A Novel Approach to Security Enhancement of Chaotic DSSS Systems

Size: px
Start display at page:

Download "A Novel Approach to Security Enhancement of Chaotic DSSS Systems"

Transcription

1 A Nove Approach to Security Enhancement of Chaotic DSSS Systems Nguyen Xuan Quyen 1, Chuyen T. Nguyen 1, Pere Baret-Ros 2, and Reiner Dojen 3 1 Schoo of Eectronics and Teecommunications, Hanoi University of Science and Technoogy, Vietnam 2 Department of Computer Architecture, UPC BarceonaTech, Spain 3 Department of Eectronic and Computer Engineering, University of Limeric, Ireand 4 Emai: {quyen.nguyenxuan, chuyen.nguyenthanh}@hust.edu.vn, pbaret@ac.upc.edu, reiner.dojen@u.ie Abstract In this paper, we propose a nove approach to the enhancement of physica ayer security for chaotic directsequence spread-spectrum (DSSS) communication systems. The main idea behind our proposa is to vary the symbo period according to the behavior of the chaotic spreading sequence. As a resut, the symbo period and the spreading sequence vary chaoticay at the same time. This simutaneous variation aims at protecting DSSS-based communication systems from the bind estimation attacs in the detection of the symbo period. Discrete-time modes for spreading and despreading schemes are presented and anayzed. Mutipe access performance of the proposed technique in the presence of additiona white Gaussian noise (AWGN) is determined by computer simuations. The increase in security at the physica ayer is aso evauated by numerica resuts. Obtained resuts show that our proposed technique can protect the system against attacs based on the detection of the symbo period, even if the intruder has fu information on the used chaotic sequence. Index Terms Chaotic direct-sequence spread-spectrum (DSSS); Chaos-based spread-spectrum; Physica ayer security. I. INTRODUCTION In the two ast decades, a arge number of studies have been devoted to the design and anaysis of communication systems based on chaotic direct-sequence spread-spectrum (DSSS) [1]- [5]. The main goa of the appication of chaotic sequences to spread-spectrum communications is the enhancement of physica ayer security [6]-[9]. However, severa recent studies have shown that chaotic sequences can be recovered by different bind detection methods [10]-[13]. A detection method based on noninear time series anaysis is presented in [10], where mutua information and fase nearest neighbor methods are used for estabishing optima embedding parameters for the attractor reconstruction from the experimenta time series. The reconstruction of chaotic attractor is aso investigated in [11] by expoiting intrinsic geometry of chaotic attractor sets. Based on the reconstructed attractor, the chaotic sequence used can be recovered by an approximation agorithm. The study in [12] shows that the equivariant adaptive separation via independence (EASI) agorithm in fixed-point arithmetic can recover successfuy the chaotic sequences. The obtained resuts of the above studies aso pose a new security chaenge, that is, if an intruder can recover the chaotic spreading sequence, he wi empoy the recovered sequence to detect the symbo period [13, 14]. With the recovered sequence and detected period, he can totay recover the origina data. It means that the security of chaos-based DSSS systems is totay broen. This paper proposes a nove chaos-based DSSS technique for overcoming the security weaness aforementioned. In the proposed technique, the period of the data symbo is varied according to the behavior of the chaotic spreading sequence. Because both the spreading sequence and the symbo period vary chaoticay at the same time, the bit energy aso varies according to the chaotic behavior. As a resut, it is not easy for an intruder to detect the symbo period by using energy detection methods [13, 14]. In fact, the idea of chaos-based variation of the symbo period in spread-spectrum communication systems has aso been presented in [15] and [16]. However, the spreading sequences investigated in these studies are binary sequences, i.e., PN and NRZ-chaos sequences, which have ony two eves, +1 or -1. Obtained resuts point out that the performance of mutipe-access system with the simutaneous variation of the symbo period and the spreading sequence gets worse when the variation range of the symbo period is increased. But in return, our technique can protect the system from attacs based on detecting the symbo period at the physica ayer, even if the attacer fuy nows the chaotic sequence. The rest of this paper is structured as foows: in Section II, the proposed approach is described via the anaysis of discretetime modes for spreading and despreading schemes. Mutipe access performance over the AWGN channe is estimated by numerica resuts in Section III. Section IV presents an investigation using computer simuations on the abiity of the proposed technique in resisting the symbo period detection attacs. Finay, our concusion with remars is given in Section V. II. DESCRIPTION OF PROPOSED APPROACH A. Spreading Scheme with Variabe Bit Period The boc diagram of the spreading scheme is shown in Fig. 1. The puse chain with variabe inter-puse intervas, denoted by {p } is generated by the variabe interva puse generator (VIPG) whose input is the chaotic sequence {x }. In the VIPG, the input sequence {x } is samped at each instance 2016 IEEE. Persona use of this materia is permitted. Permission from IEEE must be obtained for a other uses, in any current or future media, incuding reprinting/repubishing this materia for advertising or promotiona purposes,creating new coective wors, for resae or redistribution to servers or ists, or reuse of any copyrighted component of this wor in other wors. DOI /CCE

