Fast Node Cardinality Estimation and Cognitive MAC Protocol Design for Heterogeneous M2M Networks

Size: px
Start display at page:

Download "Fast Node Cardinality Estimation and Cognitive MAC Protocol Design for Heterogeneous M2M Networks"

Transcription

1 Fast Node Cardinality Estiation and Cognitive MAC Protocol Design for Heterogeneous MM Networks Sachin Kada, Chaitanya S. Raut and Gaurav S. Kasbekar Abstract Machine-to-Machine MM networks are an eerging technology with applications in nuerous areas including sart grids, sart cities, vehicular teleatics, healthcare, security and public safety. In this paper, we design a ediu access control MAC protocol that supports ulti-channel operation for a heterogeneous MM network, with three types of MM devices e.g., those that send eergency, periodic and noral type data, operating as a secondary network using Cognitive Radio technology. Also, we design an estiation protocol for rapidly obtaining separate estiates of the nuber of active nodes of each traffic type, and use these estiates to find the optial contention probabilities to be used in the Cognitive MAC protocol. We copute a closed for expression for the expected nuber of tie slots required by our estiation protocol to execute as well as a siple upper bound on it, which shows that the expected nuber of tie slots required by our protocol to obtain the above estiates is sall. Also, we atheatically analyze the perforance of the Cognitive MAC protocol and obtain expressions for the expected nuber of successful contentions and the expected aount of energy consued per frae. Finally we evaluate the perforance, in ters of average throughput and average delay, of our MAC protocol using siulations. I. Introduction Machine-to-Machine MM counications is an eerging technology, in which data generation, processing and transission is done with inial huan intervention [1]. MM networks have applications in nuerous areas including sart grids, sart cities, vehicular teleatics, healthcare, industrial autoation, security and public safety [1] [3]. It is challenging to design ediu access control MAC protocols for MM networks due to their unique characteristics such as liited access to energy sources ost MM devices are battery operated, need to provide network access to a very large nuber of devices, the fact that the Quality of Service QoS requireents of MM devices differ fro those of Huanto-Huan HH counications and are also different for different MM devices 1 etc [1], [3], [4]. Several wireless technologies such as Bluetooth, Wi-Fi, ZigBee and cellular networks including LTE-Advanced and 8.16 are potential candidates for enabling MM counications; however, these technologies have soe shortco- The authors are with the Departent of Electrical Engineering, Indian Institute of Technology IIT Bobay, Mubai 476, India. Their eail addresses are {sachink, csraut, gskasbekar}@ee.iitb.ac.in. 1For exaple, soe MM nodes need to transit data e.g., sart eter readings periodically, soe need it for sending eergency or alar essages e.g., in healthcare and security applications, soe need it for transission of noral data traffic and soe need it for reliable transission of data packets e.g., in reote payent gateway systes [1], [3], [4]. ings [5]. Cognitive Radio technology is a proising alternative to the above wireless technologies for enabling MM counications []. Cognitive Radio Networks CRNs have eerged as a proising solution to alleviate the artificial spectru scarcity wherein ost of the usable radio spectru is allocated, but underutilized caused by the traditional spectru regulation policy of assigning exclusive licenses to users to operate their networks in different geographical regions [6]. In CRNs, there are two types of spectru users priary users PUs, which have prioritized access to channels, and secondary users SUs that detect and use spectru holes, i.e., chunks of spectru that are currently not in use by the PUs [6]. Operating an MM network as a secondary network using Cognitive Radio technology has the advantage that a large aount of spectru, which is allocated to other users, but underutilized, becoes available for MM counications [5]. However, this requires the design of efficient Cognitive MAC protocols in order to provide channel access to an extreely large nuber of MM devices, while satisfying the unique service requireents of MM applications described in the first paragraph of this section, as well as ensuring avoidance of interference to PUs. The design of a Cognitive MAC protocol that supports ulti-channel operation involves addressing additional challenges [7] including achieving coordination aong nodes 3, overcoing the ulti-channel hidden terinal proble [8], and balancing the traffic load of the secondary MM nodes over the free channels in real-tie [9]. In this paper, we design a Cognitive MAC protocol for MM networks that overcoes the above challenges. Now, consider an MM network in which a large nuber of MM devices interittently transit soe inforation e.g., sart eter readings, inforation collected by sensors to a base station BS. In any given tie frae, the BS is unaware of the nuber of active nodes, i.e., those that need to transit soe data to the BS in the current frae. There is a need to rapidly estiate the nuber of active nodes since this estiate can be used to deterine the optial values of various paraeters of the MAC protocol such as contention probabilities and the aounts of tie to be used for contention and for data transission in the current frae. For exaple, recall that for the Slotted ALOHA protocol, the optial contention probability is the reciprocal of the nuber of active nodes [1]. Also, in [11] [13], cardinality estiation Specifically, Wi-Fi has high power consuption, due to which it is not suitable for battery operated MM devices, and Bluetooth has high latency when the nuber of devices is large, as is the case in MM networks [5]. ZigBee operates on unlicensed bands and is prone to interference fro Wi-Fi networks and other equipent e.g., icrowave ovens that use those bands [], [5]. Due to the high deand for HH counication services such as voice, video, eails etc, only a liited aount of radio spectru is available with cellular operators to support MM counications []. 3Note that for two nodes to be able to exchange data, both ust have their wireless transceiver tuned to a coon channel at a tie.

2 is perfored and using the estiates obtained, the contention probabilities that axiize the throughput of their respective MAC protocols for MM networks are deterined. In a heterogeneous MM network, i.e., one in which different types of nodes are present e.g., those that send eergency, periodic and noral type data, we need to obtain separate estiates of the nuber of active nodes of each traffic type. In prior work, several protocols have been designed [11] [13] to estiate the nuber of active nodes of a hoogeneous MM network see Section II. However, to the best of our knowledge, so far no estiation protocol has been designed for obtaining separate estiates of the nuber of active nodes of each traffic type in a heterogeneous MM network. Note that executing a cardinality estiation protocol for a hoogeneous MM network ultiple ties to do this is inefficient. In this paper, we consider an MM network with three types of nodes, which we refer to as Type 1, Type and Type 3 nodes; e.g., these ay be eergency, periodic and noral data type nodes. We design an estiation protocol to rapidly obtain separate estiates of the nuber of active nodes of each traffic type see Section III. We copute a closed for expression for the expected nuber of tie slots required by our estiation protocol to execute as well as a siple upper bound on it, which shows that the expected nuber of tie slots required by our protocol to obtain the above estiates is sall. Next, we use our estiation protocol as part of a Cognitive MAC protocol that we design for heterogeneous MM networks see Section IV. In the proposed MAC protocol, tie is divided into fraes of equal duration, with each frae containing an estiation window, a contention window CW and a data transission window DTW. Whenever a node succeeds in contention on a given channel during the CW, the BS reserves the requested nuber of tie slots for data transission by that node in the DTW. Slotted ALOHA [1] is used for contention in the CW, and the contention probability used by each node is the reciprocal of the estiated nuber of contending nodes on the channel; thus, the estiates obtained using our estiation protocol are used for optiizing the contention probabilities. We atheatically analyze the perforance of the proposed MAC protocol and obtain expressions for the expected nuber of successful contentions and the expected aount of energy consued per frae see Section V. Finally, using siulations, we evaluate the perforance, in ters of average throughput and average delay, of our MAC protocol and copare it with that of a hypothetical ideal protocol, which is assued to know the exact nuber of active nodes at any tie see Section VI. II. Related Work A schee to estiate the nuber of active nodes in MM networks is proposed in [1]. In the proposed ethod every device selects a slot uniforly at rando fro a set of slots and transits a Power Save-poll essage. The access point AP estiates the nuber of nodes by using the nuber of epty slots with the axiu likelihood ML estiation ethod. In [11] an iterative ethod is proposed for estiation of nodes and is obtained using drift analysis on the access results of consecutive epty and collision slots of the past slots. In [13] estiation of nodes is carried out in two phases. i Coarse phase: In this phase every node sends a busy tone with probability 1/ i in slot i. This process continues till all nodes stop sending busy tones in soe slot j. Average length of this phase is log N where N is nuber of active nodes. ii Refine phase: In this phase each node sends a busy tone with probability used by node to send last busy tone in the coarse phase. Average length of this phase depends on accuracy requireent. In this estiation schee, it uses only one control channel for node estiation due to which all other channels reain unused during estiation phase. In the proposed estiation schee, we use all the available channels for node estiation due to which the efficiency of the schee is iproved. Tag cardinality estiation ethods are extensively discussed in literature of Radio-frequency identification RFID systes. Most of the tag cardinality estiation schees ai to achieve the following accuracy requireent. Pr{ ˆn n εn} 1 δ, 1 where n, ˆn are actual and estiated nuber of tags respectively, ε is confidence interval and δ is error probability. The schee proposed in [14] tags select a slot uniforly at rando and transit a packet in the selected slot. The nuber of epty slots and collision slots are counted by the reader server and these values are used to obtain the zero estiator ZE and collision estiator CE respectively. More accurate aong ZE and CE is chosen as the estiator of tags and it is called as unified probabilistic estiator UPE. Liitations of this schee are all tags ust be readable in any given iteration and approxiate nuber of tags need to infor the server. These liitations are addressed in [15], which uses only epty slots for the cardinality estiation process and estiator is called as enhanced zero based estiator EZB. In both the described estiation algoriths require large nuber of slots. Energy efficient cardinality estiation process is proposed in [16]. At every polling server sends a request packet with contention probability p along with frae size f. Any user can poll in one of the slots with contention probability p. Polling stops when the accuracy requireent described in 1 gets fulfilled. Three different cardinality estiation algoriths; Maxiu Likelihood Estiation Algorith MLEA, Average Su Estiation Algorith ASEA and Enhanced MLEA are proposed in [16]. In MLEA optiised contention probability p i = 1.594/ ˆn i 1 and in ASEA p i = 1/ ˆn i 1, where ˆn i is estiated nuber of tags in i th iteration, are used. Basic cardinality estiation algorith presented in [17] require Olog n slots. Optiized version of the sae algorith require Olog log n slots which also satisfy accuracy requireent of 1. In [18] RFID tag cardinality estiation schee is based on new distinct eleent counting ethod described in [19]. Every tag has a counter corresponding to a rando nuber. After every tie slot counter decreases by one and tag transits when counter becoes zero. Here server need not scan the entire estiation window. Server infors frae length f to every node. It awaits response fro every node. If k be nuber of waiting slots then k + log f are required nuber of slots to achieve the accuracy described in 1. Reader observes the position of epty and non epty 1 slots. First Non-Epty slots Based FNEB estiator is used to estiate the nuber of tags. 7 ties faster estiation schee than UPE and EZB is proposed in [] and it is called Average Run based Tag ART cardinality estiation ethod which uses slotted ALOHA

