Performance Evaluation of Multiple IEEE b WLAN Stations in the Presence of Bluetooth Radio Interference
|
|
- Evangeline Stevens
- 7 years ago
- Views:
Transcription
1 Performance Evaluation of Multiple IEEE b WLAN Station in the Preence of Bluetooth Radio Interference Jung-Hyuck Jo and Nikil Jayant Georgia ech Broadband Intitute, Georgia Intitute of echnology, th St., NW, Atlanta, GA 30318, U.S.A. Phone: , fax: , {jhjo, Atract here are everal paper publihed in the pat few year about the evaluation of IEEE (b) WLAN performance degradation due to Bluetooth radio interference. he network topologie ued for WLAN in the previou literature are point-to-point, i.e., one AP and one WLAN tation. In thi paper we evaluate a performance of IEEE (b) ytem compoed of an AP and multiple WLAN tation uing the ame 2.4GHz frequency band in the preence of Bluetooth radio ytem within a BSS. Our reult focu on the impact of Bluetooth interference on IEEE (b) WLAN ytem. he throughput of IEEE (b) i etimated a a function of not only WLAN parameter but alo Bluetooth radio ytem parameter. Further, we derived theoretical maximum throughput of IEEE (b) ytem with perfect channel condition in order to compare with other cenario that conidering interference and competition with other WLAN tation. A a reult, with light and heavy B uage cenario, the IEEE (b) ytem throughput are degraded by 25% and 66%, repectively.. Index erm IEEE , Bluetooth, interference, wirele LAN I INRODUCION HE evaluation of interference in the 2.4 GHz band ha been receiving more attention lately. Kamerman [1] report on tolerable interference level between Bluetooth and device for variou cenario and device poition. Hi analyi i baed on a imple path lo model and Signal to Interference (SIR) requirement for Bluetooth and receiver. Furthermore, the probability of an packet error in the preence of a Bluetooth piconet ha been derived by Enni, and then extended by Shellhammer [2]. Golmie and Mouveaux [3] evaluated the impact of WLAN and other Bluetooth interference on the Bluetooth acce control layer performance. he previouly publihed literature [1][2][3][4][5] dealt with a point-to-point network topology for IEEE (b) WLAN ytem. In thi paper, we evaluate the performance of IEEE (b) ytem compoed of an Acce Point (AP) and multiple WLAN tation (SA) in the preence of Bluetooth (B) radio ytem. Analyi of interference between the IEEE (b) and Bluetooth i not new. Early attempt to ae interference effect have been baed on imple geometric model [2][5]. Our goal in thi paper i to evaluate the performance of IEEE (b) DSSS ytem not imply compoed of one AP and one WLAN tation pair but compoed of one AP and multiple WLAN in the preence of. hi work wa upported by NCR and Georgia ech Broadband Intitute B radio ytem within a baic-uet (BSS). he latter cenario i a more realitic ituation that can be found in emerging office or home environment. We therefore conider the performance of IEEE (b) ytem that i affected not only by multiple WLAN tation but alo by uncoordinated Bluetooth radio interference within a BSS. he remainder of the paper i organized a follow. In Section II the IEEE (b) MAC i modeled, and in Section III the interference model between IEEE (b) WLAN ytem and Bluetooth radio ytem i preented. Finally, numerical reult of imulation baed on the interference model are preented in Section IV and concluding remark are given in Section V. II MODELING OF IEEE (B) MAC Performance evaluation of IEEE (b) MAC protocol poe everal challenge. he preence of hidden tation, ue of carrier ening, and decentralized nature of multiple acce method, are ome of the key factor that impact on ytem performance. In thi tudy we ued H. S. Chhaya [6] model to evaluate the performance WLAN ytem within a ingle BSS. Before proceeding further we need to introduce the following notation: A i (d): a et of tation in a circular area of radiu d around tation i. X i : a location of tation i D : a ditance between tation i and tation j α: capture parameter, α 1 d : αd H j (d): a et of tation that are hidden from tation j and are in a circle of radiu d around j H (d): a et of tation that are hidden