Arithmetic Acceleration Techniques for Wireless Communication Receivers

Size: px
Start display at page:

Download "Arithmetic Acceleration Techniques for Wireless Communication Receivers"

Transcription

1 Arithmetic Acceleration Techniques for Wireless Communication Receivers Suman Das Srihar Rajagopal Chaitali Sengupta Joseph R Cavallaro Rice niversity Center for ultimeia Communication Department of Electrical an Computer Engineering S ain St, Houston, T Abstract We evelop techniques to accelerate the implementation of the next generation wireless communication algorithms in harware We iscuss an implementation of a key computationally intensive baseban algorithm for joint multiuser channel estimation an etection for this purpose an stuy its real-time requirements An analysis of the bottlenecks present in the algorithm is mae We present an acceleration technique using task ecomposition to take avantage of the existing pipelining an parallelism flow in the algorithm We show that an application specific system esign with multiple processing elements is more effective than the conventional single processor approach as it can satisfy the high ata rate requirements of the next generation wireless communication systems Our analysis is one inepenent of the final mapping of the processing elements in harware 1 Introuction The next generation wireless communication receivers are being esigne to support enhance features such as multimeia capabilities, higher ata rates, Quality of Service (QoS) an multi-rate services in the existing wireless communication framework Wieban Direct Sequence Coe Division ultiple Access (W-CDA) is the chosen multiple access protocol for these communication systems [1] Support for high ata rates [4, 5] such as 2 bps inoor, 384 Kbps peestrian an 144 Kbps vehicular traffic is to be provie by the base-station receivers Several algorithms are being evelope for the ifferent functional blocks of the next generation base-station Currently at Texas Instruments, Inc Dallas, T This work was supporte in part by Nokia Corporation, Texas Instruments Inc,the Texas Avance Technology Program uner grant , an by NSF uner grants NCR an ANI receiver These algorithms have extremely high complexity an they put increase pressure on the next generation receivers, which have stringent time, power an size constraints One of the main computational bottlenecks in the basestation receiver is the estimation an etection of the transmitte bits from the receive signal ultiuser channel estimation an etection is being consiere as part of the avance receiver structures for next generation communication systems For our evaluation purposes, we choose one of the esigne computationally intensive algorithms for W-CDA multiuser channel estimation an etection [7] This algorithm is base on a joint multiuser estimation an etection technique which eliminates the nee for conventional extraction of parameters in channel estimation an thus gives gains both in performance in terms of Bit Error Rates (BER) as well as computational complexity This algorithm inclues chip level espreaing, which is one of the main bottlenecks in the receiver An implementation of this algorithm on a Texas Instrument s C6x DSP Simulator[9], chosen as a example of current processor technology, oes not meet real time constraints We evelop techniques to accelerate the implementation of this algorithm A task ecomposition of the algorithm is one to explore the ata epenencies between the ifferent tasks in the algorithm an take avantage of available pipelining an parallelism The analysis also shows how frequently we can upate the algorithm base on ecision feeback The main contributions of this paper are twofol First, we evelop techniques to accelerate the implementation of the wireless communication algorithms on harware, which is inepenent of the final harware mapping of the algorithm We show this specifically for the joint estimation an etection algorithm Also, we show that an application specific approach of multiple processing elements is more effective than a single processor system in meeting the realtime constraints in the base-station receiver

2 Base-station Receiver ultiple sers Antenna Demo -ulator Pilot Delay Data ultiuser Detection + Channel Estimation Decision Feeback b Decoer Detecte Bits Figure 1 Simplifie view of the Base Station Receiver 2 Joint Estimation an Detection 21 Channel oel The channel estimation an etection block in the basestation receiver is shown in Figure 1 We assume an asynchronous Coe Division ultiple Access (CDA) base system with Binary Phase Shift Keying (BPSK) moulation, where the signal is multiplie with a short repeating spreaing coe before transmission As the sprea signal is sent through the channel, it experiences unesirable effects such as elays ue to multiple paths, interference from other users, faing an noise The etector nees to acquire synchronization with the input signal in orer to correctly etect the incoming bit sequence Hence, the parameters of the channel nee to be estimate for proper etection Channel estimation involves estimating an tracking the elays of each users bits an the channel attenuation over the ifferent paths The channel estimation scheme uses the aximum Likelihoo principle [6] to estimate the channel parameters an irectly fees this information to the etector without actually extracting the channel parameters The etection scheme is the Differencing ultistage Detection metho [11], base on the principle of Parallel Interference Cancellation (PIC) [10] The etector uses the information from the channel estimation block to remove the interference from other users The channel information is built on the basis of a priori information obtaine by transmission of a pilot signal (b), which is a sequence of bits that is known at the receiver The pilot signal receive at the base-station (pilot), is compare with the known bits to form an estimate of the channel The ecisions from the multiuser etection block () are fe back to the channel estimation block along with the receive ata bits (ata), elaye by the time require for etection, for tracking the algorithm when the pilot signal is absent 22 Real-time Requirements Data transmission in the next generation wireless systems [5] is one in frames of The ata transmission can be one in variable rates epening on the spreaing factors (SF), as shown in Table 1 The table gives an example of the number of bits in a frame for spreaing factors of 4, 32 an 256 We assume BPSK moulation for our algorithm To support real-time, the number of bits etecte per frame shoul be at the rate of transmission We choose a short Gol Coe sequence of length 31 for our spreaing (which matches nearest to the propose spreaing factor of 32) This implies that the real-time requirement of our joint estimation an etection scheme is to etect input ata bits at a rate of 128 Kbps 23 Computations Involve The erivation of the joint estimation an etection algorithm is etaile in [7] We inclue the algorithm here to explain the computational aspects involve without proof The moel for the channel can be expresse as (1) where are the receive bits of all users, % ')( *,+-'/0'1( sprea * ) with a( *,+-' / spreaing ( *5476 factor,!"$ SF Bits Data Rates bps Kbps Kbps asynchronous are the bits of users to be Table 1 Propose Data Rates for Next Generation Communication Systems

