Beyond Cut-Set Bounds - The Approximate Capacity of D2D Networks
|
|
- Buddy Atkinson
- 5 years ago
- Views:
Transcription
1 Beyond Cut-Set Bound - The Approximate Capacity of DD Network Avik Sengupta Hume Center for National Security and Technology Department of Electrical and Computer Engineering Virginia Tech, Blackburg, VA 4060, USA avikg@vt.edu Ravi Tandon Dicovery Analytic Center Department of Computer Science Virginia Tech, Blackburg, VA 4060, USA tandonr@vt.edu Abtract Device-to-Device DD communication i emerging a a viable olution for alleviating the evere capacity crunch in content-centric wirele network. DD encourage backhaulfree communication directly between device with imilar content requirement grouped into cluter. In thi work, a elf-utaining DD network i conidered, where a et of commonly requeted file are completely tored within the collective device memorie in a cluter and file requet from device are erviced by local inter-device multicat tranmiion. For uch a network, new information theoretic convere reult are developed, in the form of a lower bound on the minimum DD multicat rate a a function of the torage per device. The propoed convere i then ued to characterize the approximate tradeoff between the device torage and DD multicat rate to within a contant multiplicative gap of 8. I. INTRODUCTION In recent time, the dynamic of traffic over wirele network ha undergone a paradigm hift to become increaingly content centric with multimedia content ditribution holding precedence. Thi neceitate careful deign of content torage and over-the-air ditribution cheme within the network to efficently ue carce pectral reource to handle heavy traffic load a evidenced by a wealth of recent reearch [] []. Device-to-device DD communication ytem have been propoed a one of the olution that could help in alleviating the evere capacity crunch in wirele network [] [6]. DD ue low-power direct communication within device grouped into cluter to facilitate large cale frequency reue thereby freeing up preciou pectral reource. We conider a DD network with device, and N file denoted by F,..., F N, each of ize B unit, where the torage of each device i M B unit. The bae-tation populate the device with function of file, depending on the number of uer and available device torage. The DD ytem i elf-utaining i.e., all N file mut be recoverable from the collective torage memory of the device, which i equivalent to the condition M N. Once the device reveal their file requet, all the device within the cluter tranmit multicat meage over the hared link to ervice the requet. Figure illutrate the ytem model. The torage/multicat mechanim mut be deigned uch that any device mut be able to decode it requeted file uing it local torage and the multicat tranmiion from other device. Recently, Maddah-Ali and Nieen have invetigated a related caching problem [] [4] for which it ha been hown that, by jointly deigning the content torage and delivery, order-wie improvement in tranmiion rate can be achieved. The main difference between the caching problem tudied in [,] and the DD problem i the ditributed nature of multicat tranmiion. The caching problem allow for centralized delivery, in which the multicat can be any arbitrary function of all N file. In the DD problem however, the outgoing multicat from each device can only depend on the content tored at that device. The focu of thi work i on the fundamental tradeoff between the device torage and the total multicat tranmiion rate referred to a the M, R tradeoff for the DD problem. In [5,6], Ji et.al. preent new torage/delivery mechanim for the DD problem. The reult in [6] how that for a elf-utaining DD network, when the device can ue local inter-device multicat tranmiion to atify the requet of other within the cluter, orderwie rate improvement imilar to [,] can be achieved. The author preent an achievable cheme a well a a cut-et baed argument to obtain upper and lower bound on the M, R tradeoff for the DD problem. In thi work, we develop a new convere lower bound on the M, R tradeoff for the DD problem. The new lower bound addree contraint that are unique to the DD network, i.e., the local dependence of device multicat on it tored content. We how that the new convere i tighter than the exiting one preented in [6, Theorem ] which are primarily baed on the relaxation of the DD problem to the centralized caching problem for all value of problem parameter. Our reult how that the achievable cheme preented in [6] i indeed optimal for the lowet allowable value of torage memory for a elf-utaining DD network i.e., at M=N/. Uing our new convere reult, together with the achievable cheme of [6], we characterize the M, R tradeoff for the DD network to within a maximum contant multiplicative gap of 8 for all value of problem parameter. The paper i organized a follow: Section II outline the ytem model. Section III detail the analyi of the new lower bound on the torage v. rate tradeoff for the DD network, while Section IV illutrate the intuition behind the new bound through an example. Finally, Section V conclude the paper.
2 For the M, R DD cheme, the probability of error i defined a: P e max max P ˆF Rk F Rk. 5 R,...,R [N] k [] Definition 4 Storage v. Rate Tradeoff. The torage-rate pair M, R i achievable if, for any ϵ > 0, there exit an M, R DD cheme for which P e ϵ. The torage v. rate tradeoff i defined a: RM inf {R : M, R i achievable}. 6 Fig.. Sytem Model for device-to-device DD Network. Notation: Let Y i be a random variable. Y [a:b], where a < b denote the et of random variable {Y i : i = a, a +,..., b, b}. Alo, Y [a,b] denote the et {Y i : i = a, b}. Y [n] denote a et of any n arbitrary random variable Y i uch that Y [n] = n. N + denote the et of natural number; the function x + = max0, x; x denote the ceil function; x denote the floor function. II. SYSTEM MODEL The DD network ha uer, and a total of N file, denoted by F,.., F N, where each file i aumed to be of ize B, for ome B N +. Formally, the file F n are i.i.d and ditributed a : F n Unif{,,..., B }. We next define the key component of the DD problem: Definition Storage. The content torage phae conit of torage function, which map the file F,..., F N into the device torage content Z k ϕ k F,..., F N, for each uer k {,,..., }. The maximum allowable ize of the content of each device torage, Z k, i MB unit. An additional contraint of elf-utainability i enforced i.e., M