Network Coding for Multiple Unicasts: An Approach based on Linear Optimization

Size: px
Start display at page:

Download "Network Coding for Multiple Unicasts: An Approach based on Linear Optimization"

Transcription

1 Network Coding for Mltiple Unicasts: An Approach based on Linear Optimization Danail Traskov, Niranjan Ratnakar, Desmond S. Ln, Ralf Koetter, and Mriel Médard Abstract In this paper we consider the application of network coding to a mltiple nicast setp. We present two sboptimal, yet practical code constrction techniqes. One consists of a linear program and the other of an integer program with fewer variables and constraints. We discss the performance of the proposed techniqes as well as their complexity. I. INTRODUCTION We consider the problem of setting p several simltaneos and independent point-to-point connections that share a common network and refer to this as a mltiple nicast setp. The notion of network coding [1] permits intermediate network nodes to encode observed data as opposed to traditional operation, where the network nodes are restricted to roting and replicating. An example of sch an encoding is illstrated in Fig. 1(a), where observes b 1 and b 2 and transmits b 1 b 2. We are interested in applying network coding to the mltiple nicast setp. Most reslts on network coding so far assme a mlticast setting, i.e. a single sorce transmits the same data simltaneosly to a set of receivers [1, 2]. This scenario is considerably simpler than the mltiple nicast problem. One simplifying aspect is the fact that the problem of finding a minimm-cost mlticast connection decomposes into two independent sbproblems [3]. First, one has to identify a sbgraph whose link capacities can spport the mlticast connection. Second, the code can be constrcted independent of the sbgraph by e.g. a randomized code constrction [2]. On the other hand, in the mltiple nicast scenario, the problems of selecting a sbgraph and the code constrction have to be solved jointly. The selection of a sbgraph is typically modeled as an optimization problem on flows in a network, whereas the code constrction is an algebraic and combinatorial problem. Since we have to solve them jointly, we restrict orselves to simple network codes, whose constrction can be combined with network flow problems of tractable complexity. We assme the nderlying network to be a directed graph G =(V, E), where V and E are the sets of vertices and directed edges respectively. We desire commnication of independent information from nodes s i to d i at a rate R i for i =1,...,n. A connection is defined as a triple (s i,d i,r i ). The n triples (s i,d i,r i ) are feasible with network coding if there exists a network code that allows for simltaneos transmission of information at a rate R i from s i to d i. The triples are said to D. Traskov, N. Ratnakar, and R. Koetter are with the Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, 1308 Main St., Urbana IL ( {traskov2, ratnakar, koetter}@ic.ed). This material is based pon work spported by the NSF nder Award No. NSF CCR D. S. Ln, M. Médard are with the Laboratory for Information and Decision Systems, Massachsetts Institte of Technology, Cambridge, MA ( {dsln, medard}@mit.ed). be feasible with roting if there exists a network code involving only roting and in this case the problem of determining flows that satisfy these connections is referred to as a mlticommodity flow problem [4]. The application of network coding in a mltiple nicast setp is discssed in [5]. In particlar, we know of two approaches for constrcting network codes for the non-mlticast scenario. In [6], the athors present algebraic code constrction techniqes for all connection triples that are feasible with linear network coding. However, the comptational complexity of solving the reslting system of polynomial eqation is exponential in the size of the nderlying network and therefore hardly tractable in practice. On the other hand, the athors in [7] present an opportnistic heristic code constrction for wireless networks. The approach presented in this paper fits in between these two schemes. We present code constrction techniqes for certain connection triples that are feasible with network coding, bt are not necessarily feasible with roting. However, we emphasize that the techniqes described here fail to provide network codes for all connection triples that are feasible with linear network coding. We restrict network coding to operations sing only binary XOR, derive flow formlations of the problem, and state it first as a linear program and then as an integer program. This constittes a sboptimal, yet practical and systematic scheme to constrct network codes. The linear and integer program model the same problem and, althogh not eqivalent, are qite similar. Their main difference lies in comptational isses. The paper is organized as follows: In Section II, we present a code constrction scheme based on a linear program. In Section III we present an alternative formlation with fewer variables and constraints, albeit in the form of an integer program. A comparison of both formlations in terms of their complexity and simlation reslts is given in Section IV. We smmarize or reslts in Section V. II. CODE CONSTRUCTION AS A LINEAR PROGRAM For an edge e =(, v) we define tail(e)=and head(e)=v. We se Γ I (v) to denote the set of edges whose head is v V and Γ O (v) to denote the set of edges with tail v. The n triples (s i,d i,r i ) are feasible with roting if the following conditions are satisfied [4]. For i =1, 2,...,nand e E, v V, n x e (i) z e C e, x e (i) 0 (1) x e (i) R i if v = s i x e (i) = R i if v = d i 0 otherwise (2) /06/$ IEEE 1758

2 s 1 s b 1 b b 1 b 2 b 1 d b 1 b 2 b 1 b 2 (a) d 1 b 2 r(1 2) = 1 s 1 s 2 d 2 q(1 2) = 1 q(2 1) = 1 p(1 2) = 1 p(2 1) = 1 p(1 2) = 1p(2 1) = 1 Fig. 1. (a) shows the btterfly network. The edges 1 throgh 7 are marked and the network coding soltion with the corresponding transmission on each edge is shown. b i represents data for the i-th connection for i =1, 2. In (b), the btterfly network with the poison, antidote reqest, and antidote variables that are non-zero on each edge. All variables correspond to the poison generated at node. In the above eqations, x e (i) is a flow from s i to d i of vale R i and z e is the aggregate load on e. However, when network coding is permitted, the notion of a flow is not clear. For example, consider the so-called btterfly network shown in Fig. 1(a) where all the edges have nit capacity. It can be verified that R 1 = R 2 =1is not feasible with roting, yet feasible with network coding as shown in Fig. 1(a). It is no longer clear how to interpret this code as concrrent flows. Note that the data transmitted on edge 4 is b 1 b 2 and knowledge of b 2 is needed at d 1 in order to recover b 1.We interpret the transmission of b 1 b 2 as a poisoning of the two flows and the transmission of b 2 (b 1 ) on edge 5 (3) as an antidote. We also introdce the notion of an antidote reqest which notifies node s 1 (s 2 ) of the poisoning downstream and reqests an antidote to d 2 (d 1 ). Given an arbitrary network and mltiple nicast connections, we wish to identify network codes sing this poison-antidote approach. In order to do so, we enrich the variable-space by introdcing variables p e (i j, ),q e (i j, ),r e (i j, ) for every vertex. These variables respectively keep track of the poison, antidote reqest, and antidote associated with the poisoning of ser j s data by ser i sdataatvertex. This is done to ensre that the poison originating at a particlar vertex is remedied by the appropriate antidote. In this section, we derive sfficient conditions for the existence of a network coding soltion involving roting, dplicating, and bit-level XOR. Theorem 1: For a network G =(V, E), with the capacity of edge e given by C e and the ranges of the variables given by v, V, e E, 1 i n, 1 j n, and i j, consider the following set of eqations. For all v,, i, and j: p e (i j, )+q e (i j, )+r e (i j, ) = p e (i j, )+q e (i j, )+r e (i j, ) (3) q e (i j, ) (b) r(2 1) = 1 d 1 { 0 if v = q e (i j, ) 0 otherwise (4) p e (i j, ) For all, i, and j: { 0 if v = p e (i j, ) 0 otherwise (5) p e (j i, ) =p e (i j, ) if e Γ O () (6) At every edge e: n max(p e (i j, ),p e (j i, )) + x e (i) i<j + r e (i j, ) z e C e (7) At every edge e and j: x e (j)+ (p e (i j, )+q e (j i, )) 0 (8) i x e ( ) 0, r e ( ) 0, p e ( ) 0, q e ( ) 0 If the conditions specified in (2) - (8) are satisfied, then the rate triples (s i,d i,r i ) for i =1, 2,...,nare feasible with network coding. Frther, the only operations involved are dplication, roting, and bit-level XOR. Proof: We assme that the variables satisfying (2) - (8) are integers, which is jstified by scaling the network over time [6]. We begin by making the following observations. Observation 1: From (4) we see that antidote reqest q e (i j, ) (a negative qantity) can terminate only at node. Observation 2: From (5) we see that poison p e (i j, ) (a negative qantity) can originate only at node. Observation 3: For edge e, let f e (i j, ) = p e (i j, ) +q e (i j, ) +r e (i j, ). Fix i, j, and. From (3) we see that f e (i j, ) is conserved at each node. In the example shown in Fig. 1(b), f e (1 2,) = 1 for e = 3 and f e (1 2,)= 1 for e =1, 4, 6. Notice that the edges 1,3,4, and 6 form a cycle if we reverse the direction of edges with f e (1 2,)= 1, i.e., 1,4, and 6. In general, for any network, f e (i j, ) can be decomposed as a sperposition of cycles where f e(i j, ) =±1 for all edges e with the nderstanding that if f e(i j, ) = 1, then the direction of e is reversed. De to pacity of space, we skip the proof here. We refer to each of these cycles as an f (i j, ) cycle for i, j, and. Frther, since the qantities p( ), q( ), and r( ) are integers, it follows that along any edge of an f (i j, ) cycle, only one of these qantities is nonzero. From Observations 1 and 2 we see that q e (i j, ) terminates only at and that p e (i j, ) originates only at. (To simplify notation we represent a path from 1 to v m as ( 1,v m ). The distinction between an edge (, v) and a path ( 1,v m ) is clear from the context.) Ths, any f (i j, ) cycle comprises three paths (v, ), (, w) and (v, w) sch that (v, ) satisfies q e (i j, ) = 1, (, w) satisfies p e (i j, ) = 1, and (v, w) satisfies r e (i j, ) = 1. Some f (i j, ) cycles might have v =, which wold mean that it comprises of only the poison and antidote paths. 1759

