On the Characteristics of Spectrum-Agile Communication Networks

Size: px
Start display at page:

Download "On the Characteristics of Spectrum-Agile Communication Networks"

Transcription

1 1 On the Charateristis of Spetrum-Agile Communiation Networks Xin Liu Wei Wang Department of Computer Siene University of California, Davis, CA Abstrat Preliminary studies as well as general observations indiate the presene of a signifiant amount of white spae in radio spetrum, varying on frequeny, time, and geographi loations. Thus, it is likely that spetrum aess, instead of true spetrum sarity, is the limiting fator of potential growth of wireless servies. Enabled by regulatory hanges and radio tehnologies advanes, opportunisti usage of the white spae has the potential to signifiantly mitigate the spetrum sarity. In this paper, we study the harateristis of opportunisti spetrum availability and its exploration. We present two new metris to apture unique harateristis in networks with spetrum agility. We also study the spatial and temporal properties of opportunisti spetrum availability. Last, the existing resoure sharing problem formulation is modified to inorporate the effet of opportunisti spetrum availability. I. INTRODUCTION Spetrum is among the most heavily regulated and expensive nature resoure around the world. However, although almost all spetrum suitable for wireless ommuniations have been alloated, preliminary studies and general observations indiate that muh of the radio spetrum is not in use for a signifiant amount of time, and at large numbers of loations. For instane, experiments onduted by Shared Spetrum Company indiates 62% perent of white spae (unused spae) below 3GHz band even in the most rowded area near downtown Washington, DC, where both governmental and ommerial spetrum usage are intensive [10]. In the experiment, a band is ounted as white spae if it is wider than 1MHz and remains unoupied for 10 minutes or longer. Furthermore, spetrum usages vary dramatially in time, geographi loations, and frequeny. A lot of preious spetrum (below 5GHz), perfet for wireless ommuniations that worth billions of dollars, sit there silently. The large portion of white spae indiates that opportunisti or dynami spetrum usage may signifiantly mitigate the spetrum sarity. In this paper, we fous on the opportunisti spetrum utilization by users other than the primary liensed ones on a non-interfering or leasing basis. Suh usage is being enabled by regulatory poliy initiatives and radio tehnology advanes. First, both the Federal Communiations Commission (FCC) and the federal government have made important initiatives towards more flexible and dynami spetrum usage, e.g., [4], [3], [2], [5], [1]. Furthermore, opportunisti spetrum sharing is enabled by software-defined radio or ognitive radio tehnologies, where suh tehnology advanes provide the apability for a spetrum-agile radio devie to sense and operate on a wide range of frequenies using appropriate ommuniation mehanisms, and thus enable dynami and more intense spetrum reuse in spae, time, and frequeny dimensions. We fous on the study of the seondary users who observe hannels available dynamially and explore them opportunistially. We refer seondary users as spetrum users who are not owners of the spetrum and operate based on agreements/etiquettes imposed by the primary users of the spetrum. Beause spetrum availability of a seondary user is determined by primary users, it is alled opportunisti spetrum availability. We study the harateristis of opportunisti spetrum availability and its potential benefits. (Note that the seondary users may have their own liensed/alloated bandwidth where they are primary users, whih is not the onern of this paper.) The objetive of the paper is to better understand systems with opportunisti spetrum availability. We have the following ontributions. We introdue two new metris, effetive nonopportunisti bandwidth and spae-bandwidth produt, to apture the inherent properties of white spae and the benefits of opportunisti spetrum utilization. Spetrum availability observed by a seondary user is time-varying and loation-dependent. We analyze suh spatial and temporal properties. We modify the existing resoure sharing problem formulation to inorporate opportunisti spetrum availabilities. The paper is organized as follows: we first disuss the system model in Setion II. We then study two new metris in Setion III. The temporal and spatial orrelation of hannel availability for seondary users are analyzed in Setion IV. Last, we propose modifiations to the existing resoure alloation problem formulation so that opportunisti spetrum availability is aptured. (This part is omitted in the extended abstrat due to spae limitation.) We onlude the paper in Setion V. II. SYSTEM MODEL We onsider two types of users. Primary users are the rightful owners and have strit priority on spetrum aess. Seondary users are spetrum-agile devies that an sense the environment and adapt to appropriate frequeny, power, and transmission shemes. They an opportunistially aess

2 2 unused spetrum vaated by idle primaries. Primary users are onventional legay users whose hardware and protools should not be required to retrofit seondary user aess needs. Therefore, hannel availability of seondary users is inherently determined by the ativities and properties of primary users. We fous on the harateristis of suh opportunisti hannel availability. We assume that when a primary user is using the band, seondary users are not allowed to o-exist in viinity. We assume that information on hannel availabilities is given to seondary users. Although it is a great hallenge to obtain suh information, it is not the fous of the paper and there are various shemes proposed. We use footprint to abstrat the spae oupany of a primary user in a hannel. Seondary users outside the footprint of primary users are allowed to transmit on the hannel given the maximum transmission power onstraint. This is motivated by the idea that eah ommuniation onsumes spae, e.g., [7] and many others. It is also justified by the oexistene study of TV stations and WLAN devies. It has been shown that one or more WLAN devies an operate outside a ertain range from the TV station without violating the D/U (desired/undesired signal strength) requirement of legitimate TV reeivers that are within the servie ontour of the TV station [8], [9]. Similar analysis an be applied to other types of primary users. Therefore, the footprint of a primary user is modelled by a disk of radius r. The hannel used by an ative primary user annot be utilized by seondary users in its footprint. On the hand, if it is outside the footprints of all primary users of a hannel, the seondary user an operate on the hannel. Intuitively, footprint an be onsidered as a model for the interferene/ommuniation range of a user. Transmission power and its effet are inorporated in the size of a footprint. For instane, in the ase of TV/WLAN sharing, the (maximum) transmission power of a WLAN devie affets both the footprint of itself and that of a TV station [8], [9]. Footprints of different users may or may not overlap depending on appliation senarios. For instane, two TV stations using the same hannel annot have overlapping servie ontours. Otherwise, TV reeivers in the overlapping area may not reeive desired TV signal quality. On the other hand, in many appliation senarios, espeially mobility and ubiquitous overage are required, overlapping is a neessity. For instane, the overage areas of different base stations have to overlap to support user mobility and good overage. Furthermore, multiple WLANs an have overlapping footprints and share a hannel using CSMA/CA. On the other hand, they an also avoid overlapping by hoosing different hannels providing the number of available hannels is large enough. We use the following model for hannel availability that is observed by seondary users at a snapshot. We first abstrat the networks of seondary users into a graph, where vertexes represent seondary users. If two wireless users are within the ommuniation/interferene range of eah other, then the two nodes are onneted by an edge. If two vertexes are onneted by an edge in the graph, we assume that these two nodes annot use the same spetrum simultaneously. This abstration is widely used in the literature, suh as [11]. In addition, we assoiate with eah vertex a set, whih represents the available Fig. 1. (A, B) I (hn C) (A, B) III (hn C) II (hn B) 5 (A, C) (A) 3 6 (A, B, C) (B, C) IV (hn A) A snapshot of hannel availability at seondary users. hannels of the user. As mentioned earlier, if a seondary user is outside the footprint of all (ative) primary users of a hannel, then the hannel is available at the seondary user. We show an example in Figure 1. The six vertexes 1-6 represent six different seondary users. There are three frequeny bands, namely A, B, and C, whih are ommuniation hannels that are opportunistially available to the seondary users. We assume that all hannels have the same bandwidth, whih an be generalized easily. In addition, four (ative) primary users I-IV are present, using bands C, B, C, A, respetively. The footprint of a primary user is represented by the dashed irle entered at it. For instane, Node 5 is within the footprints of primary users II and III, who use hannels B and C, respetively. Therefore, hannels B and C are not available at Node 5 while hannel A is. Beause of loation differenes, eah node may have aess to a different set of hannels. In our figure, the available hannels are (A,B) at vertex 1, (A,C) at vertex 2, et. The resoure alloation problem is how they should share these hannels. Note that Figure 1 shows a snapshot of the network. At different time instane, due to the traffi variation of primary users, hannel availabilities at seondary users vary. The paper fouses on harateristis of spetrum agile networks. In other words, we study the inherent properties instead of the design/ontrol of the system. To elaborate, primary users are legay users and we annot ontrol their loations, traffi patterns, ommuniations, and other parameters. Furthermore, seondary users, e.g., WLAN devies, have their own properties suh as maximum transmission power, loation, and density. We onsider these properties given as well. III. METRICS FOR OPPORTUNISTIC SPECTRUM UTILIZATION The basi onept of opportunisti spetrum utilization is to utilize spetrum unutilized at time, frequeny, and spae. Beause suh spetrum availability is dynami and different from traditional spetrum availability defined by ommandand-ontrol manner, we first introdue two new metris for its haraterization.

