Probabilistic Handshake in All-to-all Broadcast Coded Slotted ALOHA
|
|
- Coral Whitney Glenn
- 5 years ago
- Views:
Transcription
1 Probabilistic Hanshake in All-to-all Broacast Coe Slotte ALOHA Mikhail Ivanov, Petar Popovski, Frerik Brännström, Alexanre Graell i Amat, an Čeomir Stefanović Department of Signals an Systems, Chalmers University of Technology, Gothenburg, Sween Department of Electronic Systems, Aalborg University, Aalborg, Denmark {mikhail.ivanov, frerik.brannstrom, alexanre.graell}@chalmers.se, {petarp, cs}@es.aau.k arxiv: v1 [cs.it] 17 Apr 2015 Abstract We propose a probabilistic hanshake mechanism for all-to-all broacast coe slotte ALOHA. We consier a fully connecte network where each user acts as both transmitter an receiver in a half-uplex moe. Users attempt to exchange messages with each other an to establish one-to-one hanshakes, in the sense that each user ecies whether its packet was successfully receive by the other users: After performing ecoing, each user estimates in which slots the resolve users transmitte their packets an, base on that, ecies if these users successfully receive its packet. The simulation results show that the propose hanshake algorithm allows the users to reliably perform the hanshake. The paper also provies some analytical bouns on the performance of the propose algorithm which are in goo agreement with the simulation results. I. INTRODUCTION Vehicular communications (VCs) is presently one of the most challenging problems of communication engineering. Its eployment will enable numerous applications, such as intelligent transportation systems, autonomous riving, an, most importantly, traffic safety. VCs entails a number of challenges, such as all-to-all communication, high mobility networks with rapily changing topologies an a large number of users, an poor channel quality. These challenges require new ieas an esigns at the physical an the meium access control (MAC) layers. The main requirements for VCs are high reliability an low latency. Furthermore, the aforementione challenges prohibit the classical use of acknowlegements in the form of aitional signaling. A novel MAC protocol calle all-to-all broacast coe slotte ALOHA (B-CSA) was propose by the authors in [1], which was shown to be able to satisfy the reliability an latency requirements in rough conitions of vehicular networks uner a set of iealize assumptions, such as perfect interference cancellation. Originally propose for a unicast scenario, coe slotte ALOHA (CSA) can provie large throughputs close to those of coorinate schemes [2], [3]. Different versions of CSA have been propose (see [4] for the most recent review). All of them share a slotte structure borrowe from the original slotte ALOHA [5] an the use of This research was supporte by the Sweish Research Council, Sween, uner Grant No , the Ericsson s Research Founation, Sween, Chalmers Antenna Systems Excellence Center in the project Antenna Systems for V2X Communication, an the Danish Council for Inepenent Research, uner Grants No an No successive interference cancellation. The contening users introuce reunancy by encoing their messages into multiple packets, which are transmitte in ranomly chosen slots. In the unicast scenario, the base station (BS) buffers the receive signal, ecoes the packets from the slots with no collision an attempts to reconstruct the packets in collision exploiting the introuce reunancy. A packet that is reconstructe is subtracte from the buffere signal an the BS procees with another ecoing roun. In contrast to classical CSA, where a BS is the intene recipient of the messages, in B-CSA each user acts as both receiver an transmitter. Every user is equippe with a halfuplex transceiver, so that a user cannot receive packets in the slots it uses for transmission. This can be moele as a packet erasure channel [6] an it affects the esign an the performance analysis as compare to classical CSA. Whereas B-CSA can provie high reliability, the rear communication failure events may be extremely costly in safety applications. Since proviing error-free communication uner the escribe conitions of VCs is not possible, one may attempt to etect communication failure events to use this information in the application level. For instance, consier the scenario where two users A an B are heaing towars each other. If A receives a message from B an obtains the information that B faile to receive its message, A can take extra precautions to avoi collision with B. In this paper, we propose an algorithm to obtain this information base on the by-prouct of ecoing, i.e., no extra signaling is use by the users. In particular, A uses the knowlege of B s transmissions to etect that B faile to resolve A. The problem stuie in this paper resembles the one of hanshake use for establishing connections in connectionoriente protocols. In transmission control protocol (TCP), a three-way hanshake is use by a pair of users to exchange their messages an to acknowlege that the messages were receive [7]. If the messages in the TCP level are exchange, then the hanshake is always performe successfully. In the propose algorithm, however, the ecision about successful hanshake can be in error, which inicates its probabilistic nature.
2 users A C B D E F slots Fig. 1: Users transmissions in a B-CSA system within one frame. Shae rectangles represent transmitte packets. (a) Original unicast graph G. II. SYSTEM MODEL In this section, we first escribe how encoing an ecoing are performe in B-CSA. Base on that, we escribe the propose hanshake algorithm. A. Coe Slotte ALOHA We consier a fully connecte network with m users that want to communicate between each other over a share meium. We focus on the exchange of cooperative awareness messages (CAMs) [8] use for safety applications, which are transmitte perioically by each user. The transmission perio is calle frame an it is ivie into n slots of equal uration. Users are assume to be frame-synchronize by means of Global Positioning System (GPS). Each user maps its message to a physical layer packet an repeats it l times (l is a ranom number chosen base on a preefine istribution) in ranomly chosen slots, as shown in Fig. 1 for a system with 6 users an 7 slots. Such a user is calle a egree-l user. Every packet contains pointers to its copies, so that, once a packet is successfully ecoe, full information about the location of the copies is available. Uner the assumptions escribe in the following, the system can be analyze using the theory of coes on graphs on the binary erasure channel (BEC). Each user correspons to a variable noe (VN) in the bipartite graph an represents a repetition coe, whereas slots correspon to check noes (CNs) an can be seen as single parity-check coes. In the following, users an VNs are use interchangeably. An ege connects the jth VN to the ith CN if the jth user transmits in the ith slot. For the example in Fig. 1, the corresponing bipartite graph is shown in Fig. 2(a). A bipartite graph is efine as G = {V,C,E}, where V, C, an E represent the sets of VNs, CNs, an eges, respectively. The performance of the system epens on the istribution that users use to choose the egree l or, using graph terminology, on the VN egree istribution q λ(x) = λ l x l, (1) l=0 where x is a ummy variable,λ l is the probability of choosing egreel, anq is the maximum egree, which is often boune ue to implementation constraints (b) Inuce graph G A for user A. G A (B) = 1. (c) Intermeiate graph A reconstructe by user A an slots with resiual interference (marke with gray). () Intermeiate graph A reconstructe by user A excluing slots with resiual interference. (e) Graph A reconstructe by user A (incluing user A s slots). A C B D E F (f) Inuce graph A B for user B base on A. A B (A) = 1. (g) Inuce graph G B for user B. G B (A) = 0. Fig. 2: The graph evolution over the course of the hanshake algorithm. Circles represent users (VNs) an squares represent slots (CNs). The example correspons to the outcome g = [1, 1, 0] (see Section II-C).
