where each bdder s charged a prce that s equvalent to the dfference between the socal welfare wth and wthout that bdder s partcpaton n the aucton. Each SM submts ts encrypted bddng vector w for the allocaton set A. Let β A be a Pareto effcent allocaton that the auctoneer selects where β s defned as β = arg max β A w (β). (1) The auctoneer schedules the EPUs n M to the SMs n N based on allocaton β. Furthermore, when SM s not partcpatng n the aucton then the correspondng allocaton A s defned as β β = arg max β A w j (β). (2) The prce that SM s charged by the auctoneer for allocaton β s equvalent to p = j j w j (β ) j w j (β ). (3) Then the utlty of SM s u = v (β ) p. By usng the payment method expressed n equaton 3, the aucton has no postve transfers (.e. p 0 N and other desred economc propertes can be satsfed as mentoned before. B. Securty and Prvacy Consderatons One of the most mportant features of the proposed power schedulng aucton s provdng a suffcent level of securty n order to enable a relable and effcent schedulng of the auctoneer s resources. On the other hand, t s mportant to provde the SMs wth a suffcent level of prvacy by usng a cryptosystem that allows bdders to submt ther encrypted bddng values whle keepng the actual values unknown to
3 the auctoneer and other bdders n order to thwart backroom dealng such as bd-rggng between the bdders and the auctoneer and possble fraud of an nsncere auctoneer. Bd-rggng can occur f the nsncere auctoneer that s aware of the bdders actual bddng values colludes wth certan bdder, for the beneft of both, by sharng wth hm the bddng values of other bdders and manpulate the aucton. On the other hand, frauds of the nsncere auctoneer occurs f the auctoneer manpulates the chargng prce and overcharges the wnners n order to ncrease ts revenue whch results n a bad utltes for the wnners. Therefore, t s mportant for a power schedulng aucton to use a mechansm that allows the auctoneer to determne the maxmum bd wthout knowng the actual bddng values. C. Homomorphc Encrypton As mentoned before, homomorphc encrypton s adopted n our aucton desgn. Homomorphc encrypton s used when there s a requrement to perform certan operatons whle the nputs are not dsclosed. There are many schemes for homomorphc encrypton. In the proposed aucton desgn we adopt Paller cryptosystem [12], [13]. By usng Paller cryptosystem, the encrypton functon E(.) of plantexts x 1 and x 2 s addtvely homomorphc,.e. E(x 1 + x 2 ) = E(x 1 )E(x 2 ). Wth the ndstngushablty property of Paller cryptosystem, f a plantext x s encrypted twce the resultng two cyphertexts are dfferent from each other makng t not possble for anyone to dstngush ther orgnal plantexts unless decryptng the two cphertexts. In addton, wth the self blndng property of Paller cryptosystem, t s possble to compute dfferent cphertext E (x) from the cphertext E(x) wthout knowng the decrypton key of the plantext. IV. SECURE POWER SCHEDULING AUCTION MECHANISM Gven that the grd operator who plays the role of an auctoneer could be a prvate entty, the aucton s prone to fraud from an nsncere auctoneer. Therefore, preventng possble nsncere behavor from the auctoneer s essental. In order to enable an effcent secure schedulng process of the power plant s resources, t s mportant to desgn a secure power aucton that enables the power plant s operator to determne the wnners and the resource prce wthout knowng the orgnal bds. By makng the auctoneer only able to explot the wnners and ther payments, t s then not possble for hm to conduct bd-rggng or fraud. Once the power aucton s performed, the power plant s operator schedules each of the wnnng SMs for the correspondng EPUs and charges t for the scheduled resources. The proposed power aucton leverages homomorphc encrypton through Paller cryptosystem to provde a secure and honest aucton mechansm by avodng possble frauds and bd-rggng. The procedure of the proposed secure power