3 protocol. Reader sends a packet to all tags indicating frae size. Every tag picks a slot randoly to respond. Epty and non epty 1 responses are collected by reader, cardinality estiation is done based on the average run size of 1s in the obtained binary sequence. However, all the node cardinality estiation schees studied in the above papers are for a hoogeneous network, wherein all nodes are alike. In contrast, in this paper, we propose an estiation schee for a heterogeneous network with three different types of nodes, which efficiently coputes separate estiates of the nuber of active nodes of each type. Extensive surveys related to MAC protocol design for MM networks are provided in [3], [1]. In [], a hybrid MAC protocol that uses contention-based channel access CSMA/ CA when the network load is low and reservation-based access when the load is high is proposed. In [3], a hybrid MAC protocol, in which each tie frae consists of a contention period followed by a transission period, is proposed. The devices that successfully contend in the contention period are assigned a tie slot for data transission in the transission period. Extension of protocol proposed in [3] is extended to heterogeneous MM networks in [4], where service requireents of different devices are different along with different priorities. In [8], the MAC protocol is proposed for ultichannel ad hoc networks and this is odified in [13] to suite for MM networks. Tie is divided into fraes and they are further divided into 3 phases naely estiation phase, contention phase and data transission phase. Nuber of active users are estiated in estiation phase. In the contention phase, all active users tune to a coon control channel and contend for channel access with contention probabilities which are obtained with the help of nuber of estiated nodes. The nodes which are successful in contention transit their data packets in data transission phase siultaneously on different channels. In the protocol proposed in [5], tie is divided into slots, and in each slot, nodes contend with contention probability which is the statistical estiate of present traffic load, using a Request to Send RTS packet and it is responded with Clear to Send CTS packet, followed by transission of a data packet. In [1], the 8.11ah MAC protocol is odified for MM counications as follows: first estiation of the nuber of active MM devices is done and this estiation is used to adapt the length of the Restricted Access Window, in which only MM devices are allowed to contend. In [11], a odified version of the Slotted-ALOHA schee is presented, in which results of the previous slots are considered to estiate the transission attept probability of the current slot which results in axiising the throughput. In [6], an overload control echanis is presented for MM counication in LTE-Advanced networks, in which based on the traffic load on the rando access channel RACH base station adjusts the nuber of RACH resources. However, to the best of our knowledge, our Cognitive MAC protocol is the first to eploy separate estiates of the nubers of active nodes of different types for selecting the optial contention probabilities in a heterogeneous MM network. III. Fast Node Cardinality Estiation Schee In this section, we present our fast node cardinality estiation schee for heterogeneous MM networks. The estiation Type 1 nodes Base Station Type nodes Type 3 nodes Figure 1. The figure shows a base station and three types of nodes within its range the area inside the circle. proble is defined in Section III-A. In Section III-B, the Lottery Frae LoF based protocol [7], [8], which is a cardinality estiation schee for hoogeneous networks, and which we extend to estiate cardinalities in heterogeneous MM networks, is briefly described. Our proposed fast estiation schee is described in Section III-C. A closed for expression for the expected nuber of tie slots required by our estiation protocol to execute is coputed in Section III-D and a siple upper bound on it is established in Section III-E. A. The Estiation Proble Consider a heterogenous MM network consisting of a base station BS and three different types, say Type 1, Type and Type 3, of MM devices nodes in its range as shown in Figure 1. We denote the sets of nodes of Type 1, Type and Type 3 as N 1, N and N 3 respectively; let 4 N b = n b, b {1,,3}. Tie is divided into fraes of equal duration, and in each frae only a subset of the nodes of each type are active, i.e., have data to send to the BS. Also, each frae is divided into tie slots of equal durations. Let n b be the nuber of active nodes of Type b, b {1,,3}, in a given frae. Our objective is to design an estiation protocol to estiate the values of n 1, n and n 3 rapidly, i.e., using a sall nuber of tie slots. B. Review of the LoF Based Protocol The LoF based estiation protocol was designed in [7] and uses the probabilistic bitap counting technique proposed in [8] for tag cardinality estiation in RFID systes. The LoF based estiation protocol is designed for a hoogeneous network. Our proposed protocol extends the LoF based protocol to a heterogeneous network with three types of nodes. So we provide a brief review of the LoF based protocol in this subsection. Every tag equivalent to a node in MM networks has a unique binary identification ID nuber that is l bits in length. The hash value h of any tag is defined as the position 4 A denotes the cardinality of set A.

4 S 1 S S 1 1 S 1 S t 1 1 S t 1 BP B B1 Bt 1 1 K 1 R 1 st Phase nd Phase 3 rd Phase Figure. The figure shows the structure of the Estiation Window. BP denotes a Broadcast Packet. of the least significant zero bit in its ID. For exaple, h111 = 1 and h11111 = 4, where hi denotes the hash value corresponding to ID I. So if h is the hash value of a rando tag, then assuing that each of the l bits of the corresponding ID independently equal or 1 with probability 1/ each, Ph = i = 1/ i+1, i =,1,,...l 1 and 5 Ph = l = 1/ l. Now, tie is divided into slots of equal duration. During the estiation process, each active tag with hash value h transits a packet in the h th tie slot, for h =,1,,...,l. A corresponding bitap BM of s and 1s is generated by the RFID syste reader equivalent to the BS in MM networks based on the slot results; the h th bit of the BM is if the h th tie slot is epty i.e., one in which no node transits and 1 if the h th tie slot is non-epty i.e., one in which one or ore nodes transit. Let ρ = in{h BMh = }; then the estiated value of n the actual nuber of active tags is ˆn = ρ [7]. It is also proved in [7] that the LoF based protocol executes within log n all slots, where n all is the total nuber of all possible binary IDs. Note that if the LoF based protocol is executed thrice to separately estiate n 1, n and n 3 in the network odel for MM networks described in Section III-A, then log n 1,all n,all n 3,all slots are required, where n b,all is the total nuber of all possible binary IDs of the b th type of nodes. To reduce the nuber of slots, we propose a fast estiation schee, which is described in the following subsection. C. Proposed Estiation Schee The estiation process is carried out in three phases, which we describe in Sections III-C1, III-C and III-C3. We refer to the set of slots used during the estiation process as the Estiation Window EW. The structure of a typical EW is shown in Figure. At the end of the estiation process, separate estiates, say ˆn 1, ˆn and ˆn 3, of the nuber of active nodes of the three types, n 1,n and n 3 see Section III-A, are obtained. For each b {1,,3}, the estiate ˆn b is equal to and hence, as accurate as the estiate of n b that would have been obtained if the LoF protocol [7], [8] were used for the estiation. However, note that the total nuber of tie slots used in our estiation schee is uch saller than the nuber of tie slots that would have been required if the LoF protocol were separately executed thrice to estiate n 1,n and n 3. At a high level, our estiation schee operates as follows. Let t = log axn 1,all,n,all,n 3,all. Also, for b {1,,3} and i {,1,...,t 1}, let B p b,i be 1 respectively, if the i th slot would have been non-epty respectively, epty if the LoF protocol were used to estiate the nuber of active nodes of Type b. Fro Section III-B, it is clear that if the bit patterns B p b,i, b {1,,3}, i {,1,...,t 1}, are known, then the 5If all the bits of the ID are 1, then its hash value is defined to be l. BP LoF estiates ˆn 1, ˆn and ˆn 3, of n 1,n and n 3 respectively, can be deduced. In our estiation schee, the bit patterns B p b,i, b {1,,3}, for ost values of i are found in the first phase; abiguity about the rest reains, which is resolved in the second and third phases. 1 First Phase: In the first phase, t slots are used. Every two consecutive slots constitute a block see Figure ; let B i denote the i th block. In block B i, i {,1,...,t 1}, active nodes fro N 1 whose hash value is i send a packet containing the sybol α in both the slots of B i. Also, in block B i, active nodes fro N respectively, N 3 whose hash value is i send a packet containing the sybol β only in the first slot respectively, only in the second slot of B i. So every slot has four possible outcoes, which are as follows: i Epty E if no node transits in the slot, ii Collision C if two or ore nodes transit, iii α if exactly one node of Type 1 transits, iv β if exactly one node of Type or Type 3 transits. The possible outcoes in a block are shown in the first two coluns of Table I 6. Note that for b {1,,3}, i {,1,...,t 1}, B p b,i equals 1 respectively, if and only if atleast one node respectively, no node of Type b transits in block B i. The bit patterns B p b,i, b {1,,3} corresponding to each possible block outcoe are shown in the last three coluns of Table I. For exaple if Slot1 results Table I. Outcoe in Block i Bit patterns Slot1 Slot B p 1,i B p,i B p 3,i E E E C 1 E β 1 C E 1 C C C α 1 1 C β 1 1 α C 1 1 α α 1 β E 1 β C 1 1 β β 1 1 E, C and denote Epty, Collision and abiguous result respectively. in C and Slot results in α, then it iplies that exactly one node fro N 1, at least one node fro N and none fro N 3 have transitted. Siilarly if both the slots result in β, then it iplies that exactly one node each fro N and N 3, and none fro N 1 have transitted. The outcoe C, C in which collisions occur in both the slots ay be due to transissions by atleast two nodes fro N 1, or by one node fro N 1 and at least one node each fro N and N 3, or by atleast two nodes each fro N and N 3. Due to the above abiguity, if the outcoe C, C occurs in the i th block, then the second phase is used to find the bit patterns B p 1,i, B p,i and B p 3,i. Let C I be the set of block nubers i in which the abiguous outcoe C, C has occurred. A broadcast packet BP is sent by the BS after the first phase see Figure, which contains a list of the block nubers in set C I. Second Phase: In the second phase, only the nodes fro N 1 whose hash value belongs to the set C I participate. Specifically, for each j = 1,,..., C I, in the j th slot of the second phase, the nodes fro N 1 whose hash value equals the block nuber of the j th block whose outcoe was C, C 6Note that the block results E, α, α, E, α, β and β, α cannot occur under the above protocol.

