Performance evaluation of the Zipper duplex method

Size: px
Start display at page:

Download "Performance evaluation of the Zipper duplex method"

Transcription

1 Performance evaluation of the Zipper lex metho Frank Sjöberg, Mikael Isaksson, Petra Deutgen, Rickar Nilsson, Per Öling, an Per Ola Börjesson Luleå University of Technology, Division of Signal Processing, SE , Luleå, Sween Telia Research AB, Aurorum 6, SE , Luleå, Sween Abstract In this paper we present performance results for a new lex scheme, calle Zipper, for DMT-base VDSL systems on copper wires. This scheme ivies the available banwith by assigning ifferent subcarriers for the stream an ownstream irection. It has high exibility to ivie the capacity between the - an ownstream as well as goo coexistence possibilities with other systems such as ADSL. Simulation results show high bitrate performance in ifferent environments such as mixe ADSL an VDSL traf- c, uner raio frequency interference, an with ifferent backgroun noise sources. I. I Very high bit rate Digital Subscriber Lines (VDSL) [1, 2] is the latest igital subscriber line technique for high spee communication on twiste copper wires. VDSL is intene to use larger banwith an achieve higher bit rates than its precursor, e.g. Asymmetrical Digital Subscriber Line (ADSL) [3] an High bit rate Digital Subscriber Line (HDSL) [4]. The stanar for VDSL is currently being evelope an is iscusse in forums such as American National Stanars Institute (ANSI) an European Telecommunications Stanars Institute (ETSI). A signicant problem VDSL systems confront is near-en crosstalk (NEXT). This NEXT occurs when ata is transmitte simultaneously in both irections, on the same frequencies, an on several wires in the same biner gro. Systems that preominantly transmit in only one irection (such as ADSL) experience mostly far-en cross-talk (FEXT), a markely less severe problem than NEXT [5]. Avoiance of NEXT by iviing the channel capacity between the two irections has shape the existing VDSL proposals. Time ivision lex (TDD) [6] an frequency ivision lex (FDD) [7] are two ifferent proposals for iviing the capacity in time an in frequency, respectively. Recently we introuce a novel iscrete multi-tone (DMT)-base [8] lex scheme for VDSL, calle Zipper [9]. Zipper uses ifferent orthogonal sub-carriers in the stream an ownstream irections to ivie the capacity, thereby avoiing NEXT. Using several orthogonal signals gives Zipper both variable capacity allocation an high ADSL compatibility. II. Upstream Downstream Frequency Figure 1 The Zipper principle of capacity ivision. In this paper we evaluate the performance of the Zipper lex metho. We calculate achievable bit rates for ifferent scenarios consisting of ifferent types of wires an noise sources. In particular we consier Zipper performance in a VDSL only environment, in mixe VDSL an ADSL traf- c, an with ETSI moels for backgroun noise an raio frequency interference (RFI). T Z D M Zipper extens traitional DMT in two ways: it uses ifferent DMT-carriers in ifferent transmission irections (as shown in Figure 1) an it as a cyclic suffix (CS) to ensure orthogonality between the transmitte an receive signal (as shown in Figure 2). Zipper allocates ifferent sub-carriers for the stream an the ownstream. A sample allocation scheme is sketche in Figure 1. The allocation of the stream an ownstream sub-carriers can be one ynamically enabling runtime aaption of the bit rates. The stream part of a transmitte DMT frame can be moele as: ) j2kfs 2 t Re X [ k] e N 2 N+ CP + CS x ()= t t [, ] fs k I otherwise, (1) where I is the inex set for the stream carriers, N is the total number of sub-carriers, CP is the length (in samples) of the cyclic prex, CS is the length of the cyclic suffix an fs is the sampling frequency. Similarly the ownstream part of the DMT frame has an inex set Iown that is complementary to I (or a subset thereof).

