Mitigating Primary User Emulation Attacks in Dynamic Spectrum Access Networks using Hypothesis Testing

Size: px
Start display at page:

Download "Mitigating Primary User Emulation Attacks in Dynamic Spectrum Access Networks using Hypothesis Testing"

Transcription

1 Mitigating Pimay Use Emulation Attacks in Dynamic Spectum Access Netwoks using Hypothesis Testing Z. Jin S. An K. P. Subbalakshmi Depatment of Electical Compute Engineeing Stevens Institute of Technology, Hoboken, New Jesey, USA We pesent a Neyman-Peason composite hypothesis test (NPCHT) a Wald s sequential pobability atio test (WSPRT) to detect pimay use emulation attacks (PUEA) in cognitive adio netwoks. Most appoaches in the liteatue on PUEA assume the pesence of undelying senso netwoks fo localization of the malicious nodes. Thee ae no analytical studies available in the liteatue to study PUEA in the pesence of multiple malicious uses in fading wieless envionments. We pesent an NPCHT WSPRT based analysis to detect PUEA in fading wieless channels in the pesence of multiple omly located malicious uses. We show that thee is a ange of netwok adii in which PUEA ae most successful. Results also show that fo the same desied theshold on the pobability of missing the pimay, WSPRT can achieve a pobability of successful PUEA 5% less than that obtained by NPCHT. I. Intoduction Taditionally, adio spectum bs have been assigned to license holdes o sevices on a long tem basis fo lage geogaphical egions. This fixed spectum assignment policy has led to unde-utilization of the available spectum. The inefficiency in spectum usage the limited availability of spectum have given ise to cognitive adio enabled dynamic spectum access (DSA) as a new communication paadigm [], [], []. Seconday nodes in a DSA netwoks can use the licensed spectum bs when it is idle, unde the condition that they vacate it upon the etun of the pimay licensed uses (incumbent, pimay uses). In the est of the pape, we use the tem pimay o incumbent to efe to the licensed, high pioity use the tem seconday to denote the unlicensed uses. One example of cognitive adio netwoks (CRN) is the usage of unused spectum in the TV b. The TV tansmitte eceives ae pimay uses who ae licensed to use these bs. Othe uses who access the white spaces in the TV b on an ad-hoc basis ae temed seconday uses. The IEEE 8. woking goup on wieless egional aea netwoks [] povides the physical laye medium access contol specifications fo usage of the TV white spaces. The FCC s mated spectum policy efom [5] has esulted in a geat deal of eseach activities on vaious aspects of CRN including spectum sens- This wok was suppoted in pat by NSF Cybe Tust Gant No ing management, netwok achitectues, capacity, codes, tansmission techniques, spectum etiquette evacuation potocols as well as test-bed development. Stadization effots fo DSA netwoks include the IEEE Stads Coodinating Committee (IEEE SCC) s sponsoed pojects as well as IEEE 8. [6]. Spectum sensing in DSA is essential both fo identification of empty spectal bs (white spaces) as well as fo pompt evacuation upon the etun of incumbent. Potocols fo sensing pimay tansmission spectum evacuation can be found in [7], [8]. Pimay tansmitte detection techniques include enegy detection, cyclostationay featue detection matched filte detection []. Among these, enegy based detection is geneally moe popula due to ease of implementation. Despite the body of wok on othe aspects of CRN, eseach on secuity issues is still in its nascence [9]- [7]. In the paticula case of DSA netwoks, it can be agued that in ode to stage a denial-of-sevice (DoS) attack at the sensing level, it is necessay to affect the decision on pimay activity duing the sensing phase. This can be done in one of the following ways: (a) some malicious nodes can tansmit spuious signals that emulate the pimay use pimay use emulation attacks (PUEA) [], [], [6], [7]; (b) the spectum sensing nodes can lie about the spectum data (Byzantine attack) []; (c) by making use of the weaknesses of existing potocols fo evacuation [9] o (d) by modifying messages passed between the sens-

2 ing nodes the centalized decision make []. In this pape we study DoS attacks via pimay use emulation. In this type of attacks, a set of malicious seconday uses could foge the essential chaacteistics of the pimay signal tansmission to make othe good seconday uses believe that the pimay use is pesent when it is not. The seconday uses following nomal spectum evacuation pocess (the good uses) will vacate the spectum unnecessaily, esulting in what ae known as the pimay use emulation attacks (PUEA). PUEA become easie when enegy detection based mechanisms ae used fo identification of pimay activity, since the detecto only checks eceived enegy against a theshold athe than look fo paticula signal chaacteistics. Chen et al [] popose two mechanisms to detect PUEA: distance atio test distance diffeence test based on the coelation between the length of wieless link the eceived signal stength. They conside a single malicious use in a non-fading wieless envionment detect PUEA using the atio the diffeence, espectively, of the distances fom pimay tansmitte the malicious use, to the seconday uses equipped with global positioning system (GPS). In [], Chen et al discuss defense against PUEA by localization of the suspect tansmission via an undelying senso netwok compaing it with the known location of the pimay tansmitte. A mitigation technique fo DoS attacks aising fom faudulent epoting of sensing esults by malicious nodes is studied in []. The PUEA methods descibed thus fa do not take into account, the fading chaacteistics of the wieless envionment equie estimation of the location of the malicious uses via eithe a dedicated senso netwok o via significant enhancement of the seconday nodes themselves. The fist analytical expession fo the pobability of successful PUEA based on enegy detection was deived in [6], whee we modeled the eceived powe at a seconday use as a log-nomally distibuted om vaiable used Fenton s appoximation to detemine the mean the vaiance of this distibution. This was then used to detemine, a lowe bound on the pobability of successful PUEA using Makov inequality. In this pape, we popose a Neyman- Peason composite hypothesis test (NPCHT) a Wald s sequential pobability atio test (WSPRT) to detect PUEA in fading wieless envionments, without assuming additional featues to the seconday nodes o the pesence of dedicated senso nodes to assist in gatheing infomation about the diection of eceived signal. Fenton s appoximation is used to model the eceived powe at the seconday use fom the tansmission of the malicious uses. Simulations confim the theoetical esult that NPCHT allows the seconday use to keep the pobability of missing the pimay aound a desied theshold while tying to minimize the pobability of successful PUEA. Since the NPCHT cannot simultaneously povide a cap on the pobability of missing the pimay as well as the pobability of a successful PUEA, we develop the WSPRT, which will allow us this flexibility in etun fo some added time complexity, in tems of numbe of obsevations needed to aive at a decision. We show that with modest incease in computation, it is possible to mitigate PUEA significantly even when using only the enegy based detection. The est of the pape is oganized as follows. Section II pesents the system model the assumptions made to fomulate the poblem. The NPCHT as well as the WSPRT ae fomulated solved in Section III. In Section IV, we povide the simulation esults discussion. Section V pesents the conclusion. II. System Model In ou model all seconday malicious uses ae distibuted in a cicula gid of adius R as shown in Fig.. A pimay use is located at a distance of at least d p fom all othe uses. We conside enegy based mechanisms to detect the pesence of the pimay. Typical enegy based detection methods assume that the pimay is pesent if the eceived signal stength is -9dBm []. Such a sensing technique will cause seious secuity issues if malicious uses exist in the netwok. As descibed ealie, this detection method is susceptible to PUEA. In ode to mitigate this theat, we devise two hypothesis based testing mechanisms to decide if the pimay is tansmitting o if an attack is in pogess. The assumptions mathematical teminologies needed to deive the hypothesis tests ae listed below.. Thee is no communication o co-opeation between the seconday uses. The PUEA on each seconday use can be analyzed independent of each othe.. Thee ae M malicious uses in the system. M is a geometically distibuted om vaiable with the mean E[M] known to the seconday uses.. The pimay tansmitte is at a minimum distance of d p fom all the uses.. The positions of the seconday the malicious uses ae unifomly distibuted in the cicula

