Listen-and-Talk: Full-duplex Cognitive Radio Networks
|
|
- Magnus Owen
- 6 years ago
- Views:
Transcription
1 Liten-and-Talk: Full-duplex Cognitive Radio Network Yun Liao, Tianyu Wang, Lingyang Song, and Zhu Han State Key Laboratory of Advanced Optical Communication Sytem and Network, School of Electrical Engineering and Computer Science, Peking Univerity, Beijing, China, Electrical and Computer Engineering Department, Univerity of Houton, Houton, TX, USA. arxiv:7.335v [c.ni] 3 Jul Abtract In traditional cognitive radio network, econdary uer SU typically acce the pectrum of primary uer PU by a two-tage liten-before-talk LBT protocol, i.e., SU ene the pectrum hole in the firt tage before tranmit in the econd tage. In thi paper, we propoe a novel litenand-talk LAT protocol with the help of the full-duplex FD technique that allow SU to imultaneouly ene and acce the vacant pectrum. Analyi of ening performance and SU throughput are given for the propoed LAT protocol. And we find that due to elf-interference caued by FD, increaing tranmitting power of SU doe not alway benefit to SU throughput, which implie the exitence of a power-throughput tradeoff. Beide, though the LAT protocol uffer from elf-interference, it allow longer tranmiion time, while the performance of the traditional LBT protocol i limited by channel patial correction and relatively horter tranmiion period. To thi end, we alo preent an adaptive cheme to improve SU throughput by witching between the LAT and LBT protocol. Numerical reult are provided to verify the propoed method and the theoretical reult. I. INTRODUCTION With the fat development of wirele communication, pectrum reource ha become increaingly carce. Cognitive radio, a a promiing olution to pectrum hortage, ha caued wide attention for more than a decade [] []. In cognitive radio network CRN, unlicened or econdary uer SU are allowed to opportunitically utilize the vacant lot in the pectrum allocated to primary uer PU. SU therefore need to earch for pectrum hole reliably and efficiently to protect the PU network a well a maximize their own throughput [3]. Traditionally, the o-called liten-before-talk LBT trategy in which SU ene the target channel before tranmiion ha been extenively tudied []. Optimization of ening and tranmiion duration ha been dicued in [5] and [6]. Thi LBT trategy require little infratructure upport and it prove to be effective. However, it till ha everal problem uch a acrifice of tranmitting time and dicontinuity of tranmiion even if the white pace of pectrum i continuou. The major reaon i that mot current deployed radio for wirele communication are half duplex uch that to diipate the preciou reource by either employing time-diviion or frequency-diviion. A full-duplex ytem, where a node can end and receive at the ame time and frequency reource, offer the potential to double the pectral efficiency. However, due to the cloe proximity of a given modem tranmit antenna to it receive antenna, trong elf-interference introduced by it own tranmiion make decoding proce nearly impoible, which i the reaon why realization of FD technique ha not be deemed poible until recently. The lat everal year witne the advent of interference reduction technique [7] that provide the poibility of introducing FD to wirele communication. A number of work have been done to meaure the performance of FD technique which how that under certain circumtance, uing FD can achieve better pectral efficiency than traditional half-duplex ytem [8]. Motivated by the FD technique, in thi paper, we propoe a liten-and-talk LAT protocol imultaneouly ening the pectrum and tranmitting data for CRN. At each moment, one of the antenna at each SU ene the target pectrum band, and judge if the PU i buy or idle; the other antenna tranmit data imultaneouly or keep ilent on the bai of the ening reult. Energy detection under imperfect elfinterference uppreion SIS i ued a the pectrum ening trategy. We cloely look into two cae when the SU i tranmitting or remaining ilent. Alo, adaptive threhold of detection are given. To compare the LAT protocol with the conventional LBT protocol, we derive the probability of fale alarm and mi detection, and the ytem throughput for thee two protocol. We alo analyze the power-throughput tradeoff for the LAT protocol. While overcoming dicontinuity of tranmiion in conventional LBT protocol, the propoed LAT protocol till uffer the throughput lo by evere elf-interference when tranmit power increae. To thi end, we propoe an adaptive witching cheme between conventional and LAT approache in puruit of maximum throughput with the contraint of detection probability. Simulation reult are provided to verify the propoed method in term of the ignal-to-noie ratio SNR, average SU tranmit power, SIS factor in the LAT protocol, patial correlation coefficient and ening duration in the conventional LBT protocol. The ret of the paper i organized a follow. Section II decribe the ytem model of the conventional LBT and the propoed LAT protocol. In Section III, we derive the analytical performance of the LAT protocol. In Section IV, we propoe a witching cheme between the LBT and LAT protocol. Simulation reult are preented to verify our analyi and viually how the throughput gain of the adaptive cheme, in comparion with both LBT and LAT protocol in Section V. We conclude the paper in Section VI.
2 PU dynamic SU lot SU -Ant.& SU -Ant. SU -Ant. Fig.. inactive τ T active change threhold inactive Sytem model: LBT and LAT protocol a Liten before Talk b Liten and Talk II. SYSTEM MODEL Conventional ening FD ening with SI FD ening without SI Data tranmiion Silent In thi paper, we conider a CRN coniting of one PU and one SU pair, where SU tranmit data to SU. Each SU i equipped with two antenna Ant and Ant. The pectrum band occupancy by the PU can be modeled a an alternating ON/OFF random proce. The ening and tranmiion proce i time-lotted. For implicity and without lo of generality, energy detection i adopted a the ening cheme, and the tet tatitic can be given a M = N yn, N n= where N denote the number of ample, and yn i the received ignal of the n th ample. Let f repreent the ampling frequency in ening proce, and for ening duration t, we have N f t. We refer to the ituation when PU i inactive a hypothei H, and the ituation when PU i active i hypotheih. The probability of fale alarm and mi detection can be written a P f ǫ = PrM > ǫ H and P m ǫ = PrM < ǫ H, 3 repectively, where ǫ denote the detection threhold. A. Traditional Liten-before-Talk Protocol In thi protocol, each lot T i divided into two ublot a hown in Fig. a: ening ublot with duration τ, and data tranmiion ublot with duration T τ. Note that for comparion fairne with the FD baed cheme, a MIMO i ued for both pectrum