Probabilistic Handshake in All-to-all Broadcast Coded Slotted ALOHA

Size: px
Start display at page:

Download "Probabilistic Handshake in All-to-all Broadcast Coded Slotted ALOHA"

Transcription

1 Probabilistic Hanshake in All-to-all Broacast Coe Slotte ALOHA Mikhail Ivanov, Petar Popovski, Frerik Brännström, Alexanre Graell i Amat, an Čeomir Stefanović Department of Signals an Systems, Chalmers University of Technology, Gothenburg, Sween Department of Electronic Systems, Aalborg University, Aalborg, Denmark {mikhail.ivanov, frerik.brannstrom, alexanre.graell}@chalmers.se, {petarp, cs}@es.aau.k arxiv: v1 [cs.it] 17 Apr 2015 Abstract We propose a probabilistic hanshake mechanism for all-to-all broacast coe slotte ALOHA. We consier a fully connecte network where each user acts as both transmitter an receiver in a half-uplex moe. Users attempt to exchange messages with each other an to establish one-to-one hanshakes, in the sense that each user ecies whether its packet was successfully receive by the other users: After performing ecoing, each user estimates in which slots the resolve users transmitte their packets an, base on that, ecies if these users successfully receive its packet. The simulation results show that the propose hanshake algorithm allows the users to reliably perform the hanshake. The paper also provies some analytical bouns on the performance of the propose algorithm which are in goo agreement with the simulation results. I. INTRODUCTION Vehicular communications (VCs) is presently one of the most challenging problems of communication engineering. Its eployment will enable numerous applications, such as intelligent transportation systems, autonomous riving, an, most importantly, traffic safety. VCs entails a number of challenges, such as all-to-all communication, high mobility networks with rapily changing topologies an a large number of users, an poor channel quality. These challenges require new ieas an esigns at the physical an the meium access control (MAC) layers. The main requirements for VCs are high reliability an low latency. Furthermore, the aforementione challenges prohibit the classical use of acknowlegements in the form of aitional signaling. A novel MAC protocol calle all-to-all broacast coe slotte ALOHA (B-CSA) was propose by the authors in [1], which was shown to be able to satisfy the reliability an latency requirements in rough conitions of vehicular networks uner a set of iealize assumptions, such as perfect interference cancellation. Originally propose for a unicast scenario, coe slotte ALOHA (CSA) can provie large throughputs close to those of coorinate schemes [2], [3]. Different versions of CSA have been propose (see [4] for the most recent review). All of them share a slotte structure borrowe from the original slotte ALOHA [5] an the use of This research was supporte by the Sweish Research Council, Sween, uner Grant No , the Ericsson s Research Founation, Sween, Chalmers Antenna Systems Excellence Center in the project Antenna Systems for V2X Communication, an the Danish Council for Inepenent Research, uner Grants No an No successive interference cancellation. The contening users introuce reunancy by encoing their messages into multiple packets, which are transmitte in ranomly chosen slots. In the unicast scenario, the base station (BS) buffers the receive signal, ecoes the packets from the slots with no collision an attempts to reconstruct the packets in collision exploiting the introuce reunancy. A packet that is reconstructe is subtracte from the buffere signal an the BS procees with another ecoing roun. In contrast to classical CSA, where a BS is the intene recipient of the messages, in B-CSA each user acts as both receiver an transmitter. Every user is equippe with a halfuplex transceiver, so that a user cannot receive packets in the slots it uses for transmission. This can be moele as a packet erasure channel [6] an it affects the esign an the performance analysis as compare to classical CSA. Whereas B-CSA can provie high reliability, the rear communication failure events may be extremely costly in safety applications. Since proviing error-free communication uner the escribe conitions of VCs is not possible, one may attempt to etect communication failure events to use this information in the application level. For instance, consier the scenario where two users A an B are heaing towars each other. If A receives a message from B an obtains the information that B faile to receive its message, A can take extra precautions to avoi collision with B. In this paper, we propose an algorithm to obtain this information base on the by-prouct of ecoing, i.e., no extra signaling is use by the users. In particular, A uses the knowlege of B s transmissions to etect that B faile to resolve A. The problem stuie in this paper resembles the one of hanshake use for establishing connections in connectionoriente protocols. In transmission control protocol (TCP), a three-way hanshake is use by a pair of users to exchange their messages an to acknowlege that the messages were receive [7]. If the messages in the TCP level are exchange, then the hanshake is always performe successfully. In the propose algorithm, however, the ecision about successful hanshake can be in error, which inicates its probabilistic nature.

2 users A C B D E F slots Fig. 1: Users transmissions in a B-CSA system within one frame. Shae rectangles represent transmitte packets. (a) Original unicast graph G. II. SYSTEM MODEL In this section, we first escribe how encoing an ecoing are performe in B-CSA. Base on that, we escribe the propose hanshake algorithm. A. Coe Slotte ALOHA We consier a fully connecte network with m users that want to communicate between each other over a share meium. We focus on the exchange of cooperative awareness messages (CAMs) [8] use for safety applications, which are transmitte perioically by each user. The transmission perio is calle frame an it is ivie into n slots of equal uration. Users are assume to be frame-synchronize by means of Global Positioning System (GPS). Each user maps its message to a physical layer packet an repeats it l times (l is a ranom number chosen base on a preefine istribution) in ranomly chosen slots, as shown in Fig. 1 for a system with 6 users an 7 slots. Such a user is calle a egree-l user. Every packet contains pointers to its copies, so that, once a packet is successfully ecoe, full information about the location of the copies is available. Uner the assumptions escribe in the following, the system can be analyze using the theory of coes on graphs on the binary erasure channel (BEC). Each user correspons to a variable noe (VN) in the bipartite graph an represents a repetition coe, whereas slots correspon to check noes (CNs) an can be seen as single parity-check coes. In the following, users an VNs are use interchangeably. An ege connects the jth VN to the ith CN if the jth user transmits in the ith slot. For the example in Fig. 1, the corresponing bipartite graph is shown in Fig. 2(a). A bipartite graph is efine as G = {V,C,E}, where V, C, an E represent the sets of VNs, CNs, an eges, respectively. The performance of the system epens on the istribution that users use to choose the egree l or, using graph terminology, on the VN egree istribution q λ(x) = λ l x l, (1) l=0 where x is a ummy variable,λ l is the probability of choosing egreel, anq is the maximum egree, which is often boune ue to implementation constraints (b) Inuce graph G A for user A. G A (B) = 1. (c) Intermeiate graph A reconstructe by user A an slots with resiual interference (marke with gray). () Intermeiate graph A reconstructe by user A excluing slots with resiual interference. (e) Graph A reconstructe by user A (incluing user A s slots). A C B D E F (f) Inuce graph A B for user B base on A. A B (A) = 1. (g) Inuce graph G B for user B. G B (A) = 0. Fig. 2: The graph evolution over the course of the hanshake algorithm. Circles represent users (VNs) an squares represent slots (CNs). The example correspons to the outcome g = [1, 1, 0] (see Section II-C).