N, which enure all the file in the ytem are completely tored within the DD cluter. Definition Delivery. In the delivery phae each device k {,,..., } ue one of N encoding function to map it torage content, Z k, to a multicat tranmiion: XR k,...,r ψ R,...,R Zk k {,,..., }. over the hared link in repone to the requet R,..., R {,,..., N }. Each uch tranmiion ha rate RB/ unit. The total multicat rate. when all device tranmit, i RB unit. Definition File Decoding. Once the multicat tranmiion i received, N decoding function map the received ignal over the hared link XR,...,R,..., X R,...,R and the torage content Z k to the etimate ˆF Rk µ R,...,R,k XR,...,R,..., X R,...,R, Z k, 4 of the requeted file F Rk for uer k {,,..., }. III. MAIN RESULTS AND DISCUSSION We next preent our main reult which give a new information theoretic lower bound on the torage v. rate tradeoff for the DD problem. Theorem. In a DD ytem with device and N file, with each device having torage ize M, and M N, the optimal content delivery rate R M i lower bounded by: R M R LB M N M max {,...,}, l {,..., N } where µ = min N l l µ l,, l. N l + Proof. The proof of Theorem i given in Appendix A, 7 The expreion in Theorem ha two parameter -, which i related to the number of device and a well a a new parameter l. Compared to [6, Theorem ], the additional parameter l add further flexibility to the lower bound expreion and better model the file decoding through the interaction of the device torage content and the multicat tranmiion. Conidering the cut-et baed bound preented in [6, Theorem ], the firt term inide the max function i imply the expreion for the centralized caching problem preented in [, Theorem ]. Furthermore, etting l = N/ in Theorem yield { } R N M M max {,...,} N, 8 which i greater than the cut-et expreion in the firt term inide the max function owing to the factor in the denominator. The econd term inide the max function can be obtained by etting =, l = N in Theorem. Thu, the propoed bound i generally tighter than the bound in [6, Theorem ]. It i to be noted that the bound in [6] i tight only for large value of device torage ize M. A hown in the equel, the new bound in Theorem i tighter for maller value of M and yield the exiting bound a a pecial cae for large value of M. Next, we preent our econd main reult, which etablihe the optimal torage v. rate tradeoff for the DD network to within a contant multiplicative factor. In [6], the author propoe a DD content ditribution cheme which achieve a rate given by [6, Theorem ]. Uing the reult in 7, we how a contant multiplicative gap exit between the new lower bound and the achievable rate in [6, Theorem ]:
3 Theorem. Let R UB M be the achievable rate of the DD cheme given in [6, Theorem ] and let R LB M be the lower bound on the optimal rate given in 7. For any N + device, N N + file, and device torage in the range N M N, we Gap = R UBM R LB M = M = N N < M 6 < M. 9 8 M N Proof. The proof of Theorem i omitted for brevity. IV. INTUITION BEHIND PROOF OF THEOREM We next preent a detailed example to illutrate the intuition behind the propoed convere. Example. Conider a DD ytem with = device, each with a torage memory of M, and N = file A, B, C each of unit ize. For thi problem, the lower bound [6, Theorem ] are given by: R + M 0 R + M. In contrat, the propoed bound in Theorem give following tighter bound for different choice of and l: R + 6M 8, =, l = 8R + 6M 5, =, l = R + M, =, l =, 4 where 4 i the bound in. Next, we detail the derivation of the new lower bound and. Firt, we conider the requet vector R, R, R = A, B, C and R, R, R = B, C, A. The firt = device torage content Z, Z along with two tranmiion X ABC = {XABC }, X BCA = {XBCA } from the third device correponding to the two requet vector are able to decode all file. Here each tranmiion ha the rate of R. We upper bound the entropy of l = tranmiion with thi rate, while uing the other tranmiion decoding capability in conjunction with the device torage content to derive a tighter bound. We HZ [,], X ABC, X BCA 5 HZ [,] + H X ABC, X BCA Z [,] 6 M + H X ABC + H X BCA Z [,], X ABC 7 + H X BCA Z [,], X ABC, A, B 8 + H X BCA, Z Z [,], X ABC, A, B 9 + HZ Z [,], X ABC, A, B + H X BCA Z [:], X ABC, A, B 0 + HZ Z [,], A, B + H X BCA Z [:], X ABC, A, B, C + HZ Z [,], A, B, where follow from the fact that H X BCA Z [:], X ABC, A, B, C = 0 ince X BCA i a function of the file A, B, C which are preent inide the conditioning. Conidering the term HZ Z [,], A, B, we HZ Z [,], A, B = HZ [:] A, B HZ [,] A, B. Uing in, we + HZ [:] A, B HZ [,] A, B. 4 Now conidering all poible ubet of Z [:] having cardinality, in the RHS of 4, we have the following: + HZ [:] A, B HZ [,] A, B. 5 + HZ [:] A, B HZ [,] A, B. 6 Symmetrizing over the inequalitie in 4, 5 and 6, we + HZ [:] A, B i,j=,i j HZ [i,j] A, B. 7 Han Inequality: We next tate Han Inequality [7, Theorem 7.6.] on ubet of random variable, which we ue throughout the paper for deriving the new lower bound. Let {X, X,..., X n } denote a et of random variable. Further, let X [] {X, X,..., X n } denote a ubet of cardinality. Then given two ubet X [r], X [m] where r m, the tatement of Han Inequality can be tated a: n r X [r] : X [r] =r H X [r] r n m X [m] : X [m] =m H X [m] m, 8 where the um are over all poible ubet of ize r, m repectively. Next, conider Z [:] a the et of random variable and the ubet Z [i,j] Z [:] : i j, i, j =,, of cardinality. Applying Han Inequality uing the conditional entropy of the et, we H Z [:] A, B H Z [i,j] A, B 9 i= H Z [:] A, B i,j= i j i,j=,i j H Z [i,j] A, B. 0 Subtituting 0 into 4, we + HZ [:] A, B HZ [:] A, B + HZ [:] A, B + HZ [:], C A, B + HC A, B + HZ [:] A, B, C 4 + R + 6M 8. 5
