Energy-efficient scheduling and hybrid communication architecture for underwater littoral surveillance

Size: px
Start display at page:

Download "Energy-efficient scheduling and hybrid communication architecture for underwater littoral surveillance"

Transcription

1 Computer Communictions xxx (26) xxx xxx Energy-efficient scheduling nd hybrid communiction rchitecture for underwter littorl surveillnce Mihel Crdei * Deprtment of Computer Science nd Engineering, Florid Atlntic University, Boc Rton, FL 33431, USA Received 9 Jnury 26; ccepted 9 Jnury 26 Abstrct There exists high demnd for relible, high cpcity underwter coustic networks to llow efficient dt gthering nd informtion exchnge. This is evidenced by significnt reserch in overcoming the limittions of the shllow wter coustic chnnel, such s low bndwidth, highly vrying multipth effects nd lrge propgtion delys. This pper proposes n energy-efficient scheduling mechnism for sclble network topology with hybrid RF-coustic communiction rchitecture, designed for underwter littorl surveillnce pplictions. In combintion with sclble buoy positioning scheme tht ssures AUV underwter synchroniztion nd position computtion, we propose Time Division Multiple Access scheduling technique for underwter communiction tht chieves energy-efficient, collision-free dt exchnge on the low dt rte coustic chnnel. We mesure the performnce of the communiction rchitecture by extensive simultions using the Opnet network simultor. Ó 26 Elsevier B.V. All rights reserved. Keywords: Ad hoc wireless networks; Network topology; Energy-efficient scheduling; Communiction rchitecture; Autonomous underwter vehicles; Underwter littorl surveillnce 1. Introduction Recent dvnces in the shllow-wter underse monitoring, surveillnce nd explortion demnd using the underwter coustic communiction chnnel s the primry medium for dt collection nd informtion exchnge. The communiction network usully includes utonomous underwter vehicles (AUVs) interconnected by coustic modems nd one or more surfce gtewys which provides links to commnd nd control center, which cn further be connected to bckbone network, such s the Internet. Surfce communiction cn be done using RF or stellite links. Applictions of deploying AUVs in shllow-wter includes underse surveillnce in littorl wters, ocenogrphic dt gthering, environmentl monitoring, nd costl defense. One of the mjor chllenges in underwter coustic networking is the development of networking protocols to * Tel.: ; fx: E-mil ddress: mihel@cse.fu.edu. overcome hrsh communiction conditions. Physicl lyer considertions include limited bndwidth, extreme propgtion delys, signl bsorption, time-vrying multipth with severe intersymbol interference nd lrge Doppler shifts [13]. These physicl lyer limittions dversely impct throughput, ltency, nd cpcity. Since the coustic network components re btterypowered, power efficiency is n importnt chrcteristic of the underwter communiction protocols. Designing energy-efficient scheduling nd communiction mechnisms hve n importnt role in prolonging the network opertionl lifetime. There exist lrge volume of reserch ddressing the difficulties of underwter coustic networks nd proposing solutions t different lyers of the network rchitecture. In [13,15], uthors present comprehensive survey of existing network technology t the physicl, dt link nd network lyers nd their pplicbility to underwter coustic chnnels. A cluster-bsed communiction protocol is proposed in [11]. Adjcent underwter vehicles re grouped into clus /$ - see front mtter Ó 26 Elsevier B.V. All rights reserved. doi:1.116/j.comcom

2 2 M. Crdei / Computer Communictions xxx (26) xxx xxx ters in which in-cluster communiction is chieved through TDMA nd inter-cluster communiction uses CDMA. The focus of this pper is on cluster mintennce, tht needs to ccommodte dynmic topology with mobile vehicles. The Deployble Autonomous Distributed Systems (DADS) [1] re motivted by requirement for wide-re underse surveillnce in littorl wters. The network connects the remote sensor pltforms through gtewy (e.g., se-surfce buoy) to distnt mster node cross stellite links. Acoustic dt is trnsmitted over multihop pths, using hlf-duplex CDMA links between discrete modem pirs nd three-wy hndshke protocol for dt trnsfer between ech pir of nodes. The pper lso describes series of ocen experiments nd mesurements. The work in [18] proposes networking protocol for underwter coustic networks of fixed or mobile nodes. The uthors propose centrlized topology control scheme by periodic topology discovery probes. The routing protocol proposed is centrlized, where the mster node determines ll routes through the network. CDMA technique is used for multiple ccess to the communiction medi. In this pper, we design shllow wter energy-efficient scheduling mechnism nd communiction rchitecture for littorl surveillnce ppliction. Our model includes (1) number of AUVs deployed for shllow-wter underse surveillnce, (2) number of se-surfce buoys tht ct s gtewy between the underwter coustic network (ACnet) nd the RF network (RFnet), nd (3) centrl commnd nd control sttion on ship positioned in close proximity to the surveillnce re. The reminder of this pper is structured s follows. Section 2 presents the networking model with prmeters considered for ACnet nd RFnet. In Section 3, we describe the littorl surveillnce scenrio nd problem definition. Next, we present the network rchitecture design in Section 4. We continue with our energy-efficient scheduling mechnism. Buoys rrngement mechnism is presented in Section 5, followed by the TDMA slot lloction lgorithm in Section 6. Section 7 presents performnce nlysis for simultion results nd Section 8 concludes our pper. 2. Hybrid networking model Underwter communiction is severely limited by the physicl lyer chrcteristics of the communiction medium. Usully, coustic networks in shllow wter support dt rte of 1 1 bps [18], lthough higher dt rtes of 16 kbps re reported in [12]. The vilble bndwidth for n coustic network is typiclly round 15 khz, nd it hs to be shred mong ll coustic nodes. Three mjor multiple ccess methods re Time Division Multiple Access (TDMA), Frequency Division Multiple ccess (FDMA), nd Code Division Multiple Access (CDMA) [17]. The work in [13] compres these methods from the point of view of shllow wter coustic communiction network. CDMA nd spred-spectrum signling pper to be promising multiple ccess technique. Another key fctor is the coustic signl propgtion speed of pproximtely 15 m/s, five orders of mgnitude lower thn tht of rdio chnnel. The lrge propgtion delys directly ffect the chievble throughput. Also, the signl rnge of n AUV vries from few kilometers up to 9 km [4]. The ppliction we re ddressing in this pper is underwter littorl surveillnce. The environment we consider is shllow wter, with depth less thn 5 feet. The hybrid network topology we consider is illustrted in Fig. 1 nd its components re described next. The rchitecture elements in our model re AUVs, buoys, nd centrl commnd nd control sttion, hosted on ship. Buoys nd the centrl sttion re considered fixed pltforms nd the AUVs re mobile sensor pltforms. In this pper, we use chrcteristics of the wireless equipment vilble t the Florid Atlntic University (FAU), the Deprtment of Ocen Engineering [1]. AUVs nd buoys cn communicte wireless to synchronize nd to shre informtion. Ech AUV nd buoy is equipped with FAU Dul Purpose Acoustic Modem (FAU-DPAM) [1,8]. A DPAM hs two trnsceivers: the first trnsceiver hs n RF rdio with 2.4 GHz trnsmitter with omnidirectionl ntenn for the surfce wireless communiction, hving 3 km rnge. Fig. 1. Hybrid RF-Acoustic Network Components.

3 M. Crdei / Computer Communictions xxx (26) xxx xxx 3 We ssume dt rte of 1 Mbps. Higher dt rte COTS products re vilble [14]. The ship hs only RF connectivity. the second trnsceiver is using n coustic chnnel in the khz bnd for underwter coustic communiction; the communiction rnge is bout 3 km with dt rte of 3 bps using Direct Sequence Spred Spectrum (DSSS) with Multiple Frequency-Shift Keying (MFSK) or it cn be bout 5 m with dt rte of 15 kbps by using DSSS with Phse-Shift Keying (PSK) [17]. In this pper, we ssume communiction rnge of 3 km nd dt rte of 3 bps. The AUVs re lmost ll the time moving with speed less thn 3 m/s. Their min tsk in this model is to monitor the costl ocen environment nd detect mines nd other suspect objects. Ech AUV is equipped with Side Scn Sonr HF Acoustic chirp [2] t 5 khz, with sensing rnge of bout 1.5 miles. Every AUV is lso equipped with cmer. When mine or nother potentilly dngerous object is detected, the AUV tkes one or more pictures (of bout 25 kbytes ech) tht need to be sent immeditely to the ship. Additionlly, n AUV is lso equipped with Globl Positioning System (GPS) receiver used for periodic time synchroniztion nd positioning when the AUV surfces. Fixed buoys provide communiction support for littorl AUV missions. In our model, buoys re deterministiclly plced t the beginning of the mission by specilized submrines. Buoy deployment positioning is detiled in Section 5. Buoys re equipped with GPS, llowing them to precisely determine time nd their loction. Buoys periodiclly brodcst their loction on the coustic network, llowing AUVs within trnsmission rnge to tringulte their own loction while being submerged. Both AUVs nd buoys re bttery-powered, nd therefore preserving energy resources by scheduling nd efficient communiction will increse the network lifetime. Beside AUVs nd buoys, the topology contins centrl commnd nd control sttion on ship. In our model, we ssume the ship is positioned within RF communiction rnge of t lest one buoy. Our rchitecture ssumes the ship is moving t low speed, or is sttionry. The hybrid wireless network consists of two d hoc wireless networks. The RF wireless network (RFnet) runs bove the ocen surfce, nd is formed by buoys, the ship nd the AUVs (while t surfce). The RFnet hs dynmic topology t the edges, becuse every AUV joins this network only when it reches the surfce nd must communicte t high speed. The RF network hs dt rte of 1 Mbps in the 2.4 GHz frequency bnd. Trnsceivers for RFnet re vilble for long rnge outdoors communiction. For exmple, MikroTik Wireless LAN USB dpter [14] uses 2.4 GHz DSSS rdio trnsmission, for dt rte of 11 Mbps, nd hs rnge of up to 5 km for outside environments. The trnsmit power is 32 mw. The second wireless network is the underwter ACoustic network (ACnet). The nodes in the ACnet re buoys nd AUVs nd they communicte using the coustic trnsceiver on the FAU-DPAM modem. As we discussed in the previous prgrphs, the communiction in the coustic network is severely limited by the physicl properties of the coustic chnnel in shllow wter. The interfce between the RFnet nd ACnet cn be ccomplished in two wys. First, buoys re prt of both networks, bsed on their dul modem, therefore they re ble to trnsfer informtion between the two networks. Second, the AUVs cn surfce nd join the RFnet. 3. Problem definition nd surveillnce scenrio In this pper, we ddress the underwter littorl surveillnce ppliction. A number of AUVs re deployed nd re using their sonr sensing cpbilities to detect mines or other relted trgets. Once suspicious object is detected, trget informtion needs to be reported immeditely to the ship, cross the wireless hybrid network. Our gol in this pper is to design n energy-efficient scheduling mechnism nd communiction rchitecture solution for underwter littorl surveillnce pplictions with the following requirements: (1) ccommodte the hrsh underwter coustic communiction prmeters (2) to relibly trnsmit to the ship, with high priority, messges from AUVs bout detected trgets (3) to periodiclly nd relibly send updtes with AUV sttus nd loction (4) to periodiclly trnsmit updtes to the ship on buoy sttus, nd (5) to relibly trnsmit commnds nd/or queries from ship to AUVs or buoys. With these requirements, we describe littorl surveillnce mission scenrio consisting of the following phses: Buoys nd AUVs deployment. This phse occurs t the beginning of the mission. The buoys nd AUVs re deployed by specilized submrine or by ship. We ssume the buoys re deterministiclly plced, s specified in Section 5. We lso ssume every AUV nd buoy hs ssigned unique ID. After deployment, the buoys nd AUVs strt the network initiliztion step. Network initiliztion. During the initiliztion phse, buoys nd the ship orgnize into n d hoc RF wireless network (RFnet) nd strt the routing protocol initiliztion. This opertion consists in exchnging short control messges nd constructing the routing tbles, in ccordnce with the routing protocol employed. Once n AUV is deployed, it goes to the surfce nd sends n initiliztion messge to the ship over the RFnet. This messge contins the AUV ID nd its current loction. Bsed on this informtion nd using our scheduling lgorithms, the ship replies with messge contining coordintes of the surveillnce region (where this AUV will perform the sensing tsk) nd TDMA slot. This TDMA slot will be used by the AUV for communiction in the ACnet. Division of

