A Novel Approach to Security Enhancement of Chaotic DSSS Systems
|
|
- Lawrence Wilkins
- 6 years ago
- Views:
Transcription
1 A Nove Approach to Security Enhancement of Chaotic DSSS Systems Nguyen Xuan Quyen 1, Chuyen T. Nguyen 1, Pere Baret-Ros 2, and Reiner Dojen 3 1 Schoo of Eectronics and Teecommunications, Hanoi University of Science and Technoogy, Vietnam 2 Department of Computer Architecture, UPC BarceonaTech, Spain 3 Department of Eectronic and Computer Engineering, University of Limeric, Ireand 4 Emai: {quyen.nguyenxuan, chuyen.nguyenthanh}@hust.edu.vn, pbaret@ac.upc.edu, reiner.dojen@u.ie Abstract In this paper, we propose a nove approach to the enhancement of physica ayer security for chaotic directsequence spread-spectrum (DSSS) communication systems. The main idea behind our proposa is to vary the symbo period according to the behavior of the chaotic spreading sequence. As a resut, the symbo period and the spreading sequence vary chaoticay at the same time. This simutaneous variation aims at protecting DSSS-based communication systems from the bind estimation attacs in the detection of the symbo period. Discrete-time modes for spreading and despreading schemes are presented and anayzed. Mutipe access performance of the proposed technique in the presence of additiona white Gaussian noise (AWGN) is determined by computer simuations. The increase in security at the physica ayer is aso evauated by numerica resuts. Obtained resuts show that our proposed technique can protect the system against attacs based on the detection of the symbo period, even if the intruder has fu information on the used chaotic sequence. Index Terms Chaotic direct-sequence spread-spectrum (DSSS); Chaos-based spread-spectrum; Physica ayer security. I. INTRODUCTION In the two ast decades, a arge number of studies have been devoted to the design and anaysis of communication systems based on chaotic direct-sequence spread-spectrum (DSSS) [1]- [5]. The main goa of the appication of chaotic sequences to spread-spectrum communications is the enhancement of physica ayer security [6]-[9]. However, severa recent studies have shown that chaotic sequences can be recovered by different bind detection methods [10]-[13]. A detection method based on noninear time series anaysis is presented in [10], where mutua information and fase nearest neighbor methods are used for estabishing optima embedding parameters for the attractor reconstruction from the experimenta time series. The reconstruction of chaotic attractor is aso investigated in [11] by expoiting intrinsic geometry of chaotic attractor sets. Based on the reconstructed attractor, the chaotic sequence used can be recovered by an approximation agorithm. The study in [12] shows that the equivariant adaptive separation via independence (EASI) agorithm in fixed-point arithmetic can recover successfuy the chaotic sequences. The obtained resuts of the above studies aso pose a new security chaenge, that is, if an intruder can recover the chaotic spreading sequence, he wi empoy the recovered sequence to detect the symbo period [13, 14]. With the recovered sequence and detected period, he can totay recover the origina data. It means that the security of chaos-based DSSS systems is totay broen. This paper proposes a nove chaos-based DSSS technique for overcoming the security weaness aforementioned. In the proposed technique, the period of the data symbo is varied according to the behavior of the chaotic spreading sequence. Because both the spreading sequence and the symbo period vary chaoticay at the same time, the bit energy aso varies according to the chaotic behavior. As a resut, it is not easy for an intruder to detect the symbo period by using energy detection methods [13, 14]. In fact, the idea of chaos-based variation of the symbo period in spread-spectrum communication systems has aso been presented in [15] and [16]. However, the spreading sequences investigated in these studies are binary sequences, i.e., PN and NRZ-chaos sequences, which have ony two eves, +1 or -1. Obtained resuts point out that the performance of mutipe-access system with the simutaneous variation of the symbo period and the spreading sequence gets worse when the variation range of the symbo period is increased. But in return, our technique can protect the system from attacs based on detecting the symbo period at the physica ayer, even if the attacer fuy nows the chaotic sequence. The rest of this paper is structured as foows: in Section II, the proposed approach is described via the anaysis of discretetime modes for spreading and despreading schemes. Mutipe access performance over the AWGN channe is estimated by numerica resuts in Section III. Section IV presents an investigation using computer simuations on the abiity of the proposed technique in resisting the symbo period detection attacs. Finay, our concusion with remars is given in Section V. II. DESCRIPTION OF PROPOSED APPROACH A. Spreading Scheme with Variabe Bit Period The boc diagram of the spreading scheme is shown in Fig. 1. The puse chain with variabe inter-puse intervas, denoted by {p } is generated by the variabe interva puse generator (VIPG) whose input is the chaotic sequence {x }. In the VIPG, the input sequence {x } is samped at each instance 2016 IEEE. Persona use of this materia is permitted. Permission from IEEE must be obtained for a other uses, in any current or future media, incuding reprinting/repubishing this materia for advertising or promotiona purposes,creating new coective wors, for resae or redistribution to servers or ists, or reuse of any copyrighted component of this wor in other wors. DOI /CCE