3 TTTS TTTTTTTTS D E D E TTTTTTTTTTTS TTTS g i etecte, 89"/;:< is the estimate of the channel containing information about the spreaing coes, attenuation an elays from the various paths, * is the noise, which is assume to be Gaussian (AGWN) an = is the time inex The computations that occur uring the synchronization phase [7, 11] are: >@?BA C >J?B? C *GFH' *GFH' * I* * I* C >?BA where is the length of the pilot sequence, "$;: is the cross-correlation matrix between the synchronization bits * an the receive signal * >?K? an L"$;:"$ is the autocorrelation matrix The channel estimate can be obtaine by solving >?B? 5 >?BA (4) Dropping the subscript = for convenience, the matrix * can be rearrange into its o an even columns ON ' ;: which correspons to the bits +-P an in the estimate In vector form, * % NRQ ' 4 '1( *7+V' (*,+-' ')( * ( * WY [ * 3 It has been shown that etecting a block of bits simultaneously (multishot etection) can give performance gains [11] Also, multishot etection is near-far resistant as it accounts for the interference from both the overlapping symbols of the interfering users In orer to o multishot etection, the above moel shoul be extene to inclue multiple bits Let us consier \ bits at a time (= )]<0^ ^0^_ \ ) So, we form the multishot receive vector of length `\ by concatenating \ * -s a7= )]<0^ ^0^- \b 0')( ' W N ' WY c N ' ( ' N ' ')( e : ( (2) (3) (5) (6) Let represent the multishot channel estimate matrix We now procee to the etection part of the algorithm after the formation of N)i using the matrix The initial soft ecision N)i outputs fhg j an har ecision outputs klg m of the etector is given by N/i f g npo % 4 N/i (7) k g ' i =BqRrla7fHb (8) f g N/is f g npo % s[t 45u N/i ' (9) i ' k g i =BqRrla7f g b (10) ' i where vwg u ' i an g are the soft an har ecisions after the first stage of the joint etector an x y :< is the iagonal elements in These computations are iterate z )]<0^ ^0^-){ { where is the maximum number of iterations i gy} ihs +-' i ' k gy} k gy} (11) i f gy}y~ is f gy} npo % st 4 ' i ' gy} (12) k gy} ~ i 0=BqRrla7f g }Y~ b (13) The structure of m ƒ :< ƒ is as shown P W P [ P P P P P P The har ecisions, k, which are mae at the en of the final stage, are fe back to the synchronization block an to the rest of the processing blocks in the receiver 3 Task Decomposition an Implementation The algorithm is implemente on a TI C6x DSP simulator [9], assuming a TI TS320C6701 (C67) floating point processor This processor is taken as an example of the current generation processor technology for our analysis The C67 is one of the recent DSPs from TI, which has a highperformance VLIW (Very Long Instruction Wor) architecture an has been propose for wireless base-stations It has a 32-bit architecture with 8 functional units, consisting of 2 multipliers, 4 ALs an 2 Loa/Store nits It has harware support for IEEE single an ouble precision floating point instructions an can prouce 2 ultiply an Accumulate s (AC) per cycle The algorithm was written in C The algorithm was written in a memory-efficient manner so as to avoi transposes an uses inplace computations The entire coe an ata fits in the internal memory of the DSP In this initial implementation, the L ecomposition was use to calculate (4) We use the TI C Compiler ver 30 to generate the assembly coe for the DSP The highest possible compiler optimizations recommene by TI [8] were use The optimizations perform software pipelining, loop unrolling an other program level optimizations to exploit (14)

4 Block I Block II Block III b Correlation atrices (Per Bit) R br [R] O(KN) Inverse R bb A H = R br [R] atrix Proucts A 0 H A 1 Block IV ultistage Detection (Per Winow) Data' Pilot R br [I] O(KN) Rbb O(K 2 ) R bb A H = R br [I] A 0 H A 0 A 1 H A 1 O(DK 2 e ) Data A H r O(KND) Figure 2 The Task Partition Graph for the Joint Estimation an Detection Algorithm the available fine-grain parallelism available in the VLIW architecture The structure an sparseness of the various matrices were also accounte for in the implementation 31 Task Decomposition The sequential implementation of the entire algorithm on the DSP oes not meet real-time constraints In fact, the achieve ata rates for just the etection block implementation, assuming a single stage iteration, shows the ata requirements falling short by a factor of 6 So, a task ecomposition of the algorithm is carrie out to fin the ata epenencies an to ientify all available sources of pipelining an parallelism A coarse graine pipeline-parallel task ecomposition of the joint estimation an etection algorithm is as shown in Figure 2 The input to the channel estimation block to the left is either the known pilot bits (b) an the receive pilot bits (pilot) or the etecte ata bits () an the receive ata bits, elaye by the time require for etection (ata ) The otte blocks (I-IV) represent pipeline operations whereas the blocks insie a otte block represent operations that can be one in > parallel?ba >?K? Equations 2,3 are shown in block I as both an can be compute in parallel These are outer prouct computations Also, both the real an imaginary parts of >?BA can be compute inepenently > Equation?K? 4 is represente in block II, where the inverse of is calculate by using a L Decomposition The block III shows the computation of equation 14 P I is not compute as it is a ˆI P b I Block III also inclues the computation of the ultiuser etection part (7), as it can be one in parallel with the above operations The iterative loop of the ultistage Detection (8-13) is shown as a single block IV The input ata bits are streaming in continuously in the receiver, which has to ensure that the receive ata stream Block Complexity Cycle count Correlation atrices " Inverse " Š NI Š ' Š NI Š N Š I' Š ' " Š IŒ \ per bit KN ultistage(1st stage) \O " per bit " 3367 Table 2 Cycle count an Complexity for ifferent blocks is being continuously processe so as to meet the real-time constraints However, the channel estimation can be upate less frequently so as to meet with the requirements of the etection (We neglect the effect of channel estimation on bit error rates for this purpose) The parts of multiuser etection which epen on the input ata are the calculation of I, as in (7), an the multistage etection loop (8-13) An orer complexity analysis was also one on the algorithm to fin the bottlenecks in each block 32 Simulations an Analysis An in-epth profiling of the various blocks was carrie out using the clock function in the C6x DSP The cycle count for the various blocks is as shown in Table 2 for 15 users an a etection winow of length 12 Assuming a 250 Hz processor, a ata rate requirement of 128 Kbps implies the available number of cycles per bit is 1953 for real-time etection The successive stages in the ultistage etector take significantly less time than the first stage Hence, let us assume the effective number of stages