3 gid of adius R, thei positions ae statistically independent of each othe. 5. Fo the seconday use fixed at pola co-odinates (, θ ), no malicious uses ae pesent within a cicle of adius R centeed at (, θ ). We call R the exclusive distance fom the seconday use. Without this estiction, the powe eceived due to tansmission fom any subset of malicious uses pesent within this gid will be much lage than that due to a tansmission fom a pimay tansmitte thus esulting in failed PUEA all the time [6]. We use the pola coodinate system fo the est of the pape. 6. The co-odinates of the pimay tansmitte ae known to all the uses in the system. R R dp Good Seconday Use Malicious Seconday Use Pimay Tansmitte Figue : A typical cognitive adio netwok in a cicula gid of adius R consisting of good seconday uses malicious seconday uses. No malicious uses ae pesent within a adius R about each good seconday use. A pimay tansmitte is located at a distance of at least d p fom all othe uses. 7. The pimay tansmits at a powe P t the malicious at a powe P m. Malicious nodes do not use powe contol. 8. The RF signals fom the pimay tansmitte the malicious uses undego path loss lognomal shadowing. The Rayleigh fading is assumed to be aveaged out can hence be ignoed. This is because, the pobabilities scale linealy with the mean of the Rayleigh fading,, (as shown in [6]) = in most cases [8]. 9. The shadowing loss (expessed in db) at any seconday use both fom the pimay tansmitte fom any malicious use is nomally distibuted with mean vaiance σ p σ m, espectively.. We conside a fee space popagation model fo the signal fom the pimay tansmitte a III. two-ay gound model fo the signal fom the malicious uses thus esulting in a path loss exponent of fo the popagation fom the pimay tansmitte a path loss exponent of fo the popagation fom the malicious uses. This is because, the pimay tansmitte is so fa away fom the seconday malicious uses that the signal due to multi-path can be neglected. Howeve, the distances fom malicious uses ae not lage enough to ignoe the effects of multi-path [6]. Analytical Model Since thee is no co-opeation between the seconday uses, the pobability of PUEA on any use is the same as that on any othe use. Hence, without loss of geneality, we analyze the pobability density function (pdf) of the eceived signal at one seconday use. We tansfom the co-odinates of all malicious uses such that the seconday use of inteest lies at the oigin (i.e., at (, )). The tansfomed co-odinates of the pimay will then be (d p, θ p ). Note that the tansfomed co-odinates of the pimay will depend on the actual location of the seconday use of inteest will not be (d p, θ p ) fo all the seconday uses. Howeve, typically, d p >> R hence it is justified to appoximate the co-odinates of the pimay use to be (d p, θ p ) iespective of which seconday use we conside fo the analysis. The scenaio with the tansfomed co-odinates is shown in Fig.. By assumptions. 5. in Section II, all malicious nodes ae unifomly distibuted in the annula egion with adii R R. In ode to obtain a hypothesis test using NPCHT WSPRT, it is essential to obtain the pdf of the eceived signal at the seconday use due to tansmission by the pimay the malicious uses. We fist descibe the analysis to obtain the pdf in Section III.A. R R dp Good Seconday Use Malicious Seconday Use Pimay Tansmitte Figue : Scenaio with tansfomed co-odinates. The seconday use of inteest is at (,). Malicious uses ae unifomly distibuted in the annula egion (R, R). The pimay is at (d p, θ p ).

4 III.A. Pobability Density Function of the Received Signal Conside M malicious uses located at co-odinates ( j, θ j ) j M, whee M is a geometically distibuted om vaiable. The pobability mass function (pmf) of M, P {M = k} is theefoe given by P {M = k} = ( p) k p k =,,..., () whee p = E[M]. Fom assumptions. 5. in Section II, the position of the j th malicious use is unifomly distibuted in the annula egion between R R. Also, j θ j ae statistically independent j. The pdf of j, p( j ) is theefoe given by p( j ) = { j R R j [R, R] othewise, () while θ j is unifomly distibuted in ( π, π) j. The eceived powe at the seconday use fom the pimay tansmitte, P (p), is given by P (p) = P t d p G p, () whee G p = ξp ξ p N (, σp) as mentioned in Section II. Since P t d p ae fixed, the pdf of P (p), p (P ) (γ), follows a log-nomal distibution can be witten as p (P ) (γ) = whee A = Aσ p πγ exp ln ( log γ µ p) σ p, () µ p = log P t log d p. (5) The total eceived powe at the seconday node fom all M malicious uses is given by = M j= P m d j G j, (6) whee d j is the distance between the j th malicious use the seconday use G j is the shadowing between the j th malicious use the seconday use. As mentioned in Section II, G j = ξ j, whee ξ j N (, σm). Conditioned on the positions of all the malicious uses, each tem in the summation in the ight h side of Eqn. (6) is a log-nomally distibuted om vaiable of the fom ω j, whee ω j N (µ j, σm), whee µ j = log P m log d j. (7) As we had explained in [6], conditioned on the positions of all the malicious uses, P (m) can be appoximated as a log-nomally distibuted om vaiable whose mean vaiance can be obtained by using Fenton s method [9]. The pdf of P (m) conditioned on the positions of all M malicious uses, p (m) χ (χ ), can be witten as p (m) χ (χ ) = exp ( log χ ˆµ M ), (8) Aˆσ M πχ ˆσ M whee is the vecto with elements M ˆσ M ˆµ M ae given by ˆσ M = A ln ˆµ M = A ln p (m) (χ) = + (ea σm ) M j= eaµ j ( M j= eaµ j) (9) M j= e Aµ j A (ˆσ M σ m), () espectively. The pdf of the eceived powe fom all M malicious uses, p (m) (χ), can then be obtained by aveaging Eqn. (8) ove,, M can be witten as X "Z k= whee p( M) = [R,R] M p(m) χ (χ )p( M)d # P {M = k}, () M p( j ), p( j ) can be obtained j= fom Eqn. (). Evaluating Eqn. () is vey complex. Howeve, Eqn. () is an integal which can be looked upon as a weighted sum of conditional pdf s, each of which is log-nomal. Theefoe, applying Fenton s appoximation fo the weighted sum, the expession fo the pdf p (m) (χ) in Eqn. () can be appoximated as a lognomal distibution with paametes µ χ σ χ of the fom p (m) (χ) = Aσ χ πχ exp ( log χ µ χ) σ χ. () If P (m) is a log-nomally distibuted om vaiable with pdf given in Eqn. (), σχ µ χ can be The expessions in Eqns. (9) () can be obtained by following the steps specified in the Appendix in [6]. The expessions in Eqns. (8) () should also be conditioned aveaged ove the co-odinates ( hence have integations ove) θ, θ,, θ M. Howeve, fom Eqns. (7), (9) (), it is obseved that the expessions ae independent of θ, θ,, θ M. Theefoe, it is sufficient if the aveaging ( integations) ae pefomed ove,,, M.

5 obtained as in [] ( σχ = A ln V a µ χ = 6 A ln V a P (m) E [ ) + E [ P (m) i E hp (m) ] + E h ] () i 7 5. () Fom Eqn. (8),[ the expectation ] of P (m) conditioned on M, E P (m) M, the vaiance of ( ) P (m), V a P (m) M, can be obtained by aveaging [ ] ( ) E P (m) V a P (m) ove,,, M can be obtained in closed-fom as [ ] E P (m) M = MP m R e A σm, (5) R " V a M = MP m ea σ m R R 6R6 [ Theefoe, E ) can be calculated as [ E V a ] ] 6 R 6 R R ( V a! e A σ m R R #. (6) [ [ ]] = E E P (m) M, (7) h i i = E V a M + V a E h M. (8) Substituting the above expessions in Eqns. () (), we evaluate σ χ µ χ, which, in tun, can be substituted in Eqn. () to evaluate the pdf p (m) (χ). III.B. Neyman-Peason Composite Hypothesis Test to detect PUEA The Neyman-Peason composite hypothesis test can be used to distinguish between two hypotheses, given some constaints on the miss pobability. In ou case, the two hypotheses ae: H : H : Pimay tansmission in pogess Emulation attack in pogess. (9) The obsevation space is the sample space of eceived powe measued at the seconday use. It is obseved that thee ae two kinds of isks incued by a seconday use in this hypothesis test. False Alam: When the actual tansmission is made by malicious uses but the seconday decides that the tansmission is due to the pimay. In ou case, this is also the pobability of a successful PUEA. Miss: When the actual tansmission is made by the pimay tansmitte but the seconday decides that the tansmission is due to the malicious uses. This is a seious concen if the good seconday does not wish to violate the spectum etiquette. The Neyman-Peason citeion allows the seconday to minimize the pobability of successful PUEA while fixing the pobability of missing the pimay use at a desied theshold, α. The decision vaiable, Λ, is given by Λ = p(m) (x) p (P ) (x), () whee x is the measued powe of the eceived signal. In the above, p (P ) (x) p (m) (x) ae given by Eqns. () (), espectively. The decision is then made based on the following citeion: Λ λ Λ λ D : Pimay tansmission D : PUEA in pogess, () whee λ satisfies the constaint that miss pobability, P {D H }, is fixed at α, i.e., P {D H } = p (P ) (x)dx = α. () Λ λ The pobability of successful PUEA can be witten as P {D H } = p (m) (x)dx. () Λ λ We can also epesent the above detection statistic in shoth notation as Λ D D λ. () Let the eceived powe in db be denoted by y let a = σp σχ b = µ χ σχ µ p σp c = µ p σp µ χ σχ + ln σ p ln σ χ ln λ, (5)