5 in the first phase transit. Nodes fro N and N 3 do not transit in the second phase. Now, consider the slot in the second phase corresponding to the i th block in the first phase, where i C I. If the slot result is epty, then it follows that B p 1,i =, B p,i = 1 and B p 3,i = 1; also, if the slot result is one packet transission, then B p 1,i = 1, B p,i = 1 and B p 3,i = 1. If the slot result is C, then B p 1,i = 1; however, abiguity about the values of B p,i and B p 3,i still reains and it is resolved in the third phase. Let C II C I be the set of block nubers i for which a collision occurred in the second phase. A BP is sent by the BS after the second phase see Figure, which contains a list of the block nubers in set C II. 3 Third Phase: In this phase, only those active nodes fro N and N 3 participate, whose corresponding blocks in the first phase and corresponding slots in the second phase resulted in collisions. That is, the active nodes fro N and N 3 whose hash value belongs to C II participate. The odd respectively, even nubered slots of the third phase are used by nodes fro N respectively, N 3. Specifically, for each j = 1,,..., C II, in slot j 1 respectively, j of the third phase, the active nodes fro N respectively, N 3 whose hash value equals the first phase block nuber, say i, of the j th eleent of C II transit. If slot j 1 is epty, then B p,i =, else B p,i = 1. Siilarly, if slot j is epty, then B p 3,i =, else B p 3,i = 1. Also, since B p 1,i = 1, the above abiguity is resolved in the third phase. D. Deterination of Expected Nuber of Tie Slots Required by Estiation Protocol to Execute Recall that t slots are required in the first phase. Let K respectively, R be the nuber of slots required in the second phase respectively, third phase. 1 Deterination of E[K]: Note that K t. Let S i 1 respectively, S i represent the result of the first respectively, second slot of B i. Also, let I F denote the indicator rando variable corresponding to event F, i.e., { 1, if F occurs, I F =, else. Clearly, K = t 1 I {S i So: 1 =C,Si =C}. t 1 E[K] = PS i 1 = C,Si = C. The conditions under which collisions occur in both the slots of B i are as follows: 1 At least two nodes fro N 1 transit in B i, Exactly one node fro N 1 and at least one node each fro N and N 3 transit in B i, 3 At least two nodes each fro N, N 3 and none fro N 1 transit in B i. Let Q 1 i, Q i and Q 3 i denote the probabilities of the events in 1, and 3 respectively. Then: PS i 1 = C,Si = C = Q 1i + Q i + Q 3 i. 3 It is easy to show that Q 1 i = 1 un 1 vn 1, Q i = vn 1 1 un 1 un 3 and Q 3 i = un 1 1 un vn 1 un 3 vn 3, where un = 1 1/ i+1 n and vn = n1/ i+1 1 1/ i+1 n 1. By and 3, the expected nuber of slots required in the second phase is: t 1 E[K] = {Q 1 i + Q i + Q 3 i}. 4 Deterination of E[R]: Note that R K. It is easy to show that: t 1 E[R] = Q 1 i. 5 The expected total nuber of slots required by the estiation protocol to execute is t + + E[K] + E[R] see Figure, where E[K] and E[R] are given by 4 and 5 respectively. E. Upper Bound on Expected Nuber of Tie Slots Required by Estiation Protocol to Execute Although the expressions derived in Section III-D are exact, they are coplicated. So to gain insight, in this subsection, we provide siple upper bounds on E[K] and E[R] and use the to obtain an upper bound on the expected total nuber of slots required by the estiation protocol to execute. Let n = axn 1,n,n 3, x = the sallest integer greater than or equal to x, and l y = log y. Theore 3.1: E[K] l n 1 + n 1 3n [ 1 + n n 3 + 1n n 3 5n 1 n 7n 1 n ]. Theore 3.: E[R] l n 1 + n 1. 3n The proofs of Theores 3.1 and 3. are provided Appendix. As an exaple, consider the case where n 1 = n = n 3 = n say and n 1,all = n,all = n 3,all. Then the expected total nuber of slots required by the estiation protocol to execute is bounded by t + + E[K] + E[R] t + + l n l n.333 = t + 3l n Hence, the nuber of tie slots saved copared with the case where the LoF protocol is executed thrice to separately estiate n 1, n and n 3 is at least 3t t + 3l n +.41 = t 3l n.41. IV. Cognitive MAC Protocol for Multi-channel MM Networks A. Overview For concreteness, we henceforth assue that Type 1, Type and Type 3 nodes are eergency, periodic and noral data nodes respectively. Tie is divided into fraes of equal durations. Let M T be the total nuber of channels and q i be the probability that a priary user PU is present on channel i {1,...,M T } in any given frae 7. Also, in a frae, suppose there are M f free channels, say {a 1,a,...,a Mf }; then out of these, we use the M fe channels with the lowest values of q i for eergency data traffic, the M fp channels with the next lowest values of q i for periodic data traffic and the rest for noral data traffic, for soe M fe,m fp. We assue that all MM devices are in the range of the base station BS see Figure 1. In each frae, only the BS senses the M T channels 7We assue that the probabilities q i are known to the base station; for exaple, they can be estiated using past observations of PU occupancies on different channels.

6 a1 UL DL DL CW1 DTW1 a1 UL DL DL CW DTW a UL DL DL CW3 CWMf DTW3 DTWMf amf UL DL DL SW BW1 EW BW CDTW Figure 3. The figure shows the structure of a frae. Only the free channels are shown. a 1 1 M f a M f R s R s a Mf M f M f.... Figure 4. The figure shows the schee used for nubering the reserved R s slots in the EW. The first slot of channel a 1 is nubered 1, the first slot of channel a is nubered,..., the first slot of channel a Mf is nubered M f, the second slot of channel a 1 is nubered M f + 1 and so on. to check for the presence of PUs 8. Figure 3 shows the structure of a frae. The BS senses every channel in the sensing window SW to check for the presence of PUs. In the first broadcast window BW 1, all the active nodes receive the list of channels that are free in the current frae fro the BS see Section IV-B. The fast node cardinality estiation schee described in Section III is executed in the estiation window EW to estiate the nuber of active nodes of each type see Section IV-C. In the second broadcast window BW, the list of channels assigned to each type of node and the optial contention probabilities which are coputed using the estiates obtained in the EW are broadcast by the BS see Section IV-D. In the Contention and Data Transission Window CDTW, active nodes contend on the channels assigned to the using Slotted ALOHA [1]; upon each successful contention, the BS reserves the requested nuber of slots for data transission by the node in the DTW see Section IV-E. Periodic nodes require channels for periodically transitting data. In particular, when a periodic node r with T r data packets contends successfully, the BS reserves one slot each in T r successive fraes for data transissions by node r. Node r does not participate again in the contention process in these T r fraes. B. First Broadcast Window BW 1 The BS and every node store the list of all channels, sorted in increasing order of q i. In BW 1, the BS repeatedly broadcasts a packet on the first free channel say f of the above list; this packet contains the list of channels that are free in the current frae. Each active node tunes to channels in increasing order of q i, listening for one tie slot on each channel, until it tunes to channel f and receives the list broadcast by the BS. C. Estiation Window EW Recall that the fast node cardinality estiation schee described in Section III requires t ++ C I + C II = R s say slots to execute. R s slots are reserved 9 in the EW for the estiation process. In the EW, all the M f free channels in the frae are utilized for the estiation. The schee used for nubering the reserved R s slots in the ulti-channel environent is shown in Figure 4. 8Since MM devices are low-cost and battery-operated devices, our protocol does not require the to have sensing capability. 9Note that although the value of R s is not known in advance, after the first respectively, second phase of the estiation schee, the BS can find the value of C I respectively, C II see Sections III-C1 and III-C. So the inforation required to reserve R s slots is available with the network. D. Second Broadcast Window BW After the EW, the BS knows the estiated nubers of active nodes with eergency ˆn e, periodic ˆn p and noral ˆn n data packets. Based on the values of ˆn e, ˆn p and ˆn n, out of the M f free channels, M fe, M fp and M fn channels are assigned to eergency, periodic and noral data nodes respectively, where M f = M fe + M fp + M fn ; the BS broadcasts the lists of channels assigned to each type of node in BW. For instance, let w e,w p and w n be weights positive real nubers associated with the eergency, periodic and noral data classes respectively. Then M fe,m fp and M fn ay be selected to be approxiately ˆn e w e M f ˆn e w e + ˆn p w p + ˆn n w n, ˆn p w p M f ˆn e w e + ˆn p w p + ˆn n w n ˆn and n w n M f ˆn e w e + ˆn p w p + ˆn n w n respectively. We use w e w p w n to ensure that eergency respectively, periodic data is provided a higher priority than periodic respectively, noral data. To balance the load across the assigned channels, each eergency respectively, periodic, noral node selects one channel fro the M fe respectively, M fp, M fn channels at rando and tunes to it in the CDTW. Now, recall that if n nodes contend using Slotted ALOHA, then the value of the contention probability p that axiizes the throughput is p = 1/n [1]. So the BS sets the probabilities of contention for eergency, periodic and noral data nodes to ˆp e = inm fe / ˆn e,1, ˆp p = inm fp / ˆn p,1 and ˆp n = inm fn / ˆn n,1 respectively and broadcasts the values of ˆp e, ˆp p and ˆp n in BW. Finally, there ay be soe periodic data nodes with tie slots in the DTW of the current frae reserved in past fraes; a packet containing a list of such reserved slots is also broadcast by the BS in BW. E. Contention and Data Transission Window CDTW After BW, all nodes switch to their respective selected channels for contention and data transission. Every channel in this window is divided into a Contention Window CW and a Data Transission Window DTW of variable lengths see Figure 3. Each active node fro N 1 contends using Slotted ALOHA [1] with contention probability ˆp e in the first slot of the CW on its channel, which is an uplink UL slot, and listens to the channel for an acknowledgent ACK packet fro the BS in the second slot, which is a downlink DL slot. If a node successfully contends in the UL slot, then it is allotted the requested nuber of slots in the DTW by the BS, starting fro the rightost available slot of the current frae; the BS includes the list of allotted slots in the ACK packet that it broadcasts in the following DL slot. The node then switches to idle sleep state to save energy and wakes up to transit in its allotted slots in the DTW. Now, since the

7 UL DL UL DL UL DL Figure 5. Contention Window T dm T d d d M M 1 1 Data Transission Window The figure shows the CDTW used in the analysis in Section V-A. nuber of contending nodes has reduced by 1, the BS odifies ˆp e to in1/ ˆn e /M fe 1,1 and broadcasts this value in the DL slot. In case of an unsuccessful contention collision or epty slot, the BS does not send any ACK. This process continues until the CW and DTW on that channel are separated by a single slot; then, the BS transits a broadcast packet inforing the reaining contending nodes to switch to idle state to save energy for the rest of the frae. However, if three successive UL slots are epty, then it is taken by the BS to be an indication that with a high probability all the active nodes on the channel have already successfully contended; in this case, the BS can allot the reaining free slots of the channel to active nodes of other channels. A siilar procedure is followed by active nodes fro N and N 3 on their selected channels with paraeter sets ˆp p, ˆn p and ˆp n, ˆn n respectively. V. Perforance Analysis In this section, we obtain closed-for expressions for the expected nuber of successful contentions and the expected aount of energy consued per frae under the Cognitive MAC protocol described in Section IV. A. Expected Nuber of Successful Contentions Here, we focus on only one channel and hence only nodes of a single type contend on it. Assue that n nodes of this type are active on the channel at the start of a given frae and let ˆn be the estiated value of n. Let the length of the CDTW of the frae be T slots. Let M be the nuber of successful contentions in the given frae. Recall that contentions occur only in UL slots. For tractability, we assue that upon every successful contention, the BS reserves a constant nuber, say d, of slots for the successful node fro the last available slot in that frae as shown in Figure 5. If no successful contentions take place in the frae, then M = and if all contentions are successful, then M = T / + d since M + dm = T. So M T / + d. For each x, let T x =.5T xd. By definition: T /+d EM = = PM = 6 Let S x be the event that a successful contention occurs when x nodes contend. Let PS x = r x and p x be the contention probability used when x nodes contend. In the proposed protocol, p n j = in1/ ˆn j,1, j =,1,... see Section IV-E. We now find the distribution of M. There are M = successful contentions if and only if for soe integers k 1,k,...,k, the first k 1 1 contention attepts are unsuccessful with n contending nodes and the k th 1 attept is successful, k th to k 1 th attepts are unsuccessful with n 1 contending nodes and k th attept is successful,..., and k + 1 th to T th attepts are unsuccessful with n contending nodes. So: PM = = T +1 k 1 =1 T + k =k 1 +1 T + j+1... k j+1 =k j T k =k r n k 1 1 r n 1 r n 1 k k 1 1 r n r n j k j+1 k j 1 r n j...1 r n T k. Note that r n j = n jp n j 1 p n j n j 1. EM can be obtained fro 6 and 7. B. Expected Aount of Energy Consued per Frae Let γ I,γ T,γ R be the energy spent by a node per slot in the idle state, transission state and reception state respectively. Let us classify the slots in the given frae into uplink slots, downlink slots and data transission slots; let the total energy spent by all the active nodes in the be E UL,E DL and E DT respectively. So the total expected aount of energy spent per frae is EE UL + EE DL + EE DT. We copute EE UL, EE DL and EE DT in Sections V-B1, V-B and V-B3 respectively. 1 Energy Spent in UL Slots: Note that there are a total of T M uplink slots in the frae. In each of these slots, soe of the active nodes are in transission state and the rest are in idle state. So, E UL = T M i=1 L i γ T + n L i γ I, where L i is the nuber of nodes that transit in UL slot i, which depends on N i the nuber of contending nodes in UL slot i and p Ni. Taking expectations and conditioning on the values taken by M: EE UL = T /+d = + T EL i /M = γ T i=1 n EL i /M = So EL i /M = can be calculated as, EL i /M = = j= 7 γ I PM =. 8 n j l i PL i = l i /M =,N i = n j l i = PN i = n j/m = 9 Distribution of N i follows fro the faous Gabler s ruin proble [9], i.e., PN i = n j/m = = PN i 1 = n j/m = 1 P i S n j /M = + PN i 1 = n j + 1/M = P i S n j+1 /M = 1 where P i S x /M = = Probability of success with x nodes given M = in slot i and j =,1,...i 1. Now, P i S n j /M = = P im = /S n j P i S n j, 11 PM =