5 { Optimization Cycle count A + B * A B max(13272,3367* ) (Pl A) B 3367* (Pl A) (Pp B) 3367 (Pl A) (PlPp B) 885 Table 3 Cycle count for ifferent optimization levels of blocks A ( I ) an B (block IV) Block III A H r 1 K A 0 H A 1 A 0 H A 0 A 1 H A 1 { { 9Ž { as where { The time require for block IV for all the stages can excee the time require to calculate I Also, the first an last K bits in each winow are ignore ue to ege effects an have to be recalculate The task partition graph at this level is unable to match the real time constraints as the present solution still requires R {[ ] ] cycles Therefore, we nee to search for more fine grain parallelism from the above task partition graph Table 3 shows the avantages of various levels of parallelism(pl) an pipelining(pp) Let A refer to the calculation of I in block III an B to block IV Let (A + B Sequential) be the present solution obtaine If A an B were pipeline (A B), the require Š computation becomes the maximum of A an B Next, Š I can be one for each user in parallel as each row of I correspons to a user, reucing the time to 885 cycles This puts the bottleneck to block B (Pl(A) B) Hence, block B is also unrolle into ifferent stages The first stage now has the most complexity, it becomes the new bottleneck, neeing 3367 cycles ((Pl A) (Pp B)) It has been shown [11] that each successive stages in B requires less computation than the previous stage Hence, fewer or less powerful processing elements nee to be use to these stages Each stage can also be split into multiple processing elements in a manner similar to A This reuces the cycles neee to 225, putting the bottleneck back to A (Pl(A) PlPp(B)) A an B after this step are shown in Figure 3 4 eeting Real Time Constraints The ata rates which can be met with ifferent levels of pipelining an parallelism are as shown in Figure 4 The figure shows the variation in the achieve ata rates with the number of users We assume that the effective {[ number of stages of the multistage etector is 3 ( ) As the level of pipelining an parallelism increases, we observe an increase in the ata rates The ata rates from (Parallel A)(Pipe Ž B) satisfies the requirements for lower number of users ( ) as it is limite by the complexity of the first stage which is a " b By having K processing elements for the first stage, the bottleneck shifts back to A ((Parallel Stage 1 Stage2 Stage3 Block IV Figure 3 Further Pipelining Parallelism in the ultistage Detection A)(Parallel + Pipe B)), which is of orer a b an hence, the ata rate achieve is inepenent of the number of users Juging from the time requirements for the block I an block II, we can upate block II once in 27 upates to block I The frequency of upates is etermine by the amount of error that can be tolerate in the etection If the upates are not frequent enough to keep up with the faing of the channel, the performance of the system will egrae in terms of the bit error rate ore frequent upates of once in 14 bits can be achieve by again further partitioning the matrix inverse into 2 separate tasks Here, the key iea is to use the amount of parallelism necessary to satisfy the bit error rate tolerance levels Alternate methos coul also be use for computing the inverse to reuce the complexity an make more upates feasible 5 Harware apping The above analysis with task partitioning is inepenent of the final harware mapping of the processing elements We assume that the processing elements in the critical part (block IV an I ) are equivalent to the functional units in a C67 for that particular operation because the C67 is use as the basis for our timing results The processing elements coul be mappe to ifferent architectures such as a single ASIC or multiple processors or a combination of a processor with an ASIC or FPGA The mapping coul also be one such as to have a DSP core with some coprocessor structures for critical parts Also, if there exists many processing elements in parallel where a single element ominates the computation, such as block III where the time taken by IŒ takes the same time as the other 3 matrix proucts taken together (see Table 2), all those processing elements coul be mappe to a single processor Thus, the loa between elements that have ile times coul be is-

