Secure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption

Size: px
Start display at page:

Download "Secure Power Scheduling Auction for Smart Grids Using Homomorphic Encryption"

Transcription

1 Secure Power Schedulng Aucton for Smart Grds Usng Homomorphc Encrypton Haya Shajaah, Student Member, IEEE, Ahmed Abdelhad, Senor Member, IEEE, and Charles Clancy, Senor Member, IEEE Abstract In ths paper, we ntroduce a secure energy tradng aucton approach to schedule the power plant lmted resources durng peak hours tme slots. In the proposed aucton model, the power plant servng a power grd shares wth the smart meters ts avalable amount of resources that s expected durng the next future peak tme slot; smart meters expectng a demand for addtonal power durng future peak hours partcpate n the power aucton by submttng bds of ther offered prce for ther requested amount of power. In order to secure the power aucton and protect smart meters prvacy, homomorphc encrypton s used to secure the bddng values and ensure avodng possble nsncere behavors of smart meters or the grd operator (.e. the auctoneer) to manpulate the aucton for ther own benefts. We propose an effcent power schedulng mechansm to dstrbute the operator s lmted resources among smart meters partcpatng n the power aucton. Fnally, we present smulaton results for the performance of our secure power schedulng aucton mechansm. Index Terms Power Schedulng Aucton, Homomorphc Encrypton, Smart Grd I. INTRODUCTION Many power grds experence a faster grow n the consumpton of electrc power compared to the expanson rates of generaton unts. Therefore, mantanng a suffcent relablty of power grds durng peak tme perods has been gven sgnfcant attenton recently [1]. Demand response n smart grds s one of the promsng approaches to mprove power grds relablty. It controls the consumpton of electrc power by users durng peak tme perods and usually provdes lower overall costs. Prce based demand response s the most commonly used approach whch controls and manages users consumpton of electrc power by adoptng a day ahead [2], [3] or real tme [4], [5] desgns for electrcty prces. In ths paper we ntroduce a new secure electrc power management and prcng approach by desgnng a secure power schedulng aucton to schedule the power grd s lmted resources for future peak tme perods. We have focused on desgnng a power aucton that has the followng aucton s favorable economc propertes: ncentve compatble, Pareto effcent and ndvdual ratonal. An effcent aucton desgn needs to make sure that all bdders submt ther true evaluaton bddng values n order to ensure truthfulness n the power aucton. The proposed power aucton uses a payment method that s based on Vckrey-Clarke- Groves (VCG) aucton snce VCG s the only aucton that has proved to satsfy the above economc propertes whle maxmzng the auctoneer s revenue [6], [7]. Even though H. Shajaah, A. Abdelhad, and C. Clancy are wth the Hume Center for Natonal Securty and Technology, Vrgna Tech, Arlngton, VA, USA e-mal: {hayajs, aabdelhad, tcc}@vt.edu. Ths research s based upon work supported by the Natonal Scence Foundaton under Grant No VCG aucton has the aforementoned good propertes, t s vulnerable to back-room dealng between an nsncere auctoneer and greedy bdders who collude wth each other to manpulate the aucton for ther own benefts. For example, the auctoneer may carry out frauds when he overcharges the wnnng bdder f that bdder cannot verfy the actual submtted bds from other bdders. On the other hand, bd rggng occurs when the auctoneer shares the value of the wnnng bd wth certan bdder (a greedy bdder) so that the greedy bdder bds more than hs true evaluaton value to enable the auctoneer to ncrease hs revenue and share the spols wth the greedy bdder. Therefore, VCG aucton cannot be drectly used n the power aucton and provdng a secure power aucton desgn s becomng necessary. In order to ensure bdders prvacy and avod possble back room dealngs, a successful secure aucton desgn needs to enable the auctoneer to decde the wnners and ther chargng prce wthout knowng the bdders actual bds. In ths paper, we desgn a secure power schedulng aucton mechansm to schedule the power plant s lmted electrc power resources durng peak hours tme slots. The proposed mechansm allows the power grd operator to schedule hs expected future avalable resources to the smart grds and charge them for the scheduled resources. It provdes a framework for the power plant s operator, who plays the role of an auctoneer, to manage hs lmted resources effcently and securely. It uses homomorphc encrypton to ensure users prvacy and secure the power aucton whch s vulnerable to fraud of an nsncere auctoneer and bd rggng. II. SYSTEM MODEL AND DESIGN ASSUMPTIONS We consder a power grd consstng of K smart meters (SM)s, denoted n the set K = {1, 2,..., K}, that purchases electrc power from a power plant operator (grd operator). We consder the stuaton where a set of smart meters N = {1, 2,..., N}, N K, are nterested n purchasng addtonal amount of electrc power (n addton to ts regularly scheduled power) from the power plant operator to satsfy the demands of ther commercal or ndustral users durng the next peak hours tme slot. We express the power tradng mechansm by desgnng a secure power aucton. The grd operator plays the role of an auctoneer that auctons ts spare resources to bdders (.e. smart grds n N ). We assume that the grd operator s able to determne ts expected amount of spare resources (electrc power) denoted by R n KW that wll be avalable durng the next peak tme slot. The amount of resources R s dvded nto M electrc power unts (EPU)s. Let M = {1, 2,..., M} denotes the set of avalable EPUs to be auctoned by the grd operator to the N smart meters n the power grd. We assume