3 From (6), we see that if tail(e) = then we can associate p e (j i, ) with p e (i j, ). This can be extended and we can associate an f (j i, ) cycle with an f (i j, ) cycle. Ths, all the poison, antidote, and antidote-reqest variables can be written as a sperposition of pairs of f (i j, ) and f (j i, ) cycles. We show that we can perform network coding on each of these pairs of cycles. Consider one sch pair of cycles. Let the cycles be f (i j, 3 ) and f (j i, 3 ). From the discssion above, the f (i j, 3 ) cycle is composed of paths ( 1, 3 ) with q e (i j, 3 ) = 1, ( 3, 4 ) with p e (i j, 3 ) = 1, and ( 1, 4 ) with r e (i j, 3 ) = 1. Similarly, the f (j i, 3 ) cycle is composed of paths ( 2, 3 ) with q e (j i, 3 )= 1, ( 3, 5 ) with p e (j i, 3 )= 1, and ( 2, 5 ) with r e (j i, 3 )=1. Using (8), we note that we can associate a niqe nit-rate path, say, x e(i) =1to the paths ( 1, 3 ) and ( 3, 5 ). Similarly we can associate a niqe nit-rate path say x e(j) =1to the paths ( 2, 3 ) and ( 3, 4 ). In the example shown in Fig. 1(b), we have 1 = s 1, 2 = s 2, 3 =, 4 = d 1, and 5 = d 2. Note that x e (1) = 1 (x e (2) = 1)) fore =1, 4, 7. (e =2, 4, 6.) Let b 1 represent a nit rate bit stream corresponding to x(i) available at 1 and b 2 represent a nit rate bit stream corresponding to x(j) available at 2. We perform the following network coding in order to reliably transmit one nit data from 1 to 5 and one nit of data from 2 to 4. b 1 is transmitted along the paths ( 1, 3 ) and ( 1, 4 ). b 2 is transmitted along the paths ( 2, 3 ) and ( 2, 5 ). b 1 b 2 is transmitted along the paths ( 3, 4 ) and ( 3, 5 ). This encoding, in effect, is eqivalent to replacing x e(i),x e(j) and the f (i j, 3 ),f (j i, 3 ) cycles by two nit-capacity virtal edges e 1 =( 1, 5 ) and e 2 =( 2, 4 ) sch that x e1 (i) =1and x e2 (j) =1. This replacement ensres that the nmber of f (i j, )and f (j i, ) cycles is redced while still ensring that x e (i) and x e (j) (the affected flows) satisfy the flow-conservation eqations. For this encoding, it can be verified that the sage of all edges along the paths ( 1, 3 ), ( 2, 3 ), ( 3, 4 ), ( 3, 5 ), ( 1, 4 ), and ( 2, 5 ) is given by the expression max(p e (i j, 3 ),p e (j i, 3 )) + x e (i)+x e (j) +r e (i j, 3 )+r e (j i, 3 ) (9) which evalates to one along all the edges. Ths, the sage of the edges in this pair of f (i j, 3 ) and f (j i, 3 ) cycles is given by (9). Note that the terms r e (i j, 3 )+r e (j i, 3 ) correspond to physical transmissions of bits. The term x e (i)+x e (j) can be thoght of as the data that wold be transmitted if data is sent by roting. However, by sending b 1 b 2, we transmit at a lower rate, lower by max(p e (i j, 3 ),p e (j i, 3 )). These can be thoght of as savings obtained de to network coding. Using Observation 3, we see that f e (i j, ) is a sperposition of pairs of cycles, each of which can be replaced by a pair of virtal edges over which roting sffices. By performing this operation till there are no more sch cycles left, we end p with an eqivalent network over which the connection triples (s i,d i,r i ) for i =1, 2,...,nare feasible with roting. If all the data is transmitted by roting, then the load on any edge is n x e(i). However, recall that de to an f (i j, ) cycle, the load on the edges in the cycle is adjsted by the qantity in (9). Since f e (i j, ) is a sperposition of many f (i j, ) cycles, the net adjstment of the load on the edges is obtained by smming (9) over all the f (i j, ) cycles. This expression is given by the left hand side of (7). The interpretation of the varios terms appearing in the smmation is as follows: By network coding, we obtain a savings of max(p e (i j, ),p e (j i, )) (which is negative) which is offset by excess load of r e (i j, ) (which is positive) de to the remedies. Usally, the savings are non-zero on congested edges and the remedies are non-zero on edges with spare capacity, ths allowing s to trade off bottleneck links with excess capacities. Every soltion that satisfies the constraints (2) - (8) corresponds to a network code that transmits data at a rate z e (see (7)) on edge e. These constraints can be combined with several possible objective fnctions, e.g., one can maximize the total throghpt (the sm of rates i R i) or minimize the cost of commnicating certain fixed rates sbject to the capacity constraints of the graph. III. INTEGER PROGRAMMING FORMULATION The previos linear program offers some flexibility in the choice of objective fnctions, permits roting (and network coding) along several paths from sorce to destination and makes little assmption abot the nderlying network topology. However, it reslts in large optimization problems, both in terms of the nmber of constraints and the nmber of variables. We will discss the complexity in Section IV. In particlar, keeping track of the origin of the poison increases the complexity drastically. (The term in p e (i j, ) can be thoght of as the variable keeping track of the origin of the poison.) This motivates s to consider a simpler optimization problem, where we restrict the connections to be of nit rate. 1 This makes the reslting optimization problem an integer program, bt with fewer constraints and variables than the original formlation. Consider the following linear program, where throghot 1 i, j n, and i j: at every node v V: x e (i) r e (i) p e (i, j) min e E a e z e +1 if v = s i x e (i) = 1 if v = d i 0 otherwise r e (i) p e (i, j) (x e (i)+ (10) n p e (i, j)) j=1 (11) r e (j) (12) 1 Higher rates can be modeled by placing several connections between the same sorce-destination pair. 1760