4 4 M. Crdei / Computer Communictions xxx (26) xxx xxx the surveillnce re in surveillnce regions is described in Section 5. TDMA slot lloction is discussed in Section 6. Idle network opertion. This phse describes the network opertion between trget detection events. The min tsk of the RFnet is to mintin the routing informtion updted, by periodiclly exchnging control informtion in ccordnce with the routing protocol used. Every buoy is responsible for periodiclly sending sttus report messges to the ship, contining informtion bout its stte (e.g., OK/CriticlCondition) nd list with AUVs in its rnge. We will refer to this messge s the sttusupdte messge. Next, we describe the opertions performed in the ACnet. Every AUV nd buoy will periodiclly send short messge with nvigtion control informtion. We refer to these messges s buoy becons nd AUV becons, respectively. A buoy becon contins the buoy ID, GPS-bsed loction nd time informtion, nd other ppliction specific informtion. For exmple buoy becon my encode short commnd sent from the ship to n AUV. An AUV becon contins the AUV ID, flight time, loction, speed, bering, nd one or more fields used for ACK nd dt exchnge. Ech AUV listens to other buoy becons nd AUV becons. Bsed on our design, every AUV moves into surveillnce region with the property ny point is within underwter coustic trnsmission rnge of t lest three buoys. Using loction nd time informtion from t lest three buoys, the AUV is ble to synchronize its clock nd compute its current loction through tringultion [5] while submerged. Informtion from other AUV becons is used for collision voidnce nd other nvigtion purposes. Every time n AUV gets to the surfce, it will use its GPS for precise time nd loction lignment. The system is lso chrcterized by GPS-updte-time ttribute. At most every GPS-updte-time, n AUV surfce to get synchronized. Every buoy listens for AUV becons nd updtes its AUV dtbse informtion. The min opertion performed by AUVs is sensing. Every AUV is equipped with Side Scn Sonr HF Acoustic chirp. The AUVs nvigte nd continuously monitor their environment. Trget detection. This phse strts when n AUV detects mine or suspicious trget. Ech AUV is equipped with digitl cmer. When trget is detected, the AUV cptures one or more photogrphs tht need to be sent with high priority to the ship. Becuse of the limittions in dt rte nd signl dely in the ACnet, it is not fesible to hve AUVs send lrge dt messges (e.g., pictures) over long distnces on the underwter network. The solution we dopt is to hve n AUV tht detects trget go to the surfce, join the RFnet nd strt messge exchnge with the ship. In our communiction protocol, the AUV sends in the fist messge one picture to the ship nd then wits for n cknowledgment, query or commnd from the ship. While witing for the reply, the AUV performs GPS loction nd time updte. If n cknowledgment is received, the AUV dives nd continues the surveillnce process. The AUV cn lso receive query from the ship, sking for more pictures (lredy vilble t the AUV), cse in which the AUV strts trnsmitting the required informtion nd wits for new ship reply. Besides these two replies, the ship my commnd the AUV to go to specific loction within its surveillnce region nd monitor the environment. In this cse, the AUV dives, strts the sonr, sets the new wypoint nd begins its new tsk. New sensing tsk. The ship cn explicitly sk n AUV to nvigte t specific loction in its surveillnce region nd collect dt. The messge is sent by the ship cross the RFnet to the buoys tht re within this AUV s communiction rnge. These buoys will then trnsmit this commnd on the ACnet, piggybcked in buoy becon. Mission termintion. This opertion is ccomplished by hving the ship sending specil Termintion control pcket to every AUV. Upon receiving this messge, n AUV performs the termintion procedure, nvigting towrd specific pick-up loction. 4. Hybrid network rchitecture design In this section, we describe the networking rchitecture for the ACnet nd RFnet. In n underwter coustic environment, the communiction mechnism needs to consider poor conditions in terms of ltency nd dt rte. We design the ACnet rchitecture to include only Physicl, Dt Link, nd Appliction Lyers. Our model does not require network protocol, becuse the only communiction in ACnet is AUV nd buoy becon brodcst. This is n one-hop informtion exchnge, where nodes do not forwrd the messge they receive. The Physicl Lyer uses DSSS with MFSK with dt rte of 3 bps nd communiction rnge R = 3 km, ccording with the chrcteristics of the FAU-DPAM modem, coustic trnsceiver (see Section 2). The multiple ccess scheduling method we dopt for the underwter communiction is TDMA. TDMA voids collisions by llocting time slot to every AUV nd buoy. It is n energy-efficient scheduling mechnism since it voids dditionl control messges exchnge. For exmple, TDMA scheduling mechnism voids the hndshke overhed of wireless MAC protocols such s Crrier Sense Multiple Access with Collision Avoidnce (CSMA-CA), nd Multiple Access with Collision Avoidnce-derived protocols like MACAW (MACA for Wireless) nd IEEE [16] protocols. Actully, MAC trnsmission protocol involving lrge number of messge exchnge is lso not fesible becuse of the long propgtion delys in coustic networks.

5 M. Crdei / Computer Communictions xxx (26) xxx xxx 5 Bsed on the buoy deployment mechnism (see Section 5), five TDMA slots from the TDMA frme will be ssigned to the buoys, s represented in Fig. 3 nd ll other will be ssigned to the AUVs. The scheduling using the TDMA slot lloction mechnism is further detiled in Section 6. AUVs nd buoys use the TDMA slots for sending short becons in the ACnet nd not for lrge dt trnsmissions. For exmple, if we design becon with 32 bytes, then we cn hve TDMA slot of 3 s. This will suffice for.85 s becon trnsmission delys nd 2 s propgtion dely t 3 km distnce. The RFnet network is used for trnsmitting long messges between the AUVs nd ship, for sttus-updte messges nd to issue commnds from the ship to the AUVs. A ship commnd ddressed to submerged AUV will be sent to the buoys in the communiction rnge of tht AUV. This is esy to implement, bsed on informtion from the sttus-updte messges received by the ship from buoys. The RFnet rchitecture is typicl to n IP d hoc wireless networks nd includes the Physicl nd Dt Link lyers, nd the TCP/IP Network nd Trnsport lyers. At the Physicl Lyer, we ssume the following ttributes: rdio frequency 2.4 GHz, DSSS signl spreding technique, dt rte of 1 Mbps nd communiction rnge of 3 km. The RF communiction rnge should be greter or equl to the coustic communiction rnge in order to hve ny AUV t the surfce within RF trnsmission rnge of t lest one buoy. The MAC protocol used in the RFNet is IEEE Distributed Coordintion Function (DCF). At the Network Lyer, we use rective routing protocol for d hoc wireless networks, such s Dynmic Source Routing (DSR) or Ad Hoc On-Demnd Distnce Vector (AODV). In our simultions we use DSR for its good performnces in terms of relibility, routing overhed nd pth optimlity [6,7]. When n AUV joins the RFnet for informtion exchnge it lso runs the selected d hoc routing protocol but is not involved in dt forwrding on behlf of other nodes. It is only lef in the network topology. At the Trnsport Lyer, we use the TCP protocol [16] for its relible communiction nd congestion voidnce mechnism. It is well-known tht TCP performs poorly in multihop wireless networks [3], due to its inbility to differentite between retrnsmissions due to congestion versus pcket loss. In our ppliction scenrio AUVs find trgets infrequently nd ll high dt rte trffic is sent towrds the ship node, thus congestion my occur. 5. Buoy positioning The positioning of the buoys plys n importnt role in our scheduling mechnism. The fctors we considered in designing mechnism for computing the buoy loctions re the following: Mission specifics. The mission considered in this pper is littorl surveillnce, where AUVs re moving long the costline. AUV loction. AUVs need to be ble to tringulte their loction bsed on the GPS informtion included in the periodic buoy becons. At ny time ech AUV should be within trnsmission rnge of t lest three buoys. Minimized number of buoy slots. The underwter communiction protocol proposed in this pper is TDMA, nd, becuse the frme period is limited (see Section 6), the number of slots llocted to the buoys should be minimized. Mximized surveillnce re. The surveillnce re where AUVs nvigte should be mximized. Note tht ny point within the nvigtion re should be within the communiction rnge of t lest three buoys for loction identifiction. Bsed on these considertions, we rrnge the buoys in two rows long the costline in order to provide rectngulr surveillnce re (see Fig. 2) with the property tht ny point within this re is within communiction rnge of t lest three buoys. Therefore, ny AUV nvigting within this rectngle receives periodic becons from t lest three buoys, nd will be ble to periodiclly updte its loc- Fig. 2. Buoy positioning for n = 8 buoys.