2 that the grd operator runs the power schedulng aucton for future peak hours tme slot durng whch a contngency wll occur. Each smart meter can bd for a sngle or multple EPUs from the set M based on ts demand. In the proposed power aucton model, we consder a secure gateway that plays the role of a mddleman between the auctoneer and the bdders. Fgure 1 shows a power grd that conssts of SMs, power plant and secure gateway. The secure gateway announces to the SMs the number of bdders as well as the number of auctoned EPUs. Once the smart meters receve these nformaton, the nterested smart meters submt ther bds (prce) to the auctoneer. Let A = {β 1, β 2,..., β A } be the set of all possble allocatons for the M EPUs that each SM bds for and A s the number of all possble allocatons. For example, n the case of M = {EPU1, EPU2} and N = {1, 2, 3}, then we have A = {β 1 = (2, 0, 0), β 2 = (0, 2, 0), β 3 = (0, 0, 2), β 4 = (1, 1, 0), β 5 = (1, 0, 1), β 6 = (0, 1, 1)}, e.g., β 1 = (2, 0, 0) denotes an allocaton where EPU1 and EPU2 are scheduled for bdder 1 and nothng s scheduled for bdder 2 and bdder 3. Each SM submts an encrypted bd for each allocatons n A where w = [w (β 1 ), w (β 2 ),...] represents the encrypted bds that bdder n N submts for the allocatons n A, e.g. w 2 = [0, 2, 0, 1, 0, 1] ndcates that SM 2 bds 0 for allocaton β 1, 2 for allocaton β 2, 0 for allocaton β 3, 1 for allocaton β 4, 0 for allocaton β 5 and 1 for allocaton β 6. It s assumed that each SM submts same bds for dfferent allocatons n A f the number of EPUs that corresponds to that SM n these allocatons s the same. The bddng values of each SM represent the prce of the EPUs that the SM s bddng for. Ths prce s traffc dependant [8];.e. ncreases when the demand for more EPUs s hgh. Let v (β) denotes the true evaluaton value (bddng prce) of SM for allocaton β and v = [v (β 1 ), v (β 2 ),...] be the true evaluaton vector for SM. Let p denotes the chargng prce of the auctoneer (grd operator) to SM for the scheduled EPUs. Then the utlty of SM s gven by u = v (β) p ;.e. the dfference between the true evaluaton value and the actual prce that the SM pays to the auctoneer for allocaton β. Furthermore, let Rev = =N =1 p represents the power plant s revenue from sellng the auctoned electrc power R. Provdng an effcent contngency management usng a secure power aucton provdes a far schedulng mechansm and helps the grd operator mprove ts proft. It s mportant to take nto consderaton that the grd operator (auctoneer) s prone to fraud. Therefore, an deal power aucton should prevent possble back room dealng by allowng the auctoneer to determne the wnners and ther payments whle the actual bddng values are kept secret from the auctoneer. III. DESIGN CONSIDERATIONS In ths secton, we dscuss some desred propertes that are taken nto consderaton n the proposed power schedulng aucton. Frst, we dscuss the payment rule that the auctoneer adopts to determne the chargng prce that the SMs pay for the scheduled EPUs. Then we dscuss the securty and prvacy challenges that need to be addressed n the aucton Fg. 1. Power grd that conssts of smart meters, power plant and secure gateway. desgn. Fnally, we provde some background on homomorphc encrypton. Smart Meter A. VCG Based Payment Rule As mentoned before, our goal s to desgn a power schedulng aucton that maxmzes the power plant revenue. Therefore, we adopt the payment rule of VCG aucton snce VCG aucton s proven to be Pareto effcent [9]. In order for a SM to maxmze ts utlty, t has to bd wth ts true evaluaton value regardless of the bddng strateges of other bdders [10]. In the proposed power aucton desgn, we use a payment rule that s based on VCG aucton mechansm [11] where each bdder s charged a prce that s equvalent to the dfference between the socal welfare wth and wthout that bdder s partcpaton n the aucton. Each SM submts ts encrypted bddng vector w for the allocaton set A. Let β A be a Pareto effcent allocaton that the auctoneer selects where β s defned as β = arg max β A w (β). (1) The auctoneer schedules the EPUs n M to the SMs n N based on allocaton β. Furthermore, when SM s not partcpatng n the aucton then the correspondng allocaton A s defned as β β = arg max β A w j (β). (2) The prce that SM s charged by the auctoneer for allocaton β s equvalent to p = j j w j (β ) j w j (β ). (3) Then the utlty of SM s u = v (β ) p. By usng the payment method expressed n equaton 3, the aucton has no postve transfers (.e. p 0 N and other desred economc propertes can be satsfed as mentoned before. B. Securty and Prvacy Consderatons One of the most mportant features of the proposed power schedulng aucton s provdng a suffcent level of securty n order to enable a relable and effcent schedulng of the auctoneer s resources. On the other hand, t s mportant to provde the SMs wth a suffcent level of prvacy by usng a cryptosystem that allows bdders to submt ther encrypted bddng values whle keepng the actual values unknown to