8 P i M = /S n j = T +1 k 1 =1 T + k =k 1 +1 T + j+1... k j+1 =k j +1 1 r n k 1 1 r n 1 r n 1 k k 1 1 r n r n j k j+1 k j r n T k.... T k =k Average Throughput Average Throughput v/s Eergency Nodes Noral Nodes Periodic Nodes Average Throughput Average Throughput v/s Eergency Nodes Noral Nodes Periodic Nodes Where P i M = /S n j = for j. Now distribution of L i is given by, PL i = l = N i l p l Ni 1 p Ni Ni l. Let L i,n j = The nuber of nodes that transit in UL slot i given n j nodes, j =,1,,...,. So conditional distribution is given by, PL i = l i /M =,N i = n j = 1 PL i,n j = l i T PL i,n j = l i 13 By using 7, 8, 9, 1, 11, 1, 13, we get EE UL. Energy Spent in DL Slots: In these slots, contending nodes are in reception state and the rest are in idle state. So, E DL = T M i=1 N i γ R + n N i γ I. Taking expectations and conditioning on the values taken by M, we get: EE DL = T /+d = + T EN i /M = γ R i=1 n EN i /M = γ I PM =. 14 By definition of conditional expectation, EN i /M = = j= n jpn i = n j/m =. EE DL can then be found using 7, 1 and Energy Spent in DT Slots: Since only one node is transitting in these slots, all other nodes are in the idle state. So, E DT = dm γ T + n 1γ I and EE DT = dem γ T + n 1γ I. 15 Using 6 and 15, we can calculate EE DT. C. Expectation of the Efficiency with the Proposed Estiation Schee Suppose there are n active nodes of a class in a given frae and let ˆn be the estiated value of n obtained using the schee described in Section III-C. Also, suppose free channels are allocated to the class in the CDTW in the frae. Consider one of these channels and n n nodes select this channel. Recall that on this channel, each of the n nodes contends using slotted ALOHA with contention probability / ˆn. Fro [8], we know that ˆn = c ρ, where c = and ρ is defined in Section III-B as the position of right ost zero in BITMAP. Fro [8], we get the distribution of ρ as, Pρ = k = Pρ k Pρ k + 1, 16 n where Pρ k = k j= 1v j 1 j and v j indicates k the nuber of one bits in the binary representation of j. We Figure 6. The following paraeters are used in these plots: M T = 3, N = 5, k e = k p = k n = 1. In the left plot we use w e = w p = w n = 1 whereas in the right plot we use w e = 3, w p =, w n = 1. now find the expected value of efficiency, say η A, which is defined to be the probability of successful contention in the first UL slot of the frae. Note that η A is a easure of accuracy of the proposed estiation schee. So, η A = n ˆn 1 / ˆnn 1. 1 Eη A = n E = n r n 1 c ρ, c ρ 1 1 c ρ 1 n 1 c ρ By using 16 and 17, we can find Eη A. VI. Siulations Pρ = r. 17 In this section, we evaluate the perforance of the proposed Cognitive MAC protocol, in ters of average throughput and average delay, via siulations. Also, we copare the perforance of the proposed protocol with a hypothetical ideal protocol to find out how accurate the proposed estiation schee is. The ideal protocol is siilar to the proposed protocol, with the difference being that it is assued to know the exact nuber of active nodes at any tie 1. Let M T,M f, ˆn e, ˆn p, ˆn n,w e,w p,w n and q i be as defined in Section IV. At the beginning of each frae, data packets arrive at rando at each node; the nuber of packets that arrive at a node belonging to the eergency respectively, periodic, noral data class is a Poisson rando variable with ean e respectively, p, n. Also, each frae is divided into 5 slots and transission of a data packet takes 1 slot. An eergency respectively, noral node which has successfully contended for access during the CW can reserve at ost k e respectively, k n consecutive slots in the DTW. A periodic node can reserve one slot per frae for at ost k p consecutive fraes. The liits k e, k n and k p are iposed to ensure short-ter fairness in the transission opportunities that different nodes get. We consider a balanced load condition wherein there are an equal nuber, say N, of nodes of each type in the network and e = p = n = say. Figure 6 shows the average throughput per node versus for the three classes with different paraeter values. It can be seen that initially the average throughput for any given class equals the arrival rate, but after a particular value of, the average throughput saturates, which is the unstable 1Note that the ideal protocol is not practically ipleentable and is considered only for coparison with the proposed protocol.

9 region of operation. The left plot in Figure 6 shows that when w e = w p = w n = 1 and k e = k p = k n = 1, the average throughput curves of all three classes roughly coincide; this is because they are treated alike by the protocol. In contrast, the right plot in Figure 6 shows that in the unstable region, eergency respectively, periodic nodes achieve a higher average throughput than periodic respectively, noral nodes when w e = 3, w p =, w n = 1; this is because a higher weight results in ore channels being allocated to a class. Figure 7 shows the average throughput under the proposed protocol and the ideal protocol versus for the eergency and noral classes. These plots show that the perforance of the proposed protocol is close to that of the ideal protocol for both classes: in particular, in the unstable region of operation, on average, the proposed protocol achieves 87.5% respectively, 68% of the average throughput under the ideal protocol for the eergency respectively, noral class. Average Throughput Average Throughput for Eergency Nodes v/s Proposed Protocol Ideal Protocol Arrival Rate Average Throughput Average Throughput for Noral Nodes v/s Proposed Protocol Ideal Protocol Arrival Rate Figure 7. The following paraeters are used in these plots: M T = 3, N = 5, w e = 3, w p =, w n = 1, k e = k p = k n = 5. Figure 8 shows the average packet delay versus for the eergency and noral classes with different paraeter values. The left plot of Figure 8 shows that when w e = w p = w n = 1 and k e = k p = k n = 5, the average delay curves of the two classes roughly coincide; on the other hand, when the weights w e = 3, w p =, w n = 1 are used see the right plot of Figure 8, the average delay for eergency nodes is uch lower than that of noral nodes, which is because ore channels are allocated to eergency nodes. Average Delay Average Delay v/s Eergency Nodes Noral Nodes Average Delay Average Delay v/s Eergency Nodes Noral Nodes Figure 8. The following paraeters are used in these plots: M T = 3, N = 5, k e = k p = k n = 5. In the left figure we use w e = w p = w n = 1 whereas in the right figure we use w e = 3, w p =, w n = 1. VII. Conclusions and Future Work We designed a Cognitive MAC protocol for a heterogeneous MM network with three types of nodes. Our MAC protocol incorporates a fast cardinality estiation protocol to rapidly estiate the nuber of active nodes of each type; these estiates are used to find the optial contention probabilities to be used in the MAC protocol. We atheatically analyzed the nuber of tie slots required by our estiation protocol to execute as well as the perforance of the Cognitive MAC protocol. Also, we evaluated the perforance, in ters of average throughput and average delay, of our MAC protocol using siulations. In this paper we have considered a heterogeneous network with three types of nodes; a direction for future research is to extend our results to the case where there are an arbitrary nuber of node types. References [1] G. Wu, S. Talwar, K. Johnsson, N. Hiayat, and K. D. Johnson, MM: Fro Mobile to Ebedded Internet, IEEE Counications Magazine, vol. 49, no. 4, pp , 11. [] Y. Zhang, R. Yu, M. Nekovee, Y. Liu, S. Xie, and S. Gjessing, Cognitive Machine-to-Machine Counications: Visions and Potentials for the Sart Grid, IEEE Network, vol. 6, no. 3, pp. 6 13, 1. [3] A. Rajandekar and B. Sikdar, A Survey of MAC Layer Issues and Protocols for Machine-to-Machine Counications, IEEE Internet of Things Journal, vol., no., pp , 15. [4] 3GPP, Service Requireents for Machine-Type Counications, 14. [5] A. Aijaz and A.-H. Aghvai, PRMA-based Cognitive Machine-to- Machine Counications in Sart Grid Networks, IEEE Transactions on Vehicular Technology, vol. 64, no. 8, pp , 15. [6] I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, NeXt generation/dynaic spectru access/cognitive radio wireless networks: A survey, Coputer Networks, vol. 5, no. 13, pp , 6. [7] A. De Doenico, E. C. Strinati, and M.-G. Di Benedetto, A Survey on MAC Strategies for Cognitive Radio Networks, IEEE Counications Surveys and Tutorials, vol. 14, no. 1, pp. 1 44, 1. [8] J. So and N. H. Vaidya, Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terinals using a Single Transceiver, in Proc. of ACM MobiHoc, pp. 33, 4. [9] C. Cordeiro and K. Challapali, C-MAC: A Cognitive MAC Protocol for Multi-Channel Wireless Networks, in Proc. of DySPAN, 7. [1] D. P. Bertsekas and R. G. Gallager, Data Networks. PHI, nd ed., 199. [11] H. Wu, C. Zhu, R. J. La, X. Liu, and Y. Zhang, FASA: Accelerated S-ALOHA Using Access History for Event-Driven MM Counications, IEEE/ACM Transactions on Networking, vol. 1, no. 6, pp , 13. [1] C. W. Park, D. Hwang, and T.-J. Lee, Enhanceent of IEEE 8.11 ah MAC for MM Counications, IEEE Counications Letters, vol. 18, no. 7, pp , 14. [13] C.-Y. Hsu, C.-H. Yen, and C.-T. Chou, An Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine MM Networks, in Proc. of IWCMC, pp , 13. [14] M. Kodiala and T. Nandagopal, Fast and Reliable Estiation Schees in RFID Systes, in Proc. of ACM MobiCo, 6. [15] M. Kodiala, T. Nandagopal, and W. C. Lau, Anonyous Tracking using RFID Tags, in Proc. of IEEE INFOCOM, pp , 7. [16] T. Li, S. Wu, S. Chen, and M. Yang, Energy Efficient Algoriths for the RFID Estiation Proble, in Proc. of IEEE INFOCOM, 1. [17] Y. Zheng and M. Li, PET: Probabilistic Estiating Tree for Large- Scale RFID Estiation, IEEE Transactions on Mobile Coputing, vol. 11, no. 11, pp , 1. [18] H. Han, B. Sheng, C. C. Tan, Q. Li, W. Mao, and S. Lu, Counting RFID Tags Efficiently and Anonyously, in Proc. of IEEE INFOCOM, 1. [19] Z. Bar-Yossef, T. Jayra, R. Kuar, D. Sivakuar, and L. Trevisan, Counting distinct eleents in a data strea, in International Workshop on Randoization and Approxiation Techniques in Coputer Science, pp. 1 1, Springer,. [] M. Shahzad and A. X. Liu, Every Bit Counts: Fast and Scalable RFID Estiation, in Proc. of ACM MobiCo, pp , 1.