4 Rate R New Lower Bound Theorem 0. Lower Bound in [6] Upper Bound in [6] Storage per Device M a Rate R New Lower Bound Theorem Lower Bound in [6] Upper Bound in [6] Storage per Device M Fig.. M v. R tradeoff for a DD cluter with a N = = and b N = = 0. b Next, we conider = device torage content, Z, and three requet vector R, R, R = A, B, C, R, R, R = B, C, A and R, R, R = C, A, B along with tranmiion XABC = {XABC, X ABC }, X BCA = {XBCA, X BCA }, X CAB = {XCAB, X CAB } which are capable of decoding all file. Each compoite tranmiion i of rate R. We upper bound the entropy of l = tranmiion with their rate. Thu we HZ, X ABC, X BCA, X CAB 6 HZ + H X ABC, X BCA, X CAB Z 7 M + H X ABC, X BCA Z + H X CAB Z, X ABC, X BCA 8 M + R + H X CAB, Z Z, X ABC, X BCA 9 + HZ Z, X ABC, X BCA, A, B + H X CAB Z [,], X ABC, X BCA, A, B, C 40 + HZ Z, A, B 4 + HZ [,] A, B HZ A, B, 4 where, 40 follow from the fact that H X CAB Z [,], X ABC, X BCA, A, B, C = 0 ince X CAB i a function of the file A, B, C. Conidering all poible ubet of Z [,] of cardinality and uing a imilar ymmetrization argument and Han Inequality, we get: + HZ [,] A, B HZ [,] A, B + HC A, B + HZ [,] A, B, C R + 6M Finally, conidering again, = device torage content, Z, and three requet vector R, R, R = A, B, C, R, R, R = B, C, A and R, R, R = C, A, B along with three tranmiion XABC = {XABC, X ABC }, X BCA = {XBCA, X BCA }, X CAB = {XCAB, X CAB } which are capable of decoding all file. Each tranmiion ha rate R /. We upper bound the entropy of l = tranmiion by their rate. We HZ, X ABC, X BCA, X CAB 47 HZ + H X ABC + H X BCA + H X CAB 48 M + R 49 R + M. 50 Finally, combining, and 4, give the propoed lower bound on the optimal tranmiion rate a hown in Figure a. The lat bound on the rate given in 50 i tight only in the cae when the tranmiion are almot independent of each other. The propoed convere i tight at the point M = N where we how that the achievable point propoed in [6, Theorem ] i optimal. For increaing N, we can ee from Figure b that the propoed convere ignificantly improve on the exiting bound from [6, Theorem ]. V. CONCLUSION In thi paper, we preented a new information theoretic lower bound for a elf-utaining DD network. We have leveraged Han Inequality to better model the interaction of hared content tored in the device memorie and file decoding capability of multicat tranmiion to derive new lower bound which are generally tighter than the exiting cut-et baed bound. Uing the new lower bound, we characterized the device torage v. tranmiion rate tradeoff of the DD network to within a maximum contant multiplicative factor of 8 for all poible value of problem parameter. APPENDIX A PROOF OF THEOREM Let there be a library of N N + file F [:N] each of unit ize without lo of generality, and N + device in the DD cluter, with torage content Z [:]. The elf utainability condition of the DD cluter, we have M N. Let be an integer uch that {,,..., }. Conider
5 the firt device torage content, Z [:], and a requet vector R, R,..., R, R +,..., R =,,...,, ϕ,..., ϕ i.e., the firt requet are unique file while the remaining can be for arbitrary file. To ervice thi requet conider the compoite tranmiion vector: X = X +,,...,,ϕ,...,ϕ X +,,...,,ϕ,...,ϕ. X +,,...,,ϕ,...,ϕ, 5 where X +,,...,,ϕ,...,ϕ = ψf [:], F [ ] denote the multicat tranmiion from the + th device to ervice the requet of the device. Note that the file in the et F [ ], denoting the requet of the other device, are conidered arbitrary. For achieving optimal tranmiion rate R M, each device in the DD cluter multicat with a rate of R M/. Thu the rate of each compoite tranmiion vector i given by R M. Next, we note that the compoite tranmiion vector X, compoed of ubmulticat tranmiion, along with the content of device memorie i capable of decoding file i.e., F [:]. Similarly, conider a requet vector R, R,..., R, R +,..., R = +, +,...,, ϕ,..., ϕ where the firt requet are again for unique file and ret are arbitrary. A compoite tranmiion vector X = X + +,+,...,,ϕ,...,ϕ X + +,+,...,,ϕ,...,ϕ. X + +,+,...,,ϕ,...,ϕ, 5 along with device torage content Z [:], can decode another file F [+:]. Conidering N/ compoite tranmiion vector X [: N/ ] and device torage content Z [:], the library of file F [:N] can be completely decoded. Thu, we N H Z [:], X [: N/ ] 5 H Z [:] + H X[: N/ ] Z [:] 54 M + H X[: N/ ] Z [:] 55 M + H X[:l] Z [:] + H X[l+: N/ ] Z [:], X [:l] M + l R M + H X[l+: N/ ] Z [:], X [:l], F [:l] M + l R M + H X[l+: N/ ], Z [+:] Z [:], X [:l], F [:l] 58 M + l R M + H Z [+:] Z [:], X [:l], F [:l] }{{} δ + H X[l+: N/ ] Z [:], X [:l], F [:lµ+l], 59 }{{} λ where 57 follow from the fact that each compoite tranmiion vector ha rate R M and that the device torage content, Z [:], along with the compoite tranmiion vector X[:l] are capable of decoding the file F [:l]. In 58, µ = min { } N l l, i the number of additional device memorie which, along with the tranmiion X [:l] can decode all N file. For =, we H X[: N/ ] Z [:] = 0, 60 and 55 yield the elf-utainability condition M N. Upper Bound on δ: We conider the factor δ, from 59: δ = H Z [+:] Z [:], X [:l], F [:l] 6 H Z [+:] Z [:], F [:l] 6 = H Z [:] F [:l] H Z[:] F [:l]. 6 Conidering all poible ubet of Z [:] having cardinality, i.e., all poible combination of device torage content in 5, and all poible combination of file in the et F [ ] for each tranmiion X [:l] in 57, we can obtain different inequalitie of the form of 6. Symmetrizing over all the inequalitie, we δ H Z [:] F [:l] i= H Z i [] F [:l], 64 where, Z i [] i the i-th ize- ubet of Z [:]. Next, conider Z [:] a a et of random variable and ubet Z i [] Z [:] i =,...,. Applying Han Inequality from 8, we H Z [:] F [:l] + µ i= H Z i [] F [:l] i= + µ H Z [:] F [:l] i= 65 H Z i [] F [:l]. Subtituting 66 into 64, we δ H Z [:] F [:l] + µ H Z [:] F [:l] = µ + µ H Z [:] F [:l] µ + µ H Z [:], F [l+:n] F [:l] = µ + µ H F [l+:n] F [:l] + H Z[:] F [:N] 70 }{{} =0 µ + µ N l+, 7 where 70 follow from the fact that the device torage content are function of all the N file in the library. Upper Bound on λ: We conider the factor λ, from 59. We have two cae: Cae : N l + lµ: We conider the cae that all N file
6 can be decoded with µ additional device torage content and tranmiion X [:l], within the conditioning in the factor λ in 59i.e., l + lµ N. We λ = H X[l+: N/ ] Z [:], X [:l], F [:N] H X[l+: N/ ] Z [:], F [:N] = 0, 7 which follow from the fact that the tranmiion are function of all N file. Cae : N > l + lµ: We conider the cae where µ = additional device torage content along with the tranmiion X [:l], cannot decode all N file. We λ = H X[l+: N/ ] Z [:], X [:l], F [:l] H X[l+: N/ ] Z [:] = 0, 7 which follow from the fact that M N i.e., all file are tored within the collective device memorie in the DD cluter and hence all tranmiion are function of all the device torage content. Thu combining 7 and 7 we λ = Subtituting 7 and 74 into 59, we l N M + R M + µ N l+ N M R M µ + µ N l l Optimizing over all parameter value of, l, µ, we R M R LB M N M max {,...,}, l {,..., N } µ l which complete the proof of Theorem. REFERENCES N l +, 76 [] M. A. Maddah-Ali and U. Nieen, Fundamental Limit of Caching, IEEE Tranaction