3 3 A. Effetive Non-opportunisti Bandwidth Consider the following question: suppose that there are 62% of white spae under 3GHz. If we an fully utilize suh white spae, is it equivalent to gaining an additional spetrum band of = 1.86GHz? The answer is that it depends. To address this question, we introdue the notion of effetive non-opportunisti bandwidth (ENOB). It is defined as the equivalent non-opportunisti bandwidth required to ahieve the same performane as in the ase of opportunisti spetrum availability. A non-opportunisti hannel is referred to a hannel that is always available to all (seondary) users in onsideration, whih is how spetrum is alloated in the traditional ommand-and-ontrol manner. This metri is designed to study the impat of opportunisti spetrum availability. We elaborate the idea with a naive example. Consider a simple network with only two nodes. They annot use the same hannel simultaneously due to interferene. Consider a hannel with bandwidth W that is opportunistially available at these two nodes. The hannel is available at eah node with probability p independently. Suppose that a user obtains one unit of throughput per unit of spetrum. Then the total throughput gained by the two users is: W (p p(1 p) 1 + (1 p) 2 0) = W p(2 p). The first term represents the ase where the hannel is available to both nodes and only one of them an use it due to interferene. The seond term is for the ase where only one of the users observes the spetrum availability and uses it. The last term is the ase where the spetrum is available to neither of the two users. To ahieve the same total throughput, B e = W p(2 p) unit of non-opportunisti bandwidth is required. To elaborate, when a spetrum of B e is available to both users in the traditional way (i.e., the spetrum is always available to both users), the throughput is W p(2 p) beause only one of the users an use it at any given time. Thus, we laim that B e = W p(2 p) as ENOB in this simple example. Suppose W = 3GHz and p = 62%. In this example, we see the impat of 62% white spae under 3G is equivalent to W p(2 p) = 2.76GHz of spetrum in the traditional way. The orrelation on spetrum availabilities at seondary users also plays an important role. For instane, if two seondary users are very lose and observe the same spetrum opportunity, then B e = W p instead of W p(2 p) as in the independent ase in this example. Note that spetrum is not being reated by seondary users. Instead, they simply explore the spetrum holes generated by primary users. Inherent harateristis of primary users, suh as ommuniation range, transmission power, traffi pattern, node density, and topology, determine the spetrum opportunities of seondary users. The purpose of ENOB is to quantify the potential of suh spetrum opportunities for a given set of seondary users. The intuition is similar to that of the effetive bandwidth used to apture the statisti multiplexing gain. However, what is being apture here is the degree of spatial reuse and statistial multiplexing between primary and seondary users. In general, beause of the harateristis of primaries mentioned Fig N A Chain Topology above, users observe different hannel availabilities and yield utilization gain, whih is quantified by ENOB. 1) ENOB of a Chain Topology: We use a hain topology to further illustrate the idea of ENOB. We onsider a hain topology of length N. We assume that only the two nearest nodes interfere with eah other and thus annot use the same spetrum simultaneously, as shown in Figure 2. We alulate its ENOB as follows. Consider a spetrum band of width W. Let p 0 be the probability that a node observes the hannel available. Let p be the probability that node A observes the hannel available given that its neighbor B observes the hannel available. Note that p is indeed a funtion of distane between A and B, as disussed in Setion IV-A. Here we assume all nodes on the hain are evenly spaed and thus omit the distane in the notation. Let q be the probability that A observes the hannel available given that B does not, where q = p 0 1 p 1 p 0. As shown in the Appendix (in the full paper), the ENOB of the hain topology is where B e (N) = W U(N) = 2(1 p 0)q 1 p 2 ( 1 p 2 +p 0 1 p 2 Note that if p = 1, then N+1 2 U(N) (N + 1)/2 N2 1 p2 N 2 1 p 2 p 2 ) 1 p N (1 p 0 )q 1 p 2 1 {N is even} B e (N) = W p 0. Figure 3 illustrates ENOB for different values of p, where p 0 is 0.1 and 0.7, respetively. In the figures, the x-axis is the value of p, where p [p 0, 1]. The y-axis is the ENOB normalized over W p 0, where is W p 0 is the ENOB when p = 1. It is lear that the larger the value of p, i.e., the higher the orrelation between neighboring nodes, the lower the value of ENOB. In addition, the normalized ENOB is higher for smaller values of p 0. The trend is similar for different values of N. The value of ENOB depends on many fators, suh as the probability of the spetrum availability, the orrelation among different users, and the topology of the network. In general, the higher the orrelation of spetrum availability among users, the lower the value of ENOB. The intuition is that a system with high orrelation behaves similarly to a system with the traditional spetrum availability, and thus has low statisti multiplexing gain. On the other hand, the more omplex the

