Fast and Secure Rendezvous Protocols for Mitigating Control Channel DoS Attacks

Size: px
Start display at page:

Download "Fast and Secure Rendezvous Protocols for Mitigating Control Channel DoS Attacks"

Transcription

1 Fast and Secure Rendezvous Protocos for Mitigating Contro Channe DoS Attacks Mohammad J. Abde-Rahman, Hanif Rahbari, and Marwan Krunz Det. of Eectrica and Comuter Engineering, University of Arizona, Tucson, USA Phiie Nain INRIA, Sohia Antiois, France Abstract The oeration of a wireess network reies extensivey on exchanging messages over a universay known channe, referred to as the contro channe. The network erformance can be severey degraded if a jammer aunches a denia-ofservice (DoS) attack on such a channe. In this aer, we design quorum-based frequency hoing (FH) agorithms that mitigate DoS attacks on the contro channe of an asynchronous ad hoc network. Our agorithms can estabish unicast as we as muticast communications under DoS attacks. They are fuy distributed, do not incur any additiona message exchange overhead, and can work in the absence of node synchronization. Furthermore, the muticast agorithms maintain the muticast grou consistency. The efficiency of our agorithms is shown by anaysis and simuations. I. INTRODUCTION Wireess communications are vunerabe to intentiona interference attacks, tyicay referred to as jamming. The erformance of a wireess network can be severey degraded if a jammer aunches a denia-of-service (DoS) attack on the contro channe. Conventiona anti-jamming techniques often rey on sread sectrum communications, incuding frequency hoing (FH). FH has been used in the iterature for estabishing unicast communications in dynamic sectrum access (DSA) networks, where a common contro channe does not aways exist. However, most existing FH designs are based on ad hoc aroaches that do not rovide any erformance guarantees. One way to construct FH sequences in a systematic manner is to use quorum systems 3]. Quorum-based FH designs are advantageous in ad hoc networks because of their robustness to synchronization errors 4]. However, revious quorum-based FH designs, such as 3], do not suort muticast rendezvous, where a the nodes in a muticast grou are required to meet in the same time sot. The authors in 6] roosed an FH-based jamming-resistant broadcast communication scheme. In their scheme, the broadcast oeration is imemented as a series of unicast transmissions, which can ead to muticast inconsistency. For exame, a grou of nodes may share a grou key that is used to encode/decode common secure communication messages. For security uroses, this key may have to be udated eriodicay 7]. However, the change in the grou key has to This research was suorted in art by NSF (under grants CNS-6943 and CNS-9468, IIP , IIP-2343), Raytheon, and the Connection One center. Any oinions, findings, concusions, or recommendations exressed in this aer are those of the author(s) and do not necessariy refect the views of the Nationa Science Foundation. be consistent among a nodes in the grou. Even with the jamming resiiency, such consistency cannot be guaranteed if changes in the grou key are conveyed sequentiay. Instead of designing different FH sequences that overa at common sots, the muticast rendezvous in 5] is estabished after a series of airwise rendezvous oerations that resut in tuning a nodes in the muticast grou to a common FH sequence. The effectiveness of this aroach cannot be maintained under node comromise (if one node is comromised, then the FH sequences of a nodes are exosed). The authors in ] were the first to consider muticast rendezvous in fast-varying DSA networks, using different FH sequences whie maintaining muticast consistency. In this aer, we resent three FH agorithms to maintain contro communications under a DoS attack on the contro channe. More secificay, we roose a nove nested grid quorum-based FH agorithm, caed NUDoS, for estabishing unicast communications in a hostie environment with mutie jammers. NUDoS is faster than reviousy roosed airwise rendezvous agorithms, robust to node comromise, and can function in the absence of synchronization. Next, to estabish muticast communications whie guaranteeing muticast consistency, we customize the two muticast rendezvous agorithms (AMQFH and nested-cmqfh) roosed in ]. We ca the modified agorithms KMDoS and NCMDoS, resectivey. KMDoS and NCMDoS rovide different tradeoffs between seed and robustness to node comromise. Our agorithms are distributed and do not incur any additiona message overhead. The rest of this aer is organized as foows. Section II introduces our modes, defines our metrics, and states our robem. The NUDoS agorithm is resented in Section III. Section IV briefy introduces the KMDoS and NCMDoS agorithms. We evauate our agorithms in Section V, and concude the aer in Section VI. II. MODES, METRICS, AND PROBEM STATEMENT A. System Mode We consider a wireess ad hoc network with k nodes and channes, denoted by f,f 2,...,f. Without oss of generaity, we assume that FH occurs on a er-sot basis, where the sot duration is T seconds. A acket can be exchanged between two or more nodes if they ho onto the same channe in the same time sot. We assume that one time sot is sufficient to exchange one message. If mutie grous haen

2 to meet on the same channe in the same time sot, they use a CSMA/CA-stye rocedure to resove contention. For j =,...,k, each node j has its unique FH sequence w (j). The channe used in the ith sot of FH sequence w (j) is denoted by w (j) i,w (j) i {f,...,f }. Channe f j is caed a rendezvous frequency for the FH sequences w (),..., w (k) if there exists a rendezvous sot i such that w (m) i = f j, m {,...,k}. In our setu, each FH sequence consists of severa frames. Each frame consists of a bock of time-frequency hos. B. Attack Mode We consider two tyes of attacks: an insider attack in which an attacker can comromise a egitimate node and extracts its FH sequence, and a Markovian jamming attack where a jammer foows a two-state discrete-time Markov rocess. When the jammer is in state it does not transmit; otherwise, it transmits a jamming signa. et ρ (m) be the robabiity that channe m is in state, and et T (m) be the exected time (in sots) that channe m sends in state before returning to state. Then, the transition robabiities from state to state ( (m) ) and from state to state (q (m) ) can be exressed as: (m) = ρ(m), q (m) =. () ρ (m) C. Evauation Metrics T (m) T (m) Our agorithms are evauated according to two metrics: exected evasion deay (ED) and exected Hamming distance (HD). ED is defined as the time between the successfu jamming of the contro channe and the re-estabishment of a new one. The exected ED is considered because of the existence of a randomy assigned art in our FH sequences. The exected HD for two FH sequences x = (x...x n ) and y = (y...y n ) is defined as E ( n {x i y i}) /n], where { } is the indicator function and n is the frame ength. In addition to robustness to node comromise, FH sequences with higher HD wi have a ower coision robabiity. A coision occurs when two or more neighboring grous meet on the same channe in the same time sot. D. Probem Statement The FH construction robem is stated as foows: Given f,...,f, k, and n, determine the vaues of w (j) i, i n, j k, that resut in the minimum ED, and achieve a minimum HD of d. This robem is formuated as foows: minimize {w (j) i : i n, j k} Subject to. w (i) = w (j), i,j {,...,k},i j (2) n r= s () i w (i) ] =, i {,...,k} (3) (i) {w nd, i,j {,...,k},i j (4) r w r (j) } where s (r) i f x ] {,} is the state of frequency f x {f,...,f } in the rth time sot, as seen by node i. Assume that s (r) i f x ],i {,...,k},r {,...,n},x {,...,} are given. Then, the soution to Probem gives the minimum ED, denoted by ED, and the rendezvous frequency, denoted by f u. ED and u are given by: { ( k )} s (r) i f u ] == (5) ED = min u u = argmin u { min r n min r n ( k s (r) i f u ] == )} where denotes the ogica OR oeration. Reaxing the assumtion of knowing the future states of the channes, next we roose a centraized agorithm that soves the above robem in O(kn) time, assuming that ony the channe s transition robabiities are known. The centraized agorithm, which reies on redicting the future states of the channes given the current states, can be summarized by the foowing stes: ) For each sot j =,...,n, comute j and j as foow: { k } j = max () n e+j (s(e) i f ],) (7) j = argmax { k () n e+j (s(e) i f ],) where e is the index of the sot in the current frame when channe f has been recenty sensed and () n e+j (s(e) i f ],) is the (n e + j)-ste transition robabiity of f form state s (e) i f ] to state. In genera, the v-ste transition robabiity of channe m from state s to state can be exressed as: ] s ] v q (m) + (m) q(m) (m) q (m) (m) v (s,) = (m). (m) +q (m) (9) 2) Sort sots ascendingy according to their j vaues. 3) Seect the to n nd = n( d) sots in the ist, and assign frequency f j to sot j in a FH sequences. 4) For the remaining nd sots, assign different frequencies for different FH sequences. Next, we exoit some roerties of quorum systems in designing distributed FH rendezvous agorithms. III. UNICAST COMMUNICATIONS Before describing NUDoS for unicast communications, we first give a few basic definitions. A. Preiminaries Definition. Given a set Z n = {,,...,n }, a quorum system Q under Z n is a coection of non-emty subsets of Z n, each caed a quorum, such that: G,H Q : G H. Definition 2. Given a non-negative integer i and a quorum G in a quorum system Q under Z n, we define rotate(g,i) = } (6) (8)