on Information Theory, vol. 60, no. 5, pp , May 04. [] M. Maddah-Ali and U. Nieen, Decentralized Coded Caching Attain Order-Optimal Memory-Rate Tradeoff, IEEE/ACM Tranaction on Networking, April 04. [] U. Nieen and M. A. Maddah-Ali, Coded Caching with Nonuniform Demand, in IEEE Conference on Computer Communication Workhop INFOCOM WSHPS, April 04, pp. 6. [4] R. Pedarani, M. Maddah-Ali, and U. Nieen, Online Coded Caching, in IEEE International Conference on Communication ICC, June 04, pp [5] A. Sengupta, R. Tandon, and T. C. Clancy, Fundamental Limit of Caching with Secure Delivery, Wirele Phyical Layer Security Workhop - IEEE International Conference on Communication ICC, pp , June 04. [6], Decentralized Caching with Secure Delivery, IEEE International Sympoium on Information Theory ISIT, pp. 4 45, July 04. [7], Secure Caching with Non-Uniform Demand, IEEE Global Wirele Summit GWS, pp. 5, May 04. [8], Fundamental Limit of Caching with Secure Delivery, IEEE Tranaction on Information Forenic and Security, vol. 0, pp , Feb 05. [9] A. Sengupta, S. Amuru, R. Tandon, R. M. Buehrer, and T. C. Clancy, Learning Ditributed Caching Strategie in Small Cell Network, The Eleventh International Sympoium on Wirele Communication Sytem ISWCS, pp. 97 9, Aug 04. [0] M. Ji, G. Caire, and A. F. Molich, Optimal Throughput-Outage Tradeoff in Wirele One-Hop Caching Network, in IEEE International Sympoium on Information Theory ISIT, July 0, pp [] M. Ji, A. M. Tulino, J. Llorca, and G. Caire, Order Optimal Coded Caching-Aided Multicat under Zipf Demand Ditribution, in The Eleventh International Sympoium on Wirele Communication Sytem ISWCS, 04. [] N. Golrezaei,. Shanmugam, A. Dimaki, A. Molich, and G. Caire, FemtoCaching: Wirele Video Content Delivery through Ditributed Caching Helper, IEEE Tranaction on Information Theory, vol. 59, pp , Dec. 0. [] M. Ji, G. Caire, and A. F. Molich, Wirele Device-to-Device Caching Network: Baic Principle and Sytem Performance, arxiv : 05.56, May 0. [4] N. Golrezaei, A. G. Dimaki, and A. F. Molich, Wirele Device-to- Device Communication with Ditributed Caching, in IEEE International Sympoium on Information Theory Proceeding ISIT, July 0, pp [5] M. Ji, G. Caire, and A. F. Molich, Fundamental Limit of Ditributed Caching in DD Wirele Network, in IEEE Information Theory Workhop ITW 0, Sept 0, pp. 5. [6], Fundamental limit of caching in wirele DD network, arxiv:405.56, 04. [Online]. Available: 56 [7] T. M. Cover and J. A. Thoma, Element of Information Theory, nd Edition. Hoboken, NJ, USA: Wiley-Intercience, John Wiley and Son.
THE dynamics of traffic over wireless networks has undergone
940 IEEE TRASACTIOS O COUICATIOS, VO. 65, O. 5, AY 207 Improved Approximation of Storage-Rate Tradeoff for Caching With ultiple Demand Avik Sengupta, ember, IEEE, and Ravi Tandon, Senior ember, IEEE Abtract
More informationImproved Approximation of Storage-Rate Tradeoff for Caching via New Outer Bounds
Improved Approximation of Storage-Rate Tradeoff for Caching via New Outer Bound Avik Sengupta, Ravi Tandon, T. Chare Cancy Hume Center & Dept. of Eectrica and Computer Engineering Dicovery Anaytic Center
More informationSignaling over MIMO Multi-Base Systems: Combination of Multi-Access and Broadcast Schemes
Signaling over MIMO Multi-Bae Sytem: Combination of Multi-Acce and Broadcat Scheme Mohammad Ali Maddah-Ali Abolfazl S. Motahari and Amir K. Khandani Coding & Signal Tranmiion Laboratory (www.ct.uwaterloo.ca)
More informationLecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004
18.997 Topic in Combinatorial Optimization April 29th, 2004 Lecture 21 Lecturer: Michel X. Goeman Scribe: Mohammad Mahdian 1 The Lovaz plitting-off lemma Lovaz plitting-off lemma tate the following. Theorem
More informationErasure Broadcast Networks with Receiver Caching
Eraure Broadcat Network with Receiver Caching hirin aeedi Bidokhti, Roy Timo and Miche le Wigger tanford Univerity, aeedi@tanford.edu Techniche Univerita t Mu nchen, roy.timo@tum.de LTCI CNR, Telecom PariTech,
More informationDecentralized Asynchronous Coded Caching Design and Performance Analysis in Fog Radio Access Networks
Decentralized Aynchronou Coded Caching Deign and Performance Analyi in Fog Radio Acce Network Yanxiang Jiang, Senior Member, IEEE, Wenlong Huang, Mehdi Benni, Senior Member, IEEE, and Fu-Chun Zheng, Senior
More informationPreemptive scheduling on a small number of hierarchical machines
Available online at www.ciencedirect.com Information and Computation 06 (008) 60 619 www.elevier.com/locate/ic Preemptive cheduling on a mall number of hierarchical machine György Dóa a, Leah Eptein b,
More informationGain and Phase Margins Based Delay Dependent Stability Analysis of Two- Area LFC System with Communication Delays
Gain and Phae Margin Baed Delay Dependent Stability Analyi of Two- Area LFC Sytem with Communication Delay Şahin Sönmez and Saffet Ayaun Department of Electrical Engineering, Niğde Ömer Halidemir Univerity,
More informationMulti-dimensional Fuzzy Euler Approximation
Mathematica Aeterna, Vol 7, 2017, no 2, 163-176 Multi-dimenional Fuzzy Euler Approximation Yangyang Hao College of Mathematic and Information Science Hebei Univerity, Baoding 071002, China hdhyywa@163com
More informationUnavoidable Cycles in Polynomial-Based Time-Invariant LDPC Convolutional Codes
European Wirele, April 7-9,, Vienna, Autria ISBN 978--87-4-9 VE VERLAG GMBH Unavoidable Cycle in Polynomial-Baed Time-Invariant LPC Convolutional Code Hua Zhou and Norbert Goertz Intitute of Telecommunication
More informationCodes Correcting Two Deletions
1 Code Correcting Two Deletion Ryan Gabry and Frederic Sala Spawar Sytem Center Univerity of California, Lo Angele ryan.gabry@navy.mil fredala@ucla.edu Abtract In thi work, we invetigate the problem of
More informationThe Impact of Imperfect Scheduling on Cross-Layer Rate. Control in Multihop Wireless Networks
The mpact of mperfect Scheduling on Cro-Layer Rate Control in Multihop Wirele Network Xiaojun Lin and Ne B. Shroff Center for Wirele Sytem and Application (CWSA) School of Electrical and Computer Engineering,
More informationSMALL-SIGNAL STABILITY ASSESSMENT OF THE EUROPEAN POWER SYSTEM BASED ON ADVANCED NEURAL NETWORK METHOD
SMALL-SIGNAL STABILITY ASSESSMENT OF THE EUROPEAN POWER SYSTEM BASED ON ADVANCED NEURAL NETWORK METHOD S.P. Teeuwen, I. Erlich U. Bachmann Univerity of Duiburg, Germany Department of Electrical Power Sytem
