Secure Transmission of Sensitive data using multiple channels

Size: px
Start display at page:

Download "Secure Transmission of Sensitive data using multiple channels"

Transcription

1 Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. Abstract A new scheme for transmttng senstve data s proposed, the proposed scheme depends on parttonng the output of a block encrypton module usng the Chnese Remander Theorem among a set of channels. The purpose of usng the Chnese Remander Theorem s to hde the cpher text n order to ncrease the dffculty of attackng the cpher. The theory, mplementaton and the securty of ths scheme are descrbed n ths paper. Keywords Cryptography, Secure transmsson, Chnese Remander theorem, Block cpher. 1. Introducton As the need to protect senstve data aganst dfferent threats [2] ncreases the study of cryptography becomes of greater mportance [1]. Encrypton s the cryptographc prmtve mostly used n protectng the secrecy of the data. Block encrypton can be vewed as a mathematcal transformaton between the set of source blocks of sze S bts and the set of blocks of sze C bts through a mappng functon and a parameter K that s called the encrypton key. The form of any block Encrypton s C = EK (S) for some S {0,1 S and C {0,1 C. The nverse transform known as the decrypton s S = DK (D). The Chnese remander theorem CRT [5] states that f q0, q1... q k are k par wse relatvely prme postve ntegers and a0, a1... a k are postve ntegers then there exsts exactly one nteger a where 0 a < q k = 1 0 for q q such that a = a mod q for 0 < k. = The ntegers q 0, q1... q k are called the modul whle the ntegers a0, a1... a k are called the resdues. The CRT has well known applcatons n both secret sharng and error correctng codes [6]. In ths work, block encrypton and the Chnese remander theorem wll be combned to produce a scheme for transmttng senstve data over multple channels. Abdelhamd S. Abdelhamd, M.Sc. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. asaladn@acm.org 2. Overvew of the proposed scheme The proposed scheme assumes the exstence of A transmsson channels between the sender and the recever partes from whch S Channels are chosen usng some selecton crtera. The orgnal message or plan-text s dvded nto unts that are referred to as super blocks of bts. The super blocks are encrypted usng an encrypton module that operates usng a block encrypton scheme E K ( B ) of block sze B bts where s equal to L for an B nteger L. The encrypton s performed usng an approprate mode of operaton such as CBC [2]. Each super block s treated as an bt nteger. A set of S relatvely prme modul q0, q1... q S are selected such that 2 q 0 q1.. qs then the bt nteger CRT remanders wth respect to the selected S modul r 0, r1... r S are calculated then sent over the selected S channels. The Selected S channels are used to transmt the remanders whle the rest of the channels carry some rrelevant data n order to decrease the ablty of the adversary to determne the used channels. At the recever sde, the nverse of the CRT s appled to get the orgnal -bt cpher super block, and then a decrypton module D K ( B ) s used to get the orgnal bt plan-text. The applcaton the CRT to the output of the encrypton module ams to hde the cpher from the adversary n order to prevent the adversary from takng beneft of any property of the cpher. 1

2 Fgure 1 Proposed Scheme Block Dagram 2.1 Selecton of the Channels The selecton of the S out of the A avalable channels should be done n a way that prevents the adversary from tellng whch channels carry relevant data and whch ones do not. The proposed selecton crteron s based on selectng pseudorandom numbers n the range [ 0, A ]. The generator s run on both sdes of communcaton S tmes to select the S channels. 2.2 Selecton of the modul It s mportant to determne the range of values for the modul used n the Chnese Remander transform. Assumng that, the sze of the super block s bts, and that t can be treated as an -bt nteger. The mod operaton can be consdered as a mappng between the -bt data space and the resdue space accordngly any super block b can be mapped to a remander r such that 0 r < q and r = b mod q where q s the selected modulus. Assumng a random varable B that denotes the possble super block nteger value and a random varable R that denotes the possble values of the resdue, the jont probablty between the two random varables can be represented as P( B = b / R = r) = q / 2. In order to decrease ths probablty we ether ncrease the super block sze or reduce the value of the modulus q. In order to decrease the value of all modul the sze of all of them can be chosen to be around the value / S. 2.3 umber of channels The maxmum number of channels used n the proposed scheme was estmated as S max = O( / log ). Ths estmaton s based on the fact that the maxmum number of relatvely prme numbers that can be selected less than or equal to a gven nteger x s O ( x / log x) and the assumpton that the modul wll be selected of length / S. 2.4 The super block Sze The super block sze s selected as a multple of the block sze B of the encrypton scheme used such that = L B. The selecton of the multpler L s governed by some factors 1. The loss resultng from representng the remanders of the Chnese remander theorem on fxed word length machnes. For example f AES s used as the encrypton method and 10 channels are used. If the encrypton module super block sze was taken to be 128 bts.e. L=1, each channel wll carry 12.8 bts or practcally 13 bts so 2 bytes are used for the representaton of that number whch leads to 18.75% loss n the bandwdth. If the super block sze was taken to be 512 bts.e. L=4, each channel wll carry 51.2 bts or practcally 52 bts so 7 bytes wll be used leadng to only 7.14% loss n bandwdth. Fgure 2 bandwdth Loss 2. The network algorthms used to manage the queung of data. For example n some mplementaton of the TCP/IP the agle algorthm s used n order to reduce the network overhead. The applcaton of that algorthm results n the bufferng of data tll a certan threshold s reached then ths data s sent as one packet. The use of larger remanders wll result n faster fllng of buffer and therefore ncreasng the throughput. 3. As the value ncreases the length of the modul selected ncreases. Ths wll ncrease the effort needed by the adversary to guess the modul 2