aucton s presented n the followng steps: 1. The auctoneer generates a prvate and publc keys of Paller cryptosystem and shares hs publc key x (.e. x 0) wth the SMs n the power grd. 2. Each SM n N submts ts true evaluaton bddng values n w = v to a buffer that encrypts these values usng Paller cryptosystem and creates cphertexts. Let the bddng value w(β) of allocaton β be equvalent to m such that 1 m s where s s any number that s large enough to cover all possble bddng values for the allocaton of the EPUs. Let E(x) be the Paller encrypton of the publc key x 0, the buffer creates a vector of cphertexts e(m) for bddng value m where e(m) s gven by e(m) = (e 1,..., e s ) = (E(x),..., E(x), E(0),..., E(0) ). (4) }{{}}{{} m s m Furthermore, the auctoneer creates N +1 representng vectors E T = E(O), E 1 = E(O),...,E N = E(O) (.e. N s the number of bdders). The sze of E equals A and the ntal O(β) equals 0;.e. E(O) = {e(0), e(0),.., e(0)}. Each SM;.e. the j th SM n N keeps ts encrypted bddng vector w j secret by addng t to all representng vectors except E j. Once performng ths addton process by each SM n N, the auctoneer obtans E T = ( e(w (β 1 )),..., e(w (β A ))). (5) By applyng the homomorphc addton property, E T can be expressed as E T = (e( w (β 1 )),..., e( w (β A ))) = E( w ), (6) and the auctoneer also has E j = E( j w ) for (1 j N). 3. The secure gateway adds a random constant θ(β) = r to each of E T, E 1,..., E N to obtan E( w + θ) and E( j w + θ) j and sends them to the auctoneer. 4. The auctoneer determnes the maxmum sum value of the masked bds accordng to the followng equaton: k = max β A ( = max β A ( w (β) + θ(β)) w (β)) + r, where k can be determned by the auctoneer by takng the product of the encrypted values n E T, whch s equvalent to A n=1 e( N =1 w (β n )+r), and fndng the maxmum element n that product. 5. The auctoneer decrypts the k th element of each vector e( w (β) + θ(β)) n E T for all the allocatons n A. Its decrypted value wll be equvalent to zero or x. The allocaton that has a decrypton value equvalent to x,.e. β, s the one that maxmzes w. The auctoneer consders β to be the wnnng allocaton and schedules ts resources to the correspondng SMs accordng to β. 6. In order for the auctoneer to fnd ts chargng prce for each wnnng SM, the auctoneer decrypts e( z w (β ) + θ) of E z (.e. SM z s a wnnng one) and fnds the value ( z w (β ) + θ). The auctoneer then fnds the maxmum value of the product of the encrypted elements max β A ( z w (β) + r) = ( z w (α z) + r). (7)
4 The auctoneer calculates the chargng prce that each of the wnnng SMs needs to pay for the scheduled EPUs accordng to the followng equaton p z = ( z w (β z) + r) ( z w (β ) + r). (8) where SM z s a wnnng bdder that pays a prce p z for ts scheduled EPUs. Fgure 2 shows the procedure of the proposed secure power schedulng aucton. Auctoneer (Power Plant Operator) Power Plant Revenue SM 4 SM 3 SM 2 SM Number of EPUs Secure Gateway Fg. 3. The auctoneer s revenue for dfferent number of bdders wth the auctoned EPUs changng from 1 to Smart Meter (Bdder) Smart Meter (Bdder) Bdders (SMs) Satsfacton SM 4 SM 3 SM 2 SM Smart meters submt ther encrypted bddng vectors to the auctoneer Secure Power Aucton The Auctoneer runs a secure power aucton Each smart meter (bdder) s scheduled the power unts t won and charged the correspondng prce Number of EPUs Fg. 4. Bdders satsfacton wth the auctoned EPUs changng from 1 to 15. Fg. 2. Procedure of the proposed secure power schedulng aucton. V. SIMULATION RESULTS In ths secton, we present the performance of the proposed power schedulng aucton. Two performance metrcs are consdered: power plant s revenue and SMs satsfacton. Let W denotes the set of all wnnng SMs. The power plant s revenue s gven by Rev = W p (.e. the sum of all wnnng SMs chargng prces) and the SMs satsfacton s represented by the sum of all wnnng SMs utltes dvded by the sum of all SMs evaluaton values that