6 by substituting p (P ) (x) p (m) (x), we obtain the decision statistic as: ay + by + c D D. (6) Without loss of geneality, we assume a. Let = b ac, two conditions ae of inteest: Case : a >, > The constaint of P {D H } = α can be witten as Φ b! aµ p + Φ b! + aµ p = α, (7) aσ p aσ p x whee Φ(x) = π P {D H } can be deived as P {D H } = Φ b +! aµ χ Φ aσ χ e t dt, b! aµ χ. (8) aσ χ Case : a <, > The constaint of P {D H } = α can be witten as Φ b! aµ p Φ aσ p P {D H } can be deived as P {D H } = Φ b +! aµ p = α, (9) aσ p b + aµ χ! b +! + aµ χ aσ χ + Φ. aσ χ () As is expected, the Neyman-Peason test only allows us to place a cap on one of the quantities: the miss pobability o the false alam pobability. In ou expeimental esults we found that unde cetain cicumstances, the pobability of false alam (successful PUEA) is vey high fo the desied pobability of miss. So, we now develop a Wald s sequential pobability atio test which allows the use to set thesholds fo both false alam miss pobabilities. This is possible, since Wald s test is set up to take moe than one sample obsevation if necessay to aive at a decision. III.C. Wald s Sequential Pobability Ratio Test to detect PUEA The WSPRT allows us to specify desied thesholds (α α espectively) fo both the false alam miss pobabilities. The decision vaiable afte n sequential tests, Λ n, is given by Λ n = n i= p (m) (x i ) p (P ) (x i ), () whee x i is the measued powe at the i th stage. In the above equation, p (P ) (x i ) p (m) (x i ) ae given by Eqns. () (), espectively. The decision is then made based on the following citeion: Λ n T = α α D : Pimay tansmission Λ n T = α α D : PUEA in pogess Othewise D : Take anothe obsevation. () The aveage numbe of obsevations equied to aive at a decision is given by [] E[n H k ] = { ( α ) ln T +α ln T E[f(x ) H ] k = α ln T +( α ) ln T E[f(x ) H ] k =, () whee the function f(x ) = ln Λ. Fom Eqns. (), () (), we can deive the expession fo E[f(x ) H ] E[f(x ) H ] as follows: E[f(x ) H ] = ln + µ p(σ pµ χ σ χµ p ) σ pσ χ E[f(x ) H ] = ln + µ χ(σ pµ χ σ χµ p ) σ pσ χ ( σp σ χ ) + σ χµ p σ pµ χ σ pσ χ + (σ χ σp)(σ p + µ p) σpσ χ, () ( σp σ χ ) + σ χµ p σ pµ χ σ pσ χ + σ χ σp σpσ χ (σχ + µ χ). (5) Substituting E [f(x ) H ] E [f(x ) H ] in Eqn. (), we evaluate E [n H ] E [n H ]. Based on Section IV.B, we can see that though expeimental esults of WSPRT do not pefectly match thei theoetically designed citeion, they can significantly lowe the pobability of successful PUEA than NPCHT do. The pice WSPRT pays to achieve a fine decision is to take moe obsevations. IV. Simulations We conside the following values of the system paametes fo ou numeical simulations. The vaiances fo the pimay malicious tansmissions ae assumed to be σ p = 8 σ m = 5.5, since we can model the pimay malicious tansmissions as those occuing in uban sububan envionments [8]. A pimay tansmitte (a TV towe), located at a distance of d p = km to the seconday use, has a tansmit powe of P t = kw. The tansmit powe of the malicious uses, P m, is taken to be Watts as in []. The exclusive distance fom the seconday use, R, is fixed at m, the same as in [6]. The netwok adius, R, is inceased fom m to 7m, thus changing the aveage distance fom the malicious

7 use to the seconday use accodingly. The numbe of malicious uses is assumed to be a geometically distibuted om vaiable with E[M] equal to 5. As the calculation shows, the above numeical paametes always guaantee the case whee a < δ > in the NPCHT. In ou simulations, we assume that the pimay use is modeled as a Benoulli ( ), which means that thee is equal pobability of the pimay to be ON o OFF. The pimay use tansmissions ae simulated as pe the distibution discussed ealie which includes path loss shadowing. To simulate the PUEA, we fist geneate a geometically distibuted om numbe, M, epesenting the numbe of malicious uses. We then geneate M independent identically distibuted (i.i.d.) sets of co-odinates fo M malicious uses, such that the malicious uses ae unifomly distibuted in the annulus with adii R R. The eceived powe fom the tansmission of all M malicious uses is calculated based on Eqn. (6), including path loss i.i.d. shadowing. Fo each value of R, we un, simulations. We calculate false alam pobabilities miss pobabilities by counting the numbe of times that the decision statistic meets the coesponding decision citeion. Fo WSPRT, we also ecod aveage numbe of obsevations equied to make a decision in each simulation. IV.A. Neyman-Peason Composite Hypothesis Test Results The esults of NPCHT with theoetical pobability of missing the pimay use set to α=. ae shown in Fig.. It is obseved fom Fig. (a) that the pobability of false alam ises then falls down with inceasing value of R. This is because, fo a given R, if R is small, i.e., malicious uses ae close to the seconday use, the total eceived powe fom all malicious uses is likely to be lage than that eceived fom the pimay tansmitte, thus deceasing the pobability of successful PUEA. Similaly, fo lage R, the total eceived powe fom the malicious uses may not be enough to successfully launch a PUEA. Fig. (b) shows that the expeimental pobability of missing the pimay use is always close to the equied value (within ±. of the desied value). As we lowe α fom. to., the maximum eo between the expeimental cuve the theoetical one falls fom., shown in Fig. (a), to.8, shown in Fig. (a). These discepancies exist, because we needed to make appoximations while deiving the expessions fo the eceived powe. Howeve, since the expeimental theoetical values ae not fa apat, ou appoximations ae faily good. Fom Fig. (a) Fig. (a) we note that as α is deceased, the pobability of successful PUEA inceases. This is expected, since NPCHT only allows a theshold to be set on one of these paametes. IV.B. Wald s Sequential Pobability Ratio Test Results Fig. 5 shows the esults of WSPRT with thesholds fo the pobability of successful PUEA, pobability of missing pimay use set to. each. Although the expeimental cuve in Fig. 5(a) goes above the theoetical one, we achieve much lowe pobabilities of successful PUEA compaed to Fig. (a). In fact, the maximum pobability of successful PUEA in the NP test can go as high as.778 wheeas in the Wald s test we can limit this to.7. The lowe pobabilities of successful PUEA ae achieved at the cost of moe obsevations as shown in Fig. 5(c) Fig. 5(d). It is obseved that numbe of obsevation behaves simila to the pobability cuves. This is because, moe obsevations ae always taken if a decision can not be made easily, whee decision eo pobabilities also tend to be elatively high. Note that the gap between the expeimental theoetical cuves is typical of WSPRT because, the expession fo the expected numbe of obsevations in Eqn. () is an appoximation athe than an exact expession []. Fig. 6(a) shows the esults obtained when the theshold fo PUEA is set to.. Compaing this with Fig. 5(a) we see that fo any α, it is not possible to achieve abitay lowe pobabilities of successful PUEA. Note, howeve, that it is always possible to make sue that the pobability of missing pimay use stays stictly below the equied theshold, which can be seen fom Fig. 5(b), Fig. 6(b) Fig. 7(b). This is paticulaly impotant in CRN to ensue that the secondaies still obey the spectum shaing etiquette. As both α α ae loweed to. (Fig. 7), only the expeimental cuve of miss pobability in Fig. 7(b) deceases accodingly. This indicates that it is not possible to always keep both the false alam pobability as well as the miss pobability below abitaily desied thesholds. Fom the cuves showing the numbe of obsevations equied to make a decision (Fig. 5(c), Fig. 6(c) Fig. 7(c)), it can be noticed that moe obsevations ae equied as the α α ae deceased. This is because, fom Eqn. (), as α α deceases, the theshold T deceases the theshold T inceases which effectively educes the ange of values of the