3 3. The detaled scheme The proposed scheme s composed of two phases: 1. The setup phase, durng ths phase the setup for the scheme wll be done. Ths phase s done once or every a relatvely long nterval. 2. The sesson phase, durng ths phase the actual transmsson s done between the two partes. The sesson phase starts as soon as the setup phase ends and s repeated whle the setup confguraton s vald. Scheme() { SetupPhase(); // IsVald represents outsde condtons whle( IsVald) Sesson(); Fgure 3 Proposed Scheme Flow 3.1 The setup phase In order to setup the envronment for the proposed scheme the followng steps should be done: 1. Selecton of the Encrypton method, ts parameters and mode of operaton. For example f we decde to use AES n the CBC mode, both the Encrypton key and the ntal vector should be selected. An mportant parameter to be set s the super block sze = L. B 2. Establshment of the set of avalable channels. 3. Selecton of the number of channels used n the communcatons S, ths number should be selected such that t s possble to select at least S relatvely prme ntegers to be used n the CRT. 4. Selecton of the S channels out of the A avalable channels. Ths s done through the use of a sutable pseudorandom number generator [3], [4]. The man condton of the random number generator s to produce a full cycle of values n the range [ 0, A ]. The output of the pseudorandom generator s taken to represent channels IDs [ 0, A ] so the generator s run S tmes to generate the S channels ds selected for the sesson. 5. Selecton of the modul. Two ways for usng these modul are proposed a. To generate a number of modul equal to the number of channels A, such that each channel s assgned a statc modulus. It should be kept n mnd that from the generated A modul any S modul can be used to represent the output of the encrypton module usng the CRT. Ths method wll be referred to as the statc assgnment of modul. b. To generate only S modul suffcent to represent the output of the Encrypton module usng CRT and on each sesson the S modul are assgned to the S selected channels. Ths method wll be referred to as the dynamc assgnment of modul. The output of the setup phase represents the key for the proposed scheme and so some sort of key exchange protocol should be used n order to exchange the output of the setup phase. 3.2 The sesson phase The sesson phase refers to the steps that should be done on each transmsson. It nvolves actvtes on both sdes of the transmsson. In the followng dscusson the two partes wll be referred to as the sender and the recever. Every sesson starts as soon as the prevous sesson ends. The operatons Input Wat, channels Input Wat, and channel Read wll be assumed to be blockng operatons. The sesson does not start as soon as the data arrves n order to keep the synchronzaton between the sender and the recever partes. It should be noted that the frst sesson starts as soon as the setup phase ends. In the followng, the two dfferent mplementatons for the Sender and the Recever wll be dscussed. Sender Sesson The Sender has a message M that should be delvered to the recever. The protocol steps used by the sender are: 1. Select channels step, ths step selects S channels from the Avalable Channels usng a pseudorandom number generator. After selectng the channels the modul are assgned to the correspondng channels. 2. Wat for nput step, ths step wats untl there are data avalable for sendng. Ths operaton s a blockng step. When the data s avalable steps three to sx wll be repeated untl the nput s consumed. 3. bts of data are read from the nput stream. If the amount of remanng data s less than, the data wll be padded as approprate by the applcaton. 4. The -bt super block wll be encrypted by the encrypton module. As mentoned earler, the encrypton module depends on a block cpher algorthm such as DES or AES. 5. The super block s represented as an bt nteger. For every channel the remander of the nteger resultng from the prevous step wll be calculated 3