4 4 Eqv. Bw. Fig p 0 = p = N=2 N=9 1.1 N=2 N= p Normalized equivalent bandwidth of a hain topology. topology, the higher the value of ENOB. For instane, onsider a lique of size N. Assume that eah node observes hannel available with probability p independently. Then the effetive bandwidth of the hannel is B e = W ( 1 (1 p) ) N. For very small p, B e NW p, whih shows a gain of roughly N-fold. The intuition is that the multiplexing gain is higher for a dense network, espeially when p is small. In summary, the metri, ENOB, is introdued to apture the impat of the opportunisti spetrum availability. In general, ENBO is diffiult to alulate beause the network topologies are more ompliated and the availability of hannels at different nodes are orrelated in a omplex manner. Thus, we may need to resort to numerial evaluations. B. Spae-bandwidth Utilization Consider a wireless devie. It is lear that a wireless devie onsumes a ertain amount of spetrum for its ommuniation, whih is an irreproduible natural resoure. Equivalently important is that a ertain amount of spae is also oupied by the ommuniation [7]. Wireless devies, espeially primary users and seondary users, are different in ommuniation power and therefore oupy different amount of spae for ommuniations. For instane, the servie range of a TV station is about 100km. In omparison, the transmission range of an unliensed wireless LAN (WLAN) devie is about 100m. Therefore, 6MHz of bandwidth (the bandwidth of an analog TV hannel) oupied by a TV station has a different ommuniation result than the same bandwidth of a WLAN devie. Thus, to quantify suh differenes in utilization, we use a simple metri, spae-bandwidth produt, whih is defined as the produt of the spae and bandwidth utilization of a user in ommuniation. This definition is analogous to the transport apaity defined in [7] to study apaity saling laws in large wireless networks. Another analogy is the man-mile metri used by airline industry. We note that open spetrum enables spetrum reuse by seondary users in both spae and frequeny dimensions. Thus, this metri is important to understand the effet of opportunisti spetrum utilization. In this setion, we use footprint to abstrat the spae utilization of both primary and seondary users. We model footprint of a wireless devie as a disk of radius r. The radii of primary and seondary users an be dramatially different. For instane, it has been proposed that unliensed users an transmit in the unused TV band [6]. Another potential is for unliensed wireless devie to share radar bands. In both appliations, a primary user has a dramatially larger transmission power and thus larger footprint than that of a seondary user. The spae-bandwidth produt has a lear physial meaning in broadast appliations. For instane, a TV station with overage area of 100 square miles has the same spaebandwidth produt as 10 smaller TV station, eah with 10 square miles of overage. Assume reeivers are uniformly distributed in the area. Then they serve the same number of users. In other words, the spae-bandwidth produt is proportional to the number of users served. In the ase of peer-to-peer ommuniation, spae-bandwidth produt is an indiation of overage. It is also an indiret impliation of the tradeoff between the ost of an AP (and its installation) and the data rate for eah user. A spetrum-agile system exploits holes in both spatial and frequeny dimensions. However, there ould be spetrum intervals that annot be (easily) utilized. For instane, if a seondary user requires a spetrum band of 5MHz, then an isolated free TV band of 6MHz may not be fully utilized. We note that OFMD tehnology may be able to utilize sattered spetra. However, stringent requirements on band filters may limit its pratial implementation. Spae-bandwidth produt quantify suh holes in utilization in both spetrum and spae dimensions. We next illustrate its usage in a speial ase that fouses on the spatial dimension. 1) An Illustration Example: Consider one spetrum band that both primary and seondary users an fully utilize. Assume primary and seondary users have dramatially different footprint sizes. Suh differene gives us another type of spatial gain. An analogy is to put big stones in a jar. After the jar is filled with big stones, one an still fill a large amount of sand into the jar by taking advantage of the spae among big stones. In this analogy, it is unfair to ompare a big stone with a grind of sand unless the spae/volume is taken into aount. Similarly, we use spae-bandwidth produt to illustrate the differene in footprint size. We first onsider the ase where footprints are not allowed to overlap. We assume that primary users are stationary. They deide their loations in the following manner. Consider a large area with no users. The first primary user randomly selets its loation. A following primary user also hooses its loation randomly, but the hoie is limited to the area where its footprint does not overlap with those of the previous users. In the end, if no additional primary users an be assigned, we onsider the system full and an alulate the maximum spae utilization of the primary users. The proess mimis the loation determination of primaries, say TV stations. The loation of a TV station is in general determined by population density and geographi areas. For instane, it is more likely

5 5 to loate a TV station in a big ity than in a deserted area just to fully utilize the spae. Subsequent TV stations have to respet the footprints of prior alloations. After the primary users pik their loations, seondary users subsequently loate themselves without overlapping footprints with previous users, both primary and seondary. An example of the senario is that an AP avoids hannels used by primary users and other WLANs operating in viinity when it selets a hannel. We onsider an area large enough so that boundary effets are ignored to simplify analysis. We onsider the full apaity ase. In other words, primary users randomly pak in as muh as possible followed by seondary users. It is interesting to see that the footprints of primary users an only oupy about µ portion of the spae. Numerial evaluation indiates that µ If the radii of seondary users are muh smaller than that of a primary user, seondary users an oupy µ portion of the unoupied spae of primaries. In other words, seondary users an oupy µ (1 µ) 0.25 portion of the total spae. This is a total spae-bandwidth utilization of 70%. Consider a heterogenous network with TV stations, WLAN devies, pio sensors, then the overall utilization is 0.83 instead of 0.45 with only primary users. We have the following observations. First, this type of paking results in no ost at primary users. In other words, with or without seondary users, primary users ahieve the same spatial utilization. Furthermore, the seondary users paked in spae holes are able to use the same hannel regardless whether primary users are ative or not. Seondly, any one type of users an only ahieve a utilization of µ, even if it is pio sensors that oupy the entire spae. In other words, the gain omes from the heterogeneity in spae onsumption of different types of devies. Note that the sequene is also important larger users need to be alloated first to ahieve better utilization. In a spetrumagile ommuniation networks, it is likely that seondary users are smaller than primaries. Therefore, spetrum-agile networks an ahieve better utilization of spae, whih an be aptured by the spae-bandwidth produt. If the dynamis in spetrum utilization of primary users is also taken into aount, then the gain is even higher. Assume eah primary user is ative with probability p 0 on average. Consider the ase where there are enough seondary users that demand spetrum. Then the spae-bandwidth utilization of a primary-user-only system is only p 0 µ on average while one tier of seondary users an improve the utilization to p 0 µ + µ(1 p 0 µ). In the above, we onsider the ase where the overlap of footprints is not allowed. On the other hand, if suh overlap is allowed, then the utilization depends on the density of primary and seondary users. Let λ p and λ s, and R p and R s be the density and radius of primary and seondary users, respetively. The utilization of primary users is 1 exp( λ p πrp). 2 One tier of seondary users improves the utilization by exp( λ p πrp) 2 (1 exp( λ s πrs)). 2 In summary, the main purpose of spae-bandwidth produt is to quantify the gain of opportunisti spetrum utilization, in both the spae and frequeny dimensions. The spaebandwidth produt is an indiator of resoure onsumed and thus an be diretly linked eonomi values of spetra. We note that there are limitations in the definition of spaebandwidth produt. For instane, the definition does not diretly apply to spreading spetrum ommuniation systems. Another limitation is that the produt is not a diret indiation of throughput or transport apaity in peer-to-peer ommuniation systems. IV. SPATIAL AND TEMPORAL PROPERTIES The hannel availability observed by a seondary user is time-varying and loation-dependent. In this setion, we quantify suh spatial and temporal properties. A. Spatial Correlation It is intuitively lear that when two seondary users are lose to eah other, they are more likely to observe the same hannel availability. When they are far away, the observations are more likely to be independent. We quantify this spatial orrelation next. Consider a hannel. Primary users of the hannel loate in the area following a Poisson distribution with density λ. This is a typial assumption used to study random wireless networks, e.g., in [7]. The footprint of eah primary user is a disk with radius R p. In this model, overlapping of footprints is allowed. The loation of a seondary user is independent of that of primaries. Then a seondary user, A, observes the hannel available when there is no ative primary users within radius R p. Denote P (A) as the probability that A observes the spetrum availability. We have P (A) = e λπr2 p. Consider another seondary user, B, at distane d. We are interested in the probability that B also observes the availability given that A observes spetrum availability, denoted as P (B A). We have { exp( λ(πr 2 P (B A) = p a 0 )), 0 d 2R p P (B), d 2R p, ( ) d a 0 = 2Rp 2 os 1 d Rp 2R 2 (d/2) 2. p When d 2R p, we have P (B A) = P (B); i.e., two nodes are so far away that they observe independent hannel availabilities. We use a relative radio between P (B A) and P (B) as an indiation of the spatial orrelation. If B observes availability independent of A, then the ratio is 1. The larger the value, the higher the spatial orrelation. Figure 4 illustrate this orrelation. In the figure, the x-axis is the normalized distane, i.e., d/r p. The y-axis is the radio between P (B A) and P (B) to show the impat of A s availability at B. In the figure, R p = 1, and the value of λ is indiated on the orresponding urve. It is lear from the figure that the loser the two seondary nodes, the more likely that they observe the same hannel availability; i.e., the higher the spatial orrelation. For larger values of λ, the higher the normalized orrelation. In fat, when the value of λ is large, both P (B A) and P (B)