Energy-Efficient Cellular Communications Powered by Smart Grid Technology

Energy-Efficient Cellular Communications Powered by Smart Grid Technology Energy-Efficient Cellular Counications Powered by Sart Grid Technology Itiaz Nasi, Mostafa Zaan Chowdhury, and Md. Syadus Sefat Departent of Electrical and Electronic Engineering Khulna University of Engineering

More information

Allocation of Multiple Services in Multi-Access Wireless Systems

Allocation of Multiple Services in Multi-Access Wireless Systems Allocation of Multiple Serices in Multi-Access Wireless Systes Anders Furuskär Wireless@KTH, Royal Institute of Technology, Sweden and Ericsson Research anders.furuskar@era.ericsson.se Abstract This paper

More information

Interference Management in LTE Femtocell Systems Using Fractional Frequency Reuse

Interference Management in LTE Femtocell Systems Using Fractional Frequency Reuse Interference Manageent in LTE Fetocell Systes Using Fractional Frequency Reuse Poongup Lee and Jitae Shin School of Inforation and Counication Engineering Sungyunwan University, Suwon, 440-746, Korea {poongup,

More information

Performance Evaluation of UWB Sensor Network with Aloha Multiple Access Scheme

Performance Evaluation of UWB Sensor Network with Aloha Multiple Access Scheme 1 Perforance Evaluation of UWB Sensor Network with Aloha Multiple Access Schee Roeo Giuliano 1 and Franco Mazzenga 2 1 RadioLabs Consorzio Università Industria, Via del Politecnico 1, 00133, Roe, Italy,

More information

Investigating Multiple Alternating Cooperative Broadcasts to Enhance Network Longevity

Investigating Multiple Alternating Cooperative Broadcasts to Enhance Network Longevity Investigating Multiple Alternating Cooperative Broadcasts to Enhance Network Longevity Aravind Kailas School of Electrical and Coputer Engineering Georgia Institute of Technology Atlanta, Georgia 3033-050,

More information

COMPARISON OF TOKEN HOLDING TIME STRATEGIES FOR A STATIC TOKEN PASSING BUS. M.E. Ulug

COMPARISON OF TOKEN HOLDING TIME STRATEGIES FOR A STATIC TOKEN PASSING BUS. M.E. Ulug COMPARISON OF TOKEN HOLDING TIME STRATEGIES FOR A STATIC TOKEN PASSING BUS M.E. Ulug General Electric Corporate Research and Developent Schenectady, New York 1245 ABSTRACT Waiting ties have been calculated

More information

Simplified Analysis and Design of MIMO Ad Hoc Networks

Simplified Analysis and Design of MIMO Ad Hoc Networks Siplified Analysis and Design of MIMO Ad Hoc Networks Sunil Srinivasa and Martin Haenggi Departent of Electrical Engineering University of Notre Dae Notre Dae, IN 46556, USA Eail: {ssriniv, haenggi}@nd.edu

More information

Transmit Beamforming and Iterative Water-Filling Based on SLNR for OFDMA Systems

Transmit Beamforming and Iterative Water-Filling Based on SLNR for OFDMA Systems Transit Beaforing and Iterative Water-Filling Based on SLNR for OFDMA Systes Kazunori Hayashi, Megui Kaneko, Takeshi Fui, Hideaki Sakai Graduate School of Inforatics, Kyoto University, Yoshida Honachi

More information

A New Localization and Tracking Algorithm for Wireless Sensor Networks Based on Internet of Things

A New Localization and Tracking Algorithm for Wireless Sensor Networks Based on Internet of Things Sensors & Transducers 203 by IFSA http://www.sensorsportal.co A New Localization and Tracking Algorith for Wireless Sensor Networks Based on Internet of Things, 2 Zhang Feng, Xue Hui-Feng, 2 Zhang Yong-Heng,

More information

Intermediate-Node Initiated Reservation (IIR): A New Signaling Scheme for Wavelength-Routed Networks with Sparse Conversion

Intermediate-Node Initiated Reservation (IIR): A New Signaling Scheme for Wavelength-Routed Networks with Sparse Conversion Interediate-Node Initiated Reservation IIR): A New Signaling Schee for Wavelength-Routed Networks with Sparse Conversion Kejie Lu, Jason P. Jue, Tiucin Ozugur, Gaoxi Xiao, and Irich Chlatac The Center

More information

Power Optimal Signaling for Fading Multi-access Channel in Presence of Coding Gap

Power Optimal Signaling for Fading Multi-access Channel in Presence of Coding Gap Power Optial Signaling for Fading Multi-access Channel in Presence of Coding Gap Ankit Sethi, Prasanna Chaporkar, and Abhay Karandikar Abstract In a ulti-access fading channel, dynaic allocation of bandwidth,

More information

Transmit Power and Bit Allocations for OFDM Systems in a Fading Channel

Transmit Power and Bit Allocations for OFDM Systems in a Fading Channel Transit Power and Bit Allocations for OFD Systes in a Fading Channel Jiho Jang *, Kwang Bok Lee, and Yong-Hwan Lee * Sasung Electronics Co. Ltd., Suwon P.O.Box, Suwon-si, Gyeonggi-do 44-74, Korea School

More information

Radio Resource Management in a Coordinated Cellular Distributed Antenna System By Using Particle Swarm Optimization

Radio Resource Management in a Coordinated Cellular Distributed Antenna System By Using Particle Swarm Optimization Radio Resource Manageent in a Coordinated Cellular Distributed Antenna Syste By Using Particle Swar Optiization Oer Haliloglu (1), Cenk Toker (1), Gurhan Bulu (1), Hali Yanikoeroglu (2) (1) Departent of

More information

Distributed Resource Allocation for Proportional Fairness in Multi-Band Wireless Systems

Distributed Resource Allocation for Proportional Fairness in Multi-Band Wireless Systems Distributed Resource Allocation for Proportional Fairness in Multi-Band Wireless Systes I-Hong Hou CSL and Departent of CS University of Illinois Urbana, IL 61801, USA ihou2@illinois.edu Piyush Gupta Bell

More information

Ad Hoc Networks. Opportunistic reliability for cognitive radio sensor actor networks in smart grid. Ozgur Ergul, A. Ozan Bicen, Ozgur B.

Ad Hoc Networks. Opportunistic reliability for cognitive radio sensor actor networks in smart grid. Ozgur Ergul, A. Ozan Bicen, Ozgur B. Ad Hoc Networks 41 (2016) 5 14 Contents lists available at ScienceDirect Ad Hoc Networks journal hoepage: www.elsevier.co/locate/adhoc Opportunistic reliability for cognitive radio sensor actor networks

More information

DSI3 Sensor to Master Current Threshold Adaptation for Pattern Recognition

DSI3 Sensor to Master Current Threshold Adaptation for Pattern Recognition International Journal of Signal Processing Systes Vol., No. Deceber 03 DSI3 Sensor to Master Current Threshold Adaptation for Pattern Recognition David Levy Infineon Austria AG, Autootive Power Train Systes,

More information

Kalman Filtering for NLOS Mitigation and Target Tracking in Indoor Wireless Environment

Kalman Filtering for NLOS Mitigation and Target Tracking in Indoor Wireless Environment 16 Kalan Filtering for NLOS Mitigation and Target Tracking in Indoor Wireless Environent Chin-Der Wann National Sun Yat-Sen University Taiwan 1. Introduction Kalan filter and its nonlinear extension, extended

More information

A Selection Region Based Routing Protocol for Random Mobile ad hoc Networks with Directional Antennas

A Selection Region Based Routing Protocol for Random Mobile ad hoc Networks with Directional Antennas A Selection Region Based Routing Protocol for Rando Mobile ad hoc Networks with Directional Antennas arxiv:1011.6017v1 cs.it] 8 Nov 010 Di Li, Changchuan Yin, and Changhai Chen Key Laboratory of Universal

More information

Distributed Resource Allocation Assisted by Intercell Interference Mitigation in Downlink Multicell MC DS-CDMA Systems

Distributed Resource Allocation Assisted by Intercell Interference Mitigation in Downlink Multicell MC DS-CDMA Systems 1 Distributed Resource Allocation Assisted by Intercell Interference Mitigation in Downlin Multicell MC DS-CDMA Systes Jia Shi, Zhengyu Song, IEEE Meber, and Qiang Ni, IEEE Senior Meber Abstract This paper

More information

Power-Efficient Resource Allocation for MC-NOMA with Statistical Channel State Information

Power-Efficient Resource Allocation for MC-NOMA with Statistical Channel State Information Power-Efficient Resource Allocation for MC-NOMA with Statistical Channel State Inforation Zhiqiang Wei, Derrick Wing Kwan Ng, and Jinhong Yuan School of Electrical Engineering and Telecounications, The

More information

SECURITY AND BER PERFORMANCE TRADE-OFF IN WIRELESS COMMUNICATION SYSTEMS APPLICATIONS

SECURITY AND BER PERFORMANCE TRADE-OFF IN WIRELESS COMMUNICATION SYSTEMS APPLICATIONS Latin Aerican Applied Research 39:187-192 (2009) SECURITY AND BER PERFORMANCE TRADE-OFF IN WIRELESS COMMUNICATION SYSTEMS APPLICATIONS L. ARNONE, C. GONZÁLEZ, C. GAYOSO, J. CASTIÑEIRA MOREIRA and M. LIBERATORI

More information

OPTIMIZE THE POWER CONTROL AND NETWORK LIFETIME USING ZERO - SUM GAME THEORY FOR WIRELESS SENSOR NETWORKS

OPTIMIZE THE POWER CONTROL AND NETWORK LIFETIME USING ZERO - SUM GAME THEORY FOR WIRELESS SENSOR NETWORKS OTIMIZE THE OWER CONTROL AND NETWORK LIFETIME USING ZERO - SUM GAME THEORY FOR WIRELESS SENSOR NETWORKS Vinoba.V 1, Chithra.S.M 1 Departent of Matheatics, K.N. Governent Arts college, Tail Nadu,( India.)