3 the auctoneer and other bdders n order to thwart backroom dealng such as bd-rggng between the bdders and the auctoneer and possble fraud of an nsncere auctoneer. Bd-rggng can occur f the nsncere auctoneer that s aware of the bdders actual bddng values colludes wth certan bdder, for the beneft of both, by sharng wth hm the bddng values of other bdders and manpulate the aucton. On the other hand, frauds of the nsncere auctoneer occurs f the auctoneer manpulates the chargng prce and overcharges the wnners n order to ncrease ts revenue whch results n a bad utltes for the wnners. Therefore, t s mportant for a power schedulng aucton to use a mechansm that allows the auctoneer to determne the maxmum bd wthout knowng the actual bddng values. C. Homomorphc Encrypton As mentoned before, homomorphc encrypton s adopted n our aucton desgn. Homomorphc encrypton s used when there s a requrement to perform certan operatons whle the nputs are not dsclosed. There are many schemes for homomorphc encrypton. In the proposed aucton desgn we adopt Paller cryptosystem [12], [13]. By usng Paller cryptosystem, the encrypton functon E(.) of plantexts x 1 and x 2 s addtvely homomorphc,.e. E(x 1 + x 2 ) = E(x 1 )E(x 2 ). Wth the ndstngushablty property of Paller cryptosystem, f a plantext x s encrypted twce the resultng two cyphertexts are dfferent from each other makng t not possble for anyone to dstngush ther orgnal plantexts unless decryptng the two cphertexts. In addton, wth the self blndng property of Paller cryptosystem, t s possble to compute dfferent cphertext E (x) from the cphertext E(x) wthout knowng the decrypton key of the plantext. IV. SECURE POWER SCHEDULING AUCTION MECHANISM Gven that the grd operator who plays the role of an auctoneer could be a prvate entty, the aucton s prone to fraud from an nsncere auctoneer. Therefore, preventng possble nsncere behavor from the auctoneer s essental. In order to enable an effcent secure schedulng process of the power plant s resources, t s mportant to desgn a secure power aucton that enables the power plant s operator to determne the wnners and the resource prce wthout knowng the orgnal bds. By makng the auctoneer only able to explot the wnners and ther payments, t s then not possble for hm to conduct bd-rggng or fraud. Once the power aucton s performed, the power plant s operator schedules each of the wnnng SMs for the correspondng EPUs and charges t for the scheduled resources. The proposed power aucton leverages homomorphc encrypton through Paller cryptosystem to provde a secure and honest aucton mechansm by avodng possble frauds and bd-rggng. The procedure of the proposed secure power aucton s presented n the followng steps: 1. The auctoneer generates a prvate and publc keys of Paller cryptosystem and shares hs publc key x (.e. x 0) wth the SMs n the power grd. 2. Each SM n N submts ts true evaluaton bddng values n w = v to a buffer that encrypts these values usng Paller cryptosystem and creates cphertexts. Let the bddng value w(β) of allocaton β be equvalent to m such that 1 m s where s s any number that s large enough to cover all possble bddng values for the allocaton of the EPUs. Let E(x) be the Paller encrypton of the publc key x 0, the buffer creates a vector of cphertexts e(m) for bddng value m where e(m) s gven by e(m) = (e 1,..., e s ) = (E(x),..., E(x), E(0),..., E(0) ). (4) }{{}}{{} m s m Furthermore, the auctoneer creates N +1 representng vectors E T = E(O), E 1 = E(O),...,E N = E(O) (.e. N s the number of bdders). The sze of E equals A and the ntal O(β) equals 0;.e. E(O) = {e(0), e(0),.., e(0)}. Each SM;.e. the j th SM n N keeps ts encrypted bddng vector w j secret by addng t to all representng vectors except E j. Once performng ths addton process by each SM n N, the auctoneer obtans E T = ( e(w (β 1 )),..., e(w (β A ))). (5) By applyng the homomorphc addton property, E T can be expressed as E T = (e( w (β 1 )),..., e( w (β A ))) = E( w ), (6) and the auctoneer also has E j = E( j w ) for (1 j N). 3. The secure gateway adds a random constant θ(β) = r to each of E T, E 1,..., E N to obtan E( w + θ) and E( j w + θ) j and sends them to the auctoneer. 4. The auctoneer determnes the maxmum sum value of the masked bds accordng to the followng equaton: k = max β A ( = max β A ( w (β) + θ(β)) w (β)) + r, where k can be determned by the auctoneer by takng the product of the encrypted values n E T, whch s equvalent to A n=1 e( N =1 w (β n )+r), and fndng the maxmum element n that product. 5. The auctoneer decrypts the k th element of each vector e( w (β) + θ(β)) n E T for all the allocatons n A. Its decrypted value wll be equvalent to zero or x. The allocaton that has a decrypton value equvalent to x,.e. β, s the one that maxmzes w. The auctoneer consders β to be the wnnng allocaton and schedules ts resources to the correspondng SMs accordng to β. 6. In order for the auctoneer to fnd ts chargng prce for each wnnng SM, the auctoneer decrypts e( z w (β ) + θ) of E z (.e. SM z s a wnnng one) and fnds the value ( z w (β ) + θ). The auctoneer then fnds the maxmum value of the product of the encrypted elements max β A ( z w (β) + r) = ( z w (α z) + r). (7)

4 The auctoneer calculates the chargng prce that each of the wnnng SMs needs to pay for the scheduled EPUs accordng to the followng equaton p z = ( z w (β z) + r) ( z w (β ) + r). (8) where SM z s a wnnng bdder that pays a prce p z for ts scheduled EPUs. Fgure 2 shows the procedure of the proposed secure power schedulng aucton. Auctoneer (Power Plant Operator) Power Plant Revenue SM 4 SM 3 SM 2 SM Number of EPUs Secure Gateway Fg. 3. The auctoneer s revenue for dfferent number of bdders wth the auctoned EPUs changng from 1 to Smart Meter (Bdder) Smart Meter (Bdder) Bdders (SMs) Satsfacton SM 4 SM 3 SM 2 SM Smart meters submt ther encrypted bddng vectors to the auctoneer Secure Power Aucton The Auctoneer runs a secure power aucton Each smart meter (bdder) s scheduled the power unts t won and charged the correspondng prce Number of EPUs Fg. 4. Bdders satsfacton wth the auctoned EPUs changng from 1 to 15. Fg. 2. Procedure of the proposed secure power schedulng aucton. V. SIMULATION RESULTS In ths secton, we present the performance of the proposed power schedulng aucton. Two performance metrcs are consdered: power plant s revenue and SMs satsfacton. Let W denotes the set of all wnnng SMs. The power plant s revenue s gven by Rev = W p (.e. the sum of all wnnng SMs chargng prces) and the SMs satsfacton s represented by the sum of all wnnng SMs utltes dvded by the sum of all SMs evaluaton values that s gven by W u / N v. We ran Monte Carlo Smulaton for dfferent number of SMs that are bddng for the auctoneer s resources and the results are averaged over the ndependent runs n whch the bddng values of the SMs are generated randomly and the two performance metrcs are evaluated. Smulaton results are represented for each of the four cases: N = 2 SMs (bdders), N = 3 SMs, N = 4 SMs and N = 5 SMs. Fgure 3 shows that the auctoneer s revenue ncreases when the number of SMs (bdders) ncreases. Ths s expected as the auctoneer s revenue ncreases wth more bdders requestng more resources. In Fgure 4, we show that the bdders satsfacton ncreases as the number of EPUs ncreases untl the bdders satsfacton saturates when each SM s assgned the number of EPUs t bds for. Fgure 4 also shows that for the same amount of the auctoneer s avalable resources R, the bdders satsfacton s hgher when there are less number of bdders partcpatng n the power aucton. VI. CONCLUSION In ths paper, we have proposed a secure power schedulng aucton that enables an effcent power schedulng mechansm to schedule the power plant s lmted resources durng peak hours tme slots. We have taken nto consderaton possble nsncere behavor of the auctoneer and desgned a power aucton that prevents possble frauds and bd-rggng between an nsncere auctoneer and greedy bdders. The proposed power aucton leverages homomorphc encrypton through Paller cryptosystem to keep the SMs bddng values unknown to the auctoneer whle the auctoneer s stll able to fnd the wnnng SMs. We showed through smulatons that the proposed power aucton provdes suffcent revenue for the power plant and satsfactory utltes for the SMs whle provdng a secure power schedulng aucton aganst possble back room dealngs. REFERENCES [1] P. Y, X. Dong, A. Iwayem, C. Zhou, and S. L, Real-tme opportunstc schedulng for resdental demand response, Smart Grd, IEEE Transactons on, vol. 4, pp , March [2] A.-H. Mohsenan-Rad, V. Wong, J. Jatskevch, R. Schober, and A. Leon-Garca, Autonomous demand-sde management based on game-theoretc energy consumpton schedulng for the future smart grd, Smart Grd, IEEE Transactons on, vol. 1, pp , Dec [3] C. Joe-Wong, S. Sen, S. Ha, and M. Chang, Optmzed day-ahead prcng for smart grds wth devce-specfc schedulng flexblty, Selected Areas n Communcatons, IEEE Journal on, vol. 30, pp , July [4] J. H. Yoon, R. Baldck, and A. Novoselac, Dynamc demand response controller based on real-tme retal prce for resdental buldngs, Smart Grd, IEEE Transactons on, vol. 5, pp , Jan 2014.