ening and data tranmiion. And the ignal received at SU in the ening tage can be repreented by h p +u, H, y = u, H, where y, h, and u are vector repreenting the received ignal, channel from PU to SU, and noie term, repectively, and P i the PU ignal which i aumed to be PSK modulated with variance σp. The noie i independent and identically ditributed i.i.d. random Gauian with zero mean and variance. With the eparable correlation model [7], h can be expreed a h = Φ / h where h CN,σ h, and Φ tand for the normalized correlation matrix at SU. The data are tranmitted in a patial multiplexing way, and at SU, we can have r = H t +u, 5 where H = Φ / r H t Φ / t i a channel matrix from SU to SU, H t i i.i.d. complex-valued Gauian with zero mean and variance σ h, and t i the tranmit ignal vector with variance σ. For implicity, the exponential correlation model [9] i ued for both ening and tranmiion, and the correlation matrix can be repreented by Φ = β β, β [,, 6 where the correlation coefficient β i the patial correlation factor. B. Liten-and-Talk Protocol A hown in Fig. b, SU perform ening and tranmiion imultaneouly uing the FD technique: one of the two antenna at SU, ay Ant, ene the pectrum while the other Ant tranmit when a pectrum hole i detected. The challenge in thi mode i that the tranmit ignal at Ant of SU i received by Ant, which caue elf-interference at Ant. Thu, for ening, the received ignal i largely decided by the tate of the other antenna: if Ant of SU i not tranmitting, there i no difference to the conventional ening method in, while if SU i tranmitting, elf-interference will be introduced to the ytem. Given the difference above, we conider the circumtance when SU i tranmitting or not eparately. Sening without tranmiion: In thi cae, the SU perform ening by one antenna only, and we have h P +u, H, y = 7 u, H, where H and H repreent the hypotheie when SU i ilent, and the PU i buy or idle, repectively, and h i the Rayleigh channel from PU to Ant of SU, u CN, denote the noie. Sening and tranmiion: With elf-interference, the received ignal can be written a h P +h i t +u, H, y = 8 h i t +u, H, where H and H are the hypotheie under which SU i tranmitting and the PU i either buy or idle, repectively. t in 8 denote the tranmit ignal at Ant of SU and h i repreent the elf-interference channel from Ant to Ant. According to [8], h i t can be modeled a a Rayleigh ditribution with zero mean and variance χ σ, where χ repreent the SIS factor. In the LAT protocol, only one link i ued to data tranmiion and the received ignal at Ant of SU i r = h t +u, 9
3 TABLE I PROPERTIES OF PDFS OF LAT PU activity SU activity Hypothei PU SU E[M LAT ] var[m LAT ] H idle ilent σ u buy ilent S active S H buy ilent +γ σ u +γ H idle active +γ i σ u H buy active +γ +γ i σ u +γ i +γ +γ i idle ilent S active S where h CN,σ h i the tranmit channel from SU to SU, and u CN, repreent the AWGN noie. III. LISTEN-AND-TALK PROTOCOL ANALYSIS In thi ection, we mainly tudy the analytical performance of the LAT protocol, derive throughput under the contraint of a given mi detection probability, and tudy the powerthroughput tradeoff. A. Probability of Mi Detection and Fale Alarm Note that the tet tatitic M LAT i not only determined by PU activity, but alo by the SU tranmitter behavior. We conider four condition when PU i active or not, and SU i tranmitting or not, eparately. According to, for each condition, the tet tatitic can be written a M LAT = N,LAT N,LAT n= yn, where N,LAT = f T i the ample number in the LAT protocol and y take different form in different condition. Note that y in each ample i i.i.d. and we aume N,LAT i large enough. According to central limit theorem CLT, the PDF of M LAT can be approximated by a Gauian ditribution. The tatitical propertie and the decription under each condition are given in Table. I, where γ = σ h σ P σ in Table. I u denote the SNR in ening, andγ i = χ σ σ i the interferenceto-noie ratio INR. Detailed derivation of the ditribution u propertie are provided in Appendix A. Let ǫ be the detection threhold when SU i ilent H, H. Recalling the received ignal in 7, and uing, the probability of fale alarm Pf,LAT can be written a Pf,LAT ǫ ǫ f = Q T, where Q i the complementary ditribution function of the tandard Gauian ditribution. Furthermore, the probability of mi detection can be obtained from 3 a Pm,LAT ǫ f ǫ = Q +γ T. For a given probability of mi detection Pm, the ening threhold ǫ i given by Q Pm ǫ = f T σ u + +γ σ u. 3 Fig.. P f,lat SU tate tranition graph of the LAT protocol Subtitute 3 to, we have the analytical fale alarm probability written a P m = Q Q Pm +γ +γ f T. Similarly, when SU i tranmitting H, H, and the detection threhold i ǫ, the mi detection probability Pm,LAT and the fale alarm probability P f,lat are Pm,LAT ǫ ǫ f = Q +γ +γ i T, and Pf,LAT ǫ ǫ = Q +γ i f T, 5 repectively. And for a fixed probability of mi detection Pm, the fale alarm probability can be derived a P m P f,lat = Q Q Pm + γ + γ f T. +γ i +γ i The change among the four tate are modeled a two dicrete-time Markov chain DTMC illutrated in Fig., in which we aume that the PU activity change lowly compared to the duration of each time lot T, and a ingle lot when the PU change it tate can be neglected. Given that the probability for the ytem taying in each tate p ij i,j =, can be calculated conidering the teady-tate ditribution of the Markov chain: p P m,lat = p P m,lat, p Pf,LAT = p Pf,LAT, 6 p +p =, p +p =. Then, the mi detection probability of the ytem i P m,lat P m,lat = p = +Pm,LAT, 7 P m,lat and the probability of the overall fale alarm i P f,lat P f,lat = p = Pf,LAT. 8 +P f,lat Within the limit of overall mi detection probability P m,lat = P m, we obtain the contraint of P m,lat and P m,lat from 7. For implicity, we et P m,lat = P m,lat,