from tation i but not from tation j in a circle of radiu d around tation j β: propagation delay including carrier ening delay (in wirele network the propagation delay i dominated by the carrier ening delay given the mall diameter of BSS, i.e., le than 100m) l: the length of a pay load thi doe not include PHY and MAC header. l type i the length of a type frame. A in [6], the implifying aumption are ued. We ignore the effect of frame error due to bit error introduced by channel noie. Limited tation mobility i aumed, which mean that all tation that are currently tranmitting or receiving a data or a control frame remain tationary until the completion of the tranaction /03/$ IEEE 1163
2 Conider a cae where tation i tart the tranmiion of a data frame of length l from tation i to tation j at time t uing baic acce method. We begin by auming that all data frame are of identical ize. he tranmiion will be ucceful only if the following condition are atified: i) the x and the Rx are not hidden from each other; ii) no tation in the Rx capture area that i not hidden from the Rx, tranmit in the time interval (t - β, t + β); iii) no tation in the x capture area that i not hidden from the x, receive uccefully a data frame whoe tranmiion wa initiated in the time interval (t - β, t + β); iv) no tation in H (d ) tranmit during the interval (t, t + l); v) no tation in H ji (d ) tranmit in the interval (t + l + DIFS, t + l + max{difs, SIFS + l ack }). Fig. 1 illutrate the above condition of ii, iii, iv, and v for a pair of tation to tranmit a data frame uccefully. We aume that once the channel i ened idle and a time interval DIFS ha elaped, the time until a data frame i generated at tation i i aumed to be exponentially ditributed with rate i). For notational convenience we define G:=Σ i Ai). For implicity we aume that tranmiion from any tation that are detined for ditinct detination are independent. Let S be the normalized ytem throughput, defined a the fraction of time the channel i ued to uccefully tranmit payload bit. Let be the renewal interval, i.e., the average time the channel i ened buy becaue of ucceful tranmiion, and c be the average time the channel i ened buy by each tation during colliion. he upercript tand for baic acce method and rc for RS/CS acce method. For the renewal interval of ucce tranmiion and failure, we obtain c rc c = PHYHD + MAC + β + 1/ G = PHY + MAC = PHYHD + MACHD + l + β + l + SIFS + β + l = l RS HD HD HD + DIFS + β + 1/ G theor _ max + l + SIFS + β + l + l + DIFS + β + 1/ G RS ACK S = ACK + DIFS + SIFS + β + lcs + SIFS + DIFS + β + 1/ G l ( 1 ) ( 2 ) where, 1/G i the time until the initiation of the firt tranmiion once the channel ha been ened idle for more than DIFS. Baed on thee renewal interval we can alo calculate theoretical maximum throughput, S theor_max, of baic acce method and RS/CS acce method in (2) and the Fig. 2 how thi reult in plot. In thi theoretical maximum throughput, we aume perfect channel condition, no interference, no competing tation, and compatibility among 1Mbp, 2Mbp, 5.5Mbp, and 11Mbp mode. he compatibility mode with variou network data rate mean that A j - H j iv ii A i - H i A i & A j v iii H H ji Fig. 1. IEEE : Illutration of ucceful tranmiion of data frame from SA i to SA j for baic acce method. Among the 5 condition, ii, iii, iv, and v condition are hown in thi figure. Black olid arrow line repreent tranmiion of a data frame, black dotted arrow line repreent tranmiion of an ACK, and red dotted line repreent undeired reception by SA j, which reult in colliion. A circle denote capture area. hroughput Pay Data [byte] RS/CS 2Mbp RS/CS 11Mbp Baic 2Mbp Baic 11Mbp Fig. 2. heoretical maximum throughput of IEEE (b) ytem for baic acce method and RS/CS acce method. hroughput i normalized to it raw data rate. the PHY layer header operate at the peed of lowet rate,1mbp, and the data rate change from MAC header according to the information from PHY layer header. Let u define C(i, to be the et of x-rx pair (m, uch that, C( i, {( m, : m A ( d' ) H ( d' ) or ( 3 ) n A ( d' ) H ( d' )} i i j j 1164
