arxiv: v1 [cs.it] 22 Aug 2007
|
|
- Oswald Robinson
- 5 years ago
- Views:
Transcription
1 Voice Service Support in Mobie Ad Hoc Networks Hai Jiang, Ping Wang, H. Vincent Poor, and Weihua Zhuang Dept. of Eec. & Comp. Eng., University of Aberta, Canada, Dept. of Eec. & Comp. Eng., University of Wateroo, Canada, {p5wang, Dept. of Eec. Eng., Princeton University, USA, arxiv: v1 [cs.it] 22 Aug 2007 Abstract Mobie ad hoc networks are expected to support voice traffic. The requirement for sma deay and jitter of voice traffic poses a significant chaenge for medium access contro (MAC) in such networks. User mobiity makes it more compex due to e associated dynamic pa attenuation. In is paper, a MAC scheme for mobie ad hoc networks supporting voice traffic is proposed. Wi e aid of a ow-power probe prior to DATA transmissions, resource reservation is achieved in a distributed manner, us eading to sma deay and jitter. The proposed scheme can automaticay adapt to dynamic pa attenuation in a mobie environment. Simuation resuts demonstrate e effectiveness of e proposed scheme. Keywords medium access contro, code-division mutipe access, mobie ad hoc networks. I. INTRODUCTION Mobie ad hoc networks are expected to support mutimedia services such as voice and video wi quaity-of-service (QoS) requirements. This task is chaenging because ere is no network centra controer in such networks. User mobiity makes e case even worse because of e time-varying network topoogy and propagation oss between any two nodes. QoS support in mobie ad hoc networks incudes two directions: via routing at e network ayer or via medium access contro (MAC) scheme at e ink ayer. The function of routing is to search for a network pa (i.e., a route) from a traffic source node to its destination node, and to react (e.g., seect a new route) to possibe route faiures and/or network congestion. On e oer hand, e function of MAC is to coordinate e channe access in an ordery manner among e mobie nodes such at efficiency can be achieved. Here, we focus primariy on e MAC in a mobie ad hoc network supporting voice traffic. In such a network, a MAC scheme shoud be: 1) distributed (because of e scaabiity requirement); 2) toerant to e hidden termina probem; 3) ensuring of sma deay/jitter (due to e rea-time nature of voice traffic); and 4) adaptive to user mobiity. In is paper, we propose an effective MAC scheme wi e above desired features. The MAC scheme is fuy distributed, us scaing we to a arge network. The hidden termina probem does not exist in our scheme. Radio resource requirements are met by resource reservation, us achieving sma deay and jitter. Our scheme can aso adapt to user mobiity to a certain extent. II. RELATED WORK AND DISCUSSION The most popuar MAC schemes for ad hoc networks are carrier-sense mutipe access (CSMA) and its variants, and This work was supported by e U.S. Nationa Science Foundation under Grants ANI and CNS , and a Postdoctora Feowship and a research grant from e Natura Science and Engineering Research Counci (NSERC) of Canada. busy-tone based schemes. The CSMA schemes are inherenty distributed. However, ey suffer from e hidden termina probem. Aso, e schemes are based on an idea assumption, i.e., at ere is an interference range for each transmitter. As ong as a target receiver is outside e interference range of an interferer, it is assumed at e interferer does not generate any interference to e target receiver. However, in reaity, e aggregate interference from a number of far-away interferers (each wi a distance to e target receiver arger an e interference range) may corrupt e reception at e target receiver. On e oer hand, one motivation of busy-tone based schemes [1] is to better sove e hidden termina probem. Wi e aid of a receive busy-tone transmitted by a target receiver, e hidden terminas near e target receiver can be notified not to transmit. However, e hidden termina probem is not eiminated. For instance, coisions of request-to-send (RTS) frames can sti happen due to e hidden termina probem [2]. It is aso chaenging to determine e busy-tone coverage. Traditionay e busy-tone coverage is set to be e same as e interference range. However, simiar to e case in CSMA, e aggregate interference from mutipe interferers outside e coverage of a busy-tone (sent by a target receiver) can corrupt e reception at e target receiver. In a mobie environment, e mutipa fading can aso cause e busytone coverage to vary wi time. This can severey degrade e system performance because a strong interferer may not be notified by e busy-tone due to instantaneous deep fading of e busy-tone channe. The contention-based nature of CSMA schemes and busytone based schemes makes it very difficut to bound e deay and jitter to sma vaues for voice traffic. This observation impies at we shoud instead resort to reservation of channe resources. Resource reservation can avoid contentions, and voice traffic can be transmitted continuousy on e reserved channe, us making e transmission deay and jitter bounded. Here we consider a code-division mutipe access (CDMA)-based mobie ad hoc network, where e air interface supports mutipe simutaneous transmissions in a neighborhood. In our previous work [3], we have proposed a MAC scheme for a CDMA-based wireess mesh backbone, referred to as MESH scheme here. Before DATA transmissions, each potentia sender first transmits a ow-power probe to e network. Upon reception of e probe, each active receiver estimates a potentia interference increase due to e potentia sender s DATA transmission. The active receiver transmits a busy-tone signa in a separate busy-tone channe to notify e potentia sender if e potentia interference increase is intoerabe. If e potentia sender does not detect a busy-tone, it successfuy reserves a code channe. However, targeted at
2 a wireess mesh backbone wi fixed topoogy, e MESH scheme is not effective or efficient in a mobie ad hoc network for e foowing reasons: 1) The power aocation strategy in MESH argey depends on e fixed network topoogy, and us it is not appicabe to a mobie network; 2) A singefrequency busy-tone channe is used in MESH. The busy-tone transmission can be affected significanty by fading and/or shadowing in a mobie environment. The coverage of e busytone fuctuates wi time, us severey degrading e system performance. Based on e simiar approach of probing in e MESH scheme, in e foowing we propose a MAC scheme for a mobie ad hoc network supporting voice traffic. III. THE PROPOSED MAC SCHEME Consider a mobie ad hoc network wi a number, N, of mobie nodes. At e MAC ayer, a source node can communicate wi one or more of its neighbors, wi a separate queue for each destination node. Each node is assigned a unique transmitting code and a unique receiving code [4]. Constant rate voice traffic is supported. The network topoogy changes as e mobie nodes move. Each voice ink requires a minimum transmission rate (e.g., voice packet generation rate from e codec) so at its deay and jitter can be kept at a very ow eve. To keep e transmission accuracy of e voice ink, a signa to interference pus noise ratio (SINR) reshod is required for each ink, i.e., for e ink from sender i to receiver j, e foowing inequaity shoud hod: GiPt ij gij I