A Polynomial Rooting Approach for Analysis of Competition among Secondary Users in Cognitive Radio Networks

Size: px
Start display at page:

Download "A Polynomial Rooting Approach for Analysis of Competition among Secondary Users in Cognitive Radio Networks"

Transcription

1 A Polynomial Rooting Approach for Analysis of Competition among Seconary Users in Cognitive Raio Networs Xiaohua Li, Chengyu Xiong an Wenel Caeau Department of Electrical an Computer Engineering State University of New Yor at Binghamton Binghamton, NY Abstract The competitive coexistence of a large number of seconary users in heterogeneous cognitive raio networs (CRN) is a challenging issue. In this paper, we aress this issue by eveloping an efficient approach to analyze the competition among the seconary users. Base on the arov moel ban that we evelope recently, we can change the evaluation of the seconary user throughput into stuying a special root of a polynomial that is much more simplifie. Uner this framewor, we stuy the competition among the seconary users in three special cases: homogeneous CRN with ientical seconary users, heterogeneous CRN with a group of ientical seconary users plus an outlier, an heterogeneous CRN with two ifferent groups of seconary users. In each case, we erive the polynomial, prove the uniqueness of the root, an erive the throughput of each seconary user base on the root. Furthermore, we erive close-form approximate solutions to the root, base on which constraine optimization can be formulate to stuy the optimal competition strategies for the seconary users. The optimization results are in water-filling principles an can be erive in closeform expressions. Simulations are conucte to verify the analysis results. Keywors cognitive raio networ, arov chain, throughput, ynamic spectrum access, polynomial root I. INTRODUCTION Cognitive raio networs (CRN) allow seconary users (SU) to reuse the spectrum currently occupie exclusively by primary users (PU) with ynamic spectrum access (DSA). The SUs conuct spectrum sensing, an access the spectrum that is not occupie by the PUs. The SUs must vacate the spectrum whenever the PUs become active. Due to the inherent flexibility of cognitive raios, ifferent SUs may aopt ifferent transmission parameters an ifferent spectrum sensing an spectrum access strategies. For example, since the PU signals are ifferent temporarily an geographically, the SUs may choose to aopt either more conservative or more aggressive polices towar sensing errors. Some SUs may exploit hanshaing or control channels more than others. In particular, there are many ifferent spectrum access strategies for the SUs to aopt. This not only maes the CRN heterogeneous, but also raises the issue of competition among the (possibly selfish) seconary users when they are trying to gain the access of the limite spectrum resource. This wor was supporte in part by National Science Founation uner Grant CNS Although there have been extensive research publishe in CRN, incluing spectrum sensing, Physical-layer moulation, AC/Networ layer protocols, harware/testbe evelopment, etc, very limite stuy has been conucte on the competitive coexistence of a large number of ifferent SUs in heterogeneous CRNs. There is a class of wor on the CRN transmission power/capacity analysis base on the physical-layer interference analysis, but they are conucte uner certain simplifie communication moels []. There is another class of wor on CRN AC protocol esign an analysis, such as the performance analysis of the CSA-type protocols [2]- [4]. Nevertheless, the homogeneity assumption overloos most of the complex competitions. Uner the selfish an ecentralize operations assumption, various game-theoretic spectrum sensing an spectrum access strategies have been evelope to aress the competition. However, the performance was usually too complicate to analysis. ore importantly, all the seconary users are still assume to have the same strategy space, which inherently maes the CRN homogeneous rather than heterogeneous. As a result, the equilibrium of the CRN in these wors may still be very ifferent from the competitive coexistence of heterogeneous CRNs. The large number of issimilar users maes the moeling an analysis of heterogeneous CRN challenging. ost of the existing wors on CRN analysis that consier more or less the heterogeneous nature of CRN have to mae substantial simplifications [5]-[2]. The SU s competition for spectrum access is sippe in [5] an [6] because only simultaneous transmissions are consiere, where spectrum access becomes just the constant arrival/eparting rate. In aition, most of these wors focus on the simple scenario of two or three seconary users only to simplify the arov chain moeling. The general case becomes prohibitively complex ue to the rapily increase number of arov states an transitional probabilities. In [3], we evelope an innovative arov oel Ban (B) for moeling an analyzing the heterogeneous CRN with multiple issimilar SUs an multiple issimilar channels. We focuse on evaluating the SU throughput uner certain simple spectrum access strategies. Our basic iea was to ecompose the complex arov moel into a ban of relatively separate an thus simplifie arov chains, one for each SU. This maes the arov chains easy to analyze. In aition, B allows us to exploit spatial, channel an user

2 e-correlations to rastically simplify the interference analysis, which maes it tractable to analyze large heterogeneous CRNs. In this paper, we focus on analyzing the competing behavior of the SUs using ifferent transmission parameters an ifferent spectrum access strategies. We change the performance evaluation of the SUs into stuying special roots of some polynomials. By stuying the properties an by eriving approximate close-form solutions to the roots, the competition among the seconary users an their throughput can be conveniently analyze. The organization of this paper is as follows. In Section II, we give the system moel an the B analysis framewor. In Section III, we aopt appropriate networ ecomposition techniques to change the networ throughput evaluation into polynomial rooting. Then in Section IV, we stuy the competition among the seconary users uner three typical CRN scenarios. Simulations are conucte in Section V, an conclusions are given in Section VI. II. SYSTE ODEL The CRN we consier in this paper consists of a set of N ranomly istribute SUs an some PUs. Each SU is a transmitting-receiving pair of noes, where the transmitting noe transmits to the receiving noe. While transmitting to the receiving noe, the transmitter creates interference to other users. We assume there are channels available for the N SUs to choose. For each SU, we consier a cognitive raio transmission moel that inclues four states: spectrum sensing, ata transmission, waiting an channel switching. If the spectrum sensing inicates the channel is available for seconary access, then the cognitive raio transmits a ata pacet, an the moel shifts into the ata transmission state. If the spectrum sensing inicates the channel is not available (ue to the PU activity, interference from other SUs activity, or the lac of offere loa from this SU), then the cognitive raio enters the waiting state, which will be followe by the channel switching state. We assume that the cognitive raio always shifts bac to the spectrum sensing state after either the channel switching state or the ata transmission state. We assume that the SU can successfully etect the activity of the PUs. Therefore, we can enote the activity of the PUs in each channel by a ranom variable θ, which enotes the probability that the channel is not use by any PU. This maes us to focus on analyzing the coexistence of SUs via their mutual interference. In the spectrum sensing state, the signal receive by the SU i s receiver in the channel is N u i, (n) = f j, Pj, h ji, s j (n)+v i, (n) () j=,j i where P j, is the transmission power that the SU j spens in the channel, s j (n) is the signal transmitte by the SU j, h ji, is the flat faing channel from the SU j s transmitter to the SU i s receiver, an v i, (n) is the AWGN with zero-mean an power σ 2 i,.thevariablef j, =or 0 enotes whether the SU j is currently using the channel. The instantaneous π i, q i, πw i, πs i, q i, channel πi, s q i, z i, q z i, π π i, i, c i channel π w i, z i, πw i, π i, π s q i, i, q i, channel Fig.. arov oel Ban (B) for multi-user heterogenous CRN, where only the arov chain for the SU i is shown. Each of the SUs has a similar arov chain. Each arov chain has 3 + states: 3 states in each channel, plus a single channel switching state for all the channels. The transitional probabilities q i, an z i, are etermine by the spectrum sensing an the spectrum access strategies. signal-to-noise ratio (SNR) of the SU i in the channel can thus be obtaine from () as N γi, s = j=,j i f j,p j, h ji, 2 σi, 2 (2) If SNR γi, s is larger than the etection threshol Γ i,, then the SU i maes a ecision that the channel is not available for transmission. It turns to the waiting state. Note that ue to the asynchronous an ecentralize operation of the competing seconary users in heterogeneous CRNs, we o not consier specifically any common AC-layer protocol where the seconary users compete for channel access in a slotte signaling structure. In our case, ifferent seconary users may use ifferent slot/pacet urations, an such transmission parameters are competition factors. As [3], we can use a arov oel Ban (B) to moel the competitive spectrum access among the N CRN SUs. The B consists of a arov chain for each SU, as shown in Fig., where πi, s,π i,,πw i, are the probabilities of the SU i staying in the channel sensing, ata pacet transmission an waiting state in the channel. The probability πi c refers to the probability that the SU i staying in the channel switching state. The transitional probability q i, enotes the probability that the channel can be use by the SU i to transmit a ata pacet. It is a composite result of PU etection, SU carrier sensing, as well as the offere loa. The transitional probability z i, enotes the probability for the SU i to choose the channel to sense an access. It is etermine by the channel access strategy. We assume 0 z i, an z i, =, i =,,N, (3) = which means that a SU just uses one channel each time. Note that although ifferent SUs arov chains loo separate from each other, their transitional probabilities q i, are inter-relate. In aition, epening on the strategies use in channel selection, the transitional probabilities z i, for ifferent seconary users may also be inter-relate. As a matter