2 triggered by the input puse, i.e., p = P (t t ), (1) Data Buffer p b c e with P (t) = { 1 0 t τ, 0 otherwise, (2) f( ) β x where t is the instance to generate the th puse. The output sampe x is then converted into a positive integer β by using a transformation function, i.e., β = f(x ). Here, the function f( ) is determined so that when the sequence {x } varies in a nown range of [x min, x max ], {β } aso varies in a corresponding range of [in = f(x min ) = 0, ax = f(x max ) = ]. In order to determine the function f( ), we first choose a fixed vaue for. The range of [x min, x max ] is then divided into ( +1) vaue intervas, i.e., [x min +jγ, x min +(j+1)γ], with j varying from 0 to. γ is a constant defined by r =e +n Correator c VIPG p x Chaotic Generator Σ s b Buffer Output Data γ = (x max x min )/( + 1). (3) VIPG If the input vaue x fas into the range of [x min +jγ, x min + (j + 1)γ], the corresponding output vaue β is determined by the function f( ) as foows: x x min β = f(x ) =, (4) γ with being the foor function. Depending on the vaue of β, the ( + 1) th puse is generated at the output of VIPG at the instance t +1 given by t +1 = t + (β + β )τ, (5) Data 1 Data i x Synchronized Chaotic Generator Transmitter 1 Transmitter i r e (1) e (i) n r Receiver 1 Receiver i Output Data 1 Data i here τ is chip period of the chaotic sequence {x } and β is a fixed integer whose vaue is predetermined. We can see from Eq. (5) that the intervas between inter-puses of {p } vary according to the chaotic sampe vaues {x } and aways equa to a mutipe of chip period τ. With the trigger of each puse of {p }, the data buffer shifts the binary vaue of next symbo, i.e., b = {±1}, to its output. It means that the period of th symbo, denoted by T, is determined from Eq. (5) as foows: T s = t +1 t = (β + β )τ. (6) The spread-spectrum process is performed by directy mutipying the variabe-period bits {b } with the chaotic sequence {x }. Eq. (6) shows that there are (β +β ) chips in the period of th bit. It means that the sum, i.e., (β + β ) is aso the spreading factor of the th bit. In the spreading process, the number of symbo tends to infinite, β varies in the range of [0, ], thus the spreading factor, (β + β ), varies in the range of [β, ]. The predetermined constants, β and, are considered as the initia vaue and the variation width of the spreading factor, respectivey. The output signa of the spreading scheme in the period of the th bit can be expressed as e = b x. (7) Data K Transmitter K e (K) (c) Receiver K Data K Fig. 1. Boc diagrams of Spreading scheme, Despreding scheme, and (c) DS-CDMA system. It is noted that in the specia case of the variation width = 0, the symbo period T s = βτ is unvaried in the spreading process. The proposed technique in this case becomes the conventiona chaotic DSSS technique. B. Despreading Scheme The boc diagram of the despreading scheme is dispayed in Fig. 1. The oca chaotic sequence is regenerated and synchronized with the incoming signa by means of the synchronized chaotic generator (SCG) whose scheme is shown in Fig. 1(c). This synchronization scheme reies on the scheme presented in [30] for the conventiona chaotic DSSS technique with a modification. In particuar, instead of repeating the correation process after a fixed symbo period as usua, the correation process is controed by the trigger puses from the VIPG. In the SCG, the chaotic generator and the VIPG are identica to those of the spreading scheme. The synchronized

3 chaotic sequence is used for the despreading process and data recovery. The incoming signa is the sum of the transmitted signa and the noise of AWGN channe, we have r = e + n, (8) here n is an AWGN sampe with zero mean and variance N 0 /2. The despreading process is simpy performed by using a correator. The output signa of the correator is samped by the trigger of each pue of {p }. The sampe vaue at the instance t is determined by s = = r x = (e + n )x (b x + n )x = b (x ) 2 + n x. Based on this sampe vaue s, the binary vaue of th symbo is recovered by { 1 s 0, b = (10) 1 s < 0. At the trigger instance of each puse of {p }, the recovered bits are shifted into the buffer. C. Mutipe-access Operation Fig. 1(c) shows a typica DS-CDMA communication system based on the proposed DSSS technique. K users are distinguished from each other by different chaotic sequences, which can be produced by using the same chaotic map with different initia vaues. At the input of the i th receiver, the incoming signa is expressed as r = K e (i) + n = K (9) b (i) + n (11) The correation vaue at output of the samper is given by s (i) = r = = ( K ( K = b (i) e (i) + n ) b (i) + n ( )2 + ) K,i j b (i) x(j) + n (12) Simiary, based on this sampe vaue s (i), the vaue of b (i) is recovered by the comparison as in Eq. (10). P(Evb ) E vb β=32, =10 β=32, =5 β=32, β =0 β=16, =10 β=16, =5 β=16, β 5 m = β=16, =0 β=16, =5 β=16, =10 β=32, =0 β=32, =5 β=32, = E vb Fig. 2. Resuts obtained by numerica computation: Variation of symbo energy, Histograms of symbo energy distribution. III. SIMULATION RESULTS In this section, PC simuations for the chaotic DS-CDMA system based on the proposed DSSS technique are carried out with different system parameters. The chaotic map used for generating chaotic sequences is the Chebyshev poynomia function of order 2 given by with [x min, x max ] = [ 1, 1] and E c = E [ x 2 ] = x = f(x 1 ) = 2x 2 1 1, (13) x 2 ρ(x)dx = 1 1 x 2 1 π 1 x 2 dx = 1 2, (14) Fig. 2 and Fig. 2 show respectivey the variation of bit energy and the histograms of the bit energy distribution, obtained by numerica computations for cases of β = 16, 32 with = 0, 5, 10. Each histogram is potted by means of 1000 casses which are cacuated statisticay from sampes of bit energy. It can be ceary observed that the bit energy varies aperiodicay, where the average energy increases aong with the increment of the initia spreading factor β, and the variation range of the bit energy becomes wider with the increment of variation width. In Fig. 3, we evauate the effect of two parameters, i.e., β and, on the performance of the mono-user system under the same vaue of E ab N 0 = 9dB. We can find that the cacuated resuts totay agree with the simuated ones. Both of them point out that the system performance increases with the vaue of β. For exampe with the same = 10, when β increases from 4 to 64, the BER vaue reduces from 2 to , respectivey. In contrast, when increases, the system performance gets worse. Specificay, at the same

4 = 40 ρ (α) (db) T s=32τ BER = 20 = 10 = 5 = β K=5 K=4 K=3 ρ (α) (db) BER K=1 K=2 ρ (α) (db) E b /N 0 (db) Fig. 3. BER performance of the DS-CDMA system using the proposed DSSS technique: Mono-user system with increment of β and at the same E ab /N 0 = 9dB; Muti-user system with increment of K at β = 16 and = 10. β = 16, the BER vaue increases from to corresponding to varying from 0 to 40. In return, the increment of contributes to enhance the system security at the physica ayer. This enhancement wi be anayzed in Section IV. The dependence of the system performance upon the number of users K for β = 16, = 10 is dispayed in Fig. 3. It can be ceary observed that the system performs worse with the increment of K. For exampe with the same vaue of E ab N 0 = 10dB, the BER vaue increases from to 6 corresponding to K increasing from 1 to 5. (c) Fig. 4. Fuctuation graphs obtained by PC simuations for the first scenario in cases of PN-DSSS technique, Chaotic DSSS technique, and (c) Proposed DSSS technique. IV. IMPROVEMENT OF PHYSICAL LAYER SECURITY In this section, we investigate the security abiity of the proposed chaos-based DSSS technique by means of PC simuations. Let s suppose that an intruder uses the we-nown attac method proposed in [13, 14] to detect the typica parameters, i.e, symbo period T s and sequence period T S, of the spreading sequence from the received signa r(t). The attac method used reies on the computation of the fuctuation of the auto-correation vaue. In order to compute the fuctuations, the received signa is divided into L tempora windows with W being the window width. By appying an autocorreation estimator to each window, the correation vaue is computed by R n rr(α) = 1 W W 0 r(t)r (t α)dt, (15)