4 and thu, Pm,LAT = P m,lat = P m. From and, the tet threhold can be obtained according to SU activity a follow: When SU i ilent, uing, we have Q P m ǫ P m = + +γ σ f T u. 9 When SU i active, uing, the threhold ǫ i Q P m ǫ P m = + +γ +γ i f T. In how in 9 and that when SU tranmit, the detection threhold increae due to reidual elf-interference. Conequently, the probability of fale alarm Pf,LAT and P f,lat are different: P f,lat P m = Q Q P m +γ +γ f T, Pf,LAT P m = Q Q P m + γ + γ f T. +γ i +γ i Subtituting to 8, we can obtain the fale alarm probability of the whole ytem. B. SU Throughput During tranmiion, with tranmit power σ, channel gain h t CN,σ h, and noie variance, the um-rate can be written a R LAT = log + σ σ h σ u = log +γ t, whereγ t repreent the SNR in tranmiion. And the throughput can be expreed a C LAT = R LAT P f,lat. 3 It i hown in the expreion of R LAT and P f,lat that the throughput increae with SNR in ening γ, and decreae with SIS factor χ. C. Power-Throughput Tradeoff Analyi In the LAT protocol, σ i poitively proportional to γ t, and thereby poitively related to the um rate. On the other hand, the power ha trong influence on ening performance, ince it i alo proportional to elf-interference. Theoretically, with fixed SIS factor χ, the ening reult deteriorate with the tranmit power. With regard to the throughput, when tranmit power i mall, elf-interference become negligible. The ening reult are reliable, and yet the throughput i limited. When the power i large, however, tranmit power i no longer the limitation for the achievable um rate R LAT, but elf-interference may caue an unbearable high probability of fale alarm. Thi may lead to evere wate of pectrum hole, which i alo likely to decreae the throughput. Hence, there exit an optimal tranmit power to achieve the bet throughput. Note that due to pace limitation, the mathematical proof will be given in our future work. TABLE II PROPERTIES OF PDFS OF THE TEST STATISTICS BY LBT H H Mean E[M LBT ] Variance var[m LBT ] σ u γ +σ u f τ [β γ +γ + ] f τ IV. SWITCHING BETWEEN LAT AND LBT There exit limitation for both LBT and LAT protocol. In the LBT, the data tranmiion time i reduced becaue of pectrum ening, and the overall throughput i alo affected by patial correlation. In the LAT, reidual elf-interference i the main problem that decreae the performance. In thi ection, we firt briefly derive the ening performance and throughput in the LBT protocol, and then propoe an adaptive witching cheme to maximize SU throughput by electing the right protocol between the LAT and LBT protocol for CRN. A. Performance Analyi of LBT The tet tatic M LBT can be generally written a M LBT = N,LBT N,LBT n= y n + y n, wheren,lbt = f τ i the number of ample in each ening ublot, and y i pecified in. Again, the ditribution of M LBT can be approximated by a Gauian ditribution according to CLT, given that each ample y + y i i.i.d. and N,LBT i ufficiently large. The propertie of the PDF under both hypotheie are preented in Table. II, in which β denote the patial correlation coefficient in ening. Detailed derivation of the ditribution propertie are provided in Appendix A. The probabilitie of fale alarm and mi detection can be written, repectively, a ǫ f P f,lbt ǫ;τ = Q τ, ǫ γ +σ u P m,lbt ǫ;τ = Q f τ ξσ u, 5 where ξ := βγ +γ +. And for a given probability of mi detection P m, the analytical fale alarm probability can be derived from 5 a P f,lbt P m ;τ = Q Q P m ξ +γ f τ. 6 In tranmiion, with the contraint of average total power σ, the tranmit power at each antenna i P each = σ T T τ, 7 and the average um rate i given by [ R LBT = E log det I+ P ] each H H H. 8
5 At high SNR, R LBT in 8 can be reduced a [ Tσ ] R con E log det T τ H H H T = log +log T τ γ t +log β t +log β r, 9 where β t and β r repreent the patial correlation at SU tranmitter SU and receiver SU, repectively. The throughput can be expreed a C LBT = R LBT P f,lbt, 3 which indicate that the throughput increae with tranmit power σ and SNR in ening γ, and it decreae with the patial correlation coefficient β, β r, and β t. B. Switching Algorithm Combining the throughput of conventional LBT and the propoed LAT protocol in 3 and 3, repectively, the theoretical optimal witching criterion can be derived. Let C be the difference of throughput between the two mode, we have C = C LBT C LAT, 3 and thu, the witching criterion i decided by the value of C: Liten-before-talk, C, operation mode = 3 Liten-and-talk, C <. With C =, the optimal witching point can be eaily calculated. Note that from 3, it implie that the witching point i related to the following tatitical factor: SNR γ, γ t and tranmit power σ during ening and data tranmiion, patial correlation coefficient β, β r, β t and the proportion of ening time in a whole time lot τ T in the LBT protocol, and SIS factor χ in the LAT protocol. V. SIMULATION RESULTS In thi ection, imulation reult are preented to evaluate the performance of the propoed LAT protocol. Table. III lit ome important parameter in the imulation. For implification, we et the patial correlation coefficient β = β r = β t = β. In Fig. 3, we conider the optimal witching point baed on the patial correlation coefficient, in which the probability of mi detection P m i fixed by.3, the ening SNR i db, and the relative tranmit power i 3dB. We invetigate the cae when the SIS factor χ i. and., and when the ening duration in the LBT protocol change between and. Fig. 3 include both analytical reult the real line and dotted line and numerical reult variou type of dot, which match perfectly. It can be hown that in the conventional LBT protocol, the achievable throughput decreae with the increment of patial correlation, and to a certain point, the LAT protocol outperform the conventional LBT protocol. Alo, when reidual elf-interference increae, e.g., from. to., the performance of the LAT protocol become wore, and the witching point move to a higher β. Throughput Fig. 3. Parameter TABLE III SIMULATION PARAMETERS The duration of each time lot T Value. m The duration of ening time in LBT τ.5t,.t The ampling frequency f MHz The number of ample in LAT N,LAT The relative noie variance σ u The relative tranmit power over noie P t SNR in ening proce γ 3dB db SIS factor in LAT χ.,. The patial correlation coefficient β.7,.8.9 Probability of mi detection P m LAT: χ =. LAT: χ =. LBT: τ/t = / LBT: τ/t = / Spatial correlation coefficient β SU achievable throughput veru patial correlation coefficient β In Fig., we ue the receiver operating characteritic curve ROC curve to preent the ening performance under different ituation. With SIS factor χ =.,. in the LAT protocol, patial correlation coefficient β fixed on.7, and the ening time take up, in each time lot in the conventional protocol, we have the relationhip between the fale alarm probability and mi detection probability. From Fig., it i hown that the ening performance become wore, i.e., P f increae and P m decreae with the increment of reidual elf-interference and the decrement of ening time. Fig. 5 evaluate the achievable throughput of SU when tranmit power change within a certain range. We can oberve that the power-throughput tradeoff in the LAT protocol, i.e., there exit an optimal tranmit power in the low power range to achieve maximum throughput, and the optimal power decreae with the increment of SIS factor χ. When the tranmit power i low, due to longer tranmit time and mall reidual elf-interference, the LAT protocol can achieve better throughput. When tranmit power become high, the LAT protocol uffer from evere elf-interference while the conventional mode profit from the multiplexing gain, and thu, the conventional LBT protocol gradually become a better option.