6 6 M. Crdei / Computer Communictions xxx (26) xxx xxx tion through tringultion. The distnce between two buoys in the sme row is equl to R, where R is the underwter communiction rnge of the buoys nd AUVs (e.g., R is set up to 3 km). Next, we will determine the reltive loction of the two rows in order to mximize the surveillnce re. Let us consider the first row fixed nd the Crtesin coordinte system s in Fig. 2. We neglect in this discussion the verticl coordinte, becuse the mission is performed in shllow wter, with depth less thn 5 feet, much smller thn the vlues in the other two horizontl coordintes. We consider n buoys B 1, B 2, B 3,..., B n deployed s in Fig. 2. We orgnize them in two rows, with B 1, B 3,... in the first row nd B 2, B 4,... in the second row. Next, we compute the loction of the second row (e.g., determine d x nd d y ), in order to mximize the surveillnce rectngle re. In the picture, we hve represented the two buoy rows nd their communiction disk, inside circle with rdius R. In the Fig. 2, we cn observe tht the points U 1, U 1, U 2, U 2,...nd L 1, L 1, L 2, L 2,...estblish the upper nd lower rectngle edges. The points right bove U 1, U 1, U 2, U 2,... or below L 1, L 1, L 2, L 2,... re not within communiction rnge of three buoys. The rectngle width cn be expressed s W ¼ minfy U 2 y L2 ; y U y 2 L g, where x A nd y A re the 2 x nd y coordintes of the point A. Considering d y fixed, bsic geometric computtion indictes tht W is mximized when d x = R/2, cse when both U 1, U 1, U 2, U 2 ;... nd L 1, L 2, L 2, L 3,... re colliner. The left edge of the rectngle is determined by the intersection point (e.g., U 1 ) of the circle with rdius R centered t the third buoy from left (e.g., B 3 ) with the upper edge, nd the right edge of the rectngle is determined by the intersection point (e.g., L 3 ) of the circle with rdius R centered t the third buoy from right (e.g., B 6 ) with the lower edge. Note tht there will be other points in the rectngle s vicinity tht will be covered by t lest three buoys, but our gol is to determine rectngulr shpe with this property. p Next we wnt to determine d y 2½; R ffiffi 3 =2Š such tht to mximize p the surveillnce rectngle re, Are = W L. d y ¼ R ffiffi 3 =2 corresponds to the p cse when B 1 B 2 = B 2 B 3 = B 1 B 3 = R nd W ¼ R ffiffi p 3 =2. Cses d y > R ffiffi p 3 =2 re not considered, s they produce W < R ffiffi 3 =2. Using the geometric computtion presented rffiffiffiffiffiffiffiffiffiffiffiffi in Appendix A, we obtin tht W ðd y Þ¼ 3R 7R 2 4y 2 d nd 2 9R 2 þ4y 2 d rffiffiffiffiffiffiffiffiffiffiffiffi 7R Lðn; d y Þ¼ðn 2ÞR=2 d 2 4d 2 y y for ny n P 3. Tking 9R 2 þ4d 2 y dðw ðdyþþ dðd yþ the derivtive, we obtin 6 nd dðlðn;dyþþ dðd yþ <, when p d y 2½; R ffiffiffi 3 =2Š. Therefore, W (dy ) nd L n (d y ) re decresing functions of d y, chieving the mximum vlue when d y =. An importnt gol of deploying buoys is to brodcst GPS informtion. In order for the AUVs to perform the tringultion lgorithm, the buoys cnnot be colliner, therefore d y needs to be greter thn specific threshold. We ssume d y = d, where d is the minimum vlue required in the tringultion lgorithm. Note tht this buoy orgniztion is sclble. Additionl buoys cn be deployed to increse the surveillnce length. Any dditionl buoy will increse the length with R/2. Also, by using this rrngement, only five TDMA slots will suffice for the buoys coustic communiction. TDMA slot lloction is presented in Section 6. Another observtion is tht buoys re nchored t the ocen floor, therefore their loction on the ocen surfce is not fixed, they re continuously moving round the nchor point. Still this distnce is very smll compred to the distnces between buoys nd it is therefore neglected in this pper. 6. TDMA slot lloction In this pper, we propose TDMA scheduling mechnism both for energy-efficiency considertions, s well s becuse of the coustic environment constrints, s discussed previously. TDMA frme period is limited by the frequency with which the AUV nd buoys need to send becons. The becons re criticl for AUV synchroniztion, positioning, nd nvigtion s well for sending ccurte sttus updte informtion. On the other hnd, the TDMA slot size is ffected by the low dt rte nd long propgtion dely in the coustic network. Therefore, the gol of the TDMA slot lloction mechnism is to use minimum number of TDMA slots in frme intervl. In our scenrio, the first five slots 1 5 re llocted to the buoys. Considering the numbering in Fig. 3, the buoy B i, i = 1,2,..., n will be ssigned the slot i In this wy, ny AUV in the surveillnce re will be within communiction rnge of t most one buoy trnsmitting in the sme slot. This is becuse the communiction rnge of ny two buoys ssigned to the sme slot (e.g., B 1 nd B 6 ) do not intersect. Let us ssume tht fter llocting the first five slots to the buoys, we re left with s TDMA slots to be llocted to the AUVs. Consider the number of AUVs to be deployed is m nd the length of the surveillnce rectngle is L. Next, we present mechnism for llocting slots to the AUVs, using sptil slot reuse. This mechnism is performed only once, during the initiliztion phse. The slot lloction lgorithm is run by the ship. The following mechnism cn be pplied when L/ (r +1)>R, where r is the number of regions computed by Algorithm 1. If this reltion does not hold, then we need to djust the L, m, nd s prmeters correspondingly, e.g., either increse L or the number of slots s or decrese m, the number of AUVs. Next we present two lgorithms. Algorithm 1 hs s input m, s, L nd divides the surveillnce rectngle in

7 M. Crdei / Computer Communictions xxx (26) xxx xxx 7 Fig. 3. Surveillnce regions for n = 15 buoys nd time slot lloction when m = 1 nd s =6. regions, ssocites TDMA slots to every region nd identifies every buoy to which region it belongs bsed on its loction. Any slot ssocited to region is lter ssigned by the ship to n AUV to use for becons while performing the surveillnce tsk within tht region. Algorithm 2 ssigns communiction slot to n AUV. This lgorithm is executed by the ship s result of request from the AUV sent during the initiliztion phse, when the AUV is t the ocen surfce. Let us note with S the set of TDMA slots for AUVs, e.g., for exmple in Fig. 3, S ={s 6,s 7,...,s 11 } nd S =s, where S represents the crdinlity of the set S. Algorithm 1 (m, s, L). Input: m, s, L Output: divide surveillnce rectngle in regions, ssign TDMA slots to ll regions Step 1. If m 6 s, then the surveillnce rectngle forms one region R 1. Assign ll s slots to R 1. All buoys will lso be prt of R 1. Exit. Step 2. Compute the number of regions r First, we divide the slots in S in three sets S 1, S 2, S 3, S 1 + S 2 + S 3 =s: if (s == 3k) where k 2 N, then S 1 = S 2 = S 3 =k else if (s == (3k + 1)) then S 1 =k + 1 nd S 2 = S 3 = k else if (s == (3k + 2)) then S 1 = S 2 =k + 1 nd S 3 =k Let S 1 contin the first S 1 slots from S, S 2 the next S 2 slots, nd S 3 the lst S 3 slots. Next, compute the number of regions r s follows: r =3ºm/sß if ((m s) >( S 1 + S 2 )) then r = r +3 else if ((m s) > S 1 ) then r = r +2 else if ((m s) > ) then r = r +1 Step 3. Divide the surveillnce rectngle into r equl regions This step divides the surveillnce rectngle into r + 1 rectngles, with length d = L/(r + 1), s illustrted in Fig. 3. Note tht L/(r +1)>R. We define r regions s the following rectngles: R 1 ¼ R 1 R 3 R 3 R 1 ; R 2 ¼ R 2 R 4 R 4 R 2 ;...; R r ¼ R r R rþ2 R rþ2 R r. Step 4. Assign slots to every region R i, for i =1,...,r for (i =1,...,r) { if ((i 3) == 1) then ssign to R i the slots in the set S 1. else if ((i 3) == 2), then ssign to R i the slots in the set S 2. else if ((i 3) == ), then ssign to R i the slots in the set S 3. } Step 5. Every buoy belongs to one, two or three regions depending on its loction. for (i =1,...,n, j =1,...,r){ if (x Bi 2 [x Rj,x Rj+2 ]) then B i belongs to the region R j, where R j ¼ R j R jþ2 R jþ2 R j } Algorithm 2. Input: AUV i Output: Allocte TDMA slot to AUV i Bsed on the AUV i loction, determine the closest region R j tht hs slot u vilble. If two such regions re vilble, choose the one with smllest index. Mrk the slot u in R j s busy nd ssign slot u to AUV i. AUV i will belong to R j, this mens tht AUV i will perform the surveillnce opertion within R j nd will trnsmit its becon during the slot u in the ACnet. Theorem 1. Algorithm 1 provides enough slots to ccommodte ll m AUVs trnsmissions. Any buoy nd ny AUV nvigting in region R i will receive collision-free messges from ny AUV tht hs been ssigned slot from R i s result of Algorithm 2. Proof. First, we prove tht the number of slots llocted by the Algorithm 1 in ll r regions is greter or equl with m. We distinguish four cses:

8 8 M. Crdei / Computer Communictions xxx (26) xxx xxx 1. (m s) ==. Then there re r = 3m/s regions nd number of slots is (m/s)( S 1 + S 2 + S 3 ) = m. 2. (m s)>( S 1 + S 2 ). In this cse we hve r = ºm/sß +3 regions nd the number of slots llocted to ll regions is (ºm/sß + 1)( S 1 + S 2 + S 3 ) = (ºm/sß +1)s > m. 3. ( S 1 + S 2 ) P (m s)> S 1. In this cse we hve r = ºm/sß + 2 regions nd the number of slots is (ºm/sß) ( S 1 + S 2 + S 3 ) + S 1 + S 2 =(ºm/sß)s + S 1 + S 2 >m. 4. js 1 P (m s) >. In this cse we hve r = ºm/sß +1 regions nd the number of slots is (ºm/sß)( S 1 + S 2 + S 3 ) + S 1 = (ºm/sß)s + S 1 >m. If n AUV hs been ssigned slot u from region R i, then it will nvigte nd perform surveillnce within tht region. Bsed on the wy we ssign slots to regions (see Algorithm 1, Step 4), the closest regions with the sme slots re R i nd R iþ3, for i =1,...,r 3. The minimum distnce between R i nd R iþ3 is d nd becuse d > R, ny node (AUV or buoy) inside R i will not receive ny trnsmission from node inside R iþ3. h Let us now show the slot lloction mechnism on the exmple illustrted in Fig. 3. We know L, m = 1, S = {6,7,8,9,1,11}, s = 6. Then S 1 = {6,7}, S 2 = {8, 9} nd S 3 = {1,11} nd there re five regions: R 1 ¼ R 1 R 3 R 3 R 1 ; R 2 ¼ R 2 R 4 R 4 R 2 ; R 3 ¼ R 3 R 5 R 5 R 3 ; R 4 ¼ R 4 R 6 R 6 R 4 ; nd R 5 ¼ R 5 R 7 R 7 R 5. Time slots in the set S 1 re ssigned to R 1 nd R 4, time slots in S 2 re ssigned to R 2 nd R 5 nd time slots in S 3 re ssigned to R 3. Assuming the ten AUVs re deployed uniformly long the rectngle, possible slot ssignment is s follows: R 1 : AUV 1 on slot 6 nd AUV 2 on slot 7, R 2 : AUV 3 on slot 8 nd AUV 4 on slot 9, R 3 : AUV 5 on slot 1 nd AUV 6 on slot 11, R 4 : AUV 7 on slot 6 nd AUV 8 on slot 7, R 5 : AUV 9 on slot 8 nd AUV 1 on slot 9. Advntges of using this slot lloction mechnism include: (1) energy-efficient mechnism with low overhed; (2) it uses reduced number of time slots s; (3) it proposes uniform AUV distribution, by orgnizing the surveillnce re in smller regions; (4) it is sclble. More buoys nd AUVs cn be deployed following the sme pttern, without modifying the existing orgniztion. 7. Simultion results In this section, we nlyze the performnce of our protocol through simultions. We implement the communiction protocol with the Opnet network simultor [9]. Next, we present the vlues of the prmeters considered in our testing, followed by the performnce metrics nd simultion results. For testing, we ssume scenrio with n=15 buoys, positioned ccording to Algorithm 1 (see Fig. 3). This will result in surveillnce re with length L = m for d y = 1 m. The RF communiction rnge is R =3km nd the dt rte for the RFnet is 1 Mbps. For the ACnet, we ssume n coustic communiction rnge of 3 km, dt rte of 3 bps using DSSS/MFSK, nd signl propgtion speed of 15 m/s. For the TDMA slot configurtion, we consider tht 5 slots re llocted to the buoys nd s = 7 slots re llocted for AUVs. This result in TDMA frme period of 12 slots nd when the slot time is 3 s, we obtin TDMA frme of 36 s. The reson for choosing 3 s is s follows. Every AUV nd buoy periodiclly exchnge becons in its llocted slot. We consider becon size is 32 bytes. An AUV becon contins the AUV ID, flight time, speed, bering, loction coordintes nd one or more fields used for ACK nd dt exchnge. A Buoy becon contins buoy ID, GPS-bsed loction nd time informtion nd one or more fields used for dt exchnge. We choose the TDMA slot size of 3 s to include the becon trnsmission time in the ACnet of.85 s nd 3 km propgtion time of 2 s. Note tht these ttributes re vribles in our code nd their vlues cn be chnged ccording with the plnned scenrio. The scenrio considered is presented in Section 3. Once n AUV is deployed, it gets to the surfce nd sends n initiliztion messge to the ship over the RFnet. The ship responds with messge contining the coordintes of the surveillnce region nd the TDMA slot llocted to this AUV. The ship does the ssignment bsed on the current AUV loction. It will select the closest region tht hs TDMA slot vilble. The AUV then dives nd performs the surveillnce tsk. We ssume the AUV speed of 3 m/s. We used the DSR routing protocol [7] for RFnet communiction. At the trnsport lyer, we used TCP protocol. We chose TCP protocol becuse it offers connection-oriented nd relible communiction service. Also, the congestion control mechnism prevents congestion when multiple AUVs trnsmit long messges (imges) to the ship. We used the DSR nd TCP protocol models provided by Opnet. The communiction in the ACnet uses TDMA, s we described in the previous sections. The prmeters we vried in our simultion re the number of AUVs, the ship loction, the trget detection intervl nd the number of imge messges sent by n AUV to the ship for every trget detected. The performnce metrics we mesured re the AUV to ship messge dely, ship to AUV commnd dely, sttus-updte messge dely (with or without the AUV becon dely), nd ggregte throughput. In the first set of mesurements we vry the number of AUVs deployed, between 1 nd 12. We ssume the ship is positioned t the center of the surveillnce rectngle. Trget detection time is uniformly distributed between 3 min nd 1 h nd the intervl the ship will issue new commnd for every AUV is uniformly distributed between 2 nd 4 min. In Fig. 4, we mesure the AUV to ship messge dely. This is for the cse when n AUV detects trget nd gets to the surfce to trnsmit the first imge to the ship. This dely is therefore mesured over RFnet. The size of n imge messge is 25 kbytes. Our results indicte n verge dely of 1 s nd the t 2.5 s. These vlues re dependent on the number of hops between AUV nd

9 M. Crdei / Computer Communictions xxx (26) xxx xxx 9 3 b AUV to ship messge dely, sec AUV count Ship to AUV commnd dely, sec AUV count Fig. 4. Messge delys in communiction between AUV nd ship. ship nd re lso ffected by MAC lyer contention, TCP nd routing overhed nd retrnsmission delys. In Fig. 4b, we mesure the dely for sending commnd from the ship to the AUV. Here the AUV is submerged, so this dely reflects both the RF nd coustic dely. The dely hs n verge of 2 s, with the t 95 s. The RFnet dely is ffected by the fctors mentioned before. Regrding the ACnet communiction, the commnd is sent by the buoy during its slot, so the commnd will be queued t the buoy between nd 33 s. As we send only one commnd per becon, it my hppen tht commnd is delyed few TDMA frme periods, especilly for cses with more AUVs. In our model, buoys re responsible for periodiclly sending sttus-updte messges to the ship with informtion bout AUVs in their rnge. Buoys collect this informtion from the AUV becons received in the ACnet. The frequency of sending informtion updtes by the buoys cn be set up to different vlues. For these simultions we ssume sttus updtes re sent every TDMA frme intervl, tht is, every 36 s. In Fig. 5, we represent the dely of the sttus-updte messges, wheres in the Fig. 5b, the dely is mesured from the moment Aggregte messge throughput t the ship, bps AUV count Fig. 6. Aggregte messge dely t the ship depending on the number of AUVs. it ws sent by the AUV. This dely includes the time the AUV becon ws sent over the ACnet (3 s), the dely occurred in the buoy (up to 33 s) nd the dely over the RFnet. In Fig. 6, we present the ggregte throughput mesured t the ship. As expected, the verge vlue increses with the number of AUVs..14 b Sttus-updte messge dely, sec AUV count AUV becon plus sttusupdte messge dely, sec AUV count verge verge Fig. 5. Sttus-updte messge delys.

10 1 M. Crdei / Computer Communictions xxx (26) xxx xxx AUV to ship messge dely, sec Centrl positioning Lterl positioning b Ship to AUV reply dely, sec Centrl positioning Lterl positioning Ship positioning Ship positioning Fig. 7. Messge dely depending on the ship positioning. In the next set of mesurements, we study the impct of the ship loction on the messge delys between the AUV nd ship nd sttus-updte messge dely. We compred the cse when the ship is positioned t the middle of the surveillnce rectngle (e.g., close to B 6 in Fig. 3), versus the cse when it is positioned lterlly (e.g., close to B 1 in Fig. 3). A centrl ship positioning will reduce the verge number of hops involved in RFnet communiction Sttus-updte messge dely, sec Centrl positioning Ship positioning Lterl positioning Fig. 8. Becon dely depending on the ship positioning. between ship nd buoys or surfce AUVs. In Fig. 7, we mesure the dely of the messges with 25 KB imges, sent from AUVs to ship. Fig. 7b represents the reply sent from the ship to the surfce AUV. This is 96 bits pcket which is used for ACK, or for issuing new commnds to the AUV or for requesting for more pictures. Next, Fig. 8 illustrtes the vrition of the sttus-updte messge depending on the ship loction. In the next test, we study the impct of vrying the rte t which AUVs detect trgets: 15, 3, 45, nd 6 min. The dely of the messges with pictures sent from AUVs to the ship is represented in Fig. 9. Also, in Fig. 9b, we represent the ggregte throughput. As more messges re generted with smller trget detection intervl, the ggregte throughput increses correspondingly. In the lst set of experiments, we vry the number of messges sent by AUVs per trget detected. We ssume tht when trget is detected, fter the AUV sends the first imge messge, the ship lwys sks for ll the remining imges. The gol is to test the system comportment when vrying the lod. In this cse we set the trget detection intervl s being uniformly distributed between 2 nd 3 min. We represent in Fig. 1, the dely of the messges with pictures sent by the AUVs to the ship nd in Fig. 1b, the dely of the sttus-updte messges. We observe n AUV to ship messge dely, sec b Aggregte throughput t the ship, bps Trget detection intervl, min Trget detection intervl, min Fig. 9. Messge dely nd ggregte throughput bsed on the trget detection intervl.

11 M. Crdei / Computer Communictions xxx (26) xxx xxx 11 3 b AUV to ship messge dely, sec Number of messges sent by AUV per trget detected Sttus-updte messge dely, sec Number of messges sent by AUV per trget detected Fig. 1. AUV to ship nd sttus-updte messge dely depending on the number of messges sent by AUV per trget detected. Aggregte throughput t the ship, bps Number of messges sent by AUV per trget detected Fig. 11. Aggregte throughput t the ship depending on the number of messges sent by AUV per trget detected. increse in dely when the number of messges sent per trget detected is 1. In the lst grph, in Fig. 11, we represent the increse in the ggregte throughput with the number of messges sent by AUV per trget detected. 8. Conclusions In this pper, we ddress the problem of designing n energy-efficient scheduling mechnism nd sclble hybrid RF-coustic communiction rchitecture, tht fcilittes trnsfer of dt from AUVs to centrl control nd commnd sttion on ship. Communicting buoys serve s gtewys between the coustic nd RF networks nd provide messge forwrding cross the d hoc RFnet. Mjor impediments ssocited with underwter coustic networks tht were considered re severe bndwidth limittions nd long propgtion delys. The Medium Access Control scheduling method dopted is TDMA, providing collision-free, energy-efficient communiction on the low-dt rte coustic chnnel. We design sclble TDMA slot lloction mechnism with sptil-reuse chrcteristics. We lso design sclble buoy positioning mechnism tht gurntees every point in the surveillnce re is within communiction rnge of t lest three buoys for fcilitting y L U 1 U 2 U' 2 C B 2 B 4 B 6 B 8 O E b B B 1 3 B D 5 B 7 R W x L' 2 L 3 Fig. 12. L nd W computtion.