4 i<j at every destination node d i : at every edge e E: e Γ O(d i) j=1 n p e (i, j) =0 (13) n n max(p e (i, j),p e (j, i)) + x e (i)+ r e (i) z e C e x e (i)+ (14) n p e (i, j) 0 (15) j=1 x e ( ) 0, r e ( ) 0, p e ( ) 0 Note that we reqire flows of nit rate (10), ths losing some flexibility in the problems that can be modeled. The cost fnction takes the form of a minimm cost flow problem, with cost coefficients a e mltiplying the sage z e of every edge. Frthermore, we reqire the nderlying graph to be acyclic, which becomes necessary to exclde invalid network coding soltions. In the following we prove that soltions of this integer program are in fact valid network codes, which can be constrcted by sing roting and the binary XOR operation. Lemma 1: The cost of the optimal soltion of the linear program (10)-(15) is smaller or eqal to the optimal cost of the associated mlti-commodity flow problem (10), (16), and (17). Proof: Set all variables r e ( ) and p e ( ) to zero. Then, the linear program redces to the following form: min e E a e z e sbject to (10) at every node v Vand n x e (i) z e C e (16) x e (i) 0 (17) at every edge e E. This is identified to be the associated mlti-commodity flow problem consisting of the flow conservation constraints at the nodes, the constraint that the edge sages z e do not exceed the edge capacities C e and the nonnegativity constraints on the flows. The optimal soltion to this mlticommodity flow problem is a basic feasible soltion to the linear program (10)-(15) and therefore is also an pper bond on its optimal soltion. Contining along similar lines, it is possible to prove that the optimal cost of the linear program (2)-(8) is also lower than the cost of the optimal soltion of the associated mlti-commodity flow problem Theorem 2: If a soltion to the linear program (10)-(15) is integer, then it corresponds to a feasible network coding soltion involving only the binary XOR as a coding operation. Proof: Assme, we have an integer soltion. Since the flows are of nit rate we have x e (i) {0, +1}. Frthermore, from (15) we conclde that p e (i, j) {0, 1}. If all p e (, ) variables are zero, then according to the previos lemma the Variables Constraints Linear Program 3 E V n(n 1) V (n 2 n)(3 V + E ) Integer Program E n(n 1) (n 2 + n) V +(n +1) E TABLE I THE COMPLEXITY OF BOTH OPTIMIZATION PROBLEMS. WE APPROXIMATE THE NUMBERS UP TO LEADING TERMS. soltion corresponds to a mlti-commodity flow problem and therefore the connections can be established by roting only. Assme now some p(, ) variables eqal to 1 and pick an edge e (with tail(e) = and head(e) =v), where p e (i, j) = 1. (15) implies that x e (i) =1on this edge also. Since the flows are of rate one and we insist on integer soltions, flow i takes precisely one path from its sorce s i to its destination d i and clearly edge e lies on this path. The poison p e (i, j) satisfies a conservation law of the form (12), and therefore forms a path which can se only edges on the path of flow i (15). From (13) the p e (i, j)-path has to terminate at a node w d i 2. At the termination point w of the p e (i, j)-path an antidote r(j) has to enter the node (12). This antidote also forms a path (11) and let its sorce be node t. The RHS of (11) has to be strictly positive at node t, which implies that the flow x(j) entering node t mst be one, and the poison p(j, ) entering t mst be zero. Given a soltion to the proposed integer linear program, we constrct the network code by transmitting the following bit streams on edge e: x(i) if x e (i) =1and p e (i, ) =0, x(i) x(j) if x e (i) =1and p e (i, j) = 1 for some j, x(i) if r e (i) =1. We have proved, that every poison is canceled by the appropriate antidote, and that every antidote has its origin at a node, where npoisoned flow of the proper type enters. The assmption that the graph is acyclic is needed to ensre that the antidote comes from a node pstream of the poisoning node. This shows the validity of the proposed code constrction scheme and completes the proof. IV. PERFORMANCE EVALUATION Conting the nmber of variables and constraints (see Table I) of both formlations, we see that the integer program is of considerably smaller size than the linear program. On the other hand, solving an integer program is in general more complex than solving a linear program withot integer constraints. Integer programming is NP-complete [8] and networks exist where the integer program is very difficlt to solve. To find integer soltions we have sed a linear programming-based branch-andbond algorithm. In general one has to consider the trade-off between the redced size of the optimization problem (10)-(15) and the increase in complexity de to branch-and-bond. The first setp that we considered for performance evalation of or network coding scheme is the freqently sed geometric random graph model. Here, a nmber of nodes are scattered niformly over a nit sqare and nodes whose distance is below a certain threshold are considered connected with a point-to-point link. We have condcted extensive simlations 2 Since we reqire a directed acyclic graph, the vertices can be topologically sorted, thereby defining an order on the vertex set V. 1761