8 test statistic fo which a decision is taken. Thus, it is moe likely that the seconday use takes decision D (i.e., obseves moe samples). Theefoe, thee is a tadeoff between eliable decision time to detect. V. Conclusion We poposed a Neyman-Peason composite hypothesis test (NPCHT) a Wald s sequential pobability atio test (WSPRT) to detect pimay use emulation attacks (PUEA) in cognitive adio netwoks. Both WSPRT NPCHT esulted in a ange of adii in which PUEA wee most successful. Fo a desied theshold on the pobability of missing the pimay, WSPRT was found to achieve 5% eduction in the pobability of successful PUEA compaed to NPCHT. We ae cuently investigating the extension of ou analysis fo othe distibutions of the numbe of malicious uses, M, detemination of the best fit fo the distibution of M. The extension of ou analysis to include powe contol at the malicious uses is a topic fo futhe investigation. Refeences False Alam Pobability (P{D H (a) Pobability of successful PUEA using the NPCHT. The aveage numbe of malicious uses is fixed at 5. [] J. Mitola G. Maguie, Cognitive adio: Making softwae adios moe pesonal, IEEE Pesonal Commun., vol. 6, no., pp. 8, Aug [] S. Haykin, Cognitive adio: Bain empoweed wieless communications, IEEE Jl. on Sel. Aeas in Commun., vol., no., pp., Feb. 5. Miss Pobability (P{D H [] I. F. Akyildiz, W. Lee, M. C. Vuan, S. Mohanty, NeXt geneation/dynamic spectum access/cognitive adio wieless netwoks: A suvey, Elsevie Jl. on Compute Netwoks, vol. 5, no., pp. 7 59, Sep. 6. [] IEEE Stads fo infomation technology- Telecommunications infomation exchange between systems- Wieless Regional Aea Netwoks-Specific Requiements- Pat - Cognitive wieless RAN medium access contol (MAC) physical laye (PHY) specifications: Policies pocedues fo opeation in the TV bs, Jun (b) Pobability of missing pimay use using the NPCHT. Note that the expeimental values ae not too fa fom the desied theshold. Figue : NPCHT with theoetical pobability of missing pimay use α=.. [5] [Online]. Available: [6] C. Codeio, K. Challapali, D. Biu, S. Shanka, IEEE 8.: The fist wold-

9 .9.5. False Alam Pobability (P{D H Miss Pobability (P{D H (a) Pobability of successful PUEA using the NPCHT. The aveage numbe of malicious uses is fixed at 5. (b) Pobability of missing pimay use using the NPCHT. Note that the expeimental values ae not too fa fom the desied theshold. Figue : NPCHT with theoetical pobability of missing pimay use α= Toleated False Alam Pobability (P{D H Miss Pobability (P{D H (a) Pobability of successful PUEA (b) Pobability of missing pimay use Numbe of Obsevations (E[n H ]) 5 Numbe of Obsevations (E[n H ]) (c) Aveage numbe of obsevations when malicious uses ae tansmitting (d) Aveage numbe of obsevations when pimay use is tansmitting Figue 5: WSPRT with theoetical pobability of successful PUEA α missing pimay use α =.. =. theoetical pobability of

10 Toleated False Alam Pobability (P{D H Miss Pobability (P{D H (a) Pobability of successful PUEA (b) Pobability of missing pimay use Numbe of Obsevations (E[n H ]) 6 5 Numbe of Obsevations (E[n H ]) (c) Aveage numbe of obsevations when malicious uses ae tansmitting (d) Aveage numbe of obsevations when pimay use is tansmitting Figue 6: WSPRT with theoetical pobability of successful PUEA α missing pimay use α =.. =. theoetical pobability of

11 Toleated False Alam Pobability (P{D H Miss Pobability (P{D H (a) Pobability of successful PUEA (b) Pobability of missing pimay use Numbe of Obsevations (E[n H ]) Numbe of Obsevations (E[n H ]) (c) Aveage numbe of obsevations when malicious uses ae tansmitting (d) Aveage numbe of obsevations when pimay use is tansmitting Figue 7: WSPRT with theoetical pobability of successful PUEA α missing pimay use α =.. =. theoetical pobability of

12 wide wieless stad based on cognitive adios, Poc., IEEE Symposium of New Fonties in Dynamic Spectum Access Netwoks (DyS- PAN 5), pp. 8 7, Nov. 5. [7] E. Visotsky, S. Kuffne, R. Peteson, On collaboative detection of TV tansmission in suppot of dynamic spectum shaing, Poc., IEEE Symposium of New Fonties in Dynamic Spectum Access Netwoks (DySPAN 5), pp. 8 5, Nov. 5. [8] X. Liu Z. Ding, ESCAPE: A channel evacuation potocol fo spectum-agile netwoks, Poc., IEEE Symposium of New Fonties in Dynamic Spectum Access Netwoks (DySPAN 7), pp. 9, Ap. 7. [9] G. Jakimoski K. Subbalakshmi, Denialof-sevice attacks on dynamic spectum access netwoks, IEEE CogNets Wokshop, IEEE Intl. Conf. on Commun. (ICC 8), pp. 5 58, May 8. [] G. Jakimoski K. P. Subbalakshmi, Towads secue spectum decision, To appea, IEEE Intl. Conf. on Commun. (ICC 9), Jun. 9. [] R. Chen J. M. Pak, Ensuing tustwothy spectum sensing in cognitive adio netwoks, Poc., IEEE Wokshop on Netwoking Technol. fo Softwae Defined Radio Netwoks (SDR 6), pp. 9, Sep. 6. Fonties in Dynamic Spectum Access Netwoks (DySPAN 8), Oct. 8. [6] S. An, Z. Jin, K. P. Subbalakshmi, An analytical model fo pimay use emulation attacks in cognitive adio netwoks, Poc., IEEE Symposium of New Fonties in Dynamic Spectum Access Netwoks (DySPAN 8), Oct. 8. [7] Z. Jin, S. An, K. P. Subbalakshmi, Detecting pimay use emulation attacks in dynamic spectum access netwoks, To Appea, IEEE Intl. Conf. on Commun. (ICC 9), Jun. 9. [8] T. S. Rappapot, Wieless Communications: Pinciples Pactice. Pentice Hall Inc., New Jesey, 996. [9] L. F. Fenton, The sum of log-nomal pobability distibutions in scatte tansmission systems, IRE Tans. on Commun. Systems, vol. 8, no., pp , Ma. 96. [] S. Ross, Pobability Models. Academic Pess,. [] J. L. Melsa D. L. Cohn, Decision Estimation Theoy. McGaw-Hill Inc., 978. [] R. Chen, J. M. Pak, J. H. Reed, Defense against pimay use emulation attacks in cognitive adio netwoks, IEEE Jl. on Sel. Aeas in Commun.: Spl. Issue on Cognitive Radio Theoy Applications, vol. 6, no., pp. 5 7, Jan. 8. [] R. Chen, J. M. Pak, K. Bian, Robust distibuted spectum sensing in cognitive adio netwoks, Poc., IEEE Conf. on Comp. Commun. (INFOCOM 8), pp , Ap. 8. [] T. C. Clancy N. Goegen, Secuity in cognitive adio netwoks: Theats mitigation, Poc., Intl. Conf. on Cognitive Radio Oiented Wieless Netwoks Commum. (Cown- Com 8), May 8. [5] A. Sethi T. X. Bown, Hamme model theat assessment of cognitive adio denial of sevice attacks, Poc., IEEE Symposium of New

Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks

Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks Robust Spectu Decision Potocol against Piay Use Eulation Attacks in Dynaic Spectu Access Netwoks Z. Jin, S. Anand and K. P. Subbalakshi Depatent of Electical and Copute Engineeing Stevens Institute of

More information

Energy Savings Achievable in Connection Preserving Energy Saving Algorithms

Energy Savings Achievable in Connection Preserving Energy Saving Algorithms Enegy Savings Achievable in Connection Peseving Enegy Saving Algoithms Seh Chun Ng School of Electical and Infomation Engineeing Univesity of Sydney National ICT Austalia Limited Sydney, Austalia Email:

More information

4/18/2005. Statistical Learning Theory

4/18/2005. Statistical Learning Theory Statistical Leaning Theoy Statistical Leaning Theoy A model of supevised leaning consists of: a Envionment - Supplying a vecto x with a fixed but unknown pdf F x (x b Teache. It povides a desied esponse

More information

Chapter 3 Optical Systems with Annular Pupils

Chapter 3 Optical Systems with Annular Pupils Chapte 3 Optical Systems with Annula Pupils 3 INTRODUCTION In this chapte, we discuss the imaging popeties of a system with an annula pupil in a manne simila to those fo a system with a cicula pupil The

More information

Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks

Modeling Primary User Emulation Attacks and Defenses in Cognitive Radio Networks Modeling Pimay Use Emulation Attacks and efenses in Cognitive Radio Netwoks Zesheng Chen, Todo Cooklev, Chao Chen, and Calos Pomalaza-Ráez Indiana Univesity - Pudue Univesity Fot Wayne Fot Wayne, IN 46805

More information

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution Statistics Reseach Lettes Vol. Iss., Novembe Cental Coveage Bayes Pediction Intevals fo the Genealized Paeto Distibution Gyan Pakash Depatment of Community Medicine S. N. Medical College, Aga, U. P., India

More information

Revision of Lecture Eight

Revision of Lecture Eight Revision of Lectue Eight Baseband equivalent system and equiements of optimal tansmit and eceive filteing: (1) achieve zeo ISI, and () maximise the eceive SNR Thee detection schemes: Theshold detection

More information

Performance Analysis of Rayleigh Fading Ad Hoc Networks with Regular Topology

Performance Analysis of Rayleigh Fading Ad Hoc Networks with Regular Topology Pefomance Analysis of Rayleigh Fading Ad Hoc Netwoks with Regula Topology Xiaowen Liu and Matin Haenggi Depatment of Electical Engineeing Univesity of Note Dame Note Dame, IN 6556, USA {xliu, mhaenggi}@nd.edu