3 Users buffer the receive signal whenever they are not transmitting. The ifference between classical CSA an B- CSA is illustrate in the example of Fig. 2. The entire graph G is available to the BS in CSA (Fig. 2(a)). For a generic user A in B-CSA, the part of the graph that correspons to user A s transmissions is not available to it ue to the half-uplex moe. Thus, this part of the graph shown with gray in Fig. 2(b). The available part of the graph is calle the inuce graph an is enote by G A. The receive signal buffere by user A in slot i is y i = j U i h i,j a j, (2) where U i U is the set of users that transmit in the ith slot, U is the set of all users, a j is a packet of the jth user in U i, an h i,j > 0 is the channel coefficient. A slot is calle a singleton slot if it contains only one packet. If it contains more packets, we say that a collision occurs. When ecoing, user A first ecoes the packets in singleton slots an obtains the location of their copies. Using ata-aie methos, the channel coefficients corresponing to the copies are then estimate. After subtracting the interference cause by the ientifie copies, ecoing procees until no further singleton slots are foun. The performance parameters of B-CSA are efine as follows. The channel loa is efine as g = m/n. The average number of users that are not successfully resolve by user A, terme unresolve users, is enote by w. The reliability is measure by means of the average packet loss rate (PLR), p = w/(m 1), which is the probability of a user to be unresolve by user A. B. Probabilistic Hanshake One of the main ifferences of CSA compare to actual coes on graphs is that, in CSA, the graph is not known to the ecoer a priori an the ecoer reconstructs it while ecoing. We use this reconstructe graph to perform the hanshake. Without loss of generality, we concentrate on the hanshake between users A an B. We first introuce the necessary notation to escribe the propose hanshake algorithm. Given a particular realization of the graph G with m VNs an n CNs generate ranomly using the istribution λ(x), the reconstruction of the graph G obtaine by user A after ecoing is enote by A. We recall that the inuce graph for user A is enote by G A. With a slight abuse of notation, if user B is resolvable by user A base on G A, we write G A (B) = 1 an we write G A (B) = 0 otherwise. Using this notation, the PLR can be written as p = Pr{G A (B) = 0}. A B enotes the graph that user A obtains after removing user B s slots from the reconstructe graph A. Hence, we write A B (A) = 1 if user A conclues that user B resolves it using the reconstructe graph A. For the example in Fig. 2, user A uses the inuce graph G A shown in Fig. 2(b) for ecoing. However, user A may not be able to fully reconstruct G. In fact, user A can only resolve users B an E. Users D an F cannot be resolve because they form a so-calle stopping set, a harmful graph structure that makes ecoing fail. A stopping set is a subset of VNs of non-zero egrees S V where all neighboring CNs of S are connecte to S at least twice [9]. After ecoing, user A reconstructs the graph A shown in Fig. 2(c). Aitionally, user A obtains the knowlege that slots 5 an 7 belong to a stopping set. It is worth noting that this is a stopping set from user A s perspective an not necessarily a stopping set in the original graphg. Nonetheless, user A assumes that these slots cannot be use for ecoing by any other user. Therefore, user A removes these slots, as well as all the eges connecte to them, to obtain the grapha shown in Fig. 2() (the remove slots an eges are shae). As the the last step to reconstruct G, user A as itself as a VN to the graph A an connects it to the corresponing CNs. The reconstruction of the graph A is shown in Fig. 2(e). Since user A oes not know who exactly transmitte in slots 1 3, these slots are shown with gray. User A uses this graph to run the ecoing on behalf of other users, e.g., Fig. 2(f) shows the graph A B that user A uses for ecoing on behalf of user B. In this case, A B (A) = 1. However, in reality user B uses G B for ecoing an its true outcome is G B (A) = 0. Therefore, user A makes an erroneous ecision about user B s awareness of user A, which happens ue to partial knowlege about the slots user A uses for transmission. C. Hanshake Outcomes If user A is in a stopping set containe in the original graph G, then it will not be resolvable by any other user in the network. User A has no means to learn about this since this information is containe in the slots that it uses for transmission. Hence, user A can never be sure about its successful hanshake ecision. To escribe the possible outcomes of the hanshake algorithm an analyze their probabilities, we introuce the vector g = [G A (B), A B (A), G B (A)]. If user A fails to resolve user B, i.e., G A (B) = 0, with a slight abuse of notation we say that A B (A) = x, meaning that A cannot perform a hanshake with B. All possible outcomes with the corresponing probabilities are summarize in Table I. In the table, p 1 is the probability that user A successfully etects communication failure at user B s sie. p 2 is the probability that user A fails to etect communication failure at user B s sie an erroneously assumes that user B successfully receives its packet. p 5 is the probability of correct hanshake.p 3 an p 4 are auxiliary probabilities, where p 3 = Pr{G B (A) = 0,G A (B) = 0} is the probability that users A anbo resolve each other simultaneously. The sump 3 +p 4 equals the probability that user A oes not resolve user B, i.e., p 3 +p 4 = Pr{G A (B) = 0} = p. Interestingly, the outcome g = [1, 0, 1] can not occur, which is formally proven in the following theorem. Theorem 1. Pr{g = [1, 0, 1]} = 0. Proof: G A (B) = 1 an A B (A) = 0 imply that user A is in a stopping set S of the graph A B. This stopping set S has to be present in the graph G B as well since A B is a subgraph of G B. Hence, G B (A) = 0, which completes the proof.

4 TABLE I: Possible outcomes of the hanshake algorithm. g = [G A (B), A B (A), G B (A)]. G A (B) A B (A) G B (A) Pr{g} Event p 1 Failure etecte p 2 False hanshake 0 x 0 p 3 Auxiliary 0 x 1 p 4 Auxiliary p 5 Successful hanshake A. Inuce Distribution III. PERFORMANCE ANALYSIS The performance of CSA exhibits a threshol behavior, i.e., all users are successfully resolve if the channel loa is below a certain threshol value when n. The threshol epens only on the egree istribution an is obtaine via ensity evolution [10]. A finite number of slots, however, gives rise to an error floor in the PLR performance. In [1] it was shown that the error floor can be accurately preicte base on the inuce istribution observe by the receiver. The inuce istribution for a egree-k receiver can be expresse similarly to (1), where min{q,k+} λ (k) = l= ( n k )( k ) l ( n l) λ l (3) is the fraction of users of egree as observe by user A if it chooses egree k. We efine the PLR for a egree- user as observe by a egree-k receiver as p (k) = w(k) m (k) = w(k) mλ (k), (4) where m (k) an w (k) are the average number of all an unresolve egree- users for a egree-k receiver, respectively. For egree-0 users, p (k) 0 = 1 for all k. B. Analytical Results In this section, we are intereste in escribing the probabilities p 1 an p 2. First, we observe that p 1 +p 2 +p 3 = Pr{G B (A) = 0} = p. (5) From (5), we can immeiately write that p 1 +p 2 p. (6) In the following, we tighten the boun in (6). The probability p 3 can be written as p 3 = Pr{G A (B) = 0}Pr{G B (A) = 0 G A (B) = 0}. (7) The fact that the inuce graphs for all users arise from the same original graphg gives rise to epenency between users performance. This is expresse as the conitional probability in the right-han sie of (7). Examining (7), we conjecture that p 3 p 2. (8) For the asymptotic case, when n, it is easy to show that p 3 = p 2 since the probability for users A an B to use the same slots for transmission is zero. For finite frame lengths, the rationale behin this conjecture is as follows. Let us take a closer look at the conitional probability in (7). We conjecture that Pr{G B (A) = 0 G A (B) = 0} Pr{G B (A) = 0}. (9) Using the law of total probability, we can write Pr{G B (A) = 0 G A (B) = 0}Pr{G A (B) = 0} +Pr{G B (A) = 0 G A (B) = 1}Pr{G A (B) = 1} =Pr{G B (A) = 0}. Exploiting Pr{G B (A) = 0} = Pr{G A (B) = 0} = p gives Pr{G B (A) = 0 G A (B) = 1} = p 1 p (1 Pr{G B(A) = 0 G A (B) = 0}). (10) Therefore, showing (9) is equivalent to showing Pr{G B (A) = 0 G A (B) = 1} Pr{G B (A) = 0}. (11) Assuming an unequal error protection (UEP) property [6], i.e., p (k) l+1 < p(k) l for a given k, it can be shown that (11) an, hence, (8) (9) hol. The erivations are omitte ue to lack of space. The UEP property oes hol when n. It is also easy to fin a counterexample for extremely short frame lengths, when it oes not hol. For instance, consier a unicast system (k = 0) with two users, two slots, an the istribution λ(x) = 0.5x+0.5x 2. For this toy example, the PLR for users of ifferent egrees can be foun by han, yieling p (0) 1 = 0.25 an p (0) 2 = 0.5. However, from our extensive simulations, we conjecture that the UEP property oes hol for sufficiently large values of n. Proving it rigorously an characterizing sufficient frame lengths is subject of ongoing work. Using the conjecture in (8) together with (5), we can write a tighter version of (6) as p 1 +p 2 p(1 p). (12) Next section presents numerical results an confirms the conjectures mae in this section. IV. NUMERICAL RESULTS In Fig. 3, we show simulation results for two ifferent istributions an frame length n = 200. The istribution λ(x) = 0.25x x x 8 is taken from [10], where it was optimize for classical CSA base on the threshol obtaine via ensity evolution. The fraction of egree-2 users was limite to 0.25 to yiel low error floor. The secon istribution, λ(x) = 0.86x x 8, was optimize in [1] base on error floor approximations to provie low error floor for B-CSA. The re an the green curves show the probabilities p 1 an p 2, respectively, an characterize the hanshake performance.