s gven by W u / N v. We ran Monte Carlo Smulaton for dfferent number of SMs that are bddng for the auctoneer s resources and the results are averaged over the ndependent runs n whch the bddng values of the SMs are generated randomly and the two performance metrcs are evaluated. Smulaton results are represented for each of the four cases: N = 2 SMs (bdders), N = 3 SMs, N = 4 SMs and N = 5 SMs. Fgure 3 shows that the auctoneer s revenue ncreases when the number of SMs (bdders) ncreases. Ths s expected as the auctoneer s revenue ncreases wth more bdders requestng more resources. In Fgure 4, we show that the bdders satsfacton ncreases as the number of EPUs ncreases untl the bdders satsfacton saturates when each SM s assgned the number of EPUs t bds for. Fgure 4 also shows that for the same amount of the auctoneer s avalable resources R, the bdders satsfacton s hgher when there are less number of bdders partcpatng n the power aucton. VI. CONCLUSION In ths paper, we have proposed a secure power schedulng aucton that enables an effcent power schedulng mechansm to schedule the power plant s lmted resources durng peak hours tme slots. We have taken nto consderaton possble nsncere behavor of the auctoneer and desgned a power aucton that prevents possble frauds and bd-rggng between an nsncere auctoneer and greedy bdders. The proposed power aucton leverages homomorphc encrypton through Paller cryptosystem to keep the SMs bddng values unknown to the auctoneer whle the auctoneer s stll able to fnd the wnnng SMs. We showed through smulatons that the proposed power aucton provdes suffcent revenue for the power plant and satsfactory utltes for the SMs whle provdng a secure power schedulng aucton aganst possble back room dealngs. REFERENCES [1] P. Y, X. Dong, A. Iwayem, C. Zhou, and S. L, Real-tme opportunstc schedulng for resdental demand response, Smart Grd, IEEE Transactons on, vol. 4, pp , March [2] A.-H. Mohsenan-Rad, V. Wong, J. Jatskevch, R. Schober, and A. Leon-Garca, Autonomous demand-sde management based on game-theoretc energy consumpton schedulng for the future smart grd, Smart Grd, IEEE Transactons on, vol. 1, pp , Dec [3] C. Joe-Wong, S. Sen, S. Ha, and M. Chang, Optmzed day-ahead prcng for smart grds wth devce-specfc schedulng flexblty, Selected Areas n Communcatons, IEEE Journal on, vol. 30, pp , July [4] J. H. Yoon, R. Baldck, and A. Novoselac, Dynamc demand response controller based on real-tme retal prce for resdental buldngs, Smart Grd, IEEE Transactons on, vol. 5, pp , Jan 2014.
5 [5] S. L, D. Zhang, A. Roget, and Z. O Nell, Integratng home energy smulaton and dynamc electrcty prce for demand response study, Smart Grd, IEEE Transactons on, vol. 5, pp , March [6] R. Weber, Aucton Theory: By Vjay Krshna. Academc Press, 2002, Games and Economc Behavor, vol. 45, no. 2, pp , [7] T. Groves, Incentves n teams, Econometrca, vol. 41, p , [8] A. Abdel-Had and C. Clancy, A Robust Optmal Rate Allocaton Algorthm and Prcng Polcy for Hybrd Traffc n 4G-LTE, n PIMRC, [9] W. Vckrey, Counterspeculaton, Auctons and Compettve Sealed Tenders, Journal of Fnance, pp. 8 37, [10] A. Abdelhad, H. Shajaah, and C. Clancy, A multter wreless spectrum sharng system leveragng secure spectrum auctons, IEEE Transactons on Cogntve Communcatons and Networkng, vol. 1, pp , June [11] N. Nsan, T. Roughgarden, É. Tardos, and V. V. Vazran, Algorthmc Game Theory. New York, NY, USA: Cambrdge Unversty Press, [12] P. Paller, Publc-key cryptosystems based on composte degree resduosty classes, n Proceedngs of the 17th Internatonal Conference on Theory and Applcaton of Cryptographc Technques, EUROCRYPT 99, (Berln, Hedelberg), pp , Sprnger-Verlag, [13] P. Paller and D. Pontcheval, Effcent publc-key cryptosystems provably secure aganst actve adversares, n Advances n Cryptology - ASIACRYPT99 (K.-Y. Lam, E. Okamoto, and C. Xng, eds.), vol of Lecture Notes n Computer Scence, pp , Sprnger Berln Hedelberg, 1999.