12 12 M. Crdei / Computer Communictions xxx (26) xxx xxx AUV underwter tringultion. Performnce of our communiction system is nlyzed with simultions in the Opnet network simultor. Acknowledgement The uthor thnks Dr. Andres Folleco for his vluble input on shllow wter coustic communictions. Appendix A. In this ppendix we compute the length L nd width W of the surveillnce rectngle, considering n buoys B 1,B 2,...,B n, n P 3, the p coordintes of B 2 s being B 2 (R/2,d y ), nd d y 2½; R ffiffiffi 3 =2Š. For the nottions we refer to Fig. 12 where n =8. From nu 2CL 2: cos ¼ W nd from nb 2U 2 E 3 DB 6 : cos ¼ 3R=2 2EB 6, therefore W ¼ 3R U 2 E 2 EB 6. In nb 3 DB 6 : EB 2 6 ¼ 1 4 ðd2 y þð3r 2 Þ2 Þ¼ 1 16 ð4d2 y þ 9R2 Þ nd in nu 2EB 6 : rffiffiffiffiffiffiffiffiffiffiffiffi U 2 E2 ¼ 1 16 ð7r2 4d 2 y Þ, therefore W ¼ 3R 7R 2 4d 2 y. 2 9R 2 þ4d 2 y Let us next compute L. L cn be written s L =2Æpr(B 3 U 1,Ox)+(n 5) * R/2, where pr(b 3 U 1,Ox) is the projection of B 3 U 1 on the Ox xis. We hve pr(b 3 U 1,Ox) =pr(b 3 U 2,Ox) =R Æ cos( + b), nd cosð þ bþ ¼cos cos b sin sin b ¼ 3R=2 2EB 6 EB 6 dy R 2EB 6 U 2 E R rffiffiffiffiffiffiffiffiffiffiffiffi rffiffiffiffiffiffiffiffiffiffiffiffi ¼ 3 dy 7R 2 4d 2 y 7R. So we get L ¼ 3R=2 d 2 4d 2 y 4 2R 9R 2 þ4d 2 y y 9R 2 þ4d 2 y rffiffiffiffiffiffiffiffiffiffiffiffi 7R þðn 5ÞR=2 ¼ðn 2ÞR=2 d 2 4d 2 y y, for ny n P 3. References 9R 2 þ4d 2 y [1] Deprtment of Ocen Engineering t Florid Atlntic University, < [2] Center for Acoustic nd Vibrtions t FAU, < [3] H. Blkrishnn, V.N. Pdmnbhn, S. Seshn, R.H. Ktz, A comprison of mechnisms for improving TCP performnce over wireless links, IEEE/ACM Trnsctions on Networking (1999). [4] J. Ctipovic, D. Brdy, S. Etchemendy, Development of underwter coustic modems nd networks, Ocenogrphy 6 (1993). [5] X. Cheng, A. Theler, G. Xue, D. Chen, TPS: time-bsed positioning scheme for outdoor wireless sensor networks, IEEE INFOCOM (24). [6] J. Broch, D.A. Mltz, D.B. Johnson, Y. Hu, J. Jetchev, A performnce comprison of multi-hop wireless d hoc network routing protocols, in: ACM/IEEE Interntionl Conference on Mobile Computing nd Networking, October [7] The Dynmic Source Routing Protocol for Mobile Ad Hoc Networks (DSR), IETF Internet drft, Februry 22. [8] Hrdimnker, J.L.R. LeBlnc, P. Beujen, M. Singer, C. Boubli, G.T. Strutt, Chirp FSK modem for high relibility communiction in shllow wter, IEEE Ocens 99 (1999). [9] < [1] J. Rice, B. Creber, C. Fletcher, P. Bxley, K. Rogers, K. McDonld, D. Rees, M. Wolf, S. Merrim, R. Mehio, J. Prokis, K. Scussel, D. Port, D. Green, Evolution of Seweb underwter coustic networking, in: Proceedings of the IEEE Ocens Conference, Providence, RI, September 2. [11] F. Slv-Gru, M. Stojnovic, Multi-cluster protocol for d hoc mobile underwter coustic networks, in: Proceedings of the IEEE OCEANS 3 Conference, September 23. [12] B. Shrif, J. Neshm, O.R. Hinton, A.E. Adms, A computtionlly efficient Doppler compenstion system for underwter coustic networks, IEEE Journl of Ocenic Engineering 25 (1) (2). [13] E.M. Sozer, M. Stojnovic, J.G. Prokis, Underwter coustic networks, IEEE Journl of Ocen Engineering 25 (1) (2) [14] Wireless Outdoor Adpter, < usb_outdoor.pdf/>. [15] J. Prokis, E. Sozer, J. Rice, M. Stojnovic, Shllow wter coustic networks, IEEE Communictions Mgzine 39 (11) (21). [16] A. Tnenbum, Computer Networks, fourth ed., Prentice Hll, 23. [17] W. Stllings, Wireless Communictions nd Networks, Prentice Hll, 22. [18] G.G. Xie, J. Gibson, A networking protocol for underwter coustic networks, Technicl report TR-CS--2, Deprtment of Computer Science, Nvl Postgrdute School, December 2. Mihel Crdei is Assistnt Professor in the Deprtment of Computer Science nd Engineering t Florid Atlntic University, nd Director of the NSF-funded Wireless nd Sensor Network Lbortory. Dr. Crdei received her Ph.D. nd M.S. in Computer Science from the University of Minnesot, Twin Cities, in 23 nd 1999 respectively. Her reserch interests include wireless networking, wireless sensor networks, network protocol nd lgorithm design, nd resource mngement in computer networks. She is member of IEEE nd ACM.

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN Inventor: Brin L. Bskin 1 ABSTRACT The present invention encompsses method of loction comprising: using plurlity of signl trnsceivers to receive one or

More information

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES Romn V. Tyshchuk Informtion Systems Deprtment, AMI corportion, Donetsk, Ukrine E-mil: rt_science@hotmil.com 1 INTRODUCTION During the considertion

More information

High-speed Simulation of the GPRS Link Layer

High-speed Simulation of the GPRS Link Layer 989 High-speed Simultion of the GPRS Link Lyer J Gozlvez nd J Dunlop Deprtment of Electronic nd Electricl Engineering, University of Strthclyde 204 George St, Glsgow G-lXW, Scotlnd Tel: +44 4 548 206,

More information

A Cluster-based TDMA System for Inter-Vehicle Communications *

A Cluster-based TDMA System for Inter-Vehicle Communications * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 213-231 (2014) A Cluster-bsed TDMA System for Inter-Vehicle Communictions * Deprtment of Electricl Engineering Ntionl Sun Yt-Sen University Kohsiung,

More information

Energy Harvesting Two-Way Channels With Decoding and Processing Costs

Energy Harvesting Two-Way Channels With Decoding and Processing Costs IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, VOL., NO., MARCH 07 3 Energy Hrvesting Two-Wy Chnnels With Decoding nd Processing Costs Ahmed Arf, Student Member, IEEE, Abdulrhmn Bknin, Student

More information

Multi-beam antennas in a broadband wireless access system

Multi-beam antennas in a broadband wireless access system Multi-em ntenns in rodnd wireless ccess system Ulrik Engström, Mrtin Johnsson, nders Derneryd nd jörn Johnnisson ntenn Reserch Center Ericsson Reserch Ericsson SE-4 84 Mölndl Sweden E-mil: ulrik.engstrom@ericsson.com,

More information

The Discussion of this exercise covers the following points:

The Discussion of this exercise covers the following points: Exercise 4 Bttery Chrging Methods EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the different chrging methods nd chrge-control techniques commonly used when chrging Ni-MI

More information

Exercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION

Exercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION Exercise 1-1 The Sine Wve EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the notion of sine wve nd how it cn be expressed s phsor rotting round the center of circle. You

More information

Algorithms for Memory Hierarchies Lecture 14

Algorithms for Memory Hierarchies Lecture 14 Algorithms for emory Hierrchies Lecture 4 Lecturer: Nodri Sitchinv Scribe: ichel Hmnn Prllelism nd Cche Obliviousness The combintion of prllelism nd cche obliviousness is n ongoing topic of reserch, in

More information

Redundancy Data Elimination Scheme Based on Stitching Technique in Image Senor Networks

Redundancy Data Elimination Scheme Based on Stitching Technique in Image Senor Networks Sensors & Trnsducers 204 by IFSA Publishing, S. L. http://www.sensorsportl.com Redundncy Dt Elimintion Scheme Bsed on Stitching Technique in Imge Senor Networks hunling Tng hongqing Technology nd Business

More information

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks

A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks Globecom 04 - Wireless Networking Symposium A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Rdio Networks Xingy Liu nd Jing Xie Deprtment of Electricl nd Computer Engineering

More information

Geometric quantities for polar curves

Geometric quantities for polar curves Roerto s Notes on Integrl Clculus Chpter 5: Bsic pplictions of integrtion Section 10 Geometric quntities for polr curves Wht you need to know lredy: How to use integrls to compute res nd lengths of regions

More information

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC User Mnul ntelligent nstlltion Systems A B 1 2 3 4 5 6 7 8 30 ma 30 ma n = AC Un = 230 V AC 30 ma 9 10 11 12 C ABB STOTZ-KONTAKT Appliction Softwre Current Vlue Threshold/1 Contents Pge 1 Device Chrcteristics...