3 Users buffer the receive signal whenever they are not transmitting. The ifference between classical CSA an B- CSA is illustrate in the example of Fig. 2. The entire graph G is available to the BS in CSA (Fig. 2(a)). For a generic user A in B-CSA, the part of the graph that correspons to user A s transmissions is not available to it ue to the half-uplex moe. Thus, this part of the graph shown with gray in Fig. 2(b). The available part of the graph is calle the inuce graph an is enote by G A. The receive signal buffere by user A in slot i is y i = j U i h i,j a j, (2) where U i U is the set of users that transmit in the ith slot, U is the set of all users, a j is a packet of the jth user in U i, an h i,j > 0 is the channel coefficient. A slot is calle a singleton slot if it contains only one packet. If it contains more packets, we say that a collision occurs. When ecoing, user A first ecoes the packets in singleton slots an obtains the location of their copies. Using ata-aie methos, the channel coefficients corresponing to the copies are then estimate. After subtracting the interference cause by the ientifie copies, ecoing procees until no further singleton slots are foun. The performance parameters of B-CSA are efine as follows. The channel loa is efine as g = m/n. The average number of users that are not successfully resolve by user A, terme unresolve users, is enote by w. The reliability is measure by means of the average packet loss rate (PLR), p = w/(m 1), which is the probability of a user to be unresolve by user A. B. Probabilistic Hanshake One of the main ifferences of CSA compare to actual coes on graphs is that, in CSA, the graph is not known to the ecoer a priori an the ecoer reconstructs it while ecoing. We use this reconstructe graph to perform the hanshake. Without loss of generality, we concentrate on the hanshake between users A an B. We first introuce the necessary notation to escribe the propose hanshake algorithm. Given a particular realization of the graph G with m VNs an n CNs generate ranomly using the istribution λ(x), the reconstruction of the graph G obtaine by user A after ecoing is enote by A. We recall that the inuce graph for user A is enote by G A. With a slight abuse of notation, if user B is resolvable by user A base on G A, we write G A (B) = 1 an we write G A (B) = 0 otherwise. Using this notation, the PLR can be written as p = Pr{G A (B) = 0}. A B enotes the graph that user A obtains after removing user B s slots from the reconstructe graph A. Hence, we write A B (A) = 1 if user A conclues that user B resolves it using the reconstructe graph A. For the example in Fig. 2, user A uses the inuce graph G A shown in Fig. 2(b) for ecoing. However, user A may not be able to fully reconstruct G. In fact, user A can only resolve users B an E. Users D an F cannot be resolve because they form a so-calle stopping set, a harmful graph structure that makes ecoing fail. A stopping set is a subset of VNs of non-zero egrees S V where all neighboring CNs of S are connecte to S at least twice [9]. After ecoing, user A reconstructs the graph A shown in Fig. 2(c). Aitionally, user A obtains the knowlege that slots 5 an 7 belong to a stopping set. It is worth noting that this is a stopping set from user A s perspective an not necessarily a stopping set in the original graphg. Nonetheless, user A assumes that these slots cannot be use for ecoing by any other user. Therefore, user A removes these slots, as well as all the eges connecte to them, to obtain the grapha shown in Fig. 2() (the remove slots an eges are shae). As the the last step to reconstruct G, user A as itself as a VN to the graph A an connects it to the corresponing CNs. The reconstruction of the graph A is shown in Fig. 2(e). Since user A oes not know who exactly transmitte in slots 1 3, these slots are shown with gray. User A uses this graph to run the ecoing on behalf of other users, e.g., Fig. 2(f) shows the graph A B that user A uses for ecoing on behalf of user B. In this case, A B (A) = 1. However, in reality user B uses G B for ecoing an its true outcome is G B (A) = 0. Therefore, user A makes an erroneous ecision about user B s awareness of user A, which happens ue to partial knowlege about the slots user A uses for transmission. C. Hanshake Outcomes If user A is in a stopping set containe in the original graph G, then it will not be resolvable by any other user in the network. User A has no means to learn about this since this information is containe in the slots that it uses for transmission. Hence, user A can never be sure about its successful hanshake ecision. To escribe the possible outcomes of the hanshake algorithm an analyze their probabilities, we introuce the vector g = [G A (B), A B (A), G B (A)]. If user A fails to resolve user B, i.e., G A (B) = 0, with a slight abuse of notation we say that A B (A) = x, meaning that A cannot perform a hanshake with B. All possible outcomes with the corresponing probabilities are summarize in Table I. In the table, p 1 is the probability that user A successfully etects communication failure at user B s sie. p 2 is the probability that user A fails to etect communication failure at user B s sie an erroneously assumes that user B successfully receives its packet. p 5 is the probability of correct hanshake.p 3 an p 4 are auxiliary probabilities, where p 3 = Pr{G B (A) = 0,G A (B) = 0} is the probability that users A anbo resolve each other simultaneously. The sump 3 +p 4 equals the probability that user A oes not resolve user B, i.e., p 3 +p 4 = Pr{G A (B) = 0} = p. Interestingly, the outcome g = [1, 0, 1] can not occur, which is formally proven in the following theorem. Theorem 1. Pr{g = [1, 0, 1]} = 0. Proof: G A (B) = 1 an A B (A) = 0 imply that user A is in a stopping set S of the graph A B. This stopping set S has to be present in the graph G B as well since A B is a subgraph of G B. Hence, G B (A) = 0, which completes the proof.