An Application-Aware Spectrum Sharing Approach for Commercial Use of 3.5 GHz Spectrum
An Applcaton-Aware Spectrum Sharng Approach for Commercal Use of 3.5 GHz Spectrum Haya Shajaah, Ahmed Abdelhad and Charles Clancy Bradley Department of Electrcal and Computer Engneerng Hume Center, Vrgna
More informationA Strategy-Proof Combinatorial Heterogeneous Channel Auction Framework in Noncooperative Wireless Networks
Ths s the author s verson of an artcle that has been publshed n ths journal. Changes were made to ths verson by the publsher pror to publcaton. The fnal verson of record s avalable at http://dx.do.org/1.119/tmc.214.2343624
More informationEfficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques
The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department
More informationDynamic Pricing Approach for Spectrum Allocation in Wireless Networks with Selfish Users
Dynamc Prcng Approach for Spectrum Allocaton n Wreless Networks wth Selfsh Users Zhu J and K. J. Ray Lu Electrcal and Computer Engneerng Department and Insttute for Systems Research Unversty of Maryland,
More informationUtility-based Routing
Utlty-based Routng Je Wu Dept. of Computer and Informaton Scences Temple Unversty Roadmap Introducton Why Another Routng Scheme Utlty-Based Routng Implementatons Extensons Some Fnal Thoughts 2 . Introducton
More informationPerformance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme
Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,
More informationSpectrum Auction Framework for Access Allocation in Cognitive Radio Networks
Spectrum Aucton Framework for Access Allocaton n Cogntve Rado Networks ABSTRACT Gaurav S. Kasbekar Department of Electrcal and Systems Engneerng Unversty of Pennsylvana kgaurav@seas.upenn.edu Cogntve rado
More informationThe Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game
8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang
More informationSecure Transmission of Sensitive data using multiple channels
Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com
More informationRational Secret Sharing without Broadcast
Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept
More informationThe Security Correction of Large Consumers Long-Term Direct Power Trading Based on DC Power Transfer Distribution Factor
Energy and Power Engneerng, 07, 9, 365-375 http://www.scrp.org/ournal/epe ISSN Onlne: 947-388 ISSN Prnt: 949-43X The Securty Correcton of Large Consumers Long-Term Drect Power Tradng Based on DC Power
More informationThe Effect Of Phase-Shifting Transformer On Total Consumers Payments
Australan Journal of Basc and Appled Scences 5(: 854-85 0 ISSN -88 The Effect Of Phase-Shftng Transformer On Total Consumers Payments R. Jahan Mostafa Nck 3 H. Chahkand Nejad Islamc Azad Unversty Brjand
More informationChinese Remainder. Discrete Mathematics Andrei Bulatov
Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators
More informationIEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES
IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department
More informationPriority based Dynamic Multiple Robot Path Planning
2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna
More informationComparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate
Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com
More informationDynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University
Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout
More informationPRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht
68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly
More informationChallenges and Opportunities in Large-Scale Deployment of Automated Energy Consumption Scheduling Systems in Smart Grids
Challenges and Opportuntes n Large-Scale Deployment of Automated Energy Consumpton Schedulng Systems n Smart Grds Hossen Akhavan-Hejaz, Zahra Baharloue, and Hamed Mohsenan-Rad Department of Electrcal Engneerng,
More informationUncertainty in measurements of power and energy on power networks
Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:
More informationChaotic Filter Bank for Computer Cryptography
Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College
More informationTo: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel
To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,
More informationLow Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages
Low Swtchng Frequency Actve Harmonc Elmnaton n Multlevel Converters wth Unequal DC Voltages Zhong Du,, Leon M. Tolbert, John N. Chasson, Hu L The Unversty of Tennessee Electrcal and Computer Engneerng
More informationResource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks
Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty
More informationHigh Speed, Low Power And Area Efficient Carry-Select Adder
Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs
More informationA Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web
A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,
More informationAn Efficient and Flexible Decentralized Multicast Key Distribution Scheme
IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL. 6 No. 8B August 006 11 An Effcent and Flexble Decentralzed Multcast Key Dstrbuton Scheme Wen-Shenq Juang and Jyan-Cwan Wu Department
More informationRESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING
RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING Vaslos A. Srs Insttute of Computer Scence (ICS), FORTH and Department of Computer Scence, Unversty of Crete P.O. Box 385, GR 7 Heraklon, Crete,
More informationTest 2. ECON3161, Game Theory. Tuesday, November 6 th
Test 2 ECON36, Game Theory Tuesday, November 6 th Drectons: Answer each queston completely. If you cannot determne the answer, explanng how you would arrve at the answer may earn you some ponts.. (20 ponts)
More informationEMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru.
