Energy-efficient scheduling and hybrid communication architecture for underwater littoral surveillance
|
|
- Felix Little
- 5 years ago
- Views:
Transcription
1 Computer Communictions xxx (26) xxx xxx Energy-efficient scheduling nd hybrid communiction rchitecture for underwter littorl surveillnce Mihel Crdei * Deprtment of Computer Science nd Engineering, Florid Atlntic University, Boc Rton, FL 33431, USA Received 9 Jnury 26; ccepted 9 Jnury 26 Abstrct There exists high demnd for relible, high cpcity underwter coustic networks to llow efficient dt gthering nd informtion exchnge. This is evidenced by significnt reserch in overcoming the limittions of the shllow wter coustic chnnel, such s low bndwidth, highly vrying multipth effects nd lrge propgtion delys. This pper proposes n energy-efficient scheduling mechnism for sclble network topology with hybrid RF-coustic communiction rchitecture, designed for underwter littorl surveillnce pplictions. In combintion with sclble buoy positioning scheme tht ssures AUV underwter synchroniztion nd position computtion, we propose Time Division Multiple Access scheduling technique for underwter communiction tht chieves energy-efficient, collision-free dt exchnge on the low dt rte coustic chnnel. We mesure the performnce of the communiction rchitecture by extensive simultions using the Opnet network simultor. Ó 26 Elsevier B.V. All rights reserved. Keywords: Ad hoc wireless networks; Network topology; Energy-efficient scheduling; Communiction rchitecture; Autonomous underwter vehicles; Underwter littorl surveillnce 1. Introduction Recent dvnces in the shllow-wter underse monitoring, surveillnce nd explortion demnd using the underwter coustic communiction chnnel s the primry medium for dt collection nd informtion exchnge. The communiction network usully includes utonomous underwter vehicles (AUVs) interconnected by coustic modems nd one or more surfce gtewys which provides links to commnd nd control center, which cn further be connected to bckbone network, such s the Internet. Surfce communiction cn be done using RF or stellite links. Applictions of deploying AUVs in shllow-wter includes underse surveillnce in littorl wters, ocenogrphic dt gthering, environmentl monitoring, nd costl defense. One of the mjor chllenges in underwter coustic networking is the development of networking protocols to * Tel.: ; fx: E-mil ddress: mihel@cse.fu.edu. overcome hrsh communiction conditions. Physicl lyer considertions include limited bndwidth, extreme propgtion delys, signl bsorption, time-vrying multipth with severe intersymbol interference nd lrge Doppler shifts [13]. These physicl lyer limittions dversely impct throughput, ltency, nd cpcity. Since the coustic network components re btterypowered, power efficiency is n importnt chrcteristic of the underwter communiction protocols. Designing energy-efficient scheduling nd communiction mechnisms hve n importnt role in prolonging the network opertionl lifetime. There exist lrge volume of reserch ddressing the difficulties of underwter coustic networks nd proposing solutions t different lyers of the network rchitecture. In [13,15], uthors present comprehensive survey of existing network technology t the physicl, dt link nd network lyers nd their pplicbility to underwter coustic chnnels. A cluster-bsed communiction protocol is proposed in [11]. Adjcent underwter vehicles re grouped into clus /$ - see front mtter Ó 26 Elsevier B.V. All rights reserved. doi:1.116/j.comcom
2 2 M. Crdei / Computer Communictions xxx (26) xxx xxx ters in which in-cluster communiction is chieved through TDMA nd inter-cluster communiction uses CDMA. The focus of this pper is on cluster mintennce, tht needs to ccommodte dynmic topology with mobile vehicles. The Deployble Autonomous Distributed Systems (DADS) [1] re motivted by requirement for wide-re underse surveillnce in littorl wters. The network connects the remote sensor pltforms through gtewy (e.g., se-surfce buoy) to distnt mster node cross stellite links. Acoustic dt is trnsmitted over multihop pths, using hlf-duplex CDMA links between discrete modem pirs nd three-wy hndshke protocol for dt trnsfer between ech pir of nodes. The pper lso describes series of ocen experiments nd mesurements. The work in [18] proposes networking protocol for underwter coustic networks of fixed or mobile nodes. The uthors propose centrlized topology control scheme by periodic topology discovery probes. The routing protocol proposed is centrlized, where the mster node determines ll routes through the network. CDMA technique is used for multiple ccess to the communiction medi. In this pper, we design shllow wter energy-efficient scheduling mechnism nd communiction rchitecture for littorl surveillnce ppliction. Our model includes (1) number of AUVs deployed for shllow-wter underse surveillnce, (2) number of se-surfce buoys tht ct s gtewy between the underwter coustic network (ACnet) nd the RF network (RFnet), nd (3) centrl commnd nd control sttion on ship positioned in close proximity to the surveillnce re. The reminder of this pper is structured s follows. Section 2 presents the networking model with prmeters considered for ACnet nd RFnet. In Section 3, we describe the littorl surveillnce scenrio nd problem definition. Next, we present the network rchitecture design in Section 4. We continue with our energy-efficient scheduling mechnism. Buoys rrngement mechnism is presented in Section 5, followed by the TDMA slot lloction lgorithm in Section 6. Section 7 presents performnce nlysis for simultion results nd Section 8 concludes our pper. 2. Hybrid networking model Underwter communiction is severely limited by the physicl lyer chrcteristics of the communiction medium. Usully, coustic networks in shllow wter support dt rte of 1 1 bps [18], lthough higher dt rtes of 16 kbps re reported in [12]. The vilble bndwidth for n coustic network is typiclly round 15 khz, nd it hs to be shred mong ll coustic nodes. Three mjor multiple ccess methods re Time Division Multiple Access (TDMA), Frequency Division Multiple ccess (FDMA), nd Code Division Multiple Access (CDMA) [17]. The work in [13] compres these methods from the point of view of shllow wter coustic communiction network. CDMA nd spred-spectrum signling pper to be promising multiple ccess technique. Another key fctor is the coustic signl propgtion speed of pproximtely 15 m/s, five orders of mgnitude lower thn tht of rdio chnnel. The lrge propgtion delys directly ffect the chievble throughput. Also, the signl rnge of n AUV vries from few kilometers up to 9 km [4]. The ppliction we re ddressing in this pper is underwter littorl surveillnce. The environment we consider is shllow wter, with depth less thn 5 feet. The hybrid network topology we consider is illustrted in Fig. 1 nd its components re described next. The rchitecture elements in our model re AUVs, buoys, nd centrl commnd nd control sttion, hosted on ship. Buoys nd the centrl sttion re considered fixed pltforms nd the AUVs re mobile sensor pltforms. In this pper, we use chrcteristics of the wireless equipment vilble t the Florid Atlntic University (FAU), the Deprtment of Ocen Engineering [1]. AUVs nd buoys cn communicte wireless to synchronize nd to shre informtion. Ech AUV nd buoy is equipped with FAU Dul Purpose Acoustic Modem (FAU-DPAM) [1,8]. A DPAM hs two trnsceivers: the first trnsceiver hs n RF rdio with 2.4 GHz trnsmitter with omnidirectionl ntenn for the surfce wireless communiction, hving 3 km rnge. Fig. 1. Hybrid RF-Acoustic Network Components.