3 of fact, the B approach simplifies the arov moel, but increases the complexity of q i, an possibly z i,. Fortunately, B can bring some useful networ ecomposition properties to reuce the complexity. For each SU i, the urations of the spectrum sensing, ata transmission, waiting, an channel switching are Ti, s, T i,, Ti, w an T i c, respectively. Note that we have efine the SU s offere loa as a ranom variable α i, but we will not use the SU s exiting probability. Such exiting probability, if neee, can be integrate into the ata pacet/slot length Ti,.The pacet/slot lengths are variables to be stuie in this paper. From [3], the steay state probabilities of the arov moel of Fig. is given as an π s i, = z i, ( +2 ) z i,l l= q i,l ( q i, ) π i, = q i, π s i,, π w i, =( q i, )π s i,, π c i = q i, z i, π s i,. (5) In this paper, we focus on analyzing the throughput of each seconary user. Each SU i has a throughput R i, obtaine in the channel, wherer i, is efine as the fraction of time when the SU i is using the channel for ata pacet transmissions. To simplify analysis, we use the throughput efinition that is more simplifie than those use in [3]. Specifically, we o not consier the transmission channel capacity in the throughput efinition. Note that the ata transmission can be assume free of collisions ue to the perfect PU an SU sensing assumption. Base on each single SU s throughput R i,, we can erive the overall throughput for a group of seconary users or even the entire CRN. We can also efine the channel usage as the probability of a channel being occupie by all the SUs, which can also be erive from R i,. III. NETWORK DECOPOSITION AND THE POLYNOIAL ROOTING APPROACH The most complex tas is perhaps to analyze q i, which requires us to analyze the mutual interference among all the SUs. The probability q i, is closely relate to the SU s spectrum sensing strategy. In our case, it actually epens on the PUs activity, the other SUs activity, as well as this SU s offere loa. We efine [ ] f q i, = θ α i P j, P j, h ji, 2 < Γ i,, j =,,N,j i, σ 2 i, (6) which means that the SU i can use the channel to transmit a ata pacet only if there is no PU activity in the channel, thesui has ata pacet to transmit, an the interference from any other SU using the channel simultaneously is low enough. The probability that another SU j is also using the channel can be moele as a Bernoulli ranom variable with (4) probability β j, = P[f j, =] (7) πj, = T j, πj ct j c + ( ). l= πj,l s T j,l s + π j,l T j,l + πw j,l T j,l w From (4) we can easily see π s i, πi,l s = z i,( q i,l ) z i,l ( q i, ). (8) Applying (4) an (8), we can erive from (7) β j, = z j,q j, Tj, q j, Tj c+. (9) [T s l= j,l +q j,lt j,l +( q j,l)tj,l] w z j,l q j,l In other wors, f j, is a Bernoulli ranom variable with probability β j,. Accoring to (6), q i, =0whenever there is a SU j with f j, =an P j, h ji, 2 /σi, 2 Γ i,. In this paper, we assume that the SUs use very low etection SNR threshols Γ i, so that (6) can be simplifie to where q i, = θ α i N j=,j i c i,j = 2+ T s ( c i,j β j, ). (0) i, T j,. () Note that the probability that the SU j is transmitting ata pacets while the SU i is conucting spectrum sensing is πj, (2T j, + T i, s ) πj ct j c + ( ) l= πj,l s T j,l s + π j,l T j,l + πw j,l T j,l w because when the SU i begins spectrum sensing, it can etect the SU j s transmission when the latter is transmitting from Tj, secons before the sensing to T j, + T i, s after. Following (9) we can erive the probability as c i,j β j,. The essential iea of (0) is that we set the threshol Γ i, small enough so as to forbi simultaneous transmissions among the seconary users. This is similar to the practical AC-layer protocols such as Carrier Sense ultiple Access (CSA) that prevent collisions (i.e., simultaneous transmissions) among the users. This simplification is reasonable in practice when the SUs have relatively strong interference among each other, such as in closely istribute networs. It was calle spatial e-correlation in [3] because it effectively subivies a large CRN into many smaller un-correlate clusters. In our case, it maes us focus better on the competition analysis. Generally speaing, wea mutual interference has negligible competition effects, an can thus be omitte. In this paper, the throughput of the SU i achieve in the channel is efine as R i, = β i,, (2) which is the uty-cycle when the SU i is staying in the ata transmission state. Due to the assumption of perfect PU