4 TABLE I: Possible outcomes of the hanshake algorithm. g = [G A (B), A B (A), G B (A)]. G A (B) A B (A) G B (A) Pr{g} Event p 1 Failure etecte p 2 False hanshake 0 x 0 p 3 Auxiliary 0 x 1 p 4 Auxiliary p 5 Successful hanshake A. Inuce Distribution III. PERFORMANCE ANALYSIS The performance of CSA exhibits a threshol behavior, i.e., all users are successfully resolve if the channel loa is below a certain threshol value when n. The threshol epens only on the egree istribution an is obtaine via ensity evolution [10]. A finite number of slots, however, gives rise to an error floor in the PLR performance. In [1] it was shown that the error floor can be accurately preicte base on the inuce istribution observe by the receiver. The inuce istribution for a egree-k receiver can be expresse similarly to (1), where min{q,k+} λ (k) = l= ( n k )( k ) l ( n l) λ l (3) is the fraction of users of egree as observe by user A if it chooses egree k. We efine the PLR for a egree- user as observe by a egree-k receiver as p (k) = w(k) m (k) = w(k) mλ (k), (4) where m (k) an w (k) are the average number of all an unresolve egree- users for a egree-k receiver, respectively. For egree-0 users, p (k) 0 = 1 for all k. B. Analytical Results In this section, we are intereste in escribing the probabilities p 1 an p 2. First, we observe that p 1 +p 2 +p 3 = Pr{G B (A) = 0} = p. (5) From (5), we can immeiately write that p 1 +p 2 p. (6) In the following, we tighten the boun in (6). The probability p 3 can be written as p 3 = Pr{G A (B) = 0}Pr{G B (A) = 0 G A (B) = 0}. (7) The fact that the inuce graphs for all users arise from the same original graphg gives rise to epenency between users performance. This is expresse as the conitional probability in the right-han sie of (7). Examining (7), we conjecture that p 3 p 2. (8) For the asymptotic case, when n, it is easy to show that p 3 = p 2 since the probability for users A an B to use the same slots for transmission is zero. For finite frame lengths, the rationale behin this conjecture is as follows. Let us take a closer look at the conitional probability in (7). We conjecture that Pr{G B (A) = 0 G A (B) = 0} Pr{G B (A) = 0}. (9) Using the law of total probability, we can write Pr{G B (A) = 0 G A (B) = 0}Pr{G A (B) = 0} +Pr{G B (A) = 0 G A (B) = 1}Pr{G A (B) = 1} =Pr{G B (A) = 0}. Exploiting Pr{G B (A) = 0} = Pr{G A (B) = 0} = p gives Pr{G B (A) = 0 G A (B) = 1} = p 1 p (1 Pr{G B(A) = 0 G A (B) = 0}). (10) Therefore, showing (9) is equivalent to showing Pr{G B (A) = 0 G A (B) = 1} Pr{G B (A) = 0}. (11) Assuming an unequal error protection (UEP) property [6], i.e., p (k) l+1 < p(k) l for a given k, it can be shown that (11) an, hence, (8) (9) hol. The erivations are omitte ue to lack of space. The UEP property oes hol when n. It is also easy to fin a counterexample for extremely short frame lengths, when it oes not hol. For instance, consier a unicast system (k = 0) with two users, two slots, an the istribution λ(x) = 0.5x+0.5x 2. For this toy example, the PLR for users of ifferent egrees can be foun by han, yieling p (0) 1 = 0.25 an p (0) 2 = 0.5. However, from our extensive simulations, we conjecture that the UEP property oes hol for sufficiently large values of n. Proving it rigorously an characterizing sufficient frame lengths is subject of ongoing work. Using the conjecture in (8) together with (5), we can write a tighter version of (6) as p 1 +p 2 p(1 p). (12) Next section presents numerical results an confirms the conjectures mae in this section. IV. NUMERICAL RESULTS In Fig. 3, we show simulation results for two ifferent istributions an frame length n = 200. The istribution λ(x) = 0.25x x x 8 is taken from [10], where it was optimize for classical CSA base on the threshol obtaine via ensity evolution. The fraction of egree-2 users was limite to 0.25 to yiel low error floor. The secon istribution, λ(x) = 0.86x x 8, was optimize in [1] base on error floor approximations to provie low error floor for B-CSA. The re an the green curves show the probabilities p 1 an p 2, respectively, an characterize the hanshake performance.
5 Probability p 1 p 2 p p(1 p) p 1 +p 2 can further simplify (13) an write p 1 +p 2 p. (15) In other wors, the probability Pr{G B (A) = 0} = p consists of p 1 an p 2, so that user A manages to etect communication failure events G B (A) = 0 in p 1 / p 30% of the cases for both istributions. We remark, however, that this ratio may change epening on the istribution. This fact suggests a new esign criterion for optimizing the egree istribution, i.e., the minimization of the probability of false hanshakep 2. We also remark that the sum of p 1 + p 2, shown with ashe purple curves, is strictly smaller than p(1 p) (black ashe curves), which is in agreement with the boun in (12). Probability g [user/slot] (a) λ(x) = 0.25x x x 8. p 1 p 2 p p(1 p) p 1 +p g [user/slot] (b) λ(x) = 0.86x x 8. Fig. 3: Hanshake performance of user A in B-CSA for two ifferent istributions an the frame length of n = 200 slots. The blue curves show the PLR. From Fig. 3 we observe that for low to moerate channel loa p 1 +p 2 p(1 p). (13) Using (5), we conclue that p 3 p 2, which, using (7), leas to Pr{G B (A) = 0 G A (B) = 0} p. (14) Therefore, for low to moerate channel loa, the probability for users to overlap in some slots is very small, which explains that the correlation between users performance is negligible. Bearing in min that p 1 in the error floor region, we V. CONCLUSIONS AND FUTURE WORK In this paper, we propose a probabilistic hanshake algorithm for vehicular communications base on B-CSA. In the rare cases of communication failure between two users, this event can be etecte by one of the users. The simulation results show that aroun 30% of such events can be etecte for the consiere istributions. We also propose analytical bouns on the performance of the hanshake algorithm, which match well the simulation results. The analytical bouns rely on the UEP property of CSA, for which a rigorous proof for finite frame lengths is left for future work. REFERENCES [1] M. Ivanov, F. Brännström, A. Graell i Amat, an P. Popovski, All-to-all broacast for vehicular networks base on coe slotte ALOHA, in Proc. IEEE Int. Conf. Commun. Workshop, Lonon, UK, June [2] E. Paolini, G. Liva, an M. Chiani, High throughput ranom access via coes on graphs: Coe slotte ALOHA, in Proc. IEEE Int. Conf. Commun., Kyoto, Japan, June [3] C. Stefanovic an P. Popovski, ALOHA ranom access that operates as a rateless coe, IEEE Trans. Commun., vol. 61, no. 11, pp , Nov [4] E. Paolini, C. Stefanovic, G. Liva, an P. Popovski, Coe ranom access: Applying coes on graphs to esign ranom access protocols, IEEE Commun. Mag., 2015 (to appear), available at [5] L. G. Roberts, ALOHA packet system with an without slot an capture, SIGCOMM Comput. Commun. Rev., vol. 5, no. 2, pp , Apr [6] M. Ivanov, F. Brännström, A. Graell i Amat, an P. Popovski, Error floor analysis of coe slotte ALOHA over packet erasure channels, IEEE Commun. Lett., vol. 19, no. 3, pp , Mar [7] C. A. Sunshine an Y. K. Dalal, Connection management in transport protocols, Computer Networks, vol. 2, no. 6, pp , Dec [8] ETSI EN : Draft V.0.0.5, Intelligent transport systems (ITS); vehicular communications; basic set of applications; part 2: Specification of cooperative awareness basic service, Tech. Rep., June [9] C. Di, D. Proietti, I. E. Telatar, T. J. Richarson, an R. L. Urbanke, Finite-length analysis of low-ensity parity-check coes on the binary erasure channel, IEEE Trans. Inf. Theory, vol. 48, no. 6, pp , June [10] G. Liva, Graph-base analysis an optimization of contention resolution iversity slotte ALOHA, IEEE Trans. Commun., vol. 59, no. 2, pp , Feb