6 Probability of detection P d Fig.. Throughput Fig FD: χ=.. FD: χ=. Conventional: τ / T = / Conventional: τ / T = / Probability of fale alarm P f ROC curve of both protocol LAT: χ =. LAT: χ =. LBT: β =.7 LBT :β =.9 Power σ Throughput of both protocol veru tranmit power VI. CONCLUSIONS In thi paper, we preent a LAT protocol that allow SU to imultaneouly ene and acce the pectrum hole. Beide, a witching cheme between the LAT and LBT protocol i provided to improve the throughput of SU. Moreover, a tradeoff in LAT protocol between tranmit power and the throughput i invetigated by both analytical and numerical reult. We find out that, the increment of tranmit power doe not alway yield the improvement of SU throughput, and a mediate value i required to achieve the bet performance. APPENDIX A PROOF OF TABLE. I AND TABLE. II We firt provide the general propertie of the tet tatitic. Given that each yn in i i.i.d., the mean and the variance of M can be calculated a [ E[M] = E y ] ; var[m] = [ var y ]. N Further, if the received ignal y i complex-valued Gauian with mean zero and variance σy, we have and E[M] = σ y, var[m] = [ E y ] σy = σ y. 33 N N Then we conider the concrete form of the received ignal under each hypothei. In the LAT protocol, given the PU ignal, reidual elf-interference, and i.i.d. noie, the received ignal y i complex-valued Gauian with zero mean. The variance of y under the four hypotheie are H, +γ H, +γ i H, and +γ +γ i H, repectively. By ubtituting them into 33, we can obtain the reult in Table. I. Ditribution propertie in the LBT protocol can be obtained by imilar method, and under hypothei H, we have σy =. Under hypothei H, recalling, we have [ ] y + y E = E[ y H y ] = [ ] E h H Φ / H Φ / h + = γ +, and the variance var[m] = N E [ y H y ] = N E [ y H y ] +γ, in which h E[ H h + u H u +h H h u H u = N 3+β σ h +6σ u +6σ h σ u, and thu, var[m] = N [ β γ +γ + ] σ u REFERENCES [] J. Mitola and G. Q. Maguire, Cognitive Radio: Making Software Radio more Peronal, IEEE Peronal Comm., vol. 6, no., pp.3-8, Aug. 999 [] J. Mitola, Cognitive Radio An Integrated Agent Architecture for Software Defined Radio, Ph.D. Thei, Royal Intitute of Technology, Sweden, May.. [3] I. F. Akyildiz, W. Y. Lee, M. C. Vuran, and S.Mohanty, Next Generation/Dynamic Spectrum Acce/Cognitive Radio Wirele Network: A Survey, Computer Network, vol. 5, no. 3, pp. 7-59, Sep. 6. [] T. Yucek and H. Arlan, A Survey of Spectrum Sening Algorithm for Cognitive Radio Application, IEEE Comm. Survey & Tutorial, vol., no., pp. 6-3, Mar. 9. [5] Y. C. Liang, Y. Zeng, E. C. Y. Peh, and A. T. Hoang, Sening- Throughput Tradeoff for Cognitive Nadio Network, IEEE Tran. Wirele Comm., vol. 7, no., pp , Apr. 8. [6] S. Huang, X. Liu, and Z. Ding, Short Paper: On Optimal Sening and Tranmiion Strategie for Dynamic Spectrum Acce, in Proc. IEEE DySPAN, Chicago, IL, Oct. 8 [7] M. Kieling and J. Speidel, Mutual Information of MIMO Channel in Correlated Rayleigh Fading Environment - a General Solution, in IEEE Int. Conf. Comm., vol., pp. 8-88, Pari, France, Jun.. [8] M. Jain, J. I. Choi, T. Kim, D. Bharadia, S. Seth, K. Srinivaan, P. Levi, S. Katti, and P. Sinha. Practical, Real-time, Full Duplex Wirele, in Proc. ACM MobiCom, New York, NY, Sep.. [9] S. L. Loyka, Channel Capacity of MIMO Architecture Uing the Exponential Correlation Matrix, IEEE Comm. Lett., vol. 5, no. 9, pp , Sep.. [] S. Huang, X. Liu, and Z. Ding, Opportunitic Spectrum Acce in Cognitive Radio Network, in Proc. IEEE INFOCOM 9, Rio de Janeiro, Brazil, Apr. 9. ]
Amplify and Forward Relaying; Channel Model and Outage Behaviour
Amplify and Forward Relaying; Channel Model and Outage Behaviour Mehdi Mortazawi Molu Intitute of Telecommunication Vienna Univerity of Technology Guhautr. 5/E389, 4 Vienna, Autria Email: mmortaza@nt.tuwien.ac.at
More informationImproved Interference Cancellation Scheme for Two-User Detection of Alamouti Code
Improved Interference Cancellation Scheme for Two-Uer Detection of Alamouti Code Manav R hatnagar and Are Hjørungne Abtract In thi correpondence, we propoe an improved interference cancellation method
More informationGain and Phase Margins Based Delay Dependent Stability Analysis of Two- Area LFC System with Communication Delays
Gain and Phae Margin Baed Delay Dependent Stability Analyi of Two- Area LFC Sytem with Communication Delay Şahin Sönmez and Saffet Ayaun Department of Electrical Engineering, Niğde Ömer Halidemir Univerity,
More informationDetermination of the local contrast of interference fringe patterns using continuous wavelet transform
Determination of the local contrat of interference fringe pattern uing continuou wavelet tranform Jong Kwang Hyok, Kim Chol Su Intitute of Optic, Department of Phyic, Kim Il Sung Univerity, Pyongyang,
More informationSignaling over MIMO Multi-Base Systems: Combination of Multi-Access and Broadcast Schemes
Signaling over MIMO Multi-Bae Sytem: Combination of Multi-Acce and Broadcat Scheme Mohammad Ali Maddah-Ali Abolfazl S. Motahari and Amir K. Khandani Coding & Signal Tranmiion Laboratory (www.ct.uwaterloo.ca)
More informationμ + = σ = D 4 σ = D 3 σ = σ = All units in parts (a) and (b) are in V. (1) x chart: Center = μ = 0.75 UCL =
Our online Tutor are available 4*7 to provide Help with Proce control ytem Homework/Aignment or a long term Graduate/Undergraduate Proce control ytem Project. Our Tutor being experienced and proficient
More informationA Thresholding-Based Antenna Switching in SWIPT-Enabled MIMO Cognitive Radio Networks with Co-Channel Interference
A Threholding-Baed Antenna Switching in SWIPT-Enabled MIMO Cognitive Radio Network wi Co-Channel Interference Fatma Benkhelifa, and Mohamed-Slim Alouini Computer, Electrical and Maematical Science and
More informationChannel Selection in Multi-channel Opportunistic Spectrum Access Networks with Perfect Sensing
Channel Selection in Multi-channel Opportunitic Spectrum Acce Networ with Perfect Sening Xin Liu Univerity of California Davi, CA 95616 liu@c.ucdavi.edu Bhaar Krihnamachari Univerity of Southern California
More informationJul 4, 2005 turbo_code_primer Revision 0.0. Turbo Code Primer
Jul 4, 5 turbo_code_primer Reviion. Turbo Code Primer. Introduction Thi document give a quick tutorial on MAP baed turbo coder. Section develop the background theory. Section work through a imple numerical
More informationClustering Methods without Given Number of Clusters
Clutering Method without Given Number of Cluter Peng Xu, Fei Liu Introduction A we now, mean method i a very effective algorithm of clutering. It mot powerful feature i the calability and implicity. However,
More informationChapter 5 Optimum Receivers for the Additive White Gaussian Noise Channel
Chapter 5 Optimum Receiver for the Additive White Gauian Noie Channel Table of Content 5.1 Optimum Receiver for Signal Corrupted by Additive White Noie 5.1.1 Correlation Demodulator 5.1. Matched-Filter
More informationChapter 2 Sampling and Quantization. In order to investigate sampling and quantization, the difference between analog
Chapter Sampling and Quantization.1 Analog and Digital Signal In order to invetigate ampling and quantization, the difference between analog and digital ignal mut be undertood. Analog ignal conit of continuou
More informationOptimal Coordination of Samples in Business Surveys
Paper preented at the ICES-III, June 8-, 007, Montreal, Quebec, Canada Optimal Coordination of Sample in Buine Survey enka Mach, Ioana Şchiopu-Kratina, Philip T Rei, Jean-Marc Fillion Statitic Canada New
More informationA Study on Simulating Convolutional Codes and Turbo Codes
A Study on Simulating Convolutional Code and Turbo Code Final Report By Daniel Chang July 27, 2001 Advior: Dr. P. Kinman Executive Summary Thi project include the deign of imulation of everal convolutional
More informationFading Channels: Capacity, BER and Diversity
Fading Channel: Capacity, BER and Diverity Mater Univeritario en Ingeniería de Telecomunicación I. Santamaría Univeridad de Cantabria Introduction Capacity BER Diverity Concluion Content Introduction Capacity
More informationFactor Analysis with Poisson Output
Factor Analyi with Poion Output Gopal Santhanam Byron Yu Krihna V. Shenoy, Department of Electrical Engineering, Neurocience Program Stanford Univerity Stanford, CA 94305, USA {gopal,byronyu,henoy}@tanford.edu
More informationSINGLE CARRIER BLOCK TRANSMISSION WITHOUT GUARD INTERVAL
SINGLE CARRIER BLOCK TRANSMISSION WITHOUT GUARD INTERVAL Kazunori Hayahi Hideaki Sakai Graduate School of Informatic, Kyoto Univerity Kyoto, JAPAN ABSTRACT Thi paper propoe a imple detection cheme for
More informationBogoliubov Transformation in Classical Mechanics
Bogoliubov Tranformation in Claical Mechanic Canonical Tranformation Suppoe we have a et of complex canonical variable, {a j }, and would like to conider another et of variable, {b }, b b ({a j }). How
More informationMinimum Eigenvalue Detection for Spectrum Sensing in Cognitive Radio
International Journal of Electrical and Computer Engineering (IJECE) Vol. 4, No. 4, Augut 014, pp. 63~630 ISSN: 088-8708 63 Minimum Eigenvalue Detection for Spectrum Sening in Cognitive Radio Syed Sajjad
More informationSource slideplayer.com/fundamentals of Analytical Chemistry, F.J. Holler, S.R.Crouch. Chapter 6: Random Errors in Chemical Analysis
Source lideplayer.com/fundamental of Analytical Chemitry, F.J. Holler, S.R.Crouch Chapter 6: Random Error in Chemical Analyi Random error are preent in every meaurement no matter how careful the experimenter.