5 on random geometric networks, sing different objective fnctions sch as total throghpt or minimm cost, bt cold not observe gains. This observation motivates s to consider more reglar grid networks, sch as the one depicted in Fig. 2. We illstrate the performance of the integer program 3 on the grid network as docmented in Table II. We consider no capacity constraints and a minimm-cost objective fnction. The random parameters in the simlations are the cost coefficients of the links. We consider two different distribtions according to which they are drawn. The first distribtion models a scenario where most links have low cost, and a few links have large cost, ths representing bottlenecks. In this setp we observe gains de to network coding. When the link costs are niformly distribted, however, the gains disappear. A comparison with the simlation reslts given by the athors in [9] and more recently [7] is in order. In particlar, in [7] the athors consider a wireless network, which ses geographic (min-hop) roting. They report large gains in the total throghpt, when implementing an opportnistic heristic code constrction techniqe. These gains can be explained with several factors, the most important being the lack of congestion control when sing solely geographic roting. If the rotes are chosen based on geography, withot taking congestion into accont, a drastic breakdown of the total throghpt is experienced as the nmber of flows is increased. Network coding acts here as a congestion resoltion techniqe and gives large gains. Another fndamental difference between the setp in [7] and or model is that the former works on a wireless network, where nodes broadcast their messages to a set of neighbors, a phenomenon referred to as the wireless mlticast advantage [10]; we on the other hand consider a wired network with point-to-point links. The gains that we report are fairly modest, compared to [7,9]. However, these reslts hold only for the narrow setp that we consider, namely wireline networks, optimal roting 4 as the benchmark and no consideration of practical implementation isses sch as protocol design. Frthermore, we assme the flows in the network static and do not consider the dynamic behavior of the network. It is worthwhile to investigate the tility of network coding, when any of these restrictions is relaxed. Based on the previos discssion, larger gains might be observed in wireless networks (de to the wireless mlticast advantage), when the cost coefficients or capacities of the links are distribted highly non-niform, or when considering network coding as a tool to enhance roting, e.g. as a congestion resoltion techniqe. Also, frther research is indicated on the dynamic aspects of networks sing network coding and the interplay between practical network design and network coding. V. CONCLUSIONS Few explicit code constrction techniqes are known for the mltiple nicast setp. In this paper we proposed a systematic approach to introdce sboptimal, yet practical network coding for mltiple nicasts. Or scheme comes in two variations, a linear program and an integer program of smaller size. We discssed the comptational complexity and based on simlations a b c d e f Fig. 2. The grid network sed for simlations. Note, that all edges are directed from the sorces a, b, c down to the sinks d, e, f. Approach Connections Networks Average with gains gain a i 1 wp % 28.0% 100 wp % 24.9% a i nif(1, 100) TABLE II SIMULATION RESULTS ON THE GRID NETWORK IN FIG. 2:ANUMBER OF CONNECTIONS IS RANDOMLY SELECTED FROM THE DESIGNATED SOURCE AND DESTINATION PAIRS. THE LINK COSTS ARE RANDOMLY FIXED ACCORDING TO THE SPECIFIED DISTRIBUTION. WE REPORT THE FRACTION OF NETWORKS, WHERE NETWORK CODING RESULTED IN A LOWER TRANSMISSION COST THAN ROUTING. THE COST GAIN IS DEFINED AS cost roting cost coding AND IS CALCULATED OVER THE NETWORKS, cost roting WHERE A GAIN WAS OBSERVED. evalated the network coding gains. We also compared them with recently pblished reslts by other athors. REFERENCES [1] R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeng, Network information flow, IEEE Trans. on Inf. Theory, vol. IT-46, pp , [2] T. Ho, M. Médard, R. Koetter, D.R. Karger, M. Effros, J. Shi, and B. Leong, A random linear network coding approach to mlticast, sbmitted to IEEE Trans. on Inf. Theory. [3] D. S. Ln, M. Medard, T. Ho, and R. Koetter, Network coding with a cost criterion, in Proc. Intl. Symp. on Inf. Theory and its Appl., [4] D. P. Berstekas, Network optimization: Continos and discrete models, Belmont, MA: Athena Scientific, [5] N. Ratnakar, D. Traskov, and R. Koetter, Approaches to network coding for mltiple nicast, in Intern. Zrich Seminar on Comm., Febr [6] R. Koetter and M. Médard, An algebraic approach to network coding, IEEE/ACM Trans. on Networking, vol. 11, no. 5, pp , Oct [7] S. Katti, D. Katabi, Wenjn H, and Rahl Hariharan, The importance of being opportnistic: Practical network coding for wireless environments, in Allerton Conference, [8] I. Barland, P.G. Kolaitis, and M.N. Thakr, Integer programming as a framework for optimization and approximability, In Proc. IEEE Conference on Comptational Complexity, pages , [9] R. Khalili and K. Salamatian, A new relaying scheme for cheap wireless relay nodes in Wiopt 2005, Trentino, Italy. [10] D.S. Ln, N. Ratnakar, M. Medard, R. Koetter, D.R. Karger, T. Ho, E. Ahmed, Minimm-cost mlticast over coded packet networks, sbmitted to IEEE Trans. on Inf. Theory. 3 Since both the linear and the integer program model the same problem, the linear program in this case wold have given eqivalent reslts. 4 By optimal roting we mean the optimal soltion of the associated mlticommodity flow problem. 1762

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled.

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled. Jnction elements in network models. Classify by nmber of ports and examine the possible strctres that reslt. Using only one-port elements, no more than two elements can be assembled. Combining two two-ports

More information

Joint Transfer of Energy and Information in a Two-hop Relay Channel

Joint Transfer of Energy and Information in a Two-hop Relay Channel Joint Transfer of Energy and Information in a Two-hop Relay Channel Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, and Mohammad Reza Aref Information Systems and Secrity Lab (ISSL Department of Electrical

More information

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance Optimal Control of a Heterogeneos Two Server System with Consideration for Power and Performance by Jiazheng Li A thesis presented to the University of Waterloo in flfilment of the thesis reqirement for

More information

Section 7.4: Integration of Rational Functions by Partial Fractions

Section 7.4: Integration of Rational Functions by Partial Fractions Section 7.4: Integration of Rational Fnctions by Partial Fractions This is abot as complicated as it gets. The Method of Partial Fractions Ecept for a few very special cases, crrently we have no way to

More information

Multi-Voltage Floorplan Design with Optimal Voltage Assignment

Multi-Voltage Floorplan Design with Optimal Voltage Assignment Mlti-Voltage Floorplan Design with Optimal Voltage Assignment ABSTRACT Qian Zaichen Department of CSE The Chinese University of Hong Kong Shatin,N.T., Hong Kong zcqian@cse.chk.ed.hk In this paper, we stdy

More information

Modelling by Differential Equations from Properties of Phenomenon to its Investigation

Modelling by Differential Equations from Properties of Phenomenon to its Investigation Modelling by Differential Eqations from Properties of Phenomenon to its Investigation V. Kleiza and O. Prvinis Kanas University of Technology, Lithania Abstract The Panevezys camps of Kanas University

More information

Pulses on a Struck String

Pulses on a Struck String 8.03 at ESG Spplemental Notes Plses on a Strck String These notes investigate specific eamples of transverse motion on a stretched string in cases where the string is at some time ndisplaced, bt with a

More information

Discontinuous Fluctuation Distribution for Time-Dependent Problems

Discontinuous Fluctuation Distribution for Time-Dependent Problems Discontinos Flctation Distribtion for Time-Dependent Problems Matthew Hbbard School of Compting, University of Leeds, Leeds, LS2 9JT, UK meh@comp.leeds.ac.k Introdction For some years now, the flctation

More information

Decision Oriented Bayesian Design of Experiments

Decision Oriented Bayesian Design of Experiments Decision Oriented Bayesian Design of Experiments Farminder S. Anand*, Jay H. Lee**, Matthew J. Realff*** *School of Chemical & Biomoleclar Engineering Georgia Institte of echnology, Atlanta, GA 3332 USA

More information

Nonlinear parametric optimization using cylindrical algebraic decomposition

Nonlinear parametric optimization using cylindrical algebraic decomposition Proceedings of the 44th IEEE Conference on Decision and Control, and the Eropean Control Conference 2005 Seville, Spain, December 12-15, 2005 TC08.5 Nonlinear parametric optimization sing cylindrical algebraic

More information

1. Tractable and Intractable Computational Problems So far in the course we have seen many problems that have polynomial-time solutions; that is, on

1. Tractable and Intractable Computational Problems So far in the course we have seen many problems that have polynomial-time solutions; that is, on . Tractable and Intractable Comptational Problems So far in the corse we have seen many problems that have polynomial-time soltions; that is, on a problem instance of size n, the rnning time T (n) = O(n

More information

Information Source Detection in the SIR Model: A Sample Path Based Approach

Information Source Detection in the SIR Model: A Sample Path Based Approach Information Sorce Detection in the SIR Model: A Sample Path Based Approach Kai Zh and Lei Ying School of Electrical, Compter and Energy Engineering Arizona State University Tempe, AZ, United States, 85287

More information

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehighed Zhiyan Yan Department of Electrical

More information

On relative errors of floating-point operations: optimal bounds and applications

On relative errors of floating-point operations: optimal bounds and applications On relative errors of floating-point operations: optimal bonds and applications Clade-Pierre Jeannerod, Siegfried M. Rmp To cite this version: Clade-Pierre Jeannerod, Siegfried M. Rmp. On relative errors

More information

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 BIJU PATNAIK UNIVERSITY OF TECHNOLOGY, ODISHA Lectre Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 Prepared by, Dr. Sbhend Kmar Rath, BPUT, Odisha. Tring Machine- Miscellany UNIT 2 TURING MACHINE