5 [5] S. L, D. Zhang, A. Roget, and Z. O Nell, Integratng home energy smulaton and dynamc electrcty prce for demand response study, Smart Grd, IEEE Transactons on, vol. 5, pp , March [6] R. Weber, Aucton Theory: By Vjay Krshna. Academc Press, 2002, Games and Economc Behavor, vol. 45, no. 2, pp , [7] T. Groves, Incentves n teams, Econometrca, vol. 41, p , [8] A. Abdel-Had and C. Clancy, A Robust Optmal Rate Allocaton Algorthm and Prcng Polcy for Hybrd Traffc n 4G-LTE, n PIMRC, [9] W. Vckrey, Counterspeculaton, Auctons and Compettve Sealed Tenders, Journal of Fnance, pp. 8 37, [10] A. Abdelhad, H. Shajaah, and C. Clancy, A multter wreless spectrum sharng system leveragng secure spectrum auctons, IEEE Transactons on Cogntve Communcatons and Networkng, vol. 1, pp , June [11] N. Nsan, T. Roughgarden, É. Tardos, and V. V. Vazran, Algorthmc Game Theory. New York, NY, USA: Cambrdge Unversty Press, [12] P. Paller, Publc-key cryptosystems based on composte degree resduosty classes, n Proceedngs of the 17th Internatonal Conference on Theory and Applcaton of Cryptographc Technques, EUROCRYPT 99, (Berln, Hedelberg), pp , Sprnger-Verlag, [13] P. Paller and D. Pontcheval, Effcent publc-key cryptosystems provably secure aganst actve adversares, n Advances n Cryptology - ASIACRYPT99 (K.-Y. Lam, E. Okamoto, and C. Xng, eds.), vol of Lecture Notes n Computer Scence, pp , Sprnger Berln Hedelberg, 1999.

An Application-Aware Spectrum Sharing Approach for Commercial Use of 3.5 GHz Spectrum

An Application-Aware Spectrum Sharing Approach for Commercial Use of 3.5 GHz Spectrum An Applcaton-Aware Spectrum Sharng Approach for Commercal Use of 3.5 GHz Spectrum Haya Shajaah, Ahmed Abdelhad and Charles Clancy Bradley Department of Electrcal and Computer Engneerng Hume Center, Vrgna

More information

A Strategy-Proof Combinatorial Heterogeneous Channel Auction Framework in Noncooperative Wireless Networks

A Strategy-Proof Combinatorial Heterogeneous Channel Auction Framework in Noncooperative Wireless Networks Ths s the author s verson of an artcle that has been publshed n ths journal. Changes were made to ths verson by the publsher pror to publcaton. The fnal verson of record s avalable at http://dx.do.org/1.119/tmc.214.2343624

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Dynamic Pricing Approach for Spectrum Allocation in Wireless Networks with Selfish Users

Dynamic Pricing Approach for Spectrum Allocation in Wireless Networks with Selfish Users Dynamc Prcng Approach for Spectrum Allocaton n Wreless Networks wth Selfsh Users Zhu J and K. J. Ray Lu Electrcal and Computer Engneerng Department and Insttute for Systems Research Unversty of Maryland,

More information

Utility-based Routing

Utility-based Routing Utlty-based Routng Je Wu Dept. of Computer and Informaton Scences Temple Unversty Roadmap Introducton Why Another Routng Scheme Utlty-Based Routng Implementatons Extensons Some Fnal Thoughts 2 . Introducton

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks

Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks Spectrum Aucton Framework for Access Allocaton n Cogntve Rado Networks ABSTRACT Gaurav S. Kasbekar Department of Electrcal and Systems Engneerng Unversty of Pennsylvana kgaurav@seas.upenn.edu Cogntve rado

More information

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game 8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

Rational Secret Sharing without Broadcast

Rational Secret Sharing without Broadcast Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept

More information

The Security Correction of Large Consumers Long-Term Direct Power Trading Based on DC Power Transfer Distribution Factor

The Security Correction of Large Consumers Long-Term Direct Power Trading Based on DC Power Transfer Distribution Factor Energy and Power Engneerng, 07, 9, 365-375 http://www.scrp.org/ournal/epe ISSN Onlne: 947-388 ISSN Prnt: 949-43X The Securty Correcton of Large Consumers Long-Term Drect Power Tradng Based on DC Power

More information

The Effect Of Phase-Shifting Transformer On Total Consumers Payments

The Effect Of Phase-Shifting Transformer On Total Consumers Payments Australan Journal of Basc and Appled Scences 5(: 854-85 0 ISSN -88 The Effect Of Phase-Shftng Transformer On Total Consumers Payments R. Jahan Mostafa Nck 3 H. Chahkand Nejad Islamc Azad Unversty Brjand