3 {(x+i) mod n,x G} to denote a cycic rotation of quorum G by i. Definition 3. A quorum system Q under Z n is said to satisfy the rotation k-cosure roerty for some k 2 if G,...,G k Q and i,...,i k Z n, k j= rotate(g j,i j ). Quorum systems that enjoy the above rotation k-cosure roerty can be exoited to achieve asynchronous communications. One such quorum system that satisfies the rotation 2-cosure roerty is the grid quorum system 4]. Definition 4. A grid quorum system 4] arranges the eements of the set Z n as a n n array. In this case, a quorum is formed from the eements of any coumn us any row of the grid. Figure iustrates the rotation cosure roerty for two quorums G and H in a grid quorum system Q under Z 6. One quorum s coumn must intersect with the other quorum s row, and vice versa. Hence, the two quorums have at east two intersections (abeed I in Figure ). In Figure, G = rotate(g,) and H = rotate(h,2) intersect at the two eements abeed asi. Hence, the grid quorum system satisfies the rotation 2-cosure roerty. Fig. : Rotation 2-cosure roerty of grid quorum systems. B. NUDoS Agorithm In NUDoS, every frame of every FH sequence uses n rendezvous frequencies, where n is the frame ength in sots. The foowing exame exains the oeration of the NUDoS agorithm forn = 6 (hence, each frame of every FH sequence contains n = 3 rendezvous frequencies). ) Construct a grid quorum system Q under Z 6. Q consists of 6 different quorums, each of 2 6 = 7 eements. 2) Construct an FH sequence w as foows: Seect the outer-most quorum G () from the quorum system Q (e.g., G () = {,,2,3,4,8,2}, where each entry reresents the index of a time sot in a 6-sot frame). Assign a rendezvous frequency h () {f,...,f } to the FH sots that corresond to G (). Deete quorum G () from the origina 4 4 grid and seect the next outer-most quorum G () 2 from the resuting 3 3 grid (e.g., G () 2 = {6,9,,,4}). Then, assign another rendezvous frequency h () 2 to the FH sots that corresond to G () 2. Deete quorum G () 2 from the 3 3 grid, and seect the next outer-most quorum G () 3 from the resuting 2 2 grid (e.g., G () 3 = {7,3,5}). Then, assign a third rendezvous frequency h () 3 to the FH sots that corresond to G () 3. Assign a random frequency h () x {f,...,f } \ {h (),h() 2,h() 3 } to each of the unassigned sots. Reeat the above stes for the other frames in w. 3) Reeat ste 2 for other FH sequences. Throughout this aer, h (j) i and G (j) i, i {,..., n }, denote the ith quorum-assigned frequency that is assigned to the ( n i+) ( n i+) quorum G (j) i in the jth frame. C. Features of the NUDoS Agorithm NUDoS has two main features. First, because of the nested generation of quorums, the overa ratio between two FH sequences (number of rendezvous sots in a frame divided by the frame ength) is significanty higher than the overa ratio for a non-nested grid quorum-based FH agorithm (herein denoted by UDoS). In UDoS, an FH sequence consists of ony one rendezvous frequency, assigned to a n n quorum. FH systems with a higher overa ratio work more efficienty in hostie environments, where a jammer may suddeny aear on a rendezvous channe. Besides having a higher overa ratio, NUDoS invoves mutie rendezvous frequencies er frame, which increases the ikeihood of rendezvousing. The advantage of a nested grid quorum with mutie rendezvous frequencies can be formaized by deriving the exected overa ratio for UDoS and NUDoS, denoted byv UDoS and V NUDoS, resectivey. V UDoS is comosed of the sum of two arts; the exected overa ratio between the quorumbased assigned arts of the FH sequences, denoted by V Q UDoS, and the exected overa ratio between the randomy assigned arts, denoted by VUDoS R. Simiary, V NUDoS is comosed of V Q NUDoS and VR NUDoS. For a given n, VQ UDoS and VQ NUDoS can be determined numericay. After some maniuations, VUDoS R and VR NUDoS can be exressed as foows: VUDoS(,n) R = ( n ) 2 {2 ( n ) 2 } () n VNUDoS(,n) R = {2 n } 2. () Potting V UDoS and V NUDoS vs. n, one can see that V NUDoS is arger than V UDoS, and both decrease with n. The second attractive feature of NUDoS is its robustness to node comromise. Because the quorum-based assigned art of the FH sequence is the art that is intended to suort the rendezvous caabiity, if this art is comromised, the rendezvous caabiity may be eiminated or reduced significanty. NUDoS sequences are comosed of n nested quorums that are generay different for different frames in a given FH sequence, and aso different for different FH sequences. Hence, if a node is comromised and its FH sequence is exosed, ess information wi be eaked about other FH sequences, comared with UDoS sequences. The number of different channe assignments for a given n (K n ) is given by: K n = n 2 ( n j) 2. (2) j=

