Listen-and-Talk: Full-duplex Cognitive Radio Networks

Size: px
Start display at page:

Download "Listen-and-Talk: Full-duplex Cognitive Radio Networks"

Transcription

1 Liten-and-Talk: Full-duplex Cognitive Radio Network Yun Liao, Tianyu Wang, Lingyang Song, and Zhu Han State Key Laboratory of Advanced Optical Communication Sytem and Network, School of Electrical Engineering and Computer Science, Peking Univerity, Beijing, China, Electrical and Computer Engineering Department, Univerity of Houton, Houton, TX, USA. arxiv:7.335v [c.ni] 3 Jul Abtract In traditional cognitive radio network, econdary uer SU typically acce the pectrum of primary uer PU by a two-tage liten-before-talk LBT protocol, i.e., SU ene the pectrum hole in the firt tage before tranmit in the econd tage. In thi paper, we propoe a novel litenand-talk LAT protocol with the help of the full-duplex FD technique that allow SU to imultaneouly ene and acce the vacant pectrum. Analyi of ening performance and SU throughput are given for the propoed LAT protocol. And we find that due to elf-interference caued by FD, increaing tranmitting power of SU doe not alway benefit to SU throughput, which implie the exitence of a power-throughput tradeoff. Beide, though the LAT protocol uffer from elf-interference, it allow longer tranmiion time, while the performance of the traditional LBT protocol i limited by channel patial correction and relatively horter tranmiion period. To thi end, we alo preent an adaptive cheme to improve SU throughput by witching between the LAT and LBT protocol. Numerical reult are provided to verify the propoed method and the theoretical reult. I. INTRODUCTION With the fat development of wirele communication, pectrum reource ha become increaingly carce. Cognitive radio, a a promiing olution to pectrum hortage, ha caued wide attention for more than a decade [] []. In cognitive radio network CRN, unlicened or econdary uer SU are allowed to opportunitically utilize the vacant lot in the pectrum allocated to primary uer PU. SU therefore need to earch for pectrum hole reliably and efficiently to protect the PU network a well a maximize their own throughput [3]. Traditionally, the o-called liten-before-talk LBT trategy in which SU ene the target channel before tranmiion ha been extenively tudied []. Optimization of ening and tranmiion duration ha been dicued in [5] and [6]. Thi LBT trategy require little infratructure upport and it prove to be effective. However, it till ha everal problem uch a acrifice of tranmitting time and dicontinuity of tranmiion even if the white pace of pectrum i continuou. The major reaon i that mot current deployed radio for wirele communication are half duplex uch that to diipate the preciou reource by either employing time-diviion or frequency-diviion. A full-duplex ytem, where a node can end and receive at the ame time and frequency reource, offer the potential to double the pectral efficiency. However, due to the cloe proximity of a given modem tranmit antenna to it receive antenna, trong elf-interference introduced by it own tranmiion make decoding proce nearly impoible, which i the reaon why realization of FD technique ha not be deemed poible until recently. The lat everal year witne the advent of interference reduction technique [7] that provide the poibility of introducing FD to wirele communication. A number of work have been done to meaure the performance of FD technique which how that under certain circumtance, uing FD can achieve better pectral efficiency than traditional half-duplex ytem [8]. Motivated by the FD technique, in thi paper, we propoe a liten-and-talk LAT protocol imultaneouly ening the pectrum and tranmitting data for CRN. At each moment, one of the antenna at each SU ene the target pectrum band, and judge if the PU i buy or idle; the other antenna tranmit data imultaneouly or keep ilent on the bai of the ening reult. Energy detection under imperfect elfinterference uppreion SIS i ued a the pectrum ening trategy. We cloely look into two cae when the SU i tranmitting or remaining ilent. Alo, adaptive threhold of detection are given. To compare the LAT protocol with the conventional LBT protocol, we derive the probability of fale alarm and mi detection, and the ytem throughput for thee two protocol. We alo analyze the power-throughput tradeoff for the LAT protocol. While overcoming dicontinuity of tranmiion in conventional LBT protocol, the propoed LAT protocol till uffer the throughput lo by evere elf-interference when tranmit power increae. To thi end, we propoe an adaptive witching cheme between conventional and LAT approache in puruit of maximum throughput with the contraint of detection probability. Simulation reult are provided to verify the propoed method in term of the ignal-to-noie ratio SNR, average SU tranmit power, SIS factor in the LAT protocol, patial correlation coefficient and ening duration in the conventional LBT protocol. The ret of the paper i organized a follow. Section II decribe the ytem model of the conventional LBT and the propoed LAT protocol. In Section III, we derive the analytical performance of the LAT protocol. In Section IV, we propoe a witching cheme between the LBT and LAT protocol. Simulation reult are preented to verify our analyi and viually how the throughput gain of the adaptive cheme, in comparion with both LBT and LAT protocol in Section V. We conclude the paper in Section VI.

2 PU dynamic SU lot SU -Ant.& SU -Ant. SU -Ant. Fig.. inactive τ T active change threhold inactive Sytem model: LBT and LAT protocol a Liten before Talk b Liten and Talk II. SYSTEM MODEL Conventional ening FD ening with SI FD ening without SI Data tranmiion Silent In thi paper, we conider a CRN coniting of one PU and one SU pair, where SU tranmit data to SU. Each SU i equipped with two antenna Ant and Ant. The pectrum band occupancy by the PU can be modeled a an alternating ON/OFF random proce. The ening and tranmiion proce i time-lotted. For implicity and without lo of generality, energy detection i adopted a the ening cheme, and the tet tatitic can be given a M = N yn, N n= where N denote the number of ample, and yn i the received ignal of the n th ample. Let f repreent the ampling frequency in ening proce, and for ening duration t, we have N f t. We refer to the ituation when PU i inactive a hypothei H, and the ituation when PU i active i hypotheih. The probability of fale alarm and mi detection can be written a P f ǫ = PrM > ǫ H and P m ǫ = PrM < ǫ H, 3 repectively, where ǫ denote the detection threhold. A. Traditional Liten-before-Talk Protocol In thi protocol, each lot T i divided into two ublot a hown in Fig. a: ening ublot with duration τ, and data tranmiion ublot with duration T τ. Note that for comparion fairne with the FD baed cheme, a MIMO i ued for both pectrum ening and data tranmiion. And the ignal received at SU in the ening tage can be repreented by h p +u, H, y = u, H, where y, h, and u are vector repreenting the received ignal, channel from PU to SU, and noie term, repectively, and P i the PU ignal which i aumed to be PSK modulated with variance σp. The noie i independent and identically ditributed i.i.d. random Gauian with zero mean and variance. With the eparable correlation model [7], h can be expreed a h = Φ / h where h CN,σ h, and Φ tand for the normalized correlation matrix at SU. The data are tranmitted in a patial multiplexing way, and at SU, we can have r = H t +u, 5 where H = Φ / r H t Φ / t i a channel matrix from SU to SU, H t i i.i.d. complex-valued Gauian with zero mean and variance σ h, and t i the tranmit ignal vector with variance σ. For implicity, the exponential correlation model [9] i ued for both ening and tranmiion, and the correlation matrix can be repreented by Φ = β β, β [,, 6 where the correlation coefficient β i the patial correlation factor. B. Liten-and-Talk Protocol A hown in Fig. b, SU perform ening and tranmiion imultaneouly uing the FD technique: one of the two antenna at SU, ay Ant, ene the pectrum while the other Ant tranmit when a pectrum hole i detected. The challenge in thi mode i that the tranmit ignal at Ant of SU i received by Ant, which caue elf-interference at Ant. Thu, for ening, the received ignal i largely decided by the tate of the other antenna: if Ant of SU i not tranmitting, there i no difference to the conventional ening method in, while if SU i tranmitting, elf-interference will be introduced to the ytem. Given the difference above, we conider the circumtance when SU i tranmitting or not eparately. Sening without tranmiion: In thi cae, the SU perform ening by one antenna only, and we have h P +u, H, y = 7 u, H, where H and H repreent the hypotheie when SU i ilent, and the PU i buy or idle, repectively, and h i the Rayleigh channel from PU to Ant of SU, u CN, denote the noie. Sening and tranmiion: With elf-interference, the received ignal can be written a h P +h i t +u, H, y = 8 h i t +u, H, where H and H are the hypotheie under which SU i tranmitting and the PU i either buy or idle, repectively. t in 8 denote the tranmit ignal at Ant of SU and h i repreent the elf-interference channel from Ant to Ant. According to [8], h i t can be modeled a a Rayleigh ditribution with zero mean and variance χ σ, where χ repreent the SIS factor. In the LAT protocol, only one link i ued to data tranmiion and the received ignal at Ant of SU i r = h t +u, 9