6 3 x 105 Data Rates for Different Levels of Pipelining an Parallelism 7 Summary Data Rates (Parallel A) (Parallel+Pipe B) (Parallel A) (Pipe B) (Parallel A) B A B Sequential A + B Data Rate Requirement = 128 Kbps Number of sers Figure 4 Data Rates for various levels of Pipelining an Parallelism for A ( I ) an B (block IV) tribute to other processing elements The other assumptions inclue ieal communication overhea, no restriction on the number of processing elements available an the feasibility of esigning such an application specific system The number of processing elements are epenent on the number of users (K), which is variable Allocating elements for the maximum number of users may not lea to optimum utilization Hence, reconfigurable architectures supporting varying number of users shoul also be consiere 6 Future Work The ynamic range requirements for the joint estimation an etection algorithm are being analyse In the initial version, the algorithm is implemente in floating point ue to the possible loss in precision involve in L ecomposition From the analysis of the ifferencing multistage etector[11], we expect a precision range of less than 24 bits A fixe point implementation with a lower precision range coul benefit from the VLIW an SID type of fine graine parallelism shown in recent DSP an general purpose architectures Also, matrix oriente architectures [3], such as a vector processor with SID, showing 2 levels of parallelism coul be beneficial to these applications Another iea is to explore special systems to take avantage of the complex arithmetic ata involve, such as using reunant complex number systems (RCNS) for a ASIC architecture [2] We evelop acceleration techniques to implement key computationally intensive baseban algorithms in harware The joint multiuser channel estimation an etection algorithm is consiere for this purpose A etaile task partition of this algorithm along with its complexity analysis is shown with the help of a C6x DSP simulator The available parallelism an pipeline tasks in the algorithm are exploite to satisfy the real-time constraints We iscuss mapping issues of the task partitions in harware Such an application specific esign with multiple processing elements is more effective than a single processor in meeting the real time requirements of next generation communication systems References [1] F Aachi, Sawahashi, an H Sua Wieban DS- CDA for Next-Generation obile Communication Systems IEEE Communications agazine, 36(9):56 69, September 1998 [2] T Aoki, Y Ohi, an T Higuchi Reunant Complex Number Arithmetic For High-Spee Signal Processing IEEE Workshop on VLSI Signal Processing VIII, pages , October 1995 [3] J Corbal, Valero, an R Espasa Exploiting a New Level of DLP in ultimeia Applications In ICRO, International Symposium on icroarchitecture, November 1999 [4] E Dahlman, B Gumunson, Nilsson, an J Scol TS/IT-2000 Base on W-CDA IEEE Communications agazine, 36(9):70 80, September 1998 [5] eng, AAnnamalai, an V K Bhargava Recent avances in Cellular Wireless Communications IEEE Communications agazine, 37(9): , September 1999 [6] C Sengupta, J Cavallaro, an B Aazhang aximum Likelihoo ultipath Channel Parameter Estimation in CDA systems using antenna arrays In 9th IEEE International Symposium on Personal, Inoor, an obile Raio Communications(PIRC), pages , September 1998 [7] C Sengupta, S Das, J Cavallaro, an B Aazhang Efficient ultiuser Receivers for CDA Systems In IEEE Wireless Communications an Networking Conference, New Orleans, LA, pages , September 1999 [8] TI C6000 Compiler Optimization Tutorial ticom/sc/ocs/tools/sp/ccstutorhtm [9] TI TS320C6x Optimizing C Compiler, chapter 6 Texas Instruments, February 1998 [10] K Varanasi an B Aazhang ultistage etection in asynchronous Coe-Division ultiple -Access communications IEEE Transactions on Communications, 38(4): , Apr 1990 [11] G u an J Cavallaro Real-time Implementation of ultistage Algorithm for Next Generation Wieban CDA Systems In Avance Signal Processing Algorithms, Architectures, an Implementations I, SPIE, 1999

10.2 Systems of Linear Equations: Matrices

10.2 Systems of Linear Equations: Matrices SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix

More information

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems *

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems * GPRS performance estimation in GSM circuit switche serices an GPRS share resource systems * Shaoji i an Sen-Gusta Häggman Helsinki Uniersity of Technology, Institute of Raio ommunications, ommunications

More information

State of Louisiana Office of Information Technology. Change Management Plan

State of Louisiana Office of Information Technology. Change Management Plan State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change

More information

Improving Emulation Throughput for Multi-Project SoC Designs

Improving Emulation Throughput for Multi-Project SoC Designs Improving Emulation Throhput for Multi-Project SoC Designs By Frank Schirrmeister, Caence Design Systems As esign sizes grow, so, too, oes the verification effort. Inee, verification has become the biggest

More information

Math 230.01, Fall 2012: HW 1 Solutions

Math 230.01, Fall 2012: HW 1 Solutions Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The

More information

A Universal Sensor Control Architecture Considering Robot Dynamics

A Universal Sensor Control Architecture Considering Robot Dynamics International Conference on Multisensor Fusion an Integration for Intelligent Systems (MFI2001) Baen-Baen, Germany, August 2001 A Universal Sensor Control Architecture Consiering Robot Dynamics Frierich

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

Enterprise Resource Planning

Enterprise Resource Planning Enterprise Resource Planning MPC 6 th Eition Chapter 1a McGraw-Hill/Irwin Copyright 2011 by The McGraw-Hill Companies, Inc. All rights reserve. Enterprise Resource Planning A comprehensive software approach

More information

NETWORK CODING OVERHEAD

NETWORK CODING OVERHEAD NETWORK CODING OVERHEAD Yalin Saguyu y-saguyu@northwestern.eu Department of Electrical Engineering an Computer Science Northwestern University Joint work with M. Rimensberger, M. L. Honig, an W. Utschick

More information

Modelling and Resolving Software Dependencies

Modelling and Resolving Software Dependencies June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software

More information

Ch 10. Arithmetic Average Options and Asian Opitons

Ch 10. Arithmetic Average Options and Asian Opitons Ch 10. Arithmetic Average Options an Asian Opitons I. Asian Option an the Analytic Pricing Formula II. Binomial Tree Moel to Price Average Options III. Combination of Arithmetic Average an Reset Options

More information

A Data Placement Strategy in Scientific Cloud Workflows

A Data Placement Strategy in Scientific Cloud Workflows A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,

More information

Unbalanced Power Flow Analysis in a Micro Grid

Unbalanced Power Flow Analysis in a Micro Grid International Journal of Emerging Technology an Avance Engineering Unbalance Power Flow Analysis in a Micro Gri Thai Hau Vo 1, Mingyu Liao 2, Tianhui Liu 3, Anushree 4, Jayashri Ravishankar 5, Toan Phung

More information

Lecture L25-3D Rigid Body Kinematics

Lecture L25-3D Rigid Body Kinematics J. Peraire, S. Winall 16.07 Dynamics Fall 2008 Version 2.0 Lecture L25-3D Rigi Boy Kinematics In this lecture, we consier the motion of a 3D rigi boy. We shall see that in the general three-imensional

More information

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,

More information

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sewoong Oh an Anrea Montanari Electrical Engineering an Statistics Department Stanfor University, Stanfor,

More information

Algorithms for Interference Sensing in Optical CDMA Networks

Algorithms for Interference Sensing in Optical CDMA Networks Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern

More information

y or f (x) to determine their nature.

y or f (x) to determine their nature. Level C5 of challenge: D C5 Fining stationar points of cubic functions functions Mathematical goals Starting points Materials require Time neee To enable learners to: fin the stationar points of a cubic