More information84 ZHANG Jing-Shang Vol. 39 of which would emit 5 He rather than 3 He. 5 He i untable and eparated into n + pontaneouly, which can alo be treated a if
Commun. Theor. Phy. (Beijing, China) 39 (003) pp. 83{88 c International Academic Publiher Vol. 39, No. 1, January 15, 003 Theoretical Analyi of Neutron Double-Dierential Cro Section of n+ 11 B at 14. MeV
More informationAlternate Dispersion Measures in Replicated Factorial Experiments
Alternate Diperion Meaure in Replicated Factorial Experiment Neal A. Mackertich The Raytheon Company, Sudbury MA 02421 Jame C. Benneyan Northeatern Univerity, Boton MA 02115 Peter D. Krau The Raytheon
More informationMODELING OF NEGATIVE INFLUENCES AT THE SIGNAL TRANSMISSION IN THE OPTICAL MEDIUM. Rastislav Róka, Filip Čertík
MODELING OF NEGATIVE INFLUENCES AT THE SIGNAL TRANSMISSION IN THE OPTICAL MEDIUM Ratilav Róka, Filip Čertík Intitute of Telecommunication, FEEIT, Slovak Univerity of Technology in Bratilava E-mail: ratilav.roka@tuba.k,
More informationEfficient Methods of Doppler Processing for Coexisting Land and Weather Clutter
Efficient Method of Doppler Proceing for Coexiting Land and Weather Clutter Ça gatay Candan and A Özgür Yılmaz Middle Eat Technical Univerity METU) Ankara, Turkey ccandan@metuedutr, aoyilmaz@metuedutr
More informationTrellis Shaping Techniques for Satellite Telecommunication Systems
> 1 Trelli Technique for Satellite Telecommunication Sytem M. Álvarez-Díaz 1, M. Neri, C. Moquera 1 and G. E. Corazza 1 Dept. Signal Theory and Communication (TSC), Univerity of Vigo Campu Univeritario
More informationAdvanced Digital Signal Processing. Stationary/nonstationary signals. Time-Frequency Analysis... Some nonstationary signals. Time-Frequency Analysis
Advanced Digital ignal Proceing Prof. Nizamettin AYDIN naydin@yildiz.edu.tr Time-Frequency Analyi http://www.yildiz.edu.tr/~naydin 2 tationary/nontationary ignal Time-Frequency Analyi Fourier Tranform
More informationAN ADAPTIVE SIGNAL SEARCH ALGORITHM IN GPS RECEIVER
N PTIVE SIGNL SERH LGORITHM IN GPS REEIVER Item Type text; Proceeding uthor Li, Sun; Yinfeng, Wang; Qihan, Zhang Publiher International Foundation for Telemetering Journal International Telemetering onference
More informationSocial Studies 201 Notes for March 18, 2005
1 Social Studie 201 Note for March 18, 2005 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the
More informationCompressed Edge Spectrum Sensing for Wideband Cognitive Radios
Compreed Edge Spectrum Sening for Wideband Cognitive Radio Edgar Beck, Carten Bockelmann and Armin Dekory Department of Communication Engineering Univerity of Bremen, Bremen, Germany Email: {beck, bockelmann,
More informationFinding the location of switched capacitor banks in distribution systems based on wavelet transform
UPEC00 3t Aug - 3rd Sept 00 Finding the location of witched capacitor bank in ditribution ytem baed on wavelet tranform Bahram nohad Shahid Chamran Univerity in Ahvaz bahramnohad@yahoo.com Mehrdad keramatzadeh
More informationRandom vs. Deterministic Deployment of Sensors in the Presence of Failures and Placement Errors
Random v. Determinitic Deployment of Senor in the Preence of Failure and Placement Error Paul Baliter Univerity of Memphi pbalitr@memphi.edu Santoh Kumar Univerity of Memphi antoh.kumar@memphi.edu Abtract
More informationSuggested Answers To Exercises. estimates variability in a sampling distribution of random means. About 68% of means fall
Beyond Significance Teting ( nd Edition), Rex B. Kline Suggeted Anwer To Exercie Chapter. The tatitic meaure variability among core at the cae level. In a normal ditribution, about 68% of the core fall
More information7.2 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 281
72 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 28 and i 2 Show how Euler formula (page 33) can then be ued to deduce the reult a ( a) 2 b 2 {e at co bt} {e at in bt} b ( a) 2 b 2 5 Under what condition
More informationNetwork based Sensor Localization in Multi-Media Application of Precision Agriculture Part 2: Time of Arrival
Network baed Senor Localization in Multi-Media Application of Preciion Agriculture Part : Time of Arrival Herman Sahota IBM, Silicon Valley Laboratory Email: hahota@u.ibm.com Ratneh Kumar, IEEE Fellow
More informationProblem Set 8 Solutions
Deign and Analyi of Algorithm April 29, 2015 Maachuett Intitute of Technology 6.046J/18.410J Prof. Erik Demaine, Srini Devada, and Nancy Lynch Problem Set 8 Solution Problem Set 8 Solution Thi problem
More informationIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 10, OCTOBER Wenguang Mao, Xudong Wang, Senior Member, IEEE, and Shanshan Wu
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 10, OCTOBER 2016 8511 Ditributed Opportunitic Scheduling With QoS Contraint for Wirele Network With Hybrid Link Wenguang Mao, Xudong Wang, Senior
More informationBeyond Cut-Set Bounds - The Approximate Capacity of D2D Networks
Beyond Cut-Set Bound - The Approximate Capacity of DD Network Avik Sengupta Hume Center for National Security and Technology Department of Electrical and Computer Engineering Virginia Tech, Blackburg,
More informationComparing Means: t-tests for Two Independent Samples
Comparing ean: t-tet for Two Independent Sample Independent-eaure Deign t-tet for Two Independent Sample Allow reearcher to evaluate the mean difference between two population uing data from two eparate
More informationLecture 4 Topic 3: General linear models (GLMs), the fundamentals of the analysis of variance (ANOVA), and completely randomized designs (CRDs)
Lecture 4 Topic 3: General linear model (GLM), the fundamental of the analyi of variance (ANOVA), and completely randomized deign (CRD) The general linear model One population: An obervation i explained
More informationRELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS
www.arpapre.com/volume/vol29iue1/ijrras_29_1_01.pdf RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS Sevcan Demir Atalay 1,* & Özge Elmataş Gültekin
More informationarxiv: v3 [hep-ph] 15 Sep 2009
Determination of β in B J/ψK+ K Decay in the Preence of a K + K S-Wave Contribution Yuehong Xie, a Peter Clarke, b Greig Cowan c and Franz Muheim d arxiv:98.367v3 [hep-ph 15 Sep 9 School of Phyic and Atronomy,
More informationPerformance of downlink schedulers with superposed or orthogonal transmissions