3 M. Crdei / Computer Communictions xxx (26) xxx xxx 3 We ssume dt rte of 1 Mbps. Higher dt rte COTS products re vilble [14]. The ship hs only RF connectivity. the second trnsceiver is using n coustic chnnel in the khz bnd for underwter coustic communiction; the communiction rnge is bout 3 km with dt rte of 3 bps using Direct Sequence Spred Spectrum (DSSS) with Multiple Frequency-Shift Keying (MFSK) or it cn be bout 5 m with dt rte of 15 kbps by using DSSS with Phse-Shift Keying (PSK) [17]. In this pper, we ssume communiction rnge of 3 km nd dt rte of 3 bps. The AUVs re lmost ll the time moving with speed less thn 3 m/s. Their min tsk in this model is to monitor the costl ocen environment nd detect mines nd other suspect objects. Ech AUV is equipped with Side Scn Sonr HF Acoustic chirp [2] t 5 khz, with sensing rnge of bout 1.5 miles. Every AUV is lso equipped with cmer. When mine or nother potentilly dngerous object is detected, the AUV tkes one or more pictures (of bout 25 kbytes ech) tht need to be sent immeditely to the ship. Additionlly, n AUV is lso equipped with Globl Positioning System (GPS) receiver used for periodic time synchroniztion nd positioning when the AUV surfces. Fixed buoys provide communiction support for littorl AUV missions. In our model, buoys re deterministiclly plced t the beginning of the mission by specilized submrines. Buoy deployment positioning is detiled in Section 5. Buoys re equipped with GPS, llowing them to precisely determine time nd their loction. Buoys periodiclly brodcst their loction on the coustic network, llowing AUVs within trnsmission rnge to tringulte their own loction while being submerged. Both AUVs nd buoys re bttery-powered, nd therefore preserving energy resources by scheduling nd efficient communiction will increse the network lifetime. Beside AUVs nd buoys, the topology contins centrl commnd nd control sttion on ship. In our model, we ssume the ship is positioned within RF communiction rnge of t lest one buoy. Our rchitecture ssumes the ship is moving t low speed, or is sttionry. The hybrid wireless network consists of two d hoc wireless networks. The RF wireless network (RFnet) runs bove the ocen surfce, nd is formed by buoys, the ship nd the AUVs (while t surfce). The RFnet hs dynmic topology t the edges, becuse every AUV joins this network only when it reches the surfce nd must communicte t high speed. The RF network hs dt rte of 1 Mbps in the 2.4 GHz frequency bnd. Trnsceivers for RFnet re vilble for long rnge outdoors communiction. For exmple, MikroTik Wireless LAN USB dpter [14] uses 2.4 GHz DSSS rdio trnsmission, for dt rte of 11 Mbps, nd hs rnge of up to 5 km for outside environments. The trnsmit power is 32 mw. The second wireless network is the underwter ACoustic network (ACnet). The nodes in the ACnet re buoys nd AUVs nd they communicte using the coustic trnsceiver on the FAU-DPAM modem. As we discussed in the previous prgrphs, the communiction in the coustic network is severely limited by the physicl properties of the coustic chnnel in shllow wter. The interfce between the RFnet nd ACnet cn be ccomplished in two wys. First, buoys re prt of both networks, bsed on their dul modem, therefore they re ble to trnsfer informtion between the two networks. Second, the AUVs cn surfce nd join the RFnet. 3. Problem definition nd surveillnce scenrio In this pper, we ddress the underwter littorl surveillnce ppliction. A number of AUVs re deployed nd re using their sonr sensing cpbilities to detect mines or other relted trgets. Once suspicious object is detected, trget informtion needs to be reported immeditely to the ship, cross the wireless hybrid network. Our gol in this pper is to design n energy-efficient scheduling mechnism nd communiction rchitecture solution for underwter littorl surveillnce pplictions with the following requirements: (1) ccommodte the hrsh underwter coustic communiction prmeters (2) to relibly trnsmit to the ship, with high priority, messges from AUVs bout detected trgets (3) to periodiclly nd relibly send updtes with AUV sttus nd loction (4) to periodiclly trnsmit updtes to the ship on buoy sttus, nd (5) to relibly trnsmit commnds nd/or queries from ship to AUVs or buoys. With these requirements, we describe littorl surveillnce mission scenrio consisting of the following phses: Buoys nd AUVs deployment. This phse occurs t the beginning of the mission. The buoys nd AUVs re deployed by specilized submrine or by ship. We ssume the buoys re deterministiclly plced, s specified in Section 5. We lso ssume every AUV nd buoy hs ssigned unique ID. After deployment, the buoys nd AUVs strt the network initiliztion step. Network initiliztion. During the initiliztion phse, buoys nd the ship orgnize into n d hoc RF wireless network (RFnet) nd strt the routing protocol initiliztion. This opertion consists in exchnging short control messges nd constructing the routing tbles, in ccordnce with the routing protocol employed. Once n AUV is deployed, it goes to the surfce nd sends n initiliztion messge to the ship over the RFnet. This messge contins the AUV ID nd its current loction. Bsed on this informtion nd using our scheduling lgorithms, the ship replies with messge contining coordintes of the surveillnce region (where this AUV will perform the sensing tsk) nd TDMA slot. This TDMA slot will be used by the AUV for communiction in the ACnet. Division of
4 4 M. Crdei / Computer Communictions xxx (26) xxx xxx the surveillnce re in surveillnce regions is described in Section 5. TDMA slot lloction is discussed in Section 6. Idle network opertion. This phse describes the network opertion between trget detection events. The min tsk of the RFnet is to mintin the routing informtion updted, by periodiclly exchnging control informtion in ccordnce with the routing protocol used. Every buoy is responsible for periodiclly sending sttus report messges to the ship, contining informtion bout its stte (e.g., OK/CriticlCondition) nd list with AUVs in its rnge. We will refer to this messge s the sttusupdte messge. Next, we describe the opertions performed in the ACnet. Every AUV nd buoy will periodiclly send short messge with nvigtion control informtion. We refer to these messges s buoy becons nd AUV becons, respectively. A buoy becon contins the buoy ID, GPS-bsed loction nd time informtion, nd other ppliction specific informtion. For exmple buoy becon my encode short commnd sent from the ship to n AUV. An AUV becon contins the AUV ID, flight time, loction, speed, bering, nd one or more fields used for ACK nd dt exchnge. Ech AUV listens to other buoy becons nd AUV becons. Bsed on our design, every AUV moves into surveillnce region with the property ny point is within underwter coustic trnsmission rnge of t lest three buoys. Using loction nd time informtion from t lest three buoys, the AUV is ble to synchronize its clock nd compute its current loction through tringultion [5] while submerged. Informtion from other AUV becons is used for collision voidnce nd other nvigtion purposes. Every time n AUV gets to the surfce, it will use its GPS for precise time nd loction lignment. The system is lso chrcterized by GPS-updte-time ttribute. At most every GPS-updte-time, n AUV surfce to get synchronized. Every buoy listens for AUV becons nd updtes its AUV dtbse informtion. The min opertion performed by AUVs is sensing. Every AUV is equipped with Side Scn Sonr HF Acoustic chirp. The AUVs nvigte nd continuously monitor their environment. Trget detection. This phse strts when n AUV detects mine or suspicious trget. Ech AUV is equipped with digitl cmer. When trget is detected, the AUV cptures one or more photogrphs tht need to be sent with high priority to the ship. Becuse of the limittions in dt rte nd signl dely in the ACnet, it is not fesible to hve AUVs send lrge dt messges (e.g., pictures) over long distnces on the underwter network. The solution we dopt is to hve n AUV tht detects trget go to the surfce, join the RFnet nd strt messge exchnge with the ship. In our communiction protocol, the AUV sends in the fist messge one picture to the ship nd then wits for n cknowledgment, query or commnd from the ship. While witing for the reply, the AUV performs GPS loction nd time updte. If n cknowledgment is received, the AUV dives nd continues the surveillnce process. The AUV cn lso receive query from the ship, sking for more pictures (lredy vilble t the AUV), cse in which the AUV strts trnsmitting the required informtion nd wits for new ship reply. Besides these two replies, the ship my commnd the AUV to go to specific loction within its surveillnce region nd monitor the environment. In this cse, the AUV dives, strts the sonr, sets the new wypoint nd begins its new tsk. New sensing tsk. The ship cn explicitly sk n AUV to nvigte t specific loction in its surveillnce region nd collect dt. The messge is sent by the ship cross the RFnet to the buoys tht re within this AUV s communiction rnge. These buoys will then trnsmit this commnd on the ACnet, piggybcked in buoy becon. Mission termintion. This opertion is ccomplished by hving the ship sending specil Termintion control pcket to every AUV. Upon receiving this messge, n AUV performs the termintion procedure, nvigting towrd specific pick-up loction. 4. Hybrid network rchitecture design In this section, we describe the networking rchitecture for the ACnet nd RFnet. In n underwter coustic environment, the communiction mechnism needs to consider poor conditions in terms of ltency nd dt rte. We design the ACnet rchitecture to include only Physicl, Dt Link, nd Appliction Lyers. Our model does not require network protocol, becuse the only communiction in ACnet is AUV nd buoy becon brodcst. This is n one-hop informtion exchnge, where nodes do not forwrd the messge they receive. The Physicl Lyer uses DSSS with MFSK with dt rte of 3 bps nd communiction rnge R = 3 km, ccording with the chrcteristics of the FAU-DPAM modem, coustic trnsceiver (see Section 2). The multiple ccess scheduling method we dopt for the underwter communiction is TDMA. TDMA voids collisions by llocting time slot to every AUV nd buoy. It is n energy-efficient scheduling mechnism since it voids dditionl control messges exchnge. For exmple, TDMA scheduling mechnism voids the hndshke overhed of wireless MAC protocols such s Crrier Sense Multiple Access with Collision Avoidnce (CSMA-CA), nd Multiple Access with Collision Avoidnce-derived protocols like MACAW (MACA for Wireless) nd IEEE [16] protocols. Actully, MAC trnsmission protocol involving lrge number of messge exchnge is lso not fesible becuse of the long propgtion delys in coustic networks.
5 M. Crdei / Computer Communictions xxx (26) xxx xxx 5 Bsed on the buoy deployment mechnism (see Section 5), five TDMA slots from the TDMA frme will be ssigned to the buoys, s represented in Fig. 3 nd ll other will be ssigned to the AUVs. The scheduling using the TDMA slot lloction mechnism is further detiled in Section 6. AUVs nd buoys use the TDMA slots for sending short becons in the ACnet nd not for lrge dt trnsmissions. For exmple, if we design becon with 32 bytes, then we cn hve TDMA slot of 3 s. This will suffice for.85 s becon trnsmission delys nd 2 s propgtion dely t 3 km distnce. The RFnet network is used for trnsmitting long messges between the AUVs nd ship, for sttus-updte messges nd to issue commnds from the ship to the AUVs. A ship commnd ddressed to submerged AUV will be sent to the buoys in the communiction rnge of tht AUV. This is esy to implement, bsed on informtion from the sttus-updte messges received by the ship from buoys. The RFnet rchitecture is typicl to n IP d hoc wireless networks nd includes the Physicl nd Dt Link lyers, nd the TCP/IP Network nd Trnsport lyers. At the Physicl Lyer, we ssume the following ttributes: rdio frequency 2.4 GHz, DSSS signl spreding technique, dt rte of 1 Mbps nd communiction rnge of 3 km. The RF communiction rnge should be greter or equl to the coustic communiction rnge in order to hve ny AUV t the surfce within RF trnsmission rnge of t lest one buoy. The MAC protocol used in the RFNet is IEEE Distributed Coordintion Function (DCF). At the Network Lyer, we use rective routing protocol for d hoc wireless networks, such s Dynmic Source Routing (DSR) or Ad Hoc On-Demnd Distnce Vector (AODV). In our simultions we use DSR for its good performnces in terms of relibility, routing overhed nd pth optimlity [6,7]. When n AUV joins the RFnet for informtion exchnge it lso runs the selected d hoc routing protocol but is not involved in dt forwrding on behlf of other nodes. It is only lef in the network topology. At the Trnsport Lyer, we use the TCP protocol [16] for its relible communiction nd congestion voidnce mechnism. It is well-known tht TCP performs poorly in multihop wireless networks [3], due to its inbility to differentite between retrnsmissions due to congestion versus pcket loss. In our ppliction scenrio AUVs find trgets infrequently nd ll high dt rte trffic is sent towrds the ship node, thus congestion my occur. 5. Buoy positioning The positioning of the buoys plys n importnt role in our scheduling mechnism. The fctors we considered in designing mechnism for computing the buoy loctions re the following: Mission specifics. The mission considered in this pper is littorl surveillnce, where AUVs re moving long the costline. AUV loction. AUVs need to be ble to tringulte their loction bsed on the GPS informtion included in the periodic buoy becons. At ny time ech AUV should be within trnsmission rnge of t lest three buoys. Minimized number of buoy slots. The underwter communiction protocol proposed in this pper is TDMA, nd, becuse the frme period is limited (see Section 6), the number of slots llocted to the buoys should be minimized. Mximized surveillnce re. The surveillnce re where AUVs nvigte should be mximized. Note tht ny point within the nvigtion re should be within the communiction rnge of t lest three buoys for loction identifiction. Bsed on these considertions, we rrnge the buoys in two rows long the costline in order to provide rectngulr surveillnce re (see Fig. 2) with the property tht ny point within this re is within communiction rnge of t lest three buoys. Therefore, ny AUV nvigting within this rectngle receives periodic becons from t lest three buoys, nd will be ble to periodiclly updte its loc- Fig. 2. Buoy positioning for n = 8 buoys.