More information

Experiment 3: Non-Ideal Operational Amplifiers

Experiment 3: Non-Ideal Operational Amplifiers Experiment 3: Non-Idel Opertionl Amplifiers Fll 2009 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output

More information

Experiment 3: Non-Ideal Operational Amplifiers

Experiment 3: Non-Ideal Operational Amplifiers Experiment 3: Non-Idel Opertionl Amplifiers 9/11/06 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output

More information

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions

More information

Study on SLT calibration method of 2-port waveguide DUT

Study on SLT calibration method of 2-port waveguide DUT Interntionl Conference on Advnced Electronic cience nd Technology (AET 206) tudy on LT clibrtion method of 2-port wveguide DUT Wenqing Luo, Anyong Hu, Ki Liu nd Xi Chen chool of Electronics nd Informtion

More information

CHAPTER 2 LITERATURE STUDY

CHAPTER 2 LITERATURE STUDY CHAPTER LITERATURE STUDY. Introduction Multipliction involves two bsic opertions: the genertion of the prtil products nd their ccumultion. Therefore, there re two possible wys to speed up the multipliction:

More information

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES CHAPTER 3 AMPLIFIER DEIGN TECHNIQUE 3.0 Introduction olid-stte microwve mplifiers ply n importnt role in communiction where it hs different pplictions, including low noise, high gin, nd high power mplifiers.

More information

CSI-SF: Estimating Wireless Channel State Using CSI Sampling & Fusion

CSI-SF: Estimating Wireless Channel State Using CSI Sampling & Fusion CSI-SF: Estimting Wireless Chnnel Stte Using CSI Smpling & Fusion Riccrdo Crepldi, Jeongkeun Lee, Rul Etkin, Sung-Ju Lee, Robin Krvets University of Illinois t Urbn-Chmpign Hewlett-Pckrd Lbortories Emil:{rcrepl,rhk}@illinoisedu,

More information

Simulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability

Simulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability Interntionl Journl of cience, Engineering nd Technology Reserch (IJETR), olume 4, Issue 1, October 15 imultion of Trnsformer Bsed Z-ource Inverter to Obtin High oltge Boost Ability A.hnmugpriy 1, M.Ishwry

More information

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions

More information

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System Y9.ET1.3 Implementtion of Secure Energy ngement ginst Cyber/physicl Attcks for FREED System Project Leder: Fculty: Students: Dr. Bruce cillin Dr. o-yuen Chow Jie Dun 1. Project Gols Develop resilient cyber-physicl

More information

A Development of Earthing-Resistance-Estimation Instrument

A Development of Earthing-Resistance-Estimation Instrument A Development of Erthing-Resistnce-Estimtion Instrument HITOSHI KIJIMA Abstrct: - Whenever erth construction work is done, the implnted number nd depth of electrodes hve to be estimted in order to obtin

More information

MEASURE THE CHARACTERISTIC CURVES RELEVANT TO AN NPN TRANSISTOR

MEASURE THE CHARACTERISTIC CURVES RELEVANT TO AN NPN TRANSISTOR Electricity Electronics Bipolr Trnsistors MEASURE THE HARATERISTI URVES RELEVANT TO AN NPN TRANSISTOR Mesure the input chrcteristic, i.e. the bse current IB s function of the bse emitter voltge UBE. Mesure

More information

A Channel Splitting Technique for Reducing Handoff Delay in Wireless Networks

A Channel Splitting Technique for Reducing Handoff Delay in Wireless Networks Interntionl Journl o Engineering Reserch & Technology (IJERT) A Chnnel Splitting Technique or Reducing Hndo ely in Wireless Networks Jeykumr. J #1, Venktesh. * 2, Vigneswri. G* 3, Nivethith. V *4 # 1 PG

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad Hll Ticket No Question Pper Code: AEC009 INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigl, Hyderd - 500 043 MODEL QUESTION PAPER Four Yer B.Tech V Semester End Exmintions, Novemer - 2018 Regultions:

More information

A Stochastic Geometry Approach to the Modeling of DSRC for Vehicular Safety Communication

A Stochastic Geometry Approach to the Modeling of DSRC for Vehicular Safety Communication A Stochstic Geometry Approch to the Modeling of DSRC for Vehiculr Sfety Communiction Zhen Tong, Student Member, IEEE, Hongsheng Lu 2, Mrtin Henggi, Fellow, IEEE, nd Christin Poellbuer 2, Senior Member,

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-236 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

On the Prediction of EPON Traffic Using Polynomial Fitting in Optical Network Units

On the Prediction of EPON Traffic Using Polynomial Fitting in Optical Network Units On the Prediction of EP Trffic Using Polynomil Fitting in Opticl Networ Units I. Mmounis (1),(3), K. Yinnopoulos (2), G. Ppdimitriou (4), E. Vrvrigos (1),(3) (1) Computer Technology Institute nd Press

More information

Kyushu Institute of Technology

Kyushu Institute of Technology Title: Integrted Rescue Service Stellite (IRS-St) Primry Point of Contct (POC): Mohmed Ibrhim Co-uthors: Btsuren Amglnbt, Puline Fure, Kevin Chou Orgniztion:, 1-1 Sensui, Tobt, Kitkyushu 804-8550, Jpn

More information

LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS

LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS LATEST CALIBRATION OF GLONASS P-CODE TIME RECEIVERS A. Fos 1, J. Nwroci 2, nd W. Lewndowsi 3 1 Spce Reserch Centre of Polish Acdemy of Sciences, ul. Brtyc 18A, 00-716 Wrsw, Polnd; E-mil: fos@c.ww.pl; Tel.:

More information

DESIGN OF CONTINUOUS LAG COMPENSATORS

DESIGN OF CONTINUOUS LAG COMPENSATORS DESIGN OF CONTINUOUS LAG COMPENSATORS J. Pulusová, L. Körösi, M. Dúbrvská Institute of Robotics nd Cybernetics, Slovk University of Technology, Fculty of Electricl Engineering nd Informtion Technology

More information

Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks

Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks Jmming-Resistnt ollbortive Brodcst In Wireless Networks, Prt II: Multihop Networks Ling Xio Ximen University, hin 361005 Emil: lxio@xmu.edu.cn Huiyu Di N Stte University, Rleigh, N 27695 Emil: huiyu di@ncsu.edu

More information

10.4 AREAS AND LENGTHS IN POLAR COORDINATES

10.4 AREAS AND LENGTHS IN POLAR COORDINATES 65 CHAPTER PARAMETRIC EQUATINS AND PLAR CRDINATES.4 AREAS AND LENGTHS IN PLAR CRDINATES In this section we develop the formul for the re of region whose oundry is given y polr eqution. We need to use the

More information

Adaptive Network Coding for Wireless Access Networks

Adaptive Network Coding for Wireless Access Networks Adptive Network Coding for Wireless Access Networks Tun Trn School of Electricl Engineering nd Computer Science Oregon Stte University, Corvllis, Oregon 9733 Emil: trntu@eecs.orst.edu Thinh Nguyen School

More information

To provide data transmission in indoor

To provide data transmission in indoor Hittite Journl of Science nd Engineering, 2018, 5 (1) 25-29 ISSN NUMBER: 2148-4171 DOI: 10.17350/HJSE19030000074 A New Demodultor For Inverse Pulse Position Modultion Technique Mehmet Sönmez Osmniye Korkut

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-297 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

Design and Modeling of Substrate Integrated Waveguide based Antenna to Study the Effect of Different Dielectric Materials

Design and Modeling of Substrate Integrated Waveguide based Antenna to Study the Effect of Different Dielectric Materials Design nd Modeling of Substrte Integrted Wveguide bsed Antenn to Study the Effect of Different Dielectric Mterils Jgmeet Kour 1, Gurpdm Singh 1, Sndeep Ary 2 1Deprtment of Electronics nd Communiction Engineering,

More information

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel Open Access Librry Journl 07, Volume, e57 ISSN Online: -97 ISSN Print: -9705 Interference Cncelltion Method without Feedbc Amount for Three Users Interference Chnnel Xini Tin, otin Zhng, Wenie Ji School

More information

Three-Phase Synchronous Machines The synchronous machine can be used to operate as: 1. Synchronous motors 2. Synchronous generators (Alternator)

Three-Phase Synchronous Machines The synchronous machine can be used to operate as: 1. Synchronous motors 2. Synchronous generators (Alternator) Three-Phse Synchronous Mchines The synchronous mchine cn be used to operte s: 1. Synchronous motors 2. Synchronous genertors (Alterntor) Synchronous genertor is lso referred to s lterntor since it genertes

More information

Improving synchronized transfers in public transit networks using real-time tactics

Improving synchronized transfers in public transit networks using real-time tactics Improving synchronized trnsfers in public trnsit networks using rel-time tctics Zhongjun Wu 1,2,3, Grhm Currie 3, Wei Wng 1,2 1 Jingsu Key Lbortory of Urbn ITS, Si Pi Lou 2#, Nnjing, 210096, Chin 2 School

More information

DYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID

DYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID THERMAL SCIENCE, Yer 2015, Vol. 19, No. 4, pp. 1311-1315 1311 DYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID by Jun YAN, Li-Jiu ZHENG *, Bing DU, Yong-Fng QIAN, nd Fng YE Lioning Provincil Key Lbortory

More information

Solutions to exercise 1 in ETS052 Computer Communication

Solutions to exercise 1 in ETS052 Computer Communication Solutions to exercise in TS52 Computer Communiction 23 Septemer, 23 If it occupies millisecond = 3 seconds, then second is occupied y 3 = 3 its = kps. kps If it occupies 2 microseconds = 2 6 seconds, then

More information

First Round Solutions Grades 4, 5, and 6

First Round Solutions Grades 4, 5, and 6 First Round Solutions Grdes 4, 5, nd 1) There re four bsic rectngles not mde up of smller ones There re three more rectngles mde up of two smller ones ech, two rectngles mde up of three smller ones ech,

More information

CDMA One. International summer students courses: "Plugged In: Modern Networks and Services in Telecommunication"

CDMA One. International summer students courses: Plugged In: Modern Networks and Services in Telecommunication INTRAROM S.A. ROMANIAN TELECOMMUNICATIONS AND ELECTRONICS INDUSTRY ROMANIA, Buchrest, 17 Fbric de Glucoz St., Sector 2 Cod 72322, Tel:(+40 1) 2040600 Fx:(+40 1) 2040611 http://www.intrrom.ro Interntionl

More information

Polar Coordinates. July 30, 2014

Polar Coordinates. July 30, 2014 Polr Coordintes July 3, 4 Sometimes it is more helpful to look t point in the xy-plne not in terms of how fr it is horizontlly nd verticlly (this would men looking t the Crtesin, or rectngulr, coordintes

More information

RT-Link: A Time-Synchronized Link Protocol for Energy Constrained Multi-hop Wireless Networks

RT-Link: A Time-Synchronized Link Protocol for Energy Constrained Multi-hop Wireless Networks RT-Link: A Time-Synchronized Link Protocol for Energy Constrined Multi-hop Wireless Networks Anthony Rowe, Rhul Mnghrm, Rj Rjkumr Electricl nd Computer Engineering Deprtment, Crnegie Mellon University,

More information

Synchronous Generator Line Synchronization

Synchronous Generator Line Synchronization Synchronous Genertor Line Synchroniztion 1 Synchronous Genertor Line Synchroniztion Introduction One issue in power genertion is synchronous genertor strting. Typiclly, synchronous genertor is connected

More information

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks BP-PP: Belief Propgtion-Bsed Trust nd Reputtion Mngement for PP Networs Ermn Aydy School of Electricl nd Comp. Eng. Georgi Institute of Technology Atlnt, GA 333, USA Emil: eydy@gtech.edu Frmrz Feri School

More information

Temporal Secondary Access Opportunities for WLAN in Radar Bands

Temporal Secondary Access Opportunities for WLAN in Radar Bands The 4th Interntionl Symposium on Wireless Personl Multimedi Communictions WPMC'), Temporl Secondry Access Opportunities for WLAN in Rdr Bnds Miurel Tercero, Ki Won Sung, nd Jens Znder Wireless@KTH, Royl

More information

Example. Check that the Jacobian of the transformation to spherical coordinates is

Example. Check that the Jacobian of the transformation to spherical coordinates is lss, given on Feb 3, 2, for Mth 3, Winter 2 Recll tht the fctor which ppers in chnge of vrible formul when integrting is the Jcobin, which is the determinnt of mtrix of first order prtil derivtives. Exmple.