More information

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms

Pearson s Chi-Square Test Modifications for Comparison of Unweighted and Weighted Histograms and Two Weighted Histograms Peason s Chi-Squae Test Modifications fo Compaison of Unweighted and Weighted Histogams and Two Weighted Histogams Univesity of Akueyi, Bogi, v/noduslód, IS-6 Akueyi, Iceland E-mail: nikolai@unak.is Two

More information

3.1 Random variables

3.1 Random variables 3 Chapte III Random Vaiables 3 Random vaiables A sample space S may be difficult to descibe if the elements of S ae not numbes discuss how we can use a ule by which an element s of S may be associated

More information

Fresnel Diffraction. monchromatic light source

Fresnel Diffraction. monchromatic light source Fesnel Diffaction Equipment Helium-Neon lase (632.8 nm) on 2 axis tanslation stage, Concave lens (focal length 3.80 cm) mounted on slide holde, iis mounted on slide holde, m optical bench, micoscope slide

More information

Surveillance Points in High Dimensional Spaces

Surveillance Points in High Dimensional Spaces Société de Calcul Mathématique SA Tools fo decision help since 995 Suveillance Points in High Dimensional Spaces by Benad Beauzamy Januay 06 Abstact Let us conside any compute softwae, elying upon a lage

More information

Experiment I Voltage Variation and Control

Experiment I Voltage Variation and Control ELE303 Electicity Netwoks Expeiment I oltage aiation and ontol Objective To demonstate that the voltage diffeence between the sending end of a tansmission line and the load o eceiving end depends mainly

More information

Swissmetro: design methods for ironless linear transformer

Swissmetro: design methods for ironless linear transformer Swissmeto: design methods fo ionless linea tansfome Nicolas Macabey GESTE Engineeing SA Scientific Pak PSE-C, CH-05 Lausanne, Switzeland Tel (+4) 2 693 83 60, Fax. (+4) 2 693 83 6, nicolas.macabey@geste.ch

More information

APPLICATION OF MAC IN THE FREQUENCY DOMAIN

APPLICATION OF MAC IN THE FREQUENCY DOMAIN PPLICION OF MC IN HE FREQUENCY DOMIN D. Fotsch and D. J. Ewins Dynamics Section, Mechanical Engineeing Depatment Impeial College of Science, echnology and Medicine London SW7 2B, United Kingdom BSRC he

More information

TELE4652 Mobile and Satellite Communications

TELE4652 Mobile and Satellite Communications Mobile and Satellite Communications Lectue 3 Radio Channel Modelling Channel Models If one was to walk away fom a base station, and measue the powe level eceived, a plot would like this: Channel Models

More information

ASTR415: Problem Set #6

ASTR415: Problem Set #6 ASTR45: Poblem Set #6 Cuan D. Muhlbege Univesity of Mayland (Dated: May 7, 27) Using existing implementations of the leapfog and Runge-Kutta methods fo solving coupled odinay diffeential equations, seveal

More information

IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 62, NO. 2, FEBRUARY

IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 62, NO. 2, FEBRUARY IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 62, NO. 2, FEBRUARY 214 699 Outage Pobability in Abitaily-Shaped Finite Wieless Netwoks Jing Guo, Student Membe, IEEE, Salman Duani, Senio Membe, IEEE, and Xiangyun

More information

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra Poceedings of the 006 IASME/SEAS Int. Conf. on ate Resouces, Hydaulics & Hydology, Chalkida, Geece, May -3, 006 (pp7-) Analytical Solutions fo Confined Aquifes with non constant Pumping using Compute Algeba

More information

Information Retrieval Advanced IR models. Luca Bondi

Information Retrieval Advanced IR models. Luca Bondi Advanced IR models Luca Bondi Advanced IR models 2 (LSI) Pobabilistic Latent Semantic Analysis (plsa) Vecto Space Model 3 Stating point: Vecto Space Model Documents and queies epesented as vectos in the

More information

Spectrum Sensing Using Energy Detectors with Performance Computation Capabilities

Spectrum Sensing Using Energy Detectors with Performance Computation Capabilities th Euopean Signal Pocessing Confeence (EUSIPCO Spectum Sensing Using Enegy etectos with Pefomance Computation Capabilities Luca Rugini, Paolo Banelli epatment of Engineeing Univesity of Peugia Peugia,

More information

The geometric construction of Ewald sphere and Bragg condition:

The geometric construction of Ewald sphere and Bragg condition: The geometic constuction of Ewald sphee and Bagg condition: The constuction of Ewald sphee must be done such that the Bagg condition is satisfied. This can be done as follows: i) Daw a wave vecto k in

More information

Goodness-of-fit for composite hypotheses.

Goodness-of-fit for composite hypotheses. Section 11 Goodness-of-fit fo composite hypotheses. Example. Let us conside a Matlab example. Let us geneate 50 obsevations fom N(1, 2): X=nomnd(1,2,50,1); Then, unning a chi-squaed goodness-of-fit test

More information

MATH 415, WEEK 3: Parameter-Dependence and Bifurcations

MATH 415, WEEK 3: Parameter-Dependence and Bifurcations MATH 415, WEEK 3: Paamete-Dependence and Bifucations 1 A Note on Paamete Dependence We should pause to make a bief note about the ole played in the study of dynamical systems by the system s paametes.

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Physics Department Physics 8.07: Electromagnetism II September 15, 2012 Prof. Alan Guth PROBLEM SET 2

MASSACHUSETTS INSTITUTE OF TECHNOLOGY Physics Department Physics 8.07: Electromagnetism II September 15, 2012 Prof. Alan Guth PROBLEM SET 2 MASSACHUSETTS INSTITUTE OF TECHNOLOGY Physics Depatment Physics 8.07: Electomagnetism II Septembe 5, 202 Pof. Alan Guth PROBLEM SET 2 DUE DATE: Monday, Septembe 24, 202. Eithe hand it in at the lectue,

More information

Chapter 13 Gravitation

Chapter 13 Gravitation Chapte 13 Gavitation In this chapte we will exploe the following topics: -Newton s law of gavitation, which descibes the attactive foce between two point masses and its application to extended objects

More information

DOING PHYSICS WITH MATLAB COMPUTATIONAL OPTICS

DOING PHYSICS WITH MATLAB COMPUTATIONAL OPTICS DOING PHYIC WITH MTLB COMPUTTIONL OPTIC FOUNDTION OF CLR DIFFRCTION THEORY Ian Coope chool of Physics, Univesity of ydney ian.coope@sydney.edu.au DOWNLOD DIRECTORY FOR MTLB CRIPT View document: Numeical

More information

Tailoring Materials and Radiation to Explore Cloaking Phenomena

Tailoring Materials and Radiation to Explore Cloaking Phenomena Tailoing Mateials and Radiation to Exploe Cloaking Phenomena Jonathan Samoajski Septembe 22, 2009 1 Intoduction Radiation-matte inteaction is vey impotant in enegy eseach, especially in the aeas of fusion

More information

Introduction to Mathematical Statistics Robert V. Hogg Joeseph McKean Allen T. Craig Seventh Edition

Introduction to Mathematical Statistics Robert V. Hogg Joeseph McKean Allen T. Craig Seventh Edition Intoduction to Mathematical Statistics Robet V. Hogg Joeseph McKean Allen T. Caig Seventh Edition Peason Education Limited Edinbugh Gate Halow Essex CM2 2JE England and Associated Companies thoughout the

More information

6 PROBABILITY GENERATING FUNCTIONS

6 PROBABILITY GENERATING FUNCTIONS 6 PROBABILITY GENERATING FUNCTIONS Cetain deivations pesented in this couse have been somewhat heavy on algeba. Fo example, detemining the expectation of the Binomial distibution (page 5.1 tuned out to

More information

The Substring Search Problem

The Substring Search Problem The Substing Seach Poblem One algoithm which is used in a vaiety of applications is the family of substing seach algoithms. These algoithms allow a use to detemine if, given two chaacte stings, one is

More information

Black Body Radiation and Radiometric Parameters:

Black Body Radiation and Radiometric Parameters: Black Body Radiation and Radiometic Paametes: All mateials absob and emit adiation to some extent. A blackbody is an idealization of how mateials emit and absob adiation. It can be used as a efeence fo

More information

Absorption Rate into a Small Sphere for a Diffusing Particle Confined in a Large Sphere

Absorption Rate into a Small Sphere for a Diffusing Particle Confined in a Large Sphere Applied Mathematics, 06, 7, 709-70 Published Online Apil 06 in SciRes. http://www.scip.og/jounal/am http://dx.doi.og/0.46/am.06.77065 Absoption Rate into a Small Sphee fo a Diffusing Paticle Confined in

More information

COMPUTATIONS OF ELECTROMAGNETIC FIELDS RADIATED FROM COMPLEX LIGHTNING CHANNELS

COMPUTATIONS OF ELECTROMAGNETIC FIELDS RADIATED FROM COMPLEX LIGHTNING CHANNELS Pogess In Electomagnetics Reseach, PIER 73, 93 105, 2007 COMPUTATIONS OF ELECTROMAGNETIC FIELDS RADIATED FROM COMPLEX LIGHTNING CHANNELS T.-X. Song, Y.-H. Liu, and J.-M. Xiong School of Mechanical Engineeing

More information

Closed-form Formulas for Ergodic Capacity of MIMO Rayleigh Fading Channels

Closed-form Formulas for Ergodic Capacity of MIMO Rayleigh Fading Channels Closed-fom Fomulas fo Egodic Capacity of MIMO Rayleigh Fading Channels Hyundong Shin and Jae Hong Lee School of Electical Engineeing Seoul National Univesity Shillim-dong, Gwanak-gu, Seoul 151-742, Koea

More information

11) A thin, uniform rod of mass M is supported by two vertical strings, as shown below.