Equation Chapter 1 Section 1 Thi full text paper a peer revieed at the direction of IEEE Communication Society ubject matter expert for publication in the IEEE ICC 1 proceeding Performance of donlink cheduler
More informationSocial Studies 201 Notes for November 14, 2003
1 Social Studie 201 Note for November 14, 2003 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the
More informationCodes Correcting Two Deletions
1 Code Correcting Two Deletion Ryan Gabry and Frederic Sala Spawar Sytem Center Univerity of California, Lo Angele ryan.gabry@navy.mil fredala@ucla.edu Abtract In thi work, we invetigate the problem of
More informationCharacterizing the Effect of Channel Estimation Error on Distributed Reception with Hard Decision Exchanges
Characterizing the Effect of Channel Etimation Error on Ditributed Reception with Hard Deciion Exchange Sabah Razavi and D. Richard Brown III Department of Electrical and Computer Engineering Worceter
More informationPredicting the Performance of Teams of Bounded Rational Decision-makers Using a Markov Chain Model
The InTITuTe for ytem reearch Ir TechnIcal report 2013-14 Predicting the Performance of Team of Bounded Rational Deciion-maer Uing a Marov Chain Model Jeffrey Herrmann Ir develop, applie and teache advanced
More informationStratified Analysis of Probabilities of Causation
Stratified Analyi of Probabilitie of Cauation Manabu Kuroki Sytem Innovation Dept. Oaka Univerity Toyonaka, Oaka, Japan mkuroki@igmath.e.oaka-u.ac.jp Zhihong Cai Biotatitic Dept. Kyoto Univerity Sakyo-ku,
More informationMassachusetts Institute of Technology Dynamics and Control II
I E Maachuett Intitute of Technology Department of Mechanical Engineering 2.004 Dynamic and Control II Laboratory Seion 5: Elimination of Steady-State Error Uing Integral Control Action 1 Laboratory Objective:
More informationThe Performance of Error and Outage Capacity in SIMO and MISO FSO Links
International Journal of Computer Science and Telecommunication [Volume 3, Iue 7, July ] 36 ISS 47-3338 The Performance of Error and Outage Capacity in SIO and ISO FSO Link. ofidi, A. Chaman-motlagh and.
More informationReliability Analysis of Embedded System with Different Modes of Failure Emphasizing Reboot Delay
International Journal of Applied Science and Engineering 3., 4: 449-47 Reliability Analyi of Embedded Sytem with Different Mode of Failure Emphaizing Reboot Delay Deepak Kumar* and S. B. Singh Department
More informationCHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS
CHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS 8.1 INTRODUCTION 8.2 REDUCED ORDER MODEL DESIGN FOR LINEAR DISCRETE-TIME CONTROL SYSTEMS 8.3
More informationPreemptive scheduling on a small number of hierarchical machines
Available online at www.ciencedirect.com Information and Computation 06 (008) 60 619 www.elevier.com/locate/ic Preemptive cheduling on a mall number of hierarchical machine György Dóa a, Leah Eptein b,
More informationTheoretical study of the dual harmonic system and its application on the CSNS/RCS
Theoretical tudy of the dual harmonic ytem and it application on the CSNS/RCS Yao-Shuo Yuan, Na Wang, Shou-Yan Xu, Yue Yuan, and Sheng Wang Dongguan branch, Intitute of High Energy Phyic, CAS, Guangdong
More informationA BATCH-ARRIVAL QUEUE WITH MULTIPLE SERVERS AND FUZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH
Mathematical and Computational Application Vol. 11 No. pp. 181-191 006. Aociation for Scientific Reearch A BATCH-ARRIVA QEE WITH MTIPE SERVERS AND FZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH Jau-Chuan
More informationDYNAMIC MODELS FOR CONTROLLER DESIGN
DYNAMIC MODELS FOR CONTROLLER DESIGN M.T. Tham (996,999) Dept. of Chemical and Proce Engineering Newcatle upon Tyne, NE 7RU, UK.. INTRODUCTION The problem of deigning a good control ytem i baically that
More informationCHAPTER 4 DESIGN OF STATE FEEDBACK CONTROLLERS AND STATE OBSERVERS USING REDUCED ORDER MODEL
98 CHAPTER DESIGN OF STATE FEEDBACK CONTROLLERS AND STATE OBSERVERS USING REDUCED ORDER MODEL INTRODUCTION The deign of ytem uing tate pace model for the deign i called a modern control deign and it i
More informationPRACTICE FINAL EXAM SOLUTION Jing Liang 12/06/2006
PRACICE FIAL EXAM SOLUIO Jing Liang /6/6 PROBLEM (a) (b) (c) (d) (e) he propagation ignal experience power variation due to the contructive and detructive addition of multi-path ignal component, and therefore
More informationLOAD FREQUENCY CONTROL OF MULTI AREA INTERCONNECTED SYSTEM WITH TCPS AND DIVERSE SOURCES OF POWER GENERATION
G.J. E.D.T.,Vol.(6:93 (NovemberDecember, 03 ISSN: 39 793 LOAD FREQUENCY CONTROL OF MULTI AREA INTERCONNECTED SYSTEM WITH TCPS AND DIVERSE SOURCES OF POWER GENERATION C.Srinivaa Rao Dept. of EEE, G.Pullaiah
More informationC up (E) C low (E) E 2 E 1 E 0
Spreading in lock-fading hannel. Muriel Médard David N.. Te medardmit.edu Maachuett Intitute of Technoy dteeec.berkeley.edu Univerity of alifornia at erkeley btract We conider wideband fading channel which
More informationCONGESTION control is a key functionality in modern
IEEE TRANSACTIONS ON INFORMATION TEORY, VOL. X, NO. X, XXXXXXX 2008 On the Connection-Level Stability of Congetion-Controlled Communication Network Xiaojun Lin, Member, IEEE, Ne B. Shroff, Fellow, IEEE,
More informationIf Y is normally Distributed, then and 2 Y Y 10. σ σ
ull Hypothei Significance Teting V. APS 50 Lecture ote. B. Dudek. ot for General Ditribution. Cla Member Uage Only. Chi-Square and F-Ditribution, and Diperion Tet Recall from Chapter 4 material on: ( )
More informationA Note on the Sum of Correlated Gamma Random Variables
1 A Note on the Sum of Correlated Gamma Random Variable Joé F Pari Abtract arxiv:11030505v1 [cit] 2 Mar 2011 The um of correlated gamma random variable appear in the analyi of many wirele communication
More informationEnd-to-End BER Analysis of Space Shift Keying in Decode-and-Forward Cooperative Relaying
3 IEEE Wirele Communication and Networking Conference (WCNC: PHY End-to-End BER Analyi of Space Shift Keying in Decode-and-Forwa Cooperative Relaying Pritam Som and A. Chockalingam Department of ECE, Indian
More informationTHE EXPERIMENTAL PERFORMANCE OF A NONLINEAR DYNAMIC VIBRATION ABSORBER
Proceeding of IMAC XXXI Conference & Expoition on Structural Dynamic February -4 Garden Grove CA USA THE EXPERIMENTAL PERFORMANCE OF A NONLINEAR DYNAMIC VIBRATION ABSORBER Yung-Sheng Hu Neil S Ferguon