More information

ARecent report pointed out that in 2014 the amount of data

ARecent report pointed out that in 2014 the amount of data IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. XX, NO. XX, JANUARY 2XX 1 QoS-Aware Energy Efficient Association and Resource Scheduling for HetNets Taewoon Ki and J. Morris Chang, Senior Meber, IEEE Abstract

More information

An orthogonal multi-beam based MIMO scheme. for multi-user wireless systems

An orthogonal multi-beam based MIMO scheme. for multi-user wireless systems An orthogonal ulti-bea based IO schee for ulti-user wireless systes Dong-chan Oh o and Yong-Hwan Lee School of Electrical Engineering and IC, Seoul ational University Kwana P.O. Box 34, Seoul, 151-600,

More information

Analysis on DV-Hop Algorithm and its variants by considering threshold

Analysis on DV-Hop Algorithm and its variants by considering threshold Analysis on DV-Hop Algorith and its variants by considering threshold Aanpreet Kaur 1, Pada Kuar 1, Govind P Gupta 2 1 Departent of Coputer Science & Engineering Jaypee Institute of Inforation Technology,

More information

COMBINED FREQUENCY AND SPATIAL DOMAINS POWER DISTRIBUTION FOR MIMO-OFDM TRANSMISSION

COMBINED FREQUENCY AND SPATIAL DOMAINS POWER DISTRIBUTION FOR MIMO-OFDM TRANSMISSION The 8th nnual IEEE International Syposiu on Personal, Indoor and Mobile Radio Counications (PIMRC 07) COMINED FREQUENCY ND SPTIL DOMINS POWER DISTRIUTION FOR MIMO-OFDM TRNSMISSION Wladiir ocquet, Kazunori

More information

Adaptive Harmonic IIR Notch Filter with Varying Notch Bandwidth and Convergence Factor

Adaptive Harmonic IIR Notch Filter with Varying Notch Bandwidth and Convergence Factor Journal of Counication and Coputer (4 484-49 doi:.765/548-779/4.6. D DAVID PUBLISHING Adaptive Haronic IIR Notch Filter with Varying Notch Bandwidth and Convergence Factor Li Tan, Jean Jiang, and Liango

More information

On the Reverse Link Capacity of cdma2000 High Rate Packet Data Systems

On the Reverse Link Capacity of cdma2000 High Rate Packet Data Systems On the Reverse Link Capacity of cda High Rate Packet Data Systes Eduardo Esteves QUALCOMM Incorporated 5775 Morehouse Drive San Diego, CA 911-1714 Abstract cda high rate packet data standard, also known

More information

Alternative Encoding Techniques for Digital Loudspeaker Arrays

Alternative Encoding Techniques for Digital Loudspeaker Arrays Alternative Encoding Techniques for Digital Loudspeaer Arrays Fotios Kontoichos, Nicolas Alexander Tatlas, and John Mourjopoulos Audio and Acoustic Technology Group, Wire Counications Laboratory, Electrical

More information

Group Secret Key Generation in Wireless Networks: Algorithms and Rate Optimization

Group Secret Key Generation in Wireless Networks: Algorithms and Rate Optimization Group Secret Key Generation in Wireless Networks: Algoriths and Rate Optiization Peng Xu, Kanapathippillai Cuanan, Meber, IEEE, Zhiguo Ding, Senior, Meber, IEEE, Xuchu Dai and Kin K. Leung Fellow, IEEE

More information

Performance Analysis of an AMC System with an Iterative V-BLAST Decoding Algorithm

Performance Analysis of an AMC System with an Iterative V-BLAST Decoding Algorithm I. J. Counications, Network and Syste Sciences, 008,, 105-06 Published Online May 008 in SciRes (http://www.srpublishing.org/journal/ijcns/). Perforance Analysis of an AMC Syste with an Iterative V-BLAST

More information

Yield Enhancement Techniques for 3D Memories by Redundancy Sharing among All Layers

Yield Enhancement Techniques for 3D Memories by Redundancy Sharing among All Layers Yield Enhanceent Techniques for 3D Meories by Redundancy Sharing aong All Layers Joohwan Lee, Kihyun Park, and Sungho Kang Three-diensional (3D) eories using through-silicon vias (TSVs) will likely be

More information

Beacon-driven Leader Based Protocol over a GE Channel for MAC Layer Multicast Error Control

Beacon-driven Leader Based Protocol over a GE Channel for MAC Layer Multicast Error Control I. J. Counications, Network and Syste Sciences, 2008, 2, 05-206 Published Online May 2008 in Scies (http://www.spublishing.org/journal/ijcns/. Beacon-driven Leader Based Protocol over a GE Channel for

More information

Outage Probability of Alamouti based Cooperative Communications with Multiple Relay Nodes using Network Coding

Outage Probability of Alamouti based Cooperative Communications with Multiple Relay Nodes using Network Coding Outage Probability of Alaouti based Cooperative Counications with Multiple Relay Nodes using Network Coding Gordhan Das Menghwar and Christoph F. Mecklenbräuker 2 Inforation Technology Centre Sindh Agriculture

More information

Chalmers Publication Library

Chalmers Publication Library Chalers Publication Library HARQ Feedback in Spectru Sharing Networks This docuent has been downloaded fro Chalers Publication Library CPL. It is the author s version of a work that was accepted for publication

More information

Modeling Beam forming in Circular Antenna Array with Directional Emitters

Modeling Beam forming in Circular Antenna Array with Directional Emitters International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 Volue 5 Issue 3 ǁ Mar. 2017 ǁ PP.01-05 Modeling Bea foring in Circular Antenna Array

More information

ES 442 Homework #8 Solutions (Spring 2018 Due April 16, 2018 ) Print out homework and do work on the printed pages.. Problem 1 ASCII Code (20 points)

ES 442 Homework #8 Solutions (Spring 2018 Due April 16, 2018 ) Print out homework and do work on the printed pages.. Problem 1 ASCII Code (20 points) Hoework 8 NAME olutions E 44 Hoework #8 olutions (pring 018 Due April 16, 018 ) Print out hoework and do work on the printed pages.. Proble 1 ACII Code (0 points) he Aerican tandard Code for Inforation

More information

DIRECT MAPPING OVSF-BASED TRANSMISSION SCHEME FOR UNDERWATER ACOUSTIC MULTIMEDIA COMMUNICATION

DIRECT MAPPING OVSF-BASED TRANSMISSION SCHEME FOR UNDERWATER ACOUSTIC MULTIMEDIA COMMUNICATION Journal of Marine Science and Technology, Vol. 18, No. 3, pp. 413-418 (2010) 413 DIRECT MAPPING OVSF-BASED TRANSMISSION SCHEME FOR UNDERWATER ACOUSTIC MULTIMEDIA COMMUNICATION Chin-Feng Lin*, Jiang-Yao

More information

RAKE Receiver. Tommi Heikkilä S Postgraduate Course in Radio Communications, Autumn II.

RAKE Receiver. Tommi Heikkilä S Postgraduate Course in Radio Communications, Autumn II. S-72333 Postgraduate Course in Radio Counications, Autun 2004 1 RAKE Receiver Toi Heikkilä toiheikkila@teliasoneraco Abstract RAKE receiver is used in CDMA-based (Code Division Multiple Access) systes

More information

Green Downlink Radio Management Based Cognitive Radio LTE HetNets

Green Downlink Radio Management Based Cognitive Radio LTE HetNets Green Downlink Radio Manageent Based Cognitive Radio LTE HetNets Ahad Alsharoa, Ahed E. Kaal Departent of Electrical and Coputer Engineering, Iowa State University (ISU), Aes, Iowa, USA, Eail: {alsharoa,

More information

Success Probability of Millimeter-Wave D2D Networks with Heterogeneous Antenna Arrays

Success Probability of Millimeter-Wave D2D Networks with Heterogeneous Antenna Arrays Success Probability of Millieter-Wave D2D Networks with Heterogeneous Antenna Arrays Na Deng, Yi Sun School of Inforation & Counication Engineering Dalian University of Technology Dalian, Liaoning, 11624,

More information

A Novel TDS-FDMA Scheme for Multi-User Uplink Scenarios

A Novel TDS-FDMA Scheme for Multi-User Uplink Scenarios A Novel TDS-FDMA Schee for Multi-User Uplink Scenarios Linglong Dai, Zhaocheng Wang, Jun Wang, and Zhixing Yang Tsinghua National Laboratory for Inforation Science and Technology, Electronics Engineering

More information

Notes on Orthogonal Frequency Division Multiplexing (OFDM)

Notes on Orthogonal Frequency Division Multiplexing (OFDM) Notes on Orthogonal Frequency Division Multiplexing (OFDM). Discrete Fourier ransfor As a reinder, the analytic fors of Fourier and inverse Fourier transfors are X f x t t, f dt x t exp j2 ft dt (.) where

More information

WIPL-D Pro: What is New in v12.0?

WIPL-D Pro: What is New in v12.0? WIPL-D Pro: What is New in v12.0? Iproveents/new features introduced in v12.0 are: 1. Extended - Extree Liits a. Extreely LOW contrast aterials b. Extended resolution for radiation pattern c. Extreely

More information

Using Adaptive Modulation in a LEO Satellite Communication System

Using Adaptive Modulation in a LEO Satellite Communication System Proceedings of the 11th WSEAS International Conference on COMMUNICATIONS, Agios Nikolaos, Crete Island, Greece, July 26-28, 27 255 Using Adaptive Modulation in a LEO Satellite Counication Syste L. HADJ

More information

Resource Allocation for OFDMA-Based Relay Assisted Two-Tier Femtocell Networks

Resource Allocation for OFDMA-Based Relay Assisted Two-Tier Femtocell Networks Resource Allocation for OFDMA-Based Relay Assisted Two-Tier Fetocell Networks Aila Tharaperiya Gaage, Nandana Rajatheva, Marian Codreanu Telecounications Field of Study, School of Engineering and Technology,

More information

UNIT - II CONTROLLED RECTIFIERS (Line Commutated AC to DC converters) Line Commutated Converter

UNIT - II CONTROLLED RECTIFIERS (Line Commutated AC to DC converters) Line Commutated Converter UNIT - II CONTROLLED RECTIFIERS (Line Coutated AC to DC converters) INTRODUCTION TO CONTROLLED RECTIFIERS Controlled rectifiers are line coutated ac to power converters which are used to convert a fixed