More information

Chapter 2 Difficulties associated with corners

Chapter 2 Difficulties associated with corners Chapter Difficlties associated with corners This chapter is aimed at resolving the problems revealed in Chapter, which are cased b corners and/or discontinos bondar conditions. The first section introdces

More information

CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES. George P. Yanev

CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES. George P. Yanev Pliska Std. Math. Blgar. 2 (211), 233 242 STUDIA MATHEMATICA BULGARICA CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES George P. Yanev We prove that the exponential

More information

FEA Solution Procedure

FEA Solution Procedure EA Soltion Procedre (demonstrated with a -D bar element problem) EA Procedre for Static Analysis. Prepare the E model a. discretize (mesh) the strctre b. prescribe loads c. prescribe spports. Perform calclations

More information

Formal Methods for Deriving Element Equations

Formal Methods for Deriving Element Equations Formal Methods for Deriving Element Eqations And the importance of Shape Fnctions Formal Methods In previos lectres we obtained a bar element s stiffness eqations sing the Direct Method to obtain eact

More information

B-469 Simplified Copositive and Lagrangian Relaxations for Linearly Constrained Quadratic Optimization Problems in Continuous and Binary Variables

B-469 Simplified Copositive and Lagrangian Relaxations for Linearly Constrained Quadratic Optimization Problems in Continuous and Binary Variables B-469 Simplified Copositive and Lagrangian Relaxations for Linearly Constrained Qadratic Optimization Problems in Continos and Binary Variables Naohiko Arima, Snyong Kim and Masakaz Kojima October 2012,

More information

Performance analysis of GTS allocation in Beacon Enabled IEEE

Performance analysis of GTS allocation in Beacon Enabled IEEE 1 Performance analysis of GTS allocation in Beacon Enabled IEEE 8.15.4 Pangn Park, Carlo Fischione, Karl Henrik Johansson Abstract Time-critical applications for wireless sensor networks (WSNs) are an

More information

On the tree cover number of a graph

On the tree cover number of a graph On the tree cover nmber of a graph Chassidy Bozeman Minerva Catral Brendan Cook Oscar E. González Carolyn Reinhart Abstract Given a graph G, the tree cover nmber of the graph, denoted T (G), is the minimm

More information

Stability of Model Predictive Control using Markov Chain Monte Carlo Optimisation

Stability of Model Predictive Control using Markov Chain Monte Carlo Optimisation Stability of Model Predictive Control sing Markov Chain Monte Carlo Optimisation Elilini Siva, Pal Golart, Jan Maciejowski and Nikolas Kantas Abstract We apply stochastic Lyapnov theory to perform stability

More information

A Regulator for Continuous Sedimentation in Ideal Clarifier-Thickener Units

A Regulator for Continuous Sedimentation in Ideal Clarifier-Thickener Units A Reglator for Continos Sedimentation in Ideal Clarifier-Thickener Units STEFAN DIEHL Centre for Mathematical Sciences, Lnd University, P.O. Box, SE- Lnd, Sweden e-mail: diehl@maths.lth.se) Abstract. The

More information

Collective Inference on Markov Models for Modeling Bird Migration

Collective Inference on Markov Models for Modeling Bird Migration Collective Inference on Markov Models for Modeling Bird Migration Daniel Sheldon Cornell University dsheldon@cs.cornell.ed M. A. Saleh Elmohamed Cornell University saleh@cam.cornell.ed Dexter Kozen Cornell

More information

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehigh.ed Zhiyan Yan Department of Electrical

More information

1 Differential Equations for Solid Mechanics

1 Differential Equations for Solid Mechanics 1 Differential Eqations for Solid Mechanics Simple problems involving homogeneos stress states have been considered so far, wherein the stress is the same throghot the component nder std. An eception to

More information

Assignment Fall 2014

Assignment Fall 2014 Assignment 5.086 Fall 04 De: Wednesday, 0 December at 5 PM. Upload yor soltion to corse website as a zip file YOURNAME_ASSIGNMENT_5 which incldes the script for each qestion as well as all Matlab fnctions

More information

Code Construction for Two-Source Interference Networks

Code Construction for Two-Source Interference Networks Code Construction for Two-Source Interference Networks Elona Erez and Meir Feder Dept. of Electrical Engineering-Systems, Tel Aviv University, Tel Aviv, 69978, Israel, E-mail:{elona, meir}@eng.tau.ac.il

More information

Sources of Non Stationarity in the Semivariogram

Sources of Non Stationarity in the Semivariogram Sorces of Non Stationarity in the Semivariogram Migel A. Cba and Oy Leangthong Traditional ncertainty characterization techniqes sch as Simple Kriging or Seqential Gassian Simlation rely on stationary

More information

Krauskopf, B., Lee, CM., & Osinga, HM. (2008). Codimension-one tangency bifurcations of global Poincaré maps of four-dimensional vector fields.

Krauskopf, B., Lee, CM., & Osinga, HM. (2008). Codimension-one tangency bifurcations of global Poincaré maps of four-dimensional vector fields. Kraskopf, B, Lee,, & Osinga, H (28) odimension-one tangency bifrcations of global Poincaré maps of for-dimensional vector fields Early version, also known as pre-print Link to pblication record in Explore

More information

3 2D Elastostatic Problems in Cartesian Coordinates

3 2D Elastostatic Problems in Cartesian Coordinates D lastostatic Problems in Cartesian Coordinates Two dimensional elastostatic problems are discssed in this Chapter, that is, static problems of either plane stress or plane strain. Cartesian coordinates

More information

Second-Order Wave Equation

Second-Order Wave Equation Second-Order Wave Eqation A. Salih Department of Aerospace Engineering Indian Institte of Space Science and Technology, Thirvananthapram 3 December 016 1 Introdction The classical wave eqation is a second-order

More information

BLOOM S TAXONOMY. Following Bloom s Taxonomy to Assess Students

BLOOM S TAXONOMY. Following Bloom s Taxonomy to Assess Students BLOOM S TAXONOMY Topic Following Bloom s Taonomy to Assess Stdents Smmary A handot for stdents to eplain Bloom s taonomy that is sed for item writing and test constrction to test stdents to see if they

More information

Symmetric Range Assignment with Disjoint MST Constraints

Symmetric Range Assignment with Disjoint MST Constraints Symmetric Range Assignment with Disjoint MST Constraints Eric Schmtz Drexel University Philadelphia, Pa. 19104,USA Eric.Jonathan.Schmtz@drexel.ed ABSTRACT If V is a set of n points in the nit sqare [0,

More information

EXERCISES WAVE EQUATION. In Problems 1 and 2 solve the heat equation (1) subject to the given conditions. Assume a rod of length L.