More information

4110 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 2017

4110 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 2017 40 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 07 Trnsmit Power Control for DD-Underlid Cellulr Networs Bsed on Sttisticl Fetures Peng Sun, Kng G. Shin, Life Fellow, IEEE, Hilin Zhng,

More information

A Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM

A Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM A ovel Bck EMF Zero Crossing Detection of Brushless DC Motor Bsed on PWM Zhu Bo-peng Wei Hi-feng School of Electricl nd Informtion, Jingsu niversity of Science nd Technology, Zhenjing 1003 Chin) Abstrct:

More information

Information-Coupled Turbo Codes for LTE Systems

Information-Coupled Turbo Codes for LTE Systems Informtion-Coupled Turbo Codes for LTE Systems Lei Yng, Yixun Xie, Xiowei Wu, Jinhong Yun, Xingqing Cheng nd Lei Wn rxiv:709.06774v [cs.it] 20 Sep 207 Abstrct We propose new clss of informtion-coupled

More information

Lecture 16: Four Quadrant operation of DC Drive (or) TYPE E Four Quadrant chopper Fed Drive: Operation

Lecture 16: Four Quadrant operation of DC Drive (or) TYPE E Four Quadrant chopper Fed Drive: Operation Lecture 16: Four Qudrnt opertion of DC Drive (or) TYPE E Four Qudrnt chopper Fed Drive: Opertion The rmture current I is either positive or negtive (flow in to or wy from rmture) the rmture voltge is lso

More information

PB-735 HD DP. Industrial Line. Automatic punch and bind machine for books and calendars

PB-735 HD DP. Industrial Line. Automatic punch and bind machine for books and calendars PB-735 HD DP Automtic punch nd bind mchine for books nd clendrs A further step for the utomtion of double loop binding. A clever nd flexible mchine ble to punch nd bind in line up to 9/16. Using the best

More information

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates Bsic Logic Gtes : Computer Architecture I Boolen Algebr Instructor: Prof. Bhgi Nrhri Dept. of Computer Science Course URL: www.ses.gwu.edu/~bhgiweb/cs35/ Digitl Logic Circuits We sw how we cn build the

More information

Soft-decision Viterbi Decoding with Diversity Combining. T.Sakai, K.Kobayashi, S.Kubota, M.Morikura, S.Kato

Soft-decision Viterbi Decoding with Diversity Combining. T.Sakai, K.Kobayashi, S.Kubota, M.Morikura, S.Kato Softdecision Viterbi Decoding with Diversity Combining T.Ski, K.Kobyshi, S.Kubot, M.Morikur, S.Kto NTT Rdio Communiction Systems Lbortories 2356 Tke, Yokosukshi, Kngw, 2383 Jpn ABSTRACT Diversity combining

More information

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1) The slides contin revisited mterils from: Peter Mrwedel, TU Dortmund Lothr Thiele, ETH Zurich Frnk Vhid, University of liforni, Riverside Dtflow Lnguge Model Drsticlly different wy of looking t computtion:

More information

A Comparative Analysis of Algorithms for Determining the Peak Position of a Stripe to Sub-pixel Accuracy

A Comparative Analysis of Algorithms for Determining the Peak Position of a Stripe to Sub-pixel Accuracy A Comprtive Anlysis of Algorithms for Determining the Pek Position of Stripe to Sub-pixel Accurcy D.K.Nidu R.B.Fisher Deprtment of Artificil Intelligence, University of Edinburgh 5 Forrest Hill, Edinburgh

More information

Eliminating Non-Determinism During Test of High-Speed Source Synchronous Differential Buses

Eliminating Non-Determinism During Test of High-Speed Source Synchronous Differential Buses Eliminting Non-Determinism During of High-Speed Source Synchronous Differentil Buses Abstrct The t-speed functionl testing of deep sub-micron devices equipped with high-speed I/O ports nd the synchronous

More information

Ultra Low Cost ACCELEROMETER

Ultra Low Cost ACCELEROMETER Chip Scle Pckged Fully Integrted Therml Accelerometer MXC622xXC Rev,A 8/19/2011 Pge 1 of 13 Fetures Generl Description Fully Integrted Therml Accelerometer X/Y Axis, 8 bit, Accelertion A/D Output (± 2g)

More information

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts. Lecture 2 Intro to line integrls Dn Nichols nichols@mth.umss.edu MATH 233, Spring 218 University of Msschusetts April 12, 218 (2) onservtive vector fields We wnt to determine if F P (x, y), Q(x, y) is

More information

Network Sharing and its Energy Benefits: a Study of European Mobile Network Operators

Network Sharing and its Energy Benefits: a Study of European Mobile Network Operators Network Shring nd its Energy Benefits: Study of Europen Mobile Network Opertors Mrco Ajmone Mrsn Electronics nd Telecommunictions Dept Politecnico di Torino, nd Institute IMDEA Networks, mrco.jmone@polito.it

More information

9.4. ; 65. A family of curves has polar equations. ; 66. The astronomer Giovanni Cassini ( ) studied the family of curves with polar equations

9.4. ; 65. A family of curves has polar equations. ; 66. The astronomer Giovanni Cassini ( ) studied the family of curves with polar equations 54 CHAPTER 9 PARAMETRIC EQUATINS AND PLAR CRDINATES 49. r, 5. r sin 3, 5 54 Find the points on the given curve where the tngent line is horizontl or verticl. 5. r 3 cos 5. r e 53. r cos 54. r sin 55. Show

More information

Ultra Low Cost ACCELEROMETER

Ultra Low Cost ACCELEROMETER Chip Scle Pckged Digitl Therml Orienttion Sensing Accelerometer MXC6226XC Document Version D Pge 1 of 13 Fetures Generl Description Fully Integrted Therml Accelerometer X/Y Axis, 8 bit, Accelertion A/D

More information

This is a repository copy of Effect of power state on absorption cross section of personal computer components.

This is a repository copy of Effect of power state on absorption cross section of personal computer components. This is repository copy of Effect of power stte on bsorption cross section of personl computer components. White Rose Reserch Online URL for this pper: http://eprints.whiterose.c.uk/10547/ Version: Accepted

More information

Fuzzy Logic Controller for Three Phase PWM AC-DC Converter

Fuzzy Logic Controller for Three Phase PWM AC-DC Converter Journl of Electrotechnology, Electricl Engineering nd Mngement (2017) Vol. 1, Number 1 Clusius Scientific Press, Cnd Fuzzy Logic Controller for Three Phse PWM AC-DC Converter Min Muhmmd Kml1,, Husn Ali2,b

More information

Mixed CMOS PTL Adders

Mixed CMOS PTL Adders Anis do XXVI Congresso d SBC WCOMPA l I Workshop de Computção e Aplicções 14 20 de julho de 2006 Cmpo Grnde, MS Mixed CMOS PTL Adders Déor Mott, Reginldo d N. Tvres Engenhri em Sistems Digitis Universidde

More information

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks 1 9th Annul IEEE Communictions Society Conference on Sensor, Mesh nd Ad Hoc Communictions nd Networs (SECON) BP-PP: Belief Propgtion-Bsed Trust nd Reputtion Mngement for PP Networs Ermn Aydy School of

More information

Distributed two-hop proportional fair resource allocation in Long Term Evolution Advanced networks

Distributed two-hop proportional fair resource allocation in Long Term Evolution Advanced networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2016; 16:264 278 Published online 12 August 2014 in Wiley Online Librry (wileyonlinelibrry.com)..2517 RESEARCH ARTICLE Distributed

More information

Understanding Basic Analog Ideal Op Amps

Understanding Basic Analog Ideal Op Amps Appliction Report SLAA068A - April 2000 Understnding Bsic Anlog Idel Op Amps Ron Mncini Mixed Signl Products ABSTRACT This ppliction report develops the equtions for the idel opertionl mplifier (op mp).