3 For baic acce method, we can define p (i) a the probability that a tranmiion of a data frame from tation i to AP i ucceful. p ( i) [ 1 p ( i) ] + l h k H ( d ' ) k) exp{ [ β + max{0, SIFS + l For RS/CS acce method, p rc ( i) [ 1 p ( i) ] + l h RS k H ( d ' ) ack exp{ [ β k)]} ( m, C ( i, DIFS} ( m, C ( i, m, k H ji ( d ' ) m, k)]} ( 4 ) ( 5 ) B DSSS τ ΒΤ B x y p Fig. 3. ime coincidence between a B piconet lot and a IEEE b packet. For example, if x < p < y, then the IEEE b packet could collide with 2 or 3 B lot db where a tation j i regarded a AP, and p h (i) i the probability of tation i being hidden from AP. hen the throughput of tation i, S(i) i, S( i) = i) p ( i) + p ( i)(1 e G p c c β i) + (1 p ) ( m, C ( i, c ) m, G ( 6 ) 11MHz 22MHz 11MHz Fig. 4. Simplified WLAN receiver filter frequency repone where p c i a probability of colliion with a competing SA. Since l ack + β << l we aume that c, then the denominator reduce to. he overall ytem throughput i given by, S = S i) i A ( ( 7 ) III INERFERENCE MODELING A. Channel Model For the indoor channel model, we apply a propagation model coniting of two part. Line-of-ight (LOS) propagation i aumed for the firt 8 meter. Beyond thi point, path lo increae a function of r, where r i range and n = 3.3. hi can be expreed in term of decibel: L path = FSL + 20 log(4πr / λ), r 8m = nlog( r /8), r > 8m ( 8 ) where, λ i free pace wavelength at 2.45 GHz, and r i range. FSL i the free pace path lo in db determined in the far field of the antenna. Uually for indoor environment, thi i calculated to be 1 or 10 meter. he n factor ha been determined from empirical data collected and can be found in the reference by [8]. For line of ight application in hallway the n factor i le than 2. hi i due to the wave-guide effect provided by the propertie of hallway or corridor. hi model i imilar to the one ued by Kammerman [1]. A Bluetooth FH ytem interfere with the IEEE (b) ytem a a kind of an interference tone. A long a the IEEE (b) receiver get a deired ignal that i 10dB tronger than the in-channel interference tone, the activity of a B device doe not harm. B. Probability of ime Coincidence he time coincidence analyi i baed the model developed in [4][7]. he B piconet wa aumed to be uing ingle time lot packet only, a hown in the Fig. 3. It i aumed that thi i the wort-cae cenario, ince the ue of multiple time lot packet effectively reduce the B hop rate and increae throughput. hi reduce tranmiion time and reult in longer gap in B interference, thereby increaing the chance of ucceful reception of WLAN packet. Under thi aumption, a ingle B packet i tranmitted at each frequency hop with the B time lot duration, B = 625 µ, and the tranmiion time within the time lot, τ B = 366 µ. he IEEE b frame duration p can be up to 1210 µec including PHY and MAC layer header for a tranmiion of 1500 byte packet at the peed of 11Mbp. he tart of tranmiion relative to the B hop time i modeled a a uniform random variable. Under thi aumption, the number of B time lot overlapping in time with the IEEE b packet i either n or n-1 a hown in Fig. 3. he probability of overlapping with n B lot, P n i calculated baed on [4]. ( n 1) + τ FD ( 9 ) B B B n 1 =, Pn = 1 Pn 1 B P 1165
4 where FD i frame duration that include PHY and MAC layer header a well a pay load data. he maximum number of B lot, n max that could collide with IEEE b packet i 3 given that the maximum length of b frame duration i 1210 µec. C. Probability of Frequency Coincidence Frequency coincidence occur when the tranmit frequencie of a B piconet reult in a packet error. he method ued in [4] doe not take into account adjacent channel interference. he method ued in thi tudy follow [7] that incorporating out-of-band interference model. Baed on empirical data [1][4], the IEEE (b) can provide reliable ervice in the preence of narrow-band interferer uch a B tranmitter falling within the pa band given that the Signal-to-Interference Ratio (SIR) in (10) i greater than 10dB. he out-of-band interference model ued in [7], i modified. Intead of uing J (f offet ) of inc function, the narrow band ignal falling into out-of-band are attenuated 30dB more than the interference ignal falling into