6 6 P(B A)/P(B) λ=1 λ=0.7 the available period of a seondary user is also exponential. Let 1/µ I be the mean of the idle period of a primary user. If footprints of primary users do not overlap, then the available period of a seondary user within a footprint is exponentially distributed with mean 1/µ I. If footprints of primary users an overlap and primary users loate with density λ p, then the available period of a seondary user is exponentially distributed with mean 1/µ a where { 0 w. p. 1 e λ p πr 2 p Fig λ=0.5 λ= Normalized distane Spatial Correlation between seondary users are small; i.e., the lower the probability of a seondary user observing an available hannel. However, the impat of A s availability is relatively large; i.e., the urve is steeper for a larger value of λ. In summary, distane has a signifiant impat on the spatial orrelation on hannel availability between seondary users. We are extending the study to the ase where the footprint of primary users do not overlap and the ase where the footprint of a primary user is irregular. Numerial results indiate that similar trends exist. B. Temporal Correlation The temporal properties of seondary users inlude the distributions of hannel availability and unavailability, and their predition. Clearly, suh temporal harateristis depend on the properties of primary users. Consider a partiular hannel. We note that a seondary user an aess a hannel if it is not within the footprints of any ative primary users of the hannel. Based on the disussion in Setion III-B, we know that there are seondary users that are outside the footprints of any primary users simply by exploring the spae holes. For suh users, this spetrum band is always available. However, there are also seondary users that are within the footprints of one or more primary users. They an aess the hannel only when the orresponding primaries are not ative. We study these users next. Temporal properties of seondaries depend on the ativity pattern of primaries. For instane, if the ativities of primary users are periodi, suh as TV stations, then the hannel availability of a seondary user within footprints is also periodi and is perfetly preditable. Another speial ase we illustrate next is when the arrival proesses of primary users are independent Poisson proesses. Note that we do not assume the servie time distribution or busy period of a primary user. It has been shown that the servie time distribution is well modelled as exponential for voie traffi, but not for data traffi. However, the idle period of primary users is the hannel available period of seondary users. Beause the arrival proess of a primary user an be modelled as Poisson, the idle period of primary users is exponential. Thus, µ a = kµ I w. p. e λpπr2 p (λ pπr 2 p )k k! In the above equation, the first one represents the ase where the user is outside all footprints of primaries and thus always observes the hannel available. The seond one is the ase the user is within the footprint of k primary users. A hallenging issue is to understand the distribution of un-available period for seondary users. Beause the busy period of a primary user is in general not exponential, the distribution analysis is the same as the busy period analysis of an M/G/n queue. V. CONCLUSION In this paper, we haraterize opportunisti spetrum utilization in spetrum-agile ommuniation networks. The harateristis and potentials of spetrum holes in both frequeny and spae are studied. Spatial and temporal properties are quantified. Suh harateristis are onsidered as inherent. The paper ontributes to better understandings of the properties of spetrum agility. VI. APPENDIX A. Calulation of Spatial Correlation We alulate P (B A) given the distane between B and A is d using Figure 5. The event that A observes the hannel available implies that there is no ative primary users in the left irle. Therefore, the overlapping area has no ative primaries and B also observes the hannel available if and only if the rest of the irle around B has no primary users. Let the size of the overlapping area be a 0. We have P (B A) = exp ( λ p (πr 2 p a 0 ) ). We alulate a 0 next. We have ( ) R α = os 1. d/2 The size of the triangle, b 0, is R sin(α) d/2. Therefore, a 0 = πr 2 2α 2π 2b 0 ( ) d = 2Rp 2 os 1 d Rp 2R 2 (d/2) 2. p.

7 7 Fig. 5. Two nodes with distane d. α B. Calulation of ENOB for the hain Topology R d Let X i be the event that node i observes the hannel available, Y i be the event that node i uses the hannel, and x be that event x does not happen. Let p = P (X a X b ), where p [p 0, 1]. Beause p 0 = P (X a ) = P (X a X b )P (X b ) + P (X a X b )P ( X b ), we have q = P (X a X b ) = p 0 1 p 1 p 0. Let p u i be the probability that node i uses the hannel in onsideration. We find p u i iteratively. We assign hannel from left to right. A node is assigned the hannel if the hannel is available and the neighbor on the left is not assigned the hannel. This sheme an be shown to yield the maximum utilization. We have Furthermore, p u 1 = p 0, (1) p u 2 = P (Y 2 ) = P (Ȳ1)P (X 2 Ȳ1) (2) = (1 p u 1)P (X 2 X 1 ) (3) = (1 p 0 )q. (4) p u i = P (Ȳi 1)P (X i Ȳi 1) For even i, we have = P (Ȳi 1 X i 1 )P (X i Ȳi 1 X i 1 ) +P (Ȳi 1X i 1 )P (X i Ȳi 1X i 1 ) = P ( X i 1 )P (X i X i 1 ) +P (Y i 2 )P (X i 1 X i 2 )P (X i X i 1 ) = (1 p 0 )q + p u i 2p 2 = (1 p 0 )q + (p u i 4p 2 + (1 p 0 )q )p 2 = (1 p 0 )q + (1 p 0 )q p 2 + p u i 4p 4. p u i = (1 p 0 )q (1 + p 2 + p p i 2 i 2 = (1 p 0 )q p 2k k=0 1 p i = (1 p 0 )q 1 p 2. ) For odd i, we have p u i = (1 p 0 )q (1 + p 2 + p p i 3 ) + p u 1p i 1 i 3 = (1 p 0 )q p 2k + p 0 p i 1 k=0 1 p i 1 = (1 p 0 )q 1 p 2 Thus, we have p u i = (1 p 0 )q 1 p i 1 p 2 1 p (1 p 0 )q i 1 1 p 2 + p 0 p i 1. + p 0 p i 1 i is even i is odd Let U(N) be the utilization of a unit spetrum. We have U(N) = = = N i=1 p u i N i=2,even 2(1 p 0 )q 1 p i 1 p 2 + N i=1,odd 1 p N (1 p 0 )q 1 p 2 1 {N is even} N/2 j=1 1 p 2j 2(1 p 0 )q 1 p 2 (N 1)/2 + j=0 1 p N (1 p 0 )q 1 p 2 1 {N is even} = 2(1 p N 2 0)q N2 1 p2 ( 1 p 2 1 p 2 1 p 2 +p 0 1 p 2 N+1 2 p 2 ) p 0 p i 1 p 0 p 2j 1 p N (1 p 0 )q 1 p 2 1 {N is even} On the other hand, if a hannel is always available to the seondary users, then the utilization per unit bandwidth is (N + 1)/2. Thus, the equivalent bandwidth if B e (N) = W U(N) (N + 1)/2. REFERENCES [1] DARPA. Defense advaned researh projets ageny (DARPA) next Generation (XG) ommuniations program. [2] FCC. Establishment of an interferene temperature metri to quantify and manage interferene and to expand available unliensed operation in ertain fixed, mobile and satellite frequeny bands, ET Doket No , FCC [3] FCC. Failitating opportunities for flexible, effiient, and reliable spetrum use employing ognitive radio tehnologies, notie of proposed rule making and order, FCC [4] FCC. In the matter of promoting effiient use of spetrum through elimination of barriers to the development of seondary markets, WT Doket No , FCC Rd [5] FCC. Promoting effiient use of spetrum through elimination of barriers to the development of seondary markets, WT Doket No , report and order and further notie of proposed rulemaking, FCC (seondary markets report and order and FNPRM). [6] FCC. Unliensed operation in the TV broadast bands, ET Doket No ; additional spetrum for unliensed devies below 900 mhz and in the 3 ghz band, ET Doket No , FCC [7] P. Gupta and P. R. Kumar. The apaity of wireless networks. IEEE Transations on Information Theory, 46(2): , 2000.