6 6 M. Crdei / Computer Communictions xxx (26) xxx xxx tion through tringultion. The distnce between two buoys in the sme row is equl to R, where R is the underwter communiction rnge of the buoys nd AUVs (e.g., R is set up to 3 km). Next, we will determine the reltive loction of the two rows in order to mximize the surveillnce re. Let us consider the first row fixed nd the Crtesin coordinte system s in Fig. 2. We neglect in this discussion the verticl coordinte, becuse the mission is performed in shllow wter, with depth less thn 5 feet, much smller thn the vlues in the other two horizontl coordintes. We consider n buoys B 1, B 2, B 3,..., B n deployed s in Fig. 2. We orgnize them in two rows, with B 1, B 3,... in the first row nd B 2, B 4,... in the second row. Next, we compute the loction of the second row (e.g., determine d x nd d y ), in order to mximize the surveillnce rectngle re. In the picture, we hve represented the two buoy rows nd their communiction disk, inside circle with rdius R. In the Fig. 2, we cn observe tht the points U 1, U 1, U 2, U 2,...nd L 1, L 1, L 2, L 2,...estblish the upper nd lower rectngle edges. The points right bove U 1, U 1, U 2, U 2,... or below L 1, L 1, L 2, L 2,... re not within communiction rnge of three buoys. The rectngle width cn be expressed s W ¼ minfy U 2 y L2 ; y U y 2 L g, where x A nd y A re the 2 x nd y coordintes of the point A. Considering d y fixed, bsic geometric computtion indictes tht W is mximized when d x = R/2, cse when both U 1, U 1, U 2, U 2 ;... nd L 1, L 2, L 2, L 3,... re colliner. The left edge of the rectngle is determined by the intersection point (e.g., U 1 ) of the circle with rdius R centered t the third buoy from left (e.g., B 3 ) with the upper edge, nd the right edge of the rectngle is determined by the intersection point (e.g., L 3 ) of the circle with rdius R centered t the third buoy from right (e.g., B 6 ) with the lower edge. Note tht there will be other points in the rectngle s vicinity tht will be covered by t lest three buoys, but our gol is to determine rectngulr shpe with this property. p Next we wnt to determine d y 2½; R ffiffi 3 =2Š such tht to mximize p the surveillnce rectngle re, Are = W L. d y ¼ R ffiffi 3 =2 corresponds to the p cse when B 1 B 2 = B 2 B 3 = B 1 B 3 = R nd W ¼ R ffiffi p 3 =2. Cses d y > R ffiffi p 3 =2 re not considered, s they produce W < R ffiffi 3 =2. Using the geometric computtion presented rffiffiffiffiffiffiffiffiffiffiffiffi in Appendix A, we obtin tht W ðd y Þ¼ 3R 7R 2 4y 2 d nd 2 9R 2 þ4y 2 d rffiffiffiffiffiffiffiffiffiffiffiffi 7R Lðn; d y Þ¼ðn 2ÞR=2 d 2 4d 2 y y for ny n P 3. Tking 9R 2 þ4d 2 y dðw ðdyþþ dðd yþ the derivtive, we obtin 6 nd dðlðn;dyþþ dðd yþ <, when p d y 2½; R ffiffiffi 3 =2Š. Therefore, W (dy ) nd L n (d y ) re decresing functions of d y, chieving the mximum vlue when d y =. An importnt gol of deploying buoys is to brodcst GPS informtion. In order for the AUVs to perform the tringultion lgorithm, the buoys cnnot be colliner, therefore d y needs to be greter thn specific threshold. We ssume d y = d, where d is the minimum vlue required in the tringultion lgorithm. Note tht this buoy orgniztion is sclble. Additionl buoys cn be deployed to increse the surveillnce length. Any dditionl buoy will increse the length with R/2. Also, by using this rrngement, only five TDMA slots will suffice for the buoys coustic communiction. TDMA slot lloction is presented in Section 6. Another observtion is tht buoys re nchored t the ocen floor, therefore their loction on the ocen surfce is not fixed, they re continuously moving round the nchor point. Still this distnce is very smll compred to the distnces between buoys nd it is therefore neglected in this pper. 6. TDMA slot lloction In this pper, we propose TDMA scheduling mechnism both for energy-efficiency considertions, s well s becuse of the coustic environment constrints, s discussed previously. TDMA frme period is limited by the frequency with which the AUV nd buoys need to send becons. The becons re criticl for AUV synchroniztion, positioning, nd nvigtion s well for sending ccurte sttus updte informtion. On the other hnd, the TDMA slot size is ffected by the low dt rte nd long propgtion dely in the coustic network. Therefore, the gol of the TDMA slot lloction mechnism is to use minimum number of TDMA slots in frme intervl. In our scenrio, the first five slots 1 5 re llocted to the buoys. Considering the numbering in Fig. 3, the buoy B i, i = 1,2,..., n will be ssigned the slot i In this wy, ny AUV in the surveillnce re will be within communiction rnge of t most one buoy trnsmitting in the sme slot. This is becuse the communiction rnge of ny two buoys ssigned to the sme slot (e.g., B 1 nd B 6 ) do not intersect. Let us ssume tht fter llocting the first five slots to the buoys, we re left with s TDMA slots to be llocted to the AUVs. Consider the number of AUVs to be deployed is m nd the length of the surveillnce rectngle is L. Next, we present mechnism for llocting slots to the AUVs, using sptil slot reuse. This mechnism is performed only once, during the initiliztion phse. The slot lloction lgorithm is run by the ship. The following mechnism cn be pplied when L/ (r +1)>R, where r is the number of regions computed by Algorithm 1. If this reltion does not hold, then we need to djust the L, m, nd s prmeters correspondingly, e.g., either increse L or the number of slots s or decrese m, the number of AUVs. Next we present two lgorithms. Algorithm 1 hs s input m, s, L nd divides the surveillnce rectngle in
7 M. Crdei / Computer Communictions xxx (26) xxx xxx 7 Fig. 3. Surveillnce regions for n = 15 buoys nd time slot lloction when m = 1 nd s =6. regions, ssocites TDMA slots to every region nd identifies every buoy to which region it belongs bsed on its loction. Any slot ssocited to region is lter ssigned by the ship to n AUV to use for becons while performing the surveillnce tsk within tht region. Algorithm 2 ssigns communiction slot to n AUV. This lgorithm is executed by the ship s result of request from the AUV sent during the initiliztion phse, when the AUV is t the ocen surfce. Let us note with S the set of TDMA slots for AUVs, e.g., for exmple in Fig. 3, S ={s 6,s 7,...,s 11 } nd S =s, where S represents the crdinlity of the set S. Algorithm 1 (m, s, L). Input: m, s, L Output: divide surveillnce rectngle in regions, ssign TDMA slots to ll regions Step 1. If m 6 s, then the surveillnce rectngle forms one region R 1. Assign ll s slots to R 1. All buoys will lso be prt of R 1. Exit. Step 2. Compute the number of regions r First, we divide the slots in S in three sets S 1, S 2, S 3, S 1 + S 2 + S 3 =s: if (s == 3k) where k 2 N, then S 1 = S 2 = S 3 =k else if (s == (3k + 1)) then S 1 =k + 1 nd S 2 = S 3 = k else if (s == (3k + 2)) then S 1 = S 2 =k + 1 nd S 3 =k Let S 1 contin the first S 1 slots from S, S 2 the next S 2 slots, nd S 3 the lst S 3 slots. Next, compute the number of regions r s follows: r =3ºm/sß if ((m s) >( S 1 + S 2 )) then r = r +3 else if ((m s) > S 1 ) then r = r +2 else if ((m s) > ) then r = r +1 Step 3. Divide the surveillnce rectngle into r equl regions This step divides the surveillnce rectngle into r + 1 rectngles, with length d = L/(r + 1), s illustrted in Fig. 3. Note tht L/(r +1)>R. We define r regions s the following rectngles: R 1 ¼ R 1 R 3 R 3 R 1 ; R 2 ¼ R 2 R 4 R 4 R 2 ;...; R r ¼ R r R rþ2 R rþ2 R r. Step 4. Assign slots to every region R i, for i =1,...,r for (i =1,...,r) { if ((i 3) == 1) then ssign to R i the slots in the set S 1. else if ((i 3) == 2), then ssign to R i the slots in the set S 2. else if ((i 3) == ), then ssign to R i the slots in the set S 3. } Step 5. Every buoy belongs to one, two or three regions depending on its loction. for (i =1,...,n, j =1,...,r){ if (x Bi 2 [x Rj,x Rj+2 ]) then B i belongs to the region R j, where R j ¼ R j R jþ2 R jþ2 R j } Algorithm 2. Input: AUV i Output: Allocte TDMA slot to AUV i Bsed on the AUV i loction, determine the closest region R j tht hs slot u vilble. If two such regions re vilble, choose the one with smllest index. Mrk the slot u in R j s busy nd ssign slot u to AUV i. AUV i will belong to R j, this mens tht AUV i will perform the surveillnce opertion within R j nd will trnsmit its becon during the slot u in the ACnet. Theorem 1. Algorithm 1 provides enough slots to ccommodte ll m AUVs trnsmissions. Any buoy nd ny AUV nvigting in region R i will receive collision-free messges from ny AUV tht hs been ssigned slot from R i s result of Algorithm 2. Proof. First, we prove tht the number of slots llocted by the Algorithm 1 in ll r regions is greter or equl with m. We distinguish four cses:
8 8 M. Crdei / Computer Communictions xxx (26) xxx xxx 1. (m s) ==. Then there re r = 3m/s regions nd number of slots is (m/s)( S 1 + S 2 + S 3 ) = m. 2. (m s)>( S 1 + S 2 ). In this cse we hve r = ºm/sß +3 regions nd the number of slots llocted to ll regions is (ºm/sß + 1)( S 1 + S 2 + S 3 ) = (ºm/sß +1)s > m. 3. ( S 1 + S 2 ) P (m s)> S 1. In this cse we hve r = ºm/sß + 2 regions nd the number of slots is (ºm/sß) ( S 1 + S 2 + S 3 ) + S 1 + S 2 =(ºm/sß)s + S 1 + S 2 >m. 4. js 1 P (m s) >. In this cse we hve r = ºm/sß +1 regions nd the number of slots is (ºm/sß)( S 1 + S 2 + S 3 ) + S 1 = (ºm/sß)s + S 1 >m. If n AUV hs been ssigned slot u from region R i, then it will nvigte nd perform surveillnce within tht region. Bsed on the wy we ssign slots to regions (see Algorithm 1, Step 4), the closest regions with the sme slots re R i nd R iþ3, for i =1,...,r 3. The minimum distnce between R i nd R iþ3 is d nd becuse d > R, ny node (AUV or buoy) inside R i will not receive ny trnsmission from node inside R iþ3. h Let us now show the slot lloction mechnism on the exmple illustrted in Fig. 3. We know L, m = 1, S = {6,7,8,9,1,11}, s = 6. Then S 1 = {6,7}, S 2 = {8, 9} nd S 3 = {1,11} nd there re five regions: R 1 ¼ R 1 R 3 R 3 R 1 ; R 2 ¼ R 2 R 4 R 4 R 2 ; R 3 ¼ R 3 R 5 R 5 R 3 ; R 4 ¼ R 4 R 6 R 6 R 4 ; nd R 5 ¼ R 5 R 7 R 7 R 5. Time slots in the set S 1 re ssigned to R 1 nd R 4, time slots in S 2 re ssigned to R 2 nd R 5 nd time slots in S 3 re ssigned to R 3. Assuming the ten AUVs re deployed uniformly long the rectngle, possible slot ssignment is s follows: R 1 : AUV 1 on slot 6 nd AUV 2 on slot 7, R 2 : AUV 3 on slot 8 nd AUV 4 on slot 9, R 3 : AUV 5 on slot 1 nd AUV 6 on slot 11, R 4 : AUV 7 on slot 6 nd AUV 8 on slot 7, R 5 : AUV 9 on slot 8 nd AUV 1 on slot 9. Advntges of using this slot lloction mechnism include: (1) energy-efficient mechnism with low overhed; (2) it uses reduced number of time slots s; (3) it proposes uniform AUV distribution, by orgnizing the surveillnce re in smller regions; (4) it is sclble. More buoys nd AUVs cn be deployed following the sme pttern, without modifying the existing orgniztion. 7. Simultion results In this section, we nlyze the performnce of our protocol through simultions. We implement the communiction protocol with the Opnet network simultor [9]. Next, we present the vlues of the prmeters considered in our testing, followed by the performnce metrics nd simultion results. For testing, we ssume scenrio with n=15 buoys, positioned ccording to Algorithm 1 (see Fig. 3). This will result in surveillnce re with length L = m for d y = 1 m. The RF communiction rnge is R =3km nd the dt rte for the RFnet is 1 Mbps. For the ACnet, we ssume n coustic communiction rnge of 3 km, dt rte of 3 bps using DSSS/MFSK, nd signl propgtion speed of 15 m/s. For the TDMA slot configurtion, we consider tht 5 slots re llocted to the buoys nd s = 7 slots re llocted for AUVs. This result in TDMA frme period of 12 slots nd when the slot time is 3 s, we obtin TDMA frme of 36 s. The reson for choosing 3 s is s follows. Every AUV nd buoy periodiclly exchnge becons in its llocted slot. We consider becon size is 32 bytes. An AUV becon contins the AUV ID, flight time, speed, bering, loction coordintes nd one or more fields used for ACK nd dt exchnge. A Buoy becon contins buoy ID, GPS-bsed loction nd time informtion nd one or more fields used for dt exchnge. We choose the TDMA slot size of 3 s to include the becon trnsmission time in the ACnet of.85 s nd 3 km propgtion time of 2 s. Note tht these ttributes re vribles in our code nd their vlues cn be chnged ccording with the plnned scenrio. The scenrio considered is presented in Section 3. Once n AUV is deployed, it gets to the surfce nd sends n initiliztion messge to the ship over the RFnet. The ship responds with messge contining the coordintes of the surveillnce region nd the TDMA slot llocted to this AUV. The ship does the ssignment bsed on the current AUV loction. It will select the closest region tht hs TDMA slot vilble. The AUV then dives nd performs the surveillnce tsk. We ssume the AUV speed of 3 m/s. We used the DSR routing protocol [7] for RFnet communiction. At the trnsport lyer, we used TCP protocol. We chose TCP protocol becuse it offers connection-oriented nd relible communiction service. Also, the congestion control mechnism prevents congestion when multiple AUVs trnsmit long messges (imges) to the ship. We used the DSR nd TCP protocol models provided by Opnet. The communiction in the ACnet uses TDMA, s we described in the previous sections. The prmeters we vried in our simultion re the number of AUVs, the ship loction, the trget detection intervl nd the number of imge messges sent by n AUV to the ship for every trget detected. The performnce metrics we mesured re the AUV to ship messge dely, ship to AUV commnd dely, sttus-updte messge dely (with or without the AUV becon dely), nd ggregte throughput. In the first set of mesurements we vry the number of AUVs deployed, between 1 nd 12. We ssume the ship is positioned t the center of the surveillnce rectngle. Trget detection time is uniformly distributed between 3 min nd 1 h nd the intervl the ship will issue new commnd for every AUV is uniformly distributed between 2 nd 4 min. In Fig. 4, we mesure the AUV to ship messge dely. This is for the cse when n AUV detects trget nd gets to the surfce to trnsmit the first imge to the ship. This dely is therefore mesured over RFnet. The size of n imge messge is 25 kbytes. Our results indicte n verge dely of 1 s nd the t 2.5 s. These vlues re dependent on the number of hops between AUV nd
9 M. Crdei / Computer Communictions xxx (26) xxx xxx 9 3 b AUV to ship messge dely, sec AUV count Ship to AUV commnd dely, sec AUV count Fig. 4. Messge delys in communiction between AUV nd ship. ship nd re lso ffected by MAC lyer contention, TCP nd routing overhed nd retrnsmission delys. In Fig. 4b, we mesure the dely for sending commnd from the ship to the AUV. Here the AUV is submerged, so this dely reflects both the RF nd coustic dely. The dely hs n verge of 2 s, with the t 95 s. The RFnet dely is ffected by the fctors mentioned before. Regrding the ACnet communiction, the commnd is sent by the buoy during its slot, so the commnd will be queued t the buoy between nd 33 s. As we send only one commnd per becon, it my hppen tht commnd is delyed few TDMA frme periods, especilly for cses with more AUVs. In our model, buoys re responsible for periodiclly sending sttus-updte messges to the ship with informtion bout AUVs in their rnge. Buoys collect this informtion from the AUV becons received in the ACnet. The frequency of sending informtion updtes by the buoys cn be set up to different vlues. For these simultions we ssume sttus updtes re sent every TDMA frme intervl, tht is, every 36 s. In Fig. 5, we represent the dely of the sttus-updte messges, wheres in the Fig. 5b, the dely is mesured from the moment Aggregte messge throughput t the ship, bps AUV count Fig. 6. Aggregte messge dely t the ship depending on the number of AUVs. it ws sent by the AUV. This dely includes the time the AUV becon ws sent over the ACnet (3 s), the dely occurred in the buoy (up to 33 s) nd the dely over the RFnet. In Fig. 6, we present the ggregte throughput mesured t the ship. As expected, the verge vlue increses with the number of AUVs..14 b Sttus-updte messge dely, sec AUV count AUV becon plus sttusupdte messge dely, sec AUV count verge verge Fig. 5. Sttus-updte messge delys.