3 TABLE I PROPERTIES OF PDFS OF LAT PU activity SU activity Hypothei PU SU E[M LAT ] var[m LAT ] H idle ilent σ u buy ilent S active S H buy ilent +γ σ u +γ H idle active +γ i σ u H buy active +γ +γ i σ u +γ i +γ +γ i idle ilent S active S where h CN,σ h i the tranmit channel from SU to SU, and u CN, repreent the AWGN noie. III. LISTEN-AND-TALK PROTOCOL ANALYSIS In thi ection, we mainly tudy the analytical performance of the LAT protocol, derive throughput under the contraint of a given mi detection probability, and tudy the powerthroughput tradeoff. A. Probability of Mi Detection and Fale Alarm Note that the tet tatitic M LAT i not only determined by PU activity, but alo by the SU tranmitter behavior. We conider four condition when PU i active or not, and SU i tranmitting or not, eparately. According to, for each condition, the tet tatitic can be written a M LAT = N,LAT N,LAT n= yn, where N,LAT = f T i the ample number in the LAT protocol and y take different form in different condition. Note that y in each ample i i.i.d. and we aume N,LAT i large enough. According to central limit theorem CLT, the PDF of M LAT can be approximated by a Gauian ditribution. The tatitical propertie and the decription under each condition are given in Table. I, where γ = σ h σ P σ in Table. I u denote the SNR in ening, andγ i = χ σ σ i the interferenceto-noie ratio INR. Detailed derivation of the ditribution u propertie are provided in Appendix A. Let ǫ be the detection threhold when SU i ilent H, H. Recalling the received ignal in 7, and uing, the probability of fale alarm Pf,LAT can be written a Pf,LAT ǫ ǫ f = Q T, where Q i the complementary ditribution function of the tandard Gauian ditribution. Furthermore, the probability of mi detection can be obtained from 3 a Pm,LAT ǫ f ǫ = Q +γ T. For a given probability of mi detection Pm, the ening threhold ǫ i given by Q Pm ǫ = f T σ u + +γ σ u. 3 Fig.. P f,lat SU tate tranition graph of the LAT protocol Subtitute 3 to, we have the analytical fale alarm probability written a P m = Q Q Pm +γ +γ f T. Similarly, when SU i tranmitting H, H, and the detection threhold i ǫ, the mi detection probability Pm,LAT and the fale alarm probability P f,lat are Pm,LAT ǫ ǫ f = Q +γ +γ i T, and Pf,LAT ǫ ǫ = Q +γ i f T, 5 repectively. And for a fixed probability of mi detection Pm, the fale alarm probability can be derived a P m P f,lat = Q Q Pm + γ + γ f T. +γ i +γ i The change among the four tate are modeled a two dicrete-time Markov chain DTMC illutrated in Fig., in which we aume that the PU activity change lowly compared to the duration of each time lot T, and a ingle lot when the PU change it tate can be neglected. Given that the probability for the ytem taying in each tate p ij i,j =, can be calculated conidering the teady-tate ditribution of the Markov chain: p P m,lat = p P m,lat, p Pf,LAT = p Pf,LAT, 6 p +p =, p +p =. Then, the mi detection probability of the ytem i P m,lat P m,lat = p = +Pm,LAT, 7 P m,lat and the probability of the overall fale alarm i P f,lat P f,lat = p = Pf,LAT. 8 +P f,lat Within the limit of overall mi detection probability P m,lat = P m, we obtain the contraint of P m,lat and P m,lat from 7. For implicity, we et P m,lat = P m,lat,

4 and thu, Pm,LAT = P m,lat = P m. From and, the tet threhold can be obtained according to SU activity a follow: When SU i ilent, uing, we have Q P m ǫ P m = + +γ σ f T u. 9 When SU i active, uing, the threhold ǫ i Q P m ǫ P m = + +γ +γ i f T. In how in 9 and that when SU tranmit, the detection threhold increae due to reidual elf-interference. Conequently, the probability of fale alarm Pf,LAT and P f,lat are different: P f,lat P m = Q Q P m +γ +γ f T, Pf,LAT P m = Q Q P m + γ + γ f T. +γ i +γ i Subtituting to 8, we can obtain the fale alarm probability of the whole ytem. B. SU Throughput During tranmiion, with tranmit power σ, channel gain h t CN,σ h, and noie variance, the um-rate can be written a R LAT = log + σ σ h σ u = log +γ t, whereγ t repreent the SNR in tranmiion. And the throughput can be expreed a C LAT = R LAT P f,lat. 3 It i hown in the expreion of R LAT and P f,lat that the throughput increae with SNR in ening γ, and decreae with SIS factor χ. C. Power-Throughput Tradeoff Analyi In the LAT protocol, σ i poitively proportional to γ t, and thereby poitively related to the um rate. On the other hand, the power ha trong influence on ening performance, ince it i alo proportional to elf-interference. Theoretically, with fixed SIS factor χ, the ening reult deteriorate with the tranmit power. With regard to the throughput, when tranmit power i mall, elf-interference become negligible. The ening reult are reliable, and yet the throughput i limited. When the power i large, however, tranmit power i no longer the limitation for the achievable um rate R LAT, but elf-interference may caue an unbearable high probability of fale alarm. Thi may lead to evere wate of pectrum hole, which i alo likely to decreae the throughput. Hence, there exit an optimal tranmit power to achieve the bet throughput. Note that due to pace limitation, the mathematical proof will be given in our future work. TABLE II PROPERTIES OF PDFS OF THE TEST STATISTICS BY LBT H H Mean E[M LBT ] Variance var[m LBT ] σ u γ +σ u f τ [β γ +γ + ] f τ IV. SWITCHING BETWEEN LAT AND LBT There exit limitation for both LBT and LAT protocol. In the LBT, the data tranmiion time i reduced becaue of pectrum ening, and the overall throughput i alo affected by patial correlation. In the LAT, reidual elf-interference i the main problem that decreae the performance. In thi ection, we firt briefly derive the ening performance and throughput in the LBT protocol, and then propoe an adaptive witching cheme to maximize SU throughput by electing the right protocol between the LAT and LBT protocol for CRN. A. Performance Analyi of LBT The tet tatic M LBT can be generally written a M LBT = N,LBT N,LBT n= y n + y n, wheren,lbt = f τ i the number of ample in each ening ublot, and y i pecified in. Again, the ditribution of M LBT can be approximated by a Gauian ditribution according to CLT, given that each ample y + y i i.i.d. and N,LBT i ufficiently large. The propertie of the PDF under both hypotheie are preented in Table. II, in which β denote the patial correlation coefficient in ening. Detailed derivation of the ditribution propertie are provided in Appendix A. The probabilitie of fale alarm and mi detection can be written, repectively, a ǫ f P f,lbt ǫ;τ = Q τ, ǫ γ +σ u P m,lbt ǫ;τ = Q f τ ξσ u, 5 where ξ := βγ +γ +. And for a given probability of mi detection P m, the analytical fale alarm probability can be derived from 5 a P f,lbt P m ;τ = Q Q P m ξ +γ f τ. 6 In tranmiion, with the contraint of average total power σ, the tranmit power at each antenna i P each = σ T T τ, 7 and the average um rate i given by [ R LBT = E log det I+ P ] each H H H. 8