in-band (22MHz) a hown in Fig. 4. Note that the out-ofband region i 11 MHz wide on each ide of the pa band. I ( f o SIR = S I I ( f offet ) = 30, = 0, f f o offet offet offet ) > 11MHz < 11MHz [ db] and f offet < 22 MHz ( 10 ) where f offet i frequency offet from (b) channel center and I o (f offet ) i 0dB if the narrow band interferer fall into the pa band of 22MHz, and 30dB if within the 11MHz of the out-of pa band. Otherwie we aume that the narrow band interferer doe not affect IEEE (b) performance. D. Probability of Colliion A tudied in the model [1], even if a nearby B piconet i active, there i till a ignificant probability that the IEEE b tation receive uccefully a packet. For a B tranmiion to dirupt an b packet, there mut be an overlap in time and in frequency. he analyi preented here i baed olely on the ue of ingle time lot packet by the B piconet. It i aumed that thi i the wort-cae cenario, ince the ue of multiple time lot packet effectively reduce the B hop rate and increae throughput. hi reduce tranmiion time and reult in longer gap in B interference, thereby increaing the chance of ucceful reception of (b) packet. he probability of colliion model ued in thi tudy i baed on [3]. he probability of colliion with n lot overlap i P ( )) coll where L B i piconet load factor. Overall probability of colliion i P n = 1 (1 ( Phop L ( 11 ) B total = n coll n ( ( P 1 P ( n 1)) + ( P P ( ) coll ( 12 ) ABLE I NEWORK PARAMEERS: IEEE (B) AND BLUEOOH Parameter Value Probability of hidden tation 0.08 or 0.16 Capture parameter 1.5 Propagation delay 1[µec] WLAN data rate 2, 11[Mbp] Bluetooth data rate 1[Mbp] Slot duration 20[µec]] PHY header 128[bit] MAC header 272[bit] ACK 112[bit] CS 160[bit] RS 160[bit] SIFS 10[µec] DIFS 50[µec] WLAN EIRP 20[dBm] B EIRP 0[dBm] Noie floor -95[dBm] Max # of wall between SA 3 Max # of wall between B device 0 Max ditance between SA 60 2[m] Max ditance between B device 10[m] Lo per wall 15[dB] ABLE II B PICONE PARAMEERS FOR HE LIGH AND HEAVY NEWORK ACIVIY SCENARIOS L AND H, RESPECIVELY Scenario D B L B L % H % For more accurate etimate of IEEE (b) network throughput in the preence of interference, the B lot colliion with ACK packet i conidered. here can be multiple B piconet that are cloe enough to caue interference, and there i the poibility that multiple piconet could be active imultaneouly. he probability of interference from m B piconet i P ) m mult( m) = 1 (1 P total ( 13 ) IV NUMERICAL RESULS For the purpoe of obtaining numerical reult we conider a finite number of tation ditributed randomly throughout the BSS. We conidered one AP, 25 SA and B piconet with location a hown in Fig. 5. he tation location were picked to be uniformly ditributed in a 2-dimenional BSS of 60 m by 60 m quare. For IEEE (b) cenario, we conider the cae where the offered load due to all tation, i,, i, j A, i identical. hroughout it i aumed that the probability of hidden terminal, p h (i, i the ame for all tation pair i, j A. he propagation delay between tation i alo conidered contant for all tation pair. hi aumption i valid ince the maximum ditance between a pair of tation i m (diagonal ditance of a quare of a ide length of 60m, i.e., 1166
5 60m 30m hroughput Baic RS/CS Baic low_if RS/CS low_if Baic high_if RS/CS high_if AP 30m SA Fig. 5. Illutration of ditribution of AP, SA, and B piconet. AP i located center of BBS. SA and B piconet are uniformly ditributed over 60m by 60m quare. B 60m (a) Baic RS/CS Baic low_if RS/CS low_if Baic high_if RS/CS high_if hroughput Baic RS/CS Baic low_if RS/CS low_if Baic high_if RS/CS high_if hroughput (b) Fig. 7. IEEE b WLAN data rate of 11Mbp. p h = 0.16 (a) payload ize of 1000 byte and (b) payload ize of 1500 byte hroughput (a) (b) Baic RS/CS Baic low_if RS/CS low_if Baic high_if RS/CS high_if Fig. 6. IEEE WLAN data rate of 2Mbp. p h = 0.08 (a) payload ize of 100 byte and (b) payload ize of 1000 byte = 60 2). he IEEE (b) parameter ued for imulation are hown in able I. For the B topology, we aumed that B piconet are randomly ditributed a SA are without co-locating with SA. In [4], it i however aumed that there i one B piconet co-located with