More information

Product Differentiation for Software-as-a-Service Providers

Product Differentiation for Software-as-a-Service Providers University of Augsburg Prof. Dr. Hans Ulrich Buhl Research Center Finance & Information Management Department of Information Systems Engineering & Financial Management Discussion Paper WI-99 Prouct Differentiation

More information

Calibration of the broad band UV Radiometer

Calibration of the broad band UV Radiometer Calibration of the broa ban UV Raiometer Marian Morys an Daniel Berger Solar Light Co., Philaelphia, PA 19126 ABSTRACT Mounting concern about the ozone layer epletion an the potential ultraviolet exposure

More information

View Synthesis by Image Mapping and Interpolation

View Synthesis by Image Mapping and Interpolation View Synthesis by Image Mapping an Interpolation Farris J. Halim Jesse S. Jin, School of Computer Science & Engineering, University of New South Wales Syney, NSW 05, Australia Basser epartment of Computer

More information

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES 1 st Logistics International Conference Belgrae, Serbia 28-30 November 2013 INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES Goran N. Raoičić * University of Niš, Faculty of Mechanical

More information

On Adaboost and Optimal Betting Strategies

On Adaboost and Optimal Betting Strategies On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore

More information

Section 3.3. Differentiation of Polynomials and Rational Functions. Difference Equations to Differential Equations

Section 3.3. Differentiation of Polynomials and Rational Functions. Difference Equations to Differential Equations Difference Equations to Differential Equations Section 3.3 Differentiation of Polynomials an Rational Functions In tis section we begin te task of iscovering rules for ifferentiating various classes of

More information

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND art I. robobabilystic Moels Computer Moelling an New echnologies 27 Vol. No. 2-3 ransport an elecommunication Institute omonosova iga V-9 atvia MOEING OF WO AEGIE IN INVENOY CONO YEM WIH ANOM EA IME AN

More information

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market RATIO MATHEMATICA 25 (2013), 29 46 ISSN:1592-7415 Optimal Control Policy of a Prouction an Inventory System for multi-prouct in Segmente Market Kuleep Chauhary, Yogener Singh, P. C. Jha Department of Operational

More information

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY Jörg Felhusen an Sivakumara K. Krishnamoorthy RWTH Aachen University, Chair an Insitute for Engineering

More information

HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT

HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT International Journal of Avance Research in Computer Engineering & Technology (IJARCET) HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT Pawan Kumar, Pijush Kanti Dutta Pramanik Computer Science

More information

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks Low-Complexity an Distribute Energy inimization in ulti-hop Wireless Networks Longbi Lin, Xiaojun Lin, an Ness B. Shroff Center for Wireless Systems an Applications (CWSA) School of Electrical an Computer

More information

Chapter 11: Feedback and PID Control Theory

Chapter 11: Feedback and PID Control Theory Chapter 11: Feeback an ID Control Theory Chapter 11: Feeback an ID Control Theory I. Introuction Feeback is a mechanism for regulating a physical system so that it maintains a certain state. Feeback works

More information

RUNESTONE, an International Student Collaboration Project

RUNESTONE, an International Student Collaboration Project RUNESTONE, an International Stuent Collaboration Project Mats Daniels 1, Marian Petre 2, Vicki Almstrum 3, Lars Asplun 1, Christina Björkman 1, Carl Erickson 4, Bruce Klein 4, an Mary Last 4 1 Department

More information

Web Appendices of Selling to Overcon dent Consumers

Web Appendices of Selling to Overcon dent Consumers Web Appenices of Selling to Overcon ent Consumers Michael D. Grubb A Option Pricing Intuition This appenix provies aitional intuition base on option pricing for the result in Proposition 2. Consier the

More information

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING Development of a Software Tool for Performance Evaluation of MIMO OFDM Alamouti using a didactical Approach as a Educational and Research support in Wireless Communications JOSE CORDOVA, REBECA ESTRADA

More information

Professional Level Options Module, Paper P4(SGP)

Professional Level Options Module, Paper P4(SGP) Answers Professional Level Options Moule, Paper P4(SGP) Avance Financial Management (Singapore) December 2007 Answers Tutorial note: These moel answers are consierably longer an more etaile than woul be

More information

Security Vulnerabilities and Solutions for Packet Sampling

Security Vulnerabilities and Solutions for Packet Sampling Security Vulnerabilities an Solutions for Packet Sampling Sharon Golberg an Jennifer Rexfor Princeton University, Princeton, NJ, USA 08544 {golbe, jrex}@princeton.eu Abstract Packet sampling supports a

More information

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5 Binomial Moel Hull, Chapter 11 + ections 17.1 an 17.2 Aitional reference: John Cox an Mark Rubinstein, Options Markets, Chapter 5 1. One-Perio Binomial Moel Creating synthetic options (replicating options)

More information

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments 2012 IEEE Wireless Communications an Networking Conference: Services, Applications, an Business Game Theoretic Moeling of Cooperation among Service Proviers in Mobile Clou Computing Environments Dusit

More information

Architectures and Platforms

Architectures and Platforms Hardware/Software Codesign Arch&Platf. - 1 Architectures and Platforms 1. Architecture Selection: The Basic Trade-Offs 2. General Purpose vs. Application-Specific Processors 3. Processor Specialisation

More information

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud Bellini: Ferrying Application Traffic Flows through Geo-istribute Datacenters in the Clou Zimu Liu, Yuan Feng, an Baochun Li Department of Electrical an Computer Engineering, University of Toronto Department

More information

Lagrangian and Hamiltonian Mechanics

Lagrangian and Hamiltonian Mechanics Lagrangian an Hamiltonian Mechanics D.G. Simpson, Ph.D. Department of Physical Sciences an Engineering Prince George s Community College December 5, 007 Introuction In this course we have been stuying

More information

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the

More information

Innovation Union means: More jobs, improved lives, better society

Innovation Union means: More jobs, improved lives, better society The project follows the Lisbon an Gothenburg Agenas, an supports the EU 2020 Strategy, in particular SMART Growth an the Innovation Union: Innovation Union means: More jobs, improve lives, better society