5 ρ (α) (db) 10 1 T s=32τ where R n rr(α) is the correation vaue of the n th window, r (t α) is the compex conjugate of r(t α), and α is the shifted duration. The fuctuation vaue is then determined as foows: { ρ(α) = Ê Rn rr(α) 2} = 1 L 1 L R rr(α) n 2. (16) 0 T =34.5τ as (c) T =127 S (d) T =127τ S (e) Fig. 5. Fuctuation graphs obtained by PC simuations for the second scenario in cases of Chaotic DSSS technique, Proposed DSSS technique with = 5, (c) Proposed DSSS technique with = 10, (d) Proposed DSSS technique with = 20, Proposed DSSS technique with = 40. By potting the graph of ρ(α) versus α, caed fuctuation graph, the symbo period or sequence period can be determined by measuring the duration between pea vaues in the graph. To compare the security eve, we simuate the attac process of the intruder with respect to three techniques, i.e., PN- DSSS, chaotic DSSS, and chaotic DSSS with variabe symbo period. The simuation parameters are chosen as foows: fixed spreading factor β = 32 for the cases of PN and chaotic DSSS techniques, β = 32 and = 5, 10, 20, 40 for the case of the proposed technique, sequence period T S = 127τ, window width W = 1000τ, and window number L = Here, the attac simuations are carried out for two scenarios: (1) the intruder has no information about the transmitting side. He performs a bind detection using the aforementioned method; (2) the intruder has fu information on the spreading sequence. The received signa is mutipied with this nown sequence. The output product is then used as the input signa of the detection method above. Fuctuation graphs obtained by the simuations for the first scenario are shown in Fig. 5. For the case of the PN-DSSS technique, by measuring the cyce of periodic the curve of the graph in Fig. 4, the intruder can easiy detect the symbo period, T s = 32τ, and the sequence period, T S = 127τ. With respect to the cases of the chaotic DSSS and our proposed techniques with = 10, Fig. 4 and Fig. 4(c) ceary show that the intruder just detects the sequence period T S = 127τ and there is no sign of the symbo period. These resuts point out an important feature, that is, the DSSS systems are protected from the attac method described above by repacing PN sequences by chaotic ones. Fig. 5 presents the simuated fuctuation graphs for the second scenario. We can see from Fig. 5 that the intruder can detect both of the symbo and sequence periods in the case of the conventiona chaotic DSSS technique. For the case of the proposed DSSS technique, Fig. 5, Fig. 5(c), Fig. 5(d), and Fig. 5(e) show that the intruder can detect the sequence period T S = 127τ but cannot detect exacty the variation of the symbo period. With respect to the case of = 5, the intruder may detect the average symbo period, i.e., T as = (β + /2)τ = 34.5τ, even so this average vaue is not enough to recover the origina data. For the case of = 10, the sign of the average period starts to disappear. There is no sign of the symbo period for the cases of = 20 and = 40. It means that our technique can hide the information of the symbo period, thus its security cannot be broen by the intruder who has fu information on the chaotic sequence used.

6 V. CONCLUSIONS This study has proposed and investigated a nove chaosbased DSSS technique, where the symbo period is varied according to the behavior of the chaotic spreading sequence used. Mathematica modes in discrete time domain for the spreading scheme with variabe symbo period and the despreading scheme with sequence synchronization are presented and anayzed. The BER performance of the proposed technique in DS-CDMA communication systems over an AWGN channe is estimated with the use of numerica simuation. The robustness against the attac of symbo period detection of the proposed technique in comparison with that of the conventiona techniques is evauated in two different scenarios by means of the numerica simuations. The obtained resuts show that: (1) the use of chaotic sequences instead of PN sequences heps to protect DSSS-based communication systems from bind estimation attacs to detect the symbo period; (2) the mutipe access performance gets better when the initia spreading factor β is increased. With the chip period being fixed, this increment eads to the reduction of the symbo rate. On the other hand, the increment of variation width of the spreading factor, i.e.,, maes the performance worse, but in return the physica ayer security is enhanced significanty. Therefore, the vaues of β and have to be propery predetermined to guarantee the trade-off between performance, data rate and security of the system; (3) it is cear that the spreading, despreading and synchronization schemes of the proposed technique are more compicated than those of the conventiona ones and they operate based on the process of discrete-sampe processing. Therefore, these schemes are suitabe to be impemented easiy on high speed programmabe integrated circuits. A the noticeabe remars above mae the chaos-based DSSS with variabe symbo period be a promising and robust technique for enhancing the physica ayer security of DS-CDMA communication systems. [8] A. N. Miiou, I. P. Antoniades, S. G. Stavrinides, A. N. Anagnostopouos, Secure communication by chaotic synchronization: Robustness under noisy conditions, Noninear Anaysis: Rea Word Appications, vo.8, no. 3, pp , [9] N. X. Quyen, T. Q. Duong, A. Naanathan, Modeing, anaysis and performance comparison of two direct samping DCSK receivers under frequency nonseective fading channes, IET Communications, doi: /iet-com , [10] S. Kodba, M. Perc, and M. Marh, Detecting chaos from a time series, Europen Journa of Physics, vo. 26, pp , [11] G. K. Rohdea, J. M. Nichos, and F. Buchotz, Chaotic signa detection and estimation based on attractor sets: Appications to secure communications, Chaos: An Interdis. Jour. of Noni. Science, vo. 18, , [12] S-J. Kimy, K. Umenoyz, and R. Taahashiz, Recovery of chaotic signas using on-ine ICA agorithm, 2007 Int. Symp. on Noni. Theory and its Appi. (NOLTA 07), Vancouver-Canada, Sept. 2007, pp [13] G. Bure, Detection of spread spectrum transmissions using fuctuations of correation estimators, IEEE-ISPACS, Nov. 2000, pp. B B [14] H. Xu, Z. Huang, Y. Zhou, Bind estimation of the symbo period of a ong-code DS-SS signa, Int. Conf. on Micro.and Mii. Wave Techno. (ICMMT 07), Changsha-China, Apr. 2004, pp.1-4. [15] N. X. Quyen, V. V. Yem, T. M. Hoang, A chaos-based secure directsequence/spread-spectrum communication system, Abstract and Appied Anaysis, 11 pages, doi: /2013/764341, [16] N. X. Quyen, V. V. Yem, T. Q. Duong, Design and anaysis of a spread-spectrum communication system with chaos-based variation of both phase-coded carrier and spreading factor, IET Communications, vo. 9, no. 12, pp , REFERENCES [1] C. C. Chong and S. K. Yong, UWB direct chaotic communication technoogy for ow-rate WPAN appications, IEEE Trans. Veh. Techno., vo. 57, no. 3, pp , [2] G. Kaddoum, P. Charge, and D.Roviras, A generaized methodoogy for bit-error-rate prediction in correation-based communication schemes using chaos, IEEE Comm. Letters, vo. 13, no. 8, pp , [3] N. X. Quyen, L. V. Cong, N. H. Long, V. V. Yem, An OFDM-based chaotic DSSS communication system with MPSK moduation, Proc. Int. Conf. Communications and Eectronics (ICCE 14), Danang-Vietnam, 2014, pp [4] S. M. Berber, Probabiity of error derivatives for binary and chaos-based CDMA systems in wide-band channes, IEEE Trans. Wire. Commun., vo. 13, no. 10, pp , [5] M. K. Pate,, S. M. Berber, K. W. Sowerby, Adaptive RAKE receiver in chaos based piot-added DS-CDMA system, Physica Communication, vo. 16, pp , [6] N. X. Quyen, V. V. Yem, T. M. Hoang, and K. Kyamaya, MxNary chaotic puse-width-position moduation: An effective combination method for improving bit rate, Int. Jour. for Computation and Mathematics in Eectrica and Eectronic Engineering, vo. 32, no. 3, pp , [7] J. Yu and Y.-D. Yao, Detection performance of chaotic spreading LPI waveforms, IEEE Trans. Wireess Commun., vo. 4, no. 2, pp , 2005.