4 wth respect to the modulus assocated wth the channel and 6. The calculated resdues wll be sent on the correspondng channels as packets of data. 4. The S ntegers read from the S channels are used n the nverse Chnese remander theorem operaton to produce an bt nteger. 5. The nteger s represented as an bt super block sutable to be nput to the decrypton module. 6. The resultng super block s decrypted usng the decrypton module. 7. The decrypted data s wrtten to the output stream. Fgure 5 Recever Flow chart Recever Sesson Fgure 4 Sender Flow Chart The recever party receves the data sent over the channels and reconstructs the Message usng the followng steps: 1. Select channels step, ths step s equvalent to the correspondng one on the sender sde. 2. Wat for channel nput step, ths step wats untl there are data avalable on the dfferent channels. Ths operaton s blockng. When the data s avalable steps three to seven wll be repeated untl end of transmsson. 3. For every channel, an nteger r s read that s the remander sent on the channel. 4. Securty of the proposed scheme In ths secton we analyze the securty of the proposed scheme. The analyss wll start by demonstratng some probablstc characterstcs of the scheme Theorem: The remanders of the CRT are ndependent. Proof: Suppose that the output of the encrypton module s an bt value x. Let p and q be two of the S modul and let Y, Z be random varables denotng the values of x mod p and x mod q respectvely. Let y = x mod p and z = x mod q. Accordng to the Chnese remander theorem the ordered par ( y, z) unquely dentfes x n the ranges of values [ 0, pq ], [ pq,2 pq ] and so on. 4

5 Ths mples that P ( Y = y Z = z) pq. It s clear that P ( Y = y) p and P ( Z = z) q. The result of the prevous steps mply that P ( Y = y Z = z) = P( Y = y) P( Z = z) so the two random varables are ndependent By generalzng the above proof, t s proved that the remanders of the Chnese Remander Theorem are ndependent. Based on ths a probablty model wll be bult to descrbe the output. Let the Random varable C denote the -Bts output of the Encrypton module and defne a set of random varables R for 0 < S such that R denotes the CRT remander wth respect to the modulus q. The probablty dstrbuton of such random varables for r cmodq can be defned as P( C = c) 0 c < 2 P( R0 = r0, R1 = r1.. RS = rs ) = 0 otherwse Based on the stated probablty relaton there are two sets of values that can never appear n the output of the proposed scheme 1. The set of remanders correspondng to the values c such that 2 c < q0 q1... qs. 2. For each channel the set of values defned l x : q x < 2 l = q. as log 2 Accordng to those results the proposed scheme seems to have two ponts that the adversary can use to compromse the system. Accordng to the concrete securty defnton [7], the adversary can compromse a securty system f he can dstngush t from an equvalent system wth truly random output. Based on the demonstrated ponts n the system we wll conclude that theoretcally the probablty of dstngushablty s L P D = 1 2 t s clear that P D But n order to use both of these ponts the adversary should guess the followng: 1. The number of channels S used from wthn the avalable channels. 2. The parameters of the pseudorandom generator used to select the S channels from the avalable A. 3. The relatvely prme numbers used n the CRT. In other words the adversary needs to guess a part of the system key to be able to dstngush t from a random system. If we assumed that the adversary has an algorthm called the CRT breaker that gven a set of channels carryng CRT remanders of encrypted blocks can recover nformaton about the transmtted plan text. The adversary can use CRT Breaker to develop a cpher breakng algorthm as n the followng fgure to break the underlyng encrypton scheme gven ts output. CpherBreaker( TC /* Cpher text */) { Select S relatvely prme ntegers Q[ S]; for(nt = 0; < S; + + ){ R[ ] = TC mod Q[ ]; Return CRTBreaker( Q); We can conclude from the above algorthm that the proposed scheme securty n terms of protectng the plan text s equvalent to the underlyng block cpher. 5. Concluson In ths paper a new scheme for transmttng senstve data s ntroduced. The proposed scheme was found to have some theoretcal ssues that prevent t from beng secure accordng to the concrete securty defnton but was proven to be equvalent to the underlyng block cpher. 6. References [1] Stnson D. R., Cryptography: Theory and Practce, CRC Press, [2] Menezes Alfred J., Van Oorschot Paul C. and Vanstone Scott A., Handbook of Appled Cryptography, CRC Press, [3] D. E. Knuth. The Art of Computer Programmng: Volume 2 / Sem numercal Algorthms. Addson- Wesley, 2nd edton, [4] Hellekalek Peter, Inversve Pseudorandom umber Generators: concepts, results and lnks. Department of mathematcs, Unversty of Salzburg, A-5020 Salzburg, Austra [5] Aho A., Hopcroft J., and Ullman J. The Desgn and Analyss of Computer Algorthms. Addson-Wesley, Readng, Mass., [6] Goldrech Oded, Ron Dana, Sudan Madhu, Chnese Remanderng wth errors. Proceedngs of the Thrty- Frst annual ACM Symposum on Theory of Computng [7] Bellare M., Desa A., Jokp E. and Pogaway P., A Concrete Securty Treatment of Symmetrc Encrypton: analyss of the DES modes of Operaton, Proceedngs of the 38 th Symposum on Foundatons of Computer Scence, IEEE,