More information

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection Towars a Framework for Enterprise Frameworks Comparison an Selection Saber Aballah Faculty of Computers an Information, Cairo University Saber_aballah@hotmail.com Abstract A number of Enterprise Frameworks

More information

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters ThroughputScheuler: Learning to Scheule on Heterogeneous Haoop Clusters Shehar Gupta, Christian Fritz, Bob Price, Roger Hoover, an Johan e Kleer Palo Alto Research Center, Palo Alto, CA, USA {sgupta, cfritz,

More information

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National

More information

Exploratory Optimal Latin Hypercube Designs for Computer Simulated Experiments

Exploratory Optimal Latin Hypercube Designs for Computer Simulated Experiments Thailan Statistician July 0; 9() : 7-93 http://statassoc.or.th Contribute paper Exploratory Optimal Latin Hypercube Designs for Computer Simulate Experiments Rachaaporn Timun [a,b] Anamai Na-uom* [a,b]

More information

Cross-Over Analysis Using T-Tests

Cross-Over Analysis Using T-Tests Chapter 35 Cross-Over Analysis Using -ests Introuction his proceure analyzes ata from a two-treatment, two-perio (x) cross-over esign. he response is assume to be a continuous ranom variable that follows

More information

zupdate: Updating Data Center Networks with Zero Loss

zupdate: Updating Data Center Networks with Zero Loss zupate: Upating Data Center Networks with Zero Loss Hongqiang Harry Liu Yale University hongqiang.liu@yale.eu Lihua Yuan Microsoft lyuan@microsoft.com Xin Wu Duke University xinwu@cs.uke.eu Roger Wattenhofer

More information

Application Report ...

Application Report ... Application Report SNVA408B January 00 Revise April 03 AN-994 Moeling an Design of Current Moe Control Boost Converters... ABSTRACT This application note presents a etail moeling an esign of current moe

More information

Operation Count; Numerical Linear Algebra

Operation Count; Numerical Linear Algebra 10 Operation Count; Numerical Linear Algebra 10.1 Introduction Many computations are limited simply by the sheer number of required additions, multiplications, or function evaluations. If floating-point

More information

From Concept to Production in Secure Voice Communications

From Concept to Production in Secure Voice Communications From Concept to Production in Secure Voice Communications Earl E. Swartzlander, Jr. Electrical and Computer Engineering Department University of Texas at Austin Austin, TX 78712 Abstract In the 1970s secure

More information

Chapter 4: Elasticity

Chapter 4: Elasticity Chapter : Elasticity Elasticity of eman: It measures the responsiveness of quantity emane (or eman) with respect to changes in its own price (or income or the price of some other commoity). Why is Elasticity

More information

Quiz for Chapter 6 Storage and Other I/O Topics 3.10

Quiz for Chapter 6 Storage and Other I/O Topics 3.10 Date: 3.10 Not all questions are of equal difficulty. Please review the entire quiz first and then budget your time carefully. Name: Course: Solutions in Red 1. [6 points] Give a concise answer to each

More information

A New Pricing Model for Competitive Telecommunications Services Using Congestion Discounts

A New Pricing Model for Competitive Telecommunications Services Using Congestion Discounts A New Pricing Moel for Competitive Telecommunications Services Using Congestion Discounts N. Keon an G. Ananalingam Department of Systems Engineering University of Pennsylvania Philaelphia, PA 19104-6315

More information

Measures of distance between samples: Euclidean

Measures of distance between samples: Euclidean 4- Chapter 4 Measures of istance between samples: Eucliean We will be talking a lot about istances in this book. The concept of istance between two samples or between two variables is funamental in multivariate

More information

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification 2.0 page 1 Recital The acceptance an introuction of serial communication to more an more applications

More information

Forecasting and Staffing Call Centers with Multiple Interdependent Uncertain Arrival Streams

Forecasting and Staffing Call Centers with Multiple Interdependent Uncertain Arrival Streams Forecasting an Staffing Call Centers with Multiple Interepenent Uncertain Arrival Streams Han Ye Department of Statistics an Operations Research, University of North Carolina, Chapel Hill, NC 27599, hanye@email.unc.eu

More information

Data Center Power System Reliability Beyond the 9 s: A Practical Approach

Data Center Power System Reliability Beyond the 9 s: A Practical Approach Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical

More information

Khalid Sayood and Martin C. Rost Department of Electrical Engineering University of Nebraska

Khalid Sayood and Martin C. Rost Department of Electrical Engineering University of Nebraska PROBLEM STATEMENT A ROBUST COMPRESSION SYSTEM FOR LOW BIT RATE TELEMETRY - TEST RESULTS WITH LUNAR DATA Khalid Sayood and Martin C. Rost Department of Electrical Engineering University of Nebraska The

More information

A Computer Vision System on a Chip: a case study from the automotive domain

A Computer Vision System on a Chip: a case study from the automotive domain A Computer Vision System on a Chip: a case study from the automotive domain Gideon P. Stein Elchanan Rushinek Gaby Hayun Amnon Shashua Mobileye Vision Technologies Ltd. Hebrew University Jerusalem, Israel

More information

CDMA TECHNOLOGY. Brief Working of CDMA

CDMA TECHNOLOGY. Brief Working of CDMA CDMA TECHNOLOGY History of CDMA The Cellular Challenge The world's first cellular networks were introduced in the early 1980s, using analog radio transmission technologies such as AMPS (Advanced Mobile

More information

5 Isotope effects on vibrational relaxation and hydrogen-bond dynamics in water

5 Isotope effects on vibrational relaxation and hydrogen-bond dynamics in water 5 Isotope effects on vibrational relaxation an hyrogen-bon ynamics in water Pump probe experiments HDO issolve in liqui H O show the spectral ynamics an the vibrational relaxation of the OD stretch vibration.