5 Probability p 1 p 2 p p(1 p) p 1 +p 2 can further simplify (13) an write p 1 +p 2 p. (15) In other wors, the probability Pr{G B (A) = 0} = p consists of p 1 an p 2, so that user A manages to etect communication failure events G B (A) = 0 in p 1 / p 30% of the cases for both istributions. We remark, however, that this ratio may change epening on the istribution. This fact suggests a new esign criterion for optimizing the egree istribution, i.e., the minimization of the probability of false hanshakep 2. We also remark that the sum of p 1 + p 2, shown with ashe purple curves, is strictly smaller than p(1 p) (black ashe curves), which is in agreement with the boun in (12). Probability g [user/slot] (a) λ(x) = 0.25x x x 8. p 1 p 2 p p(1 p) p 1 +p g [user/slot] (b) λ(x) = 0.86x x 8. Fig. 3: Hanshake performance of user A in B-CSA for two ifferent istributions an the frame length of n = 200 slots. The blue curves show the PLR. From Fig. 3 we observe that for low to moerate channel loa p 1 +p 2 p(1 p). (13) Using (5), we conclue that p 3 p 2, which, using (7), leas to Pr{G B (A) = 0 G A (B) = 0} p. (14) Therefore, for low to moerate channel loa, the probability for users to overlap in some slots is very small, which explains that the correlation between users performance is negligible. Bearing in min that p 1 in the error floor region, we V. CONCLUSIONS AND FUTURE WORK In this paper, we propose a probabilistic hanshake algorithm for vehicular communications base on B-CSA. In the rare cases of communication failure between two users, this event can be etecte by one of the users. The simulation results show that aroun 30% of such events can be etecte for the consiere istributions. We also propose analytical bouns on the performance of the hanshake algorithm, which match well the simulation results. The analytical bouns rely on the UEP property of CSA, for which a rigorous proof for finite frame lengths is left for future work. REFERENCES [1] M. Ivanov, F. Brännström, A. Graell i Amat, an P. Popovski, All-to-all broacast for vehicular networks base on coe slotte ALOHA, in Proc. IEEE Int. Conf. Commun. Workshop, Lonon, UK, June [2] E. Paolini, G. Liva, an M. Chiani, High throughput ranom access via coes on graphs: Coe slotte ALOHA, in Proc. IEEE Int. Conf. Commun., Kyoto, Japan, June [3] C. Stefanovic an P. Popovski, ALOHA ranom access that operates as a rateless coe, IEEE Trans. Commun., vol. 61, no. 11, pp , Nov [4] E. Paolini, C. Stefanovic, G. Liva, an P. Popovski, Coe ranom access: Applying coes on graphs to esign ranom access protocols, IEEE Commun. Mag., 2015 (to appear), available at [5] L. G. Roberts, ALOHA packet system with an without slot an capture, SIGCOMM Comput. Commun. Rev., vol. 5, no. 2, pp , Apr [6] M. Ivanov, F. Brännström, A. Graell i Amat, an P. Popovski, Error floor analysis of coe slotte ALOHA over packet erasure channels, IEEE Commun. Lett., vol. 19, no. 3, pp , Mar [7] C. A. Sunshine an Y. K. Dalal, Connection management in transport protocols, Computer Networks, vol. 2, no. 6, pp , Dec [8] ETSI EN : Draft V.0.0.5, Intelligent transport systems (ITS); vehicular communications; basic set of applications; part 2: Specification of cooperative awareness basic service, Tech. Rep., June [9] C. Di, D. Proietti, I. E. Telatar, T. J. Richarson, an R. L. Urbanke, Finite-length analysis of low-ensity parity-check coes on the binary erasure channel, IEEE Trans. Inf. Theory, vol. 48, no. 6, pp , June [10] G. Liva, Graph-base analysis an optimization of contention resolution iversity slotte ALOHA, IEEE Trans. Commun., vol. 59, no. 2, pp , Feb

Resource Allocation for Cooperative Transmission in Wireless Networks with Orthogonal Users

Resource Allocation for Cooperative Transmission in Wireless Networks with Orthogonal Users Resource Allocation for Cooperative Transmission in Wireless Networks with Orthogonal Users D. Richar Brown III Electrical an Computer Engineering Department Worcester Polytechnic Institute Worcester,

More information

Capacity Gain from Transmitter and Receiver Cooperation

Capacity Gain from Transmitter and Receiver Cooperation Capacity Gain from Transmitter an Receiver Cooperation Chris T. K. Ng an Anrea J. Golsmith Dept. of Electrical Engineering Stanfor University, Stanfor, CA 90 Email: ngctk, anrea}@wsl.stanfor.eu arxiv:cs/00800v1

More information

SECONDARY TRANSMISSION POWER OF COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS

SECONDARY TRANSMISSION POWER OF COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS SECONDARY TRANSMISSION POWER OF COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS Xiaohua Li 1 1 Department of ECE State University of New York at Binghamton Binghamton, NY 139, USA {xli,jhwu1}@binghamton.eu

More information

Cache-Aided Content Delivery in Fog-RAN Systems with Topological Information and no CSI

Cache-Aided Content Delivery in Fog-RAN Systems with Topological Information and no CSI Cache-Aie Content Delivery in Fog-RAN Systems with Topological Information an no CSI Wei-Ting Chang, Ravi Tanon, Osvalo Simeone Abstract In this work, we consier a Fog Raio Access Network (F-RAN) system

More information

Joint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich,

Joint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich, Slotted ALOHA in Small Cell Networks: How to Design Codes on Random Geometric Graphs? Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with Dragana Bajović and

More information

Random access on graphs: Capture-or tree evaluation

Random access on graphs: Capture-or tree evaluation Random access on graphs: Capture-or tree evaluation Čedomir Stefanović, cs@es.aau.dk joint work with Petar Popovski, AAU 1 Preliminaries N users Each user wants to send a packet over shared medium Eual