Performance of Direct-oversampling Correlator-type Receivers in Chaos-based DS-CDMA Systems Over Frequency Non-selective Fading Channels

Performance of Direct-oversampling Correlator-type Receivers in Chaos-based DS-CDMA Systems Over Frequency Non-selective Fading Channels Wireess Persona Communications manuscript No wi be inserted by the editor) Performance of Direct-oversamping Correator-type Receivers in Chaos-based DS-CDMA Systems Over Frequency Non-seective Fading Channes

More information

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network

More information

FREQUENCY modulated differential chaos shift key (FM-

FREQUENCY modulated differential chaos shift key (FM- Accepted in IEEE 83rd Vehicuar Technoogy Conference VTC, 16 1 SNR Estimation for FM-DCS System over Mutipath Rayeigh Fading Channes Guofa Cai, in Wang, ong ong, Georges addoum Dept. of Communication Engineering,

More information

ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK

ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK Aexander Arkhipov, Michae Schne German Aerospace Center DLR) Institute of Communications and Navigation Oberpfaffenhofen, 8224 Wessing, Germany

More information

Adjustment of automatic control systems of production facilities at coal processing plants using multivariant physico- mathematical models

Adjustment of automatic control systems of production facilities at coal processing plants using multivariant physico- mathematical models IO Conference Series: Earth and Environmenta Science AER OEN ACCESS Adjustment of automatic contro systems of production faciities at coa processing pants using mutivariant physico- mathematica modes To

More information

Theory of Generalized k-difference Operator and Its Application in Number Theory

Theory of Generalized k-difference Operator and Its Application in Number Theory Internationa Journa of Mathematica Anaysis Vo. 9, 2015, no. 19, 955-964 HIKARI Ltd, www.m-hiari.com http://dx.doi.org/10.12988/ijma.2015.5389 Theory of Generaized -Difference Operator and Its Appication

More information

A Novel Learning Method for Elman Neural Network Using Local Search

A Novel Learning Method for Elman Neural Network Using Local Search Neura Information Processing Letters and Reviews Vo. 11, No. 8, August 2007 LETTER A Nove Learning Method for Eman Neura Networ Using Loca Search Facuty of Engineering, Toyama University, Gofuu 3190 Toyama

More information

A proposed nonparametric mixture density estimation using B-spline functions

A proposed nonparametric mixture density estimation using B-spline functions A proposed nonparametric mixture density estimation using B-spine functions Atizez Hadrich a,b, Mourad Zribi a, Afif Masmoudi b a Laboratoire d Informatique Signa et Image de a Côte d Opae (LISIC-EA 4491),

More information

PERFORMANCE ANALYSIS OF MULTIPLE ACCESS CHAOTIC-SEQUENCE SPREAD-SPECTRUM COMMUNICATION SYSTEMS USING PARALLEL INTERFERENCE CANCELLATION RECEIVERS

PERFORMANCE ANALYSIS OF MULTIPLE ACCESS CHAOTIC-SEQUENCE SPREAD-SPECTRUM COMMUNICATION SYSTEMS USING PARALLEL INTERFERENCE CANCELLATION RECEIVERS Internationa Journa of Bifurcation and Chaos, Vo. 14, No. 10 (2004) 3633 3646 c Word Scientific Pubishing Company PERFORMANCE ANALYSIS OF MULTIPLE ACCESS CHAOTIC-SEQUENCE SPREAD-SPECTRUM COMMUNICATION

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

MC-CDMA CDMA Systems. Introduction. Ivan Cosovic. Stefan Kaiser. IEEE Communication Theory Workshop 2005 Park City, USA, June 15, 2005

MC-CDMA CDMA Systems. Introduction. Ivan Cosovic. Stefan Kaiser. IEEE Communication Theory Workshop 2005 Park City, USA, June 15, 2005 On the Adaptivity in Down- and Upink MC- Systems Ivan Cosovic German Aerospace Center (DLR) Institute of Comm. and Navigation Oberpfaffenhofen, Germany Stefan Kaiser DoCoMo Euro-Labs Wireess Soution Laboratory

More information

LINEAR DETECTORS FOR MULTI-USER MIMO SYSTEMS WITH CORRELATED SPATIAL DIVERSITY

LINEAR DETECTORS FOR MULTI-USER MIMO SYSTEMS WITH CORRELATED SPATIAL DIVERSITY LINEAR DETECTORS FOR MULTI-USER MIMO SYSTEMS WITH CORRELATED SPATIAL DIVERSITY Laura Cottateucci, Raf R. Müer, and Mérouane Debbah Ist. of Teecommunications Research Dep. of Eectronics and Teecommunications

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

Data Search Algorithms based on Quantum Walk

Data Search Algorithms based on Quantum Walk Data Search Agorithms based on Quantum Wak Masataka Fujisaki, Hiromi Miyajima, oritaka Shigei Abstract For searching any item in an unsorted database with items, a cassica computer takes O() steps but