EXERCISES WAVE EQUATION. In Problems 1 and 2 solve the heat equation (1) subject to the given conditions. Assume a rod of length L. .4 WAVE EQUATION 445 EXERCISES.3 In Problems and solve the heat eqation () sbject to the given conditions. Assme a rod of length.. (, t), (, t) (, ),, > >. (, t), (, t) (, ) ( ) 3. Find the temperatre

More information

Move Blocking Strategies in Receding Horizon Control

Move Blocking Strategies in Receding Horizon Control Move Blocking Strategies in Receding Horizon Control Raphael Cagienard, Pascal Grieder, Eric C. Kerrigan and Manfred Morari Abstract In order to deal with the comptational brden of optimal control, it

More information

Essentials of optimal control theory in ECON 4140

Essentials of optimal control theory in ECON 4140 Essentials of optimal control theory in ECON 4140 Things yo need to know (and a detail yo need not care abot). A few words abot dynamic optimization in general. Dynamic optimization can be thoght of as

More information

UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL

UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL 8th International DAAAM Baltic Conference "INDUSTRIAL ENGINEERING - 19-1 April 01, Tallinn, Estonia UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL Põdra, P. & Laaneots, R. Abstract: Strength analysis is a

More information

Least-squares collocation with covariance-matching constraints

Least-squares collocation with covariance-matching constraints J Geodesy DOI 1.17/s19-7-133-5 ORIGINAL ARTICLE Least-sqares collocation with covariance-matching constraints Christopher Kotsakis Received: 18 Agst 26 / Accepted: 28 December 26 Springer-Verlag 27 Abstract

More information

Lecture 8: September 26

Lecture 8: September 26 10-704: Information Processing and Learning Fall 2016 Lectrer: Aarti Singh Lectre 8: September 26 Note: These notes are based on scribed notes from Spring15 offering of this corse. LaTeX template cortesy

More information

RELIABILITY ASPECTS OF PROPORTIONAL MEAN RESIDUAL LIFE MODEL USING QUANTILE FUNC- TIONS

RELIABILITY ASPECTS OF PROPORTIONAL MEAN RESIDUAL LIFE MODEL USING QUANTILE FUNC- TIONS RELIABILITY ASPECTS OF PROPORTIONAL MEAN RESIDUAL LIFE MODEL USING QUANTILE FUNC- TIONS Athors: N.UNNIKRISHNAN NAIR Department of Statistics, Cochin University of Science Technology, Cochin, Kerala, INDIA

More information

The Linear Quadratic Regulator

The Linear Quadratic Regulator 10 The Linear Qadratic Reglator 10.1 Problem formlation This chapter concerns optimal control of dynamical systems. Most of this development concerns linear models with a particlarly simple notion of optimality.

More information

Computational Geosciences 2 (1998) 1, 23-36

Computational Geosciences 2 (1998) 1, 23-36 A STUDY OF THE MODELLING ERROR IN TWO OPERATOR SPLITTING ALGORITHMS FOR POROUS MEDIA FLOW K. BRUSDAL, H. K. DAHLE, K. HVISTENDAHL KARLSEN, T. MANNSETH Comptational Geosciences 2 (998), 23-36 Abstract.

More information

4.2 First-Order Logic

4.2 First-Order Logic 64 First-Order Logic and Type Theory The problem can be seen in the two qestionable rles In the existential introdction, the term a has not yet been introdced into the derivation and its se can therefore

More information

Distribution Network Planning Based on Entropy Fuzzy Comprehensive

Distribution Network Planning Based on Entropy Fuzzy Comprehensive Applied Mechanics and Materials Vols. 6-8 010 pp 780-784 Online: 010-06-30 010 Trans Tech Pblications, Switzerland doi:10.408/www.scientific.net/amm.6-8.780 Distribtion Network Planning Based on Entropy

More information

Evaluation of the Fiberglass-Reinforced Plastics Interfacial Behavior by using Ultrasonic Wave Propagation Method

Evaluation of the Fiberglass-Reinforced Plastics Interfacial Behavior by using Ultrasonic Wave Propagation Method 17th World Conference on Nondestrctive Testing, 5-8 Oct 008, Shanghai, China Evalation of the Fiberglass-Reinforced Plastics Interfacial Behavior by sing Ultrasonic Wave Propagation Method Jnjie CHANG

More information

EOQ Problem Well-Posedness: an Alternative Approach Establishing Sufficient Conditions

EOQ Problem Well-Posedness: an Alternative Approach Establishing Sufficient Conditions pplied Mathematical Sciences, Vol. 4, 2, no. 25, 23-29 EOQ Problem Well-Posedness: an lternative pproach Establishing Sfficient Conditions Giovanni Mingari Scarpello via Negroli, 6, 226 Milano Italy Daniele

More information

Nonparametric Identification and Robust H Controller Synthesis for a Rotational/Translational Actuator

Nonparametric Identification and Robust H Controller Synthesis for a Rotational/Translational Actuator Proceedings of the 6 IEEE International Conference on Control Applications Mnich, Germany, October 4-6, 6 WeB16 Nonparametric Identification and Robst H Controller Synthesis for a Rotational/Translational

More information

Optimal Control, Statistics and Path Planning

Optimal Control, Statistics and Path Planning PERGAMON Mathematical and Compter Modelling 33 (21) 237 253 www.elsevier.nl/locate/mcm Optimal Control, Statistics and Path Planning C. F. Martin and Shan Sn Department of Mathematics and Statistics Texas

More information

LINEAR COMBINATIONS AND SUBSPACES

LINEAR COMBINATIONS AND SUBSPACES CS131 Part II, Linear Algebra and Matrices CS131 Mathematics for Compter Scientists II Note 5 LINEAR COMBINATIONS AND SUBSPACES Linear combinations. In R 2 the vector (5, 3) can be written in the form

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information

A Theory of Markovian Time Inconsistent Stochastic Control in Discrete Time

A Theory of Markovian Time Inconsistent Stochastic Control in Discrete Time A Theory of Markovian Time Inconsistent Stochastic Control in Discrete Time Tomas Björk Department of Finance, Stockholm School of Economics tomas.bjork@hhs.se Agatha Mrgoci Department of Economics Aarhs

More information

Step-Size Bounds Analysis of the Generalized Multidelay Adaptive Filter

Step-Size Bounds Analysis of the Generalized Multidelay Adaptive Filter WCE 007 Jly - 4 007 London UK Step-Size onds Analysis of the Generalized Mltidelay Adaptive Filter Jnghsi Lee and Hs Chang Hang Abstract In this paper we analyze the bonds of the fixed common step-size

More information

The Coset Distribution of Triple-Error-Correcting Binary Primitive BCH Codes

The Coset Distribution of Triple-Error-Correcting Binary Primitive BCH Codes IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., APRIL 00 177 The Coset Distribtion of iple-error-correcting Binary Primitive BCH Codes Pascale Charpin, Member, IEEE, TorHelleseth, Fellow, IEEE, VictorA.

More information

CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy

CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK Wassim Joini and Christophe Moy SUPELEC, IETR, SCEE, Avene de la Bolaie, CS 47601, 5576 Cesson Sévigné, France. INSERM U96 - IFR140-

More information

Wireless Networks Without Edges : Dynamic Radio Resource Clustering and User Scheduling

Wireless Networks Without Edges : Dynamic Radio Resource Clustering and User Scheduling Wireless Networks Withot Edges : Dynamic Radio Resorce Clstering and User Schedling Yhan D and Gstavo de Veciana Department of Electrical and Compter Engineering, The University of Texas at Astin Email:

More information

FOUNTAIN codes [3], [4] provide an efficient solution

FOUNTAIN codes [3], [4] provide an efficient solution Inactivation Decoding of LT and Raptor Codes: Analysis and Code Design Francisco Lázaro, Stdent Member, IEEE, Gianligi Liva, Senior Member, IEEE, Gerhard Bach, Fellow, IEEE arxiv:176.5814v1 [cs.it 19 Jn

More information

Simplified Identification Scheme for Structures on a Flexible Base

Simplified Identification Scheme for Structures on a Flexible Base Simplified Identification Scheme for Strctres on a Flexible Base L.M. Star California State University, Long Beach G. Mylonais University of Patras, Greece J.P. Stewart University of California, Los Angeles

More information

Elements of Coordinate System Transformations

Elements of Coordinate System Transformations B Elements of Coordinate System Transformations Coordinate system transformation is a powerfl tool for solving many geometrical and kinematic problems that pertain to the design of gear ctting tools and

More information

Cubic graphs have bounded slope parameter

Cubic graphs have bounded slope parameter Cbic graphs have bonded slope parameter B. Keszegh, J. Pach, D. Pálvölgyi, and G. Tóth Agst 25, 2009 Abstract We show that every finite connected graph G with maximm degree three and with at least one