student fnance wales cylld myfyrwyr cymru Educaton Mantenance Allowance (EMA) Fnancal Detals Form 2017/18 sound advce on STUDENT FINANCE EMA Educaton Mantenance Allowance (EMA) 2017/18 /A How to complete
More informationA Game Theoretic Approach for Distributed Resource Allocation and Orchestration of Softwarized Networks
A Game Theoretc Approach for Dstrbuted Resource Allocaton and Orchestraton of Softwarzed Networks Salvatore D Oro, Laura Gallucco, Member, IEEE, Sergo Palazzo, Senor Member, IEEE, Govann Schembra Abstract
More informationA Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)
A Novel Optmzaton of the Dstance Source Routng (DSR) Protocol for the Moble Ad Hoc Networs (MANET) Syed S. Rzv 1, Majd A. Jafr, and Khaled Ellethy Computer Scence and Engneerng Department Unversty of Brdgeport
More informationDistributed Relay Selection and Power Allocation Using Stackelberg and Auction Games in Multi-user Multi-relay Networks
ensors & Transducers 013 by IFA http://www.sensorsportal.com Dstrbuted Relay electon and Power Allocaton Usng tackelberg and Aucton Games n Mult-user Mult-relay Networks Erqng ZHANG xng YIN Lang YIN hufang
More informationResearch of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b
2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng
More informationAuction-based Resource Allocation in UMTS High Speed Downlink Packet Access (HSDPA)
Aucton-based Resource Allocaton n UMTS Hgh Speed Downlnk Packet Access (HSDPA) Manos Dramtnos, George D. Stamouls and Costas Courcoubets Network Economcs and Servces Group (N.E.S.), Department of Informatcs,
More informationA NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems
0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of
More informationPrevention of Sequential Message Loss in CAN Systems
Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar
More informationGeneralized Incomplete Trojan-Type Designs with Unequal Cell Sizes
Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,
More informationCalculation of the received voltage due to the radiation from multiple co-frequency sources
Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons
More informationA Benchmark for D2D in Cellular Networks: The Importance of Information
A Benchmark for D2D n Cellular Networks: The Importance of Informaton Yğt Özcan, Catherne Rosenberg Unversty of Waterloo {yozcan,cath}@uwaterloo.ca Fabrce Gullemn Orange Labs, France fabrce.gullemn@orange.com
More informationJoint Adaptive Modulation and Power Allocation in Cognitive Radio Networks
I. J. Communcatons, etwork and System Scences, 8, 3, 7-83 Publshed Onlne August 8 n ScRes (http://www.scrp.org/journal/jcns/). Jont Adaptve Modulaton and Power Allocaton n Cogntve Rado etworks Dong LI,
More informationA TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS
A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS Pedro Godnho and oana Das Faculdade de Economa and GEMF Unversdade de Combra Av. Das da Slva 65 3004-5
More informationWalsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter
Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957
More informationAccepted Manuscript. Real-time pricing scheme based on Stackelberg game in smart grid with multiple power retailers
Accepted Manuscrpt Real-tme prcng scheme based on Stacelberg game n smart grd wth multple power retalers Yemng Da Yan Gao Hongwe Gao Hongbo Zhu PII: S0925-2312(17)30697-5 DOI: 10.1016/.neucom.2017.04.027
More informationDistributed Uplink Scheduling in EV-DO Rev. A Networks
Dstrbuted Uplnk Schedulng n EV-DO ev. A Networks Ashwn Srdharan (Sprnt Nextel) amesh Subbaraman, och Guérn (ESE, Unversty of Pennsylvana) Overvew of Problem Most modern wreless systems Delver hgh performance
More informationParameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation
1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected
More informationANNUAL OF NAVIGATION 11/2006
ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton
More informationStudy of Downlink Radio Resource Allocation Scheme with Interference Coordination in LTE A Network
Internatonal Journal of Future Computer and Communcaton, Vol. 6, o. 3, September 2017 Study of Downln Rado Resource Allocaton Scheme wth Interference Coordnaton n LTE A etwor Yen-Wen Chen and Chen-Ju Chen
More informationIncentivize Cooperative Sensing in Distributed Cognitive Radio Networks with Reputation-based Pricing
Incentvze Cooperatve Sensng n Dstrbuted Cogntve Rado Networs wth Reputaton-based Prcng Tongje Zhang, Zongpeng L, Rehaneh Safav-Nan Department of Computer Scence, Unversty of Calgary {tozhang, zongpeng,