More information

Electrically Large Zero-Phase-Shift Metamaterial-based Grid Array Antenna for UHF Near-Field RFID Readers

Electrically Large Zero-Phase-Shift Metamaterial-based Grid Array Antenna for UHF Near-Field RFID Readers Electriclly Lrge Zero-Phse-Shift Metmteril-bsed Grid Arry Antenn for UHF Ner-Field RFID Reders Jin Shi, Xinming Qing, member IEEE, Zhi Ning Chen, Fellow, IEEE Abstrct A grid rry ntenn using zero-phse-shift

More information

Indoor Autonomous Vehicle Navigation A Feasibility Study Based on Infrared Technology

Indoor Autonomous Vehicle Navigation A Feasibility Study Based on Infrared Technology Concept Pper Indoor utonomous Vehicle Nvigtion Fesibility Study Bsed on Infrred Technology Ry-Shine Run Zhi-Yu Xio * ID Deprtment Electronics Engineering, Ntionl United University, 36003 Mioli, Tiwn; rsrun@nuu.edu.tw

More information

AN IMPROVED METHOD FOR RADIO FREQUENCY DIRECTION FINDING USING WIRELESS SENSOR NETWORKS

AN IMPROVED METHOD FOR RADIO FREQUENCY DIRECTION FINDING USING WIRELESS SENSOR NETWORKS AN IMPROVED METHOD FOR RADIO FREQUENCY DIRECTION FINDING USING WIRELESS SENSOR NETWORKS Mickey S. Btson, John C. McEchen, nd Murli Tumml Deprtment of Electricl nd Computer Engineering Nvl Postgrdute School

More information

April 9, 2000 DIS chapter 10 CHAPTER 3 : INTEGRATED PROCESSOR-LEVEL ARCHITECTURES FOR REAL-TIME DIGITAL SIGNAL PROCESSING

April 9, 2000 DIS chapter 10 CHAPTER 3 : INTEGRATED PROCESSOR-LEVEL ARCHITECTURES FOR REAL-TIME DIGITAL SIGNAL PROCESSING April 9, 2000 DIS chpter 0 CHAPTE 3 : INTEGATED POCESSO-LEVEL ACHITECTUES FO EAL-TIME DIGITAL SIGNAL POCESSING April 9, 2000 DIS chpter 3.. INTODUCTION The purpose of this chpter is twofold. Firstly, bsic

More information

2016 2Q Wireless Communication Engineering. #10 Spread Spectrum & Code Division Multiple Access (CDMA)

2016 2Q Wireless Communication Engineering. #10 Spread Spectrum & Code Division Multiple Access (CDMA) 16 Q Wireless Communiction Engineering #1 Spred Spectrum & Code Division Multiple Access (CDMA Kei Skguchi skguchi@mobile.ee. July 9, 16 Course Schedule ( Dte ext Contents #7 July 15 4.6 Error correction

More information

High Speed On-Chip Interconnects: Trade offs in Passive Termination

High Speed On-Chip Interconnects: Trade offs in Passive Termination High Speed On-Chip Interconnects: Trde offs in Pssive Termintion Rj Prihr University of Rochester, NY, USA prihr@ece.rochester.edu Abstrct In this pper, severl pssive termintion schemes for high speed

More information

An Efficient SC-FDM Modulation Technique for a UAV Communication Link

An Efficient SC-FDM Modulation Technique for a UAV Communication Link electronics Article An Efficient SC-FDM Modultion Technique for UAV Communiction Link Sukhrob Aev 1, Oh-Heum Kwon 1, Suk-Hwn Lee 2 Ki-Ryong Kwon 1, * 1 Deprtment of IT Convergence Appliction Engineering,

More information

Joanna Towler, Roading Engineer, Professional Services, NZTA National Office Dave Bates, Operations Manager, NZTA National Office

Joanna Towler, Roading Engineer, Professional Services, NZTA National Office Dave Bates, Operations Manager, NZTA National Office . TECHNICA MEMOANDM To Cc repred By Endorsed By NZTA Network Mngement Consultnts nd Contrctors NZTA egionl Opertions Mngers nd Are Mngers Dve Btes, Opertions Mnger, NZTA Ntionl Office Jonn Towler, oding

More information

CAL. NX15 DUO-DISPLAY QUARTZ

CAL. NX15 DUO-DISPLAY QUARTZ L. NX15 UO-ISPLY QURTZ l nlogue time disply l igitl time nd clendr l hronogrph l Tchymeter l t recll function l lrm l Illuminting light (Electroluminescent pnel) ENGLISH Illuminting light (TIME/LENR mode

More information

Module 9. DC Machines. Version 2 EE IIT, Kharagpur

Module 9. DC Machines. Version 2 EE IIT, Kharagpur Module 9 DC Mchines Version EE IIT, Khrgpur esson 40 osses, Efficiency nd Testing of D.C. Mchines Version EE IIT, Khrgpur Contents 40 osses, efficiency nd testing of D.C. mchines (esson-40) 4 40.1 Gols

More information

A VIRTUAL INFRASTRUCTURE FOR MITIGATING TYPICAL CHALLENGES IN SENSOR NETWORKS

A VIRTUAL INFRASTRUCTURE FOR MITIGATING TYPICAL CHALLENGES IN SENSOR NETWORKS A VIRTUAL INFRASTRUCTURE FOR MITIGATING TYPICAL CHALLENGES IN SENSOR NETWORKS by Hdy S. Abdel Slm B.S. June 1999, Alexndri University, Egypt M.S. June 2004, Alexndri University, Egypt A Disserttion Submitted

More information

Aggregate Interference from Secondary Users with Heterogeneous Density

Aggregate Interference from Secondary Users with Heterogeneous Density 22nd IEEE Personl Indoor Mobile Rdio Communictions Aggregte Interference from Secondry Users with Heterogeneous Density Miurel Tercero, Ki Won Sung, nd Jens Znder Wireless@KTH, Royl Institute of Technology(KTH),

More information

Digital Migration Radio PD60X. DMR Standard Radio, Feature-Rich, Innovative Design, Compact Size, Integrates with Hytera Applications

Digital Migration Radio PD60X. DMR Standard Radio, Feature-Rich, Innovative Design, Compact Size, Integrates with Hytera Applications Digitl Migrtion Rdio PD60X DMR Stndrd Rdio, Feture-Rich, Innovtive Design, Compct Size, Integrtes with Applictions Fetures Smll, Sleek, Light Full Bnd The size is 119 X 54 X 27mm, PC & Metl frme, weight

More information

Postprint. This is the accepted version of a paper presented at IEEE PES General Meeting.

Postprint.   This is the accepted version of a paper presented at IEEE PES General Meeting. http://www.div-portl.org Postprint This is the ccepted version of pper presented t IEEE PES Generl Meeting. Cittion for the originl published pper: Mhmood, F., Hooshyr, H., Vnfretti, L. (217) Sensitivity

More information

Analysis of Coding-aware MAC Protocols based on Reverse Direction Protocol for IEEE based Wireless Networks using Network Coding*

Analysis of Coding-aware MAC Protocols based on Reverse Direction Protocol for IEEE based Wireless Networks using Network Coding* Anlysis of oding-wre MA Protocols sed on Reverse irection Protocol for IEEE 8.-sed Wireless Networks using Network oding* Rul Plcios, Htegereil Kssye Hile, Jesus Alonso-Zrte nd Frizio Grnelli {plciostrujillo,

More information

(CATALYST GROUP) B"sic Electric"l Engineering

(CATALYST GROUP) Bsic Electricl Engineering (CATALYST GROUP) B"sic Electric"l Engineering 1. Kirchhoff s current l"w st"tes th"t (") net current flow "t the junction is positive (b) Hebr"ic sum of the currents meeting "t the junction is zero (c)

More information

Section 16.3 Double Integrals over General Regions

Section 16.3 Double Integrals over General Regions Section 6.3 Double Integrls over Generl egions Not ever region is rectngle In the lst two sections we considered the problem of integrting function of two vribles over rectngle. This sitution however is

More information

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment Roerto Di Pietro, Luigi V. Mncini, nd Alessndro

More information

RSS based Localization of Sensor Nodes by Learning Movement Model

RSS based Localization of Sensor Nodes by Learning Movement Model RSS bsed Locliztion of Sensor Nodes by Lerning Movement Model 1 R.ARTHI, 2 P.DEVARAJ, 1 K.MURUGAN 1 Rmnujn Computing Centre, Ann University, Guindy, Chenni, Indi 2 Deprtment of Mthemtics, College of Engineering,

More information

Adaptive VoIP Smoothing of Pareto Traffic Based on Optimal E-Model Quality

Adaptive VoIP Smoothing of Pareto Traffic Based on Optimal E-Model Quality Adptive VoIP Smoothing of Preto Trffic Bsed on Optiml E-Model Qulity Shyh-Fng Hung 1, Eric Hsio-Kung Wu 2, nd Po-Chi Chng 3 1 Deprtment of Electricl Engineering, Ntionl Centrl University, Tiwn hsf@vplb.ee.ncu.edu.tw

More information

Multipath Mitigation for Bridge Deformation Monitoring

Multipath Mitigation for Bridge Deformation Monitoring Journl of Globl Positioning Systems (22) Vol. 1, No. 1: 25-33 Multipth Mitigtion for Bridge Deformtion Monitoring G. W. Roberts, X. Meng, A. H. Dodson, E. Cosser Institute of Engineering Surveying nd Spce

More information

Investigation of Ground Frequency Characteristics

Investigation of Ground Frequency Characteristics Journl of Electromgnetic Anlysis nd Applictions, 03, 5, 3-37 http://dx.doi.org/0.436/jem.03.58050 Published Online August 03 (http://www.scirp.org/journl/jem) Mohmed Nyel Electricl Engineering Deprtment,

More information

Topic 20: Huffman Coding

Topic 20: Huffman Coding Topic 0: Huffmn Coding The uthor should gze t Noh, nd... lern, s they did in the Ark, to crowd gret del of mtter into very smll compss. Sydney Smith, dinburgh Review Agend ncoding Compression Huffmn Coding

More information

Effect of High-speed Milling tool path strategies on the surface roughness of Stavax ESR mold insert machining

Effect of High-speed Milling tool path strategies on the surface roughness of Stavax ESR mold insert machining IOP Conference Series: Mterils Science nd Engineering PAPER OPEN ACCESS Effect of High-speed Milling tool pth strtegies on the surfce roughness of Stvx ESR mold insert mchining Relted content - Reserch

More information

Pulse Radar with Field-Programmable Gate Array Range Compression for Real Time Displacement and Vibration Monitoring

Pulse Radar with Field-Programmable Gate Array Range Compression for Real Time Displacement and Vibration Monitoring sensors Article Pulse Rdr with Field-Progrmmble Gte Arry Rnge Compression for Rel Time Displcement nd Vibrtion Monitoring Mihi-Liviu Tudose 1, *, Andrei Anghel 1, Remus Ccovenu 1 nd Mihi Dtcu 1,2 1 Reserch

More information

Information Caching Strategy for Cyber Social Computing Based Wireless Networks

Information Caching Strategy for Cyber Social Computing Based Wireless Networks Received 4 December 26; revised 23 Februry 27; ccepted 2 April 27. Dte of publiction 28 April 27; dte of current version 6 September 27. Digitl Object Identifier.9/TETC.27.2699695 Informtion Cching Strtegy

More information

A Simple Approach to Control the Time-constant of Microwave Integrators

A Simple Approach to Control the Time-constant of Microwave Integrators 5 VOL., NO.3, MA, A Simple Approch to Control the Time-constnt of Microwve Integrtors Dhrmendr K. Updhyy* nd Rkesh K. Singh NSIT, Division of Electronics & Communiction Engineering New Delhi-78, In Tel:

More information