10 1 M. Crdei / Computer Communictions xxx (26) xxx xxx AUV to ship messge dely, sec Centrl positioning Lterl positioning b Ship to AUV reply dely, sec Centrl positioning Lterl positioning Ship positioning Ship positioning Fig. 7. Messge dely depending on the ship positioning. In the next set of mesurements, we study the impct of the ship loction on the messge delys between the AUV nd ship nd sttus-updte messge dely. We compred the cse when the ship is positioned t the middle of the surveillnce rectngle (e.g., close to B 6 in Fig. 3), versus the cse when it is positioned lterlly (e.g., close to B 1 in Fig. 3). A centrl ship positioning will reduce the verge number of hops involved in RFnet communiction Sttus-updte messge dely, sec Centrl positioning Ship positioning Lterl positioning Fig. 8. Becon dely depending on the ship positioning. between ship nd buoys or surfce AUVs. In Fig. 7, we mesure the dely of the messges with 25 KB imges, sent from AUVs to ship. Fig. 7b represents the reply sent from the ship to the surfce AUV. This is 96 bits pcket which is used for ACK, or for issuing new commnds to the AUV or for requesting for more pictures. Next, Fig. 8 illustrtes the vrition of the sttus-updte messge depending on the ship loction. In the next test, we study the impct of vrying the rte t which AUVs detect trgets: 15, 3, 45, nd 6 min. The dely of the messges with pictures sent from AUVs to the ship is represented in Fig. 9. Also, in Fig. 9b, we represent the ggregte throughput. As more messges re generted with smller trget detection intervl, the ggregte throughput increses correspondingly. In the lst set of experiments, we vry the number of messges sent by AUVs per trget detected. We ssume tht when trget is detected, fter the AUV sends the first imge messge, the ship lwys sks for ll the remining imges. The gol is to test the system comportment when vrying the lod. In this cse we set the trget detection intervl s being uniformly distributed between 2 nd 3 min. We represent in Fig. 1, the dely of the messges with pictures sent by the AUVs to the ship nd in Fig. 1b, the dely of the sttus-updte messges. We observe n AUV to ship messge dely, sec b Aggregte throughput t the ship, bps Trget detection intervl, min Trget detection intervl, min Fig. 9. Messge dely nd ggregte throughput bsed on the trget detection intervl.
11 M. Crdei / Computer Communictions xxx (26) xxx xxx 11 3 b AUV to ship messge dely, sec Number of messges sent by AUV per trget detected Sttus-updte messge dely, sec Number of messges sent by AUV per trget detected Fig. 1. AUV to ship nd sttus-updte messge dely depending on the number of messges sent by AUV per trget detected. Aggregte throughput t the ship, bps Number of messges sent by AUV per trget detected Fig. 11. Aggregte throughput t the ship depending on the number of messges sent by AUV per trget detected. increse in dely when the number of messges sent per trget detected is 1. In the lst grph, in Fig. 11, we represent the increse in the ggregte throughput with the number of messges sent by AUV per trget detected. 8. Conclusions In this pper, we ddress the problem of designing n energy-efficient scheduling mechnism nd sclble hybrid RF-coustic communiction rchitecture, tht fcilittes trnsfer of dt from AUVs to centrl control nd commnd sttion on ship. Communicting buoys serve s gtewys between the coustic nd RF networks nd provide messge forwrding cross the d hoc RFnet. Mjor impediments ssocited with underwter coustic networks tht were considered re severe bndwidth limittions nd long propgtion delys. The Medium Access Control scheduling method dopted is TDMA, providing collision-free, energy-efficient communiction on the low-dt rte coustic chnnel. We design sclble TDMA slot lloction mechnism with sptil-reuse chrcteristics. We lso design sclble buoy positioning mechnism tht gurntees every point in the surveillnce re is within communiction rnge of t lest three buoys for fcilitting y L U 1 U 2 U' 2 C B 2 B 4 B 6 B 8 O E b B B 1 3 B D 5 B 7 R W x L' 2 L 3 Fig. 12. L nd W computtion.
12 12 M. Crdei / Computer Communictions xxx (26) xxx xxx AUV underwter tringultion. Performnce of our communiction system is nlyzed with simultions in the Opnet network simultor. Acknowledgement The uthor thnks Dr. Andres Folleco for his vluble input on shllow wter coustic communictions. Appendix A. In this ppendix we compute the length L nd width W of the surveillnce rectngle, considering n buoys B 1,B 2,...,B n, n P 3, the p coordintes of B 2 s being B 2 (R/2,d y ), nd d y 2½; R ffiffiffi 3 =2Š. For the nottions we refer to Fig. 12 where n =8. From nu 2CL 2: cos ¼ W nd from nb 2U 2 E 3 DB 6 : cos ¼ 3R=2 2EB 6, therefore W ¼ 3R U 2 E 2 EB 6. In nb 3 DB 6 : EB 2 6 ¼ 1 4 ðd2 y þð3r 2 Þ2 Þ¼ 1 16 ð4d2 y þ 9R2 Þ nd in nu 2EB 6 : rffiffiffiffiffiffiffiffiffiffiffiffi U 2 E2 ¼ 1 16 ð7r2 4d 2 y Þ, therefore W ¼ 3R 7R 2 4d 2 y. 2 9R 2 þ4d 2 y Let us next compute L. L cn be written s L =2Æpr(B 3 U 1,Ox)+(n 5) * R/2, where pr(b 3 U 1,Ox) is the projection of B 3 U 1 on the Ox xis. We hve pr(b 3 U 1,Ox) =pr(b 3 U 2,Ox) =R Æ cos( + b), nd cosð þ bþ ¼cos cos b sin sin b ¼ 3R=2 2EB 6 EB 6 dy R 2EB 6 U 2 E R rffiffiffiffiffiffiffiffiffiffiffiffi rffiffiffiffiffiffiffiffiffiffiffiffi ¼ 3 dy 7R 2 4d 2 y 7R. So we get L ¼ 3R=2 d 2 4d 2 y 4 2R 9R 2 þ4d 2 y y 9R 2 þ4d 2 y rffiffiffiffiffiffiffiffiffiffiffiffi 7R þðn 5ÞR=2 ¼ðn 2ÞR=2 d 2 4d 2 y y, for ny n P 3. References 9R 2 þ4d 2 y [1] Deprtment of Ocen Engineering t Florid Atlntic University, < [2] Center for Acoustic nd Vibrtions t FAU, < [3] H. Blkrishnn, V.N. Pdmnbhn, S. Seshn, R.H. Ktz, A comprison of mechnisms for improving TCP performnce over wireless links, IEEE/ACM Trnsctions on Networking (1999). [4] J. Ctipovic, D. Brdy, S. Etchemendy, Development of underwter coustic modems nd networks, Ocenogrphy 6 (1993). [5] X. Cheng, A. Theler, G. Xue, D. Chen, TPS: time-bsed positioning scheme for outdoor wireless sensor networks, IEEE INFOCOM (24). [6] J. Broch, D.A. Mltz, D.B. Johnson, Y. Hu, J. Jetchev, A performnce comprison of multi-hop wireless d hoc network routing protocols, in: ACM/IEEE Interntionl Conference on Mobile Computing nd Networking, October [7] The Dynmic Source Routing Protocol for Mobile Ad Hoc Networks (DSR), IETF Internet drft, Februry 22. [8] Hrdimnker, J.L.R. LeBlnc, P. Beujen, M. Singer, C. Boubli, G.T. Strutt, Chirp FSK modem for high relibility communiction in shllow wter, IEEE Ocens 99 (1999). [9] < [1] J. Rice, B. Creber, C. Fletcher, P. Bxley, K. Rogers, K. McDonld, D. Rees, M. Wolf, S. Merrim, R. Mehio, J. Prokis, K. Scussel, D. Port, D. Green, Evolution of Seweb underwter coustic networking, in: Proceedings of the IEEE Ocens Conference, Providence, RI, September 2. [11] F. Slv-Gru, M. Stojnovic, Multi-cluster protocol for d hoc mobile underwter coustic networks, in: Proceedings of the IEEE OCEANS 3 Conference, September 23. [12] B. Shrif, J. Neshm, O.R. Hinton, A.E. Adms, A computtionlly efficient Doppler compenstion system for underwter coustic networks, IEEE Journl of Ocenic Engineering 25 (1) (2). [13] E.M. Sozer, M. Stojnovic, J.G. Prokis, Underwter coustic networks, IEEE Journl of Ocen Engineering 25 (1) (2) [14] Wireless Outdoor Adpter, < usb_outdoor.pdf/>. [15] J. Prokis, E. Sozer, J. Rice, M. Stojnovic, Shllow wter coustic networks, IEEE Communictions Mgzine 39 (11) (21). [16] A. Tnenbum, Computer Networks, fourth ed., Prentice Hll, 23. [17] W. Stllings, Wireless Communictions nd Networks, Prentice Hll, 22. [18] G.G. Xie, J. Gibson, A networking protocol for underwter coustic networks, Technicl report TR-CS--2, Deprtment of Computer Science, Nvl Postgrdute School, December 2. Mihel Crdei is Assistnt Professor in the Deprtment of Computer Science nd Engineering t Florid Atlntic University, nd Director of the NSF-funded Wireless nd Sensor Network Lbortory. Dr. Crdei received her Ph.D. nd M.S. in Computer Science from the University of Minnesot, Twin Cities, in 23 nd 1999 respectively. Her reserch interests include wireless networking, wireless sensor networks, network protocol nd lgorithm design, nd resource mngement in computer networks. She is member of IEEE nd ACM.
METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin
METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN Inventor: Brin L. Bskin 1 ABSTRACT The present invention encompsses method of loction comprising: using plurlity of signl trnsceivers to receive one or
More informationMAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES
MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES Romn V. Tyshchuk Informtion Systems Deprtment, AMI corportion, Donetsk, Ukrine E-mil: rt_science@hotmil.com 1 INTRODUCTION During the considertion
More informationHigh-speed Simulation of the GPRS Link Layer
989 High-speed Simultion of the GPRS Link Lyer J Gozlvez nd J Dunlop Deprtment of Electronic nd Electricl Engineering, University of Strthclyde 204 George St, Glsgow G-lXW, Scotlnd Tel: +44 4 548 206,
More informationA Cluster-based TDMA System for Inter-Vehicle Communications *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 213-231 (2014) A Cluster-bsed TDMA System for Inter-Vehicle Communictions * Deprtment of Electricl Engineering Ntionl Sun Yt-Sen University Kohsiung,
More informationEnergy Harvesting Two-Way Channels With Decoding and Processing Costs
IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, VOL., NO., MARCH 07 3 Energy Hrvesting Two-Wy Chnnels With Decoding nd Processing Costs Ahmed Arf, Student Member, IEEE, Abdulrhmn Bknin, Student
More informationMulti-beam antennas in a broadband wireless access system
Multi-em ntenns in rodnd wireless ccess system Ulrik Engström, Mrtin Johnsson, nders Derneryd nd jörn Johnnisson ntenn Reserch Center Ericsson Reserch Ericsson SE-4 84 Mölndl Sweden E-mil: ulrik.engstrom@ericsson.com,
More informationThe Discussion of this exercise covers the following points:
Exercise 4 Bttery Chrging Methods EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the different chrging methods nd chrge-control techniques commonly used when chrging Ni-MI
More informationExercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION
Exercise 1-1 The Sine Wve EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the notion of sine wve nd how it cn be expressed s phsor rotting round the center of circle. You
More informationAlgorithms for Memory Hierarchies Lecture 14
Algorithms for emory Hierrchies Lecture 4 Lecturer: Nodri Sitchinv Scribe: ichel Hmnn Prllelism nd Cche Obliviousness The combintion of prllelism nd cche obliviousness is n ongoing topic of reserch, in
More informationRedundancy Data Elimination Scheme Based on Stitching Technique in Image Senor Networks
Sensors & Trnsducers 204 by IFSA Publishing, S. L. http://www.sensorsportl.com Redundncy Dt Elimintion Scheme Bsed on Stitching Technique in Imge Senor Networks hunling Tng hongqing Technology nd Business
More informationA Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks
Globecom 04 - Wireless Networking Symposium A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Rdio Networks Xingy Liu nd Jing Xie Deprtment of Electricl nd Computer Engineering
More informationGeometric quantities for polar curves
Roerto s Notes on Integrl Clculus Chpter 5: Bsic pplictions of integrtion Section 10 Geometric quntities for polr curves Wht you need to know lredy: How to use integrls to compute res nd lengths of regions
More informationABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC
User Mnul ntelligent nstlltion Systems A B 1 2 3 4 5 6 7 8 30 ma 30 ma n = AC Un = 230 V AC 30 ma 9 10 11 12 C ABB STOTZ-KONTAKT Appliction Softwre Current Vlue Threshold/1 Contents Pge 1 Device Chrcteristics...
More informationExperiment 3: Non-Ideal Operational Amplifiers
Experiment 3: Non-Idel Opertionl Amplifiers Fll 2009 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output
More informationExperiment 3: Non-Ideal Operational Amplifiers
Experiment 3: Non-Idel Opertionl Amplifiers 9/11/06 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output
More informationSynchronous Machine Parameter Measurement
Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions
More informationStudy on SLT calibration method of 2-port waveguide DUT
Interntionl Conference on Advnced Electronic cience nd Technology (AET 206) tudy on LT clibrtion method of 2-port wveguide DUT Wenqing Luo, Anyong Hu, Ki Liu nd Xi Chen chool of Electronics nd Informtion
More informationCHAPTER 2 LITERATURE STUDY
CHAPTER LITERATURE STUDY. Introduction Multipliction involves two bsic opertions: the genertion of the prtil products nd their ccumultion. Therefore, there re two possible wys to speed up the multipliction:
More informationCHAPTER 3 AMPLIFIER DESIGN TECHNIQUES
CHAPTER 3 AMPLIFIER DEIGN TECHNIQUE 3.0 Introduction olid-stte microwve mplifiers ply n importnt role in communiction where it hs different pplictions, including low noise, high gin, nd high power mplifiers.
More informationCSI-SF: Estimating Wireless Channel State Using CSI Sampling & Fusion
CSI-SF: Estimting Wireless Chnnel Stte Using CSI Smpling & Fusion Riccrdo Crepldi, Jeongkeun Lee, Rul Etkin, Sung-Ju Lee, Robin Krvets University of Illinois t Urbn-Chmpign Hewlett-Pckrd Lbortories Emil:{rcrepl,rhk}@illinoisedu,
More informationSimulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability
Interntionl Journl of cience, Engineering nd Technology Reserch (IJETR), olume 4, Issue 1, October 15 imultion of Trnsformer Bsed Z-ource Inverter to Obtin High oltge Boost Ability A.hnmugpriy 1, M.Ishwry
More informationSynchronous Machine Parameter Measurement
Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions
More informationY9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System
Y9.ET1.3 Implementtion of Secure Energy ngement ginst Cyber/physicl Attcks for FREED System Project Leder: Fculty: Students: Dr. Bruce cillin Dr. o-yuen Chow Jie Dun 1. Project Gols Develop resilient cyber-physicl
More informationA Development of Earthing-Resistance-Estimation Instrument
A Development of Erthing-Resistnce-Estimtion Instrument HITOSHI KIJIMA Abstrct: - Whenever erth construction work is done, the implnted number nd depth of electrodes hve to be estimted in order to obtin
More informationMEASURE THE CHARACTERISTIC CURVES RELEVANT TO AN NPN TRANSISTOR
Electricity Electronics Bipolr Trnsistors MEASURE THE HARATERISTI URVES RELEVANT TO AN NPN TRANSISTOR Mesure the input chrcteristic, i.e. the bse current IB s function of the bse emitter voltge UBE. Mesure
More informationA Channel Splitting Technique for Reducing Handoff Delay in Wireless Networks
Interntionl Journl o Engineering Reserch & Technology (IJERT) A Chnnel Splitting Technique or Reducing Hndo ely in Wireless Networks Jeykumr. J #1, Venktesh. * 2, Vigneswri. G* 3, Nivethith. V *4 # 1 PG
More informationINSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad
Hll Ticket No Question Pper Code: AEC009 INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigl, Hyderd - 500 043 MODEL QUESTION PAPER Four Yer B.Tech V Semester End Exmintions, Novemer - 2018 Regultions:
More informationA Stochastic Geometry Approach to the Modeling of DSRC for Vehicular Safety Communication
A Stochstic Geometry Approch to the Modeling of DSRC for Vehiculr Sfety Communiction Zhen Tong, Student Member, IEEE, Hongsheng Lu 2, Mrtin Henggi, Fellow, IEEE, nd Christin Poellbuer 2, Senior Member,
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-236 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationOn the Prediction of EPON Traffic Using Polynomial Fitting in Optical Network Units
On the Prediction of EP Trffic Using Polynomil Fitting in Opticl Networ Units I. Mmounis (1),(3), K. Yinnopoulos (2), G. Ppdimitriou (4), E. Vrvrigos (1),(3) (1) Computer Technology Institute nd Press
More informationKyushu Institute of Technology
Title: Integrted Rescue Service Stellite (IRS-St) Primry Point of Contct (POC): Mohmed Ibrhim Co-uthors: Btsuren Amglnbt, Puline Fure, Kevin Chou Orgniztion:, 1-1 Sensui, Tobt, Kitkyushu 804-8550, Jpn
More informationLATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS
LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS A. Fos 1, J. Nwroci 2, nd W. Lewndowsi 3 1 Spce Reserch Centre of Polish Acdemy of Sciences, ul. Brtyc 18A, 00-716 Wrsw, Polnd; E-mil: fos@c.ww.pl; Tel.:
More informationDESIGN OF CONTINUOUS LAG COMPENSATORS
DESIGN OF CONTINUOUS LAG COMPENSATORS J. Pulusová, L. Körösi, M. Dúbrvská Institute of Robotics nd Cybernetics, Slovk University of Technology, Fculty of Electricl Engineering nd Informtion Technology
More informationJamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks
Jmming-Resistnt ollbortive Brodcst In Wireless Networks, Prt II: Multihop Networks Ling Xio Ximen University, hin 361005 Emil: lxio@xmu.edu.cn Huiyu Di N Stte University, Rleigh, N 27695 Emil: huiyu di@ncsu.edu
More information10.4 AREAS AND LENGTHS IN POLAR COORDINATES
65 CHAPTER PARAMETRIC EQUATINS AND PLAR CRDINATES.4 AREAS AND LENGTHS IN PLAR CRDINATES In this section we develop the formul for the re of region whose oundry is given y polr eqution. We need to use the
More informationAdaptive Network Coding for Wireless Access Networks
Adptive Network Coding for Wireless Access Networks Tun Trn School of Electricl Engineering nd Computer Science Oregon Stte University, Corvllis, Oregon 9733 Emil: trntu@eecs.orst.edu Thinh Nguyen School
More informationTo provide data transmission in indoor
Hittite Journl of Science nd Engineering, 2018, 5 (1) 25-29 ISSN NUMBER: 2148-4171 DOI: 10.17350/HJSE19030000074 A New Demodultor For Inverse Pulse Position Modultion Technique Mehmet Sönmez Osmniye Korkut
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-297 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More informationDesign and Modeling of Substrate Integrated Waveguide based Antenna to Study the Effect of Different Dielectric Materials
Design nd Modeling of Substrte Integrted Wveguide bsed Antenn to Study the Effect of Different Dielectric Mterils Jgmeet Kour 1, Gurpdm Singh 1, Sndeep Ary 2 1Deprtment of Electronics nd Communiction Engineering,