Chinese Remainder. Discrete Mathematics Andrei Bulatov

Chinese Remainder. Discrete Mathematics Andrei Bulatov Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

Rational Secret Sharing without Broadcast

Rational Secret Sharing without Broadcast Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept

More information

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

Adaptive Modulation for Multiple Antenna Channels

Adaptive Modulation for Multiple Antenna Channels Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,

More information

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS Journal of Engneerng Scence and echnology Vol. 7, No. 4 ( 55-56 School of Engneerng, aylor s Unversty SECURE COMMUNICAION BY USING MULIPLE KEYS HAVING VARIABLE LENGH IN A REAL IME ENVIRONMEN FOR MULIPLE

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game 8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang

More information

MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM

MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM XIX IMEKO World Congress Fundamental and Appled Metrology September 6 11, 2009, Lsbon, Portugal MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM Potr Blsk 1,2, Wesław Wneck 2 1 Warsaw

More information

An Algorithm Forecasting Time Series Using Wavelet

An Algorithm Forecasting Time Series Using Wavelet IJCSI Internatonal Journal of Computer Scence Issues, Vol., Issue, No, January 04 ISSN (Prnt): 94-084 ISSN (Onlne): 94-0784 www.ijcsi.org 0 An Algorthm Forecastng Tme Seres Usng Wavelet Kas Ismal Ibraheem,Eman

More information

Prevention of Sequential Message Loss in CAN Systems

Prevention of Sequential Message Loss in CAN Systems Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar

More information

Revision of Lecture Twenty-One

Revision of Lecture Twenty-One Revson of Lecture Twenty-One FFT / IFFT most wdely found operatons n communcaton systems Important to know what are gong on nsde a FFT / IFFT algorthm Wth the ad of FFT / IFFT, ths lecture looks nto OFDM

More information

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent

More information

FFT Spectrum Analyzer

FFT Spectrum Analyzer THE ANNUAL SYMPOSIUM OF THE INSTITUTE OF SOLID MECHANICS SISOM 22 BUCHAREST May 16-17 ----------------------------------------------------------------------------------------------------------------------------------------

More information

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator Global Advanced Research Journal of Management and Busness Studes (ISSN: 2315-5086) Vol. 4(3) pp. 082-086, March, 2015 Avalable onlne http://garj.org/garjmbs/ndex.htm Copyrght 2015 Global Advanced Research

More information

Understanding the Spike Algorithm

Understanding the Spike Algorithm Understandng the Spke Algorthm Vctor Ejkhout and Robert van de Gejn May, ntroducton The parallel soluton of lnear systems has a long hstory, spannng both drect and teratve methods Whle drect methods exst

More information

Capacity Estimation of Non-Synchronous Covert Channels

Capacity Estimation of Non-Synchronous Covert Channels Capacty Estmaton of on-ynchronous s Zhenghong Wang and uby B. Lee Department of Electrcal Engneerng Prnceton Unversty {zhenghon,rblee}@prnceton.edu Abstract Capacty estmaton s an mportant part of covert

More information

Weighted Penalty Model for Content Balancing in CATS

Weighted Penalty Model for Content Balancing in CATS Weghted Penalty Model for Content Balancng n CATS Chngwe Davd Shn Yuehme Chen Walter Denny Way Len Swanson Aprl 2009 Usng assessment and research to promote learnng WPM for CAT Content Balancng 2 Abstract

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

MASTER TIMING AND TOF MODULE-

MASTER TIMING AND TOF MODULE- MASTER TMNG AND TOF MODULE- G. Mazaher Stanford Lnear Accelerator Center, Stanford Unversty, Stanford, CA 9409 USA SLAC-PUB-66 November 99 (/E) Abstract n conjuncton wth the development of a Beam Sze Montor

More information

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain.