11) A thin, uniform rod of mass M is supported by two vertical strings, as shown below. Fall 2007 Qualifie Pat II 12 minute questions 11) A thin, unifom od of mass M is suppoted by two vetical stings, as shown below. Find the tension in the emaining sting immediately afte one of the stings

More information

The condition for maximum intensity by the transmitted light in a plane parallel air film is. For an air film, μ = 1. (2-1)

The condition for maximum intensity by the transmitted light in a plane parallel air film is. For an air film, μ = 1. (2-1) hapte Two Faby--Peot ntefeomete A Faby-Peot intefeomete consists of two plane paallel glass plates A and B, sepaated by a distance d. The inne sufaces of these plates ae optically plane and thinly silveed

More information

Scattering in Three Dimensions

Scattering in Three Dimensions Scatteing in Thee Dimensions Scatteing expeiments ae an impotant souce of infomation about quantum systems, anging in enegy fom vey low enegy chemical eactions to the highest possible enegies at the LHC.

More information

EFFECTS OF FRINGING FIELDS ON SINGLE PARTICLE DYNAMICS. M. Bassetti and C. Biscari INFN-LNF, CP 13, Frascati (RM), Italy

EFFECTS OF FRINGING FIELDS ON SINGLE PARTICLE DYNAMICS. M. Bassetti and C. Biscari INFN-LNF, CP 13, Frascati (RM), Italy Fascati Physics Seies Vol. X (998), pp. 47-54 4 th Advanced ICFA Beam Dynamics Wokshop, Fascati, Oct. -5, 997 EFFECTS OF FRININ FIELDS ON SINLE PARTICLE DYNAMICS M. Bassetti and C. Biscai INFN-LNF, CP

More information

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM Poceedings of the ASME 2010 Intenational Design Engineeing Technical Confeences & Computes and Infomation in Engineeing Confeence IDETC/CIE 2010 August 15-18, 2010, Monteal, Quebec, Canada DETC2010-28496

More information

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0},

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0}, ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION E. J. IONASCU and A. A. STANCU Abstact. We ae inteested in constucting concete independent events in puely atomic pobability

More information

DIMENSIONALITY LOSS IN MIMO COMMUNICATION SYSTEMS

DIMENSIONALITY LOSS IN MIMO COMMUNICATION SYSTEMS DIMENSIONALITY LOSS IN MIMO COMMUNICATION SYSTEMS Segey Loya, Amma Koui School of Infomation Technology and Engineeing (SITE) Univesity of Ottawa, 6 Louis Pasteu, Ottawa, Ontaio, Canada, KN 6N5 Email:

More information

Psychometric Methods: Theory into Practice Larry R. Price

Psychometric Methods: Theory into Practice Larry R. Price ERRATA Psychometic Methods: Theoy into Pactice Lay R. Pice Eos wee made in Equations 3.5a and 3.5b, Figue 3., equations and text on pages 76 80, and Table 9.1. Vesions of the elevant pages that include

More information

Lecture 8 - Gauss s Law

Lecture 8 - Gauss s Law Lectue 8 - Gauss s Law A Puzzle... Example Calculate the potential enegy, pe ion, fo an infinite 1D ionic cystal with sepaation a; that is, a ow of equally spaced chages of magnitude e and altenating sign.

More information

Math 2263 Solutions for Spring 2003 Final Exam

Math 2263 Solutions for Spring 2003 Final Exam Math 6 Solutions fo Sping Final Exam ) A staightfowad appoach to finding the tangent plane to a suface at a point ( x, y, z ) would be to expess the cuve as an explicit function z = f ( x, y ), calculate

More information

Section 8.2 Polar Coordinates

Section 8.2 Polar Coordinates Section 8. Pola Coodinates 467 Section 8. Pola Coodinates The coodinate system we ae most familia with is called the Catesian coodinate system, a ectangula plane divided into fou quadants by the hoizontal

More information

Teachers notes. Beyond the Thrills excursions. Worksheets in this book. Completing the worksheets

Teachers notes. Beyond the Thrills excursions. Worksheets in this book. Completing the worksheets Beyond the Thills excusions Teaches notes Physics is the science of how the wold (and Univese) woks. Luna Pak Sydney is a lage hands-on physics laboatoy full of fee falling objects, otating systems and

More information

Tutorial on Strehl ratio, wavefront power series expansion, Zernike polynomials expansion in small aberrated optical systems By Sheng Yuan

Tutorial on Strehl ratio, wavefront power series expansion, Zernike polynomials expansion in small aberrated optical systems By Sheng Yuan Tutoial on Stel atio, wavefont powe seies expansion, Zenike polynomials expansion in small abeated optical systems By Seng Yuan. Stel Ratio Te wave abeation function, (x,y, is defined as te distance, in

More information

Chapter 7-8 Rotational Motion

Chapter 7-8 Rotational Motion Chapte 7-8 Rotational Motion What is a Rigid Body? Rotational Kinematics Angula Velocity ω and Acceleation α Unifom Rotational Motion: Kinematics Unifom Cicula Motion: Kinematics and Dynamics The Toque,

More information

School of Electrical and Computer Engineering, Cornell University. ECE 303: Electromagnetic Fields and Waves. Fall 2007

School of Electrical and Computer Engineering, Cornell University. ECE 303: Electromagnetic Fields and Waves. Fall 2007 School of Electical and Compute Engineeing, Conell Univesity ECE 303: Electomagnetic Fields and Waves Fall 007 Homewok 8 Due on Oct. 19, 007 by 5:00 PM Reading Assignments: i) Review the lectue notes.

More information

New problems in universal algebraic geometry illustrated by boolean equations

New problems in universal algebraic geometry illustrated by boolean equations New poblems in univesal algebaic geomety illustated by boolean equations axiv:1611.00152v2 [math.ra] 25 Nov 2016 Atem N. Shevlyakov Novembe 28, 2016 Abstact We discuss new poblems in univesal algebaic

More information

Limited Feedback Scheme for Device to Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints

Limited Feedback Scheme for Device to Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints Limited Feedback Scheme fo Device to Device Communications in 5G Cellula Netwoks with Reliability and Cellula Sececy Outage Constaints Faezeh Alavi, Nade Mokai, Mohammad R. Javan, and Kanapathippillai

More information

Supplementary Figure 1. Circular parallel lamellae grain size as a function of annealing time at 250 C. Error bars represent the 2σ uncertainty in

Supplementary Figure 1. Circular parallel lamellae grain size as a function of annealing time at 250 C. Error bars represent the 2σ uncertainty in Supplementay Figue 1. Cicula paallel lamellae gain size as a function of annealing time at 50 C. Eo bas epesent the σ uncetainty in the measued adii based on image pixilation and analysis uncetainty contibutions

More information

Motion in One Dimension

Motion in One Dimension Motion in One Dimension Intoduction: In this lab, you will investigate the motion of a olling cat as it tavels in a staight line. Although this setup may seem ovesimplified, you will soon see that a detailed

More information

B. Spherical Wave Propagation

B. Spherical Wave Propagation 11/8/007 Spheical Wave Popagation notes 1/1 B. Spheical Wave Popagation Evey antenna launches a spheical wave, thus its powe density educes as a function of 1, whee is the distance fom the antenna. We

More information

Rate Splitting is Approximately Optimal for Fading Gaussian Interference Channels

Rate Splitting is Approximately Optimal for Fading Gaussian Interference Channels Rate Splitting is Appoximately Optimal fo Fading Gaussian Intefeence Channels Joyson Sebastian, Can Kaakus, Suhas Diggavi, I-Hsiang Wang Abstact In this pape, we study the -use Gaussian intefeence-channel