More information

Chinese Remainder. Discrete Mathematics Andrei Bulatov

Chinese Remainder. Discrete Mathematics Andrei Bulatov Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

Priority based Dynamic Multiple Robot Path Planning

Priority based Dynamic Multiple Robot Path Planning 2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

Challenges and Opportunities in Large-Scale Deployment of Automated Energy Consumption Scheduling Systems in Smart Grids

Challenges and Opportunities in Large-Scale Deployment of Automated Energy Consumption Scheduling Systems in Smart Grids Challenges and Opportuntes n Large-Scale Deployment of Automated Energy Consumpton Schedulng Systems n Smart Grds Hossen Akhavan-Hejaz, Zahra Baharloue, and Hamed Mohsenan-Rad Department of Electrcal Engneerng,

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

Low Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages

Low Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages Low Swtchng Frequency Actve Harmonc Elmnaton n Multlevel Converters wth Unequal DC Voltages Zhong Du,, Leon M. Tolbert, John N. Chasson, Hu L The Unversty of Tennessee Electrcal and Computer Engneerng

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,

More information

An Efficient and Flexible Decentralized Multicast Key Distribution Scheme

An Efficient and Flexible Decentralized Multicast Key Distribution Scheme IJCSNS Internatonal Journal of Computer Scence and Networ Securty VOL. 6 No. 8B August 006 11 An Effcent and Flexble Decentralzed Multcast Key Dstrbuton Scheme Wen-Shenq Juang and Jyan-Cwan Wu Department

More information

RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING

RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING Vaslos A. Srs Insttute of Computer Scence (ICS), FORTH and Department of Computer Scence, Unversty of Crete P.O. Box 385, GR 7 Heraklon, Crete,

More information

Test 2. ECON3161, Game Theory. Tuesday, November 6 th

Test 2. ECON3161, Game Theory. Tuesday, November 6 th Test 2 ECON36, Game Theory Tuesday, November 6 th Drectons: Answer each queston completely. If you cannot determne the answer, explanng how you would arrve at the answer may earn you some ponts.. (20 ponts)

More information

EMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru.

EMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru. student fnance wales cylld myfyrwyr cymru Educaton Mantenance Allowance (EMA) Fnancal Detals Form 2017/18 sound advce on STUDENT FINANCE EMA Educaton Mantenance Allowance (EMA) 2017/18 /A How to complete

More information

A Game Theoretic Approach for Distributed Resource Allocation and Orchestration of Softwarized Networks

A Game Theoretic Approach for Distributed Resource Allocation and Orchestration of Softwarized Networks A Game Theoretc Approach for Dstrbuted Resource Allocaton and Orchestraton of Softwarzed Networks Salvatore D Oro, Laura Gallucco, Member, IEEE, Sergo Palazzo, Senor Member, IEEE, Govann Schembra Abstract

More information

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET) A Novel Optmzaton of the Dstance Source Routng (DSR) Protocol for the Moble Ad Hoc Networs (MANET) Syed S. Rzv 1, Majd A. Jafr, and Khaled Ellethy Computer Scence and Engneerng Department Unversty of Brdgeport

More information

Distributed Relay Selection and Power Allocation Using Stackelberg and Auction Games in Multi-user Multi-relay Networks

Distributed Relay Selection and Power Allocation Using Stackelberg and Auction Games in Multi-user Multi-relay Networks ensors & Transducers 013 by IFA http://www.sensorsportal.com Dstrbuted Relay electon and Power Allocaton Usng tackelberg and Aucton Games n Mult-user Mult-relay Networks Erqng ZHANG xng YIN Lang YIN hufang

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

Auction-based Resource Allocation in UMTS High Speed Downlink Packet Access (HSDPA)

Auction-based Resource Allocation in UMTS High Speed Downlink Packet Access (HSDPA) Aucton-based Resource Allocaton n UMTS Hgh Speed Downlnk Packet Access (HSDPA) Manos Dramtnos, George D. Stamouls and Costas Courcoubets Network Economcs and Servces Group (N.E.S.), Department of Informatcs,

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

Prevention of Sequential Message Loss in CAN Systems

Prevention of Sequential Message Loss in CAN Systems Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar

More information

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

A Benchmark for D2D in Cellular Networks: The Importance of Information

A Benchmark for D2D in Cellular Networks: The Importance of Information A Benchmark for D2D n Cellular Networks: The Importance of Informaton Yğt Özcan, Catherne Rosenberg Unversty of Waterloo {yozcan,cath}@uwaterloo.ca Fabrce Gullemn Orange Labs, France fabrce.gullemn@orange.com

More information

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks I. J. Communcatons, etwork and System Scences, 8, 3, 7-83 Publshed Onlne August 8 n ScRes (http://www.scrp.org/journal/jcns/). Jont Adaptve Modulaton and Power Allocaton n Cogntve Rado etworks Dong LI,

More information

A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS

A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS Pedro Godnho and oana Das Faculdade de Economa and GEMF Unversdade de Combra Av. Das da Slva 65 3004-5

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

Accepted Manuscript. Real-time pricing scheme based on Stackelberg game in smart grid with multiple power retailers

Accepted Manuscript. Real-time pricing scheme based on Stackelberg game in smart grid with multiple power retailers Accepted Manuscrpt Real-tme prcng scheme based on Stacelberg game n smart grd wth multple power retalers Yemng Da Yan Gao Hongwe Gao Hongbo Zhu PII: S0925-2312(17)30697-5 DOI: 10.1016/.neucom.2017.04.027

More information

Distributed Uplink Scheduling in EV-DO Rev. A Networks

Distributed Uplink Scheduling in EV-DO Rev. A Networks Dstrbuted Uplnk Schedulng n EV-DO ev. A Networks Ashwn Srdharan (Sprnt Nextel) amesh Subbaraman, och Guérn (ESE, Unversty of Pennsylvana) Overvew of Problem Most modern wreless systems Delver hgh performance

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

Study of Downlink Radio Resource Allocation Scheme with Interference Coordination in LTE A Network