4 sensing an SU sensing, ata transmission can be consiere as free of collisions. Therefore, (2) is the probability of the successful ata transmission in the channel. The equations (9)-(2) are general expressions that can be use to erive numerically the throughput performance of SUs in general heterogeneous CRNs. However, they are not convenient for more insightful analysis ue to their complexity an the interconnection among all the SUs an all the channels. For analysis purpose, we nee to aopt some reasonable assumptions to further simplify the expressions. First, in (9), we fin that there is a special connection between Ti,l an T i,l w which are the slot lengths of the ata transmission slot an the waiting slot, respectively. Without loss of generality, we assume that Ti, = T i, w, i.e., the uration of waiting state is the same as the ata transmission state. In practice, when a channel is etecte as unavailable, the SUs usually wait for just one ata pacet transmission slot uration before trying another channel. Therefore, this assumption is highly practical an reasonable. Then (9) can be reuce to β j, = z j, q j, T j, ( q j, )[T c j + l= (T s j,l + T j,l ) z j,l q j,l ]. (3) To further simplify the expressions, we assume that each SU uses the same slot length parameters when accessing all the channels. Therefore, T s j, = T s j, T j, = T j, T w j, = T w j, for all =,,. In aition, we assume that T c j =0 because channel selection is just a ecision maing without the nee of any transmission or receiving. The information for the ecision maing can be gathere an processe uring the waiting state. Then, we can simplify (3) into β j, = z j, q j, Tj ( q j, )(Tj s + T j ) z i,l. (4) l= q i,l In (4), each β j, still epens explicitly on the same SU s activities in all the channels. Fortunately, as shown in [3], we can tae channel e-correlation to remove the explicit mutual epenence among all the channels l. The channel ecorrelation is conucte by replacing z i, with x i, where x i, = z i, ( q i, ) z i,l. (5) l= q i,l From the properties 0 q i, an = z i, =, we can see that 0 x i,, x i, =. (6) = In aition, given x i,, we can uniquely etermine z i, via z i, = x i, ( q i, ) l= x i,l( q i,l ). (7) Note that z i, is the channel selection probability, while x i, is a new ranom variable escribing the same channel selection probability, i.e., the probability for the SU i to select the channel. For example, with uniformly-istribute ranom channel selection strategy, we have both z i, = an x i, =. Nevertheless, x i, an z i, are ifferent in general. With the channel e-correlation, we can reuce the CRN throughput evaluation expressions (9)-(2) into { Ri, = b i x i, q i,, N q i, = a i, j=,j i ( c (8) i,jb j x j, q j, ), where b i = Ti /(T i s + Ti ) is the transmission protocol parameter an a i, = α i θ inclues both the offere loa an the PU channel activity. Note that the throughput in channel, i.e., R i,, relies on the parameters in the channel only. Base on (8), we can calculate the throughput of each SU numerically by first fining N probabilities q i,, i =,,N, which are the roots of N nonlinear equations. However, in general, it is possible to change it into a simpler form, i.e., fining a special root of one polynomial, as outline below. Consiering two SUs i an j. From (8), we fin that a i, q i,( c i,i b i x i, q i, )=a j, q j,( c j,j b j x j, q j, ). (9) Define D = a i, q i,( c i,i b i x i, q i, ), (20) which is a special parameter share by all the SUs. The value D satisfies some equations such as N D = ( c i,j b j x j, q j, ), (2) j= Conitione on D, ifferent SU s q i, an R i, can be evaluate separately, which is calle user e-correlation in [3]. Since D is a common parameter for all the SUs, it is possible to compare ifferent SUs performance even without nowing the value of D. This provies a promising way for efficient an incisive CRN performance evaluation an analysis. We can formulate some polynomials of D in orer to fin its values or the properties. Specifically, from (20), q i, has solution q i, = ± 4c i,i b i x i, a i, D. (22) 2c i,i b i x i, We usually just nee the minus sign in (22) because x i, is small. If x i, is small enough, we can even use approximately q i, a i, D.ThenD is the root to a polynomial obtaine by substituting (22) bac into (2). In summary, for CRN performance analysis, we can first fin the polynomial roots as D, an then use the value D to calculate q i, as well as the throughput R i,. This is the general outline of the polynomial rooting approach for CRN performance analysis. The etails of this approach may change when consieringspecific CRN scenarios, which will be shown in Section IV. Given each SU s throughput R i,, the overall throughput of a group of SUs obtaine in a set of channels can be efine as R + = R i,. (23) i Unfortunately, such trivial aitions may accumulate the errors in R i,, especially the inevitable systematic moeling errors (in aition to the numerical an noise-inuce errors). Even though the systematic error in each R i, is negligibly small,

5 the accumulate error over a large number of SUs an channels may become significant. To avoi this problem, for large CRN, we may use the following throughput efinition R = ( R i, ), (24) i which can suppress systematic errors more effectively. For example, if the estimate throughput for each SU is ˆR i, = R+ɛ, where ɛ is the systematic error that are ientical for all the SUs, then (23) gives ˆR + = NR+Nɛ, where the error increases linearly with N. In contrast, (24) gives ˆR = i ( R ɛ) N ( R) N + Nɛ( R) N,wherethe accumulate error is attenuate by the factor ( R) N which becomes very small for large N. Nevertheless, since (23) is easier to analyze an is accurate in CRN with moerate size, we still prefer it for analysis. Another performance metric base on R i, is the probability that a channel is use by all the SUs. It measures how the SUs changes the spectral environment, which may be calle spectral mutation. This probability can be efine as U + N = N R i,, or U = ( R i, ). (25) i= There are some interesting questions with respect to (25), such as whether a group of SUs can change arbitrarily U +,or, for an arbitrary U + whether a group of SUs can achieve it by ajusting their transmission parameters an strategies. All these are highly relative to the competition stuy of the SUs. i= IV. COPETITION ANALYSIS OF THREE SPECIAL CRNS The framewor outline in Section III moels the general CRN where each seconary user can aopt transmission parameters or strategies that are ifferent from others. This obviously maes the expressions an analysis unnecessarily complex. In many practical situations, we may have a group of SUs that aopt similar transmission parameters an strategies. We call them homogeneous SUs. In aition, there are some other SUs that aopt another set of transmission parameters an strategies, whom we call outliers. These two groups of SUs may compete with each other within the same CRN. In this section, we focus on analyzing their competition. We consier three cases: CRN with N homogeneous SUs, CRN with N homogeneous SUs plus one outlier, an CRN with two ifferent groups of homogeneous SUs. In each case, we will evelop in etails the polynomial rooting approach. A. CRN with N homogeneous SUs We first consier the CRN where all the N SUs have the same transmission parameters an spectrum access strategies. Specifically, in (8) we have c i,j = c, b i = b, a i, = a,an x i, = x,fori =,,N. Using these parameters in (8), we can see that the SUs have the same q i, an R i,. Denote q i, = q an R i, = R. To fin the throughput R is to solve { R = bx q, q = a ( cbx q ) N (26), Note that each SU s throughput in the channel can be evaluate inepenently from other channels, given the probability x of channel selection. Proposition. Consiering the constraint 0 q, the equation (26) has one an only one vali solution R = bx y N an q = y N,wherey is the root of the polynomial cbx y N + a y =0, (27) that satisfies 0 y. Proof. From the secon equation in (26), we have q = a ( cbx q ). (28) Define y = q, we can change (28) into (27). Obviously, for 0 q, wehave0 y. In aition, q = y N. The solutions to (26) can be obtaine from the roots of the polynomial f(y) =cbx y N + a y. Wefinthat f(0) = < 0, anf() = cbx + a > 0 because 0 a. Note that a = θ α where α is the offere loa for the SU which is assume ientical among all the SU. In aition, f(y)/ y =(N )cbx y N 2 + a > 0 since all the variables are non-negative. This means that f(y) is monotone increasing over 0 y. Therefore, the function f(y) has one an only one root that satisfies 0 y. This proves the existence of a unique solution to (26). Therefore, each SU can achieve a unique throughput R in the channel. The throughput is ientical for all the SUs. The throughput epens on the transmission parameters b, a an the channel selection probability x. It can be calculate from the unique vali root of (27). One of the interesting yet challenging issue is how the SUs can maximize their throughput by selecting the optimal transmission parameters b an channel selection probabilities x. From the throughput expression an (27), we have R = bx y N = c ( a y). Theoretically, the throughput can be optimize by looing for the smallest root min y, (29) {b,x } with the constraints = x =, 0 y, an (27). Unfortunately, this optimization is ifficult to solve, mainly because the root of the high-orer polynomial (27) is elusive. We turn to an approximately but informative analysis instea. Notice from (27) that y (a /c) for large N an. Therefore, we assume y =(a /c) + ɛ, where ɛ. Substituting y into (27) an applying the approximation ((a /c) + ɛ) N a /c +(N )(a /c) N 2 ɛ, we can get an approximate solution to (27) as y (a /c) a ba x + c +(N )bc a x. (30) Substituting (30) bac into R =( a y)/c we can obtain R c c N c ba x + c N c +. (3) +(N )bc a x