j+η j Γ d, where G i is e spreading gain, Pij t is e transmit power, g ij is e pa gain from node i to node j, I j is e interference (received at node j) from oer inks, η j is e background noise power at node j, and Γ d is e required SINR reshod for accurate information transmission. Unike e situation for e MESH scheme, a e transmissions are wiin a frequency band, using CDMA technoogy. A RAKE receiver can coect signa energy from different pas. Hence, we assume at ere is no fast (mutipa) fading, and e transmit power is attenuated ony due to pa oss wi exponent β and shadowing. A node cannot transmit and receive at e same time, since each node s transmission and reception are wiin e same frequency band. In e time domain, we use a time frame structure as shown in Fig. 1. Time is partitioned into fixed-eng frames. In each frame, ere are M information sots (ISs), each foowed by a short bocking sot (BS). The ISs are used for information (i.e., DATA and ACK) and probe transmissions, whie e BSs are used for e transmission of bocking messages (to be discussed). In a mobie ad hoc network, it is difficut to estimate e pa attenuation in advance from a sender to a receiver due to user mobiity. Therefore, e popuar inear power aocation [5] is not adopted. Raer, we consider a common power aocation strategy, where each traffic source node uses a constant power P to transmit its DATA frames to its destination, and e traffic destination uses e same power eve to feed back ACKs. Fig. 1. Fig IS: information sot Frame 0 Time frame structure. Ca arriva at i for j IS Interference measurement by i BS Probe by i Frame BS: bocking sot Frame 1 Frame 2 Frame 3 Frame 4, 5,... k k The mutipe access procedure. A. Mutipe Access Procedure Request by i Bocking message k m m Probe by j k DATA by i m ACK by j The mutipe access capabiity of e network is based on resource reservation. Consider e case of a new ca arriva at source node i at time frame 0 to its destination node j. The mutipe access procedure is iustrated in Fig. 2. 1) Seection of DATA IS: Node i first seects an IS for DATA transmission, referred to as its DATA IS. The ISs at which e destination node j is sending traffic shoud be skipped, because node j cannot send and receive at e same time at e same band. At frame 1, node i measures its experienced interference, and monitors e transmitting code of node j. Among e ISs over which node j s transmitting code is not detected, node i seects one wi e minimum interference eve, say IS k, as its DATA IS. 2) Transmissions of Probe and Bocking Message: Prior to DATA transmission at e seected DATA IS, node i shoud make sure its DATA transmission does not corrupt any existing reception at any active receiver 1 at e IS. To achieve is goa, node i first sends a ow-power test signa into e network. Specificay, at IS k of frame 2, node i sends a probe spread by a common probe code wi a arge spreading gain, and wi transmit power eve α P (α 1). No bit information is carried in e probe. Wi e ow power, e probe is very ikey not to corrupt any existing reception at e IS. Aough e probe is sent wi ow power, we assume at it can be received by active receivers at e IS because of e arge spreading gain. At IS k, an active receiver, say node, first measures e received probe power eve denoted by and its own interference eve due to oer existing transmissions. It estimates e potentia interference increase due to DATA transmission of e probe sender as /α, and determines wheer e potentia interference increase can corrupt its own reception. If 1 Here an active receiver can be an existing traffic destination node for DATA reception, or an existing traffic source node for ACK reception.
3 so, it sends a bocking message at BS k. The bocking message is spread by a common bocking code. No bit information is carried by e bocking message. The power aocation for e bocking message wi be discussed in Section III-B. At BS k, node i monitors e bocking code. If e detected bocking message power is above a reshod P r,b, it gives up IS k for DATA transmission and tries anoer IS unti no bocking message is detected. 3) Seection of ACK IS: If no bocking message is detected, node i sends a request message to its destination node j, at IS k in frame 3 spread by node j s receiving code, and sends its first DATA frame at sot k in frame 4 spread by node i s transmitting code, bo wi power P. Upon receiving e request message, node j seects an IS for its ACK, referred to as ACK IS. Generay it is desired at, at e ACK IS, e interference experienced by node i is sma so at e ACK can be received correcty. So in e request message, node i indicates (among e ISs except IS k) e IS wi minima experienced interference, say IS m. After node j receives correcty e request, it sends an probe at IS m in frame 3 2 in e same manner as node i sending a probe for DATA IS. If no bocking message is detected at BS m, node j sends an ACK at IS m in frame 4 for e DATA frame received 3 in frame 4. If node i does not receive an ACK at IS m of frame 4, it seects anoer DATA IS, and repeats e above procedure wi a maximum number of attempts. If an ACK is received, it proceeds to next step. 4) Continuous Transmissions at Reserved DATA and ACK ISs: At subsequent time frames from frame 5, nodeitransmits its DATA frames spread by its transmitting code at IS k, and node j transmits e ACKs spread by its transmitting code at IS m, unti e competion of e ca. It can be seen at ca-eve resource reservation is performed. Upon e ca competion, no ink termination procedure is necessary, because our scheme is based on rea-time interference measurement, and oer active receivers can measure e interference eve reduction when e target ink stops using e reserved resource. B. Power Aocation for e Bocking Message If an active receiver at an IS is to send a bocking message in response to a probe from a potentia sender 4, e transmit power of e bocking message shoud be designed carefuy so at e potentia sender can be notified. Unike e MESH scheme, oer active receivers at e IS do not need to hear e bocking message. As e bocking message is sent in e same frequency band as DATA frames, here we use a different meod (from at in e MESH scheme) for an active 2 The probe is sent at IS m in frame 3 when m > k, or in frame 4 when m < k. For simpicity of presentation, we use e former case as an exampe in is paper. 3 Since e request message and DATA are sent in e same way from node i, DATA can aso be received correcty if e request can be deivered successfuy. 