More information

Lecture Notes: Finite Element Analysis, J.E. Akin, Rice University

Lecture Notes: Finite Element Analysis, J.E. Akin, Rice University 9. TRUSS ANALYSIS... 1 9.1 PLANAR TRUSS... 1 9. SPACE TRUSS... 11 9.3 SUMMARY... 1 9.4 EXERCISES... 15 9. Trss analysis 9.1 Planar trss: The differential eqation for the eqilibrim of an elastic bar (above)

More information

Study of the diffusion operator by the SPH method

Study of the diffusion operator by the SPH method IOSR Jornal of Mechanical and Civil Engineering (IOSR-JMCE) e-issn: 2278-684,p-ISSN: 2320-334X, Volme, Isse 5 Ver. I (Sep- Oct. 204), PP 96-0 Stdy of the diffsion operator by the SPH method Abdelabbar.Nait

More information

On relative errors of floating-point operations: optimal bounds and applications

On relative errors of floating-point operations: optimal bounds and applications On relative errors of floating-point operations: optimal bonds and applications Clade-Pierre Jeannerod, Siegfried M. Rmp To cite this version: Clade-Pierre Jeannerod, Siegfried M. Rmp. On relative errors

More information

STEP Support Programme. STEP III Hyperbolic Functions: Solutions

STEP Support Programme. STEP III Hyperbolic Functions: Solutions STEP Spport Programme STEP III Hyperbolic Fnctions: Soltions Start by sing the sbstittion t cosh x. This gives: sinh x cosh a cosh x cosh a sinh x t sinh x dt t dt t + ln t ln t + ln cosh a ln ln cosh

More information

Technical Note. ODiSI-B Sensor Strain Gage Factor Uncertainty

Technical Note. ODiSI-B Sensor Strain Gage Factor Uncertainty Technical Note EN-FY160 Revision November 30, 016 ODiSI-B Sensor Strain Gage Factor Uncertainty Abstract Lna has pdated or strain sensor calibration tool to spport NIST-traceable measrements, to compte

More information

Cuckoo hashing: Further analysis

Cuckoo hashing: Further analysis Information Processing Letters 86 (2003) 215 219 www.elsevier.com/locate/ipl Cckoo hashing: Frther analysis Lc Devroye,PatMorin School of Compter Science, McGill University, 3480 University Street, Montreal,

More information

Study on the impulsive pressure of tank oscillating by force towards multiple degrees of freedom

Study on the impulsive pressure of tank oscillating by force towards multiple degrees of freedom EPJ Web of Conferences 80, 0034 (08) EFM 07 Stdy on the implsive pressre of tank oscillating by force towards mltiple degrees of freedom Shigeyki Hibi,* The ational Defense Academy, Department of Mechanical

More information

Homotopy Perturbation Method for Solving Linear Boundary Value Problems

Homotopy Perturbation Method for Solving Linear Boundary Value Problems International Jornal of Crrent Engineering and Technolog E-ISSN 2277 4106, P-ISSN 2347 5161 2016 INPRESSCO, All Rights Reserved Available at http://inpressco.com/categor/ijcet Research Article Homotop

More information

Subcritical bifurcation to innitely many rotating waves. Arnd Scheel. Freie Universitat Berlin. Arnimallee Berlin, Germany

Subcritical bifurcation to innitely many rotating waves. Arnd Scheel. Freie Universitat Berlin. Arnimallee Berlin, Germany Sbcritical bifrcation to innitely many rotating waves Arnd Scheel Institt fr Mathematik I Freie Universitat Berlin Arnimallee 2-6 14195 Berlin, Germany 1 Abstract We consider the eqation 00 + 1 r 0 k2

More information

1 Undiscounted Problem (Deterministic)

1 Undiscounted Problem (Deterministic) Lectre 9: Linear Qadratic Control Problems 1 Undisconted Problem (Deterministic) Choose ( t ) 0 to Minimize (x trx t + tq t ) t=0 sbject to x t+1 = Ax t + B t, x 0 given. x t is an n-vector state, t a

More information

Direct linearization method for nonlinear PDE s and the related kernel RBFs

Direct linearization method for nonlinear PDE s and the related kernel RBFs Direct linearization method for nonlinear PDE s and the related kernel BFs W. Chen Department of Informatics, Uniersity of Oslo, P.O.Box 1080, Blindern, 0316 Oslo, Norway Email: wenc@ifi.io.no Abstract

More information

Queueing analysis of service deferrals for load management in power systems

Queueing analysis of service deferrals for load management in power systems Qeeing analysis of service deferrals for load management in power systems Andrés Ferragt and Fernando Paganini Universidad ORT Urgay Abstract With the advent of renewable sorces and Smart- Grid deployments,

More information

Conditions for Approaching the Origin without Intersecting the x-axis in the Liénard Plane

Conditions for Approaching the Origin without Intersecting the x-axis in the Liénard Plane Filomat 3:2 (27), 376 377 https://doi.org/.2298/fil7276a Pblished by Faclty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Conditions for Approaching

More information

The Dual of the Maximum Likelihood Method

The Dual of the Maximum Likelihood Method Department of Agricltral and Resorce Economics University of California, Davis The Dal of the Maximm Likelihood Method by Qirino Paris Working Paper No. 12-002 2012 Copyright @ 2012 by Qirino Paris All

More information

A FIRST COURSE IN THE FINITE ELEMENT METHOD

A FIRST COURSE IN THE FINITE ELEMENT METHOD INSTRUCTOR'S SOLUTIONS MANUAL TO ACCOMANY A IRST COURS IN TH INIT LMNT MTHOD ITH DITION DARYL L. LOGAN Contents Chapter 1 1 Chapter 3 Chapter 3 3 Chapter 17 Chapter 5 183 Chapter 6 81 Chapter 7 319 Chapter

More information

Minimum-Latency Beaconing Schedule in Multihop Wireless Networks

Minimum-Latency Beaconing Schedule in Multihop Wireless Networks This fll text paper was peer reiewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 009 proceedings Minimm-Latency Beaconing Schedle in Mltihop

More information

REINFORCEMENT LEARNING AND OPTIMAL ADAPTIVE CONTROL

REINFORCEMENT LEARNING AND OPTIMAL ADAPTIVE CONTROL Lewis c11.tex V1-10/19/2011 4:10pm Page 461 11 REINFORCEMENT LEARNING AND OPTIMAL ADAPTIVE CONTROL In this book we have presented a variety of methods for the analysis and design of optimal control systems.