2 triggered by the input puse, i.e., p = P (t t ), (1) Data Buffer p b c e with P (t) = { 1 0 t τ, 0 otherwise, (2) f( ) β x where t is the instance to generate the th puse. The output sampe x is then converted into a positive integer β by using a transformation function, i.e., β = f(x ). Here, the function f( ) is determined so that when the sequence {x } varies in a nown range of [x min, x max ], {β } aso varies in a corresponding range of [in = f(x min ) = 0, ax = f(x max ) = ]. In order to determine the function f( ), we first choose a fixed vaue for. The range of [x min, x max ] is then divided into ( +1) vaue intervas, i.e., [x min +jγ, x min +(j+1)γ], with j varying from 0 to. γ is a constant defined by r =e +n Correator c VIPG p x Chaotic Generator Σ s b Buffer Output Data γ = (x max x min )/( + 1). (3) VIPG If the input vaue x fas into the range of [x min +jγ, x min + (j + 1)γ], the corresponding output vaue β is determined by the function f( ) as foows: x x min β = f(x ) =, (4) γ with being the foor function. Depending on the vaue of β, the ( + 1) th puse is generated at the output of VIPG at the instance t +1 given by t +1 = t + (β + β )τ, (5) Data 1 Data i x Synchronized Chaotic Generator Transmitter 1 Transmitter i r e (1) e (i) n r Receiver 1 Receiver i Output Data 1 Data i here τ is chip period of the chaotic sequence {x } and β is a fixed integer whose vaue is predetermined. We can see from Eq. (5) that the intervas between inter-puses of {p } vary according to the chaotic sampe vaues {x } and aways equa to a mutipe of chip period τ. With the trigger of each puse of {p }, the data buffer shifts the binary vaue of next symbo, i.e., b = {±1}, to its output. It means that the period of th symbo, denoted by T, is determined from Eq. (5) as foows: T s = t +1 t = (β + β )τ. (6) The spread-spectrum process is performed by directy mutipying the variabe-period bits {b } with the chaotic sequence {x }. Eq. (6) shows that there are (β +β ) chips in the period of th bit. It means that the sum, i.e., (β + β ) is aso the spreading factor of the th bit. In the spreading process, the number of symbo tends to infinite, β varies in the range of [0, ], thus the spreading factor, (β + β ), varies in the range of [β, ]. The predetermined constants, β and, are considered as the initia vaue and the variation width of the spreading factor, respectivey. The output signa of the spreading scheme in the period of the th bit can be expressed as e = b x. (7) Data K Transmitter K e (K) (c) Receiver K Data K Fig. 1. Boc diagrams of Spreading scheme, Despreding scheme, and (c) DS-CDMA system. It is noted that in the specia case of the variation width = 0, the symbo period T s = βτ is unvaried in the spreading process. The proposed technique in this case becomes the conventiona chaotic DSSS technique. B. Despreading Scheme The boc diagram of the despreading scheme is dispayed in Fig. 1. The oca chaotic sequence is regenerated and synchronized with the incoming signa by means of the synchronized chaotic generator (SCG) whose scheme is shown in Fig. 1(c). This synchronization scheme reies on the scheme presented in [30] for the conventiona chaotic DSSS technique with a modification. In particuar, instead of repeating the correation process after a fixed symbo period as usua, the correation process is controed by the trigger puses from the VIPG. In the SCG, the chaotic generator and the VIPG are identica to those of the spreading scheme. The synchronized
3 chaotic sequence is used for the despreading process and data recovery. The incoming signa is the sum of the transmitted signa and the noise of AWGN channe, we have r = e + n, (8) here n is an AWGN sampe with zero mean and variance N 0 /2. The despreading process is simpy performed by using a correator. The output signa of the correator is samped by the trigger of each pue of {p }. The sampe vaue at the instance t is determined by s = = r x = (e + n )x (b x + n )x = b (x ) 2 + n x. Based on this sampe vaue s, the binary vaue of th symbo is recovered by { 1 s 0, b = (10) 1 s < 0. At the trigger instance of each puse of {p }, the recovered bits are shifted into the buffer. C. Mutipe-access Operation Fig. 1(c) shows a typica DS-CDMA communication system based on the proposed DSSS technique. K users are distinguished from each other by different chaotic sequences, which can be produced by using the same chaotic map with different initia vaues. At the input of the i th receiver, the incoming signa is expressed as r = K e (i) + n = K (9) b (i) + n (11) The correation vaue at output of the samper is given by s (i) = r = = ( K ( K = b (i) e (i) + n ) b (i) + n ( )2 + ) K,i j b (i) x(j) + n (12) Simiary, based on this sampe vaue s (i), the vaue of b (i) is recovered by the comparison as in Eq. (10). P(Evb ) E vb β=32, =10 β=32, =5 β=32, β =0 β=16, =10 β=16, =5 β=16, β 5 m = β=16, =0 β=16, =5 β=16, =10 β=32, =0 β=32, =5 β=32, = E vb Fig. 2. Resuts obtained by numerica computation: Variation of symbo energy, Histograms of symbo energy distribution. III. SIMULATION RESULTS In this section, PC simuations for the chaotic DS-CDMA system based on the proposed DSSS technique are carried out with different system parameters. The chaotic map used for generating chaotic sequences is the Chebyshev poynomia function of order 2 given by with [x min, x max ] = [ 1, 1] and E c = E [ x 2 ] = x = f(x 1 ) = 2x 2 1 1, (13) x 2 ρ(x)dx = 1 1 x 2 1 π 1 x 2 dx = 1 2, (14) Fig. 2 and Fig. 2 show respectivey the variation of bit energy and the histograms of the bit energy distribution, obtained by numerica computations for cases of β = 16, 32 with = 0, 5, 10. Each histogram is potted by means of 1000 casses which are cacuated statisticay from sampes of bit energy. It can be ceary observed that the bit energy varies aperiodicay, where the average energy increases aong with the increment of the initia spreading factor β, and the variation range of the bit energy becomes wider with the increment of variation width. In Fig. 3, we evauate the effect of two parameters, i.e., β and, on the performance of the mono-user system under the same vaue of E ab N 0 = 9dB. We can find that the cacuated resuts totay agree with the simuated ones. Both of them point out that the system performance increases with the vaue of β. For exampe with the same = 10, when β increases from 4 to 64, the BER vaue reduces from 2 to , respectivey. In contrast, when increases, the system performance gets worse. Specificay, at the same