More information

Chem 453/544 Fall /08/03. Exam #1 Solutions

Chem 453/544 Fall /08/03. Exam #1 Solutions Chem 453/544 Fall 3 /8/3 Exam # Solutions. ( points) Use the genealized compessibility diagam povided on the last page to estimate ove what ange of pessues A at oom tempeatue confoms to the ideal gas law

More information

FREE SPACE OPTICS - MEASUREMENT OF TRANSMISSION QUALITY LINK PARAMETERS

FREE SPACE OPTICS - MEASUREMENT OF TRANSMISSION QUALITY LINK PARAMETERS FREE SPACE OPTICS - MEASUREMENT OF TRANSMISSION QUALITY LINK PARAMETERS Pavel Hovořák, Otaka Wilfet Depatment of Radioelectonics, Bno Univesity of Technology, Faculty of Electical Engineeing and Communication,

More information

Chapter 5 Linear Equations: Basic Theory and Practice

Chapter 5 Linear Equations: Basic Theory and Practice Chapte 5 inea Equations: Basic Theoy and actice In this chapte and the next, we ae inteested in the linea algebaic equation AX = b, (5-1) whee A is an m n matix, X is an n 1 vecto to be solved fo, and

More information

Graphs of Sine and Cosine Functions

Graphs of Sine and Cosine Functions Gaphs of Sine and Cosine Functions In pevious sections, we defined the tigonometic o cicula functions in tems of the movement of a point aound the cicumfeence of a unit cicle, o the angle fomed by the

More information

Lecture 2 Date:

Lecture 2 Date: Lectue 2 Date: 5.1.217 Definition of Some TL Paametes Examples of Tansmission Lines Tansmission Lines (contd.) Fo a lossless tansmission line the second ode diffeential equation fo phasos ae: LC 2 d I

More information

STUDY ON 2-D SHOCK WAVE PRESSURE MODEL IN MICRO SCALE LASER SHOCK PEENING

STUDY ON 2-D SHOCK WAVE PRESSURE MODEL IN MICRO SCALE LASER SHOCK PEENING Study Rev. Adv. on -D Mate. shock Sci. wave 33 (13) pessue 111-118 model in mico scale lase shock peening 111 STUDY ON -D SHOCK WAVE PRESSURE MODEL IN MICRO SCALE LASER SHOCK PEENING Y.J. Fan 1, J.Z. Zhou,

More information

Multiple Criteria Secretary Problem: A New Approach

Multiple Criteria Secretary Problem: A New Approach J. Stat. Appl. Po. 3, o., 9-38 (04 9 Jounal of Statistics Applications & Pobability An Intenational Jounal http://dx.doi.og/0.785/jsap/0303 Multiple Citeia Secetay Poblem: A ew Appoach Alaka Padhye, and

More information

Sensor and Simulation Notes. Note 525. Oct Lens Design for a Prolate-Spheroidal Impulse radiating Antenna (IRA)

Sensor and Simulation Notes. Note 525. Oct Lens Design for a Prolate-Spheroidal Impulse radiating Antenna (IRA) Senso and Simulation Notes Note 55 Oct 7 Lens Design fo a Polate-Spheoidal Impulse adiating Antenna (IRA) Sehat Altunc, Cal E. Baum, Chistos G. Chistodoulou and Edl Schamiloglu Univesity of New Mexico

More information

FUSE Fusion Utility Sequence Estimator

FUSE Fusion Utility Sequence Estimator FUSE Fusion Utility Sequence Estimato Belu V. Dasaathy Dynetics, Inc. P. O. Box 5500 Huntsville, AL 3584-5500 belu.d@dynetics.com Sean D. Townsend Dynetics, Inc. P. O. Box 5500 Huntsville, AL 3584-5500

More information

arxiv: v1 [physics.gen-ph] 18 Aug 2018

arxiv: v1 [physics.gen-ph] 18 Aug 2018 Path integal and Sommefeld quantization axiv:1809.04416v1 [physics.gen-ph] 18 Aug 018 Mikoto Matsuda 1, and Takehisa Fujita, 1 Japan Health and Medical technological college, Tokyo, Japan College of Science

More information

Module 9: Electromagnetic Waves-I Lecture 9: Electromagnetic Waves-I

Module 9: Electromagnetic Waves-I Lecture 9: Electromagnetic Waves-I Module 9: Electomagnetic Waves-I Lectue 9: Electomagnetic Waves-I What is light, paticle o wave? Much of ou daily expeience with light, paticulaly the fact that light ays move in staight lines tells us

More information

On the Sun s Electric-Field

On the Sun s Electric-Field On the Sun s Electic-Field D. E. Scott, Ph.D. (EE) Intoduction Most investigatos who ae sympathetic to the Electic Sun Model have come to agee that the Sun is a body that acts much like a esisto with a

More information

Exploiting QoS Flexibility for Smart Grid and IoT Applications Using TV White Spaces: Extended Version

Exploiting QoS Flexibility for Smart Grid and IoT Applications Using TV White Spaces: Extended Version Exploiting QoS Flexibility fo Smat Gid and IoT Applications Using TV White Spaces: Extended Vesion Naveed UL Hassan, Chau Yuen and Muhammad Beshgal Atique axiv:170.0304v1 [cs.ni] 10 Feb 017 Abstact In

More information

LET a random variable x follows the two - parameter

LET a random variable x follows the two - parameter INTERNATIONAL JOURNAL OF MATHEMATICS AND SCIENTIFIC COMPUTING ISSN: 2231-5330, VOL. 5, NO. 1, 2015 19 Shinkage Bayesian Appoach in Item - Failue Gamma Data In Pesence of Pio Point Guess Value Gyan Pakash

More information

F g. = G mm. m 1. = 7.0 kg m 2. = 5.5 kg r = 0.60 m G = N m 2 kg 2 = = N

F g. = G mm. m 1. = 7.0 kg m 2. = 5.5 kg r = 0.60 m G = N m 2 kg 2 = = N Chapte answes Heinemann Physics 4e Section. Woked example: Ty youself.. GRAVITATIONAL ATTRACTION BETWEEN SMALL OBJECTS Two bowling balls ae sitting next to each othe on a shelf so that the centes of the

More information

arxiv: v1 [physics.pop-ph] 3 Jun 2013

arxiv: v1 [physics.pop-ph] 3 Jun 2013 A note on the electostatic enegy of two point chages axiv:1306.0401v1 [physics.pop-ph] 3 Jun 013 A C Tot Instituto de Física Univesidade Fedeal do io de Janeio Caixa Postal 68.58; CEP 1941-97 io de Janeio,

More information

Pulse Neutron Neutron (PNN) tool logging for porosity Some theoretical aspects

Pulse Neutron Neutron (PNN) tool logging for porosity Some theoretical aspects Pulse Neuton Neuton (PNN) tool logging fo poosity Some theoetical aspects Intoduction Pehaps the most citicism of Pulse Neuton Neuon (PNN) logging methods has been chage that PNN is to sensitive to the

More information

Encapsulation theory: radial encapsulation. Edmund Kirwan *

Encapsulation theory: radial encapsulation. Edmund Kirwan * Encapsulation theoy: adial encapsulation. Edmund Kiwan * www.edmundkiwan.com Abstact This pape intoduces the concept of adial encapsulation, wheeby dependencies ae constained to act fom subsets towads

More information

A Multivariate Normal Law for Turing s Formulae

A Multivariate Normal Law for Turing s Formulae A Multivaiate Nomal Law fo Tuing s Fomulae Zhiyi Zhang Depatment of Mathematics and Statistics Univesity of Noth Caolina at Chalotte Chalotte, NC 28223 Abstact This pape establishes a sufficient condition

More information

CSCE 478/878 Lecture 4: Experimental Design and Analysis. Stephen Scott. 3 Building a tree on the training set Introduction. Outline.