Study of Downlink Radio Resource Allocation Scheme with Interference Coordination in LTE A Network Internatonal Journal of Future Computer and Communcaton, Vol. 6, o. 3, September 2017 Study of Downln Rado Resource Allocaton Scheme wth Interference Coordnaton n LTE A etwor Yen-Wen Chen and Chen-Ju Chen

More information

Incentivize Cooperative Sensing in Distributed Cognitive Radio Networks with Reputation-based Pricing

Incentivize Cooperative Sensing in Distributed Cognitive Radio Networks with Reputation-based Pricing Incentvze Cooperatve Sensng n Dstrbuted Cogntve Rado Networs wth Reputaton-based Prcng Tongje Zhang, Zongpeng L, Rehaneh Safav-Nan Department of Computer Scence, Unversty of Calgary {tozhang, zongpeng,

More information

Research on Controller of Micro-hydro Power System Nan XIE 1,a, Dezhi QI 2,b,Weimin CHEN 2,c, Wei WANG 2,d

Research on Controller of Micro-hydro Power System Nan XIE 1,a, Dezhi QI 2,b,Weimin CHEN 2,c, Wei WANG 2,d Advanced Materals Research Submtted: 2014-05-13 ISSN: 1662-8985, Vols. 986-987, pp 1121-1124 Accepted: 2014-05-19 do:10.4028/www.scentfc.net/amr.986-987.1121 Onlne: 2014-07-18 2014 Trans Tech Publcatons,

More information

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent

More information

Adaptive Modulation and Coding for Utility Enhancement in VMIMO WSN Using Game Theory

Adaptive Modulation and Coding for Utility Enhancement in VMIMO WSN Using Game Theory Adaptve Modulaton and Codng for Utlty nhancement n VMIMO WSN Usng Game Theory R. Vall and P. Dananjayan mparments. The data transmtted from the sensor nodes s hghly susceptble to error n a wreless envronment

More information

sensors ISSN by MDPI

sensors ISSN by MDPI Sensors 2007, 7, 628-648 Full Paper sensors ISSN 1424-8220 2007 by MDPI www.mdp.org/sensors Dstrbuted Partcle Swarm Optmzaton and Smulated Annealng for Energy-effcent Coverage n Wreless Sensor Networks

More information

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal

More information

Resource Control for Elastic Traffic in CDMA Networks

Resource Control for Elastic Traffic in CDMA Networks Resource Control for Elastc Traffc n CDMA Networks Vaslos A. Srs Insttute of Computer Scence, FORTH Crete, Greece vsrs@cs.forth.gr ACM MobCom 2002 Sep. 23-28, 2002, Atlanta, U.S.A. Funded n part by BTexact

More information

Optimal Sizing and Allocation of Residential Photovoltaic Panels in a Distribution Network for Ancillary Services Application

Optimal Sizing and Allocation of Residential Photovoltaic Panels in a Distribution Network for Ancillary Services Application Optmal Szng and Allocaton of Resdental Photovoltac Panels n a Dstrbuton Networ for Ancllary Servces Applcaton Reza Ahmad Kordhel, Student Member, IEEE, S. Al Pourmousav, Student Member, IEEE, Jayarshnan

More information

Distributed Interference Alignment in Cognitive Radio Networks

Distributed Interference Alignment in Cognitive Radio Networks Dstrbuted Interference Algnment n Cogntve Rado Networks Y Xu and Shwen Mao Department of Electrcal and Computer Engneerng, Auburn Unversty, Auburn, AL, USA Abstract In ths paper, we nvestgate the problem

More information

QoS Provisioning in Wireless Data Networks under Non-Continuously Backlogged Users

QoS Provisioning in Wireless Data Networks under Non-Continuously Backlogged Users os Provsonng n Wreless Data Networks under Non-Contnuously Backlogged Users Tmotheos Kastrnoganns, and Symeon Papavasslou, Member, IEEE School of Electrcal and Computer Engneerng Natonal Techncal Unversty

More information

REAL-TIME SCHEDULING IN LTE FOR SMART GRIDS. Yuzhe Xu, Carlo Fischione

REAL-TIME SCHEDULING IN LTE FOR SMART GRIDS. Yuzhe Xu, Carlo Fischione REAL-TIME SCHEDULING IN LTE FOR SMART GRIDS Yuzhe Xu, Carlo Fschone Automatc Control Lab KTH, Royal Insttue of Technology 1-44, Stockholm, Sweden Emal: yuzhe@kth.se, carlof@kth.se ABSTRACT The latest wreless

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

Uplink User Selection Scheme for Multiuser MIMO Systems in a Multicell Environment

Uplink User Selection Scheme for Multiuser MIMO Systems in a Multicell Environment Uplnk User Selecton Scheme for Multuser MIMO Systems n a Multcell Envronment Byong Ok Lee School of Electrcal Engneerng and Computer Scence and INMC Seoul Natonal Unversty leebo@moble.snu.ac.kr Oh-Soon

More information

Queuing-Based Dynamic Channel Selection for Heterogeneous Multimedia Applications over Cognitive Radio Networks

Queuing-Based Dynamic Channel Selection for Heterogeneous Multimedia Applications over Cognitive Radio Networks 1 Queung-Based Dynamc Channel Selecton for Heterogeneous ultmeda Applcatons over Cogntve Rado Networks Hsen-Po Shang and haela van der Schaar Department of Electrcal Engneerng (EE), Unversty of Calforna

More information

Intelligent Wakening Scheme for Wireless Sensor Networks Surveillance

Intelligent Wakening Scheme for Wireless Sensor Networks Surveillance The Frst Internatonal Workshop on Cyber-Physcal Networkng Systems Intellgent Wakenng Scheme for Wreless Sensor Networks Survellance Ru Wang, Le Zhang, L Cu Insttute of Computng Technology of the Chnese

More information

Non-collaborative Resource Management for Wireless Multimedia Applications Using Mechanism Design

Non-collaborative Resource Management for Wireless Multimedia Applications Using Mechanism Design Non-collaboratve Resource Management for Wreless Multmeda Applcatons Usng Mechansm Desgn Fangwen Fu and Mhaela van der Schaar Eleccal Engneerng Department, Unversty of Calforna, Los Angeles (UCLA) 1 ABSTRACT