5 At high SNR, R LBT in 8 can be reduced a [ Tσ ] R con E log det T τ H H H T = log +log T τ γ t +log β t +log β r, 9 where β t and β r repreent the patial correlation at SU tranmitter SU and receiver SU, repectively. The throughput can be expreed a C LBT = R LBT P f,lbt, 3 which indicate that the throughput increae with tranmit power σ and SNR in ening γ, and it decreae with the patial correlation coefficient β, β r, and β t. B. Switching Algorithm Combining the throughput of conventional LBT and the propoed LAT protocol in 3 and 3, repectively, the theoretical optimal witching criterion can be derived. Let C be the difference of throughput between the two mode, we have C = C LBT C LAT, 3 and thu, the witching criterion i decided by the value of C: Liten-before-talk, C, operation mode = 3 Liten-and-talk, C <. With C =, the optimal witching point can be eaily calculated. Note that from 3, it implie that the witching point i related to the following tatitical factor: SNR γ, γ t and tranmit power σ during ening and data tranmiion, patial correlation coefficient β, β r, β t and the proportion of ening time in a whole time lot τ T in the LBT protocol, and SIS factor χ in the LAT protocol. V. SIMULATION RESULTS In thi ection, imulation reult are preented to evaluate the performance of the propoed LAT protocol. Table. III lit ome important parameter in the imulation. For implification, we et the patial correlation coefficient β = β r = β t = β. In Fig. 3, we conider the optimal witching point baed on the patial correlation coefficient, in which the probability of mi detection P m i fixed by.3, the ening SNR i db, and the relative tranmit power i 3dB. We invetigate the cae when the SIS factor χ i. and., and when the ening duration in the LBT protocol change between and. Fig. 3 include both analytical reult the real line and dotted line and numerical reult variou type of dot, which match perfectly. It can be hown that in the conventional LBT protocol, the achievable throughput decreae with the increment of patial correlation, and to a certain point, the LAT protocol outperform the conventional LBT protocol. Alo, when reidual elf-interference increae, e.g., from. to., the performance of the LAT protocol become wore, and the witching point move to a higher β. Throughput Fig. 3. Parameter TABLE III SIMULATION PARAMETERS The duration of each time lot T Value. m The duration of ening time in LBT τ.5t,.t The ampling frequency f MHz The number of ample in LAT N,LAT The relative noie variance σ u The relative tranmit power over noie P t SNR in ening proce γ 3dB db SIS factor in LAT χ.,. The patial correlation coefficient β.7,.8.9 Probability of mi detection P m LAT: χ =. LAT: χ =. LBT: τ/t = / LBT: τ/t = / Spatial correlation coefficient β SU achievable throughput veru patial correlation coefficient β In Fig., we ue the receiver operating characteritic curve ROC curve to preent the ening performance under different ituation. With SIS factor χ =.,. in the LAT protocol, patial correlation coefficient β fixed on.7, and the ening time take up, in each time lot in the conventional protocol, we have the relationhip between the fale alarm probability and mi detection probability. From Fig., it i hown that the ening performance become wore, i.e., P f increae and P m decreae with the increment of reidual elf-interference and the decrement of ening time. Fig. 5 evaluate the achievable throughput of SU when tranmit power change within a certain range. We can oberve that the power-throughput tradeoff in the LAT protocol, i.e., there exit an optimal tranmit power in the low power range to achieve maximum throughput, and the optimal power decreae with the increment of SIS factor χ. When the tranmit power i low, due to longer tranmit time and mall reidual elf-interference, the LAT protocol can achieve better throughput. When tranmit power become high, the LAT protocol uffer from evere elf-interference while the conventional mode profit from the multiplexing gain, and thu, the conventional LBT protocol gradually become a better option.

6 Probability of detection P d Fig.. Throughput Fig FD: χ=.. FD: χ=. Conventional: τ / T = / Conventional: τ / T = / Probability of fale alarm P f ROC curve of both protocol LAT: χ =. LAT: χ =. LBT: β =.7 LBT :β =.9 Power σ Throughput of both protocol veru tranmit power VI. CONCLUSIONS In thi paper, we preent a LAT protocol that allow SU to imultaneouly ene and acce the pectrum hole. Beide, a witching cheme between the LAT and LBT protocol i provided to improve the throughput of SU. Moreover, a tradeoff in LAT protocol between tranmit power and the throughput i invetigated by both analytical and numerical reult. We find out that, the increment of tranmit power doe not alway yield the improvement of SU throughput, and a mediate value i required to achieve the bet performance. APPENDIX A PROOF OF TABLE. I AND TABLE. II We firt provide the general propertie of the tet tatitic. Given that each yn in i i.i.d., the mean and the variance of M can be calculated a [ E[M] = E y ] ; var[m] = [ var y ]. N Further, if the received ignal y i complex-valued Gauian with mean zero and variance σy, we have and E[M] = σ y, var[m] = [ E y ] σy = σ y. 33 N N Then we conider the concrete form of the received ignal under each hypothei. In the LAT protocol, given the PU ignal, reidual elf-interference, and i.i.d. noie, the received ignal y i complex-valued Gauian with zero mean. The variance of y under the four hypotheie are H, +γ H, +γ i H, and +γ +γ i H, repectively. By ubtituting them into 33, we can obtain the reult in Table. I. Ditribution propertie in the LBT protocol can be obtained by imilar method, and under hypothei H, we have σy =. Under hypothei H, recalling, we have [ ] y + y E = E[ y H y ] = [ ] E h H Φ / H Φ / h + = γ +, and the variance var[m] = N E [ y H y ] = N E [ y H y ] +γ, in which h E[ H h + u H u +h H h u H u = N 3+β σ h +6σ u +6σ h σ u, and thu, var[m] = N [ β γ +γ + ] σ u REFERENCES [] J. Mitola and G. Q. Maguire, Cognitive Radio: Making Software Radio more Peronal, IEEE Peronal Comm., vol. 6, no., pp.3-8, Aug. 999 [] J. Mitola, Cognitive Radio An Integrated Agent Architecture for Software Defined Radio, Ph.D. Thei, Royal Intitute of Technology, Sweden, May.. [3] I. F. Akyildiz, W. Y. Lee, M. C. Vuran, and S.Mohanty, Next Generation/Dynamic Spectrum Acce/Cognitive Radio Wirele Network: A Survey, Computer Network, vol. 5, no. 3, pp. 7-59, Sep. 6. [] T. Yucek and H. Arlan, A Survey of Spectrum Sening Algorithm for Cognitive Radio Application, IEEE Comm. Survey & Tutorial, vol., no., pp. 6-3, Mar. 9. [5] Y. C. Liang, Y. Zeng, E. C. Y. Peh, and A. T. Hoang, Sening- Throughput Tradeoff for Cognitive Nadio Network, IEEE Tran. Wirele Comm., vol. 7, no., pp , Apr. 8. [6] S. Huang, X. Liu, and Z. Ding, Short Paper: On Optimal Sening and Tranmiion Strategie for Dynamic Spectrum Acce, in Proc. IEEE DySPAN, Chicago, IL, Oct. 8 [7] M. Kieling and J. Speidel, Mutual Information of MIMO Channel in Correlated Rayleigh Fading Environment - a General Solution, in IEEE Int. Conf. Comm., vol., pp. 8-88, Pari, France, Jun.. [8] M. Jain, J. I. Choi, T. Kim, D. Bharadia, S. Seth, K. Srinivaan, P. Levi, S. Katti, and P. Sinha. Practical, Real-time, Full Duplex Wirele, in Proc. ACM MobiCom, New York, NY, Sep.. [9] S. L. Loyka, Channel Capacity of MIMO Architecture Uing the Exponential Correlation Matrix, IEEE Comm. Lett., vol. 5, no. 9, pp , Sep.. [] S. Huang, X. Liu, and Z. Ding, Opportunitic Spectrum Acce in Cognitive Radio Network, in Proc. IEEE INFOCOM 9, Rio de Janeiro, Brazil, Apr. 9. ]

Amplify and Forward Relaying; Channel Model and Outage Behaviour

Amplify and Forward Relaying; Channel Model and Outage Behaviour Amplify and Forward Relaying; Channel Model and Outage Behaviour Mehdi Mortazawi Molu Intitute of Telecommunication Vienna Univerity of Technology Guhautr. 5/E389, 4 Vienna, Autria Email: mmortaza@nt.tuwien.ac.at