8 8 [8] N. Hoven and A. Sahai. Power saling for ognitive radio. In WirelessCom 05 Symposium on Emerging Networks, Tehnologies and Standards, Maui, Hawaii, June IEEE. [9] X. Liu and S. Shankar. Power-sensing based opportunisti aess. ACM Mobile Networks (MONET), aepted with minor revision. [10] Mark MHenry. Spetrum white spae measurements. presented to New Ameria Foundation BroadBand Forum, June Dos/pdfs/DoFile pdf. [11] T. Nandagopal, S. Lu, and V. Bharghavan. A unified arhiteture for the design and evaluation of wireless fair queueing algorithms. In Proeedings of ACM Mobiom 1999, August 1999.

A Holistic Method for Selecting Web Services in Design of Composite Applications

A Holistic Method for Selecting Web Services in Design of Composite Applications A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,

More information

Channel Assignment Strategies for Cellular Phone Systems

Channel Assignment Strategies for Cellular Phone Systems Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: wliu5@ie.uhk.edu.hk 000 Mathematial Contest in Modeling (MCM) Meritorious

More information

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks Performane Analysis of IEEE 80.11 in Multi-hop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 1-1 Asahidai, Nomi, Ishikawa, 93-19

More information

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model Trade Information, Not Spetrum: A Novel TV White Spae Information Market Model Yuan Luo, Lin Gao, and Jianwei Huang 1 Abstrat In this paper, we propose a novel information market for TV white spae networks,

More information

Hierarchical Clustering and Sampling Techniques for Network Monitoring

Hierarchical Clustering and Sampling Techniques for Network Monitoring S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are

More information

Chapter 1 Microeconomics of Consumer Theory

Chapter 1 Microeconomics of Consumer Theory Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some

More information

Static Fairness Criteria in Telecommunications

Static Fairness Criteria in Telecommunications Teknillinen Korkeakoulu ERIKOISTYÖ Teknillisen fysiikan koulutusohjelma 92002 Mat-208 Sovelletun matematiikan erikoistyöt Stati Fairness Criteria in Teleommuniations Vesa Timonen, e-mail: vesatimonen@hutfi

More information

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments 2 th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing SLA-based Resoure Alloation for Software as a Servie Provider (SaaS) in Cloud Computing Environments Linlin Wu, Saurabh Kumar

More information

From a strategic view to an engineering view in a digital enterprise

From a strategic view to an engineering view in a digital enterprise Digital Enterprise Design & Management 2013 February 11-12, 2013 Paris From a strategi view to an engineering view in a digital enterprise The ase of a multi-ountry Telo Hervé Paault Orange Abstrat In

More information

Wireless Transmission Systems. Instructor

Wireless Transmission Systems. Instructor Teleommuniation Engineering Tehnology, Texas A&M University Wireless Transmission Systems Leture Notes - Copyright Jeff M. MDougall 2 Wireless Transmission Systems Teleommuniation Engineering Tehnology,

More information

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty ISSN 1816-6075 (Print), 1818-0523 (Online) Journal of System and Management Sienes Vol. 2 (2012) No. 3, pp. 9-17 An integrated optimization model of a Closed- Loop Supply Chain under unertainty Xiaoxia

More information

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking Customer Effiieny, Channel Usage and Firm Performane in Retail Banking Mei Xue Operations and Strategi Management Department The Wallae E. Carroll Shool of Management Boston College 350 Fulton Hall, 140

More information

Computer Networks Framing

Computer Networks Framing Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial

More information

Open and Extensible Business Process Simulator

Open and Extensible Business Process Simulator UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Siene Karl Blum Open and Extensible Business Proess Simulator Master Thesis (30 EAP) Supervisors: Luiano Garía-Bañuelos,

More information

Capacity at Unsignalized Two-Stage Priority Intersections

Capacity at Unsignalized Two-Stage Priority Intersections Capaity at Unsignalized Two-Stage Priority Intersetions by Werner Brilon and Ning Wu Abstrat The subjet of this paper is the apaity of minor-street traffi movements aross major divided four-lane roadways

More information

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk Classial Eletromagneti Doppler Effet Redefined Copyright 04 Joseph A. Rybzyk Abstrat The lassial Doppler Effet formula for eletromagneti waves is redefined to agree with the fundamental sientifi priniples

More information

Chapter 5 Single Phase Systems

Chapter 5 Single Phase Systems Chapter 5 Single Phase Systems Chemial engineering alulations rely heavily on the availability of physial properties of materials. There are three ommon methods used to find these properties. These inlude

More information

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services T Learning Curves and Stohasti Models for Priing and Provisioning Cloud Computing Servies Amit Gera, Cathy H. Xia Dept. of Integrated Systems Engineering Ohio State University, Columbus, OH 4310 {gera.,

More information

Weighting Methods in Survey Sampling

Weighting Methods in Survey Sampling Setion on Survey Researh Methods JSM 01 Weighting Methods in Survey Sampling Chiao-hih Chang Ferry Butar Butar Abstrat It is said that a well-designed survey an best prevent nonresponse. However, no matter

More information

Sebastián Bravo López

Sebastián Bravo López Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that

More information

AUDITING COST OVERRUN CLAIMS *

AUDITING COST OVERRUN CLAIMS * AUDITING COST OVERRUN CLAIMS * David Pérez-Castrillo # University of Copenhagen & Universitat Autònoma de Barelona Niolas Riedinger ENSAE, Paris Abstrat: We onsider a ost-reimbursement or a ost-sharing

More information

Deadline-based Escalation in Process-Aware Information Systems

Deadline-based Escalation in Process-Aware Information Systems Deadline-based Esalation in Proess-Aware Information Systems Wil M.P. van der Aalst 1,2, Mihael Rosemann 2, Marlon Dumas 2 1 Department of Tehnology Management Eindhoven University of Tehnology, The Netherlands

More information

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism An Effiient Network Traffi Classifiation Based on Unknown and Anomaly Flow Detetion Mehanism G.Suganya.M.s.,B.Ed 1 1 Mphil.Sholar, Department of Computer Siene, KG College of Arts and Siene,Coimbatore.

More information

A Keyword Filters Method for Spam via Maximum Independent Sets

A Keyword Filters Method for Spam via Maximum Independent Sets Vol. 7, No. 3, May, 213 A Keyword Filters Method for Spam via Maximum Independent Sets HaiLong Wang 1, FanJun Meng 1, HaiPeng Jia 2, JinHong Cheng 3 and Jiong Xie 3 1 Inner Mongolia Normal University 2

More information

A Comparison of Service Quality between Private and Public Hospitals in Thailand

A Comparison of Service Quality between Private and Public Hospitals in Thailand International Journal of Business and Soial Siene Vol. 4 No. 11; September 2013 A Comparison of Servie Quality between Private and Hospitals in Thailand Khanhitpol Yousapronpaiboon, D.B.A. Assistant Professor

More information

Downlink Scheduling and Radio Resource Allocation in Adaptive OFDMA Wireless Communication Systems for User-Individual QoS

Downlink Scheduling and Radio Resource Allocation in Adaptive OFDMA Wireless Communication Systems for User-Individual QoS Downlin Sheduling and Radio Resoure Alloation in Adaptive OFDMA Wireless Communiation Systems for User-Individual QoS Lu Yanhui, Wang Chunming, Yin Changhuan, and Yue Guangxin Abstrat In this paper, we