6 From (3) we can see that larger x or b gives higher throughput. Each SU get approximately /(N ) throughput from a channel. For a single SU, it can choose x =to maximize its throughput in the channel. Let us consier the problem of looing for the optimal channel selection strategy {x } to maximize an SU s throughput in all channels. Note that it also maximizes the overall CRN throughput. Using (3), the optimization problem max {x } R, = s.t., x = (32) = becomes a special case outline in the Appenix, where the optimal solution follows the water-filling principle. Specifically, we have α = ( ) N 2 c N c, β =(N )bc a (33) Then we can follow (58) to fin λ with all the j =,, that satisfies (57). Then the optimal channel selection probabilities can be foun from (59). In particular, consier the special case with a =an b, i.e., channels are all available, an sensing slot uration is negligibly small compare with the ata transmission uration. Then we can fin that x =/, which means uniformly istribute ranom channel selection is optimal. In this special case with x =/, from (3), we fin R 2(N ) + 2 ( 2 ) per SU per channel, which is between /(2N) to /N. Note that /N is the ieal throughput. Therefore, the approximation metho tens to uner-estimate the throughput in large CRN. From the water-filling principle (59), we can reaily see that each SU shoul increase the probability x on channels with the stronger a (i.e., larger θ ). In other wors, SUs shoul utilize more the channels that are use less by the PUs. In aition, throughput increases with larger b an a. From the x erive from (59), we can fin q,anthen calculate the practical channel selection probabilities (that is actually use irectly by the SUs) z accoring to (7). In particular, for ientical a = a, it is easy to see that the optimal uniformly istribute ranom channel selection means x = z =. B. CRN with N homogeneous SUs an one outlier If there is one outlier SU that aopts transmission parameters an spectrum access strategies that are ifferent from the rest of the N SUs, we woul lie to see how this outlier can compete with the rest of the SUs. Denote the parameters for each of the N homogeneous SUs as b, a, q, x an R, while the corresponing parameters for the outlier are b 2, a, q, x an R. Because Ti, s is usually much less than Tj,, without loss of generality, we use a constant c for all the SUs. The equation (8) becomes R = b x q R = b 2 x q q = a ( cb q x ) N 2 (34) ( cb 2 q x ) q = a ( cb q x ) N Similar to Section IV-A, we can formulate the polynomial rooting approach for (34), an fin the solution as below. Proposition 2. The equation (34) has one an only one vali solution which can be expresse as { q = a y cb x, (35) q = y N, where y is the root of the polynomial c 2 b x b 2 x a y 2N 3 cb x a y N 2 a N 3 y+a N 2 =0, (36) that satisfies 0 y. Proof. From the secon equation in (34), we have cb q x = q. (37) a which gives q = q a. (38) cb x Substituting it into the first equation in (34) we obtain q 2, q2, cb x a a = a q a ( cb 2 q x ). (39) Define y = q, then we can revise (39) into (36). Equations in (35) can also be obtaine from (38). Next, to show the existence an the uniqueness of the root, consier the constraint 0 y for the equation (36). Following similarly Proposition, at y = 0, the left han sie of (36) is larger than 0. At y =, the left han sie of (36) is less than 0. From the erivative of the left han sie of (36) with respect to y, we can show that the erivative is always negative. Therefore, the left han sie polynomial is monotone ecreasing. There is one an only one solution for 0 y. For the CRN with N homogeneous SUs an one outlier, every homogeneous SU has the same throughput R in the channel as other homogeneous SUs. However, the outlier may have ifferent R given the ifferent transmission parameters b 2, a an the channel selection probability x. Their throughputs can be calculate after fining the unique vali root of (36). From (34) an (35), the throughputs of each homogeneous SU an the outlier are connecte as (b 2 a x ) R + cr =. (40) If counting the overall throughput of the homogeneous SUs, we have (b 2 a x ) R + c N [(N )R ] =. This shows the throughputs can be ajuste by the outlier s transmission parameters. The throughputs R = c ( a y), R = b 2 x y N (4)