4 IV. MUTICAST COMMUNICATIONS The muticast rendezvous agorithms, AMQFH and CMQFH, roosed in ] are customized for maintaining muticast communications under a DoS attack on the contro channe. The resuted agorithms are caed KMDoS and CM- DoS, resectivey. These agorithms have two main attractive features. First, they aow a node to construct its sequence by ony knowing the number of nodes in its muticast grou. Hence, they can be executed in a fuy distributed way. Second, these agorithms can sti function in the absence of node synchronization. Due to sace imitations, the detais of these agorithms are not mentioned here, but can be found in 2]. We evauate KMDoS and CMDoS based on the exected ED and HD. KMDoS and CMDoS are imemented in a distributed way as foows. First, the source node uses a series of airwise rendezvous to communicate the number of nodes in the muticast grou to the target muticast grou. Then, each receiving node constructs its own muticast FH sequence. A. Exected ED The exected ED of KMDoS and CMDoS, denoted by E k and E c, resectivey, can be exressed as foows: Resut. E k is given by: ] n i E k = iγ(γ i+ ) ( Γ(γ j )) (3) j= where Γ(γ i ) is the robabiity that sot i is a rendezvous sot and γ i is the robabiity that sot i is a quorum sot (i.e., assigned a rendezvous frequency).γ(γ i ) andγ i,i =,...,n, are given by (k is the muticast grou size minus one for KMDoS): k (k ) ( ) ] i + Γ(γ j ) = γ k+ i γj j kn k+ i= i+2 i + γ i = n Resut 2. E c is given by: ( + i n ) (4) k ( γ j ) k+ i+3 n i+. (5) kn k+ n E c = Θ i( Θ) i (6) where Θ is the robabiity that a given sot is a rendezvous sot. Θ is given by (k is the muticast grou size for CMDoS): k ( ) i k j=k i+ Θ = (e ] j )/e j e i=...e k i {e,...,e k i } {,..., k } (7) ( ) k k e +. e Potting E k and E c, one can see that for > 3, E c E k. Both, E c and E k increases with the muticast grou size. = B. Exected HD { } Resut 3. et φ def kn = n k+ +. Then, the exected HD of KMDoS, denoted by H k, and its uer bound vaue, denoted by H k,best, are given by: H k = { (ϕ )(φ+) + φ } (8) n ϕ ϕ H k,best = φ+ (9) n where H k,best corresonds to the case when different nodes seect different sequences, and nodes cannot rendezvous during the randomy assigned sots. H k reresents the case when nodes can seect different sequences or the same sequence. Resut 4. The exected HD of CMDoS, denoted by H c, and its uer bound vaue, denoted by H c,best, are given by: H c = k k ( 2k 2 ) (2) j= i j k k ( H c,best = 2 ( ) ) (2) k 2 i j j= j i where H c,best is defined simiar to H k,best. Note that as the muticast grou size increases, H c increases but H k decreases, and hence the ga between H c and H k increases with the increase in the size of the muticast grou. CMDoS is robust against node comromise but it is sow. To reduce the ED of CMDoS, we augment it with a nesting design simiar to the NUDoS agorithm, as discussed 2]. The nested version of CMDoS is caed NCMDoS. Remark. FH sequences constructed according to NUDoS, KMDoS, and NCMDoS can estabish asynchronous communications if each FH sequence continues to use the same outer-most quorum and channe in a frames of the FH sequence. This condition is sufficient but not necessary. Thus, FH sequences can sti rendezvous even if the outer-most quorum is changed in some frames, rovided that this change does not occur very frequenty. Remark 2. In Section V, channes and quorums are seected based on the forecasted avaiabiity of the channes at different quorums, as derived from the jamming mode described in Section II-B. A channe is considered avaiabe at a future sot if it is redicted to be avaiabe at that sot with robabiity greater than th. The detais of the channe and quorum seection rocedures are omitted due to sace imitation. V. PERFORMANCE EVAUATION We now resent simuation resuts for the NUDoS, KMDoS, and NCMDoS agorithms, and comare them with the centraized agorithm. The roosed agorithms are studied under different jamming robabiities (ρ (m) ), as we as different frame engths and grou sizes for unicast and muticast, resectivey. Our evauation metrics are the ED and the HD. Our agorithms are simuated under a reaistic setting of no synchronization (the misaignment between FH sequences is

5 Evasion Deay (sots) NUDoS, ρ (m) =.3 NUDoS, ρ (m) =.5 C,d =.65 C,d = n (sots) Hamming Distance (HD) n (sots) Fig. 2: ED for NUDoS ( th =.5,T (m) = 8). Fig. 3: HD for NUDoS ( th =.5,T (m) = 8) NUDoS, ρ (m) =.3 NUDoS, ρ (m) =.5 C,d =.65 C,d =.5 Evasion Deay (sots) KMDoS, ρ (m) =.3 KMDoS, ρ (m) =.5 C,d =.65 C,d = Muticast Grou Size Fig. 4: ED for KMDoS ( th =.5,T (m) = 8). randomy seected in each exeriment). The 95% confidence intervas are indicated. To achieve a minimum HD of d in the centraized agorithm, the actua HD (i.e., nd /n) might be different for different frame engths. A. Unicast Communications (NUDoS) Figure 2 deicts the ED of NUDoS, and comare it with the centraized agorithm (denoted by C). The ED for both agorithms (NUDoS and C) increases with n because of the reduction in the overa ratio. The ED aso increases with ρ (m). Whie achieving a cose HD to the centraized agorithm for sma to moderate vaues of ρ (m), the seed of NUDoS is comarabe to the centraized agorithm. Increasing d in (4) increases the ED of the centraized agorithm. The HD for NUDoS and C is otted in Figure 3. The HD of NUDoS increases with n because of the reduction in the overa ratio. It aso increases with ρ (m) because of the increase in the number of unassigned sots (in our simuations, each unassigned sot increments the HD by /n). B. Muticast Communications (KMDoS and NCMDoS) Figure 4 shows the ED of KMDoS and the centraized agorithm. The ED of KMDoS increases with the grou size for arge vaues of ρ (m). Figure 5 deicts the ED of NCMDoS vs. ρ (m) for a grou of size 3. NCMDoS is much sower than both KMDoS and the centraized agorithm. As shown in Figure 6, the HD of NCMDoS is arger than that of KMDoS, and the ga increases with the increase in the grou size. The HD increases with ρ (m) because of the increase in the number of unassigned sots. Evasion Deay (sots) NCMDoS C,d=.73 C,d= ρ (m) Fig. 5: ED for NCMDoS (grou size = 3, th =.5,T (m) = 8). Hamming Distance (HD) KMDoS, ρ (m) =.2 KMDoS, ρ (m) =.5 NCMDoS, ρ (m) =.2 NCMDoS, ρ (m) = Muticast Grou Size Fig. 6: HD for KMDoS and NCMDoS ( th =.5,T (m) = 4). VI. CONCUSIONS In this aer, we designed three FH agorithms for estabishing unicast (NUDoS) and muticast (KMDoS and NCM- DoS) communications in the resence of a contro channe DoS attack. KMDoS and NCMDoS maintain the muticast consistency, and rovide different tradeoffs between seed and robustness to node comromise. Our agorithms are distributed, do not incur additiona message exchange overhead, and work in the absence of synchronization. We simuated our agorithms under a reaistic setting of no synchronization. REFERENCES ] M. J. Abde-Rahman, H. Rahbari, and M. Krunz, Adative frequency hoing agorithms for muticast rendezvous in DSA networks, in Proc. of the IEEE DySPAN Conf., Oct. 22, ] M. J. Abde-Rahman, H. Rahbari, M. Krunz, and P. Nain, Fast and secure rendezvous rotocos for mitigating contro channe DoS attacks, University of Arizona, Tech. Re. TR-UA-ECE-22-4, Jan. 23. Onine]. Avaiabe: htt://www2.engr.arizona.edu/ mjabderahman. 3] K. Bian, J. M. Park, and R. Chen, A quorum-based framework for estabishing contro channes in dynamic sectrum access networks, in Proc. of the ACM MobiCom Conf., 29, ] J.-R. Jiang, Y.-C. Tseng, C.-S. Hsu, and T.-H. ai, Quorum-based asynchronous ower-saving rotocos for IEEE 82. ad-hoc networks, Mobie Networks and Aications, vo.,. 69 8, Feb ] Z. in, H. iu, X. Chu, and Y.-W. eung, Jum-stay based channehoing agorithm with guaranteed rendezvous for cognitive radio networks, in Proc. of the IEEE INFOCOM Conf., 2, ] S. iu,. azos, and M. Krunz, Thwarting inside jamming attacks on wireess broadcast communications, in Proc. of the ACM WiSec Conf., 2. 7] D. R. Stinson, Crytograhy: Theory and Practice. Chaman and Ha/CRC, Tayor and Francis Grou, 26.