More information

Improved Interference Cancellation Scheme for Two-User Detection of Alamouti Code

Improved Interference Cancellation Scheme for Two-User Detection of Alamouti Code Improved Interference Cancellation Scheme for Two-Uer Detection of Alamouti Code Manav R hatnagar and Are Hjørungne Abtract In thi correpondence, we propoe an improved interference cancellation method

More information

Gain and Phase Margins Based Delay Dependent Stability Analysis of Two- Area LFC System with Communication Delays

Gain and Phase Margins Based Delay Dependent Stability Analysis of Two- Area LFC System with Communication Delays Gain and Phae Margin Baed Delay Dependent Stability Analyi of Two- Area LFC Sytem with Communication Delay Şahin Sönmez and Saffet Ayaun Department of Electrical Engineering, Niğde Ömer Halidemir Univerity,

More information

Determination of the local contrast of interference fringe patterns using continuous wavelet transform

Determination of the local contrast of interference fringe patterns using continuous wavelet transform Determination of the local contrat of interference fringe pattern uing continuou wavelet tranform Jong Kwang Hyok, Kim Chol Su Intitute of Optic, Department of Phyic, Kim Il Sung Univerity, Pyongyang,

More information

Signaling over MIMO Multi-Base Systems: Combination of Multi-Access and Broadcast Schemes

Signaling over MIMO Multi-Base Systems: Combination of Multi-Access and Broadcast Schemes Signaling over MIMO Multi-Bae Sytem: Combination of Multi-Acce and Broadcat Scheme Mohammad Ali Maddah-Ali Abolfazl S. Motahari and Amir K. Khandani Coding & Signal Tranmiion Laboratory (www.ct.uwaterloo.ca)

More information

μ + = σ = D 4 σ = D 3 σ = σ = All units in parts (a) and (b) are in V. (1) x chart: Center = μ = 0.75 UCL =

μ + = σ = D 4 σ = D 3 σ = σ = All units in parts (a) and (b) are in V. (1) x chart: Center = μ = 0.75 UCL = Our online Tutor are available 4*7 to provide Help with Proce control ytem Homework/Aignment or a long term Graduate/Undergraduate Proce control ytem Project. Our Tutor being experienced and proficient

More information

A Thresholding-Based Antenna Switching in SWIPT-Enabled MIMO Cognitive Radio Networks with Co-Channel Interference

A Thresholding-Based Antenna Switching in SWIPT-Enabled MIMO Cognitive Radio Networks with Co-Channel Interference A Threholding-Baed Antenna Switching in SWIPT-Enabled MIMO Cognitive Radio Network wi Co-Channel Interference Fatma Benkhelifa, and Mohamed-Slim Alouini Computer, Electrical and Maematical Science and

More information

Channel Selection in Multi-channel Opportunistic Spectrum Access Networks with Perfect Sensing

Channel Selection in Multi-channel Opportunistic Spectrum Access Networks with Perfect Sensing Channel Selection in Multi-channel Opportunitic Spectrum Acce Networ with Perfect Sening Xin Liu Univerity of California Davi, CA 95616 liu@c.ucdavi.edu Bhaar Krihnamachari Univerity of Southern California

More information

Jul 4, 2005 turbo_code_primer Revision 0.0. Turbo Code Primer

Jul 4, 2005 turbo_code_primer Revision 0.0. Turbo Code Primer Jul 4, 5 turbo_code_primer Reviion. Turbo Code Primer. Introduction Thi document give a quick tutorial on MAP baed turbo coder. Section develop the background theory. Section work through a imple numerical

More information

Clustering Methods without Given Number of Clusters

Clustering Methods without Given Number of Clusters Clutering Method without Given Number of Cluter Peng Xu, Fei Liu Introduction A we now, mean method i a very effective algorithm of clutering. It mot powerful feature i the calability and implicity. However,

More information

Chapter 5 Optimum Receivers for the Additive White Gaussian Noise Channel

Chapter 5 Optimum Receivers for the Additive White Gaussian Noise Channel Chapter 5 Optimum Receiver for the Additive White Gauian Noie Channel Table of Content 5.1 Optimum Receiver for Signal Corrupted by Additive White Noie 5.1.1 Correlation Demodulator 5.1. Matched-Filter

More information

Chapter 2 Sampling and Quantization. In order to investigate sampling and quantization, the difference between analog

Chapter 2 Sampling and Quantization. In order to investigate sampling and quantization, the difference between analog Chapter Sampling and Quantization.1 Analog and Digital Signal In order to invetigate ampling and quantization, the difference between analog and digital ignal mut be undertood. Analog ignal conit of continuou

More information

Optimal Coordination of Samples in Business Surveys

Optimal Coordination of Samples in Business Surveys Paper preented at the ICES-III, June 8-, 007, Montreal, Quebec, Canada Optimal Coordination of Sample in Buine Survey enka Mach, Ioana Şchiopu-Kratina, Philip T Rei, Jean-Marc Fillion Statitic Canada New

More information

A Study on Simulating Convolutional Codes and Turbo Codes

A Study on Simulating Convolutional Codes and Turbo Codes A Study on Simulating Convolutional Code and Turbo Code Final Report By Daniel Chang July 27, 2001 Advior: Dr. P. Kinman Executive Summary Thi project include the deign of imulation of everal convolutional

More information

Fading Channels: Capacity, BER and Diversity

Fading Channels: Capacity, BER and Diversity Fading Channel: Capacity, BER and Diverity Mater Univeritario en Ingeniería de Telecomunicación I. Santamaría Univeridad de Cantabria Introduction Capacity BER Diverity Concluion Content Introduction Capacity

More information

Factor Analysis with Poisson Output

Factor Analysis with Poisson Output Factor Analyi with Poion Output Gopal Santhanam Byron Yu Krihna V. Shenoy, Department of Electrical Engineering, Neurocience Program Stanford Univerity Stanford, CA 94305, USA {gopal,byronyu,henoy}@tanford.edu

More information

SINGLE CARRIER BLOCK TRANSMISSION WITHOUT GUARD INTERVAL

SINGLE CARRIER BLOCK TRANSMISSION WITHOUT GUARD INTERVAL SINGLE CARRIER BLOCK TRANSMISSION WITHOUT GUARD INTERVAL Kazunori Hayahi Hideaki Sakai Graduate School of Informatic, Kyoto Univerity Kyoto, JAPAN ABSTRACT Thi paper propoe a imple detection cheme for

More information

Bogoliubov Transformation in Classical Mechanics

Bogoliubov Transformation in Classical Mechanics Bogoliubov Tranformation in Claical Mechanic Canonical Tranformation Suppoe we have a et of complex canonical variable, {a j }, and would like to conider another et of variable, {b }, b b ({a j }). How

More information

Minimum Eigenvalue Detection for Spectrum Sensing in Cognitive Radio

Minimum Eigenvalue Detection for Spectrum Sensing in Cognitive Radio International Journal of Electrical and Computer Engineering (IJECE) Vol. 4, No. 4, Augut 014, pp. 63~630 ISSN: 088-8708 63 Minimum Eigenvalue Detection for Spectrum Sening in Cognitive Radio Syed Sajjad

More information

Source slideplayer.com/fundamentals of Analytical Chemistry, F.J. Holler, S.R.Crouch. Chapter 6: Random Errors in Chemical Analysis

Source slideplayer.com/fundamentals of Analytical Chemistry, F.J. Holler, S.R.Crouch. Chapter 6: Random Errors in Chemical Analysis Source lideplayer.com/fundamental of Analytical Chemitry, F.J. Holler, S.R.Crouch Chapter 6: Random Error in Chemical Analyi Random error are preent in every meaurement no matter how careful the experimenter.