2 CP CP +CP/f s Desire signal + NEXT signal = Receive signal CS CS +(CP+2N)/f s Figure 2 Timing iagram showing the NEXT symbol frame, the esire symbol frame, an the portion of ata extracte from the receive frame. t Power Spectral Density (B) a b a Receive signal b 9-NEXT on other carriers c 9-FEXT isturbing receive signal 9-NEXT isturbing receive signal Frequency (MHz) c CS = CS = 25 CS = 5 Amplitue NEXT impulse response h NEXT (t) Cable inpulse response h cable (t) Figure 4 Level of NEXT that appear if a too short cyclic suffix is use. presse as: r()= t x () t h ()+ t x () t h () t, cable own NEXT (2) +CP/f s Figure 3 Serimpose channel impulse response from NEXT an esire signal. Because Zipper transmits an receives simultaneously, the two network ens must be synchronize in both time an frequency in orer to maintain orthogonality. As both the stream an the ownstream contribute to a receive DMT frame, time synchronization is require to keep the signal contributions within one DMT frame. All transmitters in the access network (that may cause interference to each other) are synchronize to transmit simultaneously. Frequency synchronization between the two network ens is necessary to ensure the proper spacing between sub-carriers. However, in aition to synchronizing the transmitters an receivers, we a a cyclic suffix to ensure orthogonality between the stream an ownstream signals, thus preventing NEXT an near echoes. Traitional DMT uses a cyclic prex to preserve orthogonality between the carriers an prevent interblock interference [1], but Zipper as an extra cyclic suffix to preserve orthogonality between the stream an ownstream carriers. Consier a network terminal. With the Zipper scheme, it simultaneously transmits an receives. So the network terminal is not only receiving its intene signal but also NEXT from nearby transmitters plus its own transmitte signal which appears as near echoes. In Figure 3 we sketch a NEXT impulse response together with the cables impulse response. The esire signal is elaye secons ue to the propagation elay, but the isturbing signal arrives almost immeiately. The NEXT impulse response coul also represent a near echo impulse response. A receive signal at the central office can be ex- t where we have inclue only one NEXT isturber. The isturbing signal in (2) coul also represent near echoes. Since the esire stream signal is elaye, the fast Fourier transform (FFT) in the DMT receiver will use the part of the receive signal, r() t, that is in the range CP +2 t + + f, CP N, (3) s fs as epicte in Figure 2. For the non-elaye isturbing ownstream signal to be orthogonal it nees to be cyclically extene so that it spans the whole range in (3). This is accomplishe by using a cyclic suffix that is equal to or longer than the propagation elay. Since there can be wires of ifferent length in an access network, the cyclic suffix has to be as long as the elay in the longest wire-pair. Figure 4 shows how much NEXT is spresse by a cyclic suffix of ifferent lengths. For this case a cyclic suffix of 6 samples woul have completely spresse the NEXT. To summarize this section, Zipper is a DMT-base system transmitting orthogonal signals over ifferent sub-carriers in ifferent transmission irections. Maintaining signal orthogonality at the receiver en puts two key system requirements: synchronization among all transmitters at both ens a cyclic suffix to compensate for propagation elay III. F C Zipper is very exible lex scheme. This is because it uses a large number of sub-carriers to ivie the capacity an these sub-carriers can be assigne ynamically (even after the system is installe an running). This gives the avantage that any esire ratio between an ownstream

3 ADSL stream ADSL ownstream Arbitrary transmission irection.1 MHz 2 MHz 1-2 MHz Figure 5 A Zipper subcarrier assignment emonstrating possible coexistence with ADSL. bit rates can be chosen at any time. The exibility in subcarrier assignment also allows a Zipper base VDSL system to be spectrally compatible with other systems. A valuable feature for VDSL systems is the ability to coexist in the same biner gro as other systems, such as ADSL. A reasonable conition for coexistence between ADSL an VDSL is that neither system introuces NEXT to the other. This can be achieve if the both ADSL an VDSL transmit in the same irection in the common frequency ban. With Zipper the lowermost sub-carriers, those where ADSL exists (uner 2. MHz), may be partitione such that only FEXT is introuce between ADSL an VDSL [11], as epicte in Figure Table 1. Simulation parameters. Simulation parameters AWGN 14 Bm/Hz System margin margin =6B Coing gain coe =3B SNR-gap =98. B Sampling frequency 22 Mhz Use banwith 3 khz - 11 MHz Number of carriers 248 Length of CP 1 samples Length of CS 22 samples ( 2 m) IV. P 2 We have calculate the bit rate performance of Zipper for four ifferent backgroun noise environments. The rst case is a clean VDSL scenario with only AWGN as backgroun noise. The secon case consists of a mix of ADSL an VDSL services generating ADSL crosstalk in aition to the AWGN. The thir an fourth cases use the ETSI backgroun noise moel [2], while the fourth case also inclues raio frequency interference (RFI). All four cases inclue VDSL self-fext from 25 other users. Since Zipper uses DMT-moulation it is the bit-loaing [12] that etermines the bit rate of the system. The number of bits that can be loae onto carrier number k is calculate as [12] SNRk coe bk = log2 +1, margin where SNRk is the signal to noise ratio on carrier k, coe 1 is the coing gain, is the SNR-gap between the Shannon capacity an QAM-moulation [13], an margin is the system margin. System margin is the aitional amount of noise the system can tolerate without exceeing the allowe bit error rate (BER). By summing the number of bits given by the bitloaing we get the capacity of the system. Within the VDSL frequency ban there are certain frequency bans reserve for amateur raio users [2], so calle HAM-bans. To comply with the regulations for usage of these bans we are not allowe to transmit within these bans. So the carriers that correspon 1An SNR-gap of 9.8 B [13] is use to achieve a BER of approximately Figure 6 Achievable ownstream (8:1) asymmetrical bitrates, with AWGN an 25 self-fext istubers. to frequencies in the HAM-bans are not loae with any bits. Achievable bit rates have been calculate for ifferent 7 lengths of TP1 an TP2 wires [1], for a target BER of 1. The TP1 wire has a iameter of.4 mm an the TP2 wire has a iameter of.5 mm. Parameters use in the calculation are liste in Table 1. A. VDSL Environment Figure 6 shows achievable (8:1) asymmetrical bit rates versus wire length for the case with only self-fext an AWGN as backgroun noise. For wires shorter than 6 m there is no big ifference between the two type of cable, but for longer wires the thicker TP2 cable gives higher bit rates. This is because self-fext is the ominating noise source for shorter wires an AWGN for longer wires. The TP2 wire attenuates the signal less than TP1, thus it attenuates FEXT less also, which gives almost the same SNR for both types of wire for shorter lengths.