4 = 40 ρ (α) (db) T s=32τ BER = 20 = 10 = 5 = β K=5 K=4 K=3 ρ (α) (db) BER K=1 K=2 ρ (α) (db) E b /N 0 (db) Fig. 3. BER performance of the DS-CDMA system using the proposed DSSS technique: Mono-user system with increment of β and at the same E ab /N 0 = 9dB; Muti-user system with increment of K at β = 16 and = 10. β = 16, the BER vaue increases from to corresponding to varying from 0 to 40. In return, the increment of contributes to enhance the system security at the physica ayer. This enhancement wi be anayzed in Section IV. The dependence of the system performance upon the number of users K for β = 16, = 10 is dispayed in Fig. 3. It can be ceary observed that the system performs worse with the increment of K. For exampe with the same vaue of E ab N 0 = 10dB, the BER vaue increases from to 6 corresponding to K increasing from 1 to 5. (c) Fig. 4. Fuctuation graphs obtained by PC simuations for the first scenario in cases of PN-DSSS technique, Chaotic DSSS technique, and (c) Proposed DSSS technique. IV. IMPROVEMENT OF PHYSICAL LAYER SECURITY In this section, we investigate the security abiity of the proposed chaos-based DSSS technique by means of PC simuations. Let s suppose that an intruder uses the we-nown attac method proposed in [13, 14] to detect the typica parameters, i.e, symbo period T s and sequence period T S, of the spreading sequence from the received signa r(t). The attac method used reies on the computation of the fuctuation of the auto-correation vaue. In order to compute the fuctuations, the received signa is divided into L tempora windows with W being the window width. By appying an autocorreation estimator to each window, the correation vaue is computed by R n rr(α) = 1 W W 0 r(t)r (t α)dt, (15)
5 ρ (α) (db) 10 1 T s=32τ where R n rr(α) is the correation vaue of the n th window, r (t α) is the compex conjugate of r(t α), and α is the shifted duration. The fuctuation vaue is then determined as foows: { ρ(α) = Ê Rn rr(α) 2} = 1 L 1 L R rr(α) n 2. (16) 0 T =34.5τ as (c) T =127 S (d) T =127τ S (e) Fig. 5. Fuctuation graphs obtained by PC simuations for the second scenario in cases of Chaotic DSSS technique, Proposed DSSS technique with = 5, (c) Proposed DSSS technique with = 10, (d) Proposed DSSS technique with = 20, Proposed DSSS technique with = 40. By potting the graph of ρ(α) versus α, caed fuctuation graph, the symbo period or sequence period can be determined by measuring the duration between pea vaues in the graph. To compare the security eve, we simuate the attac process of the intruder with respect to three techniques, i.e., PN- DSSS, chaotic DSSS, and chaotic DSSS with variabe symbo period. The simuation parameters are chosen as foows: fixed spreading factor β = 32 for the cases of PN and chaotic DSSS techniques, β = 32 and = 5, 10, 20, 40 for the case of the proposed technique, sequence period T S = 127τ, window width W = 1000τ, and window number L = Here, the attac simuations are carried out for two scenarios: (1) the intruder has no information about the transmitting side. He performs a bind detection using the aforementioned method; (2) the intruder has fu information on the spreading sequence. The received signa is mutipied with this nown sequence. The output product is then used as the input signa of the detection method above. Fuctuation graphs obtained by the simuations for the first scenario are shown in Fig. 5. For the case of the PN-DSSS technique, by measuring the cyce of periodic the curve of the graph in Fig. 4, the intruder can easiy detect the symbo period, T s = 32τ, and the sequence period, T S = 127τ. With respect to the cases of the chaotic DSSS and our proposed techniques with = 10, Fig. 4 and Fig. 4(c) ceary show that the intruder just detects the sequence period T S = 127τ and there is no sign of the symbo period. These resuts point out an important feature, that is, the DSSS systems are protected from the attac method described above by repacing PN sequences by chaotic ones. Fig. 5 presents the simuated fuctuation graphs for the second scenario. We can see from Fig. 5 that the intruder can detect both of the symbo and sequence periods in the case of the conventiona chaotic DSSS technique. For the case of the proposed DSSS technique, Fig. 5, Fig. 5(c), Fig. 5(d), and Fig. 5(e) show that the intruder can detect the sequence period T S = 127τ but cannot detect exacty the variation of the symbo period. With respect to the case of = 5, the intruder may detect the average symbo period, i.e., T as = (β + /2)τ = 34.5τ, even so this average vaue is not enough to recover the origina data. For the case of = 10, the sign of the average period starts to disappear. There is no sign of the symbo period for the cases of = 20 and = 40. It means that our technique can hide the information of the symbo period, thus its security cannot be broen by the intruder who has fu information on the chaotic sequence used.