More information

BP neural network-based sports performance prediction model applied research

BP neural network-based sports performance prediction model applied research Avaiabe onine www.jocpr.com Journa of Chemica and Pharmaceutica Research, 204, 6(7:93-936 Research Artice ISSN : 0975-7384 CODEN(USA : JCPRC5 BP neura networ-based sports performance prediction mode appied

More information

Distributed average consensus: Beyond the realm of linearity

Distributed average consensus: Beyond the realm of linearity Distributed average consensus: Beyond the ream of inearity Usman A. Khan, Soummya Kar, and José M. F. Moura Department of Eectrica and Computer Engineering Carnegie Meon University 5 Forbes Ave, Pittsburgh,

More information

Maximum Ratio Combining of Correlated Diversity Branches with Imperfect Channel State Information and Colored Noise

Maximum Ratio Combining of Correlated Diversity Branches with Imperfect Channel State Information and Colored Noise Maximum Ratio Combining of Correated Diversity Branches with Imperfect Channe State Information and Coored Noise Lars Schmitt, Thomas Grunder, Christoph Schreyoegg, Ingo Viering, and Heinrich Meyr Institute

More information

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische

More information

8 Digifl'.11 Cth:uits and devices

8 Digifl'.11 Cth:uits and devices 8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,

More information

Transmit Antenna Selection for Physical-Layer Network Coding Based on Euclidean Distance

Transmit Antenna Selection for Physical-Layer Network Coding Based on Euclidean Distance Transmit ntenna Seection for Physica-Layer Networ Coding ased on Eucidean Distance 1 arxiv:179.445v1 [cs.it] 13 Sep 17 Vaibhav Kumar, arry Cardiff, and Mar F. Fanagan Schoo of Eectrica and Eectronic Engineering,

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance Send Orders for Reprints to reprints@benthamscience.ae 340 The Open Cybernetics & Systemics Journa, 015, 9, 340-344 Open Access Research of Data Fusion Method of Muti-Sensor Based on Correation Coefficient

More information

Approach to Identifying Raindrop Vibration Signal Detected by Optical Fiber

Approach to Identifying Raindrop Vibration Signal Detected by Optical Fiber Sensors & Transducers, o. 6, Issue, December 3, pp. 85-9 Sensors & Transducers 3 by IFSA http://www.sensorsporta.com Approach to Identifying Raindrop ibration Signa Detected by Optica Fiber ongquan QU,

More information

Related Topics Maxwell s equations, electrical eddy field, magnetic field of coils, coil, magnetic flux, induced voltage

Related Topics Maxwell s equations, electrical eddy field, magnetic field of coils, coil, magnetic flux, induced voltage Magnetic induction TEP Reated Topics Maxwe s equations, eectrica eddy fied, magnetic fied of cois, coi, magnetic fux, induced votage Principe A magnetic fied of variabe frequency and varying strength is

More information

Some Measures for Asymmetry of Distributions

Some Measures for Asymmetry of Distributions Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester

More information

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai

More information

Unconditional security of differential phase shift quantum key distribution

Unconditional security of differential phase shift quantum key distribution Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice

More information

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron Neura Information Processing - Letters and Reviews Vo. 5, No. 2, November 2004 LETTER A Soution to the 4-bit Parity Probem with a Singe Quaternary Neuron Tohru Nitta Nationa Institute of Advanced Industria

More information

A GENERAL METHOD FOR EVALUATING OUTAGE PROBABILITIES USING PADÉ APPROXIMATIONS

A GENERAL METHOD FOR EVALUATING OUTAGE PROBABILITIES USING PADÉ APPROXIMATIONS A GENERAL METHOD FOR EVALUATING OUTAGE PROBABILITIES USING PADÉ APPROXIMATIONS Jack W. Stokes, Microsoft Corporation One Microsoft Way, Redmond, WA 9852, jstokes@microsoft.com James A. Ritcey, University

More information

Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1

Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1 Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rues 1 R.J. Marks II, S. Oh, P. Arabshahi Λ, T.P. Caude, J.J. Choi, B.G. Song Λ Λ Dept. of Eectrica Engineering Boeing Computer Services University

More information

On the Achievable Extrinsic Information of Inner Decoders in Serial Concatenation

On the Achievable Extrinsic Information of Inner Decoders in Serial Concatenation On the Achievabe Extrinsic Information of Inner Decoders in Seria Concatenation Jörg Kiewer, Axe Huebner, and Danie J. Costeo, Jr. Department of Eectrica Engineering, University of Notre Dame, Notre Dame,

More information

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity

More information

Fitting Algorithms for MMPP ATM Traffic Models

Fitting Algorithms for MMPP ATM Traffic Models Fitting Agorithms for PP AT Traffic odes A. Nogueira, P. Savador, R. Vaadas University of Aveiro / Institute of Teecommunications, 38-93 Aveiro, Portuga; e-mai: (nogueira, savador, rv)@av.it.pt ABSTRACT

More information

FOURIER SERIES ON ANY INTERVAL

FOURIER SERIES ON ANY INTERVAL FOURIER SERIES ON ANY INTERVAL Overview We have spent considerabe time earning how to compute Fourier series for functions that have a period of 2p on the interva (-p,p). We have aso seen how Fourier series

More information

DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM

DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM MIKAEL NILSSON, MATTIAS DAHL AND INGVAR CLAESSON Bekinge Institute of Technoogy Department of Teecommunications and Signa Processing

More information

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems Source and Reay Matrices Optimization for Mutiuser Muti-Hop MIMO Reay Systems Yue Rong Department of Eectrica and Computer Engineering, Curtin University, Bentey, WA 6102, Austraia Abstract In this paper,

More information

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c) A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,

More information

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver

More information

arxiv: v3 [math.sp] 2 Nov 2017

arxiv: v3 [math.sp] 2 Nov 2017 A Fast Agorithm for Computing the Fourier Spectrum of a Fractiona Period arxiv:1604.01589v3 [math.sp] 2 Nov 2017 Jiasong Wang 1, Changchuan Yin 2, 1.Department of Mathematics, Nanjing University, Nanjing,

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

Reliability: Theory & Applications No.3, September 2006

Reliability: Theory & Applications No.3, September 2006 REDUNDANCY AND RENEWAL OF SERVERS IN OPENED QUEUING NETWORKS G. Sh. Tsitsiashvii M.A. Osipova Vadivosto, Russia 1 An opened queuing networ with a redundancy and a renewa of servers is considered. To cacuate