4 6 5 TP2, ADSL-compatible TP1, ADSL-compatible TP2, not ADSL-compatible TP1, not ADSL-compatible Figure 7 Achievable (8:1) asymmetrical ownstream bit rates for Zipper, with 25-ADSL systems an 25 self-fext. Figure 8 Downstream (8:1) bit rates, with ETSI backgroun noise moel A an 25 self-fext. B. Mix of VDSL an ADSL The results for the secon case, where Zipper coexists with 25 ADSL users in the same biner gro, are shown in Figure 7. The crosstalk moels an ADSL spectral power mask are specie by ANSI in [1]. To make Zipper compatible with ADSL the lower sub-carriers are assigne as shown previously in Figure 7. Figure 7 also shows the results for a case where the sub-carrier assignment is mae in such a way that the two systems are not spectrally compatible (every ninth sub-carrier is use in the stream irection). We can see that there is a clear avantage in making VDSL spectrally compatible with ADSL. But even when we avoi NEXT from the ADSL systems the performance is lower than in a clean VDSL-environment. This is because the power spectral ensity of the ADSL signal is 2 B higher than for VDSL, so FEXT from ADSL will be much stronger FEXT from VDSL in the common frequency ban. C. ETSI noise moel With the ETSI backgroun noise moel A ene in [2] we get the performance shown in Figure 8. The ETSI noise moel inclues AWGN an a mix of crosstalk from other existing services such as ADSL, HDSL, ISDN, etc. Comparing with Figure 7 we see that the performance with the ETSI moel is not much ifferent than the performance for the ADSL case. This is not completely unexpecte since the power spectral ensity of the ETSI noise moel resembles that of an ADSL system. D. ETSI noise moel plus RFI As a worst case scenario we have ae 8 broacast raio interferers to the ETSI noise moel A. These 8 RFI signals are those specie by ETSI [2] except for the two below 3 khz. At the customer sie, three of the RFI signals have signal power of -6 Bm an the other ve have -4 Bm signal power. The signal powers at the central office are 1 B lower. To spress this RFI we have use a time winow [14] at the receiver. To preserve the orthogonality after the winowing each DMT-frame is extene cyclically by 6 extra samples. Figure 9 show the performance for this case an Figure 1 shows the spectrum of the ETSI backgroun noise plus the RFI signals at the customer location (after winow an FFT). The bit rate performance showe to be just slightly lower than with only the ETSI noise moel. Table 2 shows the maximum length the wires can have for certain bit rates (both symmetrical an asymmetrical), for all ifferent noise scenarios Figure 9 Do wnstream (8:1) bitrates, with ETSI backgroun noise moel A plus RFI an 25 self-fext.