4 Here a potentia sender can be a traffic source node for DATA transmission or a traffic destination node for ACK transmission. receiver to determine its bocking message power based on e measured probe power. The objective is to ensure at e potentia sender can detect a bocking message wi power above reshod P r,b. At an IS, it is possibe at one or more potentia senders may send probes for resource reservation. Since e resource reservation is performed at e ca eve, it is reasonabe to assume at at an IS ere are at most two potentia probe senders in a neighborhood. We aso assume channe reciprocity in terms of shadowing effect. Consider e case in which an active receiver, say node, detects e probe power eve, and wants to send a bocking message. Node sends a bocking message wi transmit power = max { 2 P r,b αp, Pr,b P } IM where IM is e interference margin [6] of node, defined as e maximum extra interference at can be toerated by node. We first consider e scenario in which ony one potentia sender, node i, sends a probe at an IS. The pa gain from node i to node is g i = Pr,p αp. From (1) we have 2 Pr,b αp (1) = 2 Pr,b. (2) g i Due to e channe reciprocity, g i = g i, we have 2 P r,b g i. Then e received bocking message power at e potentia sender i is g i 2 P r,b, which is greater an e detection reshod P r,b. So e potentia sender is notified to give up e IS. Next, we consider e scenario in which two potentia senders, node i 1 and node i 2, send probes at an IS. As a common probe code is used, and no bit information is carried by a probe, node can coect energy from bo probes via an RAKE receiver. The tota received probe power at node is aso denoted by. Suppose node wants to send a bocking message. Wiout oss of generaity, assume e pa gain from node i 1 to is arger an at from i 2 to, i.e., g i1 g i2. We have = αp g i1 +αp g i2 2αP g i1. (3) When node sends a bocking message wi power given by (1), e received bocking message power at node i 1 is g i1 = g i1 2 Pr,b αp g i1 2 Pr,b αp 2αP g i1 g i1 = P r,b. So node i 1 wi be notified to give up e IS. In e foowing, we prove at, if node i 2 s potentia information (i.e., DATA or ACK) transmission generates extra interference at is intoerabe at node, node s bocking message wi power given by (1) can reach node i 2 wi a power eve above e reshod P r,b. (4)
4 Proof: If node i 2 s information transmission can corrupt node s reception, is means P g i2 IM. We have g i2 IM P. When node sends a bocking message wi power given by (1), e received bocking message power at node i 2 is g i2 = g i2 Pr,b P IM g i2 Pr,b P IM IM P = P r,b. As node i 2 detects bocking message power above e reshod, it gives up e IS. C. Impact of User Mobiity and Soutions The impact of user mobiity on each active ink at e MAC ayer is two-fod. One is due to e time-varying pa attenuation of e desired signa, and e oer is due to e varying interference eve. The pa attenuation consists of ree components: pa oss, shadowing, and fast (mutipa) fading. Fast fading can be addressed by e RAKE receiver at coects signa energy from different pas. The time-varying pa oss, shadowing, and interference eve make e SINR of each ink fuctuate wi time. Generay our scheme can automaticay adapt to e varying SINR of each ink, because e receiver makes rea-time measurement of its desired signa and interference eves. However, it is possibe at e SINR of some ongoing inks at an IS cannot remain above e reshod Γ d (a condition referred to as a ink faiure) because of e fuctuations. Aough a new route searched by e routing scheme can hep to sove e probem, it is desirabe to dea wi e probem at e MAC ayer first before resorting to e routing scheme, considering e overhead and time needed for a new route search, and e duration needed to set up a new route. To address e probem, for each active ink, e traffic destination node indicates in its ACK two candidate DATA ISs at which e destination node experiences e minimum interference and does not transmit. The destination node aso indicates a detected ink faiure (if any) in e ACK. If e traffic source node (say node i) does not receive correcty e ACK from its destination (say node j), is means a ink faiure happens because e ACK is corrupted 5. As nodeidoes not have e information of wheer e DATA transmission is corrupted or not, we et e ink be re-estabished at a new DATA IS and a new ACK IS. The main difference from e estabishment procedure given in Section III-A is as foows. Node i sends two probes at e two candidate DATA ISs indicated in e previous ACK. At each candidate IS, a request is sent if no bocking message is detected. The request aso indicates two candidate ACK ISs at which node i experiences e minimum interference and does not transmit. If at east one request is received at node j (which means a new DATA IS is estabished), node j sends two probes at e candidate ACK 5 If an expected DATA frame is not received, e traffic destination node responds wi a NACK. For presentation simpicity, we use ACK to represent bo ACK and NACK in is paper. (5) ISs. If at east one probe at a candidate ACK IS is not bocked by active receivers at at IS, a new ACK IS is estabished. If eier a new DATA IS or a new ACK IS cannot be estabished, e ca is dropped. On e oer hand, if node i successfuy receives an ACK which indicates at a faiure of DATA transmission happens, a simiar procedure is executed, except at ony e estabishment of a new DATA IS is needed. Generay, if e ink faiure is due to arge interference, it is ikey at e ca can be estabished successfuy in oer DATA and/or ACK ISs at which nodes generate arge interference are not active. However, if e ink faiure is due to a arge pa oss of e desired signa (e.g., e traffic source and destination are separated by a arge distance) or due to shadowing of e desired signa (e.g., e pa between e traffic source and destination is bocked by a ta buiding), it is very ikey at e ink quaity of e target ca at oer ISs is not good enough eier, and us e ca wi be dropped. In is case, a new route shoud be seected by e routing scheme. The proposed MAC scheme has e desired features discussed in Section I. The scheme is performed in a distributed manner at e mobie nodes, us scaabe to arge networks. The hidden termina probem does not exist, since each active receiver makes an admission decision on a new ca based on rea-time measurement of its own desired signa and interference eves. The reservation nature of our scheme can guarantee sma deay and jitter for voice traffic as ong as e minimum required rate can be met. Our scheme can adapt automaticay to user mobiity to a certain extent, aso benefiting from e fact at each active receiver makes reatime measurement of desired signa and interference eves. In addition, e idea assumption required by CSMA and busytone based schemes (as discussed in Section II) is unnecessary for our scheme. Furermore, aough e bocking message has simiar functionaity to e busy-tone in e busy-tone based scheme, our scheme does not have e probem of different channe gains in separate busy-tone frequency band and DATA frequency band, because e bocking message and DATA are sent in e same band. IV. PERFORMANCE EVALUATION We run computer simuations to evauate e performance of e proposed MAC scheme. Since MAC mainy deas wi e transmission from a node to its neighbors, ony one-hop transmission is considered here. Consider an ad hoc network consisting of N nodes, wi N/2 voice source nodes and N/2 voice destination nodes. The source nodes are randomy distributed in a 1000 meter 1000 meter square, each associated wi a destination node. A e source nodes are fixed, and a e destination nodes move wi a veocity v and a randomy seected direction. In order to maintain a satisfactory SINR, a destination node is assumed to move wiin a radius of 150 m of e associated source node 6. Each time frame has a fixed 6 Routing may be invoved when a destination node moves beyond is distance, a situation which is beyond e scope of is work.