More information

A Context-Aware Preference Database System

A Context-Aware Preference Database System J. PERVASIVE COMPUT. & COMM. (), MARCH 005. TROUBADOR PUBLISHING LTD) A Context-Aware Preferene Database System Kostas Stefanidis Department of Computer Siene, University of Ioannina,, kstef@s.uoi.gr Evaggelia

More information

Green Cloud Computing

Green Cloud Computing International Journal of Information and Computation Tehnology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 431-436 International Researh Publiations House http://www. irphouse.om /ijit.htm Green Cloud

More information

Price-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate

Price-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate Prie-based versus -based approahes for stimulating the development of renewable eletriity: new insights in an old debate uthors: Dominique FINON, Philippe MENNTEU, Marie-Laure LMY, Institut d Eonomie et

More information

) ( )( ) ( ) ( )( ) ( ) ( ) (1)

) ( )( ) ( ) ( )( ) ( ) ( ) (1) OPEN CHANNEL FLOW Open hannel flow is haraterized by a surfae in ontat with a gas phase, allowing the fluid to take on shapes and undergo behavior that is impossible in a pipe or other filled onduit. Examples

More information

A novel active mass damper for vibration control of bridges

A novel active mass damper for vibration control of bridges IABMAS 08, International Conferene on Bridge Maintenane, Safety and Management, 3-7 July 008, Seoul, Korea A novel ative mass damper for vibration ontrol of bridges U. Starossek & J. Sheller Strutural

More information

Using Live Chat in your Call Centre

Using Live Chat in your Call Centre Using Live Chat in your Call Centre Otober Key Highlights Yesterday's all entres have beome today's ontat entres where agents deal with multiple queries from multiple hannels. Live Chat hat is one now

More information

Impact Simulation of Extreme Wind Generated Missiles on Radioactive Waste Storage Facilities

Impact Simulation of Extreme Wind Generated Missiles on Radioactive Waste Storage Facilities Impat Simulation of Extreme Wind Generated issiles on Radioative Waste Storage Failities G. Barbella Sogin S.p.A. Via Torino 6 00184 Rome (Italy), barbella@sogin.it Abstrat: The strutural design of temporary

More information

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection Behavior Analysis-Based Learning Framework for Host Level Intrusion Detetion Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit Eletrial and Computer Engineering Department University of Arizona

More information

A Theoretical Analysis of Credit Card Reform in Australia *

A Theoretical Analysis of Credit Card Reform in Australia * A Theoretial Analysis of Credit Card Reform in Australia * by Joshua S. Gans and Stephen P. King Melbourne Business Shool University of Melbourne First Draft: 12 th May, 2001 This Version: 5 th May, 2003

More information

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts FOOD FOR THOUGHT Topial Insights from our Sujet Matter Experts DEGREE OF DIFFERENCE TESTING: AN ALTERNATIVE TO TRADITIONAL APPROACHES The NFL White Paper Series Volume 14, June 2014 Overview Differene

More information

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF ' R :::i:. ATIONAL :'.:::::: RETENTION ':: Compliane with the way you work, PRODUCT BRIEF In-plae Management of Unstrutured Data The explosion of unstrutured data ombined with new laws and regulations

More information

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management For students entering in 2012/3 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date of speifiation:

More information

Dataflow Features in Computer Networks

Dataflow Features in Computer Networks Magyar Kutatók 1. Nemzetközi Szimpóziuma 1 th International Symposium of Hungarian Researhers on Computational Intelligene and Informatis Gyula Max Budapest University of Tehnology and Eonomis, Department

More information

Granular Problem Solving and Software Engineering

Granular Problem Solving and Software Engineering Granular Problem Solving and Software Engineering Haibin Zhu, Senior Member, IEEE Department of Computer Siene and Mathematis, Nipissing University, 100 College Drive, North Bay, Ontario, P1B 8L7, Canada

More information

Findings and Recommendations

Findings and Recommendations Contrating Methods and Administration Findings and Reommendations Finding 9-1 ESD did not utilize a formal written pre-qualifiations proess for seleting experiened design onsultants. ESD hose onsultants

More information

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods Doug A. Bowman bowman@vt.edu Department of Computer Siene Virginia Teh Joseph L. Gabbard Deborah Hix [ jgabbard, hix]@vt.edu Systems Researh Center Virginia Teh A Survey of Usability Evaluation in Virtual

More information

Fixed-income Securities Lecture 2: Basic Terminology and Concepts. Present value (fixed interest rate) Present value (fixed interest rate): the arb

Fixed-income Securities Lecture 2: Basic Terminology and Concepts. Present value (fixed interest rate) Present value (fixed interest rate): the arb Fixed-inome Seurities Leture 2: Basi Terminology and Conepts Philip H. Dybvig Washington University in Saint Louis Various interest rates Present value (PV) and arbitrage Forward and spot interest rates

More information

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management (full-time) For students entering in 2015/6 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date

More information

Intuitive Guide to Principles of Communications By Charan Langton www.complextoreal.com

Intuitive Guide to Principles of Communications By Charan Langton www.complextoreal.com Intuitive Guide to Priniples of Communiations By Charan Langton www.omplextoreal.om Understanding Frequeny Modulation (FM), Frequeny Shift Keying (FSK), Sunde s FSK and MSK and some more The proess of

More information

Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization

Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization Abstrat Parameter variations ause high yield losses due to their large impat on iruit delay. In this paper, we propose the use of

More information

TRENDS IN EXECUTIVE EDUCATION: TOWARDS A SYSTEMS APPROACH TO EXECUTIVE DEVELOPMENT PLANNING

TRENDS IN EXECUTIVE EDUCATION: TOWARDS A SYSTEMS APPROACH TO EXECUTIVE DEVELOPMENT PLANNING INTERMAN 7 TRENDS IN EXECUTIVE EDUCATION: TOWARDS A SYSTEMS APPROACH TO EXECUTIVE DEVELOPMENT PLANNING by Douglas A. Ready, Albert A. Viere and Alan F. White RECEIVED 2 7 MAY 1393 International Labour

More information

Suggested Answers, Problem Set 5 Health Economics

Suggested Answers, Problem Set 5 Health Economics Suggested Answers, Problem Set 5 Health Eonomis Bill Evans Spring 2013 1. The graph is at the end of the handout. Fluoridated water strengthens teeth and redues inidene of avities. As a result, at all

More information

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs)

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs) 23 IEEE International Conferene on High Performane Computing and Communiations & 23 IEEE International Conferene on Embedded and Ubiquitous Computing Dedupliation with Blok-Level Content-Aware Chunking

More information

The Optimal Deterrence of Tax Evasion: The Trade-off Between Information Reporting and Audits

The Optimal Deterrence of Tax Evasion: The Trade-off Between Information Reporting and Audits The Optimal Deterrene of Tax Evasion: The Trade-off Between Information Reporting and Audits Yulia Paramonova Department of Eonomis, University of Mihigan Otober 30, 2014 Abstrat Despite the widespread

More information

MATE: MPLS Adaptive Traffic Engineering

MATE: MPLS Adaptive Traffic Engineering MATE: MPLS Adaptive Traffi Engineering Anwar Elwalid Cheng Jin Steven Low Indra Widjaja Bell Labs EECS Dept EE Dept Fujitsu Network Communiations Luent Tehnologies Univ. of Mihigan Calteh Pearl River,

More information

10.1 The Lorentz force law

10.1 The Lorentz force law Sott Hughes 10 Marh 2005 Massahusetts Institute of Tehnology Department of Physis 8.022 Spring 2004 Leture 10: Magneti fore; Magneti fields; Ampere s law 10.1 The Lorentz fore law Until now, we have been