More information

FORECASTING TELECOMMUNICATIONS DATA WITH AUTOREGRESSIVE INTEGRATED MOVING AVERAGE MODELS

FORECASTING TELECOMMUNICATIONS DATA WITH AUTOREGRESSIVE INTEGRATED MOVING AVERAGE MODELS FORECASTING TEECOMMUNICATIONS DATA WITH AUTOREGRESSIVE INTEGRATED MOVING AVERAGE MODES Niesh Subhash naawade a, Mrs. Meenakshi Pawar b a SVERI's Coege of Engineering, Pandharpur. nieshsubhash15@gmai.com

More information

Secure Computation with Minimal Interaction, Revisited

Secure Computation with Minimal Interaction, Revisited Secure Computation with Minima Interaction, Revisited Yuva Ishai, Ranjit Kumaresan, Eya Kushievitz, and Anat Pasin-Cherniavsy Abstract. Motivated by the goa of improving the concrete efficiency of secure

More information

DISTRIBUTION OF TEMPERATURE IN A SPATIALLY ONE- DIMENSIONAL OBJECT AS A RESULT OF THE ACTIVE POINT SOURCE

DISTRIBUTION OF TEMPERATURE IN A SPATIALLY ONE- DIMENSIONAL OBJECT AS A RESULT OF THE ACTIVE POINT SOURCE DISTRIBUTION OF TEMPERATURE IN A SPATIALLY ONE- DIMENSIONAL OBJECT AS A RESULT OF THE ACTIVE POINT SOURCE Yury Iyushin and Anton Mokeev Saint-Petersburg Mining University, Vasiievsky Isand, 1 st ine, Saint-Petersburg,

More information

4 1-D Boundary Value Problems Heat Equation

4 1-D Boundary Value Problems Heat Equation 4 -D Boundary Vaue Probems Heat Equation The main purpose of this chapter is to study boundary vaue probems for the heat equation on a finite rod a x b. u t (x, t = ku xx (x, t, a < x < b, t > u(x, = ϕ(x

More information

Research Article On the Lower Bound for the Number of Real Roots of a Random Algebraic Equation

Research Article On the Lower Bound for the Number of Real Roots of a Random Algebraic Equation Appied Mathematics and Stochastic Anaysis Voume 007, Artice ID 74191, 8 pages doi:10.1155/007/74191 Research Artice On the Lower Bound for the Number of Rea Roots of a Random Agebraic Equation Takashi

More information

Improved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization

Improved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization Improved Min-Sum Decoding of LDPC Codes sing -Dimensiona Normaization Juntan Zhang and Marc Fossorier Department of Eectrica Engineering niversity of Hawaii at Manoa Honouu, HI 968 Emai: juntan, marc@spectra.eng.hawaii.edu

More information

Compression Ratio Expansion for Complementary Code Set Compressing a Signal to a Width of Several Sub-pulses

Compression Ratio Expansion for Complementary Code Set Compressing a Signal to a Width of Several Sub-pulses Compression Ratio Expansion for Compementary Code Set Compressing a Signa to a Width of Severa Sub-puses Reiji Sato 2nd Research Center, Technica R and D Institute Japan Defense Agency 1-2-24 Ikejiri,

More information

Lecture Note 3: Stationary Iterative Methods

Lecture Note 3: Stationary Iterative Methods MATH 5330: Computationa Methods of Linear Agebra Lecture Note 3: Stationary Iterative Methods Xianyi Zeng Department of Mathematica Sciences, UTEP Stationary Iterative Methods The Gaussian eimination (or

More information

Tracking Control of Multiple Mobile Robots

Tracking Control of Multiple Mobile Robots Proceedings of the 2001 IEEE Internationa Conference on Robotics & Automation Seou, Korea May 21-26, 2001 Tracking Contro of Mutipe Mobie Robots A Case Study of Inter-Robot Coision-Free Probem Jurachart

More information

Adaptive Joint Self-Interference Cancellation and Equalization for Space-Time Coded Bi-Directional Relaying Networks

Adaptive Joint Self-Interference Cancellation and Equalization for Space-Time Coded Bi-Directional Relaying Networks 1 Adaptive Joint Sef-Interference Canceation and Equaization for Space-Time Coded Bi-Directiona Reaying Networs Jeong-Min Choi, Jae-Shin Han, and Jong-Soo Seo Department of Eectrica and Eectronic Engineering,

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

Improving the Reliability of a Series-Parallel System Using Modified Weibull Distribution

Improving the Reliability of a Series-Parallel System Using Modified Weibull Distribution Internationa Mathematica Forum, Vo. 12, 217, no. 6, 257-269 HIKARI Ltd, www.m-hikari.com https://doi.org/1.12988/imf.217.611155 Improving the Reiabiity of a Series-Parae System Using Modified Weibu Distribution

More information

The influence of temperature of photovoltaic modules on performance of solar power plant

The influence of temperature of photovoltaic modules on performance of solar power plant IOSR Journa of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vo. 05, Issue 04 (Apri. 2015), V1 PP 09-15 www.iosrjen.org The infuence of temperature of photovotaic modues on performance

More information

Bright and Dark Solitons in Optical Fibers with Parabolic Law Nonlinearity

Bright and Dark Solitons in Optical Fibers with Parabolic Law Nonlinearity SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vo. 0, No. 3, October 03, 365-370 UDK: 666.89. DOI: 0.98/SJEE3084009M Bright Dark Soitons in Optica Fibers with Paraboic Law Noninearity Daniea Miović, Anjan Biswas

More information

A Robust Voice Activity Detection based on Noise Eigenspace Projection

A Robust Voice Activity Detection based on Noise Eigenspace Projection A Robust Voice Activity Detection based on Noise Eigenspace Projection Dongwen Ying 1, Yu Shi 2, Frank Soong 2, Jianwu Dang 1, and Xugang Lu 1 1 Japan Advanced Institute of Science and Technoogy, Nomi

More information

Haar Decomposition and Reconstruction Algorithms

Haar Decomposition and Reconstruction Algorithms Jim Lambers MAT 773 Fa Semester 018-19 Lecture 15 and 16 Notes These notes correspond to Sections 4.3 and 4.4 in the text. Haar Decomposition and Reconstruction Agorithms Decomposition Suppose we approximate

More information

D. Prémel, J.M. Decitre and G. Pichenot. CEA, LIST, F Gif-sur-Yvette, France

D. Prémel, J.M. Decitre and G. Pichenot. CEA, LIST, F Gif-sur-Yvette, France SIMULATION OF EDDY CURRENT INSPECTION INCLUDING MAGNETIC FIELD SENSOR SUCH AS A GIANT MAGNETO-RESISTANCE OVER PLANAR STRATIFIED MEDIA COMPONENTS WITH EMBEDDED FLAWS D. Préme, J.M. Decitre and G. Pichenot