More informationInterference Cancellation Method without Feedback Amount for Three Users Interference Channel
Open Access Librry Journl 07, Volume, e57 ISSN Online: -97 ISSN Print: -9705 Interference Cncelltion Method without Feedbc Amount for Three Users Interference Chnnel Xini Tin, otin Zhng, Wenie Ji School
More informationThree-Phase Synchronous Machines The synchronous machine can be used to operate as: 1. Synchronous motors 2. Synchronous generators (Alternator)
Three-Phse Synchronous Mchines The synchronous mchine cn be used to operte s: 1. Synchronous motors 2. Synchronous genertors (Alterntor) Synchronous genertor is lso referred to s lterntor since it genertes
More informationImproving synchronized transfers in public transit networks using real-time tactics
Improving synchronized trnsfers in public trnsit networks using rel-time tctics Zhongjun Wu 1,2,3, Grhm Currie 3, Wei Wng 1,2 1 Jingsu Key Lbortory of Urbn ITS, Si Pi Lou 2#, Nnjing, 210096, Chin 2 School
More informationDYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID
THERMAL SCIENCE, Yer 2015, Vol. 19, No. 4, pp. 1311-1315 1311 DYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID by Jun YAN, Li-Jiu ZHENG *, Bing DU, Yong-Fng QIAN, nd Fng YE Lioning Provincil Key Lbortory
More informationSolutions to exercise 1 in ETS052 Computer Communication
Solutions to exercise in TS52 Computer Communiction 23 Septemer, 23 If it occupies millisecond = 3 seconds, then second is occupied y 3 = 3 its = kps. kps If it occupies 2 microseconds = 2 6 seconds, then
More informationFirst Round Solutions Grades 4, 5, and 6
First Round Solutions Grdes 4, 5, nd 1) There re four bsic rectngles not mde up of smller ones There re three more rectngles mde up of two smller ones ech, two rectngles mde up of three smller ones ech,
More informationCDMA One. International summer students courses: "Plugged In: Modern Networks and Services in Telecommunication"
INTRAROM S.A. ROMANIAN TELECOMMUNICATIONS AND ELECTRONICS INDUSTRY ROMANIA, Buchrest, 17 Fbric de Glucoz St., Sector 2 Cod 72322, Tel:(+40 1) 2040600 Fx:(+40 1) 2040611 http://www.intrrom.ro Interntionl
More informationPolar Coordinates. July 30, 2014
Polr Coordintes July 3, 4 Sometimes it is more helpful to look t point in the xy-plne not in terms of how fr it is horizontlly nd verticlly (this would men looking t the Crtesin, or rectngulr, coordintes
More informationRT-Link: A Time-Synchronized Link Protocol for Energy Constrained Multi-hop Wireless Networks
RT-Link: A Time-Synchronized Link Protocol for Energy Constrined Multi-hop Wireless Networks Anthony Rowe, Rhul Mnghrm, Rj Rjkumr Electricl nd Computer Engineering Deprtment, Crnegie Mellon University,
More informationSynchronous Generator Line Synchronization
Synchronous Genertor Line Synchroniztion 1 Synchronous Genertor Line Synchroniztion Introduction One issue in power genertion is synchronous genertor strting. Typiclly, synchronous genertor is connected
More informationBP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks
BP-PP: Belief Propgtion-Bsed Trust nd Reputtion Mngement for PP Networs Ermn Aydy School of Electricl nd Comp. Eng. Georgi Institute of Technology Atlnt, GA 333, USA Emil: eydy@gtech.edu Frmrz Feri School
More informationTemporal Secondary Access Opportunities for WLAN in Radar Bands
The 4th Interntionl Symposium on Wireless Personl Multimedi Communictions WPMC'), Temporl Secondry Access Opportunities for WLAN in Rdr Bnds Miurel Tercero, Ki Won Sung, nd Jens Znder Wireless@KTH, Royl
More informationExample. Check that the Jacobian of the transformation to spherical coordinates is
lss, given on Feb 3, 2, for Mth 3, Winter 2 Recll tht the fctor which ppers in chnge of vrible formul when integrting is the Jcobin, which is the determinnt of mtrix of first order prtil derivtives. Exmple.
More information4110 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 2017
40 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 07 Trnsmit Power Control for DD-Underlid Cellulr Networs Bsed on Sttisticl Fetures Peng Sun, Kng G. Shin, Life Fellow, IEEE, Hilin Zhng,
More informationA Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM
A ovel Bck EMF Zero Crossing Detection of Brushless DC Motor Bsed on PWM Zhu Bo-peng Wei Hi-feng School of Electricl nd Informtion, Jingsu niversity of Science nd Technology, Zhenjing 1003 Chin) Abstrct:
More informationInformation-Coupled Turbo Codes for LTE Systems
Informtion-Coupled Turbo Codes for LTE Systems Lei Yng, Yixun Xie, Xiowei Wu, Jinhong Yun, Xingqing Cheng nd Lei Wn rxiv:709.06774v [cs.it] 20 Sep 207 Abstrct We propose new clss of informtion-coupled
More informationLecture 16: Four Quadrant operation of DC Drive (or) TYPE E Four Quadrant chopper Fed Drive: Operation
Lecture 16: Four Qudrnt opertion of DC Drive (or) TYPE E Four Qudrnt chopper Fed Drive: Opertion The rmture current I is either positive or negtive (flow in to or wy from rmture) the rmture voltge is lso
More informationPB-735 HD DP. Industrial Line. Automatic punch and bind machine for books and calendars
PB-735 HD DP Automtic punch nd bind mchine for books nd clendrs A further step for the utomtion of double loop binding. A clever nd flexible mchine ble to punch nd bind in line up to 9/16. Using the best
More informationCS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates
Bsic Logic Gtes : Computer Architecture I Boolen Algebr Instructor: Prof. Bhgi Nrhri Dept. of Computer Science Course URL: www.ses.gwu.edu/~bhgiweb/cs35/ Digitl Logic Circuits We sw how we cn build the
More informationSoft-decision Viterbi Decoding with Diversity Combining. T.Sakai, K.Kobayashi, S.Kubota, M.Morikura, S.Kato
Softdecision Viterbi Decoding with Diversity Combining T.Ski, K.Kobyshi, S.Kubot, M.Morikur, S.Kto NTT Rdio Communiction Systems Lbortories 2356 Tke, Yokosukshi, Kngw, 2383 Jpn ABSTRACT Diversity combining
More informationDataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)
The slides contin revisited mterils from: Peter Mrwedel, TU Dortmund Lothr Thiele, ETH Zurich Frnk Vhid, University of liforni, Riverside Dtflow Lnguge Model Drsticlly different wy of looking t computtion:
More informationA Comparative Analysis of Algorithms for Determining the Peak Position of a Stripe to Sub-pixel Accuracy
A Comprtive Anlysis of Algorithms for Determining the Pek Position of Stripe to Sub-pixel Accurcy D.K.Nidu R.B.Fisher Deprtment of Artificil Intelligence, University of Edinburgh 5 Forrest Hill, Edinburgh
More informationEliminating Non-Determinism During Test of High-Speed Source Synchronous Differential Buses
Eliminting Non-Determinism During of High-Speed Source Synchronous Differentil Buses Abstrct The t-speed functionl testing of deep sub-micron devices equipped with high-speed I/O ports nd the synchronous
More informationUltra Low Cost ACCELEROMETER
Chip Scle Pckged Fully Integrted Therml Accelerometer MXC622xXC Rev,A 8/19/2011 Pge 1 of 13 Fetures Generl Description Fully Integrted Therml Accelerometer X/Y Axis, 8 bit, Accelertion A/D Output (± 2g)
More informationLecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.
Lecture 2 Intro to line integrls Dn Nichols nichols@mth.umss.edu MATH 233, Spring 218 University of Msschusetts April 12, 218 (2) onservtive vector fields We wnt to determine if F P (x, y), Q(x, y) is
More informationNetwork Sharing and its Energy Benefits: a Study of European Mobile Network Operators
Network Shring nd its Energy Benefits: Study of Europen Mobile Network Opertors Mrco Ajmone Mrsn Electronics nd Telecommunictions Dept Politecnico di Torino, nd Institute IMDEA Networks, mrco.jmone@polito.it
More information9.4. ; 65. A family of curves has polar equations. ; 66. The astronomer Giovanni Cassini ( ) studied the family of curves with polar equations
54 CHAPTER 9 PARAMETRIC EQUATINS AND PLAR CRDINATES 49. r, 5. r sin 3, 5 54 Find the points on the given curve where the tngent line is horizontl or verticl. 5. r 3 cos 5. r e 53. r cos 54. r sin 55. Show
More informationUltra Low Cost ACCELEROMETER
Chip Scle Pckged Digitl Therml Orienttion Sensing Accelerometer MXC6226XC Document Version D Pge 1 of 13 Fetures Generl Description Fully Integrted Therml Accelerometer X/Y Axis, 8 bit, Accelertion A/D
More informationThis is a repository copy of Effect of power state on absorption cross section of personal computer components.
This is repository copy of Effect of power stte on bsorption cross section of personl computer components. White Rose Reserch Online URL for this pper: http://eprints.whiterose.c.uk/10547/ Version: Accepted
More informationFuzzy Logic Controller for Three Phase PWM AC-DC Converter
Journl of Electrotechnology, Electricl Engineering nd Mngement (2017) Vol. 1, Number 1 Clusius Scientific Press, Cnd Fuzzy Logic Controller for Three Phse PWM AC-DC Converter Min Muhmmd Kml1,, Husn Ali2,b
More informationMixed CMOS PTL Adders
Anis do XXVI Congresso d SBC WCOMPA l I Workshop de Computção e Aplicções 14 20 de julho de 2006 Cmpo Grnde, MS Mixed CMOS PTL Adders Déor Mott, Reginldo d N. Tvres Engenhri em Sistems Digitis Universidde
More informationBP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks
1 9th Annul IEEE Communictions Society Conference on Sensor, Mesh nd Ad Hoc Communictions nd Networs (SECON) BP-PP: Belief Propgtion-Bsed Trust nd Reputtion Mngement for PP Networs Ermn Aydy School of
More informationDistributed two-hop proportional fair resource allocation in Long Term Evolution Advanced networks
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2016; 16:264 278 Published online 12 August 2014 in Wiley Online Librry (wileyonlinelibrry.com)..2517 RESEARCH ARTICLE Distributed
More informationUnderstanding Basic Analog Ideal Op Amps
Appliction Report SLAA068A - April 2000 Understnding Bsic Anlog Idel Op Amps Ron Mncini Mixed Signl Products ABSTRACT This ppliction report develops the equtions for the idel opertionl mplifier (op mp).