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain. Journal of Advances n Computer Research Quarterly pissn: 2345-606x eissn: 2345-6078 Sar Branch, Islamc Azad Unversty, Sar, I.R.Iran (Vol. 7, No. 3, August 2016), Pages: 67-76 www.jacr.ausar.ac.r Audo Sgnal

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart Control Chart - hstory Control Chart Developed n 920 s By Dr. Walter A. Shewhart 2 Process n control A phenomenon s sad to be controlled when, through the use of past experence, we can predct, at least

More information

AN EFFICIENT SECURE UNIVERSAL BLOCK SOURCE CODING ALGORITHM FOR INTEGERS

AN EFFICIENT SECURE UNIVERSAL BLOCK SOURCE CODING ALGORITHM FOR INTEGERS AN EFFICIENT SECURE UNIVERSAL BLOCK SOURCE CODING ALGORITHM FOR INTEGERS * Mahd Nangr Department of Electrcal Engneerng, Khaje Nasr Unversty of Technology, Tehran, Iran *Author for Correspondence ABSTRACT

More information

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson 37th CDC, Tampa, December 1998 Analyss of Delays n Synchronous and Asynchronous Control Loops Bj rn Wttenmark, Ben Bastan, and Johan Nlsson emal: bjorn@control.lth.se, ben@control.lth.se, and johan@control.lth.se

More information

A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks

A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks 74 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 3, No., Aprl 0 A Fuzzy-based Routng Strategy for Multhop Cogntve Rado Networks Al El Masr, Naceur Malouch and Hcham

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

Discussion on How to Express a Regional GPS Solution in the ITRF

Discussion on How to Express a Regional GPS Solution in the ITRF 162 Dscusson on How to Express a Regonal GPS Soluton n the ITRF Z. ALTAMIMI 1 Abstract The usefulness of the densfcaton of the Internatonal Terrestral Reference Frame (ITRF) s to facltate ts access as

More information

Utility-based Routing

Utility-based Routing Utlty-based Routng Je Wu Dept. of Computer and Informaton Scences Temple Unversty Roadmap Introducton Why Another Routng Scheme Utlty-Based Routng Implementatons Extensons Some Fnal Thoughts 2 . Introducton

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

UNIT 11 TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT

UNIT 11 TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT UNIT TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT Structure. Introducton Obectves. Key Terms Used n Game Theory.3 The Maxmn-Mnmax Prncple.4 Summary.5 Solutons/Answers. INTRODUCTION In Game Theory, the word

More information

A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS

A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS Pedro Godnho and oana Das Faculdade de Economa and GEMF Unversdade de Combra Av. Das da Slva 65 3004-5

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks I. J. Communcatons, etwork and System Scences, 8, 3, 7-83 Publshed Onlne August 8 n ScRes (http://www.scrp.org/journal/jcns/). Jont Adaptve Modulaton and Power Allocaton n Cogntve Rado etworks Dong LI,

More information

Tile Values of Information in Some Nonzero Sum Games

Tile Values of Information in Some Nonzero Sum Games lnt. ournal of Game Theory, Vot. 6, ssue 4, page 221-229. Physca- Verlag, Venna. Tle Values of Informaton n Some Nonzero Sum Games By P. Levne, Pars I ), and ZP, Ponssard, Pars 2 ) Abstract: The paper

More information

Safety and resilience of Global Baltic Network of Critical Infrastructure Networks related to cascading effects

Safety and resilience of Global Baltic Network of Critical Infrastructure Networks related to cascading effects Blokus-Roszkowska Agneszka Dzula Przemysław Journal of Polsh afety and Relablty Assocaton ummer afety and Relablty emnars, Volume 9, Number, Kołowrock Krzysztof Gdyna Martme Unversty, Gdyna, Poland afety

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

STUDY ON LINK-LEVEL SIMULATION IN MULTI- CELL LTE DOWNLINK SYSTEM

STUDY ON LINK-LEVEL SIMULATION IN MULTI- CELL LTE DOWNLINK SYSTEM Proceedngs of IEEE IC-BMT0 TUDY O LIK-LEVEL IMULATIO I MULTI- CELL LTE DOWLIK YTEM Yang Zhang, Ruoyu Jn, Xn Zhang, Dacheng Yang Beng Unversty of Posts and Telecommuncatons, Beng 00876, Chna 05330@bupt.edu.cn

More information

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014 Gudelnes for CCPR and RMO Blateral Key Comparsons CCPR Workng Group on Key Comparson CCPR-G5 October 10 th, 2014 These gudelnes are prepared by CCPR WG-KC and RMO P&R representatves, and approved by CCPR,

More information

Energy Efficiency Analysis of a Multichannel Wireless Access Protocol

Energy Efficiency Analysis of a Multichannel Wireless Access Protocol Energy Effcency Analyss of a Multchannel Wreless Access Protocol A. Chockalngam y, Wepng u, Mchele Zorz, and Laurence B. Mlsten Department of Electrcal and Computer Engneerng, Unversty of Calforna, San

More information

Dynamic Resource Allocation Algorithm of UAS by Network Environment and Data Requirement