Diversity Gain Region for MIMO Fading Broadcast Channels

Diversity Gain Region for MIMO Fading Broadcast Channels ITW4, San Antonio, Texas, October 4 9, 4 Diversity Gain Region for MIMO Fading Broadcast Channes Lihua Weng, Achieas Anastasoouos, and S. Sandee Pradhan Eectrica Engineering and Comuter Science Det. University

More information

CORE: A Combinatorial Game-theoretic Framework for COexistence REndezvous in DSA Networks

CORE: A Combinatorial Game-theoretic Framework for COexistence REndezvous in DSA Networks CORE: A Combinatorial Game-theoretic Framework for COexistence REndezvous in DSA Networks Mohammad J. Abdel-Rahman and Marwan Krunz Department of Electrical and Computer Engineering, University of Arizona,

More information

A novel Parameter Estimation method based on FRFT in Bistatic MIMO Radar System. Li Li1, a

A novel Parameter Estimation method based on FRFT in Bistatic MIMO Radar System. Li Li1, a 6th Internationa Conference on Mechatronics Materias Biotechnoogy and Environment (ICMMBE 6 A nove Parameter Estimation method based on FRF in Bistatic MIMO Radar System i i a Information Engineering Coege

More information

Unitary Space-Time Pulse Position Modulation for Differential Unipolar MIMO IR-UWB Communications

Unitary Space-Time Pulse Position Modulation for Differential Unipolar MIMO IR-UWB Communications 1 Unitary Sace-Time Puse Position Moduation for Differentia Unioar MIMO IR-UWB Communications Chadi Abou-Rjeiy, Senior Member IEEE Abstract In this aer, we resent a genera technique for constructing minima-deay

More information

Centralized Coded Caching of Correlated Contents

Centralized Coded Caching of Correlated Contents Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv:1711.03798v1

More information

7. CREST-TO-TROUGH WAVE HEIGHT DISTRIBUTION

7. CREST-TO-TROUGH WAVE HEIGHT DISTRIBUTION 7. CREST-TO-TROUGH WAVE HEIGHT DISTRIBUTION 7.1. Introduction In Chater 5, it has been mentioned that, in the wide sectrum case, the assumtion of H η does not hod even in the narrow case (considering that

More information

Fractional Power Control for Decentralized Wireless Networks

Fractional Power Control for Decentralized Wireless Networks Fractiona Power Contro for Decentraized Wireess Networks Nihar Jinda, Steven Weber, Jeffrey G. Andrews Abstract We roose and anayze a new aradigm for ower contro in decentraized wireess networks, termed

More information

Target Location Estimation in Wireless Sensor Networks Using Binary Data

Target Location Estimation in Wireless Sensor Networks Using Binary Data Target Location stimation in Wireess Sensor Networks Using Binary Data Ruixin Niu and Pramod K. Varshney Department of ectrica ngineering and Computer Science Link Ha Syracuse University Syracuse, NY 344

More information

(This is a sample cover image for this issue. The actual cover is not yet available at this time.)

(This is a sample cover image for this issue. The actual cover is not yet available at this time.) (This is a sampe cover image for this issue The actua cover is not yet avaiabe at this time) This artice appeared in a journa pubished by Esevier The attached copy is furnished to the author for interna

More information

Arbitrary Throughput Versus Complexity Tradeoffs in Wireless Networks using Graph Partitioning

Arbitrary Throughput Versus Complexity Tradeoffs in Wireless Networks using Graph Partitioning University of Pennsyvania SchoaryCommons Departmenta Papers (ESE) Department of Eectrica & Systems Engineering November 2006 Arbitrary Throughput Versus Compexity Tradeoffs in Wireess Networks using Graph

More information

Research Article SVM-Based Spectrum Mobility Prediction Scheme in Mobile Cognitive Radio Networks

Research Article SVM-Based Spectrum Mobility Prediction Scheme in Mobile Cognitive Radio Networks e Scientific Word Journa, Artice ID 395212, 11 ages htt://dx.doi.org/10.1155/2014/395212 Research Artice SVM-Based Sectrum Mobiity Prediction Scheme in Mobie Cognitive Radio Networks Yao Wang, 1,2 Zhongzhao

More information

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. X, NO. Y, MONTH

IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. X, NO. Y, MONTH IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. X, NO. Y, MONTH 24 Dynamic On-Chi Therma Sensor Caibration Using Performance Counters Shiting (Justin) Lu, Russe Tessier,

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao, Vivek Raghunathan, Stephen Hany, Vinod Sharma and. R. Kumar Abstract We consider a joint power contro

More information

Problem set 6 The Perron Frobenius theorem.