More information

Example Optimization Problems selected from Section 4.7

Example Optimization Problems selected from Section 4.7 Example Optimization Problems selecte from Section 4.7 19) We are aske to fin the points ( X, Y ) on the ellipse 4x 2 + y 2 = 4 that are farthest away from the point ( 1, 0 ) ; as it happens, this point

More information

11 CHAPTER 11: FOOTINGS

11 CHAPTER 11: FOOTINGS CHAPTER ELEVEN FOOTINGS 1 11 CHAPTER 11: FOOTINGS 11.1 Introuction Footings are structural elements that transmit column or wall loas to the unerlying soil below the structure. Footings are esigne to transmit

More information

! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6

! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6 ! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6 9 Quality signposting : the role of online information prescription in proviing patient information Liz Brewster & Barbara Sen Information School,

More information

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach Minimizing Makespan in Flow Shop Scheuling Using a Network Approach Amin Sahraeian Department of Inustrial Engineering, Payame Noor University, Asaluyeh, Iran 1 Introuction Prouction systems can be ivie

More information

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014 Consumer Referrals Maria Arbatskaya an Hieo Konishi October 28, 2014 Abstract In many inustries, rms rewar their customers for making referrals. We analyze the optimal policy mix of price, avertising intensity,

More information

Digital barrier option contract with exponential random time

Digital barrier option contract with exponential random time IMA Journal of Applie Mathematics Avance Access publishe June 9, IMA Journal of Applie Mathematics ) Page of 9 oi:.93/imamat/hxs3 Digital barrier option contract with exponential ranom time Doobae Jun

More information

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions A Generalization of Sauer s Lemma to Classes of Large-Margin Functions Joel Ratsaby University College Lonon Gower Street, Lonon WC1E 6BT, Unite Kingom J.Ratsaby@cs.ucl.ac.uk, WWW home page: http://www.cs.ucl.ac.uk/staff/j.ratsaby/

More information

Chapter 07: Instruction Level Parallelism VLIW, Vector, Array and Multithreaded Processors. Lesson 05: Array Processors

Chapter 07: Instruction Level Parallelism VLIW, Vector, Array and Multithreaded Processors. Lesson 05: Array Processors Chapter 07: Instruction Level Parallelism VLIW, Vector, Array and Multithreaded Processors Lesson 05: Array Processors Objective To learn how the array processes in multiple pipelines 2 Array Processor

More information

ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014

ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014 ISSN: 77-754 ISO 900:008 Certifie International Journal of Engineering an Innovative echnology (IJEI) Volume, Issue, June 04 Manufacturing process with isruption uner Quaratic Deman for Deteriorating Inventory

More information

MIMO detector algorithms and their implementations for LTE/LTE-A

MIMO detector algorithms and their implementations for LTE/LTE-A GIGA seminar 11.01.2010 MIMO detector algorithms and their implementations for LTE/LTE-A Markus Myllylä and Johanna Ketonen 11.01.2010 2 Outline Introduction System model Detection in a MIMO-OFDM system

More information

This post is not eligible for sponsorship and applicants must be eligible to work in the UK under present visa arrangements.

This post is not eligible for sponsorship and applicants must be eligible to work in the UK under present visa arrangements. WMG 7.60 per hour Ref: WMG005/15 Fixe Term Contract: 4 Weeks Full Time to be unertaken in summer 2015 (with the possibility of a further 4 weeks employment, applicants must therefore be available for the

More information

Differentiability of Exponential Functions

Differentiability of Exponential Functions Differentiability of Exponential Functions Philip M. Anselone an John W. Lee Philip Anselone (panselone@actionnet.net) receive his Ph.D. from Oregon State in 1957. After a few years at Johns Hopkins an

More information

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law Detecting Possibly Frauulent or Error-Prone Survey Data Using Benfor s Law Davi Swanson, Moon Jung Cho, John Eltinge U.S. Bureau of Labor Statistics 2 Massachusetts Ave., NE, Room 3650, Washington, DC

More information

An Introduction to Event-triggered and Self-triggered Control

An Introduction to Event-triggered and Self-triggered Control An Introuction to Event-triggere an Self-triggere Control W.P.M.H. Heemels K.H. Johansson P. Tabuaa Abstract Recent evelopments in computer an communication technologies have le to a new type of large-scale

More information

Control 2004, University of Bath, UK, September 2004

Control 2004, University of Bath, UK, September 2004 Control, University of Bath, UK, September ID- IMPACT OF DEPENDENCY AND LOAD BALANCING IN MULTITHREADING REAL-TIME CONTROL ALGORITHMS M A Hossain and M O Tokhi Department of Computing, The University of

More information

INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena *1, K. Upendra Chowdary 2

INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena *1, K. Upendra Chowdary 2 ISSN 2277-2685 IJESR/June 2014/ Vol-4/Issue-6/333-337 Y. Naveena et al./ International Journal of Engineering & Science Research INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena

More information

Reconfigurable Architecture Requirements for Co-Designed Virtual Machines

Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Kenneth B. Kent University of New Brunswick Faculty of Computer Science Fredericton, New Brunswick, Canada ken@unb.ca Micaela Serra

More information

Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence

Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence Seeing the Unseen: Revealing Mobile Malware Hien Communications via Energy Consumption an Artificial Intelligence Luca Caviglione, Mauro Gaggero, Jean-François Lalane, Wojciech Mazurczyk, Marcin Urbanski

More information

A Lab Course on Computer Architecture

A Lab Course on Computer Architecture A Lab Course on Computer Architecture Pedro López José Duato Depto. de Informática de Sistemas y Computadores Facultad de Informática Universidad Politécnica de Valencia Camino de Vera s/n, 46071 - Valencia,

More information

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations This page may be remove to conceal the ientities of the authors An intertemporal moel of the real exchange rate, stock market, an international ebt ynamics: policy simulations Saziye Gazioglu an W. Davi

More information

Voice services over Adaptive Multi-user Orthogonal Sub channels An Insight

Voice services over Adaptive Multi-user Orthogonal Sub channels An Insight TEC Voice services over Adaptive Multi-user Orthogonal Sub channels An Insight HP 4/15/2013 A powerful software upgrade leverages quaternary modulation and MIMO techniques to improve network efficiency