More informationResearch on Controller of Micro-hydro Power System Nan XIE 1,a, Dezhi QI 2,b,Weimin CHEN 2,c, Wei WANG 2,d
Advanced Materals Research Submtted: 2014-05-13 ISSN: 1662-8985, Vols. 986-987, pp 1121-1124 Accepted: 2014-05-19 do:10.4028/www.scentfc.net/amr.986-987.1121 Onlne: 2014-07-18 2014 Trans Tech Publcatons,
More informationJoint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding
Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent
More informationAdaptive Modulation and Coding for Utility Enhancement in VMIMO WSN Using Game Theory
Adaptve Modulaton and Codng for Utlty nhancement n VMIMO WSN Usng Game Theory R. Vall and P. Dananjayan mparments. The data transmtted from the sensor nodes s hghly susceptble to error n a wreless envronment
More informationsensors ISSN by MDPI
Sensors 2007, 7, 628-648 Full Paper sensors ISSN 1424-8220 2007 by MDPI www.mdp.org/sensors Dstrbuted Partcle Swarm Optmzaton and Smulated Annealng for Energy-effcent Coverage n Wreless Sensor Networks
More informationThroughput Maximization by Adaptive Threshold Adjustment for AMC Systems
APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal
More informationResource Control for Elastic Traffic in CDMA Networks
Resource Control for Elastc Traffc n CDMA Networks Vaslos A. Srs Insttute of Computer Scence, FORTH Crete, Greece vsrs@cs.forth.gr ACM MobCom 2002 Sep. 23-28, 2002, Atlanta, U.S.A. Funded n part by BTexact
More informationOptimal Sizing and Allocation of Residential Photovoltaic Panels in a Distribution Network for Ancillary Services Application
Optmal Szng and Allocaton of Resdental Photovoltac Panels n a Dstrbuton Networ for Ancllary Servces Applcaton Reza Ahmad Kordhel, Student Member, IEEE, S. Al Pourmousav, Student Member, IEEE, Jayarshnan
More informationDistributed Interference Alignment in Cognitive Radio Networks
Dstrbuted Interference Algnment n Cogntve Rado Networks Y Xu and Shwen Mao Department of Electrcal and Computer Engneerng, Auburn Unversty, Auburn, AL, USA Abstract In ths paper, we nvestgate the problem
More informationQoS Provisioning in Wireless Data Networks under Non-Continuously Backlogged Users
os Provsonng n Wreless Data Networks under Non-Contnuously Backlogged Users Tmotheos Kastrnoganns, and Symeon Papavasslou, Member, IEEE School of Electrcal and Computer Engneerng Natonal Techncal Unversty
More informationREAL-TIME SCHEDULING IN LTE FOR SMART GRIDS. Yuzhe Xu, Carlo Fischione
REAL-TIME SCHEDULING IN LTE FOR SMART GRIDS Yuzhe Xu, Carlo Fschone Automatc Control Lab KTH, Royal Insttue of Technology 1-44, Stockholm, Sweden Emal: yuzhe@kth.se, carlof@kth.se ABSTRACT The latest wreless
More informationThe Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System
Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng
More informationUplink User Selection Scheme for Multiuser MIMO Systems in a Multicell Environment
Uplnk User Selecton Scheme for Multuser MIMO Systems n a Multcell Envronment Byong Ok Lee School of Electrcal Engneerng and Computer Scence and INMC Seoul Natonal Unversty leebo@moble.snu.ac.kr Oh-Soon
More informationQueuing-Based Dynamic Channel Selection for Heterogeneous Multimedia Applications over Cognitive Radio Networks
1 Queung-Based Dynamc Channel Selecton for Heterogeneous ultmeda Applcatons over Cogntve Rado Networks Hsen-Po Shang and haela van der Schaar Department of Electrcal Engneerng (EE), Unversty of Calforna
More informationIntelligent Wakening Scheme for Wireless Sensor Networks Surveillance
The Frst Internatonal Workshop on Cyber-Physcal Networkng Systems Intellgent Wakenng Scheme for Wreless Sensor Networks Survellance Ru Wang, Le Zhang, L Cu Insttute of Computng Technology of the Chnese
More informationNon-collaborative Resource Management for Wireless Multimedia Applications Using Mechanism Design
Non-collaboratve Resource Management for Wreless Multmeda Applcatons Usng Mechansm Desgn Fangwen Fu and Mhaela van der Schaar Eleccal Engneerng Department, Unversty of Calforna, Los Angeles (UCLA) 1 ABSTRACT
More informationantenna antenna (4.139)
.6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,
More informationD-STATCOM Optimal Allocation Based On Investment Decision Theory
Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 2016) D-STATCOM Optmal Allocaton Based On Investment Decson Theory Yongjun Zhang1, a, Yfu Mo1, b and Huazhen
More informationTODAY S wireless networks are characterized as a static