Problem set 6 The Perron Frobenius theorem. Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator

More information

A Variance Minimization Criterion to Active Learning on Graphs

A Variance Minimization Criterion to Active Learning on Graphs A Variance inimization Criterion to Active Learning on Grahs ing Ji Deartment of Comuter Science University of Iinois at Urbana-Chamaign Jiawei Han Deartment of Comuter Science University of Iinois at

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

ON CERTAIN SUMS INVOLVING THE LEGENDRE SYMBOL. Borislav Karaivanov Sigma Space Inc., Lanham, Maryland

ON CERTAIN SUMS INVOLVING THE LEGENDRE SYMBOL. Borislav Karaivanov Sigma Space Inc., Lanham, Maryland #A14 INTEGERS 16 (2016) ON CERTAIN SUMS INVOLVING THE LEGENDRE SYMBOL Borisav Karaivanov Sigma Sace Inc., Lanham, Maryand borisav.karaivanov@sigmasace.com Tzvetain S. Vassiev Deartment of Comuter Science

More information

THE APPENDIX FOR THE PAPER: INCENTIVE-AWARE JOB ALLOCATION FOR ONLINE SOCIAL CLOUDS. Appendix A 1

THE APPENDIX FOR THE PAPER: INCENTIVE-AWARE JOB ALLOCATION FOR ONLINE SOCIAL CLOUDS. Appendix A 1 TE APPENDIX FOR TE PAPER: INCENTIVE-AWARE JO ALLOCATION FOR ONLINE SOCIAL CLOUDS Yu Zhang, Mihaea van der Schaar Aendix A 1 1) Proof of Proosition 1 Given the SCP, each suier s decision robem can be formuated

More information

ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK

ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK Aexander Arkhipov, Michae Schne German Aerospace Center DLR) Institute of Communications and Navigation Oberpfaffenhofen, 8224 Wessing, Germany

More information

Expressing Priorities and External Probabilities in Process Algebra via Mixed Open/Closed Systems

Expressing Priorities and External Probabilities in Process Algebra via Mixed Open/Closed Systems Reace this fie with rentcsmacro.sty for your meeting, or with entcsmacro.sty for your meeting. Both can be found at the ENTCS Macro Home age. Exressing riorities and Externa robabiities in rocess Agebra

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

Collaborative Calibration of On-Chip Thermal Sensors Using Performance Counters

Collaborative Calibration of On-Chip Thermal Sensors Using Performance Counters Coaborative Caibration of On-Chi Therma s Using Performance Counters Shiting (Justin) Lu, Russe Tessier, and Wayne Bureson University of Massachusetts Deartment of Eectrica and Comuter Engineering Amherst,

More information

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks An Adaptive Opportunistic Routing Scheme for Wireess Ad-hoc Networks A.A. Bhorkar, M. Naghshvar, T. Javidi, and B.D. Rao Department of Eectrica Engineering, University of Caifornia San Diego, CA, 9093

More information

Short course A vademecum of statistical pattern recognition techniques with applications to image and video analysis. Agenda

Short course A vademecum of statistical pattern recognition techniques with applications to image and video analysis. Agenda Short course A vademecum of statistica attern recognition techniques with aications to image and video anaysis Lecture 3 Density estimation Massimo Piccardi University of Technoogy, Sydney, Austraia Massimo

More information

In-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017

In-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017 In-pane shear stiffness of bare stee deck through she finite eement modes G. Bian, B.W. Schafer June 7 COLD-FORMED STEEL RESEARCH CONSORTIUM REPORT SERIES CFSRC R-7- SDII Stee Diaphragm Innovation Initiative

More information

Transmit Antenna Selection for Physical-Layer Network Coding Based on Euclidean Distance

Transmit Antenna Selection for Physical-Layer Network Coding Based on Euclidean Distance Transmit ntenna Seection for Physica-Layer Networ Coding ased on Eucidean Distance 1 arxiv:179.445v1 [cs.it] 13 Sep 17 Vaibhav Kumar, arry Cardiff, and Mar F. Fanagan Schoo of Eectrica and Eectronic Engineering,

More information

Time-Aware Congestion-Free Routing Reconfiguration

Time-Aware Congestion-Free Routing Reconfiguration Time-Aware Congestion-Free Routing Reconfiguration Shih-Hao Tseng, Chiun Lin Lim, Ning Wu, and Ao Tang Schoo of Eectrica and Comuter Engineering, Corne University, Ithaca, New York 4853, U.S.A. Emai: {st688,

More information

Distributed average consensus: Beyond the realm of linearity

Distributed average consensus: Beyond the realm of linearity Distributed average consensus: Beyond the ream of inearity Usman A. Khan, Soummya Kar, and José M. F. Moura Department of Eectrica and Computer Engineering Carnegie Meon University 5 Forbes Ave, Pittsburgh,

More information

MC-CDMA CDMA Systems. Introduction. Ivan Cosovic. Stefan Kaiser. IEEE Communication Theory Workshop 2005 Park City, USA, June 15, 2005

MC-CDMA CDMA Systems. Introduction. Ivan Cosovic. Stefan Kaiser. IEEE Communication Theory Workshop 2005 Park City, USA, June 15, 2005 On the Adaptivity in Down- and Upink MC- Systems Ivan Cosovic German Aerospace Center (DLR) Institute of Comm. and Navigation Oberpfaffenhofen, Germany Stefan Kaiser DoCoMo Euro-Labs Wireess Soution Laboratory

More information

Distributed Optimization With Local Domains: Applications in MPC and Network Flows

Distributed Optimization With Local Domains: Applications in MPC and Network Flows Distributed Optimization With Loca Domains: Appications in MPC and Network Fows João F. C. Mota, João M. F. Xavier, Pedro M. Q. Aguiar, and Markus Püsche Abstract In this paper we consider a network with

More information

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c) A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,

More information

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient

More information

Unconditional security of differential phase shift quantum key distribution

Unconditional security of differential phase shift quantum key distribution Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice

More information

A Statistical Framework for Real-time Event Detection in Power Systems

A Statistical Framework for Real-time Event Detection in Power Systems 1 A Statistica Framework for Rea-time Event Detection in Power Systems Noan Uhrich, Tim Christman, Phiip Swisher, and Xichen Jiang Abstract A quickest change detection (QCD) agorithm is appied to the probem

More information

Existence Results for a Four-Point Impulsive Boundary Value Problem Involving Fractional Differential Equation

Existence Results for a Four-Point Impulsive Boundary Value Problem Involving Fractional Differential Equation Progr. Fract. Differ. A., No. 3, 2-222 (205) 2 Progress in Fractiona Differentiation and Aications An Internationa Journa htt://dx.doi.org/0.2785/fda/00306 Existence Resuts for a Four-Point Imusive Boundary

More information

Pattern selection and control via localized feedback

Pattern selection and control via localized feedback PHYSICAL REVIEW E 72, 066208 2005 Pattern seection and contro via ocaized feedback Andreas Hande Deartment of Bioogy, Emory University, Atanta, Georgia 30322, USA Roman O. Grigoriev Schoo of Physics, Georgia

More information

Algorithms to solve massively under-defined systems of multivariate quadratic equations

Algorithms to solve massively under-defined systems of multivariate quadratic equations Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations

More information

Analysis of Emerson s Multiple Model Interpolation Estimation Algorithms: The MIMO Case

Analysis of Emerson s Multiple Model Interpolation Estimation Algorithms: The MIMO Case Technica Report PC-04-00 Anaysis of Emerson s Mutipe Mode Interpoation Estimation Agorithms: The MIMO Case João P. Hespanha Dae E. Seborg University of Caifornia, Santa Barbara February 0, 004 Anaysis

More information

arxiv: v1 [cs.lg] 31 Oct 2017

arxiv: v1 [cs.lg] 31 Oct 2017 ACCELERATED SPARSE SUBSPACE CLUSTERING Abofaz Hashemi and Haris Vikao Department of Eectrica and Computer Engineering, University of Texas at Austin, Austin, TX, USA arxiv:7.26v [cs.lg] 3 Oct 27 ABSTRACT

More information

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai

More information

Galois covers of type (p,, p), vanishing cycles formula, and the existence of torsor structures.