More information

Simulation investigation of the Z-source NPC inverter

Simulation investigation of the Z-source NPC inverter octoral school of energy- and geo-technology Janary 5 20, 2007. Kressaare, Estonia Simlation investigation of the Z-sorce NPC inverter Ryszard Strzelecki, Natalia Strzelecka Gdynia Maritime University,

More information

Model Discrimination of Polynomial Systems via Stochastic Inputs

Model Discrimination of Polynomial Systems via Stochastic Inputs Model Discrimination of Polynomial Systems via Stochastic Inpts D. Georgiev and E. Klavins Abstract Systems biologists are often faced with competing models for a given experimental system. Unfortnately,

More information

PHASE STEERING AND FOCUSING BEHAVIOR OF ULTRASOUND IN CEMENTITIOUS MATERIALS

PHASE STEERING AND FOCUSING BEHAVIOR OF ULTRASOUND IN CEMENTITIOUS MATERIALS PHAS STRING AND FOCUSING BHAVIOR OF ULTRASOUND IN CMNTITIOUS MATRIALS Shi-Chang Wooh and Lawrence Azar Department of Civil and nvironmental ngineering Massachsetts Institte of Technology Cambridge, MA

More information

A New Approach to Direct Sequential Simulation that Accounts for the Proportional Effect: Direct Lognormal Simulation

A New Approach to Direct Sequential Simulation that Accounts for the Proportional Effect: Direct Lognormal Simulation A ew Approach to Direct eqential imlation that Acconts for the Proportional ffect: Direct ognormal imlation John Manchk, Oy eangthong and Clayton Detsch Department of Civil & nvironmental ngineering University

More information

Power Enhancement in High Dimensional Cross-Sectional Tests

Power Enhancement in High Dimensional Cross-Sectional Tests Power Enhancement in High Dimensional Cross-Sectional ests arxiv:30.3899v2 [stat.me] 6 Ag 204 Jianqing Fan, Yan Liao and Jiawei Yao Department of Operations Research and Financial Engineering, Princeton

More information

Constructive Root Bound for k-ary Rational Input Numbers

Constructive Root Bound for k-ary Rational Input Numbers Constrctive Root Bond for k-ary Rational Inpt Nmbers Sylvain Pion, Chee Yap To cite this version: Sylvain Pion, Chee Yap. Constrctive Root Bond for k-ary Rational Inpt Nmbers. 19th Annal ACM Symposim on

More information

Research Article Permanence of a Discrete Predator-Prey Systems with Beddington-DeAngelis Functional Response and Feedback Controls

Research Article Permanence of a Discrete Predator-Prey Systems with Beddington-DeAngelis Functional Response and Feedback Controls Hindawi Pblishing Corporation Discrete Dynamics in Natre and Society Volme 2008 Article ID 149267 8 pages doi:101155/2008/149267 Research Article Permanence of a Discrete Predator-Prey Systems with Beddington-DeAngelis

More information

arxiv: v1 [physics.flu-dyn] 11 Mar 2011

arxiv: v1 [physics.flu-dyn] 11 Mar 2011 arxiv:1103.45v1 [physics.fl-dyn 11 Mar 011 Interaction of a magnetic dipole with a slowly moving electrically condcting plate Evgeny V. Votyakov Comptational Science Laboratory UCY-CompSci, Department

More information

Universal Scheme for Optimal Search and Stop

Universal Scheme for Optimal Search and Stop Universal Scheme for Optimal Search and Stop Sirin Nitinawarat Qalcomm Technologies, Inc. 5775 Morehose Drive San Diego, CA 92121, USA Email: sirin.nitinawarat@gmail.com Vengopal V. Veeravalli Coordinated

More information

Solving a System of Equations

Solving a System of Equations Solving a System of Eqations Objectives Understand how to solve a system of eqations with: - Gass Elimination Method - LU Decomposition Method - Gass-Seidel Method - Jacobi Method A system of linear algebraic

More information

New Multi-User OFDM Scheme: Braided Code Division Multiple Access

New Multi-User OFDM Scheme: Braided Code Division Multiple Access New Mlti-User Scheme: Braided Code Division Mltiple Access Marcos B.S. Tavares, Michael Lentmaier, Kamil Sh. Zigangirov and Gerhard. Fettweis Vodafone Chair Mobile Commnications Systems, Technische Universität

More information

RESGen: Renewable Energy Scenario Generation Platform

RESGen: Renewable Energy Scenario Generation Platform 1 RESGen: Renewable Energy Scenario Generation Platform Emil B. Iversen, Pierre Pinson, Senior Member, IEEE, and Igor Ardin Abstract Space-time scenarios of renewable power generation are increasingly

More information

Characterizations of probability distributions via bivariate regression of record values

Characterizations of probability distributions via bivariate regression of record values Metrika (2008) 68:51 64 DOI 10.1007/s00184-007-0142-7 Characterizations of probability distribtions via bivariate regression of record vales George P. Yanev M. Ahsanllah M. I. Beg Received: 4 October 2006

More information

Imprecise Continuous-Time Markov Chains

Imprecise Continuous-Time Markov Chains Imprecise Continos-Time Markov Chains Thomas Krak *, Jasper De Bock, and Arno Siebes t.e.krak@.nl, a.p.j.m.siebes@.nl Utrecht University, Department of Information and Compting Sciences, Princetonplein

More information

DEFINITION OF A NEW UO 2 F 2 DENSITY LAW FOR LOW- MODERATED SOLUTIONS (H/U < 20) AND CONSEQUENCES ON CRITICALITY SAFETY

DEFINITION OF A NEW UO 2 F 2 DENSITY LAW FOR LOW- MODERATED SOLUTIONS (H/U < 20) AND CONSEQUENCES ON CRITICALITY SAFETY DEFINITION OF A NEW UO 2 F 2 DENSITY LAW FOR LOW- MODERATED SOLUTIONS ( < 20) AND CONSEQUENCES ON CRITICALITY SAFETY N. Leclaire, S. Evo, I.R.S.N., France Introdction In criticality stdies, the blk density

More information

LOS Component-Based Equal Gain Combining for Ricean Links in Uplink Massive MIMO

LOS Component-Based Equal Gain Combining for Ricean Links in Uplink Massive MIMO 016 Sixth International Conference on Instrmentation & Measrement Compter Commnication and Control LOS Component-Based Eqal Gain Combining for Ricean Lins in plin Massive MIMO Dian-W Ye College of Information

More information

J.A. BURNS AND B.B. KING redced order controllers sensors/actators. The kernels of these integral representations are called fnctional gains. In [4],

J.A. BURNS AND B.B. KING redced order controllers sensors/actators. The kernels of these integral representations are called fnctional gains. In [4], Jornal of Mathematical Systems, Estimation, Control Vol. 8, No. 2, 1998, pp. 1{12 c 1998 Birkhaser-Boston A Note on the Mathematical Modelling of Damped Second Order Systems John A. Brns y Belinda B. King

More information

Communicating the sum of sources in a 3-sources/3-terminals network

Communicating the sum of sources in a 3-sources/3-terminals network Communicating the sum of sources in a 3-sources/3-terminals network Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel Email: mikel@openu.ac.il Aditya Ramamoorthy

More information

Stair Matrix and its Applications to Massive MIMO Uplink Data Detection

Stair Matrix and its Applications to Massive MIMO Uplink Data Detection 1 Stair Matrix and its Applications to Massive MIMO Uplink Data Detection Fan Jiang, Stdent Member, IEEE, Cheng Li, Senior Member, IEEE, Zijn Gong, Senior Member, IEEE, and Roy S, Stdent Member, IEEE Abstract

More information

Survivable Virtual Topology Mapping To Provide Content Connectivity Against Double-Link Failures

Survivable Virtual Topology Mapping To Provide Content Connectivity Against Double-Link Failures BONSAI Lab Srvivable Virtal Topology Mapping To Provide Content Connectivity Against Doble-Link Failres Ali Hmaity Massimo Tornatore Franceo Msmeci OUTLINE Motivations Srvivable virtal topology mapping

More information

Chapter 3. Preferences and Utility

Chapter 3. Preferences and Utility Chapter 3 Preferences and Utilit Microeconomics stdies how individals make choices; different individals make different choices n important factor in making choices is individal s tastes or preferences

More information

Prediction of Transmission Distortion for Wireless Video Communication: Analysis

Prediction of Transmission Distortion for Wireless Video Communication: Analysis Prediction of Transmission Distortion for Wireless Video Commnication: Analysis Zhifeng Chen and Dapeng W Department of Electrical and Compter Engineering, University of Florida, Gainesville, Florida 326

More information