7 can be stuie or optimize from the root y of (36). Obviously, R ecreases with y while R increases with y. Whenb x are etermine, the outlier can choose b 2 an x to ajust the root y in (36). any questions can be investigate, such as how the outlier can maximize its throughput, or how it can reuce the throughput of the homogeneous SUs. Nevertheless, ue to the lac of close-form solution to (36), the analysis is not easy. In the sequel, we rive an approximate close-form solution to (36) to give more incisive analysis of the competition among the homogeneous SUs an the outlier. The proceure is similar to the erivation of the approximate solution in Section IV-A. Since the expressions are more complex, we assume that a = a =to simplify the notation. The proceure will be similar for the general case though. This assumption means that the channel has no PU activity an the SU s offere loa is. Then, let y =+ɛ, where ɛ. Applying the approximation y K +Kɛ to (36), we can obtain c 2 b x b 2 x 2cb x ɛ = (2N 3)c 2. (42) b x b 2 x +2(N 2)cb x Base on (42), we have the approximate solutions { R c ( y) = c ɛ R = b 2 x ( + ɛ) N (43) b 2 x [ + (N )ɛ] As a special example, in case c =2, b = b 2 =,an x =/ (which is the optimal channel selection probability for the homogeneous SUs), we have x ɛ. (44) /4+N 2 (2N 3)x The outlier can use its x to ajust both R an R.For example, it can maximize = R R over x,where the Appenix suggests some water-filling results. In general, the homogeneous SUs can optimize their own throughput R via optimal channel selection probabilities x. This leas to the constraine optimization max R, s.t., x =. (45) = = This optimization can be formulate into the form (54), an a water-filling principle on the solution x can be obtaine. In this case, the optimal x is a function of x. For the outlier to enhance its competition, it may select its own x to either solely maximize its own throughput R or to minimize the homogeneous SU s throughput R.Thefirst approach is the optimization max R, s.t., x =, (46) = = an the secon approach is the optimization min R, s.t., x =. (47) = = Both the optimization can be revise into the form (54) an fin the optimal water-filling principle on x. Details are sippe to save space. C. CRN with two groups of homogeneous SUs Now consier the case that there are two groups of SUs competing for spectrum access. There are N SUs in the first group that have the parameters b, a, x, q an R.The rest N 2 = N N SUs form the secon group that have the parameters b 2, a, x, q an R. They share the same constant c. From (8) we have R = b x q R = b 2 x q q = a ( cb q x ) N ( cb 2 q x ) N2 q = a ( cb q x ) N ( cb 2 q x ) N2. (48) We can construct a polynomial that can be use to stuy (48). Proposition 3. The equation (48) has one an only one vali solution that can be written as { q = ± 4cb x a a y( cb2x y) 2cb x, (49) q = y, where y is the root of the polynomial cb x a a N N y N N ( cb 2 x y) N +a N y N ( cb 2 x y) N 2 N =0. (50) that satisfies 0 y. Note that only one q in (49) satisfies 0 q. Proof. From (48) we have a q ( cb x q )=a q ( cb 2 x q ) (5) Define y = q 2,, then we have (49). From the secon equation in (48) we can get cb x q = a N y N ( cb 2 x y) N 2 N, (52) which gives ± 4cb x a a y( cb 2x y) =2a N y N ( cb 2 x y) N 2 N. (53) Taing square of both han-sies, we can get the polynomial equation (50). To show the solution is unique, similar to Proposition, the left han sie of (50) is less than 0 at y =0, an is larger than 0 at y =. From the erivative of the left han sie of (50) with respect to y, we can show that the erivative is always positive. Therefore, the left han sie of (50) is monotone increasing. There is one an only one solution satisfies 0 y. Even though q, has two possible values in (49), only one is vali, an the other oes not satisfy 0 y. This can be explaine if we form an equation in terms of q rather than q in (50). In this case we can show that there is only one vali solution to q. Obviously, R increases with y, while R ecreases with y. The analysis of the competition between the two groups of SUs can be conucte similarly as Section IV-B. To save space, however, we o not repeat it since the expressions are substantially longer. We stuy some of their properties in simulations instea.

8 R + : overall CRN throughput Poly Root etho Approximate etho Numerical: Root Numerical: General Simulation N: number of seconary users R *: CRN SU Throughput Analysis: Homo SU Analysis: Outlier Simulation: Homo SU Simulation: Outlier N: number of seconary users Fig. 4. Throughput of each seconary user achieve in all channels in the CRN with various number of homogeneous seconary users an one outlier. Fig. 2. Overall throughput of all the seconary users in all channels for CRN with various number of homogeneous seconary users. R : throughput per SU Poly Root etho Approximate etho Numerical: Root Numerical: General Simulation R *: CRN SU Throughput Analysis:Group Analysis:Group 2 Simulation:Group Simulation:Group N : number of SUs in Group N: number of seconary users Fig. 3. Throughput per seconary user per channel in CRN with various number of homogeneous seconary users. V. SIULATIONS In this section, we report our simulation of the numerical evaluation of the CRN throughput base on the analysis results erive in Sections III an IV. We verify them by the onte- Carlo simulation of a real ranom CRN with N seconary users an channels ( Simulation ). The noes positions were ranomly generate within a square of meters. The SNRs were calculate as ij where ij is the propagation istance. We evaluate the overall CRN throughput R + in aition to the throughput per SU. First, we simulate the CRN with homogeneous SUs only for =5, b =0/, a =0.5, c =2.. We numerically calculate the throughputs by using the equations (9)-(2) ( Numerical:General ), the equation (26) ( Numerical:Root ), the Proposition ( Poly Root etho ), an the equation (3) ( Approximate etho ). We use x =/ =/5 since it was optimal. Simulation results were shown in Fig. 2 for the overall throughput R + aninfig.3forpersuper channel throughput R. It can be clearly seen that the analysis results fit well with the onte-carlo simulation results, which verifie that our analysis was vali. Fig. 5. Throughput of each seconary user achieve in all channels in the CRN with various number of homogeneous seconary users in two ifferent groups. Next, we simulate the CRN with homogeneous SUs plus one outlier. Parameters are similar to the first experiment, except that the outlier has a =0.9. Simulation results were shown in Fig. 4, which shows the average throughputs of each homogeneous SU an the outlier achieve in all the =5channels. The analysis results fit well with the onte- Carlo simulation results, an the outlier can gain much more throughput by increasing its offere loa. Finally, we simulate the CRN with N homogeneous SUs in Group an N 2 homogeneous SUs in Group 2. The total number of SUs were N =52. Parameters are similar to the first experiment, except that the Group 2 SUs have a =0.9. Simulation results were shown in Fig. 5, which shows the average throughputs of each homogeneous SU in the two groups achieve in all the = 5 channels. The analysis results fit well with the onte-carlo simulation results. VI. CONCLUSION We evelope an efficient approach to evaluate the competition of heterogeneous CRN with a large number of ifferent users. Base on the arov oel Ban, we applie some networ ecorrelation techniques to reuce the complex problem into the problem of looing for the roots of some