Galois covers of type (p,, p), vanishing cycles formula, and the existence of torsor structures. Gaois covers of tye,, ), vanishing cyces formua, and the existence of torsor structures. Mohamed Saïdi & Nichoas Wiiams Abstract In this artice we rove a oca Riemman-Hurwitz formua which comares the dimensions

More information

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems Source and Reay Matrices Optimization for Mutiuser Muti-Hop MIMO Reay Systems Yue Rong Department of Eectrica and Computer Engineering, Curtin University, Bentey, WA 6102, Austraia Abstract In this paper,

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

ON THE INVARIANCE OF NONINFORMATIVE PRIORS. BY GAURI SANKAR DATTA 1 AND MALAY GHOSH 2 University of Georgia and University of Florida

ON THE INVARIANCE OF NONINFORMATIVE PRIORS. BY GAURI SANKAR DATTA 1 AND MALAY GHOSH 2 University of Georgia and University of Florida he Annas of Statistics 1996, Vo 4, No 1, 141159 ON HE INVARIANCE OF NONINFORMAIVE PRIORS BY GAURI SANKAR DAA 1 AND MALAY GHOSH University of Georgia and University of Forida Jeffreys rior, one of the widey

More information

NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION

NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION Hsiao-Chang Chen Dept. of Systems Engineering University of Pennsyvania Phiadephia, PA 904-635, U.S.A. Chun-Hung Chen

More information

MULTI-PERIOD MODEL FOR PART FAMILY/MACHINE CELL FORMATION. Objectives included in the multi-period formulation

MULTI-PERIOD MODEL FOR PART FAMILY/MACHINE CELL FORMATION. Objectives included in the multi-period formulation ationa Institute of Technoogy aicut Department of echanica Engineering ULTI-PERIOD ODEL FOR PART FAILY/AHIE ELL FORATIO Given a set of parts, processing requirements, and avaiabe resources The objective

More information

Distributed Enforcement of Phase-Cohesiveness for Frequency Control of Islanded Inverter-Based Microgrids

Distributed Enforcement of Phase-Cohesiveness for Frequency Control of Islanded Inverter-Based Microgrids Distributed Enforcement of hase-cohesiveness for Frequency Contro of Isanded Inverter-Based Microgrids Madi Zhobaryssov, Student Member, IEEE, Aejandro D. Domínguez-García, Member, IEEE Abstract In this

More information

Combining reaction kinetics to the multi-phase Gibbs energy calculation

Combining reaction kinetics to the multi-phase Gibbs energy calculation 7 th European Symposium on Computer Aided Process Engineering ESCAPE7 V. Pesu and P.S. Agachi (Editors) 2007 Esevier B.V. A rights reserved. Combining reaction inetics to the muti-phase Gibbs energy cacuation

More information

The Application of MIMO to Non-Orthogonal Multiple Access Zhiguo Ding, Member, IEEE, Fumiyuki Adachi, Fellow, IEEE, and H. Vincent Poor, Fellow, IEEE

The Application of MIMO to Non-Orthogonal Multiple Access Zhiguo Ding, Member, IEEE, Fumiyuki Adachi, Fellow, IEEE, and H. Vincent Poor, Fellow, IEEE IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL 5, NO, JANUARY 06 537 The Aication of MIMO to Non-Orthogona Mutie Access Zhiguo Ding, Member, IEEE, Fumiyui Adachi, Feow, IEEE, and H Vincent Poor, Feow,

More information

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver

More information

Availability-Aware Cell Association for Hybrid Power Supply Networks with Adaptive Bias

Availability-Aware Cell Association for Hybrid Power Supply Networks with Adaptive Bias Avaiabiity-Aware Ce Association for Hybrid Power Suppy Networks with Adaptive Bias Fanny Parzysz, Member, IEEE, and Christos Verikoukis, Senior Member, IEEE 1 ariv:1609.08182v2 [cs.it] 12 Ju 2017 Abstract

More information

PHASE retrieval aims at recovering a complex-valued signal

PHASE retrieval aims at recovering a complex-valued signal IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 65, NO., NOVEMBER 15, 017 5957 Undersamed Sarse Phase Retrieva via Majorization Minimization Tianyu Qiu and Danie P. Paomar, Feow, IEEE Abstract In the undersamed

More information

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors We are IntechOen, the word s eading ubisher of Oen Access books Buit by scientists, for scientists 4,100 116,000 10M Oen access books avaiabe Internationa authors and editors Downoads Our authors are among

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea-Time Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process

More information

Improving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees

Improving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees Improving the Accuracy of Booean Tomography by Expoiting Path Congestion Degrees Zhiyong Zhang, Gaoei Fei, Fucai Yu, Guangmin Hu Schoo of Communication and Information Engineering, University of Eectronic

More information

Decentralized Event-Driven Algorithms for Multi-Agent Persistent Monitoring Tasks

Decentralized Event-Driven Algorithms for Multi-Agent Persistent Monitoring Tasks 2017 IEEE 56th Annua Conference on Decision and Contro (CDC) December 12-15, 2017, Mebourne, Austraia Decentraized Event-Driven Agorithms for Muti-Agent Persistent Monitoring Tasks Nan Zhou 1, Christos

More information

On the use of block-effective macrodispersion for numerical simulations of transport in heterogeneous formations

On the use of block-effective macrodispersion for numerical simulations of transport in heterogeneous formations WATER RESOURCES RESEARCH, VOL. 39, NO. 9, 4, doi:.9/wr77, 3 On the use of bock-ective macrodisersion for numerica simuations of transort in heterogeneous formations Yoram Rubin Deartment of Civi and Environmenta

More information

Available online at ScienceDirect. IFAC PapersOnLine 50-1 (2017)

Available online at   ScienceDirect. IFAC PapersOnLine 50-1 (2017) Avaiabe onine at www.sciencedirect.com ScienceDirect IFAC PapersOnLine 50-1 (2017 3412 3417 Stabiization of discrete-time switched inear systems: Lyapunov-Metzer inequaities versus S-procedure characterizations