More information

A General Algorithm for Interference Alignment and Cancellation in Wireless Networks

A General Algorithm for Interference Alignment and Cancellation in Wireless Networks A General Algorithm for Interference Alignment an Cancellation in Wireless Networks Li Erran Li, Richar Alimi, Dawei Shen, Harish Viswanathan an Y. Richar Yang Bell Labs MIT Yale University Abstract Physical

More information

A NEW PUZZLE FOR ITERATED COMPLETE GRAPHS OF ANY DIMENSION

A NEW PUZZLE FOR ITERATED COMPLETE GRAPHS OF ANY DIMENSION A NEW PUZZLE FOR ITERATED COMPLETE GRAPHS OF ANY DIMENSION ELIZABETH SKUBAK AND NICHOLAS STEVENSON ADVISOR: PAUL CULL OREGON STATE UNIVERSITY ABSTRACT. The Towers of Hanoi puzzle can be use to label a

More information

SUBSET: A Joint Design of Channel Selection and Channel Hopping for Fast Blind Rendezvous in Cognitive Radio Ad Hoc Networks

SUBSET: A Joint Design of Channel Selection and Channel Hopping for Fast Blind Rendezvous in Cognitive Radio Ad Hoc Networks SUBSET: A Joint esign of Channel Selection an Channel Hopping for Fast Blin enezvous in Cognitive aio A Hoc Networks Xingya Liu an Jiang Xie epartment of Electrical an Computer Engineering The University

More information

IN GENERAL, an optical network can consist of a

IN GENERAL, an optical network can consist of a 1 Geometric Capacity Provisioning for Wavelength-Switche WDM Networks Li-Wei Chen, Eytan Moiano Abstract In this paper, we use an asymptotic analysis similar to the sphere-packing argument in the proof

More information

Joint Cooperative Relaying and Jamming for Maximum Secrecy Capacity in Wireless Networks

Joint Cooperative Relaying and Jamming for Maximum Secrecy Capacity in Wireless Networks Joint Cooperative Relaying an Jamming for Maximum Secrecy Capacity in Wireless Networks Li Wang, Chunyan Cao, Mei Song an Yu Cheng Beijing Key Laboratory of Work Safety Intelligent Monitoring School of

More information

Cross-layer Routing Optimization for Wireless Networks with Cooperative Diversity

Cross-layer Routing Optimization for Wireless Networks with Cooperative Diversity Cross-layer Routing Optimiation for Wireless Networs with Cooperative Diversity Zhiguo Ding an Kin K. Leung Department of Electrical an Electronic Engineering Imperial College Lonon, UK. Email: {higuo.ing,

More information

Construction of Power Efficient Routing Tree for Ad Hoc Wireless Networks using Directional Antenna

Construction of Power Efficient Routing Tree for Ad Hoc Wireless Networks using Directional Antenna Construction of Power Efficient Routing Tree for A Hoc Wireless Networks using Directional Antenna Qing Dai an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,

More information

An Analysis of Reliable MAC Layer Multicast in Wireless Networks

An Analysis of Reliable MAC Layer Multicast in Wireless Networks An Analysis of Reliable MAC Layer Multicast in Wireless etworks Yoooc Song, Junho Chung, Wookyung Sung, Bosung Kim, Dowon Hyun an Juwook Jang Department of lectronic ngineering, Sogang University. mail:

More information

Energy Efficient Relay Selection for Cooperative Relaying in Wireless Multimedia Networks

Energy Efficient Relay Selection for Cooperative Relaying in Wireless Multimedia Networks Energy Efficient Relay Selection for Cooperative Relaying in Wireless Multimeia Networks Zhengguo Sheng, Jun Fan, Chi Harol Liu, Victor C. M. Leung, Xue Liu*, an Kin K. Leung Orange Labs, France Telecom,

More information

Using Chaos to Detect IIR and FIR Filters

Using Chaos to Detect IIR and FIR Filters PIERS ONLINE, VOL. 6, NO., 00 90 Using Chaos to Detect IIR an FIR Filters T. L. Carroll US Naval Research Lab, Coe 66, Washington, DC 07, USA Abstract In many signal processing applications, IIR an FIR

More information

THe notion of the disease [1] has been extended from

THe notion of the disease [1] has been extended from IEEE/ACM TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL., NO., 6 Effective Network Quarantine with Minimal Restrictions on Communication Activities uanyang Zheng an Jie Wu, Fellow, IEEE Abstract

More information

Balanced-energy Sleep Scheduling Scheme for High Density Cluster-based Sensor Networks

Balanced-energy Sleep Scheduling Scheme for High Density Cluster-based Sensor Networks Balance-energy Sleep Scheuling Scheme for High Density Cluster-base Sensor Networks Jing Deng, unghsiang S. Han, Weni B. Heinzelman, an Pramo K. Varshney Abstract In orer to conserve battery power in very

More information

Relay Deployment and Power Control for Lifetime Elongation in Sensor Networks

Relay Deployment and Power Control for Lifetime Elongation in Sensor Networks Relay Deployment an Power Control for Lifetime Elongation in Sensor Networks Yufeng Xin, Tuna Güven, Mark Shayman Institute of Avance Computer Stuies University of Marylan, College Park, MD 074 e-mail:

More information

Energy Efficient Clustering Algorithm in Wireless Sensor Networks using Fuzzy Logic Control

Energy Efficient Clustering Algorithm in Wireless Sensor Networks using Fuzzy Logic Control 11 I Colloquium on Humanities, Science an ngineering Research (CHUSR 11), Dec 5-6 11, Penang nergy fficient Clustering Algorithm in Wireless Sensor Networks using Fuzzy Logic Control Z.W. Siew, A. Kiring,

More information

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan mario.cagal@epfl.ch Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan

More information

Radio Range Adjustment for Energy Efficient Wireless Sensor Networks. Electronic Engineering, Aston University, Birmingham B4 7ET,United Kingdom b

Radio Range Adjustment for Energy Efficient Wireless Sensor Networks. Electronic Engineering, Aston University, Birmingham B4 7ET,United Kingdom b Raio Range Ajustment for Energy Efficient Wireless Sensor Networks Q. Gao a,, K. J. Blow a 1, D. J. Holing a, I. W. Marshall b, X. H. Peng a a Electronic Engineering, Aston University, Birmingham B4 7ET,Unite

More information

Jahangir H. Sarker 11/15/0. The GSM Traffic Channel Capacity With(out) High Speed Circuit Switched Data. Scope and contents.