More information

Modeling a GPS Receiver Using SystemC

Modeling a GPS Receiver Using SystemC Modeling a GPS Receiver using SystemC Modeling a GPS Receiver Using SystemC Bernhard Niemann Reiner Büttner Martin Speitel http://www.iis.fhg.de http://www.iis.fhg.de/kursbuch/kurse/systemc.html The e

More information

Achieving quality audio testing for mobile phones

Achieving quality audio testing for mobile phones Test & Measurement Achieving quality auio testing for mobile phones The auio capabilities of a cellular hanset provie the funamental interface between the user an the raio transceiver. Just as RF testing

More information

Option Pricing for Inventory Management and Control

Option Pricing for Inventory Management and Control Option Pricing for Inventory Management an Control Bryant Angelos, McKay Heasley, an Jeffrey Humpherys Abstract We explore the use of option contracts as a means of managing an controlling inventories

More information

Introduction to Integration Part 1: Anti-Differentiation

Introduction to Integration Part 1: Anti-Differentiation Mathematics Learning Centre Introuction to Integration Part : Anti-Differentiation Mary Barnes c 999 University of Syney Contents For Reference. Table of erivatives......2 New notation.... 2 Introuction

More information

Optimal Energy Commitments with Storage and Intermittent Supply

Optimal Energy Commitments with Storage and Intermittent Supply Submitte to Operations Research manuscript OPRE-2009-09-406 Optimal Energy Commitments with Storage an Intermittent Supply Jae Ho Kim Department of Electrical Engineering, Princeton University, Princeton,

More information

Web Appendices to Selling to Overcon dent Consumers

Web Appendices to Selling to Overcon dent Consumers Web Appenices to Selling to Overcon ent Consumers Michael D. Grubb MIT Sloan School of Management Cambrige, MA 02142 mgrubbmit.eu www.mit.eu/~mgrubb May 2, 2008 B Option Pricing Intuition This appenix

More information

Vector Signal Analyzer FSQ-K70

Vector Signal Analyzer FSQ-K70 Product brochure Version 02.00 Vector Signal Analyzer FSQ-K70 July 2004 Universal demodulation, analysis and documentation of digital radio signals For all major mobile radio communication standards: GSM

More information

An Alternative Approach of Operating a Passive RFID Device Embedded on Metallic Implants

An Alternative Approach of Operating a Passive RFID Device Embedded on Metallic Implants An Alternative Approach of Operating a Passive RFID Device Embee on Metallic Implants Xiaoyu Liu, Ravi Yalamanchili, Ajay Ogirala an Marlin Mickle RFID Center of Excellence, Department of Electrical an

More information

Malawi Television White Spaces (TVWS) Pilot Network Performance Analysis

Malawi Television White Spaces (TVWS) Pilot Network Performance Analysis Journal of Wireless Networking an Communications 2014, 4(1): 26-32 DOI: 10.5923/j.jwnc.20140401.04 Malawi Television White Spaces (TVWS) Pilot Network Performance Analysis C. Mikeka 1,*, M. Thoi 1, J.

More information

HD Radio FM Transmission System Specifications Rev. F August 24, 2011

HD Radio FM Transmission System Specifications Rev. F August 24, 2011 HD Radio FM Transmission System Specifications Rev. F August 24, 2011 SY_SSS_1026s TRADEMARKS HD Radio and the HD, HD Radio, and Arc logos are proprietary trademarks of ibiquity Digital Corporation. ibiquity,

More information

Reconfigurable Low Area Complexity Filter Bank Architecture for Software Defined Radio

Reconfigurable Low Area Complexity Filter Bank Architecture for Software Defined Radio Reconfigurable Low Area Complexity Filter Bank Architecture for Software Defined Radio 1 Anuradha S. Deshmukh, 2 Prof. M. N. Thakare, 3 Prof.G.D.Korde 1 M.Tech (VLSI) III rd sem Student, 2 Assistant Professor(Selection

More information

Integer Computation of Image Orthorectification for High Speed Throughput

Integer Computation of Image Orthorectification for High Speed Throughput Integer Computation of Image Orthorectification for High Speed Throughput Paul Sundlie Joseph French Eric Balster Abstract This paper presents an integer-based approach to the orthorectification of aerial

More information

Different approaches for the equalization of automotive sound systems

Different approaches for the equalization of automotive sound systems Auio Engineering Society Convention Paper Presente at the 112th Convention 2002 May 10 13 Munich, Germany This convention paper has been reprouce from the author's avance manuscript, without eiting, corrections,

More information

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines EUROGRAPHICS 2000 / M. Gross an F.R.A. Hopgoo Volume 19, (2000), Number 3 (Guest Eitors) Unsteay Flow Visualization by Animating Evenly-Space Bruno Jobar an Wilfri Lefer Université u Littoral Côte Opale,

More information

How To Understand The Structure Of A Can (Can)

How To Understand The Structure Of A Can (Can) Thi t t ith F M k 4 0 4 BOSCH CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 50, D-7000 Stuttgart 1 The ocument as a whole may be copie an istribute without restrictions. However, the

More information

Attaining EDF Task Scheduling with O(1) Time Complexity

Attaining EDF Task Scheduling with O(1) Time Complexity Attaining EDF Task Scheduling with O(1) Time Complexity Verber Domen University of Maribor, Faculty of Electrical Engineering and Computer Sciences, Maribor, Slovenia (e-mail: domen.verber@uni-mb.si) Abstract:

More information

High-Speed SERDES Interfaces In High Value FPGAs

High-Speed SERDES Interfaces In High Value FPGAs High-Speed SERDES Interfaces In High Value FPGAs February 2009 Lattice Semiconductor 5555 Northeast Moore Ct. Hillsboro, Oregon 97124 USA Telephone: (503) 268-8000 www.latticesemi.com 1 High-Speed SERDES

More information