9 special polynomials. This polynomial rooting approach provies feasible ways to analyze the throughput an competition among the seconary users. We consiere three ifferent CRN cases with homogeneous CRN plus some outliers. We set up the polynomials, stuie their properties, an evelope approximate close-form solutions that were convenient for various optimizations. Water-filling principles were obtaine for optimal performance of the CRN an for the competition among the seconary users. APPENDIX A CLASS OF CONSTRAINED OPTIIZATIONS WITH WATER-FILLING SOLUTIONS For the constraine optimization problem max J = = a + b x c + x, s.t., x =,x 0 (54) = we can first change J into the following form b a c J = + b +. (55) = = c x Since the first summation in (55) is a constant, the optimization (55) is equivalent to the following stanar optimization max J 2 = = α +β x, s.t., x =,x 0. (56) = With the Lagrange multiplier metho, efine J 3 = = ( α +β x + λx ) λ. From J3 x = 0, we get λ = α β (+β x ), from which we can get x 2 = α λ β β.since x are probabilities, we have constraints [3] Y. H. Bae, A. S. alfa an B. D. Choi, Performance analysis of moifie IEEE 802.-base cognitive raio networs, IEEE Commun. Lett., vol. 4, no. 0, pp , Oct [4] D. B. Zhu an B. D. Choi, Performance analysis of CSA in an unslotte cognitive raio networ with license channels an unlicense channels, EURASIP J. on Wirel. Commun. an Networing, 202:2. oi:0.86/ [5] Y. Xing, R. Chanramouli, S. angol an S. Shanar, Dynamic spectrum access in open access wireless networs, IEEE J. Sel. Areas in Commun., vol. 24, no. 3, pp , ar [6] B. Wang, Z. Ji, K. J. R. Liu an T. C. Clancy, Primary-prioritize marov approach for ynamic spectrum allocation, IEEE Trans. Wirel. Commun., vol. 8, no. 4, pp , Apr [7] C. Ghosh, C. Coreiro, D. P. Agrawal an. B. Rao, arov chan existence an hien arov moels in spectrum sensing, IEEE Int. Conf. on Pervasive Computing an Communi., arch [8] P. K. Tang an Y. H. Chew, On the moeling an performance of three opportunistic spectrum access schemes, IEEE Trans. Veh. Tech., vol. 59, no. 8, pp , Oct [9] A. S. Zahmati, X. Fernano an A. Grami, Steay-state arov chain analysis for heterogeneous cognitive raio networs, 200 IEEE Sarnoff Symposium, Princeton, NJ, Apr [0] U. ir, L. erghem-boulahia,. Esseghir an D. Gaiti, A continuous time arov moel for unlicense spectrum access, IEEE 7th Int. Conf. WiOb, pp , 20. [] H. P. Ngallemo, W. Ajib an H. Elbiaze, Dynamic spectrum access analysis in a multi-user cognitive raio networ using arov chains, 202 Int. Conf. on Computing, Networing an Commun. (ICNC), pp. 3-7, aui, HI, Jan [2] T.. N. Ngatche, S. Dong, A. S. Alfa, J. Cai, Performance analysis of cognitive raio networs with channel assembling an imperfect sensing, IEEE Int. Conf. Commun. (ICC 202), Ottawa, ON, Canaa, June 202. [3] X. Li an C. Xiong, arov moel ban for heterogenous cognitive raio networs with multiple issimilar users an channels, 204 Int. Conf. on Computing, Networing an Commun. (ICNC), Honolulu, HI, Feb. 3-6, 204. α β ( + β ) 2 λ α β. (57) From = x =,wehave α 2 λ = β = +. (58) = β Note that λ shoul satisfy (57). In other wors, we can loo iteratively for λ by selecting the channels with the strongest α β an by applying (58) until both (57) an (58) are satisfie. The optimal variables are then + α j= β j β x = α j β, if (57) is satisfie j= β j (59) 0, otherwise REFERENCES [] J. Hwu, J. Chen an X. Li, Sum transmission power of multiple cooperative seconary transmitters in ynamic spectrum access networs, the 42n Annual Conference on Information Sciences an Systems (CISS 2008), Princeton University, ar. 9-2, [2] E. W.. Wong an C. H. Foh, Analysis of cognitive raio spectrum access with finite user population, IEEE Commun. Lett., vol. 3, no. 5, pp , ay 2009.

Capacity Analysis of MIMO Systems with Unknown Channel State Information

Capacity Analysis of MIMO Systems with Unknown Channel State Information Capacity Analysis of MIMO Systems with Unknown Channel State Information Jun Zheng an Bhaskar D. Rao Dept. of Electrical an Computer Engineering University of California at San Diego e-mail: juzheng@ucs.eu,

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

Optimal Cooperative Spectrum Sensing in Cognitive Sensor Networks

Optimal Cooperative Spectrum Sensing in Cognitive Sensor Networks Optimal Cooperative Spectrum Sensing in Cognitive Sensor Networks Hai Ngoc Pham, an Zhang, Paal E. Engelsta,,3, Tor Skeie,, Frank Eliassen, Department of Informatics, University of Oslo, Norway Simula

More information

SYNCHRONOUS SEQUENTIAL CIRCUITS

SYNCHRONOUS SEQUENTIAL CIRCUITS CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

An M/G/1 Retrial Queue with Priority, Balking and Feedback Customers

An M/G/1 Retrial Queue with Priority, Balking and Feedback Customers Journal of Convergence Information Technology Volume 5 Number April 1 An M/G/1 Retrial Queue with Priority Balking an Feeback Customers Peishu Chen * 1 Yiuan Zhu 1 * 1 Faculty of Science Jiangsu University

More information

On Characterizing the Delay-Performance of Wireless Scheduling Algorithms

On Characterizing the Delay-Performance of Wireless Scheduling Algorithms On Characterizing the Delay-Performance of Wireless Scheuling Algorithms Xiaojun Lin Center for Wireless Systems an Applications School of Electrical an Computer Engineering, Purue University West Lafayette,

More information

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs Lectures - Week 10 Introuction to Orinary Differential Equations (ODES) First Orer Linear ODEs When stuying ODEs we are consiering functions of one inepenent variable, e.g., f(x), where x is the inepenent

More information

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device Close an Open Loop Optimal Control of Buffer an Energy of a Wireless Device V. S. Borkar School of Technology an Computer Science TIFR, umbai, Inia. borkar@tifr.res.in A. A. Kherani B. J. Prabhu INRIA

More information

Analysis of Search Schemes in Cognitive Radio

Analysis of Search Schemes in Cognitive Radio Analysis of earch chemes in Cognitive Raio ing uo an umit Roy Department of Electrical Engineering University of Washington, eattle, WA 9895 Email: {luol,sroy}@u.washington.eu Abstract Cognitive Raio systems

More information

920 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 63, NO. 2, FEBRUARY 2014

920 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 63, NO. 2, FEBRUARY 2014 920 IEEE TRASACTIOS O VEHICULAR TECHOLOGY, VOL. 63, O. 2, FEBRUARY 2014 Corresponence Opportunistic Spectrum Access in Cognitive Raio etwors Uner Imperfect Spectrum Sensing O. Altra, Stuent Member, IEEE,

More information

A NONLINEAR SOURCE SEPARATION APPROACH FOR THE NICOLSKY-EISENMAN MODEL

A NONLINEAR SOURCE SEPARATION APPROACH FOR THE NICOLSKY-EISENMAN MODEL 6th European Signal Processing Conference EUSIPCO 28, Lausanne, Switzerlan, August 25-29, 28, copyright by EURASIP A NONLINEAR SOURCE SEPARATION APPROACH FOR THE NICOLSKY-EISENMAN MODEL Leonaro Tomazeli

More information

Thermal conductivity of graded composites: Numerical simulations and an effective medium approximation

Thermal conductivity of graded composites: Numerical simulations and an effective medium approximation JOURNAL OF MATERIALS SCIENCE 34 (999)5497 5503 Thermal conuctivity of grae composites: Numerical simulations an an effective meium approximation P. M. HUI Department of Physics, The Chinese University

More information

Lyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering,

Lyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering, On the Queue-Overflow Probability of Wireless Systems : A New Approach Combining Large Deviations with Lyapunov Functions V. J. Venkataramanan an Xiaojun Lin Center for Wireless Systems an Applications