More information

84 ZHANG Jing-Shang Vol. 39 of which would emit 5 He rather than 3 He. 5 He i untable and eparated into n + pontaneouly, which can alo be treated a if

84 ZHANG Jing-Shang Vol. 39 of which would emit 5 He rather than 3 He. 5 He i untable and eparated into n + pontaneouly, which can alo be treated a if Commun. Theor. Phy. (Beijing, China) 39 (003) pp. 83{88 c International Academic Publiher Vol. 39, No. 1, January 15, 003 Theoretical Analyi of Neutron Double-Dierential Cro Section of n+ 11 B at 14. MeV

More information

Alternate Dispersion Measures in Replicated Factorial Experiments

Alternate Dispersion Measures in Replicated Factorial Experiments Alternate Diperion Meaure in Replicated Factorial Experiment Neal A. Mackertich The Raytheon Company, Sudbury MA 02421 Jame C. Benneyan Northeatern Univerity, Boton MA 02115 Peter D. Krau The Raytheon

More information

MODELING OF NEGATIVE INFLUENCES AT THE SIGNAL TRANSMISSION IN THE OPTICAL MEDIUM. Rastislav Róka, Filip Čertík

MODELING OF NEGATIVE INFLUENCES AT THE SIGNAL TRANSMISSION IN THE OPTICAL MEDIUM. Rastislav Róka, Filip Čertík MODELING OF NEGATIVE INFLUENCES AT THE SIGNAL TRANSMISSION IN THE OPTICAL MEDIUM Ratilav Róka, Filip Čertík Intitute of Telecommunication, FEEIT, Slovak Univerity of Technology in Bratilava E-mail: ratilav.roka@tuba.k,

More information

Efficient Methods of Doppler Processing for Coexisting Land and Weather Clutter

Efficient Methods of Doppler Processing for Coexisting Land and Weather Clutter Efficient Method of Doppler Proceing for Coexiting Land and Weather Clutter Ça gatay Candan and A Özgür Yılmaz Middle Eat Technical Univerity METU) Ankara, Turkey ccandan@metuedutr, aoyilmaz@metuedutr

More information

Trellis Shaping Techniques for Satellite Telecommunication Systems

Trellis Shaping Techniques for Satellite Telecommunication Systems > 1 Trelli Technique for Satellite Telecommunication Sytem M. Álvarez-Díaz 1, M. Neri, C. Moquera 1 and G. E. Corazza 1 Dept. Signal Theory and Communication (TSC), Univerity of Vigo Campu Univeritario

More information

Advanced Digital Signal Processing. Stationary/nonstationary signals. Time-Frequency Analysis... Some nonstationary signals. Time-Frequency Analysis

Advanced Digital Signal Processing. Stationary/nonstationary signals. Time-Frequency Analysis... Some nonstationary signals. Time-Frequency Analysis Advanced Digital ignal Proceing Prof. Nizamettin AYDIN naydin@yildiz.edu.tr Time-Frequency Analyi http://www.yildiz.edu.tr/~naydin 2 tationary/nontationary ignal Time-Frequency Analyi Fourier Tranform

More information

AN ADAPTIVE SIGNAL SEARCH ALGORITHM IN GPS RECEIVER

AN ADAPTIVE SIGNAL SEARCH ALGORITHM IN GPS RECEIVER N PTIVE SIGNL SERH LGORITHM IN GPS REEIVER Item Type text; Proceeding uthor Li, Sun; Yinfeng, Wang; Qihan, Zhang Publiher International Foundation for Telemetering Journal International Telemetering onference

More information

Social Studies 201 Notes for March 18, 2005

Social Studies 201 Notes for March 18, 2005 1 Social Studie 201 Note for March 18, 2005 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the

More information

Compressed Edge Spectrum Sensing for Wideband Cognitive Radios

Compressed Edge Spectrum Sensing for Wideband Cognitive Radios Compreed Edge Spectrum Sening for Wideband Cognitive Radio Edgar Beck, Carten Bockelmann and Armin Dekory Department of Communication Engineering Univerity of Bremen, Bremen, Germany Email: {beck, bockelmann,

More information

Finding the location of switched capacitor banks in distribution systems based on wavelet transform

Finding the location of switched capacitor banks in distribution systems based on wavelet transform UPEC00 3t Aug - 3rd Sept 00 Finding the location of witched capacitor bank in ditribution ytem baed on wavelet tranform Bahram nohad Shahid Chamran Univerity in Ahvaz bahramnohad@yahoo.com Mehrdad keramatzadeh

More information

Random vs. Deterministic Deployment of Sensors in the Presence of Failures and Placement Errors

Random vs. Deterministic Deployment of Sensors in the Presence of Failures and Placement Errors Random v. Determinitic Deployment of Senor in the Preence of Failure and Placement Error Paul Baliter Univerity of Memphi pbalitr@memphi.edu Santoh Kumar Univerity of Memphi antoh.kumar@memphi.edu Abtract

More information

Suggested Answers To Exercises. estimates variability in a sampling distribution of random means. About 68% of means fall

Suggested Answers To Exercises. estimates variability in a sampling distribution of random means. About 68% of means fall Beyond Significance Teting ( nd Edition), Rex B. Kline Suggeted Anwer To Exercie Chapter. The tatitic meaure variability among core at the cae level. In a normal ditribution, about 68% of the core fall

More information

7.2 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 281

7.2 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 281 72 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 28 and i 2 Show how Euler formula (page 33) can then be ued to deduce the reult a ( a) 2 b 2 {e at co bt} {e at in bt} b ( a) 2 b 2 5 Under what condition

More information

Network based Sensor Localization in Multi-Media Application of Precision Agriculture Part 2: Time of Arrival

Network based Sensor Localization in Multi-Media Application of Precision Agriculture Part 2: Time of Arrival Network baed Senor Localization in Multi-Media Application of Preciion Agriculture Part : Time of Arrival Herman Sahota IBM, Silicon Valley Laboratory Email: hahota@u.ibm.com Ratneh Kumar, IEEE Fellow

More information

Problem Set 8 Solutions

Problem Set 8 Solutions Deign and Analyi of Algorithm April 29, 2015 Maachuett Intitute of Technology 6.046J/18.410J Prof. Erik Demaine, Srini Devada, and Nancy Lynch Problem Set 8 Solution Problem Set 8 Solution Thi problem

More information

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 10, OCTOBER Wenguang Mao, Xudong Wang, Senior Member, IEEE, and Shanshan Wu

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 10, OCTOBER Wenguang Mao, Xudong Wang, Senior Member, IEEE, and Shanshan Wu IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 10, OCTOBER 2016 8511 Ditributed Opportunitic Scheduling With QoS Contraint for Wirele Network With Hybrid Link Wenguang Mao, Xudong Wang, Senior

More information

Beyond Cut-Set Bounds - The Approximate Capacity of D2D Networks

Beyond Cut-Set Bounds - The Approximate Capacity of D2D Networks Beyond Cut-Set Bound - The Approximate Capacity of DD Network Avik Sengupta Hume Center for National Security and Technology Department of Electrical and Computer Engineering Virginia Tech, Blackburg,

More information

Comparing Means: t-tests for Two Independent Samples

Comparing Means: t-tests for Two Independent Samples Comparing ean: t-tet for Two Independent Sample Independent-eaure Deign t-tet for Two Independent Sample Allow reearcher to evaluate the mean difference between two population uing data from two eparate

More information

Lecture 4 Topic 3: General linear models (GLMs), the fundamentals of the analysis of variance (ANOVA), and completely randomized designs (CRDs)

Lecture 4 Topic 3: General linear models (GLMs), the fundamentals of the analysis of variance (ANOVA), and completely randomized designs (CRDs) Lecture 4 Topic 3: General linear model (GLM), the fundamental of the analyi of variance (ANOVA), and completely randomized deign (CRD) The general linear model One population: An obervation i explained

More information

RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS

RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS www.arpapre.com/volume/vol29iue1/ijrras_29_1_01.pdf RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS Sevcan Demir Atalay 1,* & Özge Elmataş Gültekin

More information

arxiv: v3 [hep-ph] 15 Sep 2009

arxiv: v3 [hep-ph] 15 Sep 2009 Determination of β in B J/ψK+ K Decay in the Preence of a K + K S-Wave Contribution Yuehong Xie, a Peter Clarke, b Greig Cowan c and Franz Muheim d arxiv:98.367v3 [hep-ph 15 Sep 9 School of Phyic and Atronomy,