5 Power spectral ensity (Bm/Hz) R2, ANSI, Sacramento, CA, Sept [2] Very high spee igital subscriber line (VDSL); part1: Functional requirements, Tech. Rep. DTS/TM631(raft), ETSI-TM6, Nov [3] K. Sistanizaeh, P. Chow, an J. Cioffi, Multitone transmission for asymmetric igital subscriber lines (ADSL), in Proc. Intern. Conf. Commun., pp , May [4] J. Lechleier, A review of HDSL progress, IEEE J. Select. Areas Commun., vol. 9, pp , Aug [5] J.-J. Werner, The HDSL environment, IEEE J. Select. Areas Commun., vol. SAC-9, pp. 7858, Aug Subcarrier inex Figure 1 Power spectral ensity of ETSI noise moel A plus RFI. Table 2. Reach for ifferent backgroun noise scenarios. bit rate Reach in meters for TP1/TP2 -wire (Mbps) AWGN ADSL-mix ETSI ETSI+RFI 52:6.4 16/16 11/11 13/13 12/12 26:3.2 86/15 76/9 75/9 69/83 13: /163 16/131 15/131 1/124 26:26 27/27 18/18 2/2 19/19 13:13 93/113 8/97 79/99 73/9 It shoul be note that HAM-raio interferers can be much stronger than the broacast interferers use in this case, but they can be almost completely cancelle with RFIcancellation methos such as [15], [16]. VI. V. C Zipper is a lex metho for VDSL that is very exible ue to the many sub-carriers that ivies the capacity between the - an ownstream irection. This allows Zipper to be spectrally compatible with other existing systems, such as ADSL. In this paper we have evaluate the performance of the Zipper lex scheme. We showe that it gives goo bit rate performance in coexistence with ADSL systems. The scheme is also shown to be robust against RFI. The best performance is obtaine in an environment with only VDSLsystems ue to the ecrease level of crosstalk. A The authors wish to thank Paul Petersen an Sarah Kate Wilson for their help an comments on this paper. R [1] Very-high-spee igital subscriber lines system requirements, raft technical report, Tech. Rep. T1E1.4/97- [6] J. M. Cioffi, J. S. Chow, J. A. Bingham, an P. Tong, An SDMT line coe proposal with rationale for sport, Tech. Rep. T1E1.4/96-88, ANSI, Colorao Springs, Co, Apr [7] C. Fael et al., Preliminary proposal for a single-carrier VDSL specication, Tech. Rep. T1E1.4/97-16, ANSI, Austin, Tx, Feb [8] J. A. Bingham, Multicarrier moulation for ata transmission: An iea whose time has come, IEEE Commun. Mag., vol. 28, pp. 514, May 199. [9] M. Isaksson, P. Deutgen, F. Sjöberg, P. Öling, H. Öhman, S. K. Wilson, an P. O. Börjesson, Zipper a exible lex scheme for VDSL, in Proc. Intern. Workshop on Copper Wire Access Systems, (Buapest, Hungary), pp. 9599, Oct [1] A. Pele an A. Ruiz, Frequency omain ata transmission using reuce computational complexity algorithms, in Proc. IEEE Int. Conf. Acoust., Speech, Signal Processing, (Denver, CO), pp , 198. [11] D. Bengtsson, P. Deutgen, N. Grip, M. Isaksson, L. Olsson, F. Sjöberg, an H. Öhman, Zipper performance when mixing ADSL an VDSL in terms of reach an capacity, Tech. Rep. T1E1.4/97-138, ANSI, Clearwater Beach, Floria, May [12] P. S. Chow, J. M. Cioffi, an J. A. C. Bingham, A practical iscrete multitone transceiver loaing algorithm for ata transmission over spectrally shape channels, IEEE Trans. Commun., vol. 43, pp , Feb [13] G. Forney an M. Eyuboglu, Combine equalization an coing using precoing, IEEE Commun. Mag., vol. 29, pp. 2534, Dec [14] P. Spruyt, P. Reusens, an S. Braet, Performance of improve DMT transceiver for VDSL, Tech. Rep. T1E1.4/96-14, ANSI, Colorao Springs, Co, Apr [15] B. Wiese an J. Bingham, Digital raio frequency cancellation for DMT VDSL, Tech. Rep. T1E1.4/97-46, ANSI, Sacramento, CA, Dec [16] F. Sjöberg, R. Nilsson, N. Grip, P. O. Börjesson, S. K. Wilson, an P. Öling, RFI sression in DMT-base VDSL systems, to appear at Intern. Conf. on Telecomm. 98, (Chalkiiki, Greece), June 1998.

VDSL in terms of reach and capacity

VDSL in terms of reach and capacity ANSI TE.4/97-38 () Standards project: TE.4: VDSL Title : Zipper performance when mixing ADSL and VDSL in terms of reach and capacity Source : Contact: Telia Research AB Daniel Bengtsson, Petra Deutgen,

More information

Frequency Duplex Planning for VDSL

Frequency Duplex Planning for VDSL Frequency Duplex Planning for VDSL Authors : Wei Yu, George Ginis, Frank Söjberg, Rickard Nilsson Chaohuang Zeng, and John M. Cioffi Affiliation : STAR Laboratory Electrical Engineering Department Stanford

More information

DYNAMIC UPSTREAM POWER BACK-OFF FOR MIXTURES OF VECTORED AND NON-VECTORED VDSL Ming-Yang Chen, Georgios Ginis, and Mehdi Mohseni

DYNAMIC UPSTREAM POWER BACK-OFF FOR MIXTURES OF VECTORED AND NON-VECTORED VDSL Ming-Yang Chen, Georgios Ginis, and Mehdi Mohseni 2014 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) DYNAMIC UPSTREAM POWER BACK-OFF FOR MIXTURES OF VECTORED AND NON-VECTORED VDSL Ming-Yang Chen, Georgios Ginis, and

More information

Loop Spectrum Compatibility and Management

Loop Spectrum Compatibility and Management Loop Spectrum Compatibility and Management by Jim Carlo Texas Instruments jcarlo@ti.com Spectrum Management Mission statement: Utilize installed base of twisted copper pairs for delivering high speed broadband