More information

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012 CS-6 Theory Gems November 8, 0 Lecture Lecturer: Alesaner Mąry Scribes: Alhussein Fawzi, Dorina Thanou Introuction Toay, we will briefly iscuss an important technique in probability theory measure concentration

More information

Delay Limited Capacity of Ad hoc Networks: Asymptotically Optimal Transmission and Relaying Strategy

Delay Limited Capacity of Ad hoc Networks: Asymptotically Optimal Transmission and Relaying Strategy Delay Limite Capacity of A hoc Networks: Asymptotically Optimal Transmission an Relaying Strategy Eugene Perevalov Lehigh University Bethlehem, PA 85 Email: eup2@lehigh.eu Rick Blum Lehigh University Bethlehem,

More information

An Analytical Expression of the Probability of Error for Relaying with Decode-and-forward

An Analytical Expression of the Probability of Error for Relaying with Decode-and-forward An Analytical Expression of the Probability of Error for Relaying with Decoe-an-forwar Alexanre Graell i Amat an Ingmar Lan Department of Electronics, Institut TELECOM-TELECOM Bretagne, Brest, France Email:

More information

Space-time Linear Dispersion Using Coordinate Interleaving

Space-time Linear Dispersion Using Coordinate Interleaving Space-time Linear Dispersion Using Coorinate Interleaving Jinsong Wu an Steven D Blostein Department of Electrical an Computer Engineering Queen s University, Kingston, Ontario, Canaa, K7L3N6 Email: wujs@ieeeorg

More information

On the Aloha throughput-fairness tradeoff

On the Aloha throughput-fairness tradeoff On the Aloha throughput-fairness traeoff 1 Nan Xie, Member, IEEE, an Steven Weber, Senior Member, IEEE Abstract arxiv:1605.01557v1 [cs.it] 5 May 2016 A well-known inner boun of the stability region of

More information

A Simple Model for the Calculation of Plasma Impedance in Atmospheric Radio Frequency Discharges

A Simple Model for the Calculation of Plasma Impedance in Atmospheric Radio Frequency Discharges Plasma Science an Technology, Vol.16, No.1, Oct. 214 A Simple Moel for the Calculation of Plasma Impeance in Atmospheric Raio Frequency Discharges GE Lei ( ) an ZHANG Yuantao ( ) Shanong Provincial Key

More information

A Modification of the Jarque-Bera Test. for Normality

A Modification of the Jarque-Bera Test. for Normality Int. J. Contemp. Math. Sciences, Vol. 8, 01, no. 17, 84-85 HIKARI Lt, www.m-hikari.com http://x.oi.org/10.1988/ijcms.01.9106 A Moification of the Jarque-Bera Test for Normality Moawa El-Fallah Ab El-Salam

More information

ensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y

ensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y Ph195a lecture notes, 1/3/01 Density operators for spin- 1 ensembles So far in our iscussion of spin- 1 systems, we have restricte our attention to the case of pure states an Hamiltonian evolution. Toay

More information

. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences.

. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences. S 63 Lecture 8 2/2/26 Lecturer Lillian Lee Scribes Peter Babinski, Davi Lin Basic Language Moeling Approach I. Special ase of LM-base Approach a. Recap of Formulas an Terms b. Fixing θ? c. About that Multinomial

More information

Improved Rate-Based Pull and Push Strategies in Large Distributed Networks

Improved Rate-Based Pull and Push Strategies in Large Distributed Networks Improve Rate-Base Pull an Push Strategies in Large Distribute Networks Wouter Minnebo an Benny Van Hout Department of Mathematics an Computer Science University of Antwerp - imins Mielheimlaan, B-00 Antwerp,

More information

Quantum mechanical approaches to the virial

Quantum mechanical approaches to the virial Quantum mechanical approaches to the virial S.LeBohec Department of Physics an Astronomy, University of Utah, Salt Lae City, UT 84112, USA Date: June 30 th 2015 In this note, we approach the virial from

More information

THE VAN KAMPEN EXPANSION FOR LINKED DUFFING LINEAR OSCILLATORS EXCITED BY COLORED NOISE

THE VAN KAMPEN EXPANSION FOR LINKED DUFFING LINEAR OSCILLATORS EXCITED BY COLORED NOISE Journal of Soun an Vibration (1996) 191(3), 397 414 THE VAN KAMPEN EXPANSION FOR LINKED DUFFING LINEAR OSCILLATORS EXCITED BY COLORED NOISE E. M. WEINSTEIN Galaxy Scientific Corporation, 2500 English Creek

More information

Switching Time Optimization in Discretized Hybrid Dynamical Systems

Switching Time Optimization in Discretized Hybrid Dynamical Systems Switching Time Optimization in Discretize Hybri Dynamical Systems Kathrin Flaßkamp, To Murphey, an Sina Ober-Blöbaum Abstract Switching time optimization (STO) arises in systems that have a finite set

More information

Learning Automata in Games with Memory with Application to Circuit-Switched Routing

Learning Automata in Games with Memory with Application to Circuit-Switched Routing Learning Automata in Games with Memory with Application to Circuit-Switche Routing Murat Alanyali Abstract A general setting is consiere in which autonomous users interact by means of a finite-state controlle

More information

Time-Optimal Motion Control of Piezoelectric Actuator: STM Application

Time-Optimal Motion Control of Piezoelectric Actuator: STM Application Time-Optimal Motion Control of Piezoelectric Actuator: STM Application Yongai Xu, Peter H. Mecl Abstract This paper exaes the problem of time-optimal motion control in the context of Scanning Tunneling

More information

Implicit Differentiation

Implicit Differentiation Implicit Differentiation Thus far, the functions we have been concerne with have been efine explicitly. A function is efine explicitly if the output is given irectly in terms of the input. For instance,

More information

A Review of Multiple Try MCMC algorithms for Signal Processing

A Review of Multiple Try MCMC algorithms for Signal Processing A Review of Multiple Try MCMC algorithms for Signal Processing Luca Martino Image Processing Lab., Universitat e València (Spain) Universia Carlos III e Mari, Leganes (Spain) Abstract Many applications

More information

State-Space Model for a Multi-Machine System

State-Space Model for a Multi-Machine System State-Space Moel for a Multi-Machine System These notes parallel section.4 in the text. We are ealing with classically moele machines (IEEE Type.), constant impeance loas, an a network reuce to its internal

More information

Harmonic Modelling of Thyristor Bridges using a Simplified Time Domain Method

Harmonic Modelling of Thyristor Bridges using a Simplified Time Domain Method 1 Harmonic Moelling of Thyristor Briges using a Simplifie Time Domain Metho P. W. Lehn, Senior Member IEEE, an G. Ebner Abstract The paper presents time omain methos for harmonic analysis of a 6-pulse

More information

Distributed coordination control for multi-robot networks using Lyapunov-like barrier functions

Distributed coordination control for multi-robot networks using Lyapunov-like barrier functions IEEE TRANSACTIONS ON 1 Distribute coorination control for multi-robot networks using Lyapunov-like barrier functions Dimitra Panagou, Dušan M. Stipanović an Petros G. Voulgaris Abstract This paper aresses