Dynamic Resource Allocation Algorithm of UAS by Network Environment and Data Requirement Dynamc Resource Allocaton Algorthm of UAS by Network Envronment and Data Requrement Hye-Rm Cheon, Jun-Woo Cho, and Jae-Hyun Km Department of Electrcal and Computer Engneerng Ajou Unversty Suwon, Republc

More information

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona

More information

MULTILAYER PERCEPTRON GUIDED KEY GENERATION THROUGH MUTATION WITH RECURSIVE REPLACEMENT IN WIRELESS COMMUNICATION (MLPKG)

MULTILAYER PERCEPTRON GUIDED KEY GENERATION THROUGH MUTATION WITH RECURSIVE REPLACEMENT IN WIRELESS COMMUNICATION (MLPKG) Internatonal Journal on AdHoc Networkng Systems (IJANS) Vol. 2, No. 3, July 2012 MULTILAYER PERCEPTRON GUIDED KEY GENERATION THROUGH MUTATION WITH RECURSIVE REPLACEMENT IN WIRELESS COMMUNICATION (MLPKG)

More information

Redes de Comunicação em Ambientes Industriais Aula 8

Redes de Comunicação em Ambientes Industriais Aula 8 Redes de Comuncação em Ambentes Industras Aula 8 Luís Almeda lda@det.ua.pt Electronc Systems Lab-IEETA / DET Unversdade de Avero Avero, Portugal RCAI 2005/2006 1 In the prevous epsode... Cooperaton models:

More information

Priority based Dynamic Multiple Robot Path Planning

Priority based Dynamic Multiple Robot Path Planning 2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna

More information

Test 2. ECON3161, Game Theory. Tuesday, November 6 th

Test 2. ECON3161, Game Theory. Tuesday, November 6 th Test 2 ECON36, Game Theory Tuesday, November 6 th Drectons: Answer each queston completely. If you cannot determne the answer, explanng how you would arrve at the answer may earn you some ponts.. (20 ponts)

More information

A Lower Bound for τ(n) of Any k-perfect Numbers

A Lower Bound for τ(n) of Any k-perfect Numbers Pure Mathematcal Scences, Vol. 4, 205, no. 3, 99-03 HIKARI Ltd, www.m-har.com http://dx.do.org/0.2988/pms.205.4923 A Lower Bound for τn of Any -Perfect Numbers Keneth Adran P. Dagal Department of Mathematcs

More information

Ultimate X Bonus Streak Analysis

Ultimate X Bonus Streak Analysis Ultmate X Bonus Streak Analyss Gary J. Koehler John B. Hgdon Emnent Scholar, Emertus Department of Informaton Systems and Operatons Management, 35 BUS, The Warrngton College of Busness, Unversty of Florda,

More information

High Speed ADC Sampling Transients

High Speed ADC Sampling Transients Hgh Speed ADC Samplng Transents Doug Stuetzle Hgh speed analog to dgtal converters (ADCs) are, at the analog sgnal nterface, track and hold devces. As such, they nclude samplng capactors and samplng swtches.

More information

A Predictive QoS Control Strategy for Wireless Sensor Networks

A Predictive QoS Control Strategy for Wireless Sensor Networks The 1st Worshop on Resource Provsonng and Management n Sensor Networs (RPMSN '5) n conjuncton wth the 2nd IEEE MASS, Washngton, DC, Nov. 25 A Predctve QoS Control Strategy for Wreless Sensor Networs Byu

More information

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

Power Minimization Under Constant Throughput Constraint in Wireless Networks with Beamforming

Power Minimization Under Constant Throughput Constraint in Wireless Networks with Beamforming Power Mnmzaton Under Constant Throughput Constrant n Wreless etworks wth Beamformng Zhu Han and K.J. Ray Lu, Electrcal and Computer Engneer Department, Unversty of Maryland, College Park. Abstract In mult-access

More information

Define Y = # of mobiles from M total mobiles that have an adequate link. Measure of average portion of mobiles allocated a link of adequate quality.

Define Y = # of mobiles from M total mobiles that have an adequate link. Measure of average portion of mobiles allocated a link of adequate quality. Wreless Communcatons Technologes 6::559 (Advanced Topcs n Communcatons) Lecture 5 (Aprl th ) and Lecture 6 (May st ) Instructor: Professor Narayan Mandayam Summarzed by: Steve Leung (leungs@ece.rutgers.edu)

More information

Phasor Representation of Sinusoidal Signals

Phasor Representation of Sinusoidal Signals Phasor Representaton of Snusodal Sgnals COSC 44: Dgtal Communcatons Instructor: Dr. Amr Asf Department of Computer Scence and Engneerng York Unversty Handout # 6: Bandpass odulaton Usng Euler dentty e