More informationSMALL-SIGNAL STABILITY ASSESSMENT OF THE EUROPEAN POWER SYSTEM BASED ON ADVANCED NEURAL NETWORK METHOD
SMALL-SIGNAL STABILITY ASSESSMENT OF THE EUROPEAN POWER SYSTEM BASED ON ADVANCED NEURAL NETWORK METHOD S.P. Teeuwen, I. Erlich U. Bachmann Univerity of Duiburg, Germany Department of Electrical Power Sytem
More informationEnergy-Distortion Tradeoff for the Gaussian Broadcast Channel with Feedback
016 IEEE International Sympoium on Information Theory Energy-itortion Tradeoff for the Gauian Broadcat Channel with Feedback Yonathan Murin 1, Yonatan Kapi, Ron abora 3, and eniz Gündüz 4 1 Stanford Univerity,
More informationThe continuous time random walk (CTRW) was introduced by Montroll and Weiss 1.
1 I. CONTINUOUS TIME RANDOM WALK The continuou time random walk (CTRW) wa introduced by Montroll and Wei 1. Unlike dicrete time random walk treated o far, in the CTRW the number of jump n made by the walker
More informationLecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004
18.997 Topic in Combinatorial Optimization April 29th, 2004 Lecture 21 Lecturer: Michel X. Goeman Scribe: Mohammad Mahdian 1 The Lovaz plitting-off lemma Lovaz plitting-off lemma tate the following. Theorem
More informationChapter 12 Simple Linear Regression
Chapter 1 Simple Linear Regreion Introduction Exam Score v. Hour Studied Scenario Regreion Analyi ued to quantify the relation between (or more) variable o you can predict the value of one variable baed
More informationTHE Z-TRANSFORM APPLIED TO BIRTH-DEATH MARKOV PROCESSES
he Zranform applied to birthdeath arov procee HE ZRASOR ALIED O BIRHDEAH ARKO ROCESSES H Department of Electronic and Communication niverity of DareSalaam O Box 3594 DareSalaam anania ABSRAC Birthdeath
More informationUNIT 15 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS
UNIT 1 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS Structure 1.1 Introduction Objective 1.2 Redundancy 1.3 Reliability of k-out-of-n Sytem 1.4 Reliability of Standby Sytem 1. Summary 1.6 Solution/Anwer
More informationSIMPLIFIED MODEL FOR EPICYCLIC GEAR INERTIAL CHARACTERISTICS
UNIVERSITY OF PITESTI SCIENTIFIC BULLETIN FACULTY OF ECHANICS AND TECHNOLOGY AUTOOTIVE erie, year XVII, no. ( 3 ) SIPLIFIED ODEL FOR EPICYCLIC GEAR INERTIAL CHARACTERISTICS Ciobotaru, Ticuşor *, Feraru,
More informationNumerical algorithm for the analysis of linear and nonlinear microstructure fibres
Numerical algorithm for the anali of linear and nonlinear microtructure fibre Mariuz Zdanowicz *, Marian Marciniak, Marek Jaworki, Igor A. Goncharenko National Intitute of Telecommunication, Department
More informationWhite Rose Research Online URL for this paper: Version: Accepted Version
Thi i a repoitory copy of Identification of nonlinear ytem with non-peritent excitation uing an iterative forward orthogonal leat quare regreion algorithm. White Roe Reearch Online URL for thi paper: http://eprint.whiteroe.ac.uk/107314/
More informationProactive Serving Decreases User Delay Exponentially: The Light-tailed Service Time Case
Proactive Serving Decreae Uer Delay Exponentially: The Light-tailed Service Time Cae Shaoquan Zhang, Longbo Huang, Minghua Chen, and Xin Liu Abtract In online ervice ytem, the delay experienced by uer
More informationCritical behavior of slider-block model. (Short title: Critical ) S G Abaimov
Critical behavior of lider-bloc model (Short title: Critical ) S G Abaimov E-mail: gabaimov@gmail.com. Abtract. Thi paper applie the theory of continuou phae tranition of tatitical mechanic to a lider-bloc
More informationLoss Less Image firmness comparision by DPCM and DPCM with LMS Algorithm
Lo Le Image firmne compariion by DPCM and DPCM with LMS Algorithm Pramod Kumar Rajput 1 and Brijendra Mihra 2 1,2 Department of Electronic & Communication, Nagaji Intitute of Technology and Management
More informationON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang
Proceeding of the 2008 Winter Simulation Conference S. J. Maon, R. R. Hill, L. Mönch, O. Roe, T. Jefferon, J. W. Fowler ed. ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION Xiaoqun Wang
More informationEstimating floor acceleration in nonlinear multi-story moment-resisting frames
Etimating floor acceleration in nonlinear multi-tory moment-reiting frame R. Karami Mohammadi Aitant Profeor, Civil Engineering Department, K.N.Tooi Univerity M. Mohammadi M.Sc. Student, Civil Engineering
More informationAn estimation approach for autotuning of event-based PI control systems
Acta de la XXXIX Jornada de Automática, Badajoz, 5-7 de Septiembre de 08 An etimation approach for autotuning of event-baed PI control ytem Joé Sánchez Moreno, María Guinaldo Loada, Sebatián Dormido Departamento
More informationLecture 7: Testing Distributions
CSE 5: Sublinear (and Streaming) Algorithm Spring 014 Lecture 7: Teting Ditribution April 1, 014 Lecturer: Paul Beame Scribe: Paul Beame 1 Teting Uniformity of Ditribution We return today to property teting
More informationA Constraint Propagation Algorithm for Determining the Stability Margin. The paper addresses the stability margin assessment for linear systems
A Contraint Propagation Algorithm for Determining the Stability Margin of Linear Parameter Circuit and Sytem Lubomir Kolev and Simona Filipova-Petrakieva Abtract The paper addree the tability margin aement
More informationUnavoidable Cycles in Polynomial-Based Time-Invariant LDPC Convolutional Codes
European Wirele, April 7-9,, Vienna, Autria ISBN 978--87-4-9 VE VERLAG GMBH Unavoidable Cycle in Polynomial-Baed Time-Invariant LPC Convolutional Code Hua Zhou and Norbert Goertz Intitute of Telecommunication
More informationReal Sources (Secondary Sources) Phantom Source (Primary source) LS P. h rl. h rr. h ll. h lr. h pl. h pr
Ecient frequency domain ltered-x realization of phantom ource iet C.W. ommen, Ronald M. Aart, Alexander W.M. Mathijen, John Gara, Haiyan He Abtract A phantom ound ource i a virtual ound image which can
More informationUnified Correlation between SPT-N and Shear Wave Velocity for all Soil Types
6 th International Conference on Earthquake Geotechnical Engineering 1-4 ovember 15 Chritchurch, ew Zealand Unified Correlation between SPT- and Shear Wave Velocity for all Soil Type C.-C. Tai 1 and T.