More information

Standard VDSL Technology

Standard VDSL Technology Standard VDSL Technology Overview of European (ETSI), North American (T1E1.4) and International (ITU-T) VDSL standard development Vladimir Oksman Broadcom Corporation July 2001 Slide 1 Current status of

More information

IEEE International Symposium on Circuits and Systems, ISCAS-2003

IEEE International Symposium on Circuits and Systems, ISCAS-2003 Reprint Cooperative Bit-loading and Fairness Bandwidth Allocation in ADSL Systems N. Papandreou and T. Antonakopoulos IEEE International Symposium on Circuits and Systems, ISCAS-2003 BANGKOK, THAILAND,

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Very High Bit Rate Digital Subscriber Line (VDSL2) technology for triple play services

Very High Bit Rate Digital Subscriber Line (VDSL2) technology for triple play services University of Sunderland From the SelectedWorks of John P. Karamitsos 2007 Very High Bit Rate Digital Subscriber Line (VDSL2) technology for triple play services Ioannis karamitsos Athanassios Mavroidis

More information

DSL Consortium. VDSL2 Rate vs. Reach Interoperability Test Suite (V2RR) Version Last Updated: March 24, 2008

DSL Consortium. VDSL2 Rate vs. Reach Interoperability Test Suite (V2RR) Version Last Updated: March 24, 2008 Test Suite (V2RR) Version 1.2.0 Last Updated: March 24, 2008 121 Technology Drive, Suite 2 University of New Hampshire Durham, NH 03824 Phone: +1-603-862-2911 Fax: +1-603-862-4181 www.iol.unh.edu 2006

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

A Framework for Dialogue Detection in Movies

A Framework for Dialogue Detection in Movies A Framework for Dialogue Detection in Movies Margarita Kotti, Constantine Kotropoulos, Bartosz Ziólko, Ioannis Pitas, an Vassiliki Moschou Department of Informatics, Aristotle University of Thessaloniki

More information

ADSL Transmitter Modeling and Simulation. Department of Electrical and Computer Engineering University of Texas at Austin. Kripa Venkatachalam.

ADSL Transmitter Modeling and Simulation. Department of Electrical and Computer Engineering University of Texas at Austin. Kripa Venkatachalam. ADSL Transmitter Modeling and Simulation Department of Electrical and Computer Engineering University of Texas at Austin Kripa Venkatachalam Qiu Wu EE382C: Embedded Software Systems May 10, 2000 Abstract

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

Far-End Crosstalk Identification Method Based on Channel Training Sequences. VOL. 54 NO. 6, DECEMBER 2005, pp

Far-End Crosstalk Identification Method Based on Channel Training Sequences. VOL. 54 NO. 6, DECEMBER 2005, pp Reprint Far-End Crosstalk Identification Method Based on Channel Training Sequences N Papandreou and Th Antonakopoulos IEEE Transactions on Instrumentation and Measurement VOL 54 NO 6, DECEMBER 2005, pp

More information

Blind Crosstalk Cancellation for DMT Systems

Blind Crosstalk Cancellation for DMT Systems Blind Crosstalk Cancellation for DMT Systems Nadeem Ahmed, Nirmal Warke and Richard Baraniuk Department of Electrical and Computer Engineering, Rice University, [nahmed,richb]@rice.edu DSPS R&D Center,

More information

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links Overview 15-441 15-441: Computer Networking 15-641 Lecture 24: Wireless Eric Anerson Fall 2014 www.cs.cmu.eu/~prs/15-441-f14 Internet mobility TCP over noisy links Link layer challenges an WiFi Cellular

More information

Low-Complexity Near-Optimal Spectrum Balancing for Digital Subscriber Lines

Low-Complexity Near-Optimal Spectrum Balancing for Digital Subscriber Lines Low-Complexity Near-Optimal Spectrum Balancing for Digital Subscriber Lines Raymond Lui and Wei Yu Electrical and Computer Engineering Department University of Toronto, Toronto, Canada email: {rwmlui,weiyu}@comm.utoronto.ca

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Introduction to ADSL

Introduction to ADSL Introduction to ADSL Christian Truppel ADSL Explained The costs of exchanging large numbers of bits and bytes used to be equally high for all available methods. Whilst large companies used microwave and

More information

Lecture 15: Multiplexing (2)

Lecture 15: Multiplexing (2) Lecture 15: Multiplexing (2) Last Lecture Multiplexing (1) Source: chapter 8 This Lecture Multiplexing (2) Source: chapter8 Next Lecture Circuit switching (1) Source: chapter9 Digital Carrier Systems Hierarchy

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Realization of Adaptive NEXT canceller for ADSL on DSP kit

Realization of Adaptive NEXT canceller for ADSL on DSP kit Proceedings of the 5th WSEAS Int. Conf. on DATA NETWORKS, COMMUNICATIONS & COMPUTERS, Bucharest, Romania, October 16-17, 006 36 Realization of Adaptive NEXT canceller for ADSL on DSP kit B.V. UMA, K.V.