More information

Accelerated Modular Multiplication Algorithm of Large Word Length Numbers with a Fixed Module

Accelerated Modular Multiplication Algorithm of Large Word Length Numbers with a Fixed Module Accelerated Modular Multplcaton Algorthm of Large Word Length Numbers wth a Fxed Module Nkolaos Bards 1, Athanasos Drgas 1, Alexander Markovskyy, and John Vrettaros 1 1 Natonal Centre for Scentfc Research

More information

Learning Ensembles of Convolutional Neural Networks

Learning Ensembles of Convolutional Neural Networks Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)

More information

Traffic balancing over licensed and unlicensed bands in heterogeneous networks

Traffic balancing over licensed and unlicensed bands in heterogeneous networks Correspondence letter Traffc balancng over lcensed and unlcensed bands n heterogeneous networks LI Zhen, CUI Qme, CUI Zhyan, ZHENG We Natonal Engneerng Laboratory for Moble Network Securty, Bejng Unversty

More information

Application of Intelligent Voltage Control System to Korean Power Systems

Application of Intelligent Voltage Control System to Korean Power Systems Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon

More information

THE ARCHITECTURE OF THE BROADBAND AMPLIFIERS WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON EMITTER

THE ARCHITECTURE OF THE BROADBAND AMPLIFIERS WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON EMITTER VOL. 0, NO. 8, OCTOBE 205 ISSN 89-6608 2006-205 Asan esearch Publshng Network (APN. All rghts reserved. THE ACHITECTUE OF THE BOADBAND AMPLIFIES WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON

More information

Exact Probabilistic Analysis of the Limited Scheduling Algorithm for Symmetrical Bluetooth Piconets

Exact Probabilistic Analysis of the Limited Scheduling Algorithm for Symmetrical Bluetooth Piconets Exact Probablstc Analyss of the Lmted Schedulng Algorthm for Symmetrcal Bluetooth Pconets Gl Zussman *, Ur Yechal 2, and Adran Segall Department of Electrcal Engneerng Technon Israel Insttute of Technology,

More information

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,

More information

Implementation Complexity of Bit Permutation Instructions

Implementation Complexity of Bit Permutation Instructions Implementaton Complexty of Bt Permutaton Instructons Zhje Jerry Sh and Ruby B. Lee Department of Electrcal Engneerng, Prnceton Unversty, Prnceton, NJ 085 USA {zsh, rblee}@ee.prnceton.edu Abstract- Several

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

Information-Theoretic Comparison of Channel Capacity for FDMA and DS-CDMA in a Rayleigh Fading Environment

Information-Theoretic Comparison of Channel Capacity for FDMA and DS-CDMA in a Rayleigh Fading Environment WSEAS TRANSATIONS on OMMUNIATIONS Informaton-Theoretc omparson of hannel apacty for FDMA and DS-DMA n a Raylegh Fadng Envronment PANAGIOTIS VARZAAS Department of Electroncs Technologcal Educatonal Insttute

More information

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu

More information

Performance Analysis of the Weighted Window CFAR Algorithms

Performance Analysis of the Weighted Window CFAR Algorithms Performance Analyss of the Weghted Wndow CFAR Algorthms eng Xangwe Guan Jan He You Department of Electronc Engneerng, Naval Aeronautcal Engneerng Academy, Er a road 88, Yanta Cty 6400, Shandong Provnce,

More information

Maximizing Lifetime of Sensor-Target Surveillance in Wireless Sensor Networks

Maximizing Lifetime of Sensor-Target Surveillance in Wireless Sensor Networks Maxmzng Lfetme of Sensor-Target Survellance n Wreless Sensor Networks Ha Lu, Xaowen Chu, Yu-Wng Leung Computer Scence, Hong Kong Baptst Unversty Xaohua Ja, Peng-Jun Wan Computer Scence, Cty Unversty of

More information

Exploiting Dynamic Workload Variation in Low Energy Preemptive Task Scheduling

Exploiting Dynamic Workload Variation in Low Energy Preemptive Task Scheduling Explotng Dynamc Worload Varaton n Low Energy Preemptve Tas Schedulng Lap-Fa Leung, Ch-Yng Tsu Department of Electrcal and Electronc Engneerng Hong Kong Unversty of Scence and Technology Clear Water Bay,

More information

Selective Sensing and Transmission for Multi-Channel Cognitive Radio Networks

Selective Sensing and Transmission for Multi-Channel Cognitive Radio Networks IEEE INFOCOM 2 Workshop On Cogntve & Cooperatve Networks Selectve Sensng and Transmsson for Mult-Channel Cogntve Rado Networks You Xu, Yunzhou L, Yfe Zhao, Hongxng Zou and Athanasos V. Vaslakos Insttute