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 2, FEBRUARY 2011 161 A Spectrum Decson Framework for Cogntve Rado Networks Won-Yeol Lee, Student Member, IEEE, and Ian F. Akyldz, Fellow, IEEE Abstract
More informationFall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes
5-95 Fall 08 # Games and Nmbers A. Game 0.5 seconds, 64 megabytes There s a legend n the IT Cty college. A student that faled to answer all questons on the game theory exam s gven one more chance by hs
More informationMicro-grid Inverter Parallel Droop Control Method for Improving Dynamic Properties and the Effect of Power Sharing
2015 AASRI Internatonal Conference on Industral Electroncs and Applcatons (IEA 2015) Mcro-grd Inverter Parallel Droop Control Method for Improvng Dynamc Propertes and the Effect of Power Sharng aohong
More informationASFALT: Ā S imple F āult-tolerant Signature-based L ocalization T echnique for Emergency Sensor Networks
ASFALT: Ā S mple F āult-tolerant Sgnature-based L ocalzaton T echnque for Emergency Sensor Networks Murtuza Jadlwala, Shambhu Upadhyaya and Mank Taneja State Unversty of New York at Buffalo Department
More informationHUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1
Project Ttle Date Submtted IEEE 802.16 Broadband Wreless Access Workng Group Double-Stage DL MU-MIMO Scheme 2008-05-05 Source(s) Yang Tang, Young Hoon Kwon, Yajun Kou, Shahab Sanaye,
More informationGustavus J. Simmons Sandia National Laboratories Albuquerque, NM 87185
An Impersonaton-Proof Identty Verfcaton Scheme* Gustavus J. Smmons Sanda Natonal Laboratores Albuquerque, NM 87185 Most schemes for the verfcaton of personal dentty are logcally flawed n that they requre
More informationA Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks
74 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 3, No., Aprl 0 A Fuzzy-based Routng Strategy for Multhop Cogntve Rado Networks Al El Masr, Naceur Malouch and Hcham
More informationFull-duplex Relaying for D2D Communication in mmwave based 5G Networks
Full-duplex Relayng for D2D Communcaton n mmwave based 5G Networks Boang Ma Hamed Shah-Mansour Member IEEE and Vncent W.S. Wong Fellow IEEE Abstract Devce-to-devce D2D communcaton whch can offload data
More informationEnergy-efficient Subcarrier Allocation in SC-FDMA Wireless Networks based on Multilateral Model of Bargaining
etworkng 03 569707 Energy-effcent Subcarrer Allocaton n SC-FDMA Wreless etworks based on Multlateral Model of Barganng Ern Elen Tsropoulou Aggelos Kapoukaks and Symeon apavasslou School of Electrcal and
More informationSelective Sensing and Transmission for Multi-Channel Cognitive Radio Networks
IEEE INFOCOM 2 Workshop On Cogntve & Cooperatve Networks Selectve Sensng and Transmsson for Mult-Channel Cogntve Rado Networks You Xu, Yunzhou L, Yfe Zhao, Hongxng Zou and Athanasos V. Vaslakos Insttute
More informationproblems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance
palette of problems Davd Rock and Mary K. Porter 1. If n represents an nteger, whch of the followng expressons yelds the greatest value? n,, n, n, n n. A 60-watt lghtbulb s used for 95 hours before t burns
More informationAn Engineering Approach to Monitoring Market Power in Restructured Markets for Electricity
An Engneerng Approach to Montorng Market Power n Restructured Markets for Electrcty C.E. Murllo-Sanchez, S.M. Ede, T.D. Mount, R.J. Thomas, and R.D. Zmmerman Cornell Unversty and PSERC Abstract The hgh
More informationTHE GENERATION OF 400 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES *
SLAC PUB 874 3/1999 THE GENERATION OF 4 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES * Sam G. Tantaw, Arnold E. Vleks, and Rod J. Loewen Stanford Lnear Accelerator Center, Stanford Unversty P.O. Box
More informationExploiting Dynamic Workload Variation in Low Energy Preemptive Task Scheduling
Explotng Dynamc Worload Varaton n Low Energy Preemptve Tas Schedulng Lap-Fa Leung, Ch-Yng Tsu Department of Electrcal and Electronc Engneerng Hong Kong Unversty of Scence and Technology Clear Water Bay,
More informationOptimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation
T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and
More informationA Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results
AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of
More informationControl of Chaos in Positive Output Luo Converter by means of Time Delay Feedback
Control of Chaos n Postve Output Luo Converter by means of Tme Delay Feedback Nagulapat nkran.ped@gmal.com Abstract Faster development n Dc to Dc converter technques are undergong very drastc changes due
More informationA Predictive QoS Control Strategy for Wireless Sensor Networks