More information

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance Send Orders for Reprints to reprints@benthamscience.ae 340 The Open Cybernetics & Systemics Journa, 015, 9, 340-344 Open Access Research of Data Fusion Method of Muti-Sensor Based on Correation Coefficient

More information

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay Throughput Optima Scheduing for Wireess Downinks with Reconfiguration Deay Vineeth Baa Sukumaran vineethbs@gmai.com Department of Avionics Indian Institute of Space Science and Technoogy. Abstract We consider

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization Scaabe Spectrum ocation for Large Networks ased on Sparse Optimization innan Zhuang Modem R&D Lab Samsung Semiconductor, Inc. San Diego, C Dongning Guo, Ermin Wei, and Michae L. Honig Department of Eectrica

More information

Fast Blind Recognition of Channel Codes

Fast Blind Recognition of Channel Codes Fast Bind Recognition of Channe Codes Reza Moosavi and Erik G. Larsson Linköping University Post Print N.B.: When citing this work, cite the origina artice. 213 IEEE. Persona use of this materia is permitted.

More information

Supporting Information for Suppressing Klein tunneling in graphene using a one-dimensional array of localized scatterers

Supporting Information for Suppressing Klein tunneling in graphene using a one-dimensional array of localized scatterers Supporting Information for Suppressing Kein tunneing in graphene using a one-dimensiona array of ocaized scatterers Jamie D Was, and Danie Hadad Department of Chemistry, University of Miami, Cora Gabes,

More information

LIFE PREDICTION OF SATELLITE LITHIUM BATTERY BASED ON MULTI TIME-SCALE EXTENDED KALMAN FILTER (EKF) ALGORITHM

LIFE PREDICTION OF SATELLITE LITHIUM BATTERY BASED ON MULTI TIME-SCALE EXTENDED KALMAN FILTER (EKF) ALGORITHM U.P.B. Sci. Bu., Series C, Vo. 80, Iss. 4, 2018 ISSN 2286-3540 LIFE PREDICION OF SAELLIE LIHIUM BAERY BASED ON MULI IME-SCALE EXENDED KALMAN FILER (EKF) ALGORIHM Qian-Qian LIU 1, Bing CHEN 2, Jingyuan

More information

Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity

Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity Error-free Muti-vaued Broadcast and Byzantine Agreement with Optima Communication Compexity Arpita Patra Department of Computer Science Aarhus University, Denmark. arpita@cs.au.dk Abstract In this paper

More information

FREQUENCY modulated differential chaos shift key (FM-

FREQUENCY modulated differential chaos shift key (FM- Accepted in IEEE 83rd Vehicuar Technoogy Conference VTC, 16 1 SNR Estimation for FM-DCS System over Mutipath Rayeigh Fading Channes Guofa Cai, in Wang, ong ong, Georges addoum Dept. of Communication Engineering,

More information

A Branch and Cut Algorithm to Design. LDPC Codes without Small Cycles in. Communication Systems

A Branch and Cut Algorithm to Design. LDPC Codes without Small Cycles in. Communication Systems A Branch and Cut Agorithm to Design LDPC Codes without Sma Cyces in Communication Systems arxiv:1709.09936v1 [cs.it] 28 Sep 2017 Banu Kabakuak 1, Z. Caner Taşkın 1, and Ai Emre Pusane 2 1 Department of

More information

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network

More information

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity

More information

Elliptic Curves and Cryptography

Elliptic Curves and Cryptography Ellitic Curves and Crytograhy Background in Ellitic Curves We'll now turn to the fascinating theory of ellitic curves. For simlicity, we'll restrict our discussion to ellitic curves over Z, where is a

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Melodic contour estimation with B-spline models using a MDL criterion

Melodic contour estimation with B-spline models using a MDL criterion Meodic contour estimation with B-spine modes using a MDL criterion Damien Loive, Ney Barbot, Oivier Boeffard IRISA / University of Rennes 1 - ENSSAT 6 rue de Kerampont, B.P. 80518, F-305 Lannion Cedex

More information

Two-sample inference for normal mean vectors based on monotone missing data

Two-sample inference for normal mean vectors based on monotone missing data Journa of Mutivariate Anaysis 97 (006 6 76 wwweseviercom/ocate/jmva Two-sampe inference for norma mean vectors based on monotone missing data Jianqi Yu a, K Krishnamoorthy a,, Maruthy K Pannaa b a Department

More information

Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correlated Channel Failures

Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correlated Channel Failures Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correated Channe Faiures Andrey Lyakhov Vadimir Vishnevsky Institute for Information Transmission Probems of RAS B. Karetny 19, Moscow, 127994, Russia

More information

Coded Caching for Files with Distinct File Sizes

Coded Caching for Files with Distinct File Sizes Coded Caching for Fies with Distinct Fie Sizes Jinbei Zhang iaojun Lin Chih-Chun Wang inbing Wang Department of Eectronic Engineering Shanghai Jiao ong University China Schoo of Eectrica and Computer Engineering

More information

Rate Adaptation Games in Wireless LANs: Nash Equilibrium and Price of Anarchy

Rate Adaptation Games in Wireless LANs: Nash Equilibrium and Price of Anarchy Rate Adaptation Games in Wireess LANs: Nash Equiibrium and Price of Anarchy Prasanna Chaporkar, Aexandre Proutiere, and Božidar Radunović Technica Report MSR-TR-2008-137 Microsoft Research Microsoft Corporation

More information

A simple reliability block diagram method for safety integrity verification

A simple reliability block diagram method for safety integrity verification Reiabiity Engineering and System Safety 92 (2007) 1267 1273 www.esevier.com/ocate/ress A simpe reiabiity bock diagram method for safety integrity verification Haitao Guo, Xianhui Yang epartment of Automation,

More information

Lower Bounds for the Relative Greedy Algorithm for Approximating Steiner Trees

Lower Bounds for the Relative Greedy Algorithm for Approximating Steiner Trees This paper appeared in: Networks 47:2 (2006), -5 Lower Bounds for the Reative Greed Agorithm for Approimating Steiner Trees Stefan Hougard Stefan Kirchner Humbodt-Universität zu Berin Institut für Informatik

More information

Efficient Visual-Inertial Navigation using a Rolling-Shutter Camera with Inaccurate Timestamps

Efficient Visual-Inertial Navigation using a Rolling-Shutter Camera with Inaccurate Timestamps Efficient Visua-Inertia Navigation using a Roing-Shutter Camera with Inaccurate Timestamps Chao X. Guo, Dimitrios G. Kottas, Ryan C. DuToit Ahmed Ahmed, Ruipeng Li and Stergios I. Roumeiotis Mutipe Autonomous