More information

SAMPLING PERIOD ASSIGNMENT FOR NETWORKED CONTROL SYSTEMS BASED ON THE PLANT OPERATION MODE

SAMPLING PERIOD ASSIGNMENT FOR NETWORKED CONTROL SYSTEMS BASED ON THE PLANT OPERATION MODE SAMPLING PERIOD ASSIGNMENT FOR NETWORKED CONTROL SYSTEMS BASED ON THE PLANT OPERATION MODE Daniel A. Perez, Ubirajara F. Moreno, Carlos B. Montez, Tito L. M. Santos PGEAS - Prograa de Pós-Graduação e Engenharia

More information

Content-Centric Multicast Beamforming in Cache-Enabled Cloud Radio Access Networks

Content-Centric Multicast Beamforming in Cache-Enabled Cloud Radio Access Networks Content-Centric Multicast Beaforing in Cache-Enabled Cloud Radio Access Networks Hao Zhou, Meixia Tao, Erkai Chen,WeiYu *Dept. of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ICC.2006.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ICC.2006. Kaya, I., & Kocak, T. (2006). Energy-efficient pipelined bloo filters for network intrusion detection. IEEE International Conference on Counications, 5, 2382-2387. DOI: 10.1109/ICC.2006.255126 Peer reviewed

More information

Secondary-side-only Simultaneous Power and Efficiency Control in Dynamic Wireless Power Transfer System

Secondary-side-only Simultaneous Power and Efficiency Control in Dynamic Wireless Power Transfer System 069060 Secondary-side-only Siultaneous Power and Efficiency Control in Dynaic Wireless Power Transfer Syste 6 Giorgio ovison ) Daita Kobayashi ) Takehiro Iura ) Yoichi Hori ) ) The University of Tokyo,

More information

Distributed Power Delivery for Energy Efficient and Low Power Systems

Distributed Power Delivery for Energy Efficient and Low Power Systems Distributed Power Delivery for Energy Efficient and Low Power Systes Selçuk Köse Departent of Electrical Engineering University of South Florida Tapa, Florida 33620 kose@usf.edu Eby G. Friedan Departent

More information

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists 3,900 116,000 10M Open access books available International authors and editors Downloads Our authors

More information

ELEC2202 Communications Engineering Laboratory Frequency Modulation (FM)

ELEC2202 Communications Engineering Laboratory Frequency Modulation (FM) ELEC Counications Engineering Laboratory ---- Frequency Modulation (FM) 1. Objectives On copletion of this laboratory you will be failiar with: Frequency odulators (FM), Modulation index, Bandwidth, FM

More information

Randomized Scheduling Algorithms for Wireless Sensor Networks

Randomized Scheduling Algorithms for Wireless Sensor Networks Randoized Scheduling Algoriths for Wireless Sensor etworks abhendra Bisnik, eeraj Jaggi Rensselaer Polytechnic Institute Troy, Y 80 bisnin@rpiedu, jaggin@rpiedu I ITRODUCTIO A wireless sensor network WS

More information

Joint user clustering and resource allocation for device-to-device communication underlaying MU-MIMO cellular networks

Joint user clustering and resource allocation for device-to-device communication underlaying MU-MIMO cellular networks Wang et al. EURASIP Journal on Wireless Counications and Networking (2015) 2015:145 DOI 10.1186/s13638-015-0358-6 RESEARCH Joint user clustering and resource allocation for device-to-device counication

More information

Relation between C/N Ratio and S/N Ratio

Relation between C/N Ratio and S/N Ratio Relation between C/N Ratio and S/N Ratio In our discussion in the past few lectures, we have coputed the C/N ratio of the received signals at different points of the satellite transission syste. The C/N

More information

Multicast Capacity Scaling for Cognitive Networks: General Extended Primary Network

Multicast Capacity Scaling for Cognitive Networks: General Extended Primary Network Multicast Capacity Scaling for Cognitive Networks: General Extended Priary Network Cheng Wang, Xiang-Yang Li, Shaojie Tang, Changjun Jiang Departent of Coputer Science, Tongji University, Shanghai, China

More information

SEP-Optimal Antenna Selection for Average Interference Constrained Underlay Cognitive Radios

SEP-Optimal Antenna Selection for Average Interference Constrained Underlay Cognitive Radios Globeco - Counication Theory Syposiu SEP-Optial Antenna Selection for Average Interference Constrained Underlay Cognitive Radios Rialapudi Sarvendranath, Student Meber, IEEE, Neelesh B. Mehta, Senior Meber,

More information

Uplink blocking probability calculation for cellular systems with WCDMA radio interface and finite source population

Uplink blocking probability calculation for cellular systems with WCDMA radio interface and finite source population Uplin blocing probability calculation for cellular systes with WCDMA radio interface and finite source population Mariusz Głąbowsi *, Macie Stasia *, Aradiusz Wiśniewsi and Piotr Zwierzyowsi * * Institute

More information

Overlapping Signal Separation in DPX Spectrum Based on EM Algorithm. Chuandang Liu 1, a, Luxi Lu 1, b

Overlapping Signal Separation in DPX Spectrum Based on EM Algorithm. Chuandang Liu 1, a, Luxi Lu 1, b nd International Worshop on Materials Engineering and Coputer Sciences (IWMECS 015) Overlapping Signal Separation in DPX Spectru Based on EM Algorith Chuandang Liu 1, a, Luxi Lu 1, b 1 National Key Laboratory

More information

Distributed Power and Channel Allocation for Cognitive Femtocell Network using a Coalitional Game Approach

Distributed Power and Channel Allocation for Cognitive Femtocell Network using a Coalitional Game Approach 1 Distributed Power and Channel Allocation for Cognitive Fetocell Network using a Coalitional Gae Approach Tuan eanh, Nguyen H. Tran, and Choong Seon Hong Departent of Coputer Engineering, Kyung Hee University,

More information

Overlapped frequency-time division multiplexing

Overlapped frequency-time division multiplexing April 29, 16(2): 8 13 www.sciencedirect.co/science/journal/158885 he Journal of China Universities of Posts and elecounications www.buptjournal.cn/xben Overlapped frequency-tie division ultiplexing JIANG

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Spectrum Sensing in Low SNR: Diversity Combining and Cooperative Communications

Spectrum Sensing in Low SNR: Diversity Combining and Cooperative Communications 0 6th International Conference on Industrial and Inforation Systes, ICIIS 0, Aug. 6-9, 0, Sri Lanka Spectru Sensing in Low SR: Diversity Cobining and Cooperative Counications Saan Atapattu, Chintha Tellabura,

More information

Modulation Selection from a Battery Power Efficiency Perspective

Modulation Selection from a Battery Power Efficiency Perspective IEEE TRANSACTIONS ON COUNICATIONS, VOL. 58, NO. 7, JULY 21 197 odulation Selection fro a Battery Power Efficiency Perspective Dongliang Duan, Student eber, IEEE, Fengzhong Qu, eber, IEEE, Liuqing Yang,

More information

NINTH INTERNATIONAL CONGRESS ON SOUND AND VIBRATION, ICSV9 PASSIVE CONTROL OF LAUNCH NOISE IN ROCKET PAYLOAD BAYS

NINTH INTERNATIONAL CONGRESS ON SOUND AND VIBRATION, ICSV9 PASSIVE CONTROL OF LAUNCH NOISE IN ROCKET PAYLOAD BAYS first nae & faily nae: Rick Morgans Page nuber: 1 NINTH INTERNATIONAL CONGRESS ON SOUND AND VIBRATION, ICSV9 PASSIVE CONTROL OF LAUNCH NOISE IN ROCKET PAYLOAD BAYS Rick Morgans, Ben Cazzolato, Anthony

More information

This is a repository copy of Group Secret Key Generation in Wireless Networks : Algorithms and Rate Optimization.

This is a repository copy of Group Secret Key Generation in Wireless Networks : Algorithms and Rate Optimization. This is a repository copy of Group Secret Key Generation in Wireless Networks : Algoriths and Rate Optiization. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/0068/ Version:

More information

Power Improvement in 64-Bit Full Adder Using Embedded Technologies Er. Arun Gandhi 1, Dr. Rahul Malhotra 2, Er. Kulbhushan Singla 3

Power Improvement in 64-Bit Full Adder Using Embedded Technologies Er. Arun Gandhi 1, Dr. Rahul Malhotra 2, Er. Kulbhushan Singla 3 Power Iproveent in 64-Bit Full Adder Using Ebedded Technologies Er. Arun Gandhi 1, Dr. Rahul Malhotra 2, Er. Kulbhushan Singla 3 1 Departent of ECE, GTBKIET, Chhapianwali Malout, Punjab 2 Director, Principal,

More information

A Robust Scheme for Distributed Control of Power Converters in DC Microgrids with Time-Varying Power Sharing

A Robust Scheme for Distributed Control of Power Converters in DC Microgrids with Time-Varying Power Sharing A Robust Schee for Distributed Control of Power Converters in DC Microgrids with Tie-Varying Power Sharing Mayank Baranwal,a, Alireza Askarian,b, Srinivasa M. Salapaka,c and Murti V. Salapaka,d Abstract

More information

Receiver Design for Downlink MIMO MC-CDMA in Cognitive Radio Systems

Receiver Design for Downlink MIMO MC-CDMA in Cognitive Radio Systems 1st Annual IEEE International Syposiu on Personal, Indoor and Mobile Radio Counications Receiver Design for Downlink MIMO MC-CDMA in Cognitive Radio Systes M. Raabzadeh 1, and. hoshbin 1 1 Electrical Engineering

More information

A HIGH POWER FACTOR THREE-PHASE RECTIFIER BASED ON ADAPTIVE CURRENT INJECTION APPLYING BUCK CONVERTER

A HIGH POWER FACTOR THREE-PHASE RECTIFIER BASED ON ADAPTIVE CURRENT INJECTION APPLYING BUCK CONVERTER 9th International onference on Power Electronics Motion ontrol - EPE-PEM Košice A HIGH POWER FATOR THREE-PHASE RETIFIER BASE ON AAPTIVE URRENT INJETION APPYING BUK ONVERTER Žarko Ja, Predrag Pejović EE

More information

Implementation of Adaptive Viterbi Decoder

Implementation of Adaptive Viterbi Decoder Ipleentation of Adaptive Viterbi Decoder Devendra Made #1 VIII Se B.E.(Etrx) K.D.K.College of Engineering, Nagpur, Maharashtra(I) Asst. Prof. R.B. Khule *2 M.Tech V.L.S.I. K.D.K.College of Engineering,

More information

On Capacity of Wireless Ad Hoc Networks with MIMO MMSE Receivers Jing Ma, Member, IEEE and Ying Jun (Angela) Zhang, Member, IEEE

On Capacity of Wireless Ad Hoc Networks with MIMO MMSE Receivers Jing Ma, Member, IEEE and Ying Jun (Angela) Zhang, Member, IEEE On Capacity of Wireless Ad Hoc Networs with MIMO MMSE Receivers Jing Ma, Meber, IEEE and Ying Jun (Angela) Zhang, Meber, IEEE Dept. of Inforation Engineering, The Chinese University of Hong ong, Hong ong

More information

Performance of Multiuser MIMO System Employing Block Diagonalization with Antenna Selection at Mobile Stations