More information

Determining The Degree of Generalization Using An Incremental Learning Algorithm

Determining The Degree of Generalization Using An Incremental Learning Algorithm Determining The Degree of Generaization Using An Incrementa Learning Agorithm Pabo Zegers Facutad de Ingeniería, Universidad de os Andes San Caros de Apoquindo 22, Las Condes, Santiago, Chie pzegers@uandes.c

More information

Limited magnitude error detecting codes over Z q

Limited magnitude error detecting codes over Z q Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica

More information

STA 216 Project: Spline Approach to Discrete Survival Analysis

STA 216 Project: Spline Approach to Discrete Survival Analysis : Spine Approach to Discrete Surviva Anaysis November 4, 005 1 Introduction Athough continuous surviva anaysis differs much from the discrete surviva anaysis, there is certain ink between the two modeing

More information

HYDROGEN ATOM SELECTION RULES TRANSITION RATES

HYDROGEN ATOM SELECTION RULES TRANSITION RATES DOING PHYSICS WITH MATLAB QUANTUM PHYSICS Ian Cooper Schoo of Physics, University of Sydney ian.cooper@sydney.edu.au HYDROGEN ATOM SELECTION RULES TRANSITION RATES DOWNLOAD DIRECTORY FOR MATLAB SCRIPTS

More information

Separation of Variables and a Spherical Shell with Surface Charge

Separation of Variables and a Spherical Shell with Surface Charge Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation

More information

Numerical solution of one dimensional contaminant transport equation with variable coefficient (temporal) by using Haar wavelet

Numerical solution of one dimensional contaminant transport equation with variable coefficient (temporal) by using Haar wavelet Goba Journa of Pure and Appied Mathematics. ISSN 973-1768 Voume 1, Number (16), pp. 183-19 Research India Pubications http://www.ripubication.com Numerica soution of one dimensiona contaminant transport

More information

Efficient Generation of Random Bits from Finite State Markov Chains

Efficient Generation of Random Bits from Finite State Markov Chains Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correlated Channel Failures

Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correlated Channel Failures Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correated Channe Faiures Andrey Lyakhov Vadimir Vishnevsky Institute for Information Transmission Probems of RAS B. Karetny 19, Moscow, 127994, Russia

More information

1D Heat Propagation Problems

1D Heat Propagation Problems Chapter 1 1D Heat Propagation Probems If the ambient space of the heat conduction has ony one dimension, the Fourier equation reduces to the foowing for an homogeneous body cρ T t = T λ 2 + Q, 1.1) x2

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

Fast Blind Recognition of Channel Codes

Fast Blind Recognition of Channel Codes Fast Bind Recognition of Channe Codes Reza Moosavi and Erik G. Larsson Linköping University Post Print N.B.: When citing this work, cite the origina artice. 213 IEEE. Persona use of this materia is permitted.

More information

Math 124B January 17, 2012

Math 124B January 17, 2012 Math 124B January 17, 212 Viktor Grigoryan 3 Fu Fourier series We saw in previous ectures how the Dirichet and Neumann boundary conditions ead to respectivey sine and cosine Fourier series of the initia

More information

Course 2BA1, Section 11: Periodic Functions and Fourier Series

Course 2BA1, Section 11: Periodic Functions and Fourier Series Course BA, 8 9 Section : Periodic Functions and Fourier Series David R. Wikins Copyright c David R. Wikins 9 Contents Periodic Functions and Fourier Series 74. Fourier Series of Even and Odd Functions...........

More information

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR 1 Maximizing Sum Rate and Minimizing MSE on Mutiuser Downink: Optimaity, Fast Agorithms and Equivaence via Max-min SIR Chee Wei Tan 1,2, Mung Chiang 2 and R. Srikant 3 1 Caifornia Institute of Technoogy,

More information

The Streaming-DMT of Fading Channels

The Streaming-DMT of Fading Channels The Streaming-DMT of Fading Channes Ashish Khisti Member, IEEE, and Star C. Draper Member, IEEE arxiv:30.80v3 cs.it] Aug 04 Abstract We consider the sequentia transmission of a stream of messages over

More information

Gauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law

Gauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law Gauss Law 1. Review on 1) Couomb s Law (charge and force) 2) Eectric Fied (fied and force) 2. Gauss s Law: connects charge and fied 3. Appications of Gauss s Law Couomb s Law and Eectric Fied Couomb s

More information

Bayesian Unscented Kalman Filter for State Estimation of Nonlinear and Non-Gaussian Systems

Bayesian Unscented Kalman Filter for State Estimation of Nonlinear and Non-Gaussian Systems Bayesian Unscented Kaman Fiter for State Estimation of Noninear and Non-aussian Systems Zhong Liu, Shing-Chow Chan, Ho-Chun Wu and iafei Wu Department of Eectrica and Eectronic Engineering, he University

More information

Effect of transport ratio on source term in determination of surface emission coefficient

Effect of transport ratio on source term in determination of surface emission coefficient Internationa Journa of heoretica & Appied Sciences, (): 74-78(9) ISSN : 975-78 Effect of transport ratio on source term in determination of surface emission coefficient Sanjeev Kumar and Apna Mishra epartment

More information

Title: Crack Diagnostics via Fourier Transform: Real and Imaginary Components vs. Power Spectral Density

Title: Crack Diagnostics via Fourier Transform: Real and Imaginary Components vs. Power Spectral Density Tite: rack Diagnostics via ourier Transform: ea and maginary omponents vs. Power pectra Density Authors: Leonid M. Geman Victor Giurgiutiu van V. Petrunin 3 rd nternationa Workshop on tructura Heath Monitoring

More information

LINK BETWEEN THE JOINT DIAGONALISATION OF SYMMETRICAL CUBES AND PARAFAC: AN APPLICATION TO SECONDARY SURVEILLANCE RADAR

LINK BETWEEN THE JOINT DIAGONALISATION OF SYMMETRICAL CUBES AND PARAFAC: AN APPLICATION TO SECONDARY SURVEILLANCE RADAR LINK BETWEEN THE JOINT DIAGONALISATION OF SYMMETRICAL CUBES AND PARAFAC: AN APPLICATION TO SECONDARY SURVEILLANCE RADAR Nicoas PETROCHILOS CReSTIC, University of Reims Mouins de a Housse, BP 1039 51687