CSCE 478/878 Lecture 4: Experimental Design and Analysis. Stephen Scott. 3 Building a tree on the training set Introduction. Outline. In Homewok, you ae (supposedly) Choosing a data set 2 Extacting a test set of size > 3 3 Building a tee on the taining set 4 Testing on the test set 5 Repoting the accuacy (Adapted fom Ethem Alpaydin and

More information

Permittivity of Human Skin in the Millimetre Wave Band

Permittivity of Human Skin in the Millimetre Wave Band Pemittivity of Human Skin in the Millimete Wave Band C. M. Alabaste, Canfield Univesity. E-mail: c.m.alabaste@mcs.canfield.ac.uk Abstact: The complex pemittivity of a human skin sample is measued ove the

More information

MULTILAYER PERCEPTRONS

MULTILAYER PERCEPTRONS Last updated: Nov 26, 2012 MULTILAYER PERCEPTRONS Outline 2 Combining Linea Classifies Leaning Paametes Outline 3 Combining Linea Classifies Leaning Paametes Implementing Logical Relations 4 AND and OR

More information

Bayesian Analysis of Topp-Leone Distribution under Different Loss Functions and Different Priors

Bayesian Analysis of Topp-Leone Distribution under Different Loss Functions and Different Priors J. tat. Appl. Po. Lett. 3, No. 3, 9-8 (6) 9 http://dx.doi.og/.8576/jsapl/33 Bayesian Analysis of Topp-Leone Distibution unde Diffeent Loss Functions and Diffeent Pios Hummaa ultan * and. P. Ahmad Depatment

More information

PAPER 39 STOCHASTIC NETWORKS

PAPER 39 STOCHASTIC NETWORKS MATHEMATICAL TRIPOS Pat III Tuesday, 2 June, 2015 1:30 pm to 4:30 pm PAPER 39 STOCHASTIC NETWORKS Attempt no moe than FOUR questions. Thee ae FIVE questions in total. The questions cay equal weight. STATIONERY

More information

Hydroelastic Analysis of a 1900 TEU Container Ship Using Finite Element and Boundary Element Methods

Hydroelastic Analysis of a 1900 TEU Container Ship Using Finite Element and Boundary Element Methods TEAM 2007, Sept. 10-13, 2007,Yokohama, Japan Hydoelastic Analysis of a 1900 TEU Containe Ship Using Finite Element and Bounday Element Methods Ahmet Egin 1)*, Levent Kaydıhan 2) and Bahadı Uğulu 3) 1)

More information

Two-level quantum dot in the Aharonov Bohm ring. Towards understanding phase lapse *

Two-level quantum dot in the Aharonov Bohm ring. Towards understanding phase lapse * Mateials Science-Poland, Vol. 5, No. 4, 007 Two-level quantum dot in the Ahaonov Bohm ing. Towads undestanding phase lapse * P. STEFAŃSKI ** Institute of Molecula Physics of the Polish Academy of Sciences,

More information

Classical Worm algorithms (WA)

Classical Worm algorithms (WA) Classical Wom algoithms (WA) WA was oiginally intoduced fo quantum statistical models by Pokof ev, Svistunov and Tupitsyn (997), and late genealized to classical models by Pokof ev and Svistunov (200).

More information

Inverse Square Law and Polarization

Inverse Square Law and Polarization Invese Squae Law and Polaization Objectives: To show that light intensity is invesely popotional to the squae of the distance fom a point light souce and to show that the intensity of the light tansmitted

More information

A scaling-up methodology for co-rotating twin-screw extruders

A scaling-up methodology for co-rotating twin-screw extruders A scaling-up methodology fo co-otating twin-scew extudes A. Gaspa-Cunha, J. A. Covas Institute fo Polymes and Composites/I3N, Univesity of Minho, Guimaães 4800-058, Potugal Abstact. Scaling-up of co-otating

More information

Analysis and Optimization of a Special Type of Dielectric Loaded Resonant Cavity for Mobile Communication Filters

Analysis and Optimization of a Special Type of Dielectric Loaded Resonant Cavity for Mobile Communication Filters 328 Analysis and Optimization of a Special Type of Dielectic Loaded Resonant Cavity fo Mobile Communication Filtes Haold S. Showes, Banmali S. Rawat *, Syam S. Challa Depatment of Electical and Biomedical

More information

Magnetometer Calibration Algorithm Based on Analytic Geometry Transform Yongjian Yang, Xiaolong Xiao1,Wu Liao

Magnetometer Calibration Algorithm Based on Analytic Geometry Transform Yongjian Yang, Xiaolong Xiao1,Wu Liao nd Intenational Foum on Electical Engineeing and Automation (IFEEA 5 Magnetomete Calibation Algoithm Based on Analytic Geomety ansfom Yongjian Yang, Xiaolong Xiao,u Liao College of Compute Science and

More information

A Bijective Approach to the Permutational Power of a Priority Queue

A Bijective Approach to the Permutational Power of a Priority Queue A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation

More information

EM Boundary Value Problems

EM Boundary Value Problems EM Bounday Value Poblems 10/ 9 11/ By Ilekta chistidi & Lee, Seung-Hyun A. Geneal Desciption : Maxwell Equations & Loentz Foce We want to find the equations of motion of chaged paticles. The way to do

More information

2. Electrostatics. Dr. Rakhesh Singh Kshetrimayum 8/11/ Electromagnetic Field Theory by R. S. Kshetrimayum

2. Electrostatics. Dr. Rakhesh Singh Kshetrimayum 8/11/ Electromagnetic Field Theory by R. S. Kshetrimayum 2. Electostatics D. Rakhesh Singh Kshetimayum 1 2.1 Intoduction In this chapte, we will study how to find the electostatic fields fo vaious cases? fo symmetic known chage distibution fo un-symmetic known

More information

12th WSEAS Int. Conf. on APPLIED MATHEMATICS, Cairo, Egypt, December 29-31,

12th WSEAS Int. Conf. on APPLIED MATHEMATICS, Cairo, Egypt, December 29-31, th WSEAS Int. Conf. on APPLIED MATHEMATICS, Caio, Egypt, Decembe 9-3, 7 5 Magnetostatic Field calculations associated with thick Solenoids in the Pesence of Ion using a Powe Seies expansion and the Complete

More information

Alternative Tests for the Poisson Distribution

Alternative Tests for the Poisson Distribution Chiang Mai J Sci 015; 4() : 774-78 http://epgsciencecmuacth/ejounal/ Contibuted Pape Altenative Tests fo the Poisson Distibution Manad Khamkong*[a] and Pachitjianut Siipanich [b] [a] Depatment of Statistics,

More information

Physics 2A Chapter 10 - Moment of Inertia Fall 2018

Physics 2A Chapter 10 - Moment of Inertia Fall 2018 Physics Chapte 0 - oment of netia Fall 08 The moment of inetia of a otating object is a measue of its otational inetia in the same way that the mass of an object is a measue of its inetia fo linea motion.

More information

MAGNETIC FIELD AROUND TWO SEPARATED MAGNETIZING COILS

MAGNETIC FIELD AROUND TWO SEPARATED MAGNETIZING COILS The 8 th Intenational Confeence of the Slovenian Society fo Non-Destuctive Testing»pplication of Contempoay Non-Destuctive Testing in Engineeing«Septembe 1-3, 5, Potoož, Slovenia, pp. 17-1 MGNETIC FIELD

More information

Contact impedance of grounded and capacitive electrodes

Contact impedance of grounded and capacitive electrodes Abstact Contact impedance of gounded and capacitive electodes Andeas Hödt Institut fü Geophysik und extateestische Physik, TU Baunschweig The contact impedance of electodes detemines how much cuent can

More information

Practice. Understanding Concepts. Answers J 2. (a) J (b) 2% m/s. Gravitation and Celestial Mechanics 287

Practice. Understanding Concepts. Answers J 2. (a) J (b) 2% m/s. Gravitation and Celestial Mechanics 287 Pactice Undestanding Concepts 1. Detemine the gavitational potential enegy of the Eath Moon system, given that the aveage distance between thei centes is 3.84 10 5 km, and the mass of the Moon is 0.0123

More information

Markscheme May 2017 Calculus Higher level Paper 3

Markscheme May 2017 Calculus Higher level Paper 3 M7/5/MATHL/HP3/ENG/TZ0/SE/M Makscheme May 07 Calculus Highe level Pape 3 pages M7/5/MATHL/HP3/ENG/TZ0/SE/M This makscheme is the popety of the Intenational Baccalaueate and must not be epoduced o distibuted

More information

Determining solar characteristics using planetary data

Determining solar characteristics using planetary data Detemining sola chaacteistics using planetay data Intoduction The Sun is a G-type main sequence sta at the cente of the Sola System aound which the planets, including ou Eath, obit. In this investigation

More information

Likelihood vs. Information in Aligning Biopolymer Sequences. UCSD Technical Report CS Timothy L. Bailey

Likelihood vs. Information in Aligning Biopolymer Sequences. UCSD Technical Report CS Timothy L. Bailey Likelihood vs. Infomation in Aligning Biopolyme Sequences UCSD Technical Repot CS93-318 Timothy L. Bailey Depatment of Compute Science and Engineeing Univesity of Califonia, San Diego 1 Febuay, 1993 ABSTRACT:

More information

IN SITU SOUND ABSORPTION COEFFICIENT MEASUREMENT OF VARIOUS SURFACES

IN SITU SOUND ABSORPTION COEFFICIENT MEASUREMENT OF VARIOUS SURFACES IN SITU SOUND ABSORPTION COEFFICIENT MEASUREMENT OF VARIOUS SURFACES PACS REFERENCES : 43.20.El, 43.20.Ye, 43.55.Ev, 43.58.Bh Michel Béengie 1 ; Massimo Gaai 2 1 Laboatoie Cental des Ponts et Chaussées

More information