More informationElectrically Large Zero-Phase-Shift Metamaterial-based Grid Array Antenna for UHF Near-Field RFID Readers
Electriclly Lrge Zero-Phse-Shift Metmteril-bsed Grid Arry Antenn for UHF Ner-Field RFID Reders Jin Shi, Xinming Qing, member IEEE, Zhi Ning Chen, Fellow, IEEE Abstrct A grid rry ntenn using zero-phse-shift
More informationIndoor Autonomous Vehicle Navigation A Feasibility Study Based on Infrared Technology
Concept Pper Indoor utonomous Vehicle Nvigtion Fesibility Study Bsed on Infrred Technology Ry-Shine Run Zhi-Yu Xio * ID Deprtment Electronics Engineering, Ntionl United University, 36003 Mioli, Tiwn; rsrun@nuu.edu.tw
More informationAN IMPROVED METHOD FOR RADIO FREQUENCY DIRECTION FINDING USING WIRELESS SENSOR NETWORKS
AN IMPROVED METHOD FOR RADIO FREQUENCY DIRECTION FINDING USING WIRELESS SENSOR NETWORKS Mickey S. Btson, John C. McEchen, nd Murli Tumml Deprtment of Electricl nd Computer Engineering Nvl Postgrdute School
More informationApril 9, 2000 DIS chapter 10 CHAPTER 3 : INTEGRATED PROCESSOR-LEVEL ARCHITECTURES FOR REAL-TIME DIGITAL SIGNAL PROCESSING
April 9, 2000 DIS chpter 0 CHAPTE 3 : INTEGATED POCESSO-LEVEL ACHITECTUES FO EAL-TIME DIGITAL SIGNAL POCESSING April 9, 2000 DIS chpter 3.. INTODUCTION The purpose of this chpter is twofold. Firstly, bsic
More information2016 2Q Wireless Communication Engineering. #10 Spread Spectrum & Code Division Multiple Access (CDMA)
16 Q Wireless Communiction Engineering #1 Spred Spectrum & Code Division Multiple Access (CDMA Kei Skguchi skguchi@mobile.ee. July 9, 16 Course Schedule ( Dte ext Contents #7 July 15 4.6 Error correction
More informationHigh Speed On-Chip Interconnects: Trade offs in Passive Termination
High Speed On-Chip Interconnects: Trde offs in Pssive Termintion Rj Prihr University of Rochester, NY, USA prihr@ece.rochester.edu Abstrct In this pper, severl pssive termintion schemes for high speed
More informationAn Efficient SC-FDM Modulation Technique for a UAV Communication Link
electronics Article An Efficient SC-FDM Modultion Technique for UAV Communiction Link Sukhrob Aev 1, Oh-Heum Kwon 1, Suk-Hwn Lee 2 Ki-Ryong Kwon 1, * 1 Deprtment of IT Convergence Appliction Engineering,
More informationJoanna Towler, Roading Engineer, Professional Services, NZTA National Office Dave Bates, Operations Manager, NZTA National Office
. TECHNICA MEMOANDM To Cc repred By Endorsed By NZTA Network Mngement Consultnts nd Contrctors NZTA egionl Opertions Mngers nd Are Mngers Dve Btes, Opertions Mnger, NZTA Ntionl Office Jonn Towler, oding
More informationCAL. NX15 DUO-DISPLAY QUARTZ
L. NX15 UO-ISPLY QURTZ l nlogue time disply l igitl time nd clendr l hronogrph l Tchymeter l t recll function l lrm l Illuminting light (Electroluminescent pnel) ENGLISH Illuminting light (TIME/LENR mode
More informationModule 9. DC Machines. Version 2 EE IIT, Kharagpur
Module 9 DC Mchines Version EE IIT, Khrgpur esson 40 osses, Efficiency nd Testing of D.C. Mchines Version EE IIT, Khrgpur Contents 40 osses, efficiency nd testing of D.C. mchines (esson-40) 4 40.1 Gols
More informationA VIRTUAL INFRASTRUCTURE FOR MITIGATING TYPICAL CHALLENGES IN SENSOR NETWORKS
A VIRTUAL INFRASTRUCTURE FOR MITIGATING TYPICAL CHALLENGES IN SENSOR NETWORKS by Hdy S. Abdel Slm B.S. June 1999, Alexndri University, Egypt M.S. June 2004, Alexndri University, Egypt A Disserttion Submitted
More informationAggregate Interference from Secondary Users with Heterogeneous Density
22nd IEEE Personl Indoor Mobile Rdio Communictions Aggregte Interference from Secondry Users with Heterogeneous Density Miurel Tercero, Ki Won Sung, nd Jens Znder Wireless@KTH, Royl Institute of Technology(KTH),
More informationDigital Migration Radio PD60X. DMR Standard Radio, Feature-Rich, Innovative Design, Compact Size, Integrates with Hytera Applications
Digitl Migrtion Rdio PD60X DMR Stndrd Rdio, Feture-Rich, Innovtive Design, Compct Size, Integrtes with Applictions Fetures Smll, Sleek, Light Full Bnd The size is 119 X 54 X 27mm, PC & Metl frme, weight
More informationPostprint. This is the accepted version of a paper presented at IEEE PES General Meeting.
http://www.div-portl.org Postprint This is the ccepted version of pper presented t IEEE PES Generl Meeting. Cittion for the originl published pper: Mhmood, F., Hooshyr, H., Vnfretti, L. (217) Sensitivity
More informationAnalysis of Coding-aware MAC Protocols based on Reverse Direction Protocol for IEEE based Wireless Networks using Network Coding*
Anlysis of oding-wre MA Protocols sed on Reverse irection Protocol for IEEE 8.-sed Wireless Networks using Network oding* Rul Plcios, Htegereil Kssye Hile, Jesus Alonso-Zrte nd Frizio Grnelli {plciostrujillo,
More information(CATALYST GROUP) B"sic Electric"l Engineering
(CATALYST GROUP) B"sic Electric"l Engineering 1. Kirchhoff s current l"w st"tes th"t (") net current flow "t the junction is positive (b) Hebr"ic sum of the currents meeting "t the junction is zero (c)
More informationSection 16.3 Double Integrals over General Regions
Section 6.3 Double Integrls over Generl egions Not ever region is rectngle In the lst two sections we considered the problem of integrting function of two vribles over rectngle. This sitution however is
More informationEfficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment
Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment Roerto Di Pietro, Luigi V. Mncini, nd Alessndro
More informationRSS based Localization of Sensor Nodes by Learning Movement Model
RSS bsed Locliztion of Sensor Nodes by Lerning Movement Model 1 R.ARTHI, 2 P.DEVARAJ, 1 K.MURUGAN 1 Rmnujn Computing Centre, Ann University, Guindy, Chenni, Indi 2 Deprtment of Mthemtics, College of Engineering,
More informationAdaptive VoIP Smoothing of Pareto Traffic Based on Optimal E-Model Quality
Adptive VoIP Smoothing of Preto Trffic Bsed on Optiml E-Model Qulity Shyh-Fng Hung 1, Eric Hsio-Kung Wu 2, nd Po-Chi Chng 3 1 Deprtment of Electricl Engineering, Ntionl Centrl University, Tiwn hsf@vplb.ee.ncu.edu.tw
More informationMultipath Mitigation for Bridge Deformation Monitoring
Journl of Globl Positioning Systems (22) Vol. 1, No. 1: 25-33 Multipth Mitigtion for Bridge Deformtion Monitoring G. W. Roberts, X. Meng, A. H. Dodson, E. Cosser Institute of Engineering Surveying nd Spce
More informationInvestigation of Ground Frequency Characteristics
Journl of Electromgnetic Anlysis nd Applictions, 03, 5, 3-37 http://dx.doi.org/0.436/jem.03.58050 Published Online August 03 (http://www.scirp.org/journl/jem) Mohmed Nyel Electricl Engineering Deprtment,
More informationTopic 20: Huffman Coding
Topic 0: Huffmn Coding The uthor should gze t Noh, nd... lern, s they did in the Ark, to crowd gret del of mtter into very smll compss. Sydney Smith, dinburgh Review Agend ncoding Compression Huffmn Coding
More informationEffect of High-speed Milling tool path strategies on the surface roughness of Stavax ESR mold insert machining
IOP Conference Series: Mterils Science nd Engineering PAPER OPEN ACCESS Effect of High-speed Milling tool pth strtegies on the surfce roughness of Stvx ESR mold insert mchining Relted content - Reserch
More informationPulse Radar with Field-Programmable Gate Array Range Compression for Real Time Displacement and Vibration Monitoring
sensors Article Pulse Rdr with Field-Progrmmble Gte Arry Rnge Compression for Rel Time Displcement nd Vibrtion Monitoring Mihi-Liviu Tudose 1, *, Andrei Anghel 1, Remus Ccovenu 1 nd Mihi Dtcu 1,2 1 Reserch
More informationInformation Caching Strategy for Cyber Social Computing Based Wireless Networks
Received 4 December 26; revised 23 Februry 27; ccepted 2 April 27. Dte of publiction 28 April 27; dte of current version 6 September 27. Digitl Object Identifier.9/TETC.27.2699695 Informtion Cching Strtegy
More informationA Simple Approach to Control the Time-constant of Microwave Integrators
5 VOL., NO.3, MA, A Simple Approch to Control the Time-constnt of Microwve Integrtors Dhrmendr K. Updhyy* nd Rkesh K. Singh NSIT, Division of Electronics & Communiction Engineering New Delhi-78, In Tel:
More information