More information

Modeling and analyzing interference signal in a complex electromagnetic environment

Modeling and analyzing interference signal in a complex electromagnetic environment Liu et al. EURASIP Journal on Wireless Communiations and Networking (016) 016:1 DOI 10.1186/s13638-015-0498-8 RESEARCH Modeling and analyzing interferene signal in a omplex eletromagneti environment Chun-tong

More information

Course 8-9 DSL type digital access techniques (Digital Subscriber Line)

Course 8-9 DSL type digital access techniques (Digital Subscriber Line) Course 8-9 DSL type digital aess tehniques (Digital Subsriber Line) o The term refers to the tehnologies and equipments used in a telephone network to ensure the aess to a high speed digital network on

More information

Unit 12: Installing, Configuring and Administering Microsoft Server

Unit 12: Installing, Configuring and Administering Microsoft Server Unit 12: Installing, Configuring and Administering Mirosoft Server Learning Outomes A andidate following a programme of learning leading to this unit will be able to: Selet a suitable NOS to install for

More information

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings Computational Analysis of Two Arrangements of a Central Ground-Soure Heat Pump System for Residential Buildings Abstrat Ehab Foda, Ala Hasan, Kai Sirén Helsinki University of Tehnology, HVAC Tehnology,

More information

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts State of Maryland Partiipation Agreement for Pre-Tax and Roth Retirement Savings Aounts DC-4531 (08/2015) For help, please all 1-800-966-6355 www.marylandd.om 1 Things to Remember Complete all of the setions

More information

Improved SOM-Based High-Dimensional Data Visualization Algorithm

Improved SOM-Based High-Dimensional Data Visualization Algorithm Computer and Information Siene; Vol. 5, No. 4; 2012 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Siene and Eduation Improved SOM-Based High-Dimensional Data Visualization Algorithm Wang

More information

Design Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis

Design Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis Design Impliations for Enterprise Storage Systems via Multi-Dimensional Trae Analysis Yanpei Chen, Kiran Srinivasan, Garth Goodson, Randy Katz University of California, Berkeley, NetApp In. {yhen2, randy}@ees.berkeley.edu,

More information

Deliverability on the Interstate Natural Gas Pipeline System

Deliverability on the Interstate Natural Gas Pipeline System DOE/EIA-0618(98) Distribution Category UC-950 Deliverability on the Interstate Natural Gas Pipeline System May 1998 This report was prepared by the, the independent statistial and analytial ageny within

More information

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition

More information

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu

More information

Electrician'sMathand BasicElectricalFormulas

Electrician'sMathand BasicElectricalFormulas Eletriian'sMathand BasiEletrialFormulas MikeHoltEnterprises,In. 1.888.NEC.CODE www.mikeholt.om Introdution Introdution This PDF is a free resoure from Mike Holt Enterprises, In. It s Unit 1 from the Eletrial

More information

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method BEAM DESIGN In order to be able to design beams, we need both moments and shears. 1. Moment a) From diret design method or equivalent frame method b) From loads applied diretly to beams inluding beam weight

More information

Bandwidth Allocation and Session Scheduling using SIP

Bandwidth Allocation and Session Scheduling using SIP JOURAL OF COUICAIS, VOL., O. 5, AUGUS 006 7 Bandwidth Alloation and Session Sheduling using SIP Hassan HASSA, Jean-arie GARCIA and Olivier BRU LAAS-CRS, oulouse, Frane Email: {hhassan}@laas.fr Abstrat

More information

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES Proeedings of FEDSM 98 998 ASME Fluids Engineering Division Summer Meeting June 2-25, 998 Washington DC FEDSM98-529 THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES John D. Wright Proess

More information

Optimal Sales Force Compensation

Optimal Sales Force Compensation Optimal Sales Fore Compensation Matthias Kräkel Anja Shöttner Abstrat We analyze a dynami moral-hazard model to derive optimal sales fore ompensation plans without imposing any ad ho restritions on the

More information

Agent-Based Grid Load Balancing Using Performance-Driven Task Scheduling

Agent-Based Grid Load Balancing Using Performance-Driven Task Scheduling Agent-Based Grid Load Balaning Using Performane-Driven Task Sheduling Junwei Cao *1, Daniel P. Spooner, Stephen A. Jarvis, Subhash Saini and Graham R. Nudd * C&C Researh Laboratories, NEC Europe Ltd.,

More information

Account Contract for Card Acceptance

Account Contract for Card Acceptance Aount Contrat for Card Aeptane This is an Aount Contrat for the aeptane of debit ards and redit ards via payment terminals, on the website and/or by telephone, mail or fax. You enter into this ontrat with

More information

To Coordinate Or Not To Coordinate? Wide-Area Traffic Management for Data Centers

To Coordinate Or Not To Coordinate? Wide-Area Traffic Management for Data Centers To Coordinate Or Not To Coordinate? Wide-Area Traffi Management for Data Centers Srinivas Narayana, Joe Wenjie Jiang, Jennifer Rexford, Mung Chiang Department of Computer Siene, and Department of Eletrial

More information

Public DNS System and Global Traffic Management

Public DNS System and Global Traffic Management . This paper was presented as part of the main tehnial program at I INFOCOM 211 Publi DNS System and Global Traffi Management Cheng Huang Mirosoft Researh David A. Maltz Mirosoft Researh Albert Greenberg

More information

The Basics of International Trade: A Classroom Experiment

The Basics of International Trade: A Classroom Experiment The Basis of International Trade: A Classroom Experiment Alberto Isgut, Ganesan Ravishanker, and Tanya Rosenblat * Wesleyan University Abstrat We introdue a simple web-based lassroom experiment in whih

More information

WORKFLOW CONTROL-FLOW PATTERNS A Revised View

WORKFLOW CONTROL-FLOW PATTERNS A Revised View WORKFLOW CONTROL-FLOW PATTERNS A Revised View Nik Russell 1, Arthur H.M. ter Hofstede 1, 1 BPM Group, Queensland University of Tehnology GPO Box 2434, Brisbane QLD 4001, Australia {n.russell,a.terhofstede}@qut.edu.au

More information

Context-Sensitive Adjustments of Cognitive Control: Conflict-Adaptation Effects Are Modulated by Processing Demands of the Ongoing Task

Context-Sensitive Adjustments of Cognitive Control: Conflict-Adaptation Effects Are Modulated by Processing Demands of the Ongoing Task Journal of Experimental Psyhology: Learning, Memory, and Cognition 2008, Vol. 34, No. 3, 712 718 Copyright 2008 by the Amerian Psyhologial Assoiation 0278-7393/08/$12.00 DOI: 10.1037/0278-7393.34.3.712

More information

AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Construction

AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Construction AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Constrution Raymond Sweha Boston University remos@s.bu.edu Vathe Ishakian Boston University visahak@s.bu.edu Azer Bestavros

More information

A Comparison of Default and Reduced Bandwidth MR Imaging of the Spine at 1.5 T

A Comparison of Default and Reduced Bandwidth MR Imaging of the Spine at 1.5 T 9 A Comparison of efault and Redued Bandwidth MR Imaging of the Spine at 1.5 T L. Ketonen 1 S. Totterman 1 J. H. Simon 1 T. H. Foster 2. K. Kido 1 J. Szumowski 1 S. E. Joy1 The value of a redued bandwidth

More information

Effects of Inter-Coaching Spacing on Aerodynamic Noise Generation Inside High-speed Trains

Effects of Inter-Coaching Spacing on Aerodynamic Noise Generation Inside High-speed Trains Effets of Inter-Coahing Spaing on Aerodynami Noise Generation Inside High-speed Trains 1 J. Ryu, 1 J. Park*, 2 C. Choi, 1 S. Song Hanyang University, Seoul, South Korea 1 ; Korea Railroad Researh Institute,