More information

ON SEQUENCES WITHOUT GEOMETRIC PROGRESSIONS

ON SEQUENCES WITHOUT GEOMETRIC PROGRESSIONS MATHEMATICS OF COMPUTATION VOLUME 00, NUMBER 00 Xxxx 19xx, PAGES 000 000 ON SEQUENCES WITHOUT GEOMETRIC PROGRESSIONS BRIENNE E. BROWN AND DANIEL M. GORDON Abstract. Severa aers have investigated sequences

More information

Power-Availability-Aware Cell Association for Energy-Harvesting Small-Cell Base Stations

Power-Availability-Aware Cell Association for Energy-Harvesting Small-Cell Base Stations 1 Power-Avaiabiity-Aware Ce Association for Energy-Harvesting Sma-Ce ase Stations Fanny Parzysz, Member, IEEE, Marco Di Renzo, Senior Member, IEEE, and Christos Veriouis, Senior Member, IEEE arxiv:1607.02317v2

More information

THINKING IN PYRAMIDS

THINKING IN PYRAMIDS ECS 178 Course Notes THINKING IN PYRAMIDS Kenneth I. Joy Institute for Data Anaysis and Visuaization Department of Computer Science University of Caifornia, Davis Overview It is frequenty usefu to think

More information

Developing a Master Production Schedule Using Fuzzy Mixed Integer Linear Programming

Developing a Master Production Schedule Using Fuzzy Mixed Integer Linear Programming Proceedings of the 203 Internationa Conference on Aied Mathematics and Comutationa Methods Deveoing a Master Production Schedue Using Fuzzy Mixed Integer inear Programming Mohamed. Omar a, Muzana Mohd-Jusoh

More information

STABILITY OF A PARAMETRICALLY EXCITED DAMPED INVERTED PENDULUM 1. INTRODUCTION

STABILITY OF A PARAMETRICALLY EXCITED DAMPED INVERTED PENDULUM 1. INTRODUCTION Journa of Sound and Vibration (996) 98(5), 643 65 STABILITY OF A PARAMETRICALLY EXCITED DAMPED INVERTED PENDULUM G. ERDOS AND T. SINGH Department of Mechanica and Aerospace Engineering, SUNY at Buffao,

More information

The influence of temperature of photovoltaic modules on performance of solar power plant

The influence of temperature of photovoltaic modules on performance of solar power plant IOSR Journa of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vo. 05, Issue 04 (Apri. 2015), V1 PP 09-15 www.iosrjen.org The infuence of temperature of photovotaic modues on performance

More information

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische

More information

Primal and dual active-set methods for convex quadratic programming

Primal and dual active-set methods for convex quadratic programming Math. Program., Ser. A 216) 159:469 58 DOI 1.17/s117-15-966-2 FULL LENGTH PAPER Prima and dua active-set methods for convex quadratic programming Anders Forsgren 1 Phiip E. Gi 2 Eizabeth Wong 2 Received:

More information

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes A Fundamenta Storage-Communication Tradeoff in Distributed Computing with Stragging odes ifa Yan, Michèe Wigger LTCI, Téécom ParisTech 75013 Paris, France Emai: {qifa.yan, michee.wigger} @teecom-paristech.fr

More information

Some Measures for Asymmetry of Distributions

Some Measures for Asymmetry of Distributions Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester

More information

Rate-Distortion Theory of Finite Point Processes

Rate-Distortion Theory of Finite Point Processes Rate-Distortion Theory of Finite Point Processes Günther Koiander, Dominic Schuhmacher, and Franz Hawatsch, Feow, IEEE Abstract We study the compression of data in the case where the usefu information

More information

ASummaryofGaussianProcesses Coryn A.L. Bailer-Jones

ASummaryofGaussianProcesses Coryn A.L. Bailer-Jones ASummaryofGaussianProcesses Coryn A.L. Baier-Jones Cavendish Laboratory University of Cambridge caj@mrao.cam.ac.uk Introduction A genera prediction probem can be posed as foows. We consider that the variabe

More information

Biometrics Unit, 337 Warren Hall Cornell University, Ithaca, NY and. B. L. Raktoe

Biometrics Unit, 337 Warren Hall Cornell University, Ithaca, NY and. B. L. Raktoe NONISCMORPHIC CCMPLETE SETS OF ORTHOGONAL F-SQ.UARES, HADAMARD MATRICES, AND DECCMPOSITIONS OF A 2 4 DESIGN S. J. Schwager and w. T. Federer Biometrics Unit, 337 Warren Ha Corne University, Ithaca, NY

More information

INTELLIGENT PI CONTROLLER AND ITS APPLICATION

INTELLIGENT PI CONTROLLER AND ITS APPLICATION Journa of Automation, Mobie Robotics & Inteigent Systems VOLUME, N 00 INELLIGEN PI CONROLLER AND IS APPLICAION O DISSOLVED OXYGEN RACKING PROBLEM rd th Received Setember 009; acceted 7 Ari 00. omasz Zubowicz,

More information

Gauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law

Gauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law Gauss Law 1. Review on 1) Couomb s Law (charge and force) 2) Eectric Fied (fied and force) 2. Gauss s Law: connects charge and fied 3. Appications of Gauss s Law Couomb s Law and Eectric Fied Couomb s

More information

ALGORITHMIC SUMMATION OF RECIPROCALS OF PRODUCTS OF FIBONACCI NUMBERS. F. = I j. ^ = 1 ^ -, and K w = ^. 0) n=l r n «=1 -*/!

ALGORITHMIC SUMMATION OF RECIPROCALS OF PRODUCTS OF FIBONACCI NUMBERS. F. = I j. ^ = 1 ^ -, and K w = ^. 0) n=l r n «=1 -*/! ALGORITHMIC SUMMATIO OF RECIPROCALS OF PRODUCTS OF FIBOACCI UMBERS Staney Rabinowitz MathPro Press, 2 Vine Brook Road, Westford, MA 0886 staney@tiac.net (Submitted May 997). ITRODUCTIO There is no known

More information

sensors Beamforming Based Full-Duplex for Millimeter-Wave Communication Article

sensors Beamforming Based Full-Duplex for Millimeter-Wave Communication Article sensors Artice Beamforming Based Fu-Dupex for Miimeter-Wave Communication Xiao Liu 1,2,3, Zhenyu Xiao 1,2,3, *, Lin Bai 1,2,3, Jinho Choi 4, Pengfei Xia 5 and Xiang-Gen Xia 6 1 Schoo of Eectronic and Information

More information

Besicovitch and other generalizations of Bohr s almost periodic functions

Besicovitch and other generalizations of Bohr s almost periodic functions Besicovitch and other generaizations of Bohr s amost eriodic functions Kevin Nowand We discuss severa casses of amost eriodic functions which generaize the uniformy continuous amost eriodic (a..) functions

More information

Optimization Based Bidding Strategies in the Deregulated Market

Optimization Based Bidding Strategies in the Deregulated Market Optimization ased idding Strategies in the Dereguated arket Daoyuan Zhang Ascend Communications, nc 866 North ain Street, Waingford, C 0649 Abstract With the dereguation of eectric power systems, market

More information