More information

Performance of downlink schedulers with superposed or orthogonal transmissions

Performance of downlink schedulers with superposed or orthogonal transmissions Equation Chapter 1 Section 1 Thi full text paper a peer revieed at the direction of IEEE Communication Society ubject matter expert for publication in the IEEE ICC 1 proceeding Performance of donlink cheduler

More information

Social Studies 201 Notes for November 14, 2003

Social Studies 201 Notes for November 14, 2003 1 Social Studie 201 Note for November 14, 2003 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the

More information

Codes Correcting Two Deletions

Codes Correcting Two Deletions 1 Code Correcting Two Deletion Ryan Gabry and Frederic Sala Spawar Sytem Center Univerity of California, Lo Angele ryan.gabry@navy.mil fredala@ucla.edu Abtract In thi work, we invetigate the problem of

More information

Characterizing the Effect of Channel Estimation Error on Distributed Reception with Hard Decision Exchanges

Characterizing the Effect of Channel Estimation Error on Distributed Reception with Hard Decision Exchanges Characterizing the Effect of Channel Etimation Error on Ditributed Reception with Hard Deciion Exchange Sabah Razavi and D. Richard Brown III Department of Electrical and Computer Engineering Worceter

More information

Predicting the Performance of Teams of Bounded Rational Decision-makers Using a Markov Chain Model

Predicting the Performance of Teams of Bounded Rational Decision-makers Using a Markov Chain Model The InTITuTe for ytem reearch Ir TechnIcal report 2013-14 Predicting the Performance of Team of Bounded Rational Deciion-maer Uing a Marov Chain Model Jeffrey Herrmann Ir develop, applie and teache advanced

More information

Stratified Analysis of Probabilities of Causation

Stratified Analysis of Probabilities of Causation Stratified Analyi of Probabilitie of Cauation Manabu Kuroki Sytem Innovation Dept. Oaka Univerity Toyonaka, Oaka, Japan mkuroki@igmath.e.oaka-u.ac.jp Zhihong Cai Biotatitic Dept. Kyoto Univerity Sakyo-ku,

More information

Massachusetts Institute of Technology Dynamics and Control II

Massachusetts Institute of Technology Dynamics and Control II I E Maachuett Intitute of Technology Department of Mechanical Engineering 2.004 Dynamic and Control II Laboratory Seion 5: Elimination of Steady-State Error Uing Integral Control Action 1 Laboratory Objective:

More information

The Performance of Error and Outage Capacity in SIMO and MISO FSO Links

The Performance of Error and Outage Capacity in SIMO and MISO FSO Links International Journal of Computer Science and Telecommunication [Volume 3, Iue 7, July ] 36 ISS 47-3338 The Performance of Error and Outage Capacity in SIO and ISO FSO Link. ofidi, A. Chaman-motlagh and.

More information

Reliability Analysis of Embedded System with Different Modes of Failure Emphasizing Reboot Delay

Reliability Analysis of Embedded System with Different Modes of Failure Emphasizing Reboot Delay International Journal of Applied Science and Engineering 3., 4: 449-47 Reliability Analyi of Embedded Sytem with Different Mode of Failure Emphaizing Reboot Delay Deepak Kumar* and S. B. Singh Department

More information

CHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS

CHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS CHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS 8.1 INTRODUCTION 8.2 REDUCED ORDER MODEL DESIGN FOR LINEAR DISCRETE-TIME CONTROL SYSTEMS 8.3

More information

Preemptive scheduling on a small number of hierarchical machines

Preemptive scheduling on a small number of hierarchical machines Available online at www.ciencedirect.com Information and Computation 06 (008) 60 619 www.elevier.com/locate/ic Preemptive cheduling on a mall number of hierarchical machine György Dóa a, Leah Eptein b,

More information

Theoretical study of the dual harmonic system and its application on the CSNS/RCS

Theoretical study of the dual harmonic system and its application on the CSNS/RCS Theoretical tudy of the dual harmonic ytem and it application on the CSNS/RCS Yao-Shuo Yuan, Na Wang, Shou-Yan Xu, Yue Yuan, and Sheng Wang Dongguan branch, Intitute of High Energy Phyic, CAS, Guangdong

More information

A BATCH-ARRIVAL QUEUE WITH MULTIPLE SERVERS AND FUZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH

A BATCH-ARRIVAL QUEUE WITH MULTIPLE SERVERS AND FUZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH Mathematical and Computational Application Vol. 11 No. pp. 181-191 006. Aociation for Scientific Reearch A BATCH-ARRIVA QEE WITH MTIPE SERVERS AND FZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH Jau-Chuan

More information

DYNAMIC MODELS FOR CONTROLLER DESIGN

DYNAMIC MODELS FOR CONTROLLER DESIGN DYNAMIC MODELS FOR CONTROLLER DESIGN M.T. Tham (996,999) Dept. of Chemical and Proce Engineering Newcatle upon Tyne, NE 7RU, UK.. INTRODUCTION The problem of deigning a good control ytem i baically that

More information

CHAPTER 4 DESIGN OF STATE FEEDBACK CONTROLLERS AND STATE OBSERVERS USING REDUCED ORDER MODEL

CHAPTER 4 DESIGN OF STATE FEEDBACK CONTROLLERS AND STATE OBSERVERS USING REDUCED ORDER MODEL 98 CHAPTER DESIGN OF STATE FEEDBACK CONTROLLERS AND STATE OBSERVERS USING REDUCED ORDER MODEL INTRODUCTION The deign of ytem uing tate pace model for the deign i called a modern control deign and it i

More information

PRACTICE FINAL EXAM SOLUTION Jing Liang 12/06/2006

PRACTICE FINAL EXAM SOLUTION Jing Liang 12/06/2006 PRACICE FIAL EXAM SOLUIO Jing Liang /6/6 PROBLEM (a) (b) (c) (d) (e) he propagation ignal experience power variation due to the contructive and detructive addition of multi-path ignal component, and therefore

More information

LOAD FREQUENCY CONTROL OF MULTI AREA INTERCONNECTED SYSTEM WITH TCPS AND DIVERSE SOURCES OF POWER GENERATION

LOAD FREQUENCY CONTROL OF MULTI AREA INTERCONNECTED SYSTEM WITH TCPS AND DIVERSE SOURCES OF POWER GENERATION G.J. E.D.T.,Vol.(6:93 (NovemberDecember, 03 ISSN: 39 793 LOAD FREQUENCY CONTROL OF MULTI AREA INTERCONNECTED SYSTEM WITH TCPS AND DIVERSE SOURCES OF POWER GENERATION C.Srinivaa Rao Dept. of EEE, G.Pullaiah

More information

C up (E) C low (E) E 2 E 1 E 0

C up (E) C low (E) E 2 E 1 E 0 Spreading in lock-fading hannel. Muriel Médard David N.. Te medardmit.edu Maachuett Intitute of Technoy dteeec.berkeley.edu Univerity of alifornia at erkeley btract We conider wideband fading channel which

More information

CONGESTION control is a key functionality in modern

CONGESTION control is a key functionality in modern IEEE TRANSACTIONS ON INFORMATION TEORY, VOL. X, NO. X, XXXXXXX 2008 On the Connection-Level Stability of Congetion-Controlled Communication Network Xiaojun Lin, Member, IEEE, Ne B. Shroff, Fellow, IEEE,

More information

If Y is normally Distributed, then and 2 Y Y 10. σ σ

If Y is normally Distributed, then and 2 Y Y 10. σ σ ull Hypothei Significance Teting V. APS 50 Lecture ote. B. Dudek. ot for General Ditribution. Cla Member Uage Only. Chi-Square and F-Ditribution, and Diperion Tet Recall from Chapter 4 material on: ( )

More information

A Note on the Sum of Correlated Gamma Random Variables

A Note on the Sum of Correlated Gamma Random Variables 1 A Note on the Sum of Correlated Gamma Random Variable Joé F Pari Abtract arxiv:11030505v1 [cit] 2 Mar 2011 The um of correlated gamma random variable appear in the analyi of many wirele communication

More information

End-to-End BER Analysis of Space Shift Keying in Decode-and-Forward Cooperative Relaying

End-to-End BER Analysis of Space Shift Keying in Decode-and-Forward Cooperative Relaying 3 IEEE Wirele Communication and Networking Conference (WCNC: PHY End-to-End BER Analyi of Space Shift Keying in Decode-and-Forwa Cooperative Relaying Pritam Som and A. Chockalingam Department of ECE, Indian

More information

THE EXPERIMENTAL PERFORMANCE OF A NONLINEAR DYNAMIC VIBRATION ABSORBER

THE EXPERIMENTAL PERFORMANCE OF A NONLINEAR DYNAMIC VIBRATION ABSORBER Proceeding of IMAC XXXI Conference & Expoition on Structural Dynamic February -4 Garden Grove CA USA THE EXPERIMENTAL PERFORMANCE OF A NONLINEAR DYNAMIC VIBRATION ABSORBER Yung-Sheng Hu Neil S Ferguon

More information

SMALL-SIGNAL STABILITY ASSESSMENT OF THE EUROPEAN POWER SYSTEM BASED ON ADVANCED NEURAL NETWORK METHOD

SMALL-SIGNAL STABILITY ASSESSMENT OF THE EUROPEAN POWER SYSTEM BASED ON ADVANCED NEURAL NETWORK METHOD SMALL-SIGNAL STABILITY ASSESSMENT OF THE EUROPEAN POWER SYSTEM BASED ON ADVANCED NEURAL NETWORK METHOD S.P. Teeuwen, I. Erlich U. Bachmann Univerity of Duiburg, Germany Department of Electrical Power Sytem

More information

Energy-Distortion Tradeoff for the Gaussian Broadcast Channel with Feedback

Energy-Distortion Tradeoff for the Gaussian Broadcast Channel with Feedback 016 IEEE International Sympoium on Information Theory Energy-itortion Tradeoff for the Gauian Broadcat Channel with Feedback Yonathan Murin 1, Yonatan Kapi, Ron abora 3, and eniz Gündüz 4 1 Stanford Univerity,

More information

The continuous time random walk (CTRW) was introduced by Montroll and Weiss 1.

The continuous time random walk (CTRW) was introduced by Montroll and Weiss 1. 1 I. CONTINUOUS TIME RANDOM WALK The continuou time random walk (CTRW) wa introduced by Montroll and Wei 1. Unlike dicrete time random walk treated o far, in the CTRW the number of jump n made by the walker

More information

Lecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004

Lecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004 18.997 Topic in Combinatorial Optimization April 29th, 2004 Lecture 21 Lecturer: Michel X. Goeman Scribe: Mohammad Mahdian 1 The Lovaz plitting-off lemma Lovaz plitting-off lemma tate the following. Theorem

More information

Chapter 12 Simple Linear Regression

Chapter 12 Simple Linear Regression Chapter 1 Simple Linear Regreion Introduction Exam Score v. Hour Studied Scenario Regreion Analyi ued to quantify the relation between (or more) variable o you can predict the value of one variable baed

More information

THE Z-TRANSFORM APPLIED TO BIRTH-DEATH MARKOV PROCESSES

THE Z-TRANSFORM APPLIED TO BIRTH-DEATH MARKOV PROCESSES he Zranform applied to birthdeath arov procee HE ZRASOR ALIED O BIRHDEAH ARKO ROCESSES H Department of Electronic and Communication niverity of DareSalaam O Box 3594 DareSalaam anania ABSRAC Birthdeath

More information

UNIT 15 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS

UNIT 15 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS UNIT 1 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS Structure 1.1 Introduction Objective 1.2 Redundancy 1.3 Reliability of k-out-of-n Sytem 1.4 Reliability of Standby Sytem 1. Summary 1.6 Solution/Anwer

More information

SIMPLIFIED MODEL FOR EPICYCLIC GEAR INERTIAL CHARACTERISTICS

SIMPLIFIED MODEL FOR EPICYCLIC GEAR INERTIAL CHARACTERISTICS UNIVERSITY OF PITESTI SCIENTIFIC BULLETIN FACULTY OF ECHANICS AND TECHNOLOGY AUTOOTIVE erie, year XVII, no. ( 3 ) SIPLIFIED ODEL FOR EPICYCLIC GEAR INERTIAL CHARACTERISTICS Ciobotaru, Ticuşor *, Feraru,

More information

Numerical algorithm for the analysis of linear and nonlinear microstructure fibres

Numerical algorithm for the analysis of linear and nonlinear microstructure fibres Numerical algorithm for the anali of linear and nonlinear microtructure fibre Mariuz Zdanowicz *, Marian Marciniak, Marek Jaworki, Igor A. Goncharenko National Intitute of Telecommunication, Department

More information

White Rose Research Online URL for this paper: Version: Accepted Version

White Rose Research Online URL for this paper:   Version: Accepted Version Thi i a repoitory copy of Identification of nonlinear ytem with non-peritent excitation uing an iterative forward orthogonal leat quare regreion algorithm. White Roe Reearch Online URL for thi paper: http://eprint.whiteroe.ac.uk/107314/

More information

Proactive Serving Decreases User Delay Exponentially: The Light-tailed Service Time Case

Proactive Serving Decreases User Delay Exponentially: The Light-tailed Service Time Case Proactive Serving Decreae Uer Delay Exponentially: The Light-tailed Service Time Cae Shaoquan Zhang, Longbo Huang, Minghua Chen, and Xin Liu Abtract In online ervice ytem, the delay experienced by uer

More information

Critical behavior of slider-block model. (Short title: Critical ) S G Abaimov

Critical behavior of slider-block model. (Short title: Critical ) S G Abaimov Critical behavior of lider-bloc model (Short title: Critical ) S G Abaimov E-mail: gabaimov@gmail.com. Abtract. Thi paper applie the theory of continuou phae tranition of tatitical mechanic to a lider-bloc

More information

Loss Less Image firmness comparision by DPCM and DPCM with LMS Algorithm

Loss Less Image firmness comparision by DPCM and DPCM with LMS Algorithm Lo Le Image firmne compariion by DPCM and DPCM with LMS Algorithm Pramod Kumar Rajput 1 and Brijendra Mihra 2 1,2 Department of Electronic & Communication, Nagaji Intitute of Technology and Management

More information

ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang

ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang Proceeding of the 2008 Winter Simulation Conference S. J. Maon, R. R. Hill, L. Mönch, O. Roe, T. Jefferon, J. W. Fowler ed. ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION Xiaoqun Wang

More information

Estimating floor acceleration in nonlinear multi-story moment-resisting frames

Estimating floor acceleration in nonlinear multi-story moment-resisting frames Etimating floor acceleration in nonlinear multi-tory moment-reiting frame R. Karami Mohammadi Aitant Profeor, Civil Engineering Department, K.N.Tooi Univerity M. Mohammadi M.Sc. Student, Civil Engineering

More information

An estimation approach for autotuning of event-based PI control systems

An estimation approach for autotuning of event-based PI control systems Acta de la XXXIX Jornada de Automática, Badajoz, 5-7 de Septiembre de 08 An etimation approach for autotuning of event-baed PI control ytem Joé Sánchez Moreno, María Guinaldo Loada, Sebatián Dormido Departamento

More information

Lecture 7: Testing Distributions

Lecture 7: Testing Distributions CSE 5: Sublinear (and Streaming) Algorithm Spring 014 Lecture 7: Teting Ditribution April 1, 014 Lecturer: Paul Beame Scribe: Paul Beame 1 Teting Uniformity of Ditribution We return today to property teting

More information

A Constraint Propagation Algorithm for Determining the Stability Margin. The paper addresses the stability margin assessment for linear systems

A Constraint Propagation Algorithm for Determining the Stability Margin. The paper addresses the stability margin assessment for linear systems A Contraint Propagation Algorithm for Determining the Stability Margin of Linear Parameter Circuit and Sytem Lubomir Kolev and Simona Filipova-Petrakieva Abtract The paper addree the tability margin aement

More information

Unavoidable Cycles in Polynomial-Based Time-Invariant LDPC Convolutional Codes

Unavoidable Cycles in Polynomial-Based Time-Invariant LDPC Convolutional Codes European Wirele, April 7-9,, Vienna, Autria ISBN 978--87-4-9 VE VERLAG GMBH Unavoidable Cycle in Polynomial-Baed Time-Invariant LPC Convolutional Code Hua Zhou and Norbert Goertz Intitute of Telecommunication

More information

Real Sources (Secondary Sources) Phantom Source (Primary source) LS P. h rl. h rr. h ll. h lr. h pl. h pr

Real Sources (Secondary Sources) Phantom Source (Primary source) LS P. h rl. h rr. h ll. h lr. h pl. h pr Ecient frequency domain ltered-x realization of phantom ource iet C.W. ommen, Ronald M. Aart, Alexander W.M. Mathijen, John Gara, Haiyan He Abtract A phantom ound ource i a virtual ound image which can

More information

Unified Correlation between SPT-N and Shear Wave Velocity for all Soil Types

Unified Correlation between SPT-N and Shear Wave Velocity for all Soil Types 6 th International Conference on Earthquake Geotechnical Engineering 1-4 ovember 15 Chritchurch, ew Zealand Unified Correlation between SPT- and Shear Wave Velocity for all Soil Type C.-C. Tai 1 and T.