More information

Qubit channels that achieve capacity with two states

Qubit channels that achieve capacity with two states Qubit channels that achieve capacity with two states Dominic W. Berry Department of Physics, The University of Queenslan, Brisbane, Queenslan 4072, Australia Receive 22 December 2004; publishe 22 March

More information

Node Density and Delay in Large-Scale Wireless Networks with Unreliable Links

Node Density and Delay in Large-Scale Wireless Networks with Unreliable Links Noe Density an Delay in Large-Scale Wireless Networks with Unreliable Links Shizhen Zhao, Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong University, China Email: {shizhenzhao,xwang}@sjtu.eu.cn

More information

Lower bounds on Locality Sensitive Hashing

Lower bounds on Locality Sensitive Hashing Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

Relative Entropy and Score Function: New Information Estimation Relationships through Arbitrary Additive Perturbation

Relative Entropy and Score Function: New Information Estimation Relationships through Arbitrary Additive Perturbation Relative Entropy an Score Function: New Information Estimation Relationships through Arbitrary Aitive Perturbation Dongning Guo Department of Electrical Engineering & Computer Science Northwestern University

More information

Chapter 6: Energy-Momentum Tensors

Chapter 6: Energy-Momentum Tensors 49 Chapter 6: Energy-Momentum Tensors This chapter outlines the general theory of energy an momentum conservation in terms of energy-momentum tensors, then applies these ieas to the case of Bohm's moel.

More information

Situation awareness of power system based on static voltage security region

Situation awareness of power system based on static voltage security region The 6th International Conference on Renewable Power Generation (RPG) 19 20 October 2017 Situation awareness of power system base on static voltage security region Fei Xiao, Zi-Qing Jiang, Qian Ai, Ran

More information

TRACKING CONTROL OF MULTIPLE MOBILE ROBOTS: A CASE STUDY OF INTER-ROBOT COLLISION-FREE PROBLEM

TRACKING CONTROL OF MULTIPLE MOBILE ROBOTS: A CASE STUDY OF INTER-ROBOT COLLISION-FREE PROBLEM 265 Asian Journal of Control, Vol. 4, No. 3, pp. 265-273, September 22 TRACKING CONTROL OF MULTIPLE MOBILE ROBOTS: A CASE STUDY OF INTER-ROBOT COLLISION-FREE PROBLEM Jurachart Jongusuk an Tsutomu Mita

More information

Number of wireless sensors needed to detect a wildfire

Number of wireless sensors needed to detect a wildfire Number of wireless sensors neee to etect a wilfire Pablo I. Fierens Instituto Tecnológico e Buenos Aires (ITBA) Physics an Mathematics Department Av. Maero 399, Buenos Aires, (C1106ACD) Argentina pfierens@itba.eu.ar

More information

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5

More information

Perturbation Analysis and Optimization of Stochastic Flow Networks

Perturbation Analysis and Optimization of Stochastic Flow Networks IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. XX, NO. Y, MMM 2004 1 Perturbation Analysis an Optimization of Stochastic Flow Networks Gang Sun, Christos G. Cassanras, Yorai Wari, Christos G. Panayiotou,

More information

A note on asymptotic formulae for one-dimensional network flow problems Carlos F. Daganzo and Karen R. Smilowitz

A note on asymptotic formulae for one-dimensional network flow problems Carlos F. Daganzo and Karen R. Smilowitz A note on asymptotic formulae for one-imensional network flow problems Carlos F. Daganzo an Karen R. Smilowitz (to appear in Annals of Operations Research) Abstract This note evelops asymptotic formulae

More information

ELECTRON DIFFRACTION

ELECTRON DIFFRACTION ELECTRON DIFFRACTION Electrons : wave or quanta? Measurement of wavelength an momentum of electrons. Introuction Electrons isplay both wave an particle properties. What is the relationship between the

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

Equilibrium in Queues Under Unknown Service Times and Service Value

Equilibrium in Queues Under Unknown Service Times and Service Value University of Pennsylvania ScholarlyCommons Finance Papers Wharton Faculty Research 1-2014 Equilibrium in Queues Uner Unknown Service Times an Service Value Laurens Debo Senthil K. Veeraraghavan University

More information

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations Diophantine Approximations: Examining the Farey Process an its Metho on Proucing Best Approximations Kelly Bowen Introuction When a person hears the phrase irrational number, one oes not think of anything

More information

Section 7.1: Integration by Parts

Section 7.1: Integration by Parts Section 7.1: Integration by Parts 1. Introuction to Integration Techniques Unlike ifferentiation where there are a large number of rules which allow you (in principle) to ifferentiate any function, the

More information

The Exact Form and General Integrating Factors

The Exact Form and General Integrating Factors 7 The Exact Form an General Integrating Factors In the previous chapters, we ve seen how separable an linear ifferential equations can be solve using methos for converting them to forms that can be easily

More information

Math 342 Partial Differential Equations «Viktor Grigoryan

Math 342 Partial Differential Equations «Viktor Grigoryan Math 342 Partial Differential Equations «Viktor Grigoryan 6 Wave equation: solution In this lecture we will solve the wave equation on the entire real line x R. This correspons to a string of infinite

More information

Topic 7: Convergence of Random Variables

Topic 7: Convergence of Random Variables Topic 7: Convergence of Ranom Variables Course 003, 2016 Page 0 The Inference Problem So far, our starting point has been a given probability space (S, F, P). We now look at how to generate information

More information

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21 Large amping in a structural material may be either esirable or unesirable, epening on the engineering application at han. For example, amping is a esirable property to the esigner concerne with limiting

More information

Integration Review. May 11, 2013

Integration Review. May 11, 2013 Integration Review May 11, 2013 Goals: Review the funamental theorem of calculus. Review u-substitution. Review integration by parts. Do lots of integration eamples. 1 Funamental Theorem of Calculus In

More information

This module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics

This module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics This moule is part of the Memobust Hanbook on Methoology of Moern Business Statistics 26 March 2014 Metho: Balance Sampling for Multi-Way Stratification Contents General section... 3 1. Summary... 3 2.

More information

Balancing Data Security and Blocking Performance with Spectrum Randomization in Optical Networks

Balancing Data Security and Blocking Performance with Spectrum Randomization in Optical Networks Balancing Data Security an Blocking Performance with Spectrum Ranomization in Optical Networks Saneep Kumar Singh, Wolfgang Bziuk, an Amela Jukan Technische Universität Carolo-Wilhelmina zu Braunschweig,

More information

7.1 Support Vector Machine

7.1 Support Vector Machine 67577 Intro. to Machine Learning Fall semester, 006/7 Lecture 7: Support Vector Machines an Kernel Functions II Lecturer: Amnon Shashua Scribe: Amnon Shashua 7. Support Vector Machine We return now to

More information

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

inflow outflow Part I. Regular tasks for MAE598/494 Task 1

inflow outflow Part I. Regular tasks for MAE598/494 Task 1 MAