Beyond Cut-Set Bounds - The Approximate Capacity of D2D Networks

Size: px
Start display at page:

Download "Beyond Cut-Set Bounds - The Approximate Capacity of D2D Networks"

Transcription

1 Beyond Cut-Set Bound - The Approximate Capacity of DD Network Avik Sengupta Hume Center for National Security and Technology Department of Electrical and Computer Engineering Virginia Tech, Blackburg, VA 4060, USA avikg@vt.edu Ravi Tandon Dicovery Analytic Center Department of Computer Science Virginia Tech, Blackburg, VA 4060, USA tandonr@vt.edu Abtract Device-to-Device DD communication i emerging a a viable olution for alleviating the evere capacity crunch in content-centric wirele network. DD encourage backhaulfree communication directly between device with imilar content requirement grouped into cluter. In thi work, a elf-utaining DD network i conidered, where a et of commonly requeted file are completely tored within the collective device memorie in a cluter and file requet from device are erviced by local inter-device multicat tranmiion. For uch a network, new information theoretic convere reult are developed, in the form of a lower bound on the minimum DD multicat rate a a function of the torage per device. The propoed convere i then ued to characterize the approximate tradeoff between the device torage and DD multicat rate to within a contant multiplicative gap of 8. I. INTRODUCTION In recent time, the dynamic of traffic over wirele network ha undergone a paradigm hift to become increaingly content centric with multimedia content ditribution holding precedence. Thi neceitate careful deign of content torage and over-the-air ditribution cheme within the network to efficently ue carce pectral reource to handle heavy traffic load a evidenced by a wealth of recent reearch [] []. Device-to-device DD communication ytem have been propoed a one of the olution that could help in alleviating the evere capacity crunch in wirele network [] [6]. DD ue low-power direct communication within device grouped into cluter to facilitate large cale frequency reue thereby freeing up preciou pectral reource. We conider a DD network with device, and N file denoted by F,..., F N, each of ize B unit, where the torage of each device i M B unit. The bae-tation populate the device with function of file, depending on the number of uer and available device torage. The DD ytem i elf-utaining i.e., all N file mut be recoverable from the collective torage memory of the device, which i equivalent to the condition M N. Once the device reveal their file requet, all the device within the cluter tranmit multicat meage over the hared link to ervice the requet. Figure illutrate the ytem model. The torage/multicat mechanim mut be deigned uch that any device mut be able to decode it requeted file uing it local torage and the multicat tranmiion from other device. Recently, Maddah-Ali and Nieen have invetigated a related caching problem [] [4] for which it ha been hown that, by jointly deigning the content torage and delivery, order-wie improvement in tranmiion rate can be achieved. The main difference between the caching problem tudied in [,] and the DD problem i the ditributed nature of multicat tranmiion. The caching problem allow for centralized delivery, in which the multicat can be any arbitrary function of all N file. In the DD problem however, the outgoing multicat from each device can only depend on the content tored at that device. The focu of thi work i on the fundamental tradeoff between the device torage and the total multicat tranmiion rate referred to a the M, R tradeoff for the DD problem. In [5,6], Ji et.al. preent new torage/delivery mechanim for the DD problem. The reult in [6] how that for a elf-utaining DD network, when the device can ue local inter-device multicat tranmiion to atify the requet of other within the cluter, orderwie rate improvement imilar to [,] can be achieved. The author preent an achievable cheme a well a a cut-et baed argument to obtain upper and lower bound on the M, R tradeoff for the DD problem. In thi work, we develop a new convere lower bound on the M, R tradeoff for the DD problem. The new lower bound addree contraint that are unique to the DD network, i.e., the local dependence of device multicat on it tored content. We how that the new convere i tighter than the exiting one preented in [6, Theorem ] which are primarily baed on the relaxation of the DD problem to the centralized caching problem for all value of problem parameter. Our reult how that the achievable cheme preented in [6] i indeed optimal for the lowet allowable value of torage memory for a elf-utaining DD network i.e., at M=N/. Uing our new convere reult, together with the achievable cheme of [6], we characterize the M, R tradeoff for the DD network to within a maximum contant multiplicative gap of 8 for all value of problem parameter. The paper i organized a follow: Section II outline the ytem model. Section III detail the analyi of the new lower bound on the torage v. rate tradeoff for the DD network, while Section IV illutrate the intuition behind the new bound through an example. Finally, Section V conclude the paper.

2 For the M, R DD cheme, the probability of error i defined a: P e max max P ˆF Rk F Rk. 5 R,...,R [N] k [] Definition 4 Storage v. Rate Tradeoff. The torage-rate pair M, R i achievable if, for any ϵ > 0, there exit an M, R DD cheme for which P e ϵ. The torage v. rate tradeoff i defined a: RM inf {R : M, R i achievable}. 6 Fig.. Sytem Model for device-to-device DD Network. Notation: Let Y i be a random variable. Y [a:b], where a < b denote the et of random variable {Y i : i = a, a +,..., b, b}. Alo, Y [a,b] denote the et {Y i : i = a, b}. Y [n] denote a et of any n arbitrary random variable Y i uch that Y [n] = n. N + denote the et of natural number; the function x + = max0, x; x denote the ceil function; x denote the floor function. II. SYSTEM MODEL The DD network ha uer, and a total of N file, denoted by F,.., F N, where each file i aumed to be of ize B, for ome B N +. Formally, the file F n are i.i.d and ditributed a : F n Unif{,,..., B }. We next define the key component of the DD problem: Definition Storage. The content torage phae conit of torage function, which map the file F,..., F N into the device torage content Z k ϕ k F,..., F N, for each uer k {,,..., }. The maximum allowable ize of the content of each device torage, Z k, i MB unit. An additional contraint of elf-utainability i enforced i.e., M N, which enure all the file in the ytem are completely tored within the DD cluter. Definition Delivery. In the delivery phae each device k {,,..., } ue one of N encoding function to map it torage content, Z k, to a multicat tranmiion: XR k,...,r ψ R,...,R Zk k {,,..., }. over the hared link in repone to the requet R,..., R {,,..., N }. Each uch tranmiion ha rate RB/ unit. The total multicat rate. when all device tranmit, i RB unit. Definition File Decoding. Once the multicat tranmiion i received, N decoding function map the received ignal over the hared link XR,...,R,..., X R,...,R and the torage content Z k to the etimate ˆF Rk µ R,...,R,k XR,...,R,..., X R,...,R, Z k, 4 of the requeted file F Rk for uer k {,,..., }. III. MAIN RESULTS AND DISCUSSION We next preent our main reult which give a new information theoretic lower bound on the torage v. rate tradeoff for the DD problem. Theorem. In a DD ytem with device and N file, with each device having torage ize M, and M N, the optimal content delivery rate R M i lower bounded by: R M R LB M N M max {,...,}, l {,..., N } where µ = min N l l µ l,, l. N l + Proof. The proof of Theorem i given in Appendix A, 7 The expreion in Theorem ha two parameter -, which i related to the number of device and a well a a new parameter l. Compared to [6, Theorem ], the additional parameter l add further flexibility to the lower bound expreion and better model the file decoding through the interaction of the device torage content and the multicat tranmiion. Conidering the cut-et baed bound preented in [6, Theorem ], the firt term inide the max function i imply the expreion for the centralized caching problem preented in [, Theorem ]. Furthermore, etting l = N/ in Theorem yield { } R N M M max {,...,} N, 8 which i greater than the cut-et expreion in the firt term inide the max function owing to the factor in the denominator. The econd term inide the max function can be obtained by etting =, l = N in Theorem. Thu, the propoed bound i generally tighter than the bound in [6, Theorem ]. It i to be noted that the bound in [6] i tight only for large value of device torage ize M. A hown in the equel, the new bound in Theorem i tighter for maller value of M and yield the exiting bound a a pecial cae for large value of M. Next, we preent our econd main reult, which etablihe the optimal torage v. rate tradeoff for the DD network to within a contant multiplicative factor. In [6], the author propoe a DD content ditribution cheme which achieve a rate given by [6, Theorem ]. Uing the reult in 7, we how a contant multiplicative gap exit between the new lower bound and the achievable rate in [6, Theorem ]:

3 Theorem. Let R UB M be the achievable rate of the DD cheme given in [6, Theorem ] and let R LB M be the lower bound on the optimal rate given in 7. For any N + device, N N + file, and device torage in the range N M N, we Gap = R UBM R LB M = M = N N < M 6 < M. 9 8 M N Proof. The proof of Theorem i omitted for brevity. IV. INTUITION BEHIND PROOF OF THEOREM We next preent a detailed example to illutrate the intuition behind the propoed convere. Example. Conider a DD ytem with = device, each with a torage memory of M, and N = file A, B, C each of unit ize. For thi problem, the lower bound [6, Theorem ] are given by: R + M 0 R + M. In contrat, the propoed bound in Theorem give following tighter bound for different choice of and l: R + 6M 8, =, l = 8R + 6M 5, =, l = R + M, =, l =, 4 where 4 i the bound in. Next, we detail the derivation of the new lower bound and. Firt, we conider the requet vector R, R, R = A, B, C and R, R, R = B, C, A. The firt = device torage content Z, Z along with two tranmiion X ABC = {XABC }, X BCA = {XBCA } from the third device correponding to the two requet vector are able to decode all file. Here each tranmiion ha the rate of R. We upper bound the entropy of l = tranmiion with thi rate, while uing the other tranmiion decoding capability in conjunction with the device torage content to derive a tighter bound. We HZ [,], X ABC, X BCA 5 HZ [,] + H X ABC, X BCA Z [,] 6 M + H X ABC + H X BCA Z [,], X ABC 7 + H X BCA Z [,], X ABC, A, B 8 + H X BCA, Z Z [,], X ABC, A, B 9 + HZ Z [,], X ABC, A, B + H X BCA Z [:], X ABC, A, B 0 + HZ Z [,], A, B + H X BCA Z [:], X ABC, A, B, C + HZ Z [,], A, B, where follow from the fact that H X BCA Z [:], X ABC, A, B, C = 0 ince X BCA i a function of the file A, B, C which are preent inide the conditioning. Conidering the term HZ Z [,], A, B, we HZ Z [,], A, B = HZ [:] A, B HZ [,] A, B. Uing in, we + HZ [:] A, B HZ [,] A, B. 4 Now conidering all poible ubet of Z [:] having cardinality, in the RHS of 4, we have the following: + HZ [:] A, B HZ [,] A, B. 5 + HZ [:] A, B HZ [,] A, B. 6 Symmetrizing over the inequalitie in 4, 5 and 6, we + HZ [:] A, B i,j=,i j HZ [i,j] A, B. 7 Han Inequality: We next tate Han Inequality [7, Theorem 7.6.] on ubet of random variable, which we ue throughout the paper for deriving the new lower bound. Let {X, X,..., X n } denote a et of random variable. Further, let X [] {X, X,..., X n } denote a ubet of cardinality. Then given two ubet X [r], X [m] where r m, the tatement of Han Inequality can be tated a: n r X [r] : X [r] =r H X [r] r n m X [m] : X [m] =m H X [m] m, 8 where the um are over all poible ubet of ize r, m repectively. Next, conider Z [:] a the et of random variable and the ubet Z [i,j] Z [:] : i j, i, j =,, of cardinality. Applying Han Inequality uing the conditional entropy of the et, we H Z [:] A, B H Z [i,j] A, B 9 i= H Z [:] A, B i,j= i j i,j=,i j H Z [i,j] A, B. 0 Subtituting 0 into 4, we + HZ [:] A, B HZ [:] A, B + HZ [:] A, B + HZ [:], C A, B + HC A, B + HZ [:] A, B, C 4 + R + 6M 8. 5

4 Rate R New Lower Bound Theorem 0. Lower Bound in [6] Upper Bound in [6] Storage per Device M a Rate R New Lower Bound Theorem Lower Bound in [6] Upper Bound in [6] Storage per Device M Fig.. M v. R tradeoff for a DD cluter with a N = = and b N = = 0. b Next, we conider = device torage content, Z, and three requet vector R, R, R = A, B, C, R, R, R = B, C, A and R, R, R = C, A, B along with tranmiion XABC = {XABC, X ABC }, X BCA = {XBCA, X BCA }, X CAB = {XCAB, X CAB } which are capable of decoding all file. Each compoite tranmiion i of rate R. We upper bound the entropy of l = tranmiion with their rate. Thu we HZ, X ABC, X BCA, X CAB 6 HZ + H X ABC, X BCA, X CAB Z 7 M + H X ABC, X BCA Z + H X CAB Z, X ABC, X BCA 8 M + R + H X CAB, Z Z, X ABC, X BCA 9 + HZ Z, X ABC, X BCA, A, B + H X CAB Z [,], X ABC, X BCA, A, B, C 40 + HZ Z, A, B 4 + HZ [,] A, B HZ A, B, 4 where, 40 follow from the fact that H X CAB Z [,], X ABC, X BCA, A, B, C = 0 ince X CAB i a function of the file A, B, C. Conidering all poible ubet of Z [,] of cardinality and uing a imilar ymmetrization argument and Han Inequality, we get: + HZ [,] A, B HZ [,] A, B + HC A, B + HZ [,] A, B, C R + 6M Finally, conidering again, = device torage content, Z, and three requet vector R, R, R = A, B, C, R, R, R = B, C, A and R, R, R = C, A, B along with three tranmiion XABC = {XABC, X ABC }, X BCA = {XBCA, X BCA }, X CAB = {XCAB, X CAB } which are capable of decoding all file. Each tranmiion ha rate R /. We upper bound the entropy of l = tranmiion by their rate. We HZ, X ABC, X BCA, X CAB 47 HZ + H X ABC + H X BCA + H X CAB 48 M + R 49 R + M. 50 Finally, combining, and 4, give the propoed lower bound on the optimal tranmiion rate a hown in Figure a. The lat bound on the rate given in 50 i tight only in the cae when the tranmiion are almot independent of each other. The propoed convere i tight at the point M = N where we how that the achievable point propoed in [6, Theorem ] i optimal. For increaing N, we can ee from Figure b that the propoed convere ignificantly improve on the exiting bound from [6, Theorem ]. V. CONCLUSION In thi paper, we preented a new information theoretic lower bound for a elf-utaining DD network. We have leveraged Han Inequality to better model the interaction of hared content tored in the device memorie and file decoding capability of multicat tranmiion to derive new lower bound which are generally tighter than the exiting cut-et baed bound. Uing the new lower bound, we characterized the device torage v. tranmiion rate tradeoff of the DD network to within a maximum contant multiplicative factor of 8 for all poible value of problem parameter. APPENDIX A PROOF OF THEOREM Let there be a library of N N + file F [:N] each of unit ize without lo of generality, and N + device in the DD cluter, with torage content Z [:]. The elf utainability condition of the DD cluter, we have M N. Let be an integer uch that {,,..., }. Conider

5 the firt device torage content, Z [:], and a requet vector R, R,..., R, R +,..., R =,,...,, ϕ,..., ϕ i.e., the firt requet are unique file while the remaining can be for arbitrary file. To ervice thi requet conider the compoite tranmiion vector: X = X +,,...,,ϕ,...,ϕ X +,,...,,ϕ,...,ϕ. X +,,...,,ϕ,...,ϕ, 5 where X +,,...,,ϕ,...,ϕ = ψf [:], F [ ] denote the multicat tranmiion from the + th device to ervice the requet of the device. Note that the file in the et F [ ], denoting the requet of the other device, are conidered arbitrary. For achieving optimal tranmiion rate R M, each device in the DD cluter multicat with a rate of R M/. Thu the rate of each compoite tranmiion vector i given by R M. Next, we note that the compoite tranmiion vector X, compoed of ubmulticat tranmiion, along with the content of device memorie i capable of decoding file i.e., F [:]. Similarly, conider a requet vector R, R,..., R, R +,..., R = +, +,...,, ϕ,..., ϕ where the firt requet are again for unique file and ret are arbitrary. A compoite tranmiion vector X = X + +,+,...,,ϕ,...,ϕ X + +,+,...,,ϕ,...,ϕ. X + +,+,...,,ϕ,...,ϕ, 5 along with device torage content Z [:], can decode another file F [+:]. Conidering N/ compoite tranmiion vector X [: N/ ] and device torage content Z [:], the library of file F [:N] can be completely decoded. Thu, we N H Z [:], X [: N/ ] 5 H Z [:] + H X[: N/ ] Z [:] 54 M + H X[: N/ ] Z [:] 55 M + H X[:l] Z [:] + H X[l+: N/ ] Z [:], X [:l] M + l R M + H X[l+: N/ ] Z [:], X [:l], F [:l] M + l R M + H X[l+: N/ ], Z [+:] Z [:], X [:l], F [:l] 58 M + l R M + H Z [+:] Z [:], X [:l], F [:l] }{{} δ + H X[l+: N/ ] Z [:], X [:l], F [:lµ+l], 59 }{{} λ where 57 follow from the fact that each compoite tranmiion vector ha rate R M and that the device torage content, Z [:], along with the compoite tranmiion vector X[:l] are capable of decoding the file F [:l]. In 58, µ = min { } N l l, i the number of additional device memorie which, along with the tranmiion X [:l] can decode all N file. For =, we H X[: N/ ] Z [:] = 0, 60 and 55 yield the elf-utainability condition M N. Upper Bound on δ: We conider the factor δ, from 59: δ = H Z [+:] Z [:], X [:l], F [:l] 6 H Z [+:] Z [:], F [:l] 6 = H Z [:] F [:l] H Z[:] F [:l]. 6 Conidering all poible ubet of Z [:] having cardinality, i.e., all poible combination of device torage content in 5, and all poible combination of file in the et F [ ] for each tranmiion X [:l] in 57, we can obtain different inequalitie of the form of 6. Symmetrizing over all the inequalitie, we δ H Z [:] F [:l] i= H Z i [] F [:l], 64 where, Z i [] i the i-th ize- ubet of Z [:]. Next, conider Z [:] a a et of random variable and ubet Z i [] Z [:] i =,...,. Applying Han Inequality from 8, we H Z [:] F [:l] + µ i= H Z i [] F [:l] i= + µ H Z [:] F [:l] i= 65 H Z i [] F [:l]. Subtituting 66 into 64, we δ H Z [:] F [:l] + µ H Z [:] F [:l] = µ + µ H Z [:] F [:l] µ + µ H Z [:], F [l+:n] F [:l] = µ + µ H F [l+:n] F [:l] + H Z[:] F [:N] 70 }{{} =0 µ + µ N l+, 7 where 70 follow from the fact that the device torage content are function of all the N file in the library. Upper Bound on λ: We conider the factor λ, from 59. We have two cae: Cae : N l + lµ: We conider the cae that all N file

6 can be decoded with µ additional device torage content and tranmiion X [:l], within the conditioning in the factor λ in 59i.e., l + lµ N. We λ = H X[l+: N/ ] Z [:], X [:l], F [:N] H X[l+: N/ ] Z [:], F [:N] = 0, 7 which follow from the fact that the tranmiion are function of all N file. Cae : N > l + lµ: We conider the cae where µ = additional device torage content along with the tranmiion X [:l], cannot decode all N file. We λ = H X[l+: N/ ] Z [:], X [:l], F [:l] H X[l+: N/ ] Z [:] = 0, 7 which follow from the fact that M N i.e., all file are tored within the collective device memorie in the DD cluter and hence all tranmiion are function of all the device torage content. Thu combining 7 and 7 we λ = Subtituting 7 and 74 into 59, we l N M + R M + µ N l+ N M R M µ + µ N l l Optimizing over all parameter value of, l, µ, we R M R LB M N M max {,...,}, l {,..., N } µ l which complete the proof of Theorem. REFERENCES N l +, 76 [] M. A. Maddah-Ali and U. Nieen, Fundamental Limit of Caching, IEEE Tranaction on Information Theory, vol. 60, no. 5, pp , May 04. [] M. Maddah-Ali and U. Nieen, Decentralized Coded Caching Attain Order-Optimal Memory-Rate Tradeoff, IEEE/ACM Tranaction on Networking, April 04. [] U. Nieen and M. A. Maddah-Ali, Coded Caching with Nonuniform Demand, in IEEE Conference on Computer Communication Workhop INFOCOM WSHPS, April 04, pp. 6. [4] R. Pedarani, M. Maddah-Ali, and U. Nieen, Online Coded Caching, in IEEE International Conference on Communication ICC, June 04, pp [5] A. Sengupta, R. Tandon, and T. C. Clancy, Fundamental Limit of Caching with Secure Delivery, Wirele Phyical Layer Security Workhop - IEEE International Conference on Communication ICC, pp , June 04. [6], Decentralized Caching with Secure Delivery, IEEE International Sympoium on Information Theory ISIT, pp. 4 45, July 04. [7], Secure Caching with Non-Uniform Demand, IEEE Global Wirele Summit GWS, pp. 5, May 04. [8], Fundamental Limit of Caching with Secure Delivery, IEEE Tranaction on Information Forenic and Security, vol. 0, pp , Feb 05. [9] A. Sengupta, S. Amuru, R. Tandon, R. M. Buehrer, and T. C. Clancy, Learning Ditributed Caching Strategie in Small Cell Network, The Eleventh International Sympoium on Wirele Communication Sytem ISWCS, pp. 97 9, Aug 04. [0] M. Ji, G. Caire, and A. F. Molich, Optimal Throughput-Outage Tradeoff in Wirele One-Hop Caching Network, in IEEE International Sympoium on Information Theory ISIT, July 0, pp [] M. Ji, A. M. Tulino, J. Llorca, and G. Caire, Order Optimal Coded Caching-Aided Multicat under Zipf Demand Ditribution, in The Eleventh International Sympoium on Wirele Communication Sytem ISWCS, 04. [] N. Golrezaei,. Shanmugam, A. Dimaki, A. Molich, and G. Caire, FemtoCaching: Wirele Video Content Delivery through Ditributed Caching Helper, IEEE Tranaction on Information Theory, vol. 59, pp , Dec. 0. [] M. Ji, G. Caire, and A. F. Molich, Wirele Device-to-Device Caching Network: Baic Principle and Sytem Performance, arxiv : 05.56, May 0. [4] N. Golrezaei, A. G. Dimaki, and A. F. Molich, Wirele Device-to- Device Communication with Ditributed Caching, in IEEE International Sympoium on Information Theory Proceeding ISIT, July 0, pp [5] M. Ji, G. Caire, and A. F. Molich, Fundamental Limit of Ditributed Caching in DD Wirele Network, in IEEE Information Theory Workhop ITW 0, Sept 0, pp. 5. [6], Fundamental limit of caching in wirele DD network, arxiv:405.56, 04. [Online]. Available: 56 [7] T. M. Cover and J. A. Thoma, Element of Information Theory, nd Edition. Hoboken, NJ, USA: Wiley-Intercience, John Wiley and Son.

THE dynamics of traffic over wireless networks has undergone

THE dynamics of traffic over wireless networks has undergone 940 IEEE TRASACTIOS O COUICATIOS, VO. 65, O. 5, AY 207 Improved Approximation of Storage-Rate Tradeoff for Caching With ultiple Demand Avik Sengupta, ember, IEEE, and Ravi Tandon, Senior ember, IEEE Abtract

More information

Improved Approximation of Storage-Rate Tradeoff for Caching via New Outer Bounds

Improved Approximation of Storage-Rate Tradeoff for Caching via New Outer Bounds Improved Approximation of Storage-Rate Tradeoff for Caching via New Outer Bound Avik Sengupta, Ravi Tandon, T. Chare Cancy Hume Center & Dept. of Eectrica and Computer Engineering Dicovery Anaytic Center

More information

Signaling over MIMO Multi-Base Systems: Combination of Multi-Access and Broadcast Schemes

Signaling over MIMO Multi-Base Systems: Combination of Multi-Access and Broadcast Schemes Signaling over MIMO Multi-Bae Sytem: Combination of Multi-Acce and Broadcat Scheme Mohammad Ali Maddah-Ali Abolfazl S. Motahari and Amir K. Khandani Coding & Signal Tranmiion Laboratory (www.ct.uwaterloo.ca)

More information

Lecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004

Lecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004 18.997 Topic in Combinatorial Optimization April 29th, 2004 Lecture 21 Lecturer: Michel X. Goeman Scribe: Mohammad Mahdian 1 The Lovaz plitting-off lemma Lovaz plitting-off lemma tate the following. Theorem

More information

Erasure Broadcast Networks with Receiver Caching

Erasure Broadcast Networks with Receiver Caching Eraure Broadcat Network with Receiver Caching hirin aeedi Bidokhti, Roy Timo and Miche le Wigger tanford Univerity, aeedi@tanford.edu Techniche Univerita t Mu nchen, roy.timo@tum.de LTCI CNR, Telecom PariTech,

More information

Decentralized Asynchronous Coded Caching Design and Performance Analysis in Fog Radio Access Networks

Decentralized Asynchronous Coded Caching Design and Performance Analysis in Fog Radio Access Networks Decentralized Aynchronou Coded Caching Deign and Performance Analyi in Fog Radio Acce Network Yanxiang Jiang, Senior Member, IEEE, Wenlong Huang, Mehdi Benni, Senior Member, IEEE, and Fu-Chun Zheng, Senior

More information

Preemptive scheduling on a small number of hierarchical machines

Preemptive scheduling on a small number of hierarchical machines Available online at www.ciencedirect.com Information and Computation 06 (008) 60 619 www.elevier.com/locate/ic Preemptive cheduling on a mall number of hierarchical machine György Dóa a, Leah Eptein b,

More information

Gain and Phase Margins Based Delay Dependent Stability Analysis of Two- Area LFC System with Communication Delays

Gain and Phase Margins Based Delay Dependent Stability Analysis of Two- Area LFC System with Communication Delays Gain and Phae Margin Baed Delay Dependent Stability Analyi of Two- Area LFC Sytem with Communication Delay Şahin Sönmez and Saffet Ayaun Department of Electrical Engineering, Niğde Ömer Halidemir Univerity,

More information

Multi-dimensional Fuzzy Euler Approximation

Multi-dimensional Fuzzy Euler Approximation Mathematica Aeterna, Vol 7, 2017, no 2, 163-176 Multi-dimenional Fuzzy Euler Approximation Yangyang Hao College of Mathematic and Information Science Hebei Univerity, Baoding 071002, China hdhyywa@163com

More information

Unavoidable Cycles in Polynomial-Based Time-Invariant LDPC Convolutional Codes

Unavoidable Cycles in Polynomial-Based Time-Invariant LDPC Convolutional Codes European Wirele, April 7-9,, Vienna, Autria ISBN 978--87-4-9 VE VERLAG GMBH Unavoidable Cycle in Polynomial-Baed Time-Invariant LPC Convolutional Code Hua Zhou and Norbert Goertz Intitute of Telecommunication

More information

Codes Correcting Two Deletions

Codes Correcting Two Deletions 1 Code Correcting Two Deletion Ryan Gabry and Frederic Sala Spawar Sytem Center Univerity of California, Lo Angele ryan.gabry@navy.mil fredala@ucla.edu Abtract In thi work, we invetigate the problem of

More information

The Impact of Imperfect Scheduling on Cross-Layer Rate. Control in Multihop Wireless Networks

The Impact of Imperfect Scheduling on Cross-Layer Rate. Control in Multihop Wireless Networks The mpact of mperfect Scheduling on Cro-Layer Rate Control in Multihop Wirele Network Xiaojun Lin and Ne B. Shroff Center for Wirele Sytem and Application (CWSA) School of Electrical and Computer Engineering,

More information

SMALL-SIGNAL STABILITY ASSESSMENT OF THE EUROPEAN POWER SYSTEM BASED ON ADVANCED NEURAL NETWORK METHOD

SMALL-SIGNAL STABILITY ASSESSMENT OF THE EUROPEAN POWER SYSTEM BASED ON ADVANCED NEURAL NETWORK METHOD SMALL-SIGNAL STABILITY ASSESSMENT OF THE EUROPEAN POWER SYSTEM BASED ON ADVANCED NEURAL NETWORK METHOD S.P. Teeuwen, I. Erlich U. Bachmann Univerity of Duiburg, Germany Department of Electrical Power Sytem

More information

A Constraint Propagation Algorithm for Determining the Stability Margin. The paper addresses the stability margin assessment for linear systems

A Constraint Propagation Algorithm for Determining the Stability Margin. The paper addresses the stability margin assessment for linear systems A Contraint Propagation Algorithm for Determining the Stability Margin of Linear Parameter Circuit and Sytem Lubomir Kolev and Simona Filipova-Petrakieva Abtract The paper addree the tability margin aement

More information

List coloring hypergraphs

List coloring hypergraphs Lit coloring hypergraph Penny Haxell Jacque Vertraete Department of Combinatoric and Optimization Univerity of Waterloo Waterloo, Ontario, Canada pehaxell@uwaterloo.ca Department of Mathematic Univerity

More information

Energy-Distortion Tradeoff for the Gaussian Broadcast Channel with Feedback

Energy-Distortion Tradeoff for the Gaussian Broadcast Channel with Feedback 016 IEEE International Sympoium on Information Theory Energy-itortion Tradeoff for the Gauian Broadcat Channel with Feedback Yonathan Murin 1, Yonatan Kapi, Ron abora 3, and eniz Gündüz 4 1 Stanford Univerity,

More information

A Study on Simulating Convolutional Codes and Turbo Codes

A Study on Simulating Convolutional Codes and Turbo Codes A Study on Simulating Convolutional Code and Turbo Code Final Report By Daniel Chang July 27, 2001 Advior: Dr. P. Kinman Executive Summary Thi project include the deign of imulation of everal convolutional

More information

Technical Appendix: Auxiliary Results and Proofs

Technical Appendix: Auxiliary Results and Proofs A Technical Appendix: Auxiliary Reult and Proof Lemma A. The following propertie hold for q (j) = F r [c + ( ( )) ] de- ned in Lemma. (i) q (j) >, 8 (; ]; (ii) R q (j)d = ( ) q (j) + R q (j)d ; (iii) R

More information

ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang

ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang Proceeding of the 2008 Winter Simulation Conference S. J. Maon, R. R. Hill, L. Mönch, O. Roe, T. Jefferon, J. W. Fowler ed. ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION Xiaoqun Wang

More information

Bogoliubov Transformation in Classical Mechanics

Bogoliubov Transformation in Classical Mechanics Bogoliubov Tranformation in Claical Mechanic Canonical Tranformation Suppoe we have a et of complex canonical variable, {a j }, and would like to conider another et of variable, {b }, b b ({a j }). How

More information

Connectivity in large mobile ad-hoc networks

Connectivity in large mobile ad-hoc networks Weiertraß-Intitut für Angewandte Analyi und Stochatik Connectivity in large mobile ad-hoc network WOLFGANG KÖNIG (WIAS und U Berlin) joint work with HANNA DÖRING (Onabrück) and GABRIEL FARAUD (Pari) Mohrentraße

More information

CHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS

CHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS CHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS 8.1 INTRODUCTION 8.2 REDUCED ORDER MODEL DESIGN FOR LINEAR DISCRETE-TIME CONTROL SYSTEMS 8.3

More information

Suggested Answers To Exercises. estimates variability in a sampling distribution of random means. About 68% of means fall

Suggested Answers To Exercises. estimates variability in a sampling distribution of random means. About 68% of means fall Beyond Significance Teting ( nd Edition), Rex B. Kline Suggeted Anwer To Exercie Chapter. The tatitic meaure variability among core at the cae level. In a normal ditribution, about 68% of the core fall

More information

Layering as Optimization Decomposition

Layering as Optimization Decomposition TLEN7000/ECEN7002: Analytical Foundation of Network Layering a Optimization Decompoition Lijun Chen 11/29/2012 The Internet Compleity i ever increaing Large in ize and cope Enormou heterogeneity Incomplete

More information

Multicolor Sunflowers

Multicolor Sunflowers Multicolor Sunflower Dhruv Mubayi Lujia Wang October 19, 2017 Abtract A unflower i a collection of ditinct et uch that the interection of any two of them i the ame a the common interection C of all of

More information

SERIES COMPENSATION: VOLTAGE COMPENSATION USING DVR (Lectures 41-48)

SERIES COMPENSATION: VOLTAGE COMPENSATION USING DVR (Lectures 41-48) Chapter 5 SERIES COMPENSATION: VOLTAGE COMPENSATION USING DVR (Lecture 41-48) 5.1 Introduction Power ytem hould enure good quality of electric power upply, which mean voltage and current waveform hould

More information

Avoiding Forbidden Submatrices by Row Deletions

Avoiding Forbidden Submatrices by Row Deletions Avoiding Forbidden Submatrice by Row Deletion Sebatian Wernicke, Jochen Alber, Jen Gramm, Jiong Guo, and Rolf Niedermeier Wilhelm-Schickard-Intitut für Informatik, niverität Tübingen, Sand 13, D-72076

More information

Estimating floor acceleration in nonlinear multi-story moment-resisting frames

Estimating floor acceleration in nonlinear multi-story moment-resisting frames Etimating floor acceleration in nonlinear multi-tory moment-reiting frame R. Karami Mohammadi Aitant Profeor, Civil Engineering Department, K.N.Tooi Univerity M. Mohammadi M.Sc. Student, Civil Engineering

More information

Lecture 10 Filtering: Applied Concepts

Lecture 10 Filtering: Applied Concepts Lecture Filtering: Applied Concept In the previou two lecture, you have learned about finite-impule-repone (FIR) and infinite-impule-repone (IIR) filter. In thee lecture, we introduced the concept of filtering

More information

Online Appendix for Managerial Attention and Worker Performance by Marina Halac and Andrea Prat

Online Appendix for Managerial Attention and Worker Performance by Marina Halac and Andrea Prat Online Appendix for Managerial Attention and Worker Performance by Marina Halac and Andrea Prat Thi Online Appendix contain the proof of our reult for the undicounted limit dicued in Section 2 of the paper,

More information

LOAD FREQUENCY CONTROL OF MULTI AREA INTERCONNECTED SYSTEM WITH TCPS AND DIVERSE SOURCES OF POWER GENERATION

LOAD FREQUENCY CONTROL OF MULTI AREA INTERCONNECTED SYSTEM WITH TCPS AND DIVERSE SOURCES OF POWER GENERATION G.J. E.D.T.,Vol.(6:93 (NovemberDecember, 03 ISSN: 39 793 LOAD FREQUENCY CONTROL OF MULTI AREA INTERCONNECTED SYSTEM WITH TCPS AND DIVERSE SOURCES OF POWER GENERATION C.Srinivaa Rao Dept. of EEE, G.Pullaiah

More information

LDPC Convolutional Codes Based on Permutation Polynomials over Integer Rings

LDPC Convolutional Codes Based on Permutation Polynomials over Integer Rings LDPC Convolutional Code Baed on Permutation Polynomial over Integer Ring Marco B. S. Tavare and Gerhard P. Fettwei Vodafone Chair Mobile Communication Sytem, Dreden Univerity of Technology, 01062 Dreden,

More information

New bounds for Morse clusters

New bounds for Morse clusters New bound for More cluter Tamá Vinkó Advanced Concept Team, European Space Agency, ESTEC Keplerlaan 1, 2201 AZ Noordwijk, The Netherland Tama.Vinko@ea.int and Arnold Neumaier Fakultät für Mathematik, Univerität

More information

Social Studies 201 Notes for March 18, 2005

Social Studies 201 Notes for March 18, 2005 1 Social Studie 201 Note for March 18, 2005 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the

More information

One Class of Splitting Iterative Schemes

One Class of Splitting Iterative Schemes One Cla of Splitting Iterative Scheme v Ciegi and V. Pakalnytė Vilniu Gedimina Technical Univerity Saulėtekio al. 11, 2054, Vilniu, Lithuania rc@fm.vtu.lt Abtract. Thi paper deal with the tability analyi

More information

FUNDAMENTALS OF POWER SYSTEMS

FUNDAMENTALS OF POWER SYSTEMS 1 FUNDAMENTALS OF POWER SYSTEMS 1 Chapter FUNDAMENTALS OF POWER SYSTEMS INTRODUCTION The three baic element of electrical engineering are reitor, inductor and capacitor. The reitor conume ohmic or diipative

More information

C up (E) C low (E) E 2 E 1 E 0

C up (E) C low (E) E 2 E 1 E 0 Spreading in lock-fading hannel. Muriel Médard David N.. Te medardmit.edu Maachuett Intitute of Technoy dteeec.berkeley.edu Univerity of alifornia at erkeley btract We conider wideband fading channel which

More information

A Thresholding-Based Antenna Switching in SWIPT-Enabled MIMO Cognitive Radio Networks with Co-Channel Interference

A Thresholding-Based Antenna Switching in SWIPT-Enabled MIMO Cognitive Radio Networks with Co-Channel Interference A Threholding-Baed Antenna Switching in SWIPT-Enabled MIMO Cognitive Radio Network wi Co-Channel Interference Fatma Benkhelifa, and Mohamed-Slim Alouini Computer, Electrical and Maematical Science and

More information

7.2 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 281

7.2 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 281 72 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 28 and i 2 Show how Euler formula (page 33) can then be ued to deduce the reult a ( a) 2 b 2 {e at co bt} {e at in bt} b ( a) 2 b 2 5 Under what condition

More information

Improved Interference Cancellation Scheme for Two-User Detection of Alamouti Code

Improved Interference Cancellation Scheme for Two-User Detection of Alamouti Code Improved Interference Cancellation Scheme for Two-Uer Detection of Alamouti Code Manav R hatnagar and Are Hjørungne Abtract In thi correpondence, we propoe an improved interference cancellation method

More information

Chapter 2 Sampling and Quantization. In order to investigate sampling and quantization, the difference between analog

Chapter 2 Sampling and Quantization. In order to investigate sampling and quantization, the difference between analog Chapter Sampling and Quantization.1 Analog and Digital Signal In order to invetigate ampling and quantization, the difference between analog and digital ignal mut be undertood. Analog ignal conit of continuou

More information

Nonlinear Single-Particle Dynamics in High Energy Accelerators

Nonlinear Single-Particle Dynamics in High Energy Accelerators Nonlinear Single-Particle Dynamic in High Energy Accelerator Part 6: Canonical Perturbation Theory Nonlinear Single-Particle Dynamic in High Energy Accelerator Thi coure conit of eight lecture: 1. Introduction

More information

Simple Observer Based Synchronization of Lorenz System with Parametric Uncertainty

Simple Observer Based Synchronization of Lorenz System with Parametric Uncertainty IOSR Journal of Electrical and Electronic Engineering (IOSR-JEEE) ISSN: 78-676Volume, Iue 6 (Nov. - Dec. 0), PP 4-0 Simple Oberver Baed Synchronization of Lorenz Sytem with Parametric Uncertainty Manih

More information

Utility Proportional Fair Bandwidth Allocation: An Optimization Oriented Approach

Utility Proportional Fair Bandwidth Allocation: An Optimization Oriented Approach Utility Proportional Fair Bandwidth Allocation: An Optimization Oriented Approach 61 Tobia Hark Konrad-Zue-Zentrum für Informationtechnik Berlin (ZIB), Department Optimization, Takutr. 7, 14195 Berlin,

More information

On the Stability Region of Congestion Control

On the Stability Region of Congestion Control On the Stability Region of Congetion Control Xiaojun Lin and Ne B. Shroff School of Electrical and Computer Engineering Purdue Univerity, Wet Lafayette, IN 47906 {linx,hroff}@ecn.purdue.edu Abtract It

More information

IEOR 3106: Fall 2013, Professor Whitt Topics for Discussion: Tuesday, November 19 Alternating Renewal Processes and The Renewal Equation

IEOR 3106: Fall 2013, Professor Whitt Topics for Discussion: Tuesday, November 19 Alternating Renewal Processes and The Renewal Equation IEOR 316: Fall 213, Profeor Whitt Topic for Dicuion: Tueday, November 19 Alternating Renewal Procee and The Renewal Equation 1 Alternating Renewal Procee An alternating renewal proce alternate between

More information

Problem Set 8 Solutions

Problem Set 8 Solutions Deign and Analyi of Algorithm April 29, 2015 Maachuett Intitute of Technology 6.046J/18.410J Prof. Erik Demaine, Srini Devada, and Nancy Lynch Problem Set 8 Solution Problem Set 8 Solution Thi problem

More information

Correction for Simple System Example and Notes on Laplace Transforms / Deviation Variables ECHE 550 Fall 2002

Correction for Simple System Example and Notes on Laplace Transforms / Deviation Variables ECHE 550 Fall 2002 Correction for Simple Sytem Example and Note on Laplace Tranform / Deviation Variable ECHE 55 Fall 22 Conider a tank draining from an initial height of h o at time t =. With no flow into the tank (F in

More information

Amplify and Forward Relaying; Channel Model and Outage Behaviour

Amplify and Forward Relaying; Channel Model and Outage Behaviour Amplify and Forward Relaying; Channel Model and Outage Behaviour Mehdi Mortazawi Molu Intitute of Telecommunication Vienna Univerity of Technology Guhautr. 5/E389, 4 Vienna, Autria Email: mmortaza@nt.tuwien.ac.at

More information

Theoretical Computer Science. Optimal algorithms for online scheduling with bounded rearrangement at the end

Theoretical Computer Science. Optimal algorithms for online scheduling with bounded rearrangement at the end Theoretical Computer Science 4 (0) 669 678 Content lit available at SciVere ScienceDirect Theoretical Computer Science journal homepage: www.elevier.com/locate/tc Optimal algorithm for online cheduling

More information

Finding the location of switched capacitor banks in distribution systems based on wavelet transform

Finding the location of switched capacitor banks in distribution systems based on wavelet transform UPEC00 3t Aug - 3rd Sept 00 Finding the location of witched capacitor bank in ditribution ytem baed on wavelet tranform Bahram nohad Shahid Chamran Univerity in Ahvaz bahramnohad@yahoo.com Mehrdad keramatzadeh

More information

Minimal state space realization of MIMO systems in the max algebra

Minimal state space realization of MIMO systems in the max algebra KULeuven Department of Electrical Engineering (ESAT) SISTA Technical report 94-54 Minimal tate pace realization of MIMO ytem in the max algebra B De Schutter and B De Moor If you want to cite thi report

More information

Proactive Serving Decreases User Delay Exponentially: The Light-tailed Service Time Case

Proactive Serving Decreases User Delay Exponentially: The Light-tailed Service Time Case Proactive Serving Decreae Uer Delay Exponentially: The Light-tailed Service Time Cae Shaoquan Zhang, Longbo Huang, Minghua Chen, and Xin Liu Abtract In online ervice ytem, the delay experienced by uer

More information

Jul 4, 2005 turbo_code_primer Revision 0.0. Turbo Code Primer

Jul 4, 2005 turbo_code_primer Revision 0.0. Turbo Code Primer Jul 4, 5 turbo_code_primer Reviion. Turbo Code Primer. Introduction Thi document give a quick tutorial on MAP baed turbo coder. Section develop the background theory. Section work through a imple numerical

More information

THE Z-TRANSFORM APPLIED TO BIRTH-DEATH MARKOV PROCESSES

THE Z-TRANSFORM APPLIED TO BIRTH-DEATH MARKOV PROCESSES he Zranform applied to birthdeath arov procee HE ZRASOR ALIED O BIRHDEAH ARKO ROCESSES H Department of Electronic and Communication niverity of DareSalaam O Box 3594 DareSalaam anania ABSRAC Birthdeath

More information

Microblog Hot Spot Mining Based on PAM Probabilistic Topic Model

Microblog Hot Spot Mining Based on PAM Probabilistic Topic Model MATEC Web of Conference 22, 01062 ( 2015) DOI: 10.1051/ matecconf/ 2015220106 2 C Owned by the author, publihed by EDP Science, 2015 Microblog Hot Spot Mining Baed on PAM Probabilitic Topic Model Yaxin

More information

TRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL

TRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL GLASNIK MATEMATIČKI Vol. 38583, 73 84 TRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL p-laplacian Haihen Lü, Donal O Regan and Ravi P. Agarwal Academy of Mathematic and Sytem Science, Beijing, China, National

More information

Sliding Mode Based Congestion Control and

Sliding Mode Based Congestion Control and Sliding Mode Baed Congetion Control and 1 Scheduling for Multi-cla Traffic over Per-link Queueing Wirele Network Zongrui Ding and Dapeng Wu Abtract Thi paper conider the problem of joint congetion control

More information

Reliability Analysis of Embedded System with Different Modes of Failure Emphasizing Reboot Delay

Reliability Analysis of Embedded System with Different Modes of Failure Emphasizing Reboot Delay International Journal of Applied Science and Engineering 3., 4: 449-47 Reliability Analyi of Embedded Sytem with Different Mode of Failure Emphaizing Reboot Delay Deepak Kumar* and S. B. Singh Department

More information

Earth Potential Rise (EPR) Computation for a Fault on Transmission Mains Pole

Earth Potential Rise (EPR) Computation for a Fault on Transmission Mains Pole ACN: 32586675 ABN: 8632586675 NATIONAL ELECTRICAL ENGINEERING CONULTANCY Earth otential Rie (ER) Computation for a Fault on Tranmiion Main ole repared by: M. Naereddine ACN: 32586675 ABN: 8632586675 Abtract

More information

Channel Selection in Multi-channel Opportunistic Spectrum Access Networks with Perfect Sensing

Channel Selection in Multi-channel Opportunistic Spectrum Access Networks with Perfect Sensing Channel Selection in Multi-channel Opportunitic Spectrum Acce Networ with Perfect Sening Xin Liu Univerity of California Davi, CA 95616 liu@c.ucdavi.edu Bhaar Krihnamachari Univerity of Southern California

More information

PI control system design for Electromagnetic Molding Machine based on Linear Programing

PI control system design for Electromagnetic Molding Machine based on Linear Programing PI control ytem deign for Electromagnetic Molding Machine baed on Linear Programing Takayuki Ihizaki, Kenji Kahima, Jun-ichi Imura*, Atuhi Katoh and Hirohi Morita** Abtract In thi paper, we deign a PI

More information

RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS

RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS www.arpapre.com/volume/vol29iue1/ijrras_29_1_01.pdf RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS Sevcan Demir Atalay 1,* & Özge Elmataş Gültekin

More information

LINEAR system identification has been the subject of

LINEAR system identification has been the subject of IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL., NO., 1 Set-Memberhip error-in-variable identification through convex relaxation technique Vito Cerone, Member, IEEE, Dario Piga, Member, IEEE, and Diego Regruto,

More information

Effective Capacity-Based Quality of Service Measures for Wireless Networks

Effective Capacity-Based Quality of Service Measures for Wireless Networks Effective Capacity-Baed Quality of Service Meaure for Wirele Network Dapeng Wu Rohit Negi Abtract An important objective of next-generation wirele network i to provide quality of ervice (QoS) guarantee.

More information

Social Studies 201 Notes for November 14, 2003

Social Studies 201 Notes for November 14, 2003 1 Social Studie 201 Note for November 14, 2003 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the

More information

Lecture 8: Period Finding: Simon s Problem over Z N

Lecture 8: Period Finding: Simon s Problem over Z N Quantum Computation (CMU 8-859BB, Fall 205) Lecture 8: Period Finding: Simon Problem over Z October 5, 205 Lecturer: John Wright Scribe: icola Rech Problem A mentioned previouly, period finding i a rephraing

More information

CONGESTION control is a key functionality in modern

CONGESTION control is a key functionality in modern IEEE TRANSACTIONS ON INFORMATION TEORY, VOL. X, NO. X, XXXXXXX 2008 On the Connection-Level Stability of Congetion-Controlled Communication Network Xiaojun Lin, Member, IEEE, Ne B. Shroff, Fellow, IEEE,

More information

Stochastic Optimization with Inequality Constraints Using Simultaneous Perturbations and Penalty Functions

Stochastic Optimization with Inequality Constraints Using Simultaneous Perturbations and Penalty Functions Stochatic Optimization with Inequality Contraint Uing Simultaneou Perturbation and Penalty Function I-Jeng Wang* and Jame C. Spall** The John Hopkin Univerity Applied Phyic Laboratory 11100 John Hopkin

More information

A PROOF OF TWO CONJECTURES RELATED TO THE ERDÖS-DEBRUNNER INEQUALITY

A PROOF OF TWO CONJECTURES RELATED TO THE ERDÖS-DEBRUNNER INEQUALITY Volume 8 2007, Iue 3, Article 68, 3 pp. A PROOF OF TWO CONJECTURES RELATED TO THE ERDÖS-DEBRUNNER INEQUALITY C. L. FRENZEN, E. J. IONASCU, AND P. STĂNICĂ DEPARTMENT OF APPLIED MATHEMATICS NAVAL POSTGRADUATE

More information

CHAPTER 4 DESIGN OF STATE FEEDBACK CONTROLLERS AND STATE OBSERVERS USING REDUCED ORDER MODEL

CHAPTER 4 DESIGN OF STATE FEEDBACK CONTROLLERS AND STATE OBSERVERS USING REDUCED ORDER MODEL 98 CHAPTER DESIGN OF STATE FEEDBACK CONTROLLERS AND STATE OBSERVERS USING REDUCED ORDER MODEL INTRODUCTION The deign of ytem uing tate pace model for the deign i called a modern control deign and it i

More information

SINGLE CARRIER BLOCK TRANSMISSION WITHOUT GUARD INTERVAL

SINGLE CARRIER BLOCK TRANSMISSION WITHOUT GUARD INTERVAL SINGLE CARRIER BLOCK TRANSMISSION WITHOUT GUARD INTERVAL Kazunori Hayahi Hideaki Sakai Graduate School of Informatic, Kyoto Univerity Kyoto, JAPAN ABSTRACT Thi paper propoe a imple detection cheme for

More information

84 ZHANG Jing-Shang Vol. 39 of which would emit 5 He rather than 3 He. 5 He i untable and eparated into n + pontaneouly, which can alo be treated a if

84 ZHANG Jing-Shang Vol. 39 of which would emit 5 He rather than 3 He. 5 He i untable and eparated into n + pontaneouly, which can alo be treated a if Commun. Theor. Phy. (Beijing, China) 39 (003) pp. 83{88 c International Academic Publiher Vol. 39, No. 1, January 15, 003 Theoretical Analyi of Neutron Double-Dierential Cro Section of n+ 11 B at 14. MeV

More information

Multicast Network Coding and Field Sizes

Multicast Network Coding and Field Sizes Multicat Network Coding and Field Size Qifu (Tyler) Sun, Xunrui Yin, Zongpeng Li, and Keping Long Intitute of Advanced Networking Technology and New Service, Univerity of Science and Technology Beijing,

More information

Coupling of Three-Phase Sequence Circuits Due to Line and Load Asymmetries

Coupling of Three-Phase Sequence Circuits Due to Line and Load Asymmetries Coupling of Three-Phae Sequence Circuit Due to Line and Load Aymmetrie DEGO BELLAN Department of Electronic nformation and Bioengineering Politecnico di Milano Piazza Leonardo da inci 01 Milano TALY diego.ellan@polimi.it

More information

Unbounded solutions of second order discrete BVPs on infinite intervals

Unbounded solutions of second order discrete BVPs on infinite intervals Available online at www.tjna.com J. Nonlinear Sci. Appl. 9 206), 357 369 Reearch Article Unbounded olution of econd order dicrete BVP on infinite interval Hairong Lian a,, Jingwu Li a, Ravi P Agarwal b

More information

Finite Element Analysis of a Fiber Bragg Grating Accelerometer for Performance Optimization

Finite Element Analysis of a Fiber Bragg Grating Accelerometer for Performance Optimization Finite Element Analyi of a Fiber Bragg Grating Accelerometer for Performance Optimization N. Baumallick*, P. Biwa, K. Dagupta and S. Bandyopadhyay Fiber Optic Laboratory, Central Gla and Ceramic Reearch

More information

SOME RESULTS ON INFINITE POWER TOWERS

SOME RESULTS ON INFINITE POWER TOWERS NNTDM 16 2010) 3, 18-24 SOME RESULTS ON INFINITE POWER TOWERS Mladen Vailev - Miana 5, V. Hugo Str., Sofia 1124, Bulgaria E-mail:miana@abv.bg Abtract To my friend Kratyu Gumnerov In the paper the infinite

More information

5.5 Application of Frequency Response: Signal Filters

5.5 Application of Frequency Response: Signal Filters 44 Dynamic Sytem Second order lowpa filter having tranfer function H()=H ()H () u H () H () y Firt order lowpa filter Figure 5.5: Contruction of a econd order low-pa filter by combining two firt order

More information

Service Level Guarantee for Mobile Application Offloading in Presence of Wireless Channel Errors

Service Level Guarantee for Mobile Application Offloading in Presence of Wireless Channel Errors Service Level Guarantee for Mobile Application Offloading in Preence of Wirele Channel Error Arani Bhattacharya, Anuman Banerjee, Pradipta De SUNY Korea and Stony Brook Univerity, {arani@unykorea.ac.kr}

More information

Optimization model in Input output analysis and computable general. equilibrium by using multiple criteria non-linear programming.

Optimization model in Input output analysis and computable general. equilibrium by using multiple criteria non-linear programming. Optimization model in Input output analyi and computable general equilibrium by uing multiple criteria non-linear programming Jing He * Intitute of ytem cience, cademy of Mathematic and ytem cience Chinee

More information

Beta Burr XII OR Five Parameter Beta Lomax Distribution: Remarks and Characterizations

Beta Burr XII OR Five Parameter Beta Lomax Distribution: Remarks and Characterizations Marquette Univerity e-publication@marquette Mathematic, Statitic and Computer Science Faculty Reearch and Publication Mathematic, Statitic and Computer Science, Department of 6-1-2014 Beta Burr XII OR

More information

Clustering Methods without Given Number of Clusters

Clustering Methods without Given Number of Clusters Clutering Method without Given Number of Cluter Peng Xu, Fei Liu Introduction A we now, mean method i a very effective algorithm of clutering. It mot powerful feature i the calability and implicity. However,

More information

Analytical Model of Proportional Fair Scheduling in Interference-limited OFDMA/LTE Networks

Analytical Model of Proportional Fair Scheduling in Interference-limited OFDMA/LTE Networks Analytical Model of roportional Fair Scheduling in Interference-limited OFDMA/LTE Network Donald arruca, Mariu Gryla, Simon Görtzen and Jame Gro UMIC Reearch Centre, RWTH Aachen Univerity, Germany School

More information

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 10, OCTOBER Wenguang Mao, Xudong Wang, Senior Member, IEEE, and Shanshan Wu

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 10, OCTOBER Wenguang Mao, Xudong Wang, Senior Member, IEEE, and Shanshan Wu IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 10, OCTOBER 2016 8511 Ditributed Opportunitic Scheduling With QoS Contraint for Wirele Network With Hybrid Link Wenguang Mao, Xudong Wang, Senior

More information

Control chart for waiting time in system of (M / M / S) :( / FCFS) Queuing model

Control chart for waiting time in system of (M / M / S) :( / FCFS) Queuing model IOSR Journal of Mathematic (IOSR-JM) e-issn: 78-578. Volume 5, Iue 6 (Mar. - Apr. 3), PP 48-53 www.iorjournal.org Control chart for waiting time in ytem of (M / M / S) :( / FCFS) Queuing model T.Poongodi,

More information

Dynamic Uplink/Downlink Resource Management in Flexible Duplex-Enabled Wireless Networks

Dynamic Uplink/Downlink Resource Management in Flexible Duplex-Enabled Wireless Networks Dynamic Uplink/Downlink Reource Management in Flexible Duplex-Enabled Wirele Network Qi Liao Nokia Bell Lab, Stuttgart, Germany Email: qi.liao@nokia-bell-lab.com arxiv:7.78v [ee.sp] Sep 7 Abtract Flexible

More information

Optimal revenue management in two class pre-emptive delay dependent Markovian queues

Optimal revenue management in two class pre-emptive delay dependent Markovian queues Optimal revenue management in two cla pre-emptive delay dependent Markovian queue Manu K. Gupta, N. Hemachandra and J. Venkatewaran Indutrial Engineering and Operation Reearch, IIT Bombay March 15, 2015

More information

An estimation approach for autotuning of event-based PI control systems

An estimation approach for autotuning of event-based PI control systems Acta de la XXXIX Jornada de Automática, Badajoz, 5-7 de Septiembre de 08 An etimation approach for autotuning of event-baed PI control ytem Joé Sánchez Moreno, María Guinaldo Loada, Sebatián Dormido Departamento

More information

On Multi-source Networks: Enumeration, Rate Region Computation, and Hierarchy

On Multi-source Networks: Enumeration, Rate Region Computation, and Hierarchy On Multi-ource Network: Enumeration, Rate Region Computation, and Hierarchy Congduan Li, Student Member, IEEE, Steven Weber, Senior Member, IEEE, and John MacLaren Walh, Member, IEEE arxiv:5070578v [cit]

More information

Efficient Methods of Doppler Processing for Coexisting Land and Weather Clutter

Efficient Methods of Doppler Processing for Coexisting Land and Weather Clutter Efficient Method of Doppler Proceing for Coexiting Land and Weather Clutter Ça gatay Candan and A Özgür Yılmaz Middle Eat Technical Univerity METU) Ankara, Turkey ccandan@metuedutr, aoyilmaz@metuedutr

More information

Listen-and-Talk: Full-duplex Cognitive Radio Networks

Listen-and-Talk: Full-duplex Cognitive Radio Networks Liten-and-Talk: Full-duplex Cognitive Radio Network Yun Liao, Tianyu Wang, Lingyang Song, and Zhu Han State Key Laboratory of Advanced Optical Communication Sytem and Network, School of Electrical Engineering

More information

OPTIMIZATION OF INTERDEPENDENT QUEUEING MODEL WITH BULK SERVICE HAVING VARIABLE CAPACITY

OPTIMIZATION OF INTERDEPENDENT QUEUEING MODEL WITH BULK SERVICE HAVING VARIABLE CAPACITY International Releae of Mathematic and Mathematical Science Available at http://irmm.org OPTIMIZATION OF INTERDEPENDENT QUEUEING MODEL WITH BULK SERVICE HAVING VARIABLE CAPACITY Shavej Ali Siddiqui Sagar

More information

Appendix. Proof of relation (3) for α 0.05.

Appendix. Proof of relation (3) for α 0.05. Appendi. Proof of relation 3 for α.5. For the argument, we will need the following reult that follow from Lemma 1 Bakirov 1989 and it proof. Lemma 1 Let g,, 1 be a continuouly differentiable function uch

More information

A BATCH-ARRIVAL QUEUE WITH MULTIPLE SERVERS AND FUZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH

A BATCH-ARRIVAL QUEUE WITH MULTIPLE SERVERS AND FUZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH Mathematical and Computational Application Vol. 11 No. pp. 181-191 006. Aociation for Scientific Reearch A BATCH-ARRIVA QEE WITH MTIPE SERVERS AND FZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH Jau-Chuan

More information

k-connectivity of uniform s-intersection graphs

k-connectivity of uniform s-intersection graphs k-connectivity of uniform -interection graph Mindauga Blozneli, Katarzyna Rybarczyk Faculty of Mathematic and Informatic, Vilniu Univerity, 03225 Vilniu, Lithuania, E-MAIL: mindauga.blozneli@mif.vu.lt

More information

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Joint work with Jinbei Zhang (SJTU), Chih-Chun Wang (Purdue) and Xinbing Wang (SJTU)

More information

Robust Decentralized Design of H -based Frequency Stabilizer of SMES

Robust Decentralized Design of H -based Frequency Stabilizer of SMES International Energy Journal: Vol. 6, No., Part, June 005-59 Robut Decentralized Deign of H -baed Frequency Stabilizer of SMES www.erd.ait.ac.th/reric C. Vorakulpipat *, M. Leelajindakrirerk *, and I.

More information

Feedback Control Systems (FCS)

Feedback Control Systems (FCS) Feedback Control Sytem (FCS) Lecture19-20 Routh-Herwitz Stability Criterion Dr. Imtiaz Huain email: imtiaz.huain@faculty.muet.edu.pk URL :http://imtiazhuainkalwar.weebly.com/ Stability of Higher Order

More information

A Provably Secure Scheme for Remote User Authentication

A Provably Secure Scheme for Remote User Authentication A Provably Secure Scheme for Remote Uer Authentication Fuw-Yi Yang 1, Su-Hui Chiu 2 1 Department of Computer Science and Information Engineering, Chaoyang Univerity of Technology Taichung County 41349,

More information