6 V. CONCLUSIONS This study has proposed and investigated a nove chaosbased DSSS technique, where the symbo period is varied according to the behavior of the chaotic spreading sequence used. Mathematica modes in discrete time domain for the spreading scheme with variabe symbo period and the despreading scheme with sequence synchronization are presented and anayzed. The BER performance of the proposed technique in DS-CDMA communication systems over an AWGN channe is estimated with the use of numerica simuation. The robustness against the attac of symbo period detection of the proposed technique in comparison with that of the conventiona techniques is evauated in two different scenarios by means of the numerica simuations. The obtained resuts show that: (1) the use of chaotic sequences instead of PN sequences heps to protect DSSS-based communication systems from bind estimation attacs to detect the symbo period; (2) the mutipe access performance gets better when the initia spreading factor β is increased. With the chip period being fixed, this increment eads to the reduction of the symbo rate. On the other hand, the increment of variation width of the spreading factor, i.e.,, maes the performance worse, but in return the physica ayer security is enhanced significanty. Therefore, the vaues of β and have to be propery predetermined to guarantee the trade-off between performance, data rate and security of the system; (3) it is cear that the spreading, despreading and synchronization schemes of the proposed technique are more compicated than those of the conventiona ones and they operate based on the process of discrete-sampe processing. Therefore, these schemes are suitabe to be impemented easiy on high speed programmabe integrated circuits. A the noticeabe remars above mae the chaos-based DSSS with variabe symbo period be a promising and robust technique for enhancing the physica ayer security of DS-CDMA communication systems. [8] A. N. Miiou, I. P. Antoniades, S. G. Stavrinides, A. N. Anagnostopouos, Secure communication by chaotic synchronization: Robustness under noisy conditions, Noninear Anaysis: Rea Word Appications, vo.8, no. 3, pp , [9] N. X. Quyen, T. Q. Duong, A. Naanathan, Modeing, anaysis and performance comparison of two direct samping DCSK receivers under frequency nonseective fading channes, IET Communications, doi: /iet-com , [10] S. Kodba, M. Perc, and M. Marh, Detecting chaos from a time series, Europen Journa of Physics, vo. 26, pp , [11] G. K. Rohdea, J. M. Nichos, and F. Buchotz, Chaotic signa detection and estimation based on attractor sets: Appications to secure communications, Chaos: An Interdis. Jour. of Noni. Science, vo. 18, , [12] S-J. Kimy, K. Umenoyz, and R. Taahashiz, Recovery of chaotic signas using on-ine ICA agorithm, 2007 Int. Symp. on Noni. Theory and its Appi. (NOLTA 07), Vancouver-Canada, Sept. 2007, pp [13] G. Bure, Detection of spread spectrum transmissions using fuctuations of correation estimators, IEEE-ISPACS, Nov. 2000, pp. B B [14] H. Xu, Z. Huang, Y. Zhou, Bind estimation of the symbo period of a ong-code DS-SS signa, Int. Conf. on Micro.and Mii. Wave Techno. (ICMMT 07), Changsha-China, Apr. 2004, pp.1-4. [15] N. X. Quyen, V. V. Yem, T. M. Hoang, A chaos-based secure directsequence/spread-spectrum communication system, Abstract and Appied Anaysis, 11 pages, doi: /2013/764341, [16] N. X. Quyen, V. V. Yem, T. Q. Duong, Design and anaysis of a spread-spectrum communication system with chaos-based variation of both phase-coded carrier and spreading factor, IET Communications, vo. 9, no. 12, pp , REFERENCES [1] C. C. Chong and S. K. Yong, UWB direct chaotic communication technoogy for ow-rate WPAN appications, IEEE Trans. Veh. Techno., vo. 57, no. 3, pp , [2] G. Kaddoum, P. Charge, and D.Roviras, A generaized methodoogy for bit-error-rate prediction in correation-based communication schemes using chaos, IEEE Comm. Letters, vo. 13, no. 8, pp , [3] N. X. Quyen, L. V. Cong, N. H. Long, V. V. Yem, An OFDM-based chaotic DSSS communication system with MPSK moduation, Proc. Int. Conf. Communications and Eectronics (ICCE 14), Danang-Vietnam, 2014, pp [4] S. M. Berber, Probabiity of error derivatives for binary and chaos-based CDMA systems in wide-band channes, IEEE Trans. Wire. Commun., vo. 13, no. 10, pp , [5] M. K. Pate,, S. M. Berber, K. W. Sowerby, Adaptive RAKE receiver in chaos based piot-added DS-CDMA system, Physica Communication, vo. 16, pp , [6] N. X. Quyen, V. V. Yem, T. M. Hoang, and K. Kyamaya, MxNary chaotic puse-width-position moduation: An effective combination method for improving bit rate, Int. Jour. for Computation and Mathematics in Eectrica and Eectronic Engineering, vo. 32, no. 3, pp , [7] J. Yu and Y.-D. Yao, Detection performance of chaotic spreading LPI waveforms, IEEE Trans. Wireess Commun., vo. 4, no. 2, pp , 2005.
Performance of Direct-oversampling Correlator-type Receivers in Chaos-based DS-CDMA Systems Over Frequency Non-selective Fading Channels
Wireess Persona Communications manuscript No wi be inserted by the editor) Performance of Direct-oversamping Correator-type Receivers in Chaos-based DS-CDMA Systems Over Frequency Non-seective Fading Channes
More informationT.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA
ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network
More informationFREQUENCY modulated differential chaos shift key (FM-
Accepted in IEEE 83rd Vehicuar Technoogy Conference VTC, 16 1 SNR Estimation for FM-DCS System over Mutipath Rayeigh Fading Channes Guofa Cai, in Wang, ong ong, Georges addoum Dept. of Communication Engineering,
More informationESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK
ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK Aexander Arkhipov, Michae Schne German Aerospace Center DLR) Institute of Communications and Navigation Oberpfaffenhofen, 8224 Wessing, Germany
More informationAdjustment of automatic control systems of production facilities at coal processing plants using multivariant physico- mathematical models
IO Conference Series: Earth and Environmenta Science AER OEN ACCESS Adjustment of automatic contro systems of production faciities at coa processing pants using mutivariant physico- mathematica modes To