More information

SOLVING THE KONDO PROBLEM FOR COMPLEX MESOSCOPIC SYSTEMS

SOLVING THE KONDO PROBLEM FOR COMPLEX MESOSCOPIC SYSTEMS SOLVING THE KONDO POBLEM FO COMPLEX MESOSCOPIC SYSTEMS V. DINU and M. ÞOLEA National Intitute of Material Phyic, Bucharet-Magurele P.O. Box MG-7, omania eceived February 21, 2005 Firt we preent the calculation

More information

Bahram Noshad Department of Electrical Engineering, Bandar Deylam Branch, Islamic Azad University, Bandar Deylam, Iran.

Bahram Noshad Department of Electrical Engineering, Bandar Deylam Branch, Islamic Azad University, Bandar Deylam, Iran. Journal of Advance in Computer Reearch Quarterly pissn: 345-66x eissn: 345-678 Sari Branch, Ilamic Azad Univerity, Sari, I.R.Iran (Vol. 9, No. 3, Augut 8), Page: - www.jacr.iauari.ac.ir A New Model for

More information

THE biggest challenge for next generation wireless

THE biggest challenge for next generation wireless IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 33, NO. 6, JUNE 2015 1187 Interference Management in 5G Revere TDD HetNet With Wirele Bachaul: A Large Sytem Analyi Luca Sanguinetti, Member, IEEE,

More information

SERIES COMPENSATION: VOLTAGE COMPENSATION USING DVR (Lectures 41-48)

SERIES COMPENSATION: VOLTAGE COMPENSATION USING DVR (Lectures 41-48) Chapter 5 SERIES COMPENSATION: VOLTAGE COMPENSATION USING DVR (Lecture 41-48) 5.1 Introduction Power ytem hould enure good quality of electric power upply, which mean voltage and current waveform hould

More information

One Class of Splitting Iterative Schemes

One Class of Splitting Iterative Schemes One Cla of Splitting Iterative Scheme v Ciegi and V. Pakalnytė Vilniu Gedimina Technical Univerity Saulėtekio al. 11, 2054, Vilniu, Lithuania rc@fm.vtu.lt Abtract. Thi paper deal with the tability analyi

More information

Multi-dimensional Fuzzy Euler Approximation

Multi-dimensional Fuzzy Euler Approximation Mathematica Aeterna, Vol 7, 2017, no 2, 163-176 Multi-dimenional Fuzzy Euler Approximation Yangyang Hao College of Mathematic and Information Science Hebei Univerity, Baoding 071002, China hdhyywa@163com

More information

Research Article Goodness-of-Fit Based Secure Cooperative Spectrum Sensing for Cognitive Radio Network

Research Article Goodness-of-Fit Based Secure Cooperative Spectrum Sensing for Cognitive Radio Network e Scientific World Journal, Article ID 75257, 6 page http://dx.doi.org/.55/24/75257 Reearch Article Goodne-of-Fit Baed Secure Cooperative Spectrum Sening for Cognitive Radio Network Hiep Vu-Van and Inoo

More information

arxiv: v1 [cs.sy] 9 Aug 2017

arxiv: v1 [cs.sy] 9 Aug 2017 Trade-Off in Stochatic Event-Triggered Control Burak Demirel, Alex S Leong, Vijay Gupta and Daniel E Quevedo arxiv:70802756v csy 9 Aug 207 Abtract Thi paper tudie the optimal output-feedback control of

More information

Research Article Reliability of Foundation Pile Based on Settlement and a Parameter Sensitivity Analysis

Research Article Reliability of Foundation Pile Based on Settlement and a Parameter Sensitivity Analysis Mathematical Problem in Engineering Volume 2016, Article ID 1659549, 7 page http://dxdoiorg/101155/2016/1659549 Reearch Article Reliability of Foundation Pile Baed on Settlement and a Parameter Senitivity

More information

Control chart for waiting time in system of (M / M / S) :( / FCFS) Queuing model

Control chart for waiting time in system of (M / M / S) :( / FCFS) Queuing model IOSR Journal of Mathematic (IOSR-JM) e-issn: 78-578. Volume 5, Iue 6 (Mar. - Apr. 3), PP 48-53 www.iorjournal.org Control chart for waiting time in ytem of (M / M / S) :( / FCFS) Queuing model T.Poongodi,

More information

Given the following circuit with unknown initial capacitor voltage v(0): X(s) Immediately, we know that the transfer function H(s) is

Given the following circuit with unknown initial capacitor voltage v(0): X(s) Immediately, we know that the transfer function H(s) is EE 4G Note: Chapter 6 Intructor: Cheung More about ZSR and ZIR. Finding unknown initial condition: Given the following circuit with unknown initial capacitor voltage v0: F v0/ / Input xt 0Ω Output yt -

More information

THE PARAMETERIZATION OF ALL TWO-DEGREES-OF-FREEDOM SEMISTRONGLY STABILIZING CONTROLLERS. Tatsuya Hoshikawa, Kou Yamada and Yuko Tatsumi

THE PARAMETERIZATION OF ALL TWO-DEGREES-OF-FREEDOM SEMISTRONGLY STABILIZING CONTROLLERS. Tatsuya Hoshikawa, Kou Yamada and Yuko Tatsumi International Journal of Innovative Computing, Information Control ICIC International c 206 ISSN 349-498 Volume 2, Number 2, April 206 pp. 357 370 THE PARAMETERIZATION OF ALL TWO-DEGREES-OF-FREEDOM SEMISTRONGLY

More information

COPRIME ARRAYS AND SAMPLERS FOR SPACE-TIME ADAPTIVE PROCESSING

COPRIME ARRAYS AND SAMPLERS FOR SPACE-TIME ADAPTIVE PROCESSING COPRIE ARRAYS AND SAPLERS FOR SPACE-IE ADAPIVE PROCESSING Chun-Lin Liu 1 and P. P. Vaidyanathan 2 Dept. of Electrical Engineering, 136-93 California Intitute of echnology, Paadena, CA 91125, USA E-mail:

More information

APPLICATION OF THE SINGLE IMPACT MICROINDENTATION FOR NON- DESTRUCTIVE TESTING OF THE FRACTURE TOUGHNESS OF NONMETALLIC AND POLYMERIC MATERIALS

APPLICATION OF THE SINGLE IMPACT MICROINDENTATION FOR NON- DESTRUCTIVE TESTING OF THE FRACTURE TOUGHNESS OF NONMETALLIC AND POLYMERIC MATERIALS APPLICATION OF THE SINGLE IMPACT MICROINDENTATION FOR NON- DESTRUCTIVE TESTING OF THE FRACTURE TOUGHNESS OF NONMETALLIC AND POLYMERIC MATERIALS REN A. P. INSTITUTE OF APPLIED PHYSICS OF THE NATIONAL ACADEMY

More information

Copyright 1967, by the author(s). All rights reserved.

Copyright 1967, by the author(s). All rights reserved. Copyright 1967, by the author(). All right reerved. Permiion to make digital or hard copie of all or part of thi work for peronal or claroom ue i granted without fee provided that copie are not made or

More information