Resource Allocation for Cooperative Transmission in Wireless Networks with Orthogonal Users
Resource Allocation for Cooperative Transmission in Wireless Networks with Orthogonal Users D. Richar Brown III Electrical an Computer Engineering Department Worcester Polytechnic Institute Worcester,
More informationCapacity Gain from Transmitter and Receiver Cooperation
Capacity Gain from Transmitter an Receiver Cooperation Chris T. K. Ng an Anrea J. Golsmith Dept. of Electrical Engineering Stanfor University, Stanfor, CA 90 Email: ngctk, anrea}@wsl.stanfor.eu arxiv:cs/00800v1
More informationSECONDARY TRANSMISSION POWER OF COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS
SECONDARY TRANSMISSION POWER OF COGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS Xiaohua Li 1 1 Department of ECE State University of New York at Binghamton Binghamton, NY 139, USA {xli,jhwu1}@binghamton.eu
More informationCache-Aided Content Delivery in Fog-RAN Systems with Topological Information and no CSI
Cache-Aie Content Delivery in Fog-RAN Systems with Topological Information an no CSI Wei-Ting Chang, Ravi Tanon, Osvalo Simeone Abstract In this work, we consier a Fog Raio Access Network (F-RAN) system
More informationJoint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich,
Slotted ALOHA in Small Cell Networks: How to Design Codes on Random Geometric Graphs? Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with Dragana Bajović and
More informationRandom access on graphs: Capture-or tree evaluation
Random access on graphs: Capture-or tree evaluation Čedomir Stefanović, cs@es.aau.dk joint work with Petar Popovski, AAU 1 Preliminaries N users Each user wants to send a packet over shared medium Eual
More informationA General Algorithm for Interference Alignment and Cancellation in Wireless Networks
A General Algorithm for Interference Alignment an Cancellation in Wireless Networks Li Erran Li, Richar Alimi, Dawei Shen, Harish Viswanathan an Y. Richar Yang Bell Labs MIT Yale University Abstract Physical
More informationA NEW PUZZLE FOR ITERATED COMPLETE GRAPHS OF ANY DIMENSION
A NEW PUZZLE FOR ITERATED COMPLETE GRAPHS OF ANY DIMENSION ELIZABETH SKUBAK AND NICHOLAS STEVENSON ADVISOR: PAUL CULL OREGON STATE UNIVERSITY ABSTRACT. The Towers of Hanoi puzzle can be use to label a
More informationSUBSET: A Joint Design of Channel Selection and Channel Hopping for Fast Blind Rendezvous in Cognitive Radio Ad Hoc Networks
SUBSET: A Joint esign of Channel Selection an Channel Hopping for Fast Blin enezvous in Cognitive aio A Hoc Networks Xingya Liu an Jiang Xie epartment of Electrical an Computer Engineering The University
More informationIN GENERAL, an optical network can consist of a
1 Geometric Capacity Provisioning for Wavelength-Switche WDM Networks Li-Wei Chen, Eytan Moiano Abstract In this paper, we use an asymptotic analysis similar to the sphere-packing argument in the proof
More informationJoint Cooperative Relaying and Jamming for Maximum Secrecy Capacity in Wireless Networks
Joint Cooperative Relaying an Jamming for Maximum Secrecy Capacity in Wireless Networks Li Wang, Chunyan Cao, Mei Song an Yu Cheng Beijing Key Laboratory of Work Safety Intelligent Monitoring School of
More informationCross-layer Routing Optimization for Wireless Networks with Cooperative Diversity
Cross-layer Routing Optimiation for Wireless Networs with Cooperative Diversity Zhiguo Ding an Kin K. Leung Department of Electrical an Electronic Engineering Imperial College Lonon, UK. Email: {higuo.ing,
More informationConstruction of Power Efficient Routing Tree for Ad Hoc Wireless Networks using Directional Antenna
Construction of Power Efficient Routing Tree for A Hoc Wireless Networks using Directional Antenna Qing Dai an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,
More informationAn Analysis of Reliable MAC Layer Multicast in Wireless Networks
An Analysis of Reliable MAC Layer Multicast in Wireless etworks Yoooc Song, Junho Chung, Wookyung Sung, Bosung Kim, Dowon Hyun an Juwook Jang Department of lectronic ngineering, Sogang University. mail:
More informationEnergy Efficient Relay Selection for Cooperative Relaying in Wireless Multimedia Networks
Energy Efficient Relay Selection for Cooperative Relaying in Wireless Multimeia Networks Zhengguo Sheng, Jun Fan, Chi Harol Liu, Victor C. M. Leung, Xue Liu*, an Kin K. Leung Orange Labs, France Telecom,
More informationUsing Chaos to Detect IIR and FIR Filters
PIERS ONLINE, VOL. 6, NO., 00 90 Using Chaos to Detect IIR an FIR Filters T. L. Carroll US Naval Research Lab, Coe 66, Washington, DC 07, USA Abstract In many signal processing applications, IIR an FIR
More informationTHe notion of the disease [1] has been extended from
IEEE/ACM TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, VOL., NO., 6 Effective Network Quarantine with Minimal Restrictions on Communication Activities uanyang Zheng an Jie Wu, Fellow, IEEE Abstract
More informationBalanced-energy Sleep Scheduling Scheme for High Density Cluster-based Sensor Networks
Balance-energy Sleep Scheuling Scheme for High Density Cluster-base Sensor Networks Jing Deng, unghsiang S. Han, Weni B. Heinzelman, an Pramo K. Varshney Abstract In orer to conserve battery power in very
More informationRelay Deployment and Power Control for Lifetime Elongation in Sensor Networks
Relay Deployment an Power Control for Lifetime Elongation in Sensor Networks Yufeng Xin, Tuna Güven, Mark Shayman Institute of Avance Computer Stuies University of Marylan, College Park, MD 074 e-mail:
More informationEnergy Efficient Clustering Algorithm in Wireless Sensor Networks using Fuzzy Logic Control
11 I Colloquium on Humanities, Science an ngineering Research (CHUSR 11), Dec 5-6 11, Penang nergy fficient Clustering Algorithm in Wireless Sensor Networks using Fuzzy Logic Control Z.W. Siew, A. Kiring,
More informationMinimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues
Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan mario.cagal@epfl.ch Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan
More informationRadio Range Adjustment for Energy Efficient Wireless Sensor Networks. Electronic Engineering, Aston University, Birmingham B4 7ET,United Kingdom b
Raio Range Ajustment for Energy Efficient Wireless Sensor Networks Q. Gao a,, K. J. Blow a 1, D. J. Holing a, I. W. Marshall b, X. H. Peng a a Electronic Engineering, Aston University, Birmingham B4 7ET,Unite
More informationJahangir H. Sarker 11/15/0. The GSM Traffic Channel Capacity With(out) High Speed Circuit Switched Data. Scope and contents.