More informationTheory of Generalized k-difference Operator and Its Application in Number Theory
Internationa Journa of Mathematica Anaysis Vo. 9, 2015, no. 19, 955-964 HIKARI Ltd, www.m-hiari.com http://dx.doi.org/10.12988/ijma.2015.5389 Theory of Generaized -Difference Operator and Its Appication
More informationA Novel Learning Method for Elman Neural Network Using Local Search
Neura Information Processing Letters and Reviews Vo. 11, No. 8, August 2007 LETTER A Nove Learning Method for Eman Neura Networ Using Loca Search Facuty of Engineering, Toyama University, Gofuu 3190 Toyama
More informationA proposed nonparametric mixture density estimation using B-spline functions
A proposed nonparametric mixture density estimation using B-spine functions Atizez Hadrich a,b, Mourad Zribi a, Afif Masmoudi b a Laboratoire d Informatique Signa et Image de a Côte d Opae (LISIC-EA 4491),
More informationPERFORMANCE ANALYSIS OF MULTIPLE ACCESS CHAOTIC-SEQUENCE SPREAD-SPECTRUM COMMUNICATION SYSTEMS USING PARALLEL INTERFERENCE CANCELLATION RECEIVERS
Internationa Journa of Bifurcation and Chaos, Vo. 14, No. 10 (2004) 3633 3646 c Word Scientific Pubishing Company PERFORMANCE ANALYSIS OF MULTIPLE ACCESS CHAOTIC-SEQUENCE SPREAD-SPECTRUM COMMUNICATION
More informationIterative Decoding Performance Bounds for LDPC Codes on Noisy Channels
Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University
More informationA Brief Introduction to Markov Chains and Hidden Markov Models
A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,
More informationMC-CDMA CDMA Systems. Introduction. Ivan Cosovic. Stefan Kaiser. IEEE Communication Theory Workshop 2005 Park City, USA, June 15, 2005
On the Adaptivity in Down- and Upink MC- Systems Ivan Cosovic German Aerospace Center (DLR) Institute of Comm. and Navigation Oberpfaffenhofen, Germany Stefan Kaiser DoCoMo Euro-Labs Wireess Soution Laboratory
More informationLINEAR DETECTORS FOR MULTI-USER MIMO SYSTEMS WITH CORRELATED SPATIAL DIVERSITY
LINEAR DETECTORS FOR MULTI-USER MIMO SYSTEMS WITH CORRELATED SPATIAL DIVERSITY Laura Cottateucci, Raf R. Müer, and Mérouane Debbah Ist. of Teecommunications Research Dep. of Eectronics and Teecommunications
More informationAsynchronous Control for Coupled Markov Decision Systems
INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of
More informationData Search Algorithms based on Quantum Walk
Data Search Agorithms based on Quantum Wak Masataka Fujisaki, Hiromi Miyajima, oritaka Shigei Abstract For searching any item in an unsorted database with items, a cassica computer takes O() steps but
More informationBP neural network-based sports performance prediction model applied research
Avaiabe onine www.jocpr.com Journa of Chemica and Pharmaceutica Research, 204, 6(7:93-936 Research Artice ISSN : 0975-7384 CODEN(USA : JCPRC5 BP neura networ-based sports performance prediction mode appied
More informationDistributed average consensus: Beyond the realm of linearity
Distributed average consensus: Beyond the ream of inearity Usman A. Khan, Soummya Kar, and José M. F. Moura Department of Eectrica and Computer Engineering Carnegie Meon University 5 Forbes Ave, Pittsburgh,
More informationMaximum Ratio Combining of Correlated Diversity Branches with Imperfect Channel State Information and Colored Noise
Maximum Ratio Combining of Correated Diversity Branches with Imperfect Channe State Information and Coored Noise Lars Schmitt, Thomas Grunder, Christoph Schreyoegg, Ingo Viering, and Heinrich Meyr Institute
More informationFirst-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries
c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische
More information8 Digifl'.11 Cth:uits and devices
8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,
More informationTransmit Antenna Selection for Physical-Layer Network Coding Based on Euclidean Distance
Transmit ntenna Seection for Physica-Layer Networ Coding ased on Eucidean Distance 1 arxiv:179.445v1 [cs.it] 13 Sep 17 Vaibhav Kumar, arry Cardiff, and Mar F. Fanagan Schoo of Eectrica and Eectronic Engineering,
More informationEfficiently Generating Random Bits from Finite State Markov Chains
1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown
More informationResearch of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance
Send Orders for Reprints to reprints@benthamscience.ae 340 The Open Cybernetics & Systemics Journa, 015, 9, 340-344 Open Access Research of Data Fusion Method of Muti-Sensor Based on Correation Coefficient
More informationApproach to Identifying Raindrop Vibration Signal Detected by Optical Fiber
Sensors & Transducers, o. 6, Issue, December 3, pp. 85-9 Sensors & Transducers 3 by IFSA http://www.sensorsporta.com Approach to Identifying Raindrop ibration Signa Detected by Optica Fiber ongquan QU,
More informationRelated Topics Maxwell s equations, electrical eddy field, magnetic field of coils, coil, magnetic flux, induced voltage
Magnetic induction TEP Reated Topics Maxwe s equations, eectrica eddy fied, magnetic fied of cois, coi, magnetic fux, induced votage Principe A magnetic fied of variabe frequency and varying strength is
More informationSome Measures for Asymmetry of Distributions
Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester
More informationAn Algorithm for Pruning Redundant Modules in Min-Max Modular Network
An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai
More informationUnconditional security of differential phase shift quantum key distribution
Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice
More informationA Solution to the 4-bit Parity Problem with a Single Quaternary Neuron
Neura Information Processing - Letters and Reviews Vo. 5, No. 2, November 2004 LETTER A Soution to the 4-bit Parity Probem with a Singe Quaternary Neuron Tohru Nitta Nationa Institute of Advanced Industria
More informationA GENERAL METHOD FOR EVALUATING OUTAGE PROBABILITIES USING PADÉ APPROXIMATIONS
A GENERAL METHOD FOR EVALUATING OUTAGE PROBABILITIES USING PADÉ APPROXIMATIONS Jack W. Stokes, Microsoft Corporation One Microsoft Way, Redmond, WA 9852, jstokes@microsoft.com James A. Ritcey, University
More informationSteepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1
Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rues 1 R.J. Marks II, S. Oh, P. Arabshahi Λ, T.P. Caude, J.J. Choi, B.G. Song Λ Λ Dept. of Eectrica Engineering Boeing Computer Services University
More informationOn the Achievable Extrinsic Information of Inner Decoders in Serial Concatenation
On the Achievabe Extrinsic Information of Inner Decoders in Seria Concatenation Jörg Kiewer, Axe Huebner, and Danie J. Costeo, Jr. Department of Eectrica Engineering, University of Notre Dame, Notre Dame,
More informationUniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete
Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity
More informationFitting Algorithms for MMPP ATM Traffic Models
Fitting Agorithms for PP AT Traffic odes A. Nogueira, P. Savador, R. Vaadas University of Aveiro / Institute of Teecommunications, 38-93 Aveiro, Portuga; e-mai: (nogueira, savador, rv)@av.it.pt ABSTRACT
More informationFOURIER SERIES ON ANY INTERVAL
FOURIER SERIES ON ANY INTERVAL Overview We have spent considerabe time earning how to compute Fourier series for functions that have a period of 2p on the interva (-p,p). We have aso seen how Fourier series
More informationDIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM
DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM MIKAEL NILSSON, MATTIAS DAHL AND INGVAR CLAESSON Bekinge Institute of Technoogy Department of Teecommunications and Signa Processing
More informationSource and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems
Source and Reay Matrices Optimization for Mutiuser Muti-Hop MIMO Reay Systems Yue Rong Department of Eectrica and Computer Engineering, Curtin University, Bentey, WA 6102, Austraia Abstract In this paper,
More informationA Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)
A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,
More informationTurbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University
Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver
More informationarxiv: v3 [math.sp] 2 Nov 2017
A Fast Agorithm for Computing the Fourier Spectrum of a Fractiona Period arxiv:1604.01589v3 [math.sp] 2 Nov 2017 Jiasong Wang 1, Changchuan Yin 2, 1.Department of Mathematics, Nanjing University, Nanjing,
More informationXSAT of linear CNF formulas
XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open
More informationReliability: Theory & Applications No.3, September 2006
REDUNDANCY AND RENEWAL OF SERVERS IN OPENED QUEUING NETWORKS G. Sh. Tsitsiashvii M.A. Osipova Vadivosto, Russia 1 An opened queuing networ with a redundancy and a renewa of servers is considered. To cacuate
More informationFORECASTING TELECOMMUNICATIONS DATA WITH AUTOREGRESSIVE INTEGRATED MOVING AVERAGE MODELS
FORECASTING TEECOMMUNICATIONS DATA WITH AUTOREGRESSIVE INTEGRATED MOVING AVERAGE MODES Niesh Subhash naawade a, Mrs. Meenakshi Pawar b a SVERI's Coege of Engineering, Pandharpur. nieshsubhash15@gmai.com
More informationSecure Computation with Minimal Interaction, Revisited
Secure Computation with Minima Interaction, Revisited Yuva Ishai, Ranjit Kumaresan, Eya Kushievitz, and Anat Pasin-Cherniavsy Abstract. Motivated by the goa of improving the concrete efficiency of secure
More informationDISTRIBUTION OF TEMPERATURE IN A SPATIALLY ONE- DIMENSIONAL OBJECT AS A RESULT OF THE ACTIVE POINT SOURCE
DISTRIBUTION OF TEMPERATURE IN A SPATIALLY ONE- DIMENSIONAL OBJECT AS A RESULT OF THE ACTIVE POINT SOURCE Yury Iyushin and Anton Mokeev Saint-Petersburg Mining University, Vasiievsky Isand, 1 st ine, Saint-Petersburg,
More information4 1-D Boundary Value Problems Heat Equation
4 -D Boundary Vaue Probems Heat Equation The main purpose of this chapter is to study boundary vaue probems for the heat equation on a finite rod a x b. u t (x, t = ku xx (x, t, a < x < b, t > u(x, = ϕ(x
More informationResearch Article On the Lower Bound for the Number of Real Roots of a Random Algebraic Equation
Appied Mathematics and Stochastic Anaysis Voume 007, Artice ID 74191, 8 pages doi:10.1155/007/74191 Research Artice On the Lower Bound for the Number of Rea Roots of a Random Agebraic Equation Takashi
More informationImproved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization
Improved Min-Sum Decoding of LDPC Codes sing -Dimensiona Normaization Juntan Zhang and Marc Fossorier Department of Eectrica Engineering niversity of Hawaii at Manoa Honouu, HI 968 Emai: juntan, marc@spectra.eng.hawaii.edu
More informationCompression Ratio Expansion for Complementary Code Set Compressing a Signal to a Width of Several Sub-pulses
Compression Ratio Expansion for Compementary Code Set Compressing a Signa to a Width of Severa Sub-puses Reiji Sato 2nd Research Center, Technica R and D Institute Japan Defense Agency 1-2-24 Ikejiri,
More informationLecture Note 3: Stationary Iterative Methods
MATH 5330: Computationa Methods of Linear Agebra Lecture Note 3: Stationary Iterative Methods Xianyi Zeng Department of Mathematica Sciences, UTEP Stationary Iterative Methods The Gaussian eimination (or
More informationTracking Control of Multiple Mobile Robots
Proceedings of the 2001 IEEE Internationa Conference on Robotics & Automation Seou, Korea May 21-26, 2001 Tracking Contro of Mutipe Mobie Robots A Case Study of Inter-Robot Coision-Free Probem Jurachart
More informationAdaptive Joint Self-Interference Cancellation and Equalization for Space-Time Coded Bi-Directional Relaying Networks
1 Adaptive Joint Sef-Interference Canceation and Equaization for Space-Time Coded Bi-Directiona Reaying Networs Jeong-Min Choi, Jae-Shin Han, and Jong-Soo Seo Department of Eectrica and Eectronic Engineering,
More informationA. Distribution of the test statistic
A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch
More informationImproving the Reliability of a Series-Parallel System Using Modified Weibull Distribution
Internationa Mathematica Forum, Vo. 12, 217, no. 6, 257-269 HIKARI Ltd, www.m-hikari.com https://doi.org/1.12988/imf.217.611155 Improving the Reiabiity of a Series-Parae System Using Modified Weibu Distribution