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

D-STATCOM Optimal Allocation Based On Investment Decision Theory

D-STATCOM Optimal Allocation Based On Investment Decision Theory Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 2016) D-STATCOM Optmal Allocaton Based On Investment Decson Theory Yongjun Zhang1, a, Yfu Mo1, b and Huazhen

More information

TODAY S wireless networks are characterized as a static

TODAY S wireless networks are characterized as a static IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 2, FEBRUARY 2011 161 A Spectrum Decson Framework for Cogntve Rado Networks Won-Yeol Lee, Student Member, IEEE, and Ian F. Akyldz, Fellow, IEEE Abstract

More information

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes 5-95 Fall 08 # Games and Nmbers A. Game 0.5 seconds, 64 megabytes There s a legend n the IT Cty college. A student that faled to answer all questons on the game theory exam s gven one more chance by hs

More information

Micro-grid Inverter Parallel Droop Control Method for Improving Dynamic Properties and the Effect of Power Sharing

Micro-grid Inverter Parallel Droop Control Method for Improving Dynamic Properties and the Effect of Power Sharing 2015 AASRI Internatonal Conference on Industral Electroncs and Applcatons (IEA 2015) Mcro-grd Inverter Parallel Droop Control Method for Improvng Dynamc Propertes and the Effect of Power Sharng aohong

More information

ASFALT: Ā S imple F āult-tolerant Signature-based L ocalization T echnique for Emergency Sensor Networks

ASFALT: Ā S imple F āult-tolerant Signature-based L ocalization T echnique for Emergency Sensor Networks ASFALT: Ā S mple F āult-tolerant Sgnature-based L ocalzaton T echnque for Emergency Sensor Networks Murtuza Jadlwala, Shambhu Upadhyaya and Mank Taneja State Unversty of New York at Buffalo Department

More information

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1 Project Ttle Date Submtted IEEE 802.16 Broadband Wreless Access Workng Group Double-Stage DL MU-MIMO Scheme 2008-05-05 Source(s) Yang Tang, Young Hoon Kwon, Yajun Kou, Shahab Sanaye,

More information

Gustavus J. Simmons Sandia National Laboratories Albuquerque, NM 87185

Gustavus J. Simmons Sandia National Laboratories Albuquerque, NM 87185 An Impersonaton-Proof Identty Verfcaton Scheme* Gustavus J. Smmons Sanda Natonal Laboratores Albuquerque, NM 87185 Most schemes for the verfcaton of personal dentty are logcally flawed n that they requre

More information

A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks

A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks 74 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 3, No., Aprl 0 A Fuzzy-based Routng Strategy for Multhop Cogntve Rado Networks Al El Masr, Naceur Malouch and Hcham

More information

Full-duplex Relaying for D2D Communication in mmwave based 5G Networks

Full-duplex Relaying for D2D Communication in mmwave based 5G Networks Full-duplex Relayng for D2D Communcaton n mmwave based 5G Networks Boang Ma Hamed Shah-Mansour Member IEEE and Vncent W.S. Wong Fellow IEEE Abstract Devce-to-devce D2D communcaton whch can offload data

More information

Energy-efficient Subcarrier Allocation in SC-FDMA Wireless Networks based on Multilateral Model of Bargaining

Energy-efficient Subcarrier Allocation in SC-FDMA Wireless Networks based on Multilateral Model of Bargaining etworkng 03 569707 Energy-effcent Subcarrer Allocaton n SC-FDMA Wreless etworks based on Multlateral Model of Barganng Ern Elen Tsropoulou Aggelos Kapoukaks and Symeon apavasslou School of Electrcal and

More information

Selective Sensing and Transmission for Multi-Channel Cognitive Radio Networks

Selective Sensing and Transmission for Multi-Channel Cognitive Radio Networks IEEE INFOCOM 2 Workshop On Cogntve & Cooperatve Networks Selectve Sensng and Transmsson for Mult-Channel Cogntve Rado Networks You Xu, Yunzhou L, Yfe Zhao, Hongxng Zou and Athanasos V. Vaslakos Insttute

More information

problems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance

problems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance palette of problems Davd Rock and Mary K. Porter 1. If n represents an nteger, whch of the followng expressons yelds the greatest value? n,, n, n, n n. A 60-watt lghtbulb s used for 95 hours before t burns

More information

An Engineering Approach to Monitoring Market Power in Restructured Markets for Electricity

An Engineering Approach to Monitoring Market Power in Restructured Markets for Electricity An Engneerng Approach to Montorng Market Power n Restructured Markets for Electrcty C.E. Murllo-Sanchez, S.M. Ede, T.D. Mount, R.J. Thomas, and R.D. Zmmerman Cornell Unversty and PSERC Abstract The hgh

More information

THE GENERATION OF 400 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES *

THE GENERATION OF 400 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES * SLAC PUB 874 3/1999 THE GENERATION OF 4 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES * Sam G. Tantaw, Arnold E. Vleks, and Rod J. Loewen Stanford Lnear Accelerator Center, Stanford Unversty P.O. Box

More information

Exploiting Dynamic Workload Variation in Low Energy Preemptive Task Scheduling

Exploiting Dynamic Workload Variation in Low Energy Preemptive Task Scheduling Explotng Dynamc Worload Varaton n Low Energy Preemptve Tas Schedulng Lap-Fa Leung, Ch-Yng Tsu Department of Electrcal and Electronc Engneerng Hong Kong Unversty of Scence and Technology Clear Water Bay,

More information

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

Control of Chaos in Positive Output Luo Converter by means of Time Delay Feedback

Control of Chaos in Positive Output Luo Converter by means of Time Delay Feedback Control of Chaos n Postve Output Luo Converter by means of Tme Delay Feedback Nagulapat nkran.ped@gmal.com Abstract Faster development n Dc to Dc converter technques are undergong very drastc changes due