Jahangir H. Sarker 11/15/0. The GSM Traffic Channel Capacity With(out) High Speed Circuit Switched Data. Scope and contents. Jahangir H. arer // The G Traffic Channel Capacity With(out) High pee Circuit witche Data The results are represente for High pee Circuit-witche Data (HCD) traffic channels co-eisting with the voice traffic

More information

AN APPLICATION OF A GENERALISED JAKES MODEL FOR MIMO CHANNELS

AN APPLICATION OF A GENERALISED JAKES MODEL FOR MIMO CHANNELS AN APPLICATION OF A GENERALISED JAKES MODEL FOR MIMO CHANNELS Davi B. Smith (1) (1) Faculty of Engineering (Telecommunications), University of Technology Syney PO Box 13 Broaway NS 007 Australia E-mail:

More information

Wireless Event-driven Networked Predictive Control Over Internet

Wireless Event-driven Networked Predictive Control Over Internet UKACC International Conference on Control 22 Cariff, UK, 3-5 September 22 Wireless Event-riven Networke Preictive Control Over Internet Wenshan Hu, Hong Zhou, an Qijun Deng Abstract In networke control

More information

Performance of Amplify-and-Forward Relaying with Wireless Power Transfer over Dissimilar Channels

Performance of Amplify-and-Forward Relaying with Wireless Power Transfer over Dissimilar Channels http://x.oi.org/.5755/ j.eee..5.333 ELEKTRONIKA IR ELEKTROTECHNIKA ISSN 39-5 VOL. NO. 5 5 Performance of Amplify-an-Forwar Relaying with Wireless Power Transfer over Dissimilar Channels Dac-Binh Ha Duc-Dung

More information

Efficient Binary Corona Training Protocols for Heterogeneous Sensor and Actor Networks

Efficient Binary Corona Training Protocols for Heterogeneous Sensor and Actor Networks 1 Efficient Binary Corona Training Protocols for Heterogeneous Sensor an Actor Networks F. Barsi, A.A. Bertossi, C. Lavault, A. Navarra, S. Olariu, M.C. Pinotti, an V. Ravelomanana Abstract Sensor networks

More information

QoS Topology Control in Ad Hoc Wireless Networks

QoS Topology Control in Ad Hoc Wireless Networks QoS Topology Control in A Hoc Wireless Networks Xiaohua Jia, Deying Li Dept of Computer Science City University of Hong Kong Hong Kong, China Dingzhu Du Dept of Computer Science an Engineering University

More information

On the Throughput Allocation for Proportional Fairness in Multirate IEEE DCF under General Load Conditions

On the Throughput Allocation for Proportional Fairness in Multirate IEEE DCF under General Load Conditions 1 On the Throughput Allocation for Proportional Fairness in Multirate IEEE 82.11 DF uner General Loa onitions F. Daneshgaran, M. Laomaa, F. Mesiti, an M. Monin arxiv:83.198v1 [cs.ni] 13 Mar 28 Abstract

More information

TO improve the battery lifetimes of wireless devices

TO improve the battery lifetimes of wireless devices 200 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 3, NO. 6, JUNE 204 Energy-Optimum Throughput an Carrier Sensing Rate in CSMA-Base Wireless Networks Mehmet Koseoglu an Ezhan Karasan, Member, IEEE Abstract

More information

Performance Analysis and Comparison of ZF and MRT Based Downlink Massive MIMO Systems

Performance Analysis and Comparison of ZF and MRT Based Downlink Massive MIMO Systems Performance Analysis an Comparison of ZF an MRT Base Downlink Massive MIMO Systems Tebe Parfait, Yujun uang, 1,2 ponyo Jerry 1 Mobilelink Lab Univ of Electronic Sci an Tech of China, UESTC Chengu, China

More information

Page 1. Overview : Wireless Networks Lecture 7: Cellular Networks. The advent of cellular networks. The cellular network design.

Page 1. Overview : Wireless Networks Lecture 7: Cellular Networks. The advent of cellular networks. The cellular network design. Overview 18-759: Wireless Networks Lecture 7: Cellular Networks Dina Papagiannaki & Peter Steenkiste Departments of Computer Science an Electrical an Computer Engineering Spring Semester 2009 http://www.cs.cmu.eu/~prs/wireless09/

More information

MODELLING OF GPS SIGNAL LARGE SCALE PROPAGATION CHARACTERISTICS IN URBAN AREAS FOR PRECISE NAVIGATION

MODELLING OF GPS SIGNAL LARGE SCALE PROPAGATION CHARACTERISTICS IN URBAN AREAS FOR PRECISE NAVIGATION Int. J. Elec&Electr.Eng&Telcomm. 2012 G Sateesh Kumar et al., 2012 Research Paper ISSN 2319 2518 www.ijeetc.com Vol. 1, No. 1, October 2012 2012 IJEETC. All Rights Reserve MODELLING OF GPS SIGNAL LARGE

More information

Dynamic Hybrid Duplex for Rate Maximization in OFDMA. Sangmin Oh and Chae Y. Lee

Dynamic Hybrid Duplex for Rate Maximization in OFDMA. Sangmin Oh and Chae Y. Lee Dynamic Hybri Duplex for Rate Maximization in OFDMA Sangmin Oh an Chae Y. Lee Dept. of Inustrial Engineering, KAIST, 373-1 Kusung Dong, Taeon, Korea Tel: +82-42-350-5916, FAX: +82-42-350-3110 Email: {sangmin.oh,

More information

ROC Analysis of BLM Detector in AF Relays Based Cooperative Wireless Networks Omar GATERA 1, Ahmet Hamdi KAYRAN 1 and Haci ILHAN 2

ROC Analysis of BLM Detector in AF Relays Based Cooperative Wireless Networks Omar GATERA 1, Ahmet Hamdi KAYRAN 1 and Haci ILHAN 2 6 International Conference on Sustainable Energy, Environment an Information Engineering (SEEIE 6) ISBN: 978--6595-337-3 ROC Analys of BLM Detector in AF Relays Base Cooperative Wireless Networks Omar

More information

Topology-assisted techniques to relay selection for homogeneously distributed wireless sensor networks

Topology-assisted techniques to relay selection for homogeneously distributed wireless sensor networks This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceeings. Topology-assiste techniques to relay selection

More information

Erlang Capacity of Multi-class TDMA Systems with Adaptive Modulation and Coding

Erlang Capacity of Multi-class TDMA Systems with Adaptive Modulation and Coding Downloae from orbittuk on: Oct 2, 218 Erlang Capacity of Multi-class TDMA Systems with Aaptive Moulation an Coing Wang, Hua; Iversen, Villy Bæk Publishe in: Proceeings of IEEE ICC 28 Link to article, DOI:

More information

Effect of Carrier Frequency Offset on the BER Performance of Variable Spreading Factor OFCDM Systems

Effect of Carrier Frequency Offset on the BER Performance of Variable Spreading Factor OFCDM Systems This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the ICC 008 proceeings. Effect of Carrier Frequency Offset on the erformance

More information

A Circuit Level Fault Model for Resistive Shorts of MOS Gate Oxide

A Circuit Level Fault Model for Resistive Shorts of MOS Gate Oxide Circuit Level Fault Moel for esistive Shorts of MOS Gate Oxie Xiang Lu, Zhuo Li, Wangqi Qiu, D. M. H. Walker an Weiping Shi Dept. of Electrical Engineering Texas &M University College Station, TX 77843-34,

More information

Energy Efficient Virtual MIMO-based Cooperative Communications for Wireless Sensor Networks

Energy Efficient Virtual MIMO-based Cooperative Communications for Wireless Sensor Networks Energy Efficient Virtual MIMO-base Cooperative Communications for Wireless Sensor Networks Suharman K. Jayaweera Department of Electrical an Computer Engineering Wichita State University, Wichita, KS,

More information

Indoor Positioning Using Ultrasound and Radio Combination

Indoor Positioning Using Ultrasound and Radio Combination Inoor Positioning Using Ultrasoun an Raio Combination Gintautas Salcius, Evalas Povilaitis, Algimantas Tacilauskas Centre of Real Time Computer Systems, Kaunas University of Technology Stuentu St. 50,

More information

On Time-of-Arrival Estimation in NB-IoT Systems

On Time-of-Arrival Estimation in NB-IoT Systems On Time-of-Arrival Estimation in NB-IoT Systems Sha Hu, Xuhong Li, an Frerik Rusek Department of Electrical an Information Technology, Lun University, Lun, Sween {firstname.lastname}@eit.lth.se arxiv:7.383v

More information

Principal Component Analysis-Based Compensation for Measurement Errors Due to Mechanical Misalignments in PCB Testing

Principal Component Analysis-Based Compensation for Measurement Errors Due to Mechanical Misalignments in PCB Testing Principal Component Analysis-Base Compensation for Measurement Errors Due to Mechanical Misalignments in PCB Testing Xin He 1, Yashwant Malaiya 2, Anura P. Jayasumana 1 Kenneth P. Parker 3 an Stephen Hir

More information

A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks

A Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks A Turnover base Aaptive HELLO Protocol for Mobile A Hoc an Sensor Networks François Ingelrest, Nathalie Mitton, Davi Simplot-Ryl To cite this version: François Ingelrest, Nathalie Mitton, Davi Simplot-Ryl.

More information

Indoor Wireless Planning using Smart Antennas

Indoor Wireless Planning using Smart Antennas Inoor Wireless Planning using Smart Antennas Ali Abbasi an Maji Ghaeri Department of Computer Science, University of Calgary Emails: {abbasi, mghaeri}@ucalgary.ca Abstract This paper consiers the problem

More information

Wave-Induced Fluctuations in Underwater Light Field: Analysis of Data from RaDyO Experiments

Wave-Induced Fluctuations in Underwater Light Field: Analysis of Data from RaDyO Experiments DISTRIBUTION STATEMENT A. Approve for public release; istribution is unlimite. Wave-Inuce Fluctuations in Unerwater Light Fiel: Analysis of Data from RaDyO Experiments Dariusz Stramski Marine Physical

More information

Assessment of Combined Integrity Algorithms

Assessment of Combined Integrity Algorithms Assessment of Combine Integrity Algorithms C. Stöber an F. Kneißl Institute of Geoesy an Navigation, University FAF Munich ICG WG-B, Munich, 8.3.1 1/6 OUTLINE Overview User Equations Comparison of Integrity

More information

Replanning of Optical Networks based on Defragmentation Techniques

Replanning of Optical Networks based on Defragmentation Techniques Replanning of Optical Networks base on Defragmentation Techniques Daniela Aguiar Moniz aniela.moniz@tecnico.ulisboa.pt Instituto Superior Técnico, Lisboa, Portugal November 2015 Abstract The traffic growth

More information

Shadowing Correlation Model for Indoor Multi-hop Radio Link in Office Environment

Shadowing Correlation Model for Indoor Multi-hop Radio Link in Office Environment JAVA, International Journal of Electrical Electronics Engineering Volume 4, Number, April 26 Shaowing Moel for Inoor Multi-hop Raio Link in Office Environment Mohamma Fahli Inustrial Engineering Department

More information

Research on the Selection Strategy for Optimal Anchor Nodes Based on Ant Colony Optimization

Research on the Selection Strategy for Optimal Anchor Nodes Based on Ant Colony Optimization Sensors & Transucers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Research on the Selection Strategy for Optimal Anchor Noes Base on Ant Colony Optimization Baoxin ZHAO, Bi ZENG Guangong

More information

Pilot Based Time Delay Estimation for KSP-OFDM Systems in a Multipath Fading Environment

Pilot Based Time Delay Estimation for KSP-OFDM Systems in a Multipath Fading Environment Pilot Base Time Delay Estimation for KSP-OFDM Systems in a Multipath Faing Environment Dieter Van Welen, Freerik Simoens, Heii Steenam an Marc Moeneclaey TELI Department, Ghent University Sint-Pietersnieuwstraat

More information

Extension of the Nearest-Three Virtual-Space-Vector PWM to the Four-Level Diode-Clamped dc-ac Converter

Extension of the Nearest-Three Virtual-Space-Vector PWM to the Four-Level Diode-Clamped dc-ac Converter Etension of the Nearest-Three irtual-space-ector PWM to the Four-Level Dioe-Clampe c-ac Converter S. Busquets-Monge, J. Boronau, an J. Rocabert Dept. of Electronic Engineering Technical University of Catalonia

More information

Power Efficient Pilot Symbol Power Allocation under Time-variant Channels

Power Efficient Pilot Symbol Power Allocation under Time-variant Channels Power Efficient Pilot Symbol Power Allocation uner Time-variant Channels Michal Šimko, Paulo S. R. Diniz,QiWang an Markus Rupp Institute of Telecommunications, Vienna University of Technology, Vienna,

More information

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern

More information

On the performance of truncated type III hybrid ARQ scheme with code combining

On the performance of truncated type III hybrid ARQ scheme with code combining WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2003; 3:641 658 (DOI: 10.1002/wcm.147) On the performance of truncate type III hybri ARQ scheme with coe combining Qingchun Chen*,y

More information

Joint Partial Relay Selection, Power Allocation and Cooperative Maximum Likelihood Detection for MIMO Relay Systems with Limited Feedback

Joint Partial Relay Selection, Power Allocation and Cooperative Maximum Likelihood Detection for MIMO Relay Systems with Limited Feedback Joint Partial Relay Selection, Power Allocation an Cooperative Maximum Likelihoo Detection for MIMO Relay Systems with Limite Feeback Thomas Hesketh, Rorigo C. e Lamare, Stephen Wales Department of Electronics,

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

Wavelet Neural Network Controller for AQM in a TCP Network: Adaptive Learning Rates Approach

Wavelet Neural Network Controller for AQM in a TCP Network: Adaptive Learning Rates Approach 56 International Journal Jae Man of Control, Kim, Jin Automation, Bae Park, an an Yoon Systems, Ho Choi vol. 6, no. 4, pp. 56-533, August 8 Wavelet Neural Network Controller for AQM in a CP Network: Aaptive

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

MODULE III. Foundations Of Data Communications And The Physical Layer

MODULE III. Foundations Of Data Communications And The Physical Layer MODULE III Founations Of Data Communications An The Physical Layer Computer Networks an Internets -- Moule 3 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Motivation an moel Information sources

More information

RECENTLY, the 2G standard GSM was enhanced by

RECENTLY, the 2G standard GSM was enhanced by 274 IEEE TRANSACTIONS ON WIREESS COMMUNICATIONS, VO. 5, NO. 2, FEBRUARY 2006 The Training Sequence Coe Depenence of EDGE Receivers using Zero IF Sampling Martin Krueger, Member, IEEE, Robert Denk, an Bin

More information

Overhead Energy Considerations for Efficient Routing in Wireless Sensor Networks

Overhead Energy Considerations for Efficient Routing in Wireless Sensor Networks Overhea nergy Consierations for fficient Routing in Wireless Sensor Networks. Ilker Oyman an Cem rsoy Computer ngineering Department, Bogazici University, Istanbul, Turkey {oymani, ersoy}@boun.eu.tr Abstract

More information

Symmetric Decentralized Interference Channels with Noisy Feedback

Symmetric Decentralized Interference Channels with Noisy Feedback 4 IEEE International Symposium on Information Theory Symmetric Decentralized Interference Channels with Noisy Feedback Samir M. Perlaza Ravi Tandon and H. Vincent Poor Institut National de Recherche en

More information

Jitter Limitations on a Gigabit Copper Multi- Carrier System

Jitter Limitations on a Gigabit Copper Multi- Carrier System Jitter Limitations on a Gigabit Copper Multi- Carrier System Jan H. Rutger Schraer, Eric A.M. Klumperink, Jan L. Visschers, Bram Nauta University of Twente, IC-Design Group, P.O. Box 7, 75 AE, Enschee,

More information

Wavelet Transform Based Relay Algorithm for the Detection of Stochastic High Impedance Faults

Wavelet Transform Based Relay Algorithm for the Detection of Stochastic High Impedance Faults International Conference on Power Systems Transients IPST 3 in New Orleans, USA Wavelet Transm Base Relay Algorithm the Detection of Stochastic High Impeance Faults T. M. ai,.a. Snier an E. o () Dept.

More information

Validation of a Non-Line-of-Sight Path-Loss Model for V2V Communications at Street Intersections

Validation of a Non-Line-of-Sight Path-Loss Model for V2V Communications at Street Intersections Valiation of a Non-Line-of-Sight Path-Loss Moel for V2V Communications at Street Intersections Taimoor Abbas, Anreas Thiel, Thomas Zemen, Christoph F. Mecklenbräuker, an Frerik Tufvesson Department of

More information

Secure Communication with a Wireless-Powered Friendly Jammer

Secure Communication with a Wireless-Powered Friendly Jammer Secure Communication with a Wireless-Powere Frienly Jammer Wanchun Liu, Xiangyun Zhou, Salman Durrani, an Petar Popovski arxiv:42.0349v2 [cs.it] 26 Aug 205 Abstract In this paper, we propose to use a wireless-powere

More information

Driving passive-matrix LCDs with low hardware complexity and reduced supply voltage

Driving passive-matrix LCDs with low hardware complexity and reduced supply voltage Driving passive-matrix LCDs with low harware complexity an reuce supply voltage K. G. Panikumar T. N. Ruckmongathan Abstract In passive-matrix liqui-crystal isplays (LCDs), multiplexing is achieve by using

More information

Measurement of Semi-Anechoic Chamber Using Modified VSWR method above 1GHz

Measurement of Semi-Anechoic Chamber Using Modified VSWR method above 1GHz Measurement of Semi-Anechoic Chamber Using Moifie VSWR metho above 1GHz M. Bittera, K. Kováč, J. Hallon Department of Measurement, Faculty of Electrical Engineering an Information Technology, Slovak University

More information

The effect of two realistic Radio Propagation Models for Mobile Ad hoc NETworks in Urban Area Environment Supported with stations

The effect of two realistic Radio Propagation Models for Mobile Ad hoc NETworks in Urban Area Environment Supported with stations International Journal of Scientific & Engineering Research Volume 2, Issue 1, Oct-211 1 The effect of two realistic Raio Propagation Moels for Mobile A hoc NETworks in Urban Area Environment Supporte with

More information

Uneven Clustering Routing Algorithm Based on Optimal Clustering for Wireless Sensor Networks

Uneven Clustering Routing Algorithm Based on Optimal Clustering for Wireless Sensor Networks Journal of Communications Vol. 11, No., February 016 Uneven Clustering Routing Algorithm Base on Optimal Clustering for Wireless Sensor Networks Jianpo Li an Junyuan Huo School of Information Engineering,

More information

Implementation of Beam Formation for WMNs

Implementation of Beam Formation for WMNs Implementation of Beam Formation for WMNs M. UTHANSAKUL, S. PRADITTARA AND P. UTHANSAKUL School of Telecommunication Engineering Suranaree University of Technology 111 University Avenue, Muang, Nakhonratchasima

More information

Adaptive Interleaving for Bit-Interleaved Coded Modulation

Adaptive Interleaving for Bit-Interleaved Coded Modulation Aaptive Interleaving for Bit-Interleave Coe Moulation Clemens Stierstorfer an Robert F.H. Fischer Lehrstuhl für Informationsübertragung, Frierich Alexaner Universität Erlangen Nürnberg Cauerstraße 7/LIT,

More information

Downward Trimming of Polymer Thick Film Resistors through High Voltage Pulses

Downward Trimming of Polymer Thick Film Resistors through High Voltage Pulses Downwar Trimming of Polymer Thick Film Resistors through High Voltage Pulses Y.Srinivasa Rao E.C.E. Department Shri Vishnu Engineering College For Women Vishnupur, Bhimavaram-540 W.G.Dt.,Ap, Inia Phone

More information

AN-1140 APPLICATION NOTE

AN-1140 APPLICATION NOTE APPLICATION NOTE One Technology Way P.O. Box 9106 Norwoo, MA 02062-9106, U.S.A. Tel: 781.329.4700 Fax: 781.461.3113 www.analog.com Microphone Array Beamforming by Jera Lewis INTRODUCTION All MEMS microphones

More information

Efficient Location Training Protocols for Localization in Heterogeneous Sensor and Actor Networks

Efficient Location Training Protocols for Localization in Heterogeneous Sensor and Actor Networks Efficient Location Training Protocols for Localization in Heterogeneous Sensor an Actor Networks F. Barsi, A.A. Bertossi, Christian Lavault, A. Navarra, Stephan Olariu, Cristina Pinotti, Vlay Ravelomanana

More information

An Intelligent 3D User Interface Adapting to User Control Behaviors

An Intelligent 3D User Interface Adapting to User Control Behaviors An Intelligent 3D User Interface Aapting to User Control Behaviors Tsai-Yen Li Computer Science Department National Chengchi University Taipei, Taiwan 11623, R.O.C. +886 2 2938 7170 li@nccu.eu.tw Shu-Wei

More information

Bit-Wise Decoders for Coded Modulation and Broadcast Coded Slotted ALOHA. Mikhail Ivanov

Bit-Wise Decoders for Coded Modulation and Broadcast Coded Slotted ALOHA. Mikhail Ivanov Thesis for the Degree of Doctor of Philosophy Bit-Wise Decoders for Coded Modulation and Broadcast Coded Slotted ALOHA Mikhail Ivanov Communication Systems Group Department of Signals and Systems Chalmers

More information

Trigonometric Functions

Trigonometric Functions Trigonometric Functions By Daria Eiteneer Topics Covere: Reminer: relationship between egrees an raians The unit circle Definitions of trigonometric functions for a right triangle Definitions of trigonometric

More information

Modelling TCP Reno with Spurious Timeouts in Wireless Mobile Environment

Modelling TCP Reno with Spurious Timeouts in Wireless Mobile Environment 1 Moelling TCP Reno with Spurious Timeouts in Wireless Mobile Environment Shaojian Fu an Mohamme Atiquzzaman Telecommunications an Networks Research Lab School of Computer Science University of Oklahoma,

More information

INTERFERENCE REJECTION PERFORMANCE AS A MEANS OF FREQUENCY OPTIMISATION IN A MIXED CELLULAR/MANET NETWORK

INTERFERENCE REJECTION PERFORMANCE AS A MEANS OF FREQUENCY OPTIMISATION IN A MIXED CELLULAR/MANET NETWORK ITERFERECE REJECTIO PERFORMACE A A MEA OF FREQUECY OPTIMIATIO I A MIXED CELLULAR/MAET ETORK Kayonne ebley Faculty Avisor: Dr. Richar Dean Department of Electrical an Computer Engineering Morgan tate University

More information

EXPERIMENTAL DEMONSTRATION OF MULTIPLE ROBOT COOPERATIVE TARGET INTERCEPT

EXPERIMENTAL DEMONSTRATION OF MULTIPLE ROBOT COOPERATIVE TARGET INTERCEPT EXPERIMENTAL DEMONSTRATION OF MULTIPLE ROBOT COOPERATIVE TARGET INTERCEPT Timothy W. McLain Ranal W. Bear Je M. Kelsey Department of Mechanical Engineering, Brigham Young University, Provo, Utah 86 Department

More information

Investigating Converter Options for Automotive Grade Permanent Magnet Sychronous Generators

Investigating Converter Options for Automotive Grade Permanent Magnet Sychronous Generators Investigating Converter Options for Automotive Grae Permanent Magnet Sychronous Generators Erkan MESE *, Yusuf YAŞA *, Hakan AKÇA *, Mustafa G. AYDENIZ *, Murat AYAZ **, Murat TEZCAN * ( * )Yiliz Technical

More information

HOW SYMMETRICAL COMPONENTS MAY HELP TO SUPPRESS VOLTAGE SENSORS IN DIRECTIONAL RELAYS FOR DISTRIBUTION NETWORKS

HOW SYMMETRICAL COMPONENTS MAY HELP TO SUPPRESS VOLTAGE SENSORS IN DIRECTIONAL RELAYS FOR DISTRIBUTION NETWORKS C E D 17 th nternational Conference on Electricity Distribution Barcelona, 12-15 May 2003 HOW SYMMETCAL COMPONENTS MAY HELP TO SUPPESS VOLTAGE SENSOS N DECTONAL ELAYS FO DSTBUTON NETWOKS Xavier LE PVET

More information

Benford's Law and Possibilities for Its Use in Governmental Statistics 1

Benford's Law and Possibilities for Its Use in Governmental Statistics 1 Benfor's Law an Possibilities for Its Use in Governmental Statistics 1 Richar Hinls 2 University of Economics, Prague, Czech Republic Stanislava Hronová 3 University of Economics, Prague, Czech Republic

More information

Examination, TEN1, in courses SK2500/SK2501, Physics of Biomedical Microscopy,

Examination, TEN1, in courses SK2500/SK2501, Physics of Biomedical Microscopy, KTH Applie Physics Examination, TEN1, in courses SK2500/SK2501, Physics of Biomeical Microscopy, 2017-01-10, 8-13, FA32 Allowe ais: Compenium Imaging Physics (hane out) Compenium Light Microscopy (hane

More information

DESIGN OF A MODIFIED FUZZY FILTERING FOR NOISE REDUCTION IN IMAGES

DESIGN OF A MODIFIED FUZZY FILTERING FOR NOISE REDUCTION IN IMAGES Journal of Theoretical an Applie Information Technology 10 th January 014. Vol. 59 No.1 005-014 JATIT & LLS. All rights reserve. DESIGN OF A MODIFIED FUZZY FILTERING FOR NOISE REDUCTION IN IMAGES 1 EHSAN

More information

Relay Selection in Cooperative Networks with Frequency Selective Fading

Relay Selection in Cooperative Networks with Frequency Selective Fading Worcester Polytechnic Institute igital WPI Electrical & Computer Engineering Faculty Publications epartment of Electrical an Computer Engineering 2011 Relay Selection in Cooperative Networks with Frequency

More information

M2M massive wireless access: challenges, research issues, and ways forward

M2M massive wireless access: challenges, research issues, and ways forward M2M massive wireless access: challenges, research issues, and ways forward Petar Popovski Aalborg University Andrea Zanella, Michele Zorzi André D. F. Santos Uni Padova Alcatel Lucent Nuno Pratas, Cedomir

More information

A Study of Near-Field Direct Antenna Modulation Systems Using Convex Optimization

A Study of Near-Field Direct Antenna Modulation Systems Using Convex Optimization American Control Conference Marriott Waterfront, Baltimore, MD, USA June 3-July, WeB8.5 A Stuy of Near-Fiel Direct Antenna Moulation Systems Using Convex Optimization Java Lavaei, Ayin Babakhani, Ali Hajimiri

More information

A New Speech Enhancement Technique to Reduce Residual Noise Using Perceptual Constrained Spectral Weighted Factors

A New Speech Enhancement Technique to Reduce Residual Noise Using Perceptual Constrained Spectral Weighted Factors IOSR Journal of Electronics an Communication Engineering (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735. Volume 6, Issue 3 (May. - Jun. 013), PP 8-33 A New Speech Enhancement Technique to Reuce Resiual Noise

More information

Indoor Massive MIMO: Uplink Pilot Mitigation Using Channel State Information Map

Indoor Massive MIMO: Uplink Pilot Mitigation Using Channel State Information Map Inoor Massive MIMO: Uplink Pilot Mitigation Using Channel State Information Map Ahma Abbou 1, Ali H. Jaber Department of Statistics ebanese University Nabatieh, ebanon 1 Ahma.Abbou@etu.unilim.fr, ali.jaber@ul.eu.lb

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 1

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 1 IEEE JORNAL ON SELECTED AREAS IN COMMNICATIONS 1 Full-Duplex Spectrum-Sensing an MAC-Protocol for Multichannel Nontime-Slotte Cognitive Raio Networks Wenchi Cheng, Xi Zhang, Senior Member, IEEE, an Hailin

More information

ASYMMETRIC MODULATION FOR COGNITIVE RADIO AND INTELLIGENT ENVIRONMENTS

ASYMMETRIC MODULATION FOR COGNITIVE RADIO AND INTELLIGENT ENVIRONMENTS ASYMMTRIC MODULATION FOR COGNITIV RADIO AND INTLLIGNT NVIRONMNTS ric. Kreb (SAIC, Chantilly, VA, USA; ekreb@ieee.org); Robert H. Morelos-Zaragoza (San Jose State University, San Jose, CA, USA, r.morelos-zaragoza@ieee.org)

More information

Acoustical Localization in Schools of Submersibles

Acoustical Localization in Schools of Submersibles Oceans 6, Singapore (authors manuscript o not istribute) Acoustical Localization in Schools of Submersibles Navina Kottege & Uwe R. Zimmer Research School of Information Sciences an Engineering Autonomous

More information

Design and Analysis of an MST-Based Topology Control Algorithm

Design and Analysis of an MST-Based Topology Control Algorithm Design an Analysis of an MST-Base Topology Control Algorithm Ning Li, Jennifer C. Hou, an Lui Sha Department of Computer Science University of Illinois at Urbana-Champaign Urbana, IL 61801 {nli, jhou,

More information

Contents Maryland High School Programming Contest 1. 1 Stacked Floating Mountains 2. 2 Chess Puzzle 3. 3 Life Connections 4

Contents Maryland High School Programming Contest 1. 1 Stacked Floating Mountains 2. 2 Chess Puzzle 3. 3 Life Connections 4 2010 Marylan High School Programming Contest 1 Contents 1 Stacke Floating Mountains 2 2 Chess Puzzle 3 3 Life Connections 4 4 Circle of Friens 5 5 Floating Mountain Stability 6 6 Aim It Right! 7 7 Navi

More information

Joint Relaying and Network Coding in Wireless Networks

Joint Relaying and Network Coding in Wireless Networks Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block

More information

KEY FEATURES TEST CAPABILITIES 8000S HIGH POWER EARTH TESTING SYSTEM STANDARDS COMPLIANCE

KEY FEATURES TEST CAPABILITIES 8000S HIGH POWER EARTH TESTING SYSTEM STANDARDS COMPLIANCE KEY FEATURES 8000S HIGH POWER EARTH TESTING SYSTEM High power earth systems (Substations, Transmission towers, etc) have to be perioically monitore to check if they comply with safety levels establishe

More information

Transit Network Design under Stochastic Demand

Transit Network Design under Stochastic Demand Transit Network Design uner Stochastic Deman Hong K. LO Civil an Environmental Engineering Hong Kong University of Science an Technology 1 Public transport Backgroun Fixe route transit (FRT) : fixe route

More information