More informationThe influence of temperature of photovoltaic modules on performance of solar power plant
IOSR Journa of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vo. 05, Issue 04 (Apri. 2015), V1 PP 09-15 www.iosrjen.org The infuence of temperature of photovotaic modues on performance
More informationBright and Dark Solitons in Optical Fibers with Parabolic Law Nonlinearity
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vo. 0, No. 3, October 03, 365-370 UDK: 666.89. DOI: 0.98/SJEE3084009M Bright Dark Soitons in Optica Fibers with Paraboic Law Noninearity Daniea Miović, Anjan Biswas
More informationA Robust Voice Activity Detection based on Noise Eigenspace Projection
A Robust Voice Activity Detection based on Noise Eigenspace Projection Dongwen Ying 1, Yu Shi 2, Frank Soong 2, Jianwu Dang 1, and Xugang Lu 1 1 Japan Advanced Institute of Science and Technoogy, Nomi
More informationHaar Decomposition and Reconstruction Algorithms
Jim Lambers MAT 773 Fa Semester 018-19 Lecture 15 and 16 Notes These notes correspond to Sections 4.3 and 4.4 in the text. Haar Decomposition and Reconstruction Agorithms Decomposition Suppose we approximate
More informationD. Prémel, J.M. Decitre and G. Pichenot. CEA, LIST, F Gif-sur-Yvette, France
SIMULATION OF EDDY CURRENT INSPECTION INCLUDING MAGNETIC FIELD SENSOR SUCH AS A GIANT MAGNETO-RESISTANCE OVER PLANAR STRATIFIED MEDIA COMPONENTS WITH EMBEDDED FLAWS D. Préme, J.M. Decitre and G. Pichenot
More informationDetermining The Degree of Generalization Using An Incremental Learning Algorithm
Determining The Degree of Generaization Using An Incrementa Learning Agorithm Pabo Zegers Facutad de Ingeniería, Universidad de os Andes San Caros de Apoquindo 22, Las Condes, Santiago, Chie pzegers@uandes.c
More informationLimited magnitude error detecting codes over Z q
Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica
More informationSTA 216 Project: Spline Approach to Discrete Survival Analysis
: Spine Approach to Discrete Surviva Anaysis November 4, 005 1 Introduction Athough continuous surviva anaysis differs much from the discrete surviva anaysis, there is certain ink between the two modeing
More informationHYDROGEN ATOM SELECTION RULES TRANSITION RATES
DOING PHYSICS WITH MATLAB QUANTUM PHYSICS Ian Cooper Schoo of Physics, University of Sydney ian.cooper@sydney.edu.au HYDROGEN ATOM SELECTION RULES TRANSITION RATES DOWNLOAD DIRECTORY FOR MATLAB SCRIPTS
More informationSeparation of Variables and a Spherical Shell with Surface Charge
Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation
More informationNumerical solution of one dimensional contaminant transport equation with variable coefficient (temporal) by using Haar wavelet
Goba Journa of Pure and Appied Mathematics. ISSN 973-1768 Voume 1, Number (16), pp. 183-19 Research India Pubications http://www.ripubication.com Numerica soution of one dimensiona contaminant transport
More informationEfficient Generation of Random Bits from Finite State Markov Chains
Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown
More informationPacket Fragmentation in Wi-Fi Ad Hoc Networks with Correlated Channel Failures
Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correated Channe Faiures Andrey Lyakhov Vadimir Vishnevsky Institute for Information Transmission Probems of RAS B. Karetny 19, Moscow, 127994, Russia
More information1D Heat Propagation Problems
Chapter 1 1D Heat Propagation Probems If the ambient space of the heat conduction has ony one dimension, the Fourier equation reduces to the foowing for an homogeneous body cρ T t = T λ 2 + Q, 1.1) x2
More informationMARKOV CHAINS AND MARKOV DECISION THEORY. Contents
MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After
More informationFast Blind Recognition of Channel Codes
Fast Bind Recognition of Channe Codes Reza Moosavi and Erik G. Larsson Linköping University Post Print N.B.: When citing this work, cite the origina artice. 213 IEEE. Persona use of this materia is permitted.
More informationMath 124B January 17, 2012
Math 124B January 17, 212 Viktor Grigoryan 3 Fu Fourier series We saw in previous ectures how the Dirichet and Neumann boundary conditions ead to respectivey sine and cosine Fourier series of the initia
More informationCourse 2BA1, Section 11: Periodic Functions and Fourier Series
Course BA, 8 9 Section : Periodic Functions and Fourier Series David R. Wikins Copyright c David R. Wikins 9 Contents Periodic Functions and Fourier Series 74. Fourier Series of Even and Odd Functions...........
More informationMaximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR
1 Maximizing Sum Rate and Minimizing MSE on Mutiuser Downink: Optimaity, Fast Agorithms and Equivaence via Max-min SIR Chee Wei Tan 1,2, Mung Chiang 2 and R. Srikant 3 1 Caifornia Institute of Technoogy,
More informationThe Streaming-DMT of Fading Channels
The Streaming-DMT of Fading Channes Ashish Khisti Member, IEEE, and Star C. Draper Member, IEEE arxiv:30.80v3 cs.it] Aug 04 Abstract We consider the sequentia transmission of a stream of messages over
More informationGauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law
Gauss Law 1. Review on 1) Couomb s Law (charge and force) 2) Eectric Fied (fied and force) 2. Gauss s Law: connects charge and fied 3. Appications of Gauss s Law Couomb s Law and Eectric Fied Couomb s
More informationBayesian Unscented Kalman Filter for State Estimation of Nonlinear and Non-Gaussian Systems
Bayesian Unscented Kaman Fiter for State Estimation of Noninear and Non-aussian Systems Zhong Liu, Shing-Chow Chan, Ho-Chun Wu and iafei Wu Department of Eectrica and Eectronic Engineering, he University
More informationEffect of transport ratio on source term in determination of surface emission coefficient
Internationa Journa of heoretica & Appied Sciences, (): 74-78(9) ISSN : 975-78 Effect of transport ratio on source term in determination of surface emission coefficient Sanjeev Kumar and Apna Mishra epartment
More informationTitle: Crack Diagnostics via Fourier Transform: Real and Imaginary Components vs. Power Spectral Density