More informationA Constraint Propagation Algorithm for Determining the Stability Margin. The paper addresses the stability margin assessment for linear systems
A Contraint Propagation Algorithm for Determining the Stability Margin of Linear Parameter Circuit and Sytem Lubomir Kolev and Simona Filipova-Petrakieva Abtract The paper addree the tability margin aement
More informationList coloring hypergraphs
Lit coloring hypergraph Penny Haxell Jacque Vertraete Department of Combinatoric and Optimization Univerity of Waterloo Waterloo, Ontario, Canada pehaxell@uwaterloo.ca Department of Mathematic Univerity
More informationEnergy-Distortion Tradeoff for the Gaussian Broadcast Channel with Feedback
016 IEEE International Sympoium on Information Theory Energy-itortion Tradeoff for the Gauian Broadcat Channel with Feedback Yonathan Murin 1, Yonatan Kapi, Ron abora 3, and eniz Gündüz 4 1 Stanford Univerity,
More informationA Study on Simulating Convolutional Codes and Turbo Codes
A Study on Simulating Convolutional Code and Turbo Code Final Report By Daniel Chang July 27, 2001 Advior: Dr. P. Kinman Executive Summary Thi project include the deign of imulation of everal convolutional
More informationTechnical Appendix: Auxiliary Results and Proofs
A Technical Appendix: Auxiliary Reult and Proof Lemma A. The following propertie hold for q (j) = F r [c + ( ( )) ] de- ned in Lemma. (i) q (j) >, 8 (; ]; (ii) R q (j)d = ( ) q (j) + R q (j)d ; (iii) R
More informationON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang
Proceeding of the 2008 Winter Simulation Conference S. J. Maon, R. R. Hill, L. Mönch, O. Roe, T. Jefferon, J. W. Fowler ed. ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION Xiaoqun Wang
More informationBogoliubov Transformation in Classical Mechanics
Bogoliubov Tranformation in Claical Mechanic Canonical Tranformation Suppoe we have a et of complex canonical variable, {a j }, and would like to conider another et of variable, {b }, b b ({a j }). How
More informationConnectivity in large mobile ad-hoc networks
Weiertraß-Intitut für Angewandte Analyi und Stochatik Connectivity in large mobile ad-hoc network WOLFGANG KÖNIG (WIAS und U Berlin) joint work with HANNA DÖRING (Onabrück) and GABRIEL FARAUD (Pari) Mohrentraße
More informationCHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS
CHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS 8.1 INTRODUCTION 8.2 REDUCED ORDER MODEL DESIGN FOR LINEAR DISCRETE-TIME CONTROL SYSTEMS 8.3
More informationSuggested Answers To Exercises. estimates variability in a sampling distribution of random means. About 68% of means fall
Beyond Significance Teting ( nd Edition), Rex B. Kline Suggeted Anwer To Exercie Chapter. The tatitic meaure variability among core at the cae level. In a normal ditribution, about 68% of the core fall
More informationLayering as Optimization Decomposition
TLEN7000/ECEN7002: Analytical Foundation of Network Layering a Optimization Decompoition Lijun Chen 11/29/2012 The Internet Compleity i ever increaing Large in ize and cope Enormou heterogeneity Incomplete
More informationMulticolor Sunflowers
Multicolor Sunflower Dhruv Mubayi Lujia Wang October 19, 2017 Abtract A unflower i a collection of ditinct et uch that the interection of any two of them i the ame a the common interection C of all of
More informationSERIES COMPENSATION: VOLTAGE COMPENSATION USING DVR (Lectures 41-48)
Chapter 5 SERIES COMPENSATION: VOLTAGE COMPENSATION USING DVR (Lecture 41-48) 5.1 Introduction Power ytem hould enure good quality of electric power upply, which mean voltage and current waveform hould
More informationAvoiding Forbidden Submatrices by Row Deletions
Avoiding Forbidden Submatrice by Row Deletion Sebatian Wernicke, Jochen Alber, Jen Gramm, Jiong Guo, and Rolf Niedermeier Wilhelm-Schickard-Intitut für Informatik, niverität Tübingen, Sand 13, D-72076
More informationEstimating floor acceleration in nonlinear multi-story moment-resisting frames
Etimating floor acceleration in nonlinear multi-tory moment-reiting frame R. Karami Mohammadi Aitant Profeor, Civil Engineering Department, K.N.Tooi Univerity M. Mohammadi M.Sc. Student, Civil Engineering
More informationLecture 10 Filtering: Applied Concepts
Lecture Filtering: Applied Concept In the previou two lecture, you have learned about finite-impule-repone (FIR) and infinite-impule-repone (IIR) filter. In thee lecture, we introduced the concept of filtering
More informationOnline Appendix for Managerial Attention and Worker Performance by Marina Halac and Andrea Prat
Online Appendix for Managerial Attention and Worker Performance by Marina Halac and Andrea Prat Thi Online Appendix contain the proof of our reult for the undicounted limit dicued in Section 2 of the paper,
More informationLOAD FREQUENCY CONTROL OF MULTI AREA INTERCONNECTED SYSTEM WITH TCPS AND DIVERSE SOURCES OF POWER GENERATION
G.J. E.D.T.,Vol.(6:93 (NovemberDecember, 03 ISSN: 39 793 LOAD FREQUENCY CONTROL OF MULTI AREA INTERCONNECTED SYSTEM WITH TCPS AND DIVERSE SOURCES OF POWER GENERATION C.Srinivaa Rao Dept. of EEE, G.Pullaiah
More informationLDPC Convolutional Codes Based on Permutation Polynomials over Integer Rings
LDPC Convolutional Code Baed on Permutation Polynomial over Integer Ring Marco B. S. Tavare and Gerhard P. Fettwei Vodafone Chair Mobile Communication Sytem, Dreden Univerity of Technology, 01062 Dreden,
More informationNew bounds for Morse clusters
New bound for More cluter Tamá Vinkó Advanced Concept Team, European Space Agency, ESTEC Keplerlaan 1, 2201 AZ Noordwijk, The Netherland Tama.Vinko@ea.int and Arnold Neumaier Fakultät für Mathematik, Univerität
More informationSocial Studies 201 Notes for March 18, 2005
1 Social Studie 201 Note for March 18, 2005 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the
More informationOne Class of Splitting Iterative Schemes
One Cla of Splitting Iterative Scheme v Ciegi and V. Pakalnytė Vilniu Gedimina Technical Univerity Saulėtekio al. 11, 2054, Vilniu, Lithuania rc@fm.vtu.lt Abtract. Thi paper deal with the tability analyi
More informationFUNDAMENTALS OF POWER SYSTEMS
1 FUNDAMENTALS OF POWER SYSTEMS 1 Chapter FUNDAMENTALS OF POWER SYSTEMS INTRODUCTION The three baic element of electrical engineering are reitor, inductor and capacitor. The reitor conume ohmic or diipative
More informationC up (E) C low (E) E 2 E 1 E 0
Spreading in lock-fading hannel. Muriel Médard David N.. Te medardmit.edu Maachuett Intitute of Technoy dteeec.berkeley.edu Univerity of alifornia at erkeley btract We conider wideband fading channel which
More informationA Thresholding-Based Antenna Switching in SWIPT-Enabled MIMO Cognitive Radio Networks with Co-Channel Interference
A Threholding-Baed Antenna Switching in SWIPT-Enabled MIMO Cognitive Radio Network wi Co-Channel Interference Fatma Benkhelifa, and Mohamed-Slim Alouini Computer, Electrical and Maematical Science and
More information7.2 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 281
72 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 28 and i 2 Show how Euler formula (page 33) can then be ued to deduce the reult a ( a) 2 b 2 {e at co bt} {e at in bt} b ( a) 2 b 2 5 Under what condition
More informationImproved Interference Cancellation Scheme for Two-User Detection of Alamouti Code
Improved Interference Cancellation Scheme for Two-Uer Detection of Alamouti Code Manav R hatnagar and Are Hjørungne Abtract In thi correpondence, we propoe an improved interference cancellation method
More informationChapter 2 Sampling and Quantization. In order to investigate sampling and quantization, the difference between analog
Chapter Sampling and Quantization.1 Analog and Digital Signal In order to invetigate ampling and quantization, the difference between analog and digital ignal mut be undertood. Analog ignal conit of continuou
More informationNonlinear Single-Particle Dynamics in High Energy Accelerators
Nonlinear Single-Particle Dynamic in High Energy Accelerator Part 6: Canonical Perturbation Theory Nonlinear Single-Particle Dynamic in High Energy Accelerator Thi coure conit of eight lecture: 1. Introduction
More informationSimple Observer Based Synchronization of Lorenz System with Parametric Uncertainty
IOSR Journal of Electrical and Electronic Engineering (IOSR-JEEE) ISSN: 78-676Volume, Iue 6 (Nov. - Dec. 0), PP 4-0 Simple Oberver Baed Synchronization of Lorenz Sytem with Parametric Uncertainty Manih
More informationUtility Proportional Fair Bandwidth Allocation: An Optimization Oriented Approach
Utility Proportional Fair Bandwidth Allocation: An Optimization Oriented Approach 61 Tobia Hark Konrad-Zue-Zentrum für Informationtechnik Berlin (ZIB), Department Optimization, Takutr. 7, 14195 Berlin,
More informationOn the Stability Region of Congestion Control
On the Stability Region of Congetion Control Xiaojun Lin and Ne B. Shroff School of Electrical and Computer Engineering Purdue Univerity, Wet Lafayette, IN 47906 {linx,hroff}@ecn.purdue.edu Abtract It
More informationIEOR 3106: Fall 2013, Professor Whitt Topics for Discussion: Tuesday, November 19 Alternating Renewal Processes and The Renewal Equation
IEOR 316: Fall 213, Profeor Whitt Topic for Dicuion: Tueday, November 19 Alternating Renewal Procee and The Renewal Equation 1 Alternating Renewal Procee An alternating renewal proce alternate between
More informationProblem Set 8 Solutions
Deign and Analyi of Algorithm April 29, 2015 Maachuett Intitute of Technology 6.046J/18.410J Prof. Erik Demaine, Srini Devada, and Nancy Lynch Problem Set 8 Solution Problem Set 8 Solution Thi problem
More informationCorrection for Simple System Example and Notes on Laplace Transforms / Deviation Variables ECHE 550 Fall 2002
Correction for Simple Sytem Example and Note on Laplace Tranform / Deviation Variable ECHE 55 Fall 22 Conider a tank draining from an initial height of h o at time t =. With no flow into the tank (F in
More informationAmplify and Forward Relaying; Channel Model and Outage Behaviour
Amplify and Forward Relaying; Channel Model and Outage Behaviour Mehdi Mortazawi Molu Intitute of Telecommunication Vienna Univerity of Technology Guhautr. 5/E389, 4 Vienna, Autria Email: mmortaza@nt.tuwien.ac.at
More informationTheoretical Computer Science. Optimal algorithms for online scheduling with bounded rearrangement at the end
Theoretical Computer Science 4 (0) 669 678 Content lit available at SciVere ScienceDirect Theoretical Computer Science journal homepage: www.elevier.com/locate/tc Optimal algorithm for online cheduling
More informationFinding the location of switched capacitor banks in distribution systems based on wavelet transform
UPEC00 3t Aug - 3rd Sept 00 Finding the location of witched capacitor bank in ditribution ytem baed on wavelet tranform Bahram nohad Shahid Chamran Univerity in Ahvaz bahramnohad@yahoo.com Mehrdad keramatzadeh
More informationMinimal state space realization of MIMO systems in the max algebra
KULeuven Department of Electrical Engineering (ESAT) SISTA Technical report 94-54 Minimal tate pace realization of MIMO ytem in the max algebra B De Schutter and B De Moor If you want to cite thi report
More informationProactive Serving Decreases User Delay Exponentially: The Light-tailed Service Time Case
Proactive Serving Decreae Uer Delay Exponentially: The Light-tailed Service Time Cae Shaoquan Zhang, Longbo Huang, Minghua Chen, and Xin Liu Abtract In online ervice ytem, the delay experienced by uer
More informationJul 4, 2005 turbo_code_primer Revision 0.0. Turbo Code Primer
Jul 4, 5 turbo_code_primer Reviion. Turbo Code Primer. Introduction Thi document give a quick tutorial on MAP baed turbo coder. Section develop the background theory. Section work through a imple numerical
More informationTHE Z-TRANSFORM APPLIED TO BIRTH-DEATH MARKOV PROCESSES
he Zranform applied to birthdeath arov procee HE ZRASOR ALIED O BIRHDEAH ARKO ROCESSES H Department of Electronic and Communication niverity of DareSalaam O Box 3594 DareSalaam anania ABSRAC Birthdeath
More informationMicroblog Hot Spot Mining Based on PAM Probabilistic Topic Model
MATEC Web of Conference 22, 01062 ( 2015) DOI: 10.1051/ matecconf/ 2015220106 2 C Owned by the author, publihed by EDP Science, 2015 Microblog Hot Spot Mining Baed on PAM Probabilitic Topic Model Yaxin
More informationTRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL
GLASNIK MATEMATIČKI Vol. 38583, 73 84 TRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL p-laplacian Haihen Lü, Donal O Regan and Ravi P. Agarwal Academy of Mathematic and Sytem Science, Beijing, China, National
More informationSliding Mode Based Congestion Control and
Sliding Mode Baed Congetion Control and 1 Scheduling for Multi-cla Traffic over Per-link Queueing Wirele Network Zongrui Ding and Dapeng Wu Abtract Thi paper conider the problem of joint congetion control
More informationReliability Analysis of Embedded System with Different Modes of Failure Emphasizing Reboot Delay
International Journal of Applied Science and Engineering 3., 4: 449-47 Reliability Analyi of Embedded Sytem with Different Mode of Failure Emphaizing Reboot Delay Deepak Kumar* and S. B. Singh Department
More informationEarth Potential Rise (EPR) Computation for a Fault on Transmission Mains Pole
ACN: 32586675 ABN: 8632586675 NATIONAL ELECTRICAL ENGINEERING CONULTANCY Earth otential Rie (ER) Computation for a Fault on Tranmiion Main ole repared by: M. Naereddine ACN: 32586675 ABN: 8632586675 Abtract
More informationChannel Selection in Multi-channel Opportunistic Spectrum Access Networks with Perfect Sensing
Channel Selection in Multi-channel Opportunitic Spectrum Acce Networ with Perfect Sening Xin Liu Univerity of California Davi, CA 95616 liu@c.ucdavi.edu Bhaar Krihnamachari Univerity of Southern California
More informationPI control system design for Electromagnetic Molding Machine based on Linear Programing
PI control ytem deign for Electromagnetic Molding Machine baed on Linear Programing Takayuki Ihizaki, Kenji Kahima, Jun-ichi Imura*, Atuhi Katoh and Hirohi Morita** Abtract In thi paper, we deign a PI
More informationRELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS
www.arpapre.com/volume/vol29iue1/ijrras_29_1_01.pdf RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS Sevcan Demir Atalay 1,* & Özge Elmataş Gültekin
More informationLINEAR system identification has been the subject of
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL., NO., 1 Set-Memberhip error-in-variable identification through convex relaxation technique Vito Cerone, Member, IEEE, Dario Piga, Member, IEEE, and Diego Regruto,
More informationEffective Capacity-Based Quality of Service Measures for Wireless Networks
Effective Capacity-Baed Quality of Service Meaure for Wirele Network Dapeng Wu Rohit Negi Abtract An important objective of next-generation wirele network i to provide quality of ervice (QoS) guarantee.
More informationSocial Studies 201 Notes for November 14, 2003
1 Social Studie 201 Note for November 14, 2003 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the
More informationLecture 8: Period Finding: Simon s Problem over Z N
Quantum Computation (CMU 8-859BB, Fall 205) Lecture 8: Period Finding: Simon Problem over Z October 5, 205 Lecturer: John Wright Scribe: icola Rech Problem A mentioned previouly, period finding i a rephraing
More informationCONGESTION control is a key functionality in modern
IEEE TRANSACTIONS ON INFORMATION TEORY, VOL. X, NO. X, XXXXXXX 2008 On the Connection-Level Stability of Congetion-Controlled Communication Network Xiaojun Lin, Member, IEEE, Ne B. Shroff, Fellow, IEEE,
More informationStochastic Optimization with Inequality Constraints Using Simultaneous Perturbations and Penalty Functions
Stochatic Optimization with Inequality Contraint Uing Simultaneou Perturbation and Penalty Function I-Jeng Wang* and Jame C. Spall** The John Hopkin Univerity Applied Phyic Laboratory 11100 John Hopkin
More informationA PROOF OF TWO CONJECTURES RELATED TO THE ERDÖS-DEBRUNNER INEQUALITY
Volume 8 2007, Iue 3, Article 68, 3 pp. A PROOF OF TWO CONJECTURES RELATED TO THE ERDÖS-DEBRUNNER INEQUALITY C. L. FRENZEN, E. J. IONASCU, AND P. STĂNICĂ DEPARTMENT OF APPLIED MATHEMATICS NAVAL POSTGRADUATE
More informationCHAPTER 4 DESIGN OF STATE FEEDBACK CONTROLLERS AND STATE OBSERVERS USING REDUCED ORDER MODEL
98 CHAPTER DESIGN OF STATE FEEDBACK CONTROLLERS AND STATE OBSERVERS USING REDUCED ORDER MODEL INTRODUCTION The deign of ytem uing tate pace model for the deign i called a modern control deign and it i
More informationSINGLE CARRIER BLOCK TRANSMISSION WITHOUT GUARD INTERVAL
SINGLE CARRIER BLOCK TRANSMISSION WITHOUT GUARD INTERVAL Kazunori Hayahi Hideaki Sakai Graduate School of Informatic, Kyoto Univerity Kyoto, JAPAN ABSTRACT Thi paper propoe a imple detection cheme for
More information84 ZHANG Jing-Shang Vol. 39 of which would emit 5 He rather than 3 He. 5 He i untable and eparated into n + pontaneouly, which can alo be treated a if
Commun. Theor. Phy. (Beijing, China) 39 (003) pp. 83{88 c International Academic Publiher Vol. 39, No. 1, January 15, 003 Theoretical Analyi of Neutron Double-Dierential Cro Section of n+ 11 B at 14. MeV
More informationMulticast Network Coding and Field Sizes
Multicat Network Coding and Field Size Qifu (Tyler) Sun, Xunrui Yin, Zongpeng Li, and Keping Long Intitute of Advanced Networking Technology and New Service, Univerity of Science and Technology Beijing,
More informationCoupling of Three-Phase Sequence Circuits Due to Line and Load Asymmetries
Coupling of Three-Phae Sequence Circuit Due to Line and Load Aymmetrie DEGO BELLAN Department of Electronic nformation and Bioengineering Politecnico di Milano Piazza Leonardo da inci 01 Milano TALY diego.ellan@polimi.it
More informationUnbounded solutions of second order discrete BVPs on infinite intervals
Available online at www.tjna.com J. Nonlinear Sci. Appl. 9 206), 357 369 Reearch Article Unbounded olution of econd order dicrete BVP on infinite interval Hairong Lian a,, Jingwu Li a, Ravi P Agarwal b
More informationFinite Element Analysis of a Fiber Bragg Grating Accelerometer for Performance Optimization
Finite Element Analyi of a Fiber Bragg Grating Accelerometer for Performance Optimization N. Baumallick*, P. Biwa, K. Dagupta and S. Bandyopadhyay Fiber Optic Laboratory, Central Gla and Ceramic Reearch
More informationSOME RESULTS ON INFINITE POWER TOWERS
NNTDM 16 2010) 3, 18-24 SOME RESULTS ON INFINITE POWER TOWERS Mladen Vailev - Miana 5, V. Hugo Str., Sofia 1124, Bulgaria E-mail:miana@abv.bg Abtract To my friend Kratyu Gumnerov In the paper the infinite
More information5.5 Application of Frequency Response: Signal Filters
44 Dynamic Sytem Second order lowpa filter having tranfer function H()=H ()H () u H () H () y Firt order lowpa filter Figure 5.5: Contruction of a econd order low-pa filter by combining two firt order
More informationService Level Guarantee for Mobile Application Offloading in Presence of Wireless Channel Errors
Service Level Guarantee for Mobile Application Offloading in Preence of Wirele Channel Error Arani Bhattacharya, Anuman Banerjee, Pradipta De SUNY Korea and Stony Brook Univerity, {arani@unykorea.ac.kr}
More informationOptimization model in Input output analysis and computable general. equilibrium by using multiple criteria non-linear programming.