5 TABLE I THE PERCENTAGE OF THE ISS WITH DIFFERENT NUMBER OF PROBES. Number (N) of nodes v = 10 1 probe kph 2 probes probes v = 20 1 probe kph 2 probes probes duration of 20 ms, and is furer divided into 8 ISs and 8 BSs. The spreading gain is 32 for DATA and ACKs, and 3200 for e probe. The pa oss attenuation exponent β is 2.4, and e shadowing is modeed by e first-order autoregressive process given in [7]. Voice ca inter-arriva time at each source node is exponentiay distributed wi mean vaue 48 seconds, and e duration of a ca is exponentiay distributed wi mean vaue 30 seconds. When a ca is active, one DATA frame is generated over each time frame. The SINR requirement Γ d is 10 db. In e simuations, e number N of nodes varies from 20 to 100, and e destination node veocity v varies from 0 to 20 km/hour (kph). We first verify our assumption in Section III-B at e probabiity of more an two probe senders at an IS is negigibe. Among e ISs wi one or more probe senders, Tabe I ists e percentage of ISs at have one probe sender, two probe senders, and more an two probe senders, respectivey. No more an two probes are observed at an IS, us vaidating our assumption. For an ongoing voice ca, if its SINR requirement is not satisfied, it tries to switch from one IS to anoer. Some DATA frames wi be ost during e switching due to e switching processing time, and if e switching is not successfu, ca dropping occurs. Fig. 3 shows e DATA frame oss rate wi different N and v vaues. A arger vaue of N and/or v tends to increase e frequency of switching among e ISs, us increasing e frame oss rate. It can aso be seen at a e frame oss rates are bounded by 0.05%, which is we wiin acceptabe range for voice. It is aso observed at e ca dropping rate is bounded by 1.2%, which happens when N = 100 and v = 20 kph. So our scheme can keep e frame oss rate and ca dropping rate at a ow eve. V. CONCLUSIONS AND DISCUSSIONS It is chaenging to support voice traffic over a mobie ad hoc network due to e deay-sensitive nature of such traffic and due to user mobiity. In is paper we have proposed a MAC scheme to support voice traffic by e resource reservation mechanism. User mobiity is addressed by rea-time signa and interference measurements at e receivers. This study shoud provide hepfu insight to e deveopment and depoyment of mobie ad hoc networks supporting mutimedia services. Currenty constant rate voice traffic has been considered in is research. However, voice traffic is characterized by an on-off nature, and no information packets are generated at an off state. When an on voice fow becomes off, oer Fig. 3. Voice frame oss rate 6 x veocity = 20 kph veocity = 10 kph veocity = 0 kph Number (N) of voice nodes The DATA frame oss rate of a voice ca. active receivers measure ess interference. If subsequenty one or more new cas are admitted at e serving ISs of e off voice fow, and ater e off voice fow switches to e on state, it is ikey at some active receivers experience more interference an what ey can toerate, us eading to ink corruption. To address is probem, when a voice fow becomes off, its source and destination nodes continuousy send (on e respective serving IS) a probe (wi a different code from at used in Section III-A) wi a ow power and a arge spreading gain. Through e received probe power, an active receiver at e IS can estimate e potentia interference eve which wi be generated if e off voice fow becomes on again. The potentia interference is counted in e active receiver s current interference eve. We ca is meod 100- percent reservation, wiout a mutipexing gain. Research on statistica mutipexing of voice traffic wiin is scheme is currenty underway. REFERENCES [1] Z. J. Haas and J. Deng, Dua busy tone mutipe access (DBTMA) a mutipe access contro scheme for ad hoc networks, IEEE Trans. Commun., vo. 50, no. 6, pp , June [2] P. Wang, H. Jiang, and W. Zhuang, A dua busy-tone MAC scheme supporting voice/data traffic in wireess ad hoc networks, in Proc. IEEE GLOBECOM 06, San Francisco, Caifornia, USA, Nov. Dec [3] H. Jiang, P. Wang, W. Zhuang, and X. Shen, An interference aware distributed MAC scheme for CDMA-based wireess mesh backbone, in Proc. IEEE CCNC 07, pp , Las Vegas, Nevada, USA, Jan [4] E. S. Sousa and J. A. Sivester, Spreading code protocos for distributed spread-spectrum packet radio networks, IEEE Trans. Commun., vo. 36, no. 3, pp , Mar [5] T. Moscibroda and R. Wattenhofer, The compexity of connectivity in wireess networks, in Proc. IEEE INFOCOM 06, Barceona, Spain, Apr [6] A. Muqattash and M. Krunz, Power controed dua channe (PCDC) medium access protoco for wireess ad hoc networks, in Proc. IEEE INFOCOM 03, pp , San Francisco, Caifornia, USA, Mar. Apr [7] G. L. Stuber, Principes of Mobie Communication. Kuwer Academic Pubishers, Norwe, MA, USA, 1996, pp
COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS
COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE80.15.3A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS Ms. Jina H. She PG Student C.C.E.T, Wadhwan, Gujarat, Jina_hshet@yahoo.com Dr. K. H. Wandra Director
More informationAnnouncements. Tuesday April 15 covers material from chapters: 1-3, 5-6 emphasis on material since last midterm
Announcements Reading Today: 4.1 & 4.2 (skip 4.2.4 and 4.2.5) Second Midterm: Tuesday Apri 15 covers materia from chapters: 1-3, 5-6 emphasis on materia since ast midterm CMSC 417 - S97 (ect 18) copyright
More informationWireless Communications
Wireess Communications Ceuar Concept Hamid Bahrami Reference: Rappaport Chap3 Eectrica & Computer Engineering Statements of Probems Soving the probem of Spectra congestion System Capacity A system-eve
More informationDealing with Link Blockage in mmwave Networks: D2D Relaying or Multi-beam Reflection?