More information

Distributed Uplink Scheduling in EV-DO Rev. A Networks

Distributed Uplink Scheduling in EV-DO Rev. A Networks Dstrbuted Uplnk Schedulng n EV-DO ev. A Networks Ashwn Srdharan (Sprnt Nextel) amesh Subbaraman, och Guérn (ESE, Unversty of Pennsylvana) Overvew of Problem Most modern wreless systems Delver hgh performance

More information

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks

The Impact of Spectrum Sensing Frequency and Packet- Loading Scheme on Multimedia Transmission over Cognitive Radio Networks Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. The Impact of Spectrum Sensng Frequency and Pacet- Loadng

More information

Relevance of Energy Efficiency Gain in Massive MIMO Wireless Network

Relevance of Energy Efficiency Gain in Massive MIMO Wireless Network Relevance of Energy Effcency Gan n Massve MIMO Wreless Network Ahmed Alzahran, Vjey Thayananthan, Muhammad Shuab Quresh Computer Scence Department, Faculty of Computng and Informaton Technology Kng Abdulazz

More information

Methods for Preventing Voltage Collapse

Methods for Preventing Voltage Collapse Methods for Preventng Voltage Collapse Cláuda Res 1, Antóno Andrade 2, and F. P. Macel Barbosa 3 1 Telecommuncatons Insttute of Avero Unversty, Unversty Campus of Avero, Portugal cres@av.t.pt 2 Insttute

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

MODEL ORDER REDUCTION AND CONTROLLER DESIGN OF DISCRETE SYSTEM EMPLOYING REAL CODED GENETIC ALGORITHM J. S. Yadav, N. P. Patidar, J.

MODEL ORDER REDUCTION AND CONTROLLER DESIGN OF DISCRETE SYSTEM EMPLOYING REAL CODED GENETIC ALGORITHM J. S. Yadav, N. P. Patidar, J. ABSTRACT Research Artcle MODEL ORDER REDUCTION AND CONTROLLER DESIGN OF DISCRETE SYSTEM EMPLOYING REAL CODED GENETIC ALGORITHM J. S. Yadav, N. P. Patdar, J. Sngha Address for Correspondence Maulana Azad

More information

Decomposition Principles and Online Learning in Cross-Layer Optimization for Delay-Sensitive Applications

Decomposition Principles and Online Learning in Cross-Layer Optimization for Delay-Sensitive Applications Techncal Report Decomposton Prncples and Onlne Learnng n Cross-Layer Optmzaton for Delay-Senstve Applcatons Abstract In ths report, we propose a general cross-layer optmzaton framework n whch we explctly

More information

Machine Learning in Production Systems Design Using Genetic Algorithms

Machine Learning in Production Systems Design Using Genetic Algorithms Internatonal Journal of Computatonal Intellgence Volume 4 Number 1 achne Learnng n Producton Systems Desgn Usng Genetc Algorthms Abu Quder Jaber, Yamamoto Hdehko and Rzauddn Raml Abstract To create a soluton

More information

Queuing-Based Dynamic Channel Selection for Heterogeneous Multimedia Applications over Cognitive Radio Networks

Queuing-Based Dynamic Channel Selection for Heterogeneous Multimedia Applications over Cognitive Radio Networks 1 Queung-Based Dynamc Channel Selecton for Heterogeneous ultmeda Applcatons over Cogntve Rado Networks Hsen-Po Shang and haela van der Schaar Department of Electrcal Engneerng (EE), Unversty of Calforna

More information

Keywords LTE, Uplink, Power Control, Fractional Power Control.

Keywords LTE, Uplink, Power Control, Fractional Power Control. Volume 3, Issue 6, June 2013 ISSN: 2277 128X Internatonal Journal of Advanced Research n Computer Scence and Software Engneerng Research Paper Avalable onlne at: www.jarcsse.com Uplnk Power Control Schemes

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

On Sensor Fusion in the Presence of Packet-dropping Communication Channels

On Sensor Fusion in the Presence of Packet-dropping Communication Channels On Sensor Fuson n the Presence of Packet-droppng Communcaton Channels Vjay Gupta, Babak Hassb, Rchard M Murray Abstract In ths paper we look at the problem of multsensor data fuson when data s beng communcated

More information

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method A Novel GNSS Weak Sgnal Acquston Usng Wavelet Denosng Method Jn Tan, Lu Yang, BeHang Unversty, P.R.Chna BIOGRAPHY Jn Tan s a post-doctor n School of Electronc and Informaton Engneerng, BeHang Unversty,

More information