More information

An Enhanced Critical Path Method for Multiple Resource Constraints

An Enhanced Critical Path Method for Multiple Resource Constraints An Enhaned Critial Path Method for Multiple Resoure Constraints Chang-Pin Lin, Hung-Lin Tai, and Shih-Yan Hu Abstrat Traditional Critial Path Method onsiders only logial dependenies between related ativities

More information

Supply chain coordination; A Game Theory approach

Supply chain coordination; A Game Theory approach aepted for publiation in the journal "Engineering Appliations of Artifiial Intelligene" 2008 upply hain oordination; A Game Theory approah Jean-Claude Hennet x and Yasemin Arda xx x LI CNR-UMR 668 Université

More information

Earthquake Loss for Reinforced Concrete Building Structures Before and After Fire damage

Earthquake Loss for Reinforced Concrete Building Structures Before and After Fire damage Earthquake Loss for Reinfored Conrete Building Strutures Before and After Fire damage Pai-Mei LIU, Yi-Hsuan Tu and Maw-Shyong SHEU 3 ABSTRACT The purpose of this paper is to propose a rational analytial

More information

Picture This: Molecular Maya Puts Life in Life Science Animations

Picture This: Molecular Maya Puts Life in Life Science Animations Piture This: Moleular Maya Puts Life in Life Siene Animations [ Data Visualization ] Based on the Autodesk platform, Digizyme plug-in proves aestheti and eduational effetiveness. BY KEVIN DAVIES In 2010,

More information

Procurement auctions are sometimes plagued with a chosen supplier s failing to accomplish a project successfully.

Procurement auctions are sometimes plagued with a chosen supplier s failing to accomplish a project successfully. Deision Analysis Vol. 7, No. 1, Marh 2010, pp. 23 39 issn 1545-8490 eissn 1545-8504 10 0701 0023 informs doi 10.1287/dea.1090.0155 2010 INFORMS Managing Projet Failure Risk Through Contingent Contrats

More information

Optimal Allocation of Filters against DDoS Attacks

Optimal Allocation of Filters against DDoS Attacks Optimal Alloation of Filters against DDoS Attaks Karim El Defrawy ICS Dept. University of California, Irvine Email: keldefra@ui.edu Athina Markopoulou EECS Dept. University of California, Irvine Email:

More information

Customer Reporting for SaaS Applications. Domain Basics. Managing my Domain

Customer Reporting for SaaS Applications. Domain Basics. Managing my Domain Produtivity Marketpla e Software as a Servie Invoiing Ordering Domains Customer Reporting for SaaS Appliations Domain Basis Managing my Domain Managing Domains Helpful Resoures Managing my Domain If you

More information

Lemon Signaling in Cross-Listings Michal Barzuza*

Lemon Signaling in Cross-Listings Michal Barzuza* Lemon Signaling in Cross-Listings Mihal Barzuza* This paper analyzes the deision to ross-list by managers and ontrolling shareholders assuming that they have private information with respet to the amount

More information

Impedance Method for Leak Detection in Zigzag Pipelines

Impedance Method for Leak Detection in Zigzag Pipelines 10.478/v10048-010-0036-0 MEASUREMENT SCIENCE REVIEW, Volume 10, No. 6, 010 Impedane Method for Leak Detetion in igzag Pipelines A. Lay-Ekuakille 1, P. Vergallo 1, A. Trotta 1 Dipartimento d Ingegneria

More information

Recent Progress in Brillouin Scattering Based Fiber Sensors

Recent Progress in Brillouin Scattering Based Fiber Sensors Sensors 011, 11, 415-4187; doi:10.3390/s11040415 OPEN ACCESS sensors ISSN 144-80 www.mdpi.om/journal/sensors Review Reent Progress in rillouin Sattering ased Fiber Sensors Xiaoyi ao * and Liang Chen Physis

More information

Paid Placement Strategies for Internet Search Engines

Paid Placement Strategies for Internet Search Engines Paid Plaement Strategies for Internet Searh Engines Hemant K. Bhargava Smeal College of Business Penn State University 342 Beam Building University Park, PA 16802 bhargava@omputer.org Juan Feng Smeal College

More information

Interpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms

Interpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms Interpretable Fuzzy Modeling using Multi-Objetive Immune- Inspired Optimization Algorithms Jun Chen, Mahdi Mahfouf Abstrat In this paper, an immune inspired multi-objetive fuzzy modeling (IMOFM) mehanism

More information

Dynamic and Competitive Effects of Direct Mailings

Dynamic and Competitive Effects of Direct Mailings Dynami and Competitive Effets of Diret Mailings Merel van Diepen, Bas Donkers and Philip Hans Franses ERIM REPORT SERIES RESEARCH IN MANAGEMENT ERIM Report Series referene number ERS-2006-050-MKT Publiation

More information

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds Intelligent Measurement Proesses in 3D Optial Metrology: Produing More Aurate Point Clouds Charles Mony, Ph.D. 1 President Creaform in. mony@reaform3d.om Daniel Brown, Eng. 1 Produt Manager Creaform in.

More information

Big Data Analysis and Reporting with Decision Tree Induction

Big Data Analysis and Reporting with Decision Tree Induction Big Data Analysis and Reporting with Deision Tree Indution PETRA PERNER Institute of Computer Vision and Applied Computer Sienes, IBaI Postbox 30 11 14, 04251 Leipzig GERMANY pperner@ibai-institut.de,

More information

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes 1 Asymmetri Error Corretion and Flash-Memory Rewriting using Polar Codes Eyal En Gad, Yue Li, Joerg Kliewer, Mihael Langberg, Anxiao (Andrew) Jiang and Jehoshua Bruk Abstrat We propose effiient oding shemes

More information

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA LBNL-52402 Marh 2003 On the Speed of Gravity and the v/ Corretions to the Shapiro Time Delay Stuart Samuel 1 arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrene Berkeley National Laboratory

More information

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS ICSRiM - University of Leeds Shool of Computing & Shool of Musi Leeds LS2 9JT, UK +44-113-343-2583 kia@i-maestro.org www.i-maestro.org,

More information

Table of Contents. Appendix II Application Checklist. Export Finance Program Working Capital Financing...7

Table of Contents. Appendix II Application Checklist. Export Finance Program Working Capital Financing...7 Export Finane Program Guidelines Table of Contents Setion I General...........................................................1 A. Introdution............................................................1

More information

Srinivas Bollapragada GE Global Research Center. Abstract

Srinivas Bollapragada GE Global Research Center. Abstract Sheduling Commerial Videotapes in Broadast Television Srinivas Bollapragada GE Global Researh Center Mihael Bussiek GAMS Development Corporation Suman Mallik University of Illinois at Urbana Champaign

More information

How To Fator

How To Fator CHAPTER hapter 4 > Make the Connetion 4 INTRODUCTION Developing seret odes is big business beause of the widespread use of omputers and the Internet. Corporations all over the world sell enryption systems

More information

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator nternational Journal of Computer and Eletrial Engineering, Vol. 1, No. 1, April 2009 Neural network-based Load Balaning and Reative Power Control by Stati VAR Compensator smail K. Said and Marouf Pirouti

More information

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401 IEEE TRASACTIOS O DEPEDABLE AD SECURE COMPUTIG, VOL. 9, O. 3, MAY/JUE 2012 401 Mitigating Distributed Denial of Servie Attaks in Multiparty Appliations in the Presene of Clok Drifts Zhang Fu, Marina Papatriantafilou,

More information