Performance of Multiuser MIMO System Employing Block Diagonalization with Antenna Selection at Mobile Stations Perforance of Multiuser MIMO Syste Eploying Bloc Diagonalization with Antenna Selection at Mobile Stations Feng Wang, Mare E. Bialowsi School of Inforation Technology and Electrical Engineering The University

More information

Research Article Dynamic Beamforming for Three-Dimensional MIMO Technique in LTE-Advanced Networks

Research Article Dynamic Beamforming for Three-Dimensional MIMO Technique in LTE-Advanced Networks Antennas and Propagation Volue 213, Article ID 76457, 8 pages http://dx.doi.org/1.1155/213/76457 Research Article Dynaic Beaforing for Three-Diensional MIMO Technique in LTE-Advanced Networks Yan Li, Xiaodong

More information

OTC Statistics of High- and Low-Frequency Motions of a Moored Tanker. sensitive to lateral loading such as the SAL5 and

OTC Statistics of High- and Low-Frequency Motions of a Moored Tanker. sensitive to lateral loading such as the SAL5 and OTC 61 78 Statistics of High- and Low-Frequency Motions of a Moored Tanker by J.A..Pinkster, Maritie Research Inst. Netherlands Copyright 1989, Offshore Technology Conference This paper was presented at

More information

4G Communication Resource Analysis with Adaptive Physical Layer Technique

4G Communication Resource Analysis with Adaptive Physical Layer Technique International Journal of Engineering Trends and Technology (IJETT) Volue 33 uber - March 206 4G Counication Resource Analysis with Adaptive Physical Layer Technique Mubinul Haque, Dr. Md. Abu Bakar Siddiqui

More information

Keywords: International Mobile Telecommunication (IMT) Systems, evaluating the usage of frequency bands, evaluation indicators

Keywords: International Mobile Telecommunication (IMT) Systems, evaluating the usage of frequency bands, evaluation indicators 2nd International Conference on Advances in Mechanical Engineering and Industrial Inforatics (AMEII 206) Entropy Method based Evaluation for Spectru Usage Efficiency of International Mobile Telecounication

More information

Published in: ICWMC 2015, The Eleventh International Conference on Wireless and Mobile Communications

Published in: ICWMC 2015, The Eleventh International Conference on Wireless and Mobile Communications Aalborg Universitet Throughput Analysis of Full Duplex Counication with Asyetric Traffic in Sall Cell Systes Mahood, Nurul Huda; Berardinelli, Gilberto; Mogensen, Preben Elgaard; Frederiksen, Frank Published

More information

A New Simple Model for Land Mobile Satellite Channels

A New Simple Model for Land Mobile Satellite Channels A New Siple Model for Land Mobile Satellite Channels A. Abdi, W. C. Lau, M.-S. Alouini, and M. Kaveh Dept. of Elec. and Cop. Eng., University of Minnesota, Minneapolis, MN 55455 Eails: {abdi, wlau, alouini,

More information

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks A new Opportunistic MAC Layer Protocol for Cognitive IEEE 8.11-based Wireless Networks Abderrahim Benslimane,ArshadAli, Abdellatif Kobbane and Tarik Taleb LIA/CERI, University of Avignon, Agroparc BP 18,

More information

LETTER Adaptive Multi-Stage Parallel Interference Cancellation Receiver for Multi-Rate DS-CDMA System

LETTER Adaptive Multi-Stage Parallel Interference Cancellation Receiver for Multi-Rate DS-CDMA System IEICE TRANS. COMMUN., VOL.E87 B, NO.8 AUGUST 2004 2401 LETTER Adaptive Multi-Stage Parallel Interference Cancellation Receiver for Multi-Rate DS-CDMA Syste Seung Hee HAN a), Student Meber and Jae Hong

More information

Energy Efficient Space Time Line Coded Regenerative Two-Way Relay Under Per-Antenna Power Constraints

Energy Efficient Space Time Line Coded Regenerative Two-Way Relay Under Per-Antenna Power Constraints SPECIAL SECTION ON GREEN SIGNAL PROCESSING FOR WIRELESS COMMUNICATIONS AND NETWORKING Received July 29, 2018, accepted August 20, 2018, date of publication August 23, 2018, date of current version Septeber

More information

Distributed Power and Channel Allocation for Cognitive Femtocell Network using a Coalitional Game in Partition Form Approach

Distributed Power and Channel Allocation for Cognitive Femtocell Network using a Coalitional Game in Partition Form Approach Distributed Power and Channel Allocation for Cognitive Fetocell Network using a Coalitional Gae in Partition For Approach Tuan LeAnh, Nguyen H. Tran, Meber, IEEE, Sungwon Lee, Meber, IEEE, Eui-Na Huh,

More information

A Frequency Domain Approach to Design Constrained Amplitude Spreading Sequences for DS-CDMA Systems for Frequency Selective Fading Channels

A Frequency Domain Approach to Design Constrained Amplitude Spreading Sequences for DS-CDMA Systems for Frequency Selective Fading Channels A Frequency Doain Approach to Design Constrained Aplitude Spreading Sequences for DS-CDMA Systes for Frequency Selective Fading Channels B.J.Peiris, K.R.Narayanan and S.L. Miller Dept. of Electrical Engineering

More information

Iterative Receiver Signal Processing for Joint Mitigation of Transmitter and Receiver Phase Noise in OFDM-Based Cognitive Radio Link

Iterative Receiver Signal Processing for Joint Mitigation of Transmitter and Receiver Phase Noise in OFDM-Based Cognitive Radio Link Iterative Receiver Signal Processing for Joint Mitigation of Transitter and Receiver Phase Noise in OFDM-Based Cognitive Radio Link Ville Syrjälä and Mikko Valkaa Departent of Counications Engineering

More information

Enhanced Algorithm for MIESM

Enhanced Algorithm for MIESM Recent Patents on Signal Processing, 9,, -7 Enhanced Algorith for MIESM R. Sandanalakshi *, Shahid Mutaz * and Kazi Saidul * Open Access University of Aveiro, Aveiro, Portugal Abstract: The link adaptation

More information

REPORT ITU-R SA Telecommunication characteristics and requirements for space VLBI systems

REPORT ITU-R SA Telecommunication characteristics and requirements for space VLBI systems Rep. ITU-R SA.2132 1 REPORT ITU-R SA.2132 Telecounication characteristics and requireents for space VLBI systes (2008) This Report describes the characteristics of the space VLBI systes. These characteristics

More information

Cognitive Radio Network Setup without a Common Control Channel

Cognitive Radio Network Setup without a Common Control Channel Cognitive Radio Network Setup without a Common Control Channel Yogesh R Kondareddy*, Prathima Agrawal* and Krishna Sivalingam *Electrical and Computer Engineering, Auburn University, E-mail: {kondayr,

More information

Comparison Between PLAXIS Output and Neural Network in the Guard Walls

Comparison Between PLAXIS Output and Neural Network in the Guard Walls Coparison Between PLAXIS Output and Neural Network in the Guard Walls Ali Mahbod 1, Abdolghafar Ghorbani Pour 2, Abdollah Tabaroei 3, Sina Mokhtar 2 1- Departent of Civil Engineering, Shahid Bahonar University,

More information

Packet Loss and Delay Combined Optimization for Satellite Channel Bandwidth Allocation Controls

Packet Loss and Delay Combined Optimization for Satellite Channel Bandwidth Allocation Controls Packet Loss and Delay obined Optiiation for Satellite hannel Bandwth Allocation ontrols Igor Bisio Meber, IEEE, Mario Marchese Senior Meber, IEEE DIST - Departent of ounication, oputer and Syste Science

More information

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math Sarter Balanced Assessent Consortiu Clais, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents

More information

New Characteristics Analysis Considering Transmission Distance and Load Variation in Wireless Power Transfer via Magnetic Resonant Coupling

New Characteristics Analysis Considering Transmission Distance and Load Variation in Wireless Power Transfer via Magnetic Resonant Coupling New Characteristics nalysis Considering Transission Distance and oad Variation in Wireless Power Transfer via Magnetic Resonant Coupling Masaki Kato, Takehiro ura, Yoichi Hori The Departent of dvanced

More information

Track-Before-Detect for an Active Towed Array Sonar

Track-Before-Detect for an Active Towed Array Sonar 17-20 Noveber 2013, Victor Harbor, Australia Track-Before-Detect for an Active Towed Array Sonar Han X. Vu (1,2), Sauel J. Davey (1,2), Fiona K. Fletcher (1), Sanjeev Arulapala (1,2), Richard Elle (1)

More information

Analysis and Comparison of Time Replica and Time Linear Interpolation for Pilot Aided Channel Estimation in OFDM Systems

Analysis and Comparison of Time Replica and Time Linear Interpolation for Pilot Aided Channel Estimation in OFDM Systems Int J Counications Networ and Syste Sciences 010 3 446-45 doi:10436/ijcns01035059 Published Online May 010 (http://wwwsciporg/journal/ijcns/) Analysis and Coparison of Tie eplica and Tie inear Interpolation

More information

A soft decision decoding of product BCH and Reed-Müller codes for error control and peak-factor reduction in OFDM

A soft decision decoding of product BCH and Reed-Müller codes for error control and peak-factor reduction in OFDM A soft decision decoding of product BCH and Reed-Müller codes for error control and pea-factor reduction in OFDM Yves LOUET *, Annic LE GLAUNEC ** and Pierre LERAY ** * PhD Student and ** Professors, Departent

More information

A NEW APPROACH TO UNGROUNDED FAULT LOCATION IN A THREE-PHASE UNDERGROUND DISTRIBUTION SYSTEM USING COMBINED NEURAL NETWORKS & WAVELET ANALYSIS

A NEW APPROACH TO UNGROUNDED FAULT LOCATION IN A THREE-PHASE UNDERGROUND DISTRIBUTION SYSTEM USING COMBINED NEURAL NETWORKS & WAVELET ANALYSIS A NEW APPROACH TO UNGROUNDED FAULT LOCATION IN A THREE-PHASE UNDERGROUND DISTRIBUTION SYSTEM USING COMBINED NEURAL NETWORKS & WAVELET ANALYSIS Jaal Moshtagh University of Bath, UK oshtagh79@yahoo.co Abstract

More information

Detection of Faults in Power System Using Wavelet Transform and Independent Component Analysis

Detection of Faults in Power System Using Wavelet Transform and Independent Component Analysis Detection of Faults in Power Syste Using Wavelet Transfor and Independent Coponent Analysis 1 Prakash K. Ray, 2 B. K. Panigrahi, 2 P. K. Rout 1 Dept. of Electrical and Electronics Engineering, IIIT, Bhubaneswar,

More information

Performance Analysis of Atmospheric Field Conjugation Adaptive Arrays

Performance Analysis of Atmospheric Field Conjugation Adaptive Arrays Perforance Analysis of Atospheric Field Conjugation Adaptive Arrays Aniceto Belonte* a, Joseph M. Kahn b a Technical Univ. of Catalonia, Dept. of Signal Theory and Coun., 08034 Barcelona, Spain; b Stanford

More information