More informationSOLVING THE KONDO PROBLEM FOR COMPLEX MESOSCOPIC SYSTEMS
SOLVING THE KONDO POBLEM FO COMPLEX MESOSCOPIC SYSTEMS V. DINU and M. ÞOLEA National Intitute of Material Phyic, Bucharet-Magurele P.O. Box MG-7, omania eceived February 21, 2005 Firt we preent the calculation
More informationBahram Noshad Department of Electrical Engineering, Bandar Deylam Branch, Islamic Azad University, Bandar Deylam, Iran.
Journal of Advance in Computer Reearch Quarterly pissn: 345-66x eissn: 345-678 Sari Branch, Ilamic Azad Univerity, Sari, I.R.Iran (Vol. 9, No. 3, Augut 8), Page: - www.jacr.iauari.ac.ir A New Model for
More informationTHE biggest challenge for next generation wireless
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 33, NO. 6, JUNE 2015 1187 Interference Management in 5G Revere TDD HetNet With Wirele Bachaul: A Large Sytem Analyi Luca Sanguinetti, Member, IEEE,
More informationSERIES COMPENSATION: VOLTAGE COMPENSATION USING DVR (Lectures 41-48)
Chapter 5 SERIES COMPENSATION: VOLTAGE COMPENSATION USING DVR (Lecture 41-48) 5.1 Introduction Power ytem hould enure good quality of electric power upply, which mean voltage and current waveform hould
More informationOne Class of Splitting Iterative Schemes
One Cla of Splitting Iterative Scheme v Ciegi and V. Pakalnytė Vilniu Gedimina Technical Univerity Saulėtekio al. 11, 2054, Vilniu, Lithuania rc@fm.vtu.lt Abtract. Thi paper deal with the tability analyi
More informationMulti-dimensional Fuzzy Euler Approximation
Mathematica Aeterna, Vol 7, 2017, no 2, 163-176 Multi-dimenional Fuzzy Euler Approximation Yangyang Hao College of Mathematic and Information Science Hebei Univerity, Baoding 071002, China hdhyywa@163com
More informationResearch Article Goodness-of-Fit Based Secure Cooperative Spectrum Sensing for Cognitive Radio Network
e Scientific World Journal, Article ID 75257, 6 page http://dx.doi.org/.55/24/75257 Reearch Article Goodne-of-Fit Baed Secure Cooperative Spectrum Sening for Cognitive Radio Network Hiep Vu-Van and Inoo
More informationarxiv: v1 [cs.sy] 9 Aug 2017
Trade-Off in Stochatic Event-Triggered Control Burak Demirel, Alex S Leong, Vijay Gupta and Daniel E Quevedo arxiv:70802756v csy 9 Aug 207 Abtract Thi paper tudie the optimal output-feedback control of
More informationResearch Article Reliability of Foundation Pile Based on Settlement and a Parameter Sensitivity Analysis
Mathematical Problem in Engineering Volume 2016, Article ID 1659549, 7 page http://dxdoiorg/101155/2016/1659549 Reearch Article Reliability of Foundation Pile Baed on Settlement and a Parameter Senitivity
More informationControl chart for waiting time in system of (M / M / S) :( / FCFS) Queuing model
IOSR Journal of Mathematic (IOSR-JM) e-issn: 78-578. Volume 5, Iue 6 (Mar. - Apr. 3), PP 48-53 www.iorjournal.org Control chart for waiting time in ytem of (M / M / S) :( / FCFS) Queuing model T.Poongodi,
More informationGiven the following circuit with unknown initial capacitor voltage v(0): X(s) Immediately, we know that the transfer function H(s) is
EE 4G Note: Chapter 6 Intructor: Cheung More about ZSR and ZIR. Finding unknown initial condition: Given the following circuit with unknown initial capacitor voltage v0: F v0/ / Input xt 0Ω Output yt -
More informationTHE PARAMETERIZATION OF ALL TWO-DEGREES-OF-FREEDOM SEMISTRONGLY STABILIZING CONTROLLERS. Tatsuya Hoshikawa, Kou Yamada and Yuko Tatsumi
International Journal of Innovative Computing, Information Control ICIC International c 206 ISSN 349-498 Volume 2, Number 2, April 206 pp. 357 370 THE PARAMETERIZATION OF ALL TWO-DEGREES-OF-FREEDOM SEMISTRONGLY
More informationCOPRIME ARRAYS AND SAMPLERS FOR SPACE-TIME ADAPTIVE PROCESSING
COPRIE ARRAYS AND SAPLERS FOR SPACE-IE ADAPIVE PROCESSING Chun-Lin Liu 1 and P. P. Vaidyanathan 2 Dept. of Electrical Engineering, 136-93 California Intitute of echnology, Paadena, CA 91125, USA E-mail:
More informationAPPLICATION OF THE SINGLE IMPACT MICROINDENTATION FOR NON- DESTRUCTIVE TESTING OF THE FRACTURE TOUGHNESS OF NONMETALLIC AND POLYMERIC MATERIALS
APPLICATION OF THE SINGLE IMPACT MICROINDENTATION FOR NON- DESTRUCTIVE TESTING OF THE FRACTURE TOUGHNESS OF NONMETALLIC AND POLYMERIC MATERIALS REN A. P. INSTITUTE OF APPLIED PHYSICS OF THE NATIONAL ACADEMY
More informationCopyright 1967, by the author(s). All rights reserved.
Copyright 1967, by the author(). All right reerved. Permiion to make digital or hard copie of all or part of thi work for peronal or claroom ue i granted without fee provided that copie are not made or
More information