More information

Target Location Estimation in Wireless Sensor Networks Using Binary Data

Target Location Estimation in Wireless Sensor Networks Using Binary Data Target Location stimation in Wireess Sensor Networks Using Binary Data Ruixin Niu and Pramod K. Varshney Department of ectrica ngineering and Computer Science Link Ha Syracuse University Syracuse, NY 344

More information

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization Scaabe Spectrum ocation for Large Networks ased on Sparse Optimization innan Zhuang Modem R&D Lab Samsung Semiconductor, Inc. San Diego, C Dongning Guo, Ermin Wei, and Michae L. Honig Department of Eectrica

More information

Melodic contour estimation with B-spline models using a MDL criterion

Melodic contour estimation with B-spline models using a MDL criterion Meodic contour estimation with B-spine modes using a MDL criterion Damien Loive, Ney Barbot, Oivier Boeffard IRISA / University of Rennes 1 - ENSSAT 6 rue de Kerampont, B.P. 80518, F-305 Lannion Cedex

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

A SIMPLIFIED DESIGN OF MULTIDIMENSIONAL TRANSFER FUNCTION MODELS

A SIMPLIFIED DESIGN OF MULTIDIMENSIONAL TRANSFER FUNCTION MODELS A SIPLIFIED DESIGN OF ULTIDIENSIONAL TRANSFER FUNCTION ODELS Stefan Petrausch, Rudof Rabenstein utimedia Communications and Signa Procesg, University of Erangen-Nuremberg, Cauerstr. 7, 958 Erangen, GERANY

More information

Coded Caching for Files with Distinct File Sizes

Coded Caching for Files with Distinct File Sizes Coded Caching for Fies with Distinct Fie Sizes Jinbei Zhang iaojun Lin Chih-Chun Wang inbing Wang Department of Eectronic Engineering Shanghai Jiao ong University China Schoo of Eectrica and Computer Engineering

More information

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems Convergence Property of the Iri-Imai Agorithm for Some Smooth Convex Programming Probems S. Zhang Communicated by Z.Q. Luo Assistant Professor, Department of Econometrics, University of Groningen, Groningen,

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION

NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION Hsiao-Chang Chen Dept. of Systems Engineering University of Pennsyvania Phiadephia, PA 904-635, U.S.A. Chun-Hung Chen

More information

The EM Algorithm applied to determining new limit points of Mahler measures

The EM Algorithm applied to determining new limit points of Mahler measures Contro and Cybernetics vo. 39 (2010) No. 4 The EM Agorithm appied to determining new imit points of Maher measures by Souad E Otmani, Georges Rhin and Jean-Marc Sac-Épée Université Pau Veraine-Metz, LMAM,

More information

Rate-Distortion Theory of Finite Point Processes

Rate-Distortion Theory of Finite Point Processes Rate-Distortion Theory of Finite Point Processes Günther Koiander, Dominic Schuhmacher, and Franz Hawatsch, Feow, IEEE Abstract We study the compression of data in the case where the usefu information

More information

On the Performance of Wireless Energy Harvesting Networks in a Boolean-Poisson Model

On the Performance of Wireless Energy Harvesting Networks in a Boolean-Poisson Model On the Performance of Wireess Energy Harvesting Networks in a Booean-Poisson Mode Han-Bae Kong, Ian Fint, Dusit Niyato, and Nicoas Privaut Schoo of Computer Engineering, Nanyang Technoogica University,

More information

Centralized Coded Caching of Correlated Contents

Centralized Coded Caching of Correlated Contents Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv:1711.03798v1

More information

Symbolic models for nonlinear control systems using approximate bisimulation

Symbolic models for nonlinear control systems using approximate bisimulation Symboic modes for noninear contro systems using approximate bisimuation Giordano Poa, Antoine Girard and Pauo Tabuada Abstract Contro systems are usuay modeed by differentia equations describing how physica

More information

Doubly Iterative Receiver for Block Transmissions with EM-Based Channel Estimation

Doubly Iterative Receiver for Block Transmissions with EM-Based Channel Estimation 656 IEEE RANSACIONS ON WIRELESS COMMUNICAIONS, VOL. 8, NO. 2, FEBRUARY 2009 Douby Iterative Receiver for Bock ransmissions with EM-Based Channe Estimation he-hanh Pham, Ying-Chang Liang, Senior Member,

More information

Maximum likelihood decoding of trellis codes in fading channels with no receiver CSI is a polynomial-complexity problem

Maximum likelihood decoding of trellis codes in fading channels with no receiver CSI is a polynomial-complexity problem 1 Maximum ikeihood decoding of treis codes in fading channes with no receiver CSI is a poynomia-compexity probem Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department

More information

Interconnect effects on performance of Field Programmable Analog Array

Interconnect effects on performance of Field Programmable Analog Array nterconnect effects on performance of Fied Programmabe Anaog Array D. Anderson,. Bir, O. A. Pausinsi 3, M. Spitz, K. Reiss Motoroa, SPS, Phoenix, Arizona, USA, University of Karsruhe, Karsruhe, Germany,

More information

Do Schools Matter for High Math Achievement? Evidence from the American Mathematics Competitions Glenn Ellison and Ashley Swanson Online Appendix

Do Schools Matter for High Math Achievement? Evidence from the American Mathematics Competitions Glenn Ellison and Ashley Swanson Online Appendix VOL. NO. DO SCHOOLS MATTER FOR HIGH MATH ACHIEVEMENT? 43 Do Schoos Matter for High Math Achievement? Evidence from the American Mathematics Competitions Genn Eison and Ashey Swanson Onine Appendix Appendix

More information

BICM Performance Improvement via Online LLR Optimization

BICM Performance Improvement via Online LLR Optimization BICM Performance Improvement via Onine LLR Optimization Jinhong Wu, Mostafa E-Khamy, Jungwon Lee and Inyup Kang Samsung Mobie Soutions Lab San Diego, USA 92121 Emai: {Jinhong.W, Mostafa.E, Jungwon2.Lee,

More information

Nonlinear Gaussian Filtering via Radial Basis Function Approximation

Nonlinear Gaussian Filtering via Radial Basis Function Approximation 51st IEEE Conference on Decision and Contro December 10-13 01 Maui Hawaii USA Noninear Gaussian Fitering via Radia Basis Function Approximation Huazhen Fang Jia Wang and Raymond A de Caafon Abstract This

More information

Process Capability Proposal. with Polynomial Profile

Process Capability Proposal. with Polynomial Profile Contemporary Engineering Sciences, Vo. 11, 2018, no. 85, 4227-4236 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ces.2018.88467 Process Capabiity Proposa with Poynomia Profie Roberto José Herrera

More information