Tite: rack Diagnostics via ourier Transform: ea and maginary omponents vs. Power pectra Density Authors: Leonid M. Geman Victor Giurgiutiu van V. Petrunin 3 rd nternationa Workshop on tructura Heath Monitoring
More informationLINK BETWEEN THE JOINT DIAGONALISATION OF SYMMETRICAL CUBES AND PARAFAC: AN APPLICATION TO SECONDARY SURVEILLANCE RADAR
LINK BETWEEN THE JOINT DIAGONALISATION OF SYMMETRICAL CUBES AND PARAFAC: AN APPLICATION TO SECONDARY SURVEILLANCE RADAR Nicoas PETROCHILOS CReSTIC, University of Reims Mouins de a Housse, BP 1039 51687
More informationTarget Location Estimation in Wireless Sensor Networks Using Binary Data
Target Location stimation in Wireess Sensor Networks Using Binary Data Ruixin Niu and Pramod K. Varshney Department of ectrica ngineering and Computer Science Link Ha Syracuse University Syracuse, NY 344
More informationScalable Spectrum Allocation for Large Networks Based on Sparse Optimization
Scaabe Spectrum ocation for Large Networks ased on Sparse Optimization innan Zhuang Modem R&D Lab Samsung Semiconductor, Inc. San Diego, C Dongning Guo, Ermin Wei, and Michae L. Honig Department of Eectrica
More informationMelodic contour estimation with B-spline models using a MDL criterion
Meodic contour estimation with B-spine modes using a MDL criterion Damien Loive, Ney Barbot, Oivier Boeffard IRISA / University of Rennes 1 - ENSSAT 6 rue de Kerampont, B.P. 80518, F-305 Lannion Cedex
More informationCS229 Lecture notes. Andrew Ng
CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view
More informationA SIMPLIFIED DESIGN OF MULTIDIMENSIONAL TRANSFER FUNCTION MODELS
A SIPLIFIED DESIGN OF ULTIDIENSIONAL TRANSFER FUNCTION ODELS Stefan Petrausch, Rudof Rabenstein utimedia Communications and Signa Procesg, University of Erangen-Nuremberg, Cauerstr. 7, 958 Erangen, GERANY
More informationCoded Caching for Files with Distinct File Sizes
Coded Caching for Fies with Distinct Fie Sizes Jinbei Zhang iaojun Lin Chih-Chun Wang inbing Wang Department of Eectronic Engineering Shanghai Jiao ong University China Schoo of Eectrica and Computer Engineering
More informationConvergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems
Convergence Property of the Iri-Imai Agorithm for Some Smooth Convex Programming Probems S. Zhang Communicated by Z.Q. Luo Assistant Professor, Department of Econometrics, University of Groningen, Groningen,
More informationExplicit overall risk minimization transductive bound
1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,
More informationNEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION
NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION Hsiao-Chang Chen Dept. of Systems Engineering University of Pennsyvania Phiadephia, PA 904-635, U.S.A. Chun-Hung Chen
More informationThe EM Algorithm applied to determining new limit points of Mahler measures
Contro and Cybernetics vo. 39 (2010) No. 4 The EM Agorithm appied to determining new imit points of Maher measures by Souad E Otmani, Georges Rhin and Jean-Marc Sac-Épée Université Pau Veraine-Metz, LMAM,
More informationRate-Distortion Theory of Finite Point Processes
Rate-Distortion Theory of Finite Point Processes Günther Koiander, Dominic Schuhmacher, and Franz Hawatsch, Feow, IEEE Abstract We study the compression of data in the case where the usefu information
More informationOn the Performance of Wireless Energy Harvesting Networks in a Boolean-Poisson Model
On the Performance of Wireess Energy Harvesting Networks in a Booean-Poisson Mode Han-Bae Kong, Ian Fint, Dusit Niyato, and Nicoas Privaut Schoo of Computer Engineering, Nanyang Technoogica University,
More informationCentralized Coded Caching of Correlated Contents
Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv:1711.03798v1
More informationSymbolic models for nonlinear control systems using approximate bisimulation
Symboic modes for noninear contro systems using approximate bisimuation Giordano Poa, Antoine Girard and Pauo Tabuada Abstract Contro systems are usuay modeed by differentia equations describing how physica
More informationDoubly Iterative Receiver for Block Transmissions with EM-Based Channel Estimation
656 IEEE RANSACIONS ON WIRELESS COMMUNICAIONS, VOL. 8, NO. 2, FEBRUARY 2009 Douby Iterative Receiver for Bock ransmissions with EM-Based Channe Estimation he-hanh Pham, Ying-Chang Liang, Senior Member,
More informationMaximum likelihood decoding of trellis codes in fading channels with no receiver CSI is a polynomial-complexity problem
1 Maximum ikeihood decoding of treis codes in fading channes with no receiver CSI is a poynomia-compexity probem Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department
More informationInterconnect effects on performance of Field Programmable Analog Array
nterconnect effects on performance of Fied Programmabe Anaog Array D. Anderson,. Bir, O. A. Pausinsi 3, M. Spitz, K. Reiss Motoroa, SPS, Phoenix, Arizona, USA, University of Karsruhe, Karsruhe, Germany,
More informationDo Schools Matter for High Math Achievement? Evidence from the American Mathematics Competitions Glenn Ellison and Ashley Swanson Online Appendix
VOL. NO. DO SCHOOLS MATTER FOR HIGH MATH ACHIEVEMENT? 43 Do Schoos Matter for High Math Achievement? Evidence from the American Mathematics Competitions Genn Eison and Ashey Swanson Onine Appendix Appendix
More informationBICM Performance Improvement via Online LLR Optimization
BICM Performance Improvement via Onine LLR Optimization Jinhong Wu, Mostafa E-Khamy, Jungwon Lee and Inyup Kang Samsung Mobie Soutions Lab San Diego, USA 92121 Emai: {Jinhong.W, Mostafa.E, Jungwon2.Lee,
More informationNonlinear Gaussian Filtering via Radial Basis Function Approximation
51st IEEE Conference on Decision and Contro December 10-13 01 Maui Hawaii USA Noninear Gaussian Fitering via Radia Basis Function Approximation Huazhen Fang Jia Wang and Raymond A de Caafon Abstract This
More informationProcess Capability Proposal. with Polynomial Profile
Contemporary Engineering Sciences, Vo. 11, 2018, no. 85, 4227-4236 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ces.2018.88467 Process Capabiity Proposa with Poynomia Profie Roberto José Herrera
More information