More information

A Predictive QoS Control Strategy for Wireless Sensor Networks

A Predictive QoS Control Strategy for Wireless Sensor Networks The 1st Worshop on Resource Provsonng and Management n Sensor Networs (RPMSN '5) n conjuncton wth the 2nd IEEE MASS, Washngton, DC, Nov. 25 A Predctve QoS Control Strategy for Wreless Sensor Networs Byu

More information

A Mathematical Model for Restoration Problem in Smart Grids Incorporating Load Shedding Concept

A Mathematical Model for Restoration Problem in Smart Grids Incorporating Load Shedding Concept J. Appl. Envron. Bol. Sc., 5(1)20-27, 2015 2015, TextRoad Publcaton ISSN: 2090-4274 Journal of Appled Envronmental and Bologcal Scences www.textroad.com A Mathematcal Model for Restoraton Problem n Smart

More information

Chapter 2 Two-Degree-of-Freedom PID Controllers Structures

Chapter 2 Two-Degree-of-Freedom PID Controllers Structures Chapter 2 Two-Degree-of-Freedom PID Controllers Structures As n most of the exstng ndustral process control applcatons, the desred value of the controlled varable, or set-pont, normally remans constant

More information

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014 Gudelnes for CCPR and RMO Blateral Key Comparsons CCPR Workng Group on Key Comparson CCPR-G5 October 10 th, 2014 These gudelnes are prepared by CCPR WG-KC and RMO P&R representatves, and approved by CCPR,

More information

Multiband Jamming Strategies with Minimum Rate Constraints

Multiband Jamming Strategies with Minimum Rate Constraints Multband Jammng Strateges wth Mnmum Rate Constrants Karm Banawan, Sennur Ulukus, Peng Wang, and Bran Henz Department of Electrcal and Computer Engneerng, Unversty of Maryland, College Park, MD 7 US Army

More information

Quantifying Content Consistency Improvements Through Opportunistic Contacts

Quantifying Content Consistency Improvements Through Opportunistic Contacts Unversty of Pennsylvana ScholarlyCommons Departmental Papers (ESE) Department of Electrcal & Systems Engneerng 8-12-29 Quantfyng Content Consstency Improvements Through Opportunstc Contacts Kn-Wah Kwong

More information

Research Article elighthouse: Enhance Solar Power Coverage in Renewable Sensor Networks

Research Article elighthouse: Enhance Solar Power Coverage in Renewable Sensor Networks Hndaw Publshng Corporaton Internatonal Journal of Dstrbuted Sensor Networks Volume 213, Artcle ID 256569, 16 pages http://dx.do.org/1.1155/213/256569 Research Artcle elghthouse: Enhance Solar Power Coverage

More information

Keywords LTE, Uplink, Power Control, Fractional Power Control.

Keywords LTE, Uplink, Power Control, Fractional Power Control. Volume 3, Issue 6, June 2013 ISSN: 2277 128X Internatonal Journal of Advanced Research n Computer Scence and Software Engneerng Research Paper Avalable onlne at: www.jarcsse.com Uplnk Power Control Schemes

More information

Traffic balancing over licensed and unlicensed bands in heterogeneous networks

Traffic balancing over licensed and unlicensed bands in heterogeneous networks Correspondence letter Traffc balancng over lcensed and unlcensed bands n heterogeneous networks LI Zhen, CUI Qme, CUI Zhyan, ZHENG We Natonal Engneerng Laboratory for Moble Network Securty, Bejng Unversty

More information

AN IMPROVED BIT LOADING TECHNIQUE FOR ENHANCED ENERGY EFFICIENCY IN NEXT GENERATION VOICE/VIDEO APPLICATIONS

AN IMPROVED BIT LOADING TECHNIQUE FOR ENHANCED ENERGY EFFICIENCY IN NEXT GENERATION VOICE/VIDEO APPLICATIONS Journal of Engneerng Scence and Technology Vol., o. 4 (6) 476-495 School of Engneerng, Taylor s Unversty A IMPROVED BIT LOADIG TECHIQUE FOR EHACED EERGY EFFICIECY I EXT GEERATIO VOICE/VIDEO APPLICATIOS

More information

Chapter 2 Basics of Efficient Secure Function Evaluation

Chapter 2 Basics of Efficient Secure Function Evaluation Chapter 2 Bascs of Effcent Secure Functon Evaluaton 2.1 Common Notaton and Defntons In ths secton we ntroduce common notaton (Sect. 2.1.1), cryptographc prmtves (Sect. 2.1.2), functon representatons (Sect.

More information

Dynamic Lightpath Protection in WDM Mesh Networks under Wavelength Continuity Constraint

Dynamic Lightpath Protection in WDM Mesh Networks under Wavelength Continuity Constraint Dynamc Lghtpath Protecton n WDM Mesh etworks under Wavelength Contnuty Constrant Shengl Yuan* and Jason P. Jue *Department of Computer and Mathematcal Scences, Unversty of Houston Downtown One Man Street,

More information

Opportunistic Beamforming for Finite Horizon Multicast

Opportunistic Beamforming for Finite Horizon Multicast Opportunstc Beamformng for Fnte Horzon Multcast Gek Hong Sm, Joerg Wdmer, and Balaj Rengarajan allyson.sm@mdea.org, joerg.wdmer@mdea.org, and balaj.rengarajan@gmal.com Insttute IMDEA Networks, Madrd, Span

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

Tile Values of Information in Some Nonzero Sum Games

Tile Values of Information in Some Nonzero Sum Games lnt. ournal of Game Theory, Vot. 6, ssue 4, page 221-229. Physca- Verlag, Venna. Tle Values of Informaton n Some Nonzero Sum Games By P. Levne, Pars I ), and ZP, Ponssard, Pars 2 ) Abstract: The paper

More information

Performance Analysis of Scheduling Policies for Delay-Tolerant Applications in Centralized Wireless Networks

Performance Analysis of Scheduling Policies for Delay-Tolerant Applications in Centralized Wireless Networks Performance Analyss of Schedulng Polces for Delay-Tolerant Applcatons n Centralzed Wreless Networks Mohamed Shaqfeh and Norbert Goertz Insttute for Dgtal Communcatons Jont Research Insttute for Sgnal &

More information