Deaing with Lin Bocage in mmwave etwors: DD Reaying or Muti-beam Refection? Mingjie Feng, Shiwen Mao Dept. Eectrica & Computer Engineering Auburn University, Auburn, AL 36849-5, U.S.A. Tao Jiang Schoo
More informationDistribution of Path Durations in Mobile Ad-Hoc Networks and Path Selection
Distribution of ath Durations in Mobie Ad-Hoc Networks and ath Seection Richard J. La and Yijie Han Abstract We investigate the issue of path seection in mutihop wireess networks with the goa of identifying
More informationSatellite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic
Sateite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic Jing Zhu and Sumit Roy Department of Eectrica Engineering, University of Washington Box 352500, Seatte, WA 98195, USA
More informationBER Performance Analysis of Cognitive Radio Physical Layer over Rayleigh fading Channel
Internationa Journa of Computer ppications (0975 8887) Voume 5 No.11, Juy 011 BER Performance naysis of Cognitive Radio Physica Layer over Rayeigh fading mandeep Kaur Virk Dr. B R mbedkar Nationa Institute
More informationUtility-Proportional Fairness in Wireless Networks
IEEE rd Internationa Symposium on Persona, Indoor and Mobie Radio Communications - (PIMRC) Utiity-Proportiona Fairness in Wireess Networks G. Tychogiorgos, A. Gkeias and K. K. Leung Eectrica and Eectronic
More informationA Distributed Utility Max-Min Flow Control Algorithm
A Distributed tiity Max-Min Fow Contro Agorithm Hyang-Won Lee and Song Chong Department of Eectrica Engineering and Computer Science Korea Advanced Institute of Science and Technoogy (KAIST) mshw@netsys.kaist.ac.kr,
More informationEffect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels
Internationa Journa of Appied Engineering Research ISSN 973-456 Voume 3, Number 5 (8) pp. 77-83 Research India Pubications. http://www.ripubication.com Effect of Estimation Error on Adaptive -MRC Receiver
More informationA Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access
0 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA, VOL. 5, NO., JUNE 007 A Low Compexity VCS Method for PAPR Reduction in Muticarrier Code Division Mutipe Access Si-Si Liu, Yue iao, Qing-Song Wen,
More informationWireless Communications
Wireess Communications Mutipe Access Hamid Bahrami Eectrica & Computer Engineering Communication System Bock Diagram Dupexing Dupexing: transmit and receive at the same time Exampe: teephone, how about
More informationRun to Potential: Sweep Coverage in Wireless Sensor Networks
Run to Potentia: Sweep Coverage in Wireess Sensor Networks Min Xi,KuiWu,Yong Qi,Jizhong Zhao, Yunhao Liu,MoLi Department of Computer Science, Xi an Jiaotong University, China Department of Computer Science,
More informationCapacity of Data Collection in Arbitrary Wireless Sensor Networks
This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. 1 Capacity of Data Coection in Arbitrary Wireess
More informationPerformance Measures of a UWB Multiple-Access System: DS/CDMA versus TH/PPM
Performance Measures of a UWB Mutipe-Access System: DS/CDMA versus TH/PPM Aravind Kaias and John A. Gubner Dept. of Eectrica Engineering University of Wisconsin-Madison Madison, WI 53706 akaias@wisc.edu,
More informationJoint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition
This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 10.1109/TMC.2018.2861859,
More informationADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL
ADATIV ITRATION SCHM OF TURBO COD USING HYSTRSIS CONTROL Chih-Hao WU, Kenichi ITO, Yung-Liang HUANG, Takuro SATO Received October 9, 4 Turbo code, because of its remarkabe coding performance, wi be popuar
More informationFAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM
FAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM by Wenchen Wang Bacheor of Engineering, Northeastern University, China 2013 M.S. in Computer Science, University of Pittsburgh, 2017
More informationIterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels
Journa of Communications Vo. 0 No. February 0 Iterative Transceiver Design for Opportunistic Interference Aignment in MIMO Interfering Mutipe-Access Channes Weipeng Jiang ai Niu and Zhiqiang e Schoo of
More informationPower Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks
roceedings of the 46th IEEE Conference on Decision and Contro New Oreans, LA, USA, Dec. 12-14, 27 FrB2.5 ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao,
More informationJoint Optimal Power Allocation and Relay Selection with Spatial Diversity in Wireless Relay Networks
Proceedings of SDR'11-WInnComm-Europe, 22-24 Jun 2011 Joint Optima Power Aocation and Reay Seection with Spatia Diversity in Wireess Reay Networks Md Habibu Isam 1, Zbigniew Dziong 1, Kazem Sohraby 2,
More informationRateless Codes for the Gaussian Multiple Access Channel
Rateess Codes for the Gaussian Mutipe Access Channe Urs Niesen Emai: uniesen@mitedu Uri Erez Dept EE, Te Aviv University Te Aviv, Israe Emai: uri@engtauaci Devavrat Shah Emai: devavrat@mitedu Gregory W
More informationJoint Spectrum Access and Pricing in Cognitive Radio Networks with Elastic Traffic
Joint Spectrum Access and Pricing in Cognitive Radio Networks with Eastic Traffic Joceyne Eias University of Bergamo E-mai: joceyne.eias@unibg.it Fabio Martignon University of Bergamo E-mai: fabio.martignon@unibg.it
More informationModel of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobile Ad Hoc Network
Mode of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobie Ad Hoc Network Igor Konstantinov, Kostiantyn Poshchykov, Sergej Lazarev, and Oha Poshchykova Begorod State University, Pobeda Street 85,
More informationRate-Allocation Strategies for Closed-Loop MIMO-OFDM
Rate-Aocation Strategies for Cosed-Loop MIMO-OFDM Joon Hyun Sung and John R. Barry Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy, Atanta, Georgia 30332 0250, USA Emai: {jhsung,barry}@ece.gatech.edu
More informationSCHEDULING the wireless links and controlling their
3738 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 7, JULY 2014 Minimum Length Scheduing With Packet Traffic Demands in Wireess Ad Hoc Networks Yacin Sadi, Member, IEEE, and Sinem Coeri Ergen,
More informationAN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS
SIAM J. COMPUT. c 1998 Society for Industria and Appied Mathematics Vo. 27, No. 3, pp. 702 712, June 1998 008 AN Ω(D og(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS EYAL KUSHILEVITZ AND YISHAY MANSOUR
More informationFox-1E (RadFxSat-2) Telemetry and Whole Orbit Data Simulation. Burns Fisher, W2BFJ Carl Wick, N3MIM
Fox-1E (RadFxSat-2) Teemetry and Whoe Orbit Data Simuation Burns Fisher, W2BFJ Car Wick, N3MIM 1 Review: Fox-1 DUV Teemetry Fox-1A through Fox-1D are FM Repeater Sateites» Ony a singe downink frequency»
More informationChannel Division Multiple Access Based on High UWB Channel Temporal Resolution
Channe Division Mutipe Access Based on High UWB Channe Tempora Resoution Rau L. de Lacerda Neto, Aawatif Menouni Hayar and Mérouane Debbah Institut Eurecom B.P. 93 694 Sophia-Antipois Cedex - France Emai:
More informationEnergy-efficient Video Streaming from High-speed Trains
Energy-efficient Video Streaming from High-speed Trains Xiaoqiang Ma, Jiangchuan Liu Computing Science Schoo Simon Fraser University xma10,jciu@cs.sfu.ca Hongbo Jiang Department of EIE Huazhong University
More informationTHE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN
THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN A CDMA SYSTEM Yan Zhang, Laurence B. Mistein, and Pau H. Siege Department of ECE, University of Caifornia, San Diego
More informationResource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks
Resource Aocation via Linear Programming for Muti-Source, Muti-Reay Wireess Networs Nariman Farsad and Andrew W Ecford Dept of Computer Science and Engineering, Yor University 4700 Keee Street, Toronto,
More informationFOR energy limited data networks, e.g., sensor networks,
578 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO., DECEMBER 009 An Optima Power Aocation Scheme for the STC Hybrid ARQ over Energy Limited Networks Hongbo Liu, Member, IEEE, Leonid Razoumov,
More informationDistributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks
Distributed scheduing scheme for video streaming over muti-channe muti-radio muti-hop wireess networks Liang Zhou, Xinbing Wang, Wei Tu, Gabrie-Miro Muntean, Benoit Geer To cite this version: Liang Zhou,
More informationCross-layer queuing analysis on multihop relaying networks with adaptive modulation and coding K. Zheng 1 Y. Wang 1 L. Lei 2 W.
www.ietd.org Pubished in IET Communications Received on 18th June 2009 Revised on 30th Juy 2009 ISSN 1751-8628 Cross-ayer queuing anaysis on mutihop reaying networks with adaptive moduation and coding
More informationOn optimizing low SNR wireless networks using network coding
On optimizing ow SNR wireess networks using network coding Mohit Thakur Institute for communications engineering, Technische Universität München, 80290, München, Germany. Emai: mohit.thakur@tum.de Murie
More informationarxiv: v4 [physics.soc-ph] 31 Dec 2013
A Cascading Faiure Mode by Quantifying Interactions Junjian Qi and Shengwei Mei Department of Eectrica Engineering, Tsinghua University, Beijing, China 100084 arxiv:1301.2055v4 [physics.soc-ph] 31 Dec
More informationUltra-wideband (UWB) transmissions, with a bandwidth
Effective Interference Control in Ultra-Wideband Wireless Networks Hai Jiang, Weihua Zhuang, and Xuemin (Sherman) Shen, University of Waterloo, Canada COMSTOCK & STOCKBYTE Abstract: Ultra-wideband (UWB)
More informationAn Approach to use Cooperative Car Data in Dynamic OD Matrix
An Approach to use Cooperative Car Data in Dynamic OD Matrix Estimation L. Montero and J. Barceó Department of Statistics and Operations Research Universitat Poitècnica de Cataunya UPC-Barceona Tech Abstract.
More informationCommunication Systems
Communication Systems 1. A basic communication system consists of (1) receiver () information source (3) user of information (4) transmitter (5) channe Choose the correct sequence in which these are arranged
More informationLesson Objective Identify the value of a quarter and count groups of coins that include quarters.
LESSON 9.9C Hands On Quarters PROFESSIONAL PROFESSIONAL DEVELOPMENT DEVELOPMENT LESSON AT A GLANCE Mathematics Forida Standard Te and write time. MAFS.MD.a.a Identify and combine vaues of money in cents
More informationCAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS
CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS Susan Joshy and A.V. Babu, Department of Eectronics & Communication Engineering, Nationa Institute
More informationPerformance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2
ISSN 319-8885 Vo.3,Issue.39 November-14, Pages:7859-7863 www.ijsetr.com Performance Comparison of Cyco-stationary Detectors with Matched Fiter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 1 PG Schoar,
More informationDistributed Learning for Multi-Channel Selection in Wireless Network Monitoring
Distributed Learning for Muti-Channe Seection in Wireess Network Monitoring Yuan Xue, Pan Zhou, ao Jiang, Shiwen Mao and Xiaoei Huang Department of Computer Science and Engineering, Lehigh University,
More informationAvailability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique
Progress In Eectromagnetics Research Symposium Proceedings, Guangzhou, China, Aug. 25 28, 2014 849 Avaiabiity Anaysis for Eastic Optica Networks with Muti-path Virtua Concatenation Technique Xiaoing Wang
More informationPROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER FDMA SYSTEMS
PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER SYSTEMS Junsung Lim, Hyung G. Myung, Kyungjin Oh and David J. Goodman Dept. of Eectrica and Computer Engineering, Poytechnic University 5 Metrotech
More informationPerformance of Single User vs. Multiuser Modulation in Wireless Multicarrier (MC) Communications
erformance of Singe User vs. Mutiuser Moduation in Wireess Muticarrier (MC) Communications Anwaru Azim, ecturer, East West University Bangadesh Abstract-- he main objective of this paper is to compare
More informationTransmission Capacity Of D2D Communication Under Cellular Networks *
nternationa Conference on Computer, Networs and Communication Engineering (CCNCE 13) Transmission Capacity Of Communication Under Ceuar Networs * Xianghai Xu 1, Jun Sun 1,Shixiang Shao 1 1 Jiangsu provincia
More informationSecure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits
Secure Physica Layer Key Generation Schemes: Performance and Information Theoretic Limits Jon Waace Schoo of Engineering and Science Jacobs University Bremen, Campus Ring, 879 Bremen, Germany Phone: +9
More informationJoint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems
This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 0.09/ACCESS.07.70008,
More informationWorst case delay analysis for a wireless point-to-point transmission
Worst case deay anaysis for a wireess point-to-point transmission Katia Jaffrès-Runser University of Tououse IRIT - INPT ENSEEIHT Tououse, France Emai: katia.jaffres-runser@irit.fr Abstract Wireess technoogies
More informationQoS-Driven MAC-Layer Resource Allocation for Wireless Mesh Networks with Non-Altruistic Node Cooperation and Service Differentiation
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 2, DECEMBER 2009 QoS-Driven MAC-Layer Resource Aocation for Wireess Mesh Networks with n-atruistic de Cooperation and Service Differentiation Ho
More informationImproving the Active Power Filter Performance with a Prediction Based Reference Generation
Improving the Active Power Fiter Performance with a Prediction Based Reference Generation M. Routimo, M. Sao and H. Tuusa Abstract In this paper a current reference generation method for a votage source
More informationEnergy Harvesting in Heterogenous Networks with Hybrid Powered Communication Systems
Energy Harvesting in Heterogenous Networks with Hybrid Powered Communication Systems invited paper Ahmad Asharoa, Abdukadir Ceik, Ahmed E. Kama Iowa State University ISU, Ames, Iowa, United States, Emai:
More informationEnergy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks
Energy-Aware Scheduing with Quaity of Surveiance Guarantee in Wireess Sensor Networks Jaehoon Jeong, Sarah Sharafkandi, and David H.C. Du Dept. of Computer Science and Engineering, University of Minnesota
More informationCAN FD system design
icc 215 CAN FD system design Dr. - Ing. M. Schreiner Daimer Research and Deveopment Abstract The objective of this paper is to give genera design rues for the physica ayer of CAN FD networks. As an introduction
More informationCHANNEL MODELLING & PERFORMANCE ANALYSIS OF WIFI