Jahangir H. arer // The G Traffic Channel Capacity With(out) High pee Circuit witche Data The results are represente for High pee Circuit-witche Data (HCD) traffic channels co-eisting with the voice traffic
More informationAN APPLICATION OF A GENERALISED JAKES MODEL FOR MIMO CHANNELS
AN APPLICATION OF A GENERALISED JAKES MODEL FOR MIMO CHANNELS Davi B. Smith (1) (1) Faculty of Engineering (Telecommunications), University of Technology Syney PO Box 13 Broaway NS 007 Australia E-mail:
More informationWireless Event-driven Networked Predictive Control Over Internet
UKACC International Conference on Control 22 Cariff, UK, 3-5 September 22 Wireless Event-riven Networke Preictive Control Over Internet Wenshan Hu, Hong Zhou, an Qijun Deng Abstract In networke control
More informationPerformance of Amplify-and-Forward Relaying with Wireless Power Transfer over Dissimilar Channels
http://x.oi.org/.5755/ j.eee..5.333 ELEKTRONIKA IR ELEKTROTECHNIKA ISSN 39-5 VOL. NO. 5 5 Performance of Amplify-an-Forwar Relaying with Wireless Power Transfer over Dissimilar Channels Dac-Binh Ha Duc-Dung
More informationEfficient Binary Corona Training Protocols for Heterogeneous Sensor and Actor Networks
1 Efficient Binary Corona Training Protocols for Heterogeneous Sensor an Actor Networks F. Barsi, A.A. Bertossi, C. Lavault, A. Navarra, S. Olariu, M.C. Pinotti, an V. Ravelomanana Abstract Sensor networks
More informationQoS Topology Control in Ad Hoc Wireless Networks
QoS Topology Control in A Hoc Wireless Networks Xiaohua Jia, Deying Li Dept of Computer Science City University of Hong Kong Hong Kong, China Dingzhu Du Dept of Computer Science an Engineering University
More informationOn the Throughput Allocation for Proportional Fairness in Multirate IEEE DCF under General Load Conditions
1 On the Throughput Allocation for Proportional Fairness in Multirate IEEE 82.11 DF uner General Loa onitions F. Daneshgaran, M. Laomaa, F. Mesiti, an M. Monin arxiv:83.198v1 [cs.ni] 13 Mar 28 Abstract
More informationTO improve the battery lifetimes of wireless devices
200 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 3, NO. 6, JUNE 204 Energy-Optimum Throughput an Carrier Sensing Rate in CSMA-Base Wireless Networks Mehmet Koseoglu an Ezhan Karasan, Member, IEEE Abstract
More informationPerformance Analysis and Comparison of ZF and MRT Based Downlink Massive MIMO Systems
Performance Analysis an Comparison of ZF an MRT Base Downlink Massive MIMO Systems Tebe Parfait, Yujun uang, 1,2 ponyo Jerry 1 Mobilelink Lab Univ of Electronic Sci an Tech of China, UESTC Chengu, China
More informationPage 1. Overview : Wireless Networks Lecture 7: Cellular Networks. The advent of cellular networks. The cellular network design.
Overview 18-759: Wireless Networks Lecture 7: Cellular Networks Dina Papagiannaki & Peter Steenkiste Departments of Computer Science an Electrical an Computer Engineering Spring Semester 2009 http://www.cs.cmu.eu/~prs/wireless09/
More informationMODELLING OF GPS SIGNAL LARGE SCALE PROPAGATION CHARACTERISTICS IN URBAN AREAS FOR PRECISE NAVIGATION
Int. J. Elec&Electr.Eng&Telcomm. 2012 G Sateesh Kumar et al., 2012 Research Paper ISSN 2319 2518 www.ijeetc.com Vol. 1, No. 1, October 2012 2012 IJEETC. All Rights Reserve MODELLING OF GPS SIGNAL LARGE
More informationDynamic Hybrid Duplex for Rate Maximization in OFDMA. Sangmin Oh and Chae Y. Lee
Dynamic Hybri Duplex for Rate Maximization in OFDMA Sangmin Oh an Chae Y. Lee Dept. of Inustrial Engineering, KAIST, 373-1 Kusung Dong, Taeon, Korea Tel: +82-42-350-5916, FAX: +82-42-350-3110 Email: {sangmin.oh,
More informationROC Analysis of BLM Detector in AF Relays Based Cooperative Wireless Networks Omar GATERA 1, Ahmet Hamdi KAYRAN 1 and Haci ILHAN 2
6 International Conference on Sustainable Energy, Environment an Information Engineering (SEEIE 6) ISBN: 978--6595-337-3 ROC Analys of BLM Detector in AF Relays Base Cooperative Wireless Networks Omar
More informationTopology-assisted techniques to relay selection for homogeneously distributed wireless sensor networks
This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE Globecom 2010 proceeings. Topology-assiste techniques to relay selection
More informationErlang Capacity of Multi-class TDMA Systems with Adaptive Modulation and Coding
Downloae from orbittuk on: Oct 2, 218 Erlang Capacity of Multi-class TDMA Systems with Aaptive Moulation an Coing Wang, Hua; Iversen, Villy Bæk Publishe in: Proceeings of IEEE ICC 28 Link to article, DOI:
More informationEffect of Carrier Frequency Offset on the BER Performance of Variable Spreading Factor OFCDM Systems
This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the ICC 008 proceeings. Effect of Carrier Frequency Offset on the erformance
More informationA Circuit Level Fault Model for Resistive Shorts of MOS Gate Oxide
Circuit Level Fault Moel for esistive Shorts of MOS Gate Oxie Xiang Lu, Zhuo Li, Wangqi Qiu, D. M. H. Walker an Weiping Shi Dept. of Electrical Engineering Texas &M University College Station, TX 77843-34,