Optimization model in Input output analyi and computable general equilibrium by uing multiple criteria non-linear programming Jing He * Intitute of ytem cience, cademy of Mathematic and ytem cience Chinee
More informationBeta Burr XII OR Five Parameter Beta Lomax Distribution: Remarks and Characterizations
Marquette Univerity e-publication@marquette Mathematic, Statitic and Computer Science Faculty Reearch and Publication Mathematic, Statitic and Computer Science, Department of 6-1-2014 Beta Burr XII OR
More informationClustering Methods without Given Number of Clusters
Clutering Method without Given Number of Cluter Peng Xu, Fei Liu Introduction A we now, mean method i a very effective algorithm of clutering. It mot powerful feature i the calability and implicity. However,
More informationAnalytical Model of Proportional Fair Scheduling in Interference-limited OFDMA/LTE Networks
Analytical Model of roportional Fair Scheduling in Interference-limited OFDMA/LTE Network Donald arruca, Mariu Gryla, Simon Görtzen and Jame Gro UMIC Reearch Centre, RWTH Aachen Univerity, Germany School
More informationIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 10, OCTOBER Wenguang Mao, Xudong Wang, Senior Member, IEEE, and Shanshan Wu
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 10, OCTOBER 2016 8511 Ditributed Opportunitic Scheduling With QoS Contraint for Wirele Network With Hybrid Link Wenguang Mao, Xudong Wang, Senior
More informationControl chart for waiting time in system of (M / M / S) :( / FCFS) Queuing model
IOSR Journal of Mathematic (IOSR-JM) e-issn: 78-578. Volume 5, Iue 6 (Mar. - Apr. 3), PP 48-53 www.iorjournal.org Control chart for waiting time in ytem of (M / M / S) :( / FCFS) Queuing model T.Poongodi,
More informationDynamic Uplink/Downlink Resource Management in Flexible Duplex-Enabled Wireless Networks
Dynamic Uplink/Downlink Reource Management in Flexible Duplex-Enabled Wirele Network Qi Liao Nokia Bell Lab, Stuttgart, Germany Email: qi.liao@nokia-bell-lab.com arxiv:7.78v [ee.sp] Sep 7 Abtract Flexible
More informationOptimal revenue management in two class pre-emptive delay dependent Markovian queues
Optimal revenue management in two cla pre-emptive delay dependent Markovian queue Manu K. Gupta, N. Hemachandra and J. Venkatewaran Indutrial Engineering and Operation Reearch, IIT Bombay March 15, 2015
More informationAn estimation approach for autotuning of event-based PI control systems
Acta de la XXXIX Jornada de Automática, Badajoz, 5-7 de Septiembre de 08 An etimation approach for autotuning of event-baed PI control ytem Joé Sánchez Moreno, María Guinaldo Loada, Sebatián Dormido Departamento
More informationOn Multi-source Networks: Enumeration, Rate Region Computation, and Hierarchy
On Multi-ource Network: Enumeration, Rate Region Computation, and Hierarchy Congduan Li, Student Member, IEEE, Steven Weber, Senior Member, IEEE, and John MacLaren Walh, Member, IEEE arxiv:5070578v [cit]
More informationEfficient Methods of Doppler Processing for Coexisting Land and Weather Clutter
Efficient Method of Doppler Proceing for Coexiting Land and Weather Clutter Ça gatay Candan and A Özgür Yılmaz Middle Eat Technical Univerity METU) Ankara, Turkey ccandan@metuedutr, aoyilmaz@metuedutr
More informationListen-and-Talk: Full-duplex Cognitive Radio Networks
Liten-and-Talk: Full-duplex Cognitive Radio Network Yun Liao, Tianyu Wang, Lingyang Song, and Zhu Han State Key Laboratory of Advanced Optical Communication Sytem and Network, School of Electrical Engineering
More informationOPTIMIZATION OF INTERDEPENDENT QUEUEING MODEL WITH BULK SERVICE HAVING VARIABLE CAPACITY
International Releae of Mathematic and Mathematical Science Available at http://irmm.org OPTIMIZATION OF INTERDEPENDENT QUEUEING MODEL WITH BULK SERVICE HAVING VARIABLE CAPACITY Shavej Ali Siddiqui Sagar
More informationAppendix. Proof of relation (3) for α 0.05.
Appendi. Proof of relation 3 for α.5. For the argument, we will need the following reult that follow from Lemma 1 Bakirov 1989 and it proof. Lemma 1 Let g,, 1 be a continuouly differentiable function uch
More informationA BATCH-ARRIVAL QUEUE WITH MULTIPLE SERVERS AND FUZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH
Mathematical and Computational Application Vol. 11 No. pp. 181-191 006. Aociation for Scientific Reearch A BATCH-ARRIVA QEE WITH MTIPE SERVERS AND FZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH Jau-Chuan
More informationk-connectivity of uniform s-intersection graphs
k-connectivity of uniform -interection graph Mindauga Blozneli, Katarzyna Rybarczyk Faculty of Mathematic and Informatic, Vilniu Univerity, 03225 Vilniu, Lithuania, E-MAIL: mindauga.blozneli@mif.vu.lt
More informationPerformance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University
Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Joint work with Jinbei Zhang (SJTU), Chih-Chun Wang (Purdue) and Xinbing Wang (SJTU)
More informationRobust Decentralized Design of H -based Frequency Stabilizer of SMES
International Energy Journal: Vol. 6, No., Part, June 005-59 Robut Decentralized Deign of H -baed Frequency Stabilizer of SMES www.erd.ait.ac.th/reric C. Vorakulpipat *, M. Leelajindakrirerk *, and I.
More informationFeedback Control Systems (FCS)
Feedback Control Sytem (FCS) Lecture19-20 Routh-Herwitz Stability Criterion Dr. Imtiaz Huain email: imtiaz.huain@faculty.muet.edu.pk URL :http://imtiazhuainkalwar.weebly.com/ Stability of Higher Order
More informationA Provably Secure Scheme for Remote User Authentication
A Provably Secure Scheme for Remote Uer Authentication Fuw-Yi Yang 1, Su-Hui Chiu 2 1 Department of Computer Science and Information Engineering, Chaoyang Univerity of Technology Taichung County 41349,
More information