CHANNEL MODELLING & PERFORMANCE ANALYSIS OF WIFI Jivisha, Gaurav Mohta, Saumya Das Siim Manipa Institute of Technoogy Emai Id- gauravmohta.officia@gmai.com; Ph No. +9 9609850304 Abstract Wi-Fi or wireess
More informationBest Relay Selection Using SNR and Interference Quotient for Underlay Cognitive Networks
IEEE ICC 1 - Wireess Communications Symposium Best Reay Seection Using SNR and Interference Quotient for Underay Cognitive Networks Syed Imtiaz Hussain 1, Mohamed M. Abdaah 1, Mohamed-Sim Aouini 1,, Mazen
More informationDistributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach
Distributed Resource Aocation for Reay-Aided Device-to-Device Communication Under Channe Uncertainties: A Stabe Matching Approach Monowar Hasan, Student Member, IEEE, and Ekram Hossain, Feow, IEEE Abstract
More informationIEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1 Finite-State Markov Modeing for Wireess Channes in Tunne Communication-Based Train Contro Systems Hongwei Wang, Fei Richard Yu, Senior Member,
More informationSpatial Reuse in Dense Wireless Areas: A Cross-layer Optimization Approach via ADMM
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Spatia Reuse in Dense Wireess Areas: A Cross-ayer Optimization Approach via ADMM Haeh Tabrizi, Member, IEEE, Borja Peeato, Member, IEEE, Gonaz Farhadi, Member,
More informationEnergy Efficient Sensor, Relay and Base Station Placements for Coverage, Connectivity and Routing
Energy Efficient Sensor, Reay and Base Station Pacements for Coverage, Connectivity and Routing Mauin Pate*, R. Chandrasekaran and S.Venkatesan Teecommunication Engineering Program Erik Jonsson Schoo of
More informationENERGY MANAGEMENT OF WIRELESS SENSOR NETWORK WITH MIMO TECHNIQUES
EERGY MAAGEMET OF WIRELESS SESOR ETWORK WITH MIMO TECHIQUES TRUPTI MAYEE BEHERA Schoo of Eectronics, KIIT University Bhubaneswar, Odisha,India trupti_behera@rediffmai.com SUDHASU SEKHAR SIGH Schoo of Eectronics,
More informationResource Allocation via Linear Programming for Fractional Cooperation
1 Resource Aocation via Linear Programming for Fractiona Cooperation Nariman Farsad and Andrew W Ecford Abstract In this etter, resource aocation is considered for arge muti-source, muti-reay networs empoying
More informationDistributed Resource Allocation for Relay-Aided Device-to-Device Communication: A Message Passing Approach
Distributed Resource Aocation for Reay-Aided Device-to-Device Communication: A Message Passing Approach Monowar Hasan and Ekram Hossain arxiv:406.323v [cs.ni] 2 Jun 204 Abstract Device-to-device D2D communication
More informationAcknowledgement. Wireless History
Acknowedgement Sides derived from cass materia posted by Dr. A. Godsmith www.stanford.edu/cass/ee359/ ectures.htm See aso: A. Godsmith, Wireess Communications, Cambridge Press Wireess History Ancient Systems:
More informationTop Down Design of Joint MODEM and CODEC Detection Schemes for DSRC Coded-FSK Systems over High Mobility Fading Channels
Top Down Design of Joint MODEM and CODEC Detection Schemes for DSRC Coded-FSK Systems over High Mobiity Fading Channes Juinn-Horng Deng, Feng-Chin Hsiao, and Yi-Hsin Lin Department of Communications Engineering
More informationResource Allocation for Network-Integrated Device-to-Device Communications Using Smart Relays
Resource Aocation for Network-Integrated Device-to-Device Communications Using Smart Reays Monowar Hasan and Ekram Hossain Department of Eectrica and Computer Engineering, University of Manitoba, Winnipeg,
More informationTHE EMERGING IEEE ad wireless local area
1 Suboptima Spatia Diversity Scheme for 60 Gz Miimeter-Wave WLAN Zhenyu Xiao, Member, IEEE arxiv:1511.02326v1 [cs.it] 7 Nov 2015 Abstract This etter revisits the equa-gain (EG) spatia diversity technique,
More informationAnalyzing Uplink SINR and Rate in Massive. MIMO Systems Using Stochastic Geometry
Anayzing Upink SINR and Rate in Massive MIMO Systems Using Stochastic Geometry Tianyang Bai and Robert W. Heath, Jr. arxiv:5.2538v2 [cs.it] 2 Apr 26 Abstract This paper proposes a stochastic geometry framework
More informationP H O T O CD I N F O R M A T I O N B U L L E T I N
PCD 077 Juy, 1994 Copyright, Eastman Kodak Company, 1994 P H O T O CD I N F O R M A T I O N B U L L E T I N Fuy Utiizing Photo CD Images Maintaining Coor Consistency When Creating KODAK Photo CD Portfoio
More informationCruzPro FU60. Intelligent Digital Fuel Gauge/w Alarms & Consumption Calculator
Other CruzPro Products Depthsounders & Speed/Temperature/Logs PC Based Fishfinders and Active Depth Transducers DC Vots/Amps/Amp-Hour Monitor AC Vots/Amps/Freq/kW Monitor LPG/Petro Gas Detectors/Aarms
More informationCo-channel Interference Suppression Techniques for STBC OFDM System over Doubly Selective Channel
Co-channe Interference Suppression Techniques for STBC OFDM System over Douby Seective Channe Jyoti P. Patra Dept. of Eectronics and Communication Nationa Institute Of Technoogy Rourkea-769008, India E
More information: taking service robots to play soccer
Virbot@fied : taking service robots to pay soccer Larena Adaberto, Escaante Boris, Torres Luis, Abad Verónica, Vázquez Lauro Bio-Robotics Laboratory, Department of Eectrica Engineering Universidad Naciona
More informationSpatial Characteristics of 3D MIMO Wideband Channel in Indoor Hotspot Scenario at 3.5 GHz
Spatia Characteristics of 3D MIMO Wideband Channe in Indoor Hotspot Scenario at 3.5 GHz ei Tian Jianhua Zhang Yuxiang Zhang State Key ab. of Networking and Switching Tech. Beijing Univ. of osts and Teecom.
More informationSparse Channel Estimation Based on Compressed Sensing for Massive MIMO Systems
Sparse Channe Estimation Based on Compressed Sensing for Massive MIMO Systems Chenhao Qi, Yongming Huang, Shi Jin and Lenan Wu Schoo of Information Science and Engineering, Southeast University, Nanjing
More informationAn Evaluation of Connectivity in Mobile Wireless Ad Hoc Networks
An Evauation of Connectivity in Mobie Wireess Ad Hoc Networks Paoo Santi Istituto di Informatica e Teematica Area dea Ricerca de CNR Via G.Moruzzi, 5624 Pisa Itay santi@iit.cnr.it Dougas M. Bough Schoo
More informationUplink Massive MIMO SIR Analysis: How do Antennas Scale with Users?