each IEEE WLAN SA and the former one i more practical ituation. For the B piconet parameter and B uer cenario, the ame value and cenario are ued a in [7]. D B i B piconet denity in piconet/m 2. he B piconet parameter value for imulation are in able II. wo B piconet cenario are conidered: L i light B piconet cenario and H i heavy B piconet cenario. he light B piconet traffic activity wa baed on etimate for typical uage for a B piconet in an enterprie etting provided by Bluetooth SIG a reported in [4][7]. For the heavy B piconet cenario, the B piconet denity, D B wa doubled from 0.04 piconet/m 2 to 0.08 piconet/m 2, and the data tranmitted per day were increaed from 150 Kbyte/day to 10 Mbyte/day. hroughout the imulation throughput and offered load are normalized to raw data rate of IEEE (b) ytem. he imulation reult with the WLAN data rate of 2 Mbp, p h = 0.08, i hown in Fig. 6 (a) with payload of 100 byte and (b) with payload of 1000 byte. A hown in Fig. 2, at a WLAN data rate of 2 Mbp, the maximum throughput achievable theoretically i 30% with baic acce method and 20% with RS/CS acce method auming a perfect channel condition. hu, the maximum throughput in Fig. 6 (a) i 23% with baic acce method and 17% with RS/CS acce method due to channel imperfection and competing tation even without B interference. Due to the mall payload ize of 100 byte, baic acce method perform better than RS/CS method with light or heavy B uer cenario. However, in Fig. 6 (b) with payload ize of
6 byte, RS/CS acce method perform better than baic acce method with light and heavy B uer cenario. With a light B uer cenario in Fig. 6 (b), the throughput degraded 25% and with a heavy B uer cenario the throughput degraded 66%. With IEEE b WLAN ytem at a data rate of 11 Mbp in Fig. 7, we aumed the p h i doubled from 0.08 to 0.16 due to the horter range of 11 Mbp WLAN ytem than 2 Mbp WLAN ytem. Under thi aumption with a payload ize of 1000 byte in (a) and 1500 byte in (b), offered load of up to 50% and 40% repectively, the baic acce method perform lightly better than RS/CS acce method. With a light B uer cenario in Fig. 7 (b), the throughput degraded 23% and with high B uer cenario the throughput degraded 66%. V. CONCLUSION In thi paper we evaluated the throughput of multiple IEEE (b) WLAN SA ytem within a BSS in the preence of multiple B radio interference. he WLAN parameter a well a B piconet parameter affected on the throughput of multiple IEEE (b) WLAN SA. With a light and a heavy B uer cenario, the throughput of multiple WLAN SA ytem degraded 25%, and 66% repectively regardle of the WLAN data rate of 2 Mbp and 11 Mbp. In potential future work, a real building databae with interior wall could be ued intead of uing a normalized quare hape a a building databae. In thi cae we could ue a more realitic, ite-pecific ray-tracing model intead of log-normal ditribution channel model. REFERENCES [1] A. Kamerman, Coexitence between Bluetooth and IEEE CCK olution to avoid mutual interference, Lucent echnologie Bell Laoratorie, Jan [2] S. Shellhammer, Packet error rate of an IEEE WLAN in the preence of Bluetooth, in IEEE P /133r0, Seattle, Wahington, May [3] N. Golmie and F. Mouveaux, Interference in the 2.4 GHz ISM band: Impact on the Bluetooth acce control performance, in Proceeding of IEEE ICC, Helinki, Finland, June [4] J. Zyren, Reliability of IEEE WLAN in preence of Bluetooth radio, in IEEE P /073r0, Santa Roa, California, Sept [5] N. Golmie, R. E. Van Dyck, and A. Soltanian, Bluetooth and b Interference: imulation model and ytem reult, in IEEE /195R0, Apr [6] H. S. Chhaya, Performance evaluation of the IEEE MAC protocol for wirele LAN, Mater hei, Illinoi Intitute of echnology, Chicago, Illinoi, May [7] I. Howitt, WLAN and WPAN coexitence in UL band, IEEE ran. Veh. echnol., vol. 50, no. 4, pp , July [8]. S. Rappaport, Wirele Communication. Prentice Hall,
d t Thus, L R ECS 152A Computer Networks Fall 2002 HW 7 Solutions
ECS 52A Computer Network Fall 2002 HW 7 Solution. (5 pt) Conider four tation that are attached to two different bu cable. The tation exchange fixed-ize packet of length ec. Time i divided into lot of ec.
More informationBluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
More informationName: SID: Instructions
CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/
More informationPerformance of Multiple TFRC in Heterogeneous Wireless Networks
Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding
More informationControl of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling
Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada
More informationA technical guide to 2014 key stage 2 to key stage 4 value added measures
A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool
More informationTwo Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL
Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy
More informationA New Optimum Jitter Protection for Conversational VoIP
Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill
More informationGabriel E. Arrobo and Richard D. Gitlin, NAI Charter Fellow
Technology and Innovation, Vol. 15, pp. 227 236, 2013 1949-8241/13 $90.00 +.00 Printed in the USA. All right reerved. DOI: http://dx.doi.org/10.3727/194982413x13790020921825 Copyright ã 2013 Cognizant
More informationAvailability of WDM Multi Ring Networks
Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity
More information... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
More informationCSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
More informationReport 4668-1b 30.10.2010. Measurement report. Sylomer - field test
Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of
More informationCHAPTER 5 BROADBAND CLASS-E AMPLIFIER
CHAPTER 5 BROADBAND CLASS-E AMPLIFIER 5.0 Introduction Cla-E amplifier wa firt preented by Sokal in 1975. The application of cla- E amplifier were limited to the VHF band. At thi range of frequency, cla-e
More informationBUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE
Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia
More information802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
More informationMobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN
Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationQueueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,
MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection
More informationTurbulent Mixing and Chemical Reaction in Stirred Tanks
Turbulent Mixing and Chemical Reaction in Stirred Tank André Bakker Julian B. Faano Blend time and chemical product ditribution in turbulent agitated veel can be predicted with the aid of Computational
More informationSCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com
More informationCHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY
Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad
More informationProgress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools
Progre 8 meaure in 2016, 2017, and 2018 Guide for maintained econdary chool, academie and free chool July 2016 Content Table of figure 4 Summary 5 A ummary of Attainment 8 and Progre 8 5 Expiry or review
More informationPerformance Evaluation and Delay Modelling of VoIP Traffic over 802.11 Wireless Mesh Network
International Journal of Computer Application (975 8887) Volume 1 No.9, May 11 Performance Evaluation and Delay Modelling of VoIP Traffic over 8.11 Wirele Meh Network Amit Chhabra Dept. of CSE SDDIET,
More informationHeat transfer to or from a fluid flowing through a tube
Heat tranfer to or from a fluid flowing through a tube R. Shankar Subramanian A common ituation encountered by the chemical engineer i heat tranfer to fluid flowing through a tube. Thi can occur in heat
More informationv = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t
Chapter 2 Motion in One Dimenion 2.1 The Important Stuff 2.1.1 Poition, Time and Diplacement We begin our tudy of motion by conidering object which are very mall in comparion to the ize of their movement
More informationAssessing the Discriminatory Power of Credit Scores
Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,
More informationTowards Control-Relevant Forecasting in Supply Chain Management
25 American Control Conference June 8-1, 25. Portland, OR, USA WeA7.1 Toward Control-Relevant Forecating in Supply Chain Management Jay D. Schwartz, Daniel E. Rivera 1, and Karl G. Kempf Control Sytem
More informationINFORMATION Technology (IT) infrastructure management
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning
More informationUnit 11 Using Linear Regression to Describe Relationships
Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory
More informationWi-Fi and Bluetooth - Interference Issues
Wi-Fi and Bluetooth - Interference Issues January 2002 1 Introduction Because both Wi-Fi and Bluetooth wireless technology share spectrum and will often be located in close physical proximity to one another,
More informationA Spam Message Filtering Method: focus on run time
, pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationPerformance Evaluation of a Bluetooth Channel Estimation Algorithm
Performance Evaluation of a Bluetooth Channel Estimation Algorithm N. Golmie National Institute of Standards and Technology Gaithersburg, Maryland 2899 Abstract Since Bluetooth devices have to share the
More informationDigital Communication Systems
Digital Communication Sytem The term digital communication cover a broad area of communication technique, including digital tranmiion and digital radio. Digital tranmiion, i the tranmitted of digital pule
More informationRedesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring
Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June
More informationWireless and Battery-less Sensor Using RF Energy Harvesting
DOI.56/etc4/. Wirele and Battery-le Senor Uing RF Energy Harveting Chritian Merz, Gerald Kupri, Maximilian Niedernhuber 3 Deggendorf Intitute of Technology, Edlmairtr. 6 + 8, 94469 Deggendorf, Germany
More informationAcceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds
Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden
More informationUtility-Based Flow Control for Sequential Imagery over Wireless Networks
Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building
More informationPerformance of a Browser-Based JavaScript Bandwidth Test
Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further
More informationGroup Mutual Exclusion Based on Priorities
Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio
More informationECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
More information6. Friction, Experiment and Theory
6. Friction, Experiment and Theory The lab thi wee invetigate the rictional orce and the phyical interpretation o the coeicient o riction. We will mae ue o the concept o the orce o gravity, the normal
More information1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation
Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted
More information802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved
802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"
More informationWireless Personal Area Networks (WPANs)
Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and
More informationOptical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng
Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare
More informationLinear Momentum and Collisions
Chapter 7 Linear Momentum and Colliion 7.1 The Important Stuff 7.1.1 Linear Momentum The linear momentum of a particle with ma m moving with velocity v i defined a p = mv (7.1) Linear momentum i a vector.
More informationExposure Metering Relating Subject Lighting to Film Exposure
Expoure Metering Relating Subject Lighting to Film Expoure By Jeff Conrad A photographic expoure meter meaure ubject lighting and indicate camera etting that nominally reult in the bet expoure of the film.
More informationA TCP-like Adaptive Contention Window Scheme for WLAN
A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan
More informationSenior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow
Senior Thei Hore Play Optimal Wager and the Kelly Criterion Author: Courtney Kempton Supervior: Profeor Jim Morrow June 7, 20 Introduction The fundamental problem in gambling i to find betting opportunitie
More informationA note on profit maximization and monotonicity for inbound call centers
A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an
More informationRisk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms
Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,
More informationNetworks. Master of Science (Computer Science and Engineering), December 2004, 45 pp.,
Park, Sangtae, Optimal Access Point Selection and Channel Assignment in IEEE 802.11 Networks. Master of Science (Computer Science and Engineering), December 2004, 45 pp., 9 tables, 17 figures, 29 titles.
More informationCASE STUDY ALLOCATE SOFTWARE
CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT
More informationFLUID MECHANICS. TUTORIAL No.4 FLOW THROUGH POROUS PASSAGES
FLUID MECHANICS TUTORIAL No.4 FLOW THROUGH POROUS PASSAGES In thi tutorial you will continue the work on laminar flow and develop Poieuille' equation to the form known a the Carman - Kozeny equation. Thi
More informationAdaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
More informationDistributed Monitoring and Aggregation in Wireless Sensor Networks
Ditributed Monitoring and Aggregation in Wirele Senor Network Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennylvania State Univerity E-mail: {chaliu, gcao}@ce.pu.edu
More informationWiFi. Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman. WiFi 1
WiFi Is for Wireless Fidelity Or IEEE 802.11 Standard By Greg Goldman WiFi 1 What is the goal of 802.11 standard? To develop a Medium Access Control (MAC) and Physical Layer (PHY) specification for wireless
More informationLab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
More informationFrequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)
FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
More informationChapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS
Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning
More informationTRADING rules are widely used in financial market as
Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a
More informationBi-Objective Optimization for the Clinical Trial Supply Chain Management
Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective
More informationModule 8. Three-phase Induction Motor. Version 2 EE IIT, Kharagpur
Module 8 Three-phae Induction Motor Verion EE IIT, Kharagpur Leon 33 Different Type of Starter for Induction Motor (IM Verion EE IIT, Kharagpur Inructional Objective Need of uing arter for Induction motor
More informationMobility Improves Coverage of Sensor Networks
Mobility Improve Coverage of Senor Networ Benyuan Liu Dept. of Computer Science Univerity of Maachuett-Lowell Lowell, MA 1854 Peter Bra Dept. of Computer Science City College of New Yor New Yor, NY 131
More informationImproving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods
Improving Throughput Performance of the IEEE 802.11 MAC Layer Using Congestion Control Methods Song Ci CS Department University of Michigan-Flint Flint, MI48502 cisong@umich.edu Guevara Noubir College
More informationTHE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE
Journal of Information Technology Management ISSN #1042-1319 A Publication of the Aociation of Management THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE LI-CHIOU
More informationPartial optimal labeling search for a NP-hard subclass of (max,+) problems
Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden
More informationLAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
More informationDUE to the small size and low cost of a sensor node, a
1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang
More informationOn Reference RIAA Networks by Jim Hagerman
On eference IAA Network by Jim Hagerman You d think there would be nothing left to ay. Everything you need to know about IAA network ha already been publihed. However, a few year back I came acro an intereting
More informationSimulation of Sensorless Speed Control of Induction Motor Using APFO Technique
International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, Augut 2012 Simulation of Senorle Speed Control of Induction Motor Uing APFO Technique T. Raghu, J. Sriniva Rao, and S. Chandra
More informationSolution of the Heat Equation for transient conduction by LaPlace Transform
Solution of the Heat Equation for tranient conduction by LaPlace Tranform Thi notebook ha been written in Mathematica by Mark J. McCready Profeor and Chair of Chemical Engineering Univerity of Notre Dame
More informationWireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
More informationHow To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
More informationEngineering Bernoulli Equation
Engineering Bernoulli Equation R. Shankar Subramanian Department of Chemical and Biomolecular Engineering Clarkon Univerity The Engineering Bernoulli equation can be derived from the principle of conervation
More informationPERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala
PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS N. Golmie, D. Cypher, O. Rebala National Institute of Standards and Technology, 100 Bureau Drive, Gaithersburg, Maryland
More informationT-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D
The t Tet for ependent Sample T-tet for dependent Sample (ak.a., Paired ample t-tet, Correlated Group eign, Within- Subject eign, Repeated Meaure,.. Repeated-Meaure eign When you have two et of core from
More informationTHE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE
THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li-Chiou Chen Department of Information Sytem School of Computer Science and Information Sytem Pace Univerity
More informationMedium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins
More informationTIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME
TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic
More informationSupport Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.
The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem
More informationChapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
More informationHow Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal
How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing
More informationMassachusetts Institute of Technology Department of Electrical Engineering and Computer Science
aachuett Intitute of Technology Department of Electrical Engineering and Computer Science 6.685 Electric achinery Cla Note 10: Induction achine Control and Simulation c 2003 Jame L. Kirtley Jr. 1 Introduction
More informationBidding for Representative Allocations for Display Advertising
Bidding for Repreentative Allocation for Diplay Advertiing Arpita Ghoh, Preton McAfee, Kihore Papineni, and Sergei Vailvitkii Yahoo! Reearch. {arpita, mcafee, kpapi, ergei}@yahoo-inc.com Abtract. Diplay
More informationCOMPATIBILITY STUDY FOR UMTS OPERATING WITHIN THE GSM 900 AND GSM 1800 FREQUENCY BANDS
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) COMPATIBILITY STUDY FOR UMTS OPERATING WITHIN THE GSM 900 AND GSM 1800 FREQUENCY
More informationDelft. Matlab and Simulink for Modeling and Control. Robert Babuška and Stefano Stramigioli. November 1999
Matlab and Simulink for Modeling and Control Robert Babuška and Stefano Stramigioli November 999 Delft Delft Univerity of Technology Control Laboratory Faculty of Information Technology and Sytem Delft
More informationOmni Antenna vs. Directional Antenna
Omni Antenna vs. Directional Antenna Document ID: 82068 Contents Introduction Prerequisites Requirements Components Used Conventions Basic Definitions and Antenna Concepts Indoor Effects Omni Antenna Pros
More informationTransmission Scheduling for Multi-Channel Satellite and Wireless Networks
Tranmiion Scheduling for ulti-channel Satellite and Wirele Network Anand Ganti, Eytan odiano, John N. Titikli aachuett Intitute of Technology e-mail: aganti@mit.edu, modiano@mit.edu, jnt@mit.edu Abtract
More informationApigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management
Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4
More informationOUTPUT STREAM OF BINDING NEURON WITH DELAYED FEEDBACK
binding neuron, biological and medical cybernetic, interpike interval ditribution, complex ytem, cognition and ytem Alexander VIDYBIDA OUTPUT STREAM OF BINDING NEURON WITH DELAYED FEEDBACK A binding neuron
More informationDistributed, Secure Load Balancing with Skew, Heterogeneity, and Churn
Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Diviion of Engineering and Applied Science Harvard Univerity Abtract Numerou propoal exit for load
More informationTap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms
Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:
More informationMECH 2110 - Statics & Dynamics
Chapter D Problem 3 Solution 1/7/8 1:8 PM MECH 11 - Static & Dynamic Chapter D Problem 3 Solution Page 7, Engineering Mechanic - Dynamic, 4th Edition, Meriam and Kraige Given: Particle moving along a traight
More informationProfitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations
Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari
More information