More informationEnergy Efficient Virtual MIMO-based Cooperative Communications for Wireless Sensor Networks
Energy Efficient Virtual MIMO-base Cooperative Communications for Wireless Sensor Networks Suharman K. Jayaweera Department of Electrical an Computer Engineering Wichita State University, Wichita, KS,
More informationIndoor Positioning Using Ultrasound and Radio Combination
Inoor Positioning Using Ultrasoun an Raio Combination Gintautas Salcius, Evalas Povilaitis, Algimantas Tacilauskas Centre of Real Time Computer Systems, Kaunas University of Technology Stuentu St. 50,
More informationOn Time-of-Arrival Estimation in NB-IoT Systems
On Time-of-Arrival Estimation in NB-IoT Systems Sha Hu, Xuhong Li, an Frerik Rusek Department of Electrical an Information Technology, Lun University, Lun, Sween {firstname.lastname}@eit.lth.se arxiv:7.383v
More informationPrincipal Component Analysis-Based Compensation for Measurement Errors Due to Mechanical Misalignments in PCB Testing
Principal Component Analysis-Base Compensation for Measurement Errors Due to Mechanical Misalignments in PCB Testing Xin He 1, Yashwant Malaiya 2, Anura P. Jayasumana 1 Kenneth P. Parker 3 an Stephen Hir
More informationA Turnover based Adaptive HELLO Protocol for Mobile Ad Hoc and Sensor Networks
A Turnover base Aaptive HELLO Protocol for Mobile A Hoc an Sensor Networks François Ingelrest, Nathalie Mitton, Davi Simplot-Ryl To cite this version: François Ingelrest, Nathalie Mitton, Davi Simplot-Ryl.
More informationIndoor Wireless Planning using Smart Antennas
Inoor Wireless Planning using Smart Antennas Ali Abbasi an Maji Ghaeri Department of Computer Science, University of Calgary Emails: {abbasi, mghaeri}@ucalgary.ca Abstract This paper consiers the problem
More informationWave-Induced Fluctuations in Underwater Light Field: Analysis of Data from RaDyO Experiments
DISTRIBUTION STATEMENT A. Approve for public release; istribution is unlimite. Wave-Inuce Fluctuations in Unerwater Light Fiel: Analysis of Data from RaDyO Experiments Dariusz Stramski Marine Physical
More informationAssessment of Combined Integrity Algorithms
Assessment of Combine Integrity Algorithms C. Stöber an F. Kneißl Institute of Geoesy an Navigation, University FAF Munich ICG WG-B, Munich, 8.3.1 1/6 OUTLINE Overview User Equations Comparison of Integrity
More informationReplanning of Optical Networks based on Defragmentation Techniques
Replanning of Optical Networks base on Defragmentation Techniques Daniela Aguiar Moniz aniela.moniz@tecnico.ulisboa.pt Instituto Superior Técnico, Lisboa, Portugal November 2015 Abstract The traffic growth
More informationShadowing Correlation Model for Indoor Multi-hop Radio Link in Office Environment
JAVA, International Journal of Electrical Electronics Engineering Volume 4, Number, April 26 Shaowing Moel for Inoor Multi-hop Raio Link in Office Environment Mohamma Fahli Inustrial Engineering Department
More informationResearch on the Selection Strategy for Optimal Anchor Nodes Based on Ant Colony Optimization
Sensors & Transucers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Research on the Selection Strategy for Optimal Anchor Noes Base on Ant Colony Optimization Baoxin ZHAO, Bi ZENG Guangong
More informationPilot Based Time Delay Estimation for KSP-OFDM Systems in a Multipath Fading Environment
Pilot Base Time Delay Estimation for KSP-OFDM Systems in a Multipath Faing Environment Dieter Van Welen, Freerik Simoens, Heii Steenam an Marc Moeneclaey TELI Department, Ghent University Sint-Pietersnieuwstraat
More informationExtension of the Nearest-Three Virtual-Space-Vector PWM to the Four-Level Diode-Clamped dc-ac Converter
Etension of the Nearest-Three irtual-space-ector PWM to the Four-Level Dioe-Clampe c-ac Converter S. Busquets-Monge, J. Boronau, an J. Rocabert Dept. of Electronic Engineering Technical University of Catalonia
More informationPower Efficient Pilot Symbol Power Allocation under Time-variant Channels
Power Efficient Pilot Symbol Power Allocation uner Time-variant Channels Michal Šimko, Paulo S. R. Diniz,QiWang an Markus Rupp Institute of Telecommunications, Vienna University of Technology, Vienna,
More informationMedium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks
Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern
More informationOn the performance of truncated type III hybrid ARQ scheme with code combining
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2003; 3:641 658 (DOI: 10.1002/wcm.147) On the performance of truncate type III hybri ARQ scheme with coe combining Qingchun Chen*,y
More informationJoint Partial Relay Selection, Power Allocation and Cooperative Maximum Likelihood Detection for MIMO Relay Systems with Limited Feedback
Joint Partial Relay Selection, Power Allocation an Cooperative Maximum Likelihoo Detection for MIMO Relay Systems with Limite Feeback Thomas Hesketh, Rorigo C. e Lamare, Stephen Wales Department of Electronics,
More informationHow (Information Theoretically) Optimal Are Distributed Decisions?
How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr
More informationWavelet Neural Network Controller for AQM in a TCP Network: Adaptive Learning Rates Approach
56 International Journal Jae Man of Control, Kim, Jin Automation, Bae Park, an an Yoon Systems, Ho Choi vol. 6, no. 4, pp. 56-533, August 8 Wavelet Neural Network Controller for AQM in a CP Network: Aaptive
More information3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007
3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,
More informationMODULE III. Foundations Of Data Communications And The Physical Layer
MODULE III Founations Of Data Communications An The Physical Layer Computer Networks an Internets -- Moule 3 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Motivation an moel Information sources
More informationRECENTLY, the 2G standard GSM was enhanced by
274 IEEE TRANSACTIONS ON WIREESS COMMUNICATIONS, VO. 5, NO. 2, FEBRUARY 2006 The Training Sequence Coe Depenence of EDGE Receivers using Zero IF Sampling Martin Krueger, Member, IEEE, Robert Denk, an Bin
More informationOverhead Energy Considerations for Efficient Routing in Wireless Sensor Networks
Overhea nergy Consierations for fficient Routing in Wireless Sensor Networks. Ilker Oyman an Cem rsoy Computer ngineering Department, Bogazici University, Istanbul, Turkey {oymani, ersoy}@boun.eu.tr Abstract
More informationSymmetric Decentralized Interference Channels with Noisy Feedback
4 IEEE International Symposium on Information Theory Symmetric Decentralized Interference Channels with Noisy Feedback Samir M. Perlaza Ravi Tandon and H. Vincent Poor Institut National de Recherche en
More informationJitter Limitations on a Gigabit Copper Multi- Carrier System
Jitter Limitations on a Gigabit Copper Multi- Carrier System Jan H. Rutger Schraer, Eric A.M. Klumperink, Jan L. Visschers, Bram Nauta University of Twente, IC-Design Group, P.O. Box 7, 75 AE, Enschee,
More informationWavelet Transform Based Relay Algorithm for the Detection of Stochastic High Impedance Faults
International Conference on Power Systems Transients IPST 3 in New Orleans, USA Wavelet Transm Base Relay Algorithm the Detection of Stochastic High Impeance Faults T. M. ai,.a. Snier an E. o () Dept.
More informationValidation of a Non-Line-of-Sight Path-Loss Model for V2V Communications at Street Intersections
Valiation of a Non-Line-of-Sight Path-Loss Moel for V2V Communications at Street Intersections Taimoor Abbas, Anreas Thiel, Thomas Zemen, Christoph F. Mecklenbräuker, an Frerik Tufvesson Department of
More informationSecure Communication with a Wireless-Powered Friendly Jammer
Secure Communication with a Wireless-Powere Frienly Jammer Wanchun Liu, Xiangyun Zhou, Salman Durrani, an Petar Popovski arxiv:42.0349v2 [cs.it] 26 Aug 205 Abstract In this paper, we propose to use a wireless-powere
More informationDriving passive-matrix LCDs with low hardware complexity and reduced supply voltage
Driving passive-matrix LCDs with low harware complexity an reuce supply voltage K. G. Panikumar T. N. Ruckmongathan Abstract In passive-matrix liqui-crystal isplays (LCDs), multiplexing is achieve by using
More informationMeasurement of Semi-Anechoic Chamber Using Modified VSWR method above 1GHz
Measurement of Semi-Anechoic Chamber Using Moifie VSWR metho above 1GHz M. Bittera, K. Kováč, J. Hallon Department of Measurement, Faculty of Electrical Engineering an Information Technology, Slovak University
More informationThe effect of two realistic Radio Propagation Models for Mobile Ad hoc NETworks in Urban Area Environment Supported with stations
International Journal of Scientific & Engineering Research Volume 2, Issue 1, Oct-211 1 The effect of two realistic Raio Propagation Moels for Mobile A hoc NETworks in Urban Area Environment Supporte with
More informationUneven Clustering Routing Algorithm Based on Optimal Clustering for Wireless Sensor Networks
Journal of Communications Vol. 11, No., February 016 Uneven Clustering Routing Algorithm Base on Optimal Clustering for Wireless Sensor Networks Jianpo Li an Junyuan Huo School of Information Engineering,
More informationImplementation of Beam Formation for WMNs
Implementation of Beam Formation for WMNs M. UTHANSAKUL, S. PRADITTARA AND P. UTHANSAKUL School of Telecommunication Engineering Suranaree University of Technology 111 University Avenue, Muang, Nakhonratchasima
More informationAdaptive Interleaving for Bit-Interleaved Coded Modulation
Aaptive Interleaving for Bit-Interleave Coe Moulation Clemens Stierstorfer an Robert F.H. Fischer Lehrstuhl für Informationsübertragung, Frierich Alexaner Universität Erlangen Nürnberg Cauerstraße 7/LIT,
More informationDownward Trimming of Polymer Thick Film Resistors through High Voltage Pulses
Downwar Trimming of Polymer Thick Film Resistors through High Voltage Pulses Y.Srinivasa Rao E.C.E. Department Shri Vishnu Engineering College For Women Vishnupur, Bhimavaram-540 W.G.Dt.,Ap, Inia Phone
More informationAN-1140 APPLICATION NOTE
APPLICATION NOTE One Technology Way P.O. Box 9106 Norwoo, MA 02062-9106, U.S.A. Tel: 781.329.4700 Fax: 781.461.3113 www.analog.com Microphone Array Beamforming by Jera Lewis INTRODUCTION All MEMS microphones
More informationEfficient Location Training Protocols for Localization in Heterogeneous Sensor and Actor Networks
Efficient Location Training Protocols for Localization in Heterogeneous Sensor an Actor Networks F. Barsi, A.A. Bertossi, Christian Lavault, A. Navarra, Stephan Olariu, Cristina Pinotti, Vlay Ravelomanana
More informationAn Intelligent 3D User Interface Adapting to User Control Behaviors
An Intelligent 3D User Interface Aapting to User Control Behaviors Tsai-Yen Li Computer Science Department National Chengchi University Taipei, Taiwan 11623, R.O.C. +886 2 2938 7170 li@nccu.eu.tw Shu-Wei
More informationBit-Wise Decoders for Coded Modulation and Broadcast Coded Slotted ALOHA. Mikhail Ivanov
Thesis for the Degree of Doctor of Philosophy Bit-Wise Decoders for Coded Modulation and Broadcast Coded Slotted ALOHA Mikhail Ivanov Communication Systems Group Department of Signals and Systems Chalmers
More informationTrigonometric Functions
Trigonometric Functions By Daria Eiteneer Topics Covere: Reminer: relationship between egrees an raians The unit circle Definitions of trigonometric functions for a right triangle Definitions of trigonometric
More informationModelling TCP Reno with Spurious Timeouts in Wireless Mobile Environment
1 Moelling TCP Reno with Spurious Timeouts in Wireless Mobile Environment Shaojian Fu an Mohamme Atiquzzaman Telecommunications an Networks Research Lab School of Computer Science University of Oklahoma,
More informationINTERFERENCE REJECTION PERFORMANCE AS A MEANS OF FREQUENCY OPTIMISATION IN A MIXED CELLULAR/MANET NETWORK
ITERFERECE REJECTIO PERFORMACE A A MEA OF FREQUECY OPTIMIATIO I A MIXED CELLULAR/MAET ETORK Kayonne ebley Faculty Avisor: Dr. Richar Dean Department of Electrical an Computer Engineering Morgan tate University
More informationEXPERIMENTAL DEMONSTRATION OF MULTIPLE ROBOT COOPERATIVE TARGET INTERCEPT
EXPERIMENTAL DEMONSTRATION OF MULTIPLE ROBOT COOPERATIVE TARGET INTERCEPT Timothy W. McLain Ranal W. Bear Je M. Kelsey Department of Mechanical Engineering, Brigham Young University, Provo, Utah 86 Department
More informationInvestigating Converter Options for Automotive Grade Permanent Magnet Sychronous Generators
Investigating Converter Options for Automotive Grae Permanent Magnet Sychronous Generators Erkan MESE *, Yusuf YAŞA *, Hakan AKÇA *, Mustafa G. AYDENIZ *, Murat AYAZ **, Murat TEZCAN * ( * )Yiliz Technical
More informationHOW SYMMETRICAL COMPONENTS MAY HELP TO SUPPRESS VOLTAGE SENSORS IN DIRECTIONAL RELAYS FOR DISTRIBUTION NETWORKS
C E D 17 th nternational Conference on Electricity Distribution Barcelona, 12-15 May 2003 HOW SYMMETCAL COMPONENTS MAY HELP TO SUPPESS VOLTAGE SENSOS N DECTONAL ELAYS FO DSTBUTON NETWOKS Xavier LE PVET
More informationBenford's Law and Possibilities for Its Use in Governmental Statistics 1
Benfor's Law an Possibilities for Its Use in Governmental Statistics 1 Richar Hinls 2 University of Economics, Prague, Czech Republic Stanislava Hronová 3 University of Economics, Prague, Czech Republic
More informationExamination, TEN1, in courses SK2500/SK2501, Physics of Biomedical Microscopy,
KTH Applie Physics Examination, TEN1, in courses SK2500/SK2501, Physics of Biomeical Microscopy, 2017-01-10, 8-13, FA32 Allowe ais: Compenium Imaging Physics (hane out) Compenium Light Microscopy (hane
More informationDESIGN OF A MODIFIED FUZZY FILTERING FOR NOISE REDUCTION IN IMAGES
Journal of Theoretical an Applie Information Technology 10 th January 014. Vol. 59 No.1 005-014 JATIT & LLS. All rights reserve. DESIGN OF A MODIFIED FUZZY FILTERING FOR NOISE REDUCTION IN IMAGES 1 EHSAN
More informationRelay Selection in Cooperative Networks with Frequency Selective Fading
Worcester Polytechnic Institute igital WPI Electrical & Computer Engineering Faculty Publications epartment of Electrical an Computer Engineering 2011 Relay Selection in Cooperative Networks with Frequency
More informationM2M massive wireless access: challenges, research issues, and ways forward
M2M massive wireless access: challenges, research issues, and ways forward Petar Popovski Aalborg University Andrea Zanella, Michele Zorzi André D. F. Santos Uni Padova Alcatel Lucent Nuno Pratas, Cedomir
More informationA Study of Near-Field Direct Antenna Modulation Systems Using Convex Optimization
American Control Conference Marriott Waterfront, Baltimore, MD, USA June 3-July, WeB8.5 A Stuy of Near-Fiel Direct Antenna Moulation Systems Using Convex Optimization Java Lavaei, Ayin Babakhani, Ali Hajimiri
More informationA New Speech Enhancement Technique to Reduce Residual Noise Using Perceptual Constrained Spectral Weighted Factors
IOSR Journal of Electronics an Communication Engineering (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735. Volume 6, Issue 3 (May. - Jun. 013), PP 8-33 A New Speech Enhancement Technique to Reuce Resiual Noise
More informationIndoor Massive MIMO: Uplink Pilot Mitigation Using Channel State Information Map
Inoor Massive MIMO: Uplink Pilot Mitigation Using Channel State Information Map Ahma Abbou 1, Ali H. Jaber Department of Statistics ebanese University Nabatieh, ebanon 1 Ahma.Abbou@etu.unilim.fr, ali.jaber@ul.eu.lb
More informationIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 1
IEEE JORNAL ON SELECTED AREAS IN COMMNICATIONS 1 Full-Duplex Spectrum-Sensing an MAC-Protocol for Multichannel Nontime-Slotte Cognitive Raio Networks Wenchi Cheng, Xi Zhang, Senior Member, IEEE, an Hailin
More informationASYMMETRIC MODULATION FOR COGNITIVE RADIO AND INTELLIGENT ENVIRONMENTS
ASYMMTRIC MODULATION FOR COGNITIV RADIO AND INTLLIGNT NVIRONMNTS ric. Kreb (SAIC, Chantilly, VA, USA; ekreb@ieee.org); Robert H. Morelos-Zaragoza (San Jose State University, San Jose, CA, USA, r.morelos-zaragoza@ieee.org)
More informationAcoustical Localization in Schools of Submersibles
Oceans 6, Singapore (authors manuscript o not istribute) Acoustical Localization in Schools of Submersibles Navina Kottege & Uwe R. Zimmer Research School of Information Sciences an Engineering Autonomous
More informationDesign and Analysis of an MST-Based Topology Control Algorithm
Design an Analysis of an MST-Base Topology Control Algorithm Ning Li, Jennifer C. Hou, an Lui Sha Department of Computer Science University of Illinois at Urbana-Champaign Urbana, IL 61801 {nli, jhou,
More informationContents Maryland High School Programming Contest 1. 1 Stacked Floating Mountains 2. 2 Chess Puzzle 3. 3 Life Connections 4
2010 Marylan High School Programming Contest 1 Contents 1 Stacke Floating Mountains 2 2 Chess Puzzle 3 3 Life Connections 4 4 Circle of Friens 5 5 Floating Mountain Stability 6 6 Aim It Right! 7 7 Navi
More informationJoint Relaying and Network Coding in Wireless Networks
Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block
More informationKEY FEATURES TEST CAPABILITIES 8000S HIGH POWER EARTH TESTING SYSTEM STANDARDS COMPLIANCE
KEY FEATURES 8000S HIGH POWER EARTH TESTING SYSTEM High power earth systems (Substations, Transmission towers, etc) have to be perioically monitore to check if they comply with safety levels establishe
More informationTransit Network Design under Stochastic Demand
Transit Network Design uner Stochastic Deman Hong K. LO Civil an Environmental Engineering Hong Kong University of Science an Technology 1 Public transport Backgroun Fixe route transit (FRT) : fixe route
More information