Upink Massive MIMO SIR Anaysis: How do Antennas Scae with Users? Tianyang Bai and Robert W. Heath, Jr. Wireess Networking and Communication Group The University of Texas at Austin 66 Guadaupe Street, C83,
More informationResource management for network-assisted D2D communication DEMIA DELLA PENDA
Resource management for network-assisted D2D communication DEMIA DELLA PENDA Licentiate Thesis Stockhom, Sweden 2016 TRITA-EE 2016:035 ISSN 1653-5146 ISBN 978-91-7595-885-9 KTH Roya Institute of Technoogy
More informationMulti-user video streaming using unequal error protection network coding in wireless networks
Vukobratović and Stanković EURASIP Journa on Wireess Communications and Networking 202, 202:28 RESEARCH Open Access Muti-user video streaming using unequa error protection network coding in wireess networks
More informationDESIGN OF SHIP CONTROLLER AND SHIP MODEL BASED ON NEURAL NETWORK IDENTIFICATION STRUCTURES
DESIGN OF SHIP CONROLLER AND SHIP MODEL BASED ON NEURAL NEWORK IDENIFICAION SRUCURES JASMIN VELAGIC, FACULY OF ELECRICAL ENGINEERING SARAJEVO, BOSNIA AND HERZEGOVINA, asmin.veagic@etf.unsa.ba ABSRAC his
More informationOn the Relationship Between Queuing Delay and Spatial Degrees of Freedom in a MIMO Multiple Access Channel
On the Reationship Between Queuing Deay and Spatia Degrees of Freedom in a IO utipe Access Channe Sriram N. Kizhakkemadam, Dinesh Rajan, andyam Srinath Dept. of Eectrica Engineering Southern ethodist University
More informationUniversity of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /GLOCOM.2003.
Coon, J., Siew, J., Beach, MA., Nix, AR., Armour, SMD., & McGeehan, JP. (3). A comparison of MIMO-OFDM and MIMO-SCFDE in WLAN environments. In Goba Teecommunications Conference, 3 (Gobecom 3) (Vo. 6, pp.
More informationMinimizing Distribution Cost of Distributed Neural Networks in Wireless Sensor Networks
1 Minimizing Distribution Cost of Distributed Neura Networks in Wireess Sensor Networks Peng Guan and Xiaoin Li Scaabe Software Systems Laboratory, Department of Computer Science Okahoma State University,
More informationLow Delay Wind Noise Cancellation for Binaural Hearing Aids
INTER-NOISE 6 Low Deay Wind Noise Canceation for Binaura Hearing Aids Nobuhio HIRUMA ; Ryousue KOUYAMA ; Hidetoshi NAKASHIMA 3 ; Yoh-ichi FUJISAKA 4, 4 Rion Co., Ltd, Japan, 3 Nationa Institute of Technoogy,
More informationDual Relay Selection for Cooperative NOMA with Distributed Space Time Coding
This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI.9/ACCESS.8.846, IEEE Access
More informationSparse Beamforming Design for Network MIMO System with Per-Base-Station Backhaul Constraints
Sparse Beamforming Design for Networ MIMO System with Per-Base-Station Bachau Constraints Binbin Dai and Wei Yu Department of Eectrica and Computer Engineering University of Toronto, Toronto, Ontario M5S
More informationCooperative Caching in Dynamic Shared Spectrum Networks
Fina version appears in IEEE Trans. on Wireess Communications, 206. Cooperative Caching in Dynamic Shared Spectrum Networs Dibaar Das, Student Member, IEEE, and Ahussein A. Abouzeid, Senior Member, IEEE
More informationarxiv: v1 [cs.it] 21 Feb 2015
1 Opportunistic Cooperative Channel Access in Distributed Wireless Networks with Decode-and-Forward Relays Zhou Zhang, Shuai Zhou, and Hai Jiang arxiv:1502.06085v1 [cs.it] 21 Feb 2015 Dept. of Electrical
More informationJoint Congestion Control, Routing and Media Access Control Optimization via Dual Decomposition for Ad Hoc Wireless Networks
Joint Congestion Contro, Routing and Media Access Contro Optimization via Dua Decomposition for Ad Hoc Wireess Networks Francesco Lo Presti Dipartimento di Informatica Università de L Aquia opresti@di.univaq.it
More informationSURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS
SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS A. Heiß Energie-AG (EAM), Kasse G. Bazer Darmstadt University of Technoogy O. Schmitt ABB Caor Emag Schatanagen, Mannheim B. Richter
More informationSoftware Process & Agile Software Development
CSE516 Science for Society Software Process & Agie Software Deveopment Apri 25, 2014 Ichu Yoon (icyoon@sunykorea.ac.kr) Software A textbook description Instructions (computer programs) that when executed
More informationLBI Mobile Communications. EDACS TM Jessica. PBX Gateway. Operator s Manual
Mobie Communications EDACS TM Jessica PBX Gateway Operator s Manua TABLE OF CONTENTS 1. SCOPE... 3 2. QUICK USAGE GUIDE... 4 2.1. Making Phone Cas From An EDACS Radio... 4 2.2. Caing EDACS Radios From
More informationA Multiband OFDMA Heterogeneous Network for Millimeter Wave 5G Wireless Applications
SPECIAL SECTION ON OPTIMIZATION FOR EMERGING WIRELESS NETWORKS: IoT, 5G AND SMART GRID COMMUNICATIONS Received Juy 24, 2016, accepted August 15, 2016, date of pubication September 22, 2016, date of current
More informationPower Spectrum Optimization for Interference Mitigation via Iterative Function Evaluation
Power Spectrum Optimization for Interference Mitigation via Iterative Function Evauation Hayssam Dahrouj, Wei Yu, Taiwen Tang, and Steve Beaudin Eectrica and Computer Engineering Dept., University of Toronto,
More informationHybrid Digital-Analog Joint Source Channel Coding for Broadcast Multiresolution Communications
217 25th European Signa Processing Conference (EUSIPCO) Hybrid Digita-Anaog Joint Source Channe Coding for Broadcast Mutiresoution Communications O. Fresnedo, P. Suárez-Casa, L. Castedo Department of Eectronics
More informationYongxiang Zhao Brookhaven National Laboratory Upton, NY, July 1998 CENTER FOR ACCELERATOR PHYSICS
BNL CAP CCII, 65685 225-MUON-98C A NEW STRUCTURE OF LINEAR COLLIDER * Yongxiang Zhao Brookhaven Nationa Laboratory Upton, NY, 11973 RECEIVED AIK 1 7 1998 OSTI *This work was supported by the US Department
More informationA Novel Method for Doppler and DOD- DOA Jointly Estimation Based on FRFT in Bistatic MIMO Radar System
7 Asia-Pacific Engineering and Technoogy Conference (APETC 7) ISBN: 978--6595-443- A Nove Method for Dopper and DOD- DOA Jointy Estimation Based on FRFT in Bistatic MIMO Radar System Derui Song, Li Li,
More informationGroup Sparse Beamforming for Green Cloud-RAN
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 5, MAY 2014 2809 Group Sparse Beamforming for Green Coud-RAN Yuanming Shi, Student Member, IEEE, Jun Zhang, Member, IEEE, and Khaed B. Letaief,
More informationOperation Guide
MO0907-EB Operation Guide 709 713 Getting Acquainted Congratuations upon your seection of this CASO watch. To get the most out of your purchase, be sure to read this manua carefuy. Expose the watch to
More information