The 1st Worshop on Resource Provsonng and Management n Sensor Networs (RPMSN '5) n conjuncton wth the 2nd IEEE MASS, Washngton, DC, Nov. 25 A Predctve QoS Control Strategy for Wreless Sensor Networs Byu
More informationA Mathematical Model for Restoration Problem in Smart Grids Incorporating Load Shedding Concept
J. Appl. Envron. Bol. Sc., 5(1)20-27, 2015 2015, TextRoad Publcaton ISSN: 2090-4274 Journal of Appled Envronmental and Bologcal Scences www.textroad.com A Mathematcal Model for Restoraton Problem n Smart
More informationChapter 2 Two-Degree-of-Freedom PID Controllers Structures
Chapter 2 Two-Degree-of-Freedom PID Controllers Structures As n most of the exstng ndustral process control applcatons, the desred value of the controlled varable, or set-pont, normally remans constant
More informationGuidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014
Gudelnes for CCPR and RMO Blateral Key Comparsons CCPR Workng Group on Key Comparson CCPR-G5 October 10 th, 2014 These gudelnes are prepared by CCPR WG-KC and RMO P&R representatves, and approved by CCPR,
More informationMultiband Jamming Strategies with Minimum Rate Constraints
Multband Jammng Strateges wth Mnmum Rate Constrants Karm Banawan, Sennur Ulukus, Peng Wang, and Bran Henz Department of Electrcal and Computer Engneerng, Unversty of Maryland, College Park, MD 7 US Army
More informationQuantifying Content Consistency Improvements Through Opportunistic Contacts
Unversty of Pennsylvana ScholarlyCommons Departmental Papers (ESE) Department of Electrcal & Systems Engneerng 8-12-29 Quantfyng Content Consstency Improvements Through Opportunstc Contacts Kn-Wah Kwong
More informationResearch Article elighthouse: Enhance Solar Power Coverage in Renewable Sensor Networks
Hndaw Publshng Corporaton Internatonal Journal of Dstrbuted Sensor Networks Volume 213, Artcle ID 256569, 16 pages http://dx.do.org/1.1155/213/256569 Research Artcle elghthouse: Enhance Solar Power Coverage
More informationKeywords LTE, Uplink, Power Control, Fractional Power Control.
Volume 3, Issue 6, June 2013 ISSN: 2277 128X Internatonal Journal of Advanced Research n Computer Scence and Software Engneerng Research Paper Avalable onlne at: www.jarcsse.com Uplnk Power Control Schemes
More informationTraffic balancing over licensed and unlicensed bands in heterogeneous networks
Correspondence letter Traffc balancng over lcensed and unlcensed bands n heterogeneous networks LI Zhen, CUI Qme, CUI Zhyan, ZHENG We Natonal Engneerng Laboratory for Moble Network Securty, Bejng Unversty
More informationAN IMPROVED BIT LOADING TECHNIQUE FOR ENHANCED ENERGY EFFICIENCY IN NEXT GENERATION VOICE/VIDEO APPLICATIONS
Journal of Engneerng Scence and Technology Vol., o. 4 (6) 476-495 School of Engneerng, Taylor s Unversty A IMPROVED BIT LOADIG TECHIQUE FOR EHACED EERGY EFFICIECY I EXT GEERATIO VOICE/VIDEO APPLICATIOS
More informationChapter 2 Basics of Efficient Secure Function Evaluation
Chapter 2 Bascs of Effcent Secure Functon Evaluaton 2.1 Common Notaton and Defntons In ths secton we ntroduce common notaton (Sect. 2.1.1), cryptographc prmtves (Sect. 2.1.2), functon representatons (Sect.
More informationDynamic Lightpath Protection in WDM Mesh Networks under Wavelength Continuity Constraint
Dynamc Lghtpath Protecton n WDM Mesh etworks under Wavelength Contnuty Constrant Shengl Yuan* and Jason P. Jue *Department of Computer and Mathematcal Scences, Unversty of Houston Downtown One Man Street,
More informationOpportunistic Beamforming for Finite Horizon Multicast
Opportunstc Beamformng for Fnte Horzon Multcast Gek Hong Sm, Joerg Wdmer, and Balaj Rengarajan allyson.sm@mdea.org, joerg.wdmer@mdea.org, and balaj.rengarajan@gmal.com Insttute IMDEA Networks, Madrd, Span
More informationRejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan
More informationTECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf
TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to
More informationTile Values of Information in Some Nonzero Sum Games
lnt. ournal of Game Theory, Vot. 6, ssue 4, page 221-229. Physca- Verlag, Venna. Tle Values of Informaton n Some Nonzero Sum Games By P. Levne, Pars I ), and ZP, Ponssard, Pars 2 ) Abstract: The paper
More informationPerformance Analysis of Scheduling Policies for Delay-Tolerant Applications in Centralized Wireless Networks
Performance Analyss of Schedulng Polces for Delay-Tolerant Applcatons n Centralzed Wreless Networks Mohamed Shaqfeh and Norbert Goertz Insttute for Dgtal Communcatons Jont Research Insttute for Sgnal &
More information