More information

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Performance of Asymmetric Digital Subscriber Lines in an Impulse Noise Environment

Performance of Asymmetric Digital Subscriber Lines in an Impulse Noise Environment IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 51, NO. 10, OCTOBER 2003 1653 Performance of Asymmetric Digital Subscriber Lines in an Impulse Noise Environment Wei Yu, Dimitris Toumpakaris, John M. Cioffi,

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

Course 8-9 DSL (Digital Subscriber Line) access techniques.

Course 8-9 DSL (Digital Subscriber Line) access techniques. Course 8-9 DSL (Digital Subscriber Line) access techniques. Zsolt Polgar Communications Department Faculty of Electronics and Telecommunications, Technical University of Cluj-Napoca Content of the course

More information

COMMITTEE T1 TELECOMMUNICATIONS Working Group T1E1.4 (DSL Access) Newport Beach, CA; Feb 17 th, 2002 CONTRIBUTION

COMMITTEE T1 TELECOMMUNICATIONS Working Group T1E1.4 (DSL Access) Newport Beach, CA; Feb 17 th, 2002 CONTRIBUTION COMMITTEE T1 TELECOMMUNICATIONS Working Group T1E1.4 (DSL Access) Newport Beach, CA; Feb 17 th, 2002 T1E1.4/2003-049 CONTRIBUTION TITLE: SOURCES: Dynamic FDM and Dynamic DS power back-off: A simplified

More information

Asymmetrical Digital Subscriber Line (ADSL)

Asymmetrical Digital Subscriber Line (ADSL) Asymmetrical Digital Subscriber Line (ADSL) Asymmetrical Digital Subscriber Line Background motivation for developing ADSL historical development DSL end-to-end environment and reference model Line environment

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Coupon Recalculation for the GPS Authentication Scheme

Coupon Recalculation for the GPS Authentication Scheme Coupon Recalculation for the GPS Authentication Scheme Georg Hofferek an Johannes Wolkerstorfer Graz University of Technology, Institute for Applie Information Processing an Communications (IAIK), Inffelgasse

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA Preprint, August 5, 2018. 1 All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA Mikhail Ivanov, Frerik Brännström, Alexanre Graell i Amat, an Petar Popovski Department of Signals an Systems,

More information

Guest Editorial. Twisted Pair Transmission Ever Increasing Performances on Ancient Telephone Wires

Guest Editorial. Twisted Pair Transmission Ever Increasing Performances on Ancient Telephone Wires Guest Editorial Twisted Pair Transmission Ever Increasing Performances on Ancient Telephone Wires Werner Henkel, Sedat Ölçer, Krista Jacobsen, and Burton Saltzberg Digital subscriber line (DSL) technology

More information

Chapter 9. High Speed Digital Access

Chapter 9. High Speed Digital Access Chapter 9 High Speed Digital Access 9-1 TELEPHONE NETWORK Telephone networks use circuit switching. The telephone network had its beginnings in the late 1800s. The entire network, which is referred to

More information

G.fast Ultrafast Access Technology Standardization in ITU-T

G.fast Ultrafast Access Technology Standardization in ITU-T G.fast Ultrafast Access Technology Standardization in ITU-T Yoshihiro Kondo Abstract The International Telecommunication Union - Telecommunication Standardization Sector (ITU-T) Study Group 15 (SG15) is

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

Chapter 8: Multiplexing

Chapter 8: Multiplexing NET 456 High Speed Networks Chapter 8: Multiplexing Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education - Prentice

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Current and Projected Digital Complexity of DMT VDSL

Current and Projected Digital Complexity of DMT VDSL June 1, 1999 1 Standards Project: T1E1.4:99-268 VDSL Title: Current and Projected Digital Complexity of DMT VDSL Source: Texas Instruments Author: C. S. Modlin J. S. Chow Texas Instruments 2043 Samaritan

More information

Table of Contents. Chapter Goals. Digital Subscriber Line. Chapter Goals

Table of Contents. Chapter Goals. Digital Subscriber Line. Chapter Goals Table of Contents Chapter Goals Digital Subscriber Line Introduction Asymmetric Digital Subscriber Line ADSL Capabilities ADSL Technology Signaling and Modulation CAP and DMT Modulated ADSL CAP and DMT

More information

Coupon Recalculation for the GPS Authentication Scheme

Coupon Recalculation for the GPS Authentication Scheme Coupon Recalculation for the GPS Authentication Scheme Georg Hofferek an Johannes Wolkerstorfer Graz University of Technology, Institute for Applie Information Processing an Communications (IAIK), Inffelgasse

More information

Depth Sizing of Surface Breaking Flaw on Its Open Side by Short Path of Diffraction Technique

Depth Sizing of Surface Breaking Flaw on Its Open Side by Short Path of Diffraction Technique 17th Worl Conference on Nonestructive Testing, 5-8 Oct 008, Shanghai, China Depth Sizing of Surface Breaking Flaw on Its Open Sie by Short Path of Diffraction Technique Hiroyuki FUKUTOMI, Shan LIN an Takashi

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

SmartClass ADSL/Copper Combo Kickstart Training

SmartClass ADSL/Copper Combo Kickstart Training SmartClass ADSL/Copper Combo Kickstart Training Customer Name Presenters Name Place Date Version 3.0 Welcome! Welcome! At the end of this training you will: Be familiar with the use of the SmartClass ADSL

More information

Interior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation

Interior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation Interior Permanent Magnet Synchronous Motor (IPMSM) Aaptive Genetic Parameter Estimation Java Rezaie, Mehi Gholami, Reza Firouzi, Tohi Alizaeh, Karim Salashoor Abstract - Interior permanent magnet synchronous

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

DYNAMIC LINE MANAGEMENT FOR VECTORING SCENARIOS

DYNAMIC LINE MANAGEMENT FOR VECTORING SCENARIOS DYNAMIC LINE MANAGEMENT FOR VECTORING SCENARIOS STRATEGIC WHITE PAPER Operators are embracing vectoring technology as a means to extend and protect their legacy investments in copper access. However, the

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 0 0 0 0 0 0 0 0 on-uniform Sensor Deployment in Mobile Wireless Sensor etworks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,

More information

An Overview. 12/22/2011 Hardev Singh Manager (BB-NOC) MTNL Delhi

An Overview. 12/22/2011 Hardev Singh Manager (BB-NOC) MTNL Delhi Broadband Technology An Overview 12/22/2011 Hardev Singh Manager (BB-NOC) MTNL Delhi 1 1 2 3 4 5 6 7 8 9 * 8 # 1 2 3 4 5 6 7 8 9 * 8 # Typical Narrowband (voice) setup Local Exchange PSTNSwitch telephone

More information

Multiuser in multicarrier systems for wireless and wireline.

Multiuser in multicarrier systems for wireless and wireline. Multi in multicarrier systems for wireless and wireline. Prof. Y. Bar-Ness Dept of EE New Jersey Inst. Tech. barness@yegal yegal.njit.edu Prof. John M. Cioffi Dept of EE Stanford University cioffi@stanford

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model TCP Symbiosis: Congestion Control Mechanisms of TCP base on Lotka-Volterra Competition Moel Go Hasegawa Cybermeia Center Osaka University 1-3, Machikaneyama-cho, Toyonaka, Osaka 56-43, JAPAN Email: hasegawa@cmc.osaka-u.ac.jp

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

A Block-Based Blind Source Separation Approach With Equilateral Triangular Microphone Array

A Block-Based Blind Source Separation Approach With Equilateral Triangular Microphone Array APSIPA ASC 2011 Xi an A Block-Base Blin Source Separation Approach With Equilateral Triangular Microphone Array Jian Zhang, Zhonghua Fu an Lei Xie Shaanxi Provincial Key Laboratory of Speech an Image Information

More information

Lecture 2 Physical Layer - Multiplexing

Lecture 2 Physical Layer - Multiplexing DATA AND COMPUTER COMMUNICATIONS Lecture 2 Physical Layer - Multiplexing Mei Yang Based on Lecture slides by William Stallings 1 MULTIPLEXING multiple links on 1 physical line common on long-haul, high

More information

Chalmers Publication Library

Chalmers Publication Library Chalmers Publication Library All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA This ocument has been ownloae from Chalmers Publication Library (CPL). It is the author s version of a work

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

I DT MC. Operating Manual SINAMICS S120. Verification of Performance Level e in accordance with EN ISO

I DT MC. Operating Manual SINAMICS S120. Verification of Performance Level e in accordance with EN ISO I DT MC Operating Manual SINAMICS S20 Verification of Performance Level e in accorance with EN ISO 3849- Document Project Status: release Organization: I DT MC Baseline:.2 Location: Erl. F80 Date: 24.09.2009

More information

The Broadband Revolution

The Broadband Revolution The Broadband Revolution Broadband is a culture that has changed how we work, shop, play and communicate. Key to any culture is learning from others and adopting beneficial practices. Broadband technologies

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Prequalification of VDSL2 Customers for G.fast Services

Prequalification of VDSL2 Customers for G.fast Services 217 25th European Signal Processing Conference (EUSIPCO) Prequalification of VDSL2 Customers for G.fast Services Driton Statovci, Martin Wolkerstorfer, and Sanda Drakulić Institute of Telecommunications,

More information

An Investigation in the Use of Vehicle Reidentification for Deriving Travel Time and Travel Time Distributions

An Investigation in the Use of Vehicle Reidentification for Deriving Travel Time and Travel Time Distributions An Investigation in the Use of Vehicle Reientification for Deriving Travel Time an Travel Time Distributions Carlos Sun Department of Civil an Environmental Engineering, University of Missouri-Columbia,

More information

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Chapter 9 Memory Management

Chapter 9 Memory Management Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory

More information

Physical Layer Part 3

Physical Layer Part 3 Physical Layer Part 3 Transmission Media Computer Networks: Transmission Media 1 Transmission Media Transmission medium:: the physical path between transmitter and receiver. Repeaters or amplifiers may

More information

ADSL (Asymmetrical Digital Subscriber Line) details

ADSL (Asymmetrical Digital Subscriber Line) details ADSL (Asymmetrical Digital Subscriber Line) details A D S L Asymmetrical Digital Subscriber Line Central Office Customer premises High- Rate channel Low- Rate channel LP HP Spectrum At the beginning two

More information

Estimating Velocity Fields on a Freeway from Low Resolution Video

Estimating Velocity Fields on a Freeway from Low Resolution Video Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Merging of spectral allocation plans and PSD masks for VDSL. Rob van den Brink, KPN Research

Merging of spectral allocation plans and PSD masks for VDSL. Rob van den Brink, KPN Research TITLE PROJECT Merging of spectral allocation plans and masks for VDSL VDSL SOURCE: Authors: Presented by: Supported by: Bas van den Heuvel, KPN Research Rosaria Persico, Telecom Italia Lab Rob van den

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm NASA/CR-1998-208733 ICASE Report No. 98-45 Parallel Directionally Split Solver Base on Reformulation of Pipeline Thomas Algorithm A. Povitsky ICASE, Hampton, Virginia Institute for Computer Applications

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

Zero-touch VDSL2 vectoring

Zero-touch VDSL2 vectoring Zero-touch VDSL2 vectoring Copper broadband performance Copper broadband plays a key part in New Zealanders broadband experience. The introduction of new technologies such as vectoring and G.INP continue

More information

DEERE AFFIDAVIT Attachment OOO

DEERE AFFIDAVIT Attachment OOO DEERE AFFIDAVIT Attachment OOO DEERE ATTACHMENT OOO Mid-band Symmetric Technology NETWORK INTERFACE/INTERCONNECTION SPECIFICATIONS TP76740 ISSUE 1 February 1999 Southwestern Bell Telephone Pacific Bell

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

Digital fringe profilometry based on triangular fringe patterns and spatial shift estimation

Digital fringe profilometry based on triangular fringe patterns and spatial shift estimation University of Wollongong Research Online Faculty of Engineering an Information Sciences - Papers: Part A Faculty of Engineering an Information Sciences 4 Digital fringe profilometry base on triangular

More information

WATER MIST SPRAY MODELLING WITH FDS

WATER MIST SPRAY MODELLING WITH FDS PROCEEDINGS, Fire an Evacuation Moeling Technical Conference 0 Baltimore, Marylan, August 5-6, 0 WATER MIST SPRAY MODELLING WITH FDS Simo Hostikka, Jukka Vaari, Topi Sikanen, Antti Paajanen VTT Technical

More information

Comparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment

Comparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment Comparison of Wireless Network Simulators with Multihop Wireless Network Testbe in Corrior Environment Rabiullah Khattak, Anna Chaltseva, Laurynas Riliskis, Ulf Boin, an Evgeny Osipov Department of Computer

More information

Multiplexing (Recap)

Multiplexing (Recap) Multiplexing (Recap) Multiplexing How to transfer data between two sites once there is a digital link between them? Analog to Digital (A2D) conversion Human voice is a continuous signal in the range 0-4

More information

Table-based division by small integer constants

Table-based division by small integer constants Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr

More information

Adaptive Bit Loading. Author/ Hesham ElBakoury Version: HUAWEI TECHNOLOGIES CO., LTD.

Adaptive Bit Loading.  Author/   Hesham ElBakoury Version: HUAWEI TECHNOLOGIES CO., LTD. Adaptive Bit Loading www.huawei.com Author/ Email: Hesham ElBakoury Version: HUAWEI TECHNOLOGIES CO., LTD. GOAL The goal of the presentation is to identify areas for further Task Force study in order to

More information

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes Chapter 5 Propose moels for reconstituting/ aapting three stereoscopes - 89 - 5. Propose moels for reconstituting/aapting three stereoscopes This chapter offers three contributions in the Stereoscopy area,

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

Inuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem

Inuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem Inuence of Cross-Interferences on Blocke Loops A Case Stuy with Matrix-Vector Multiply CHRISTINE FRICKER INRIA, France an OLIVIER TEMAM an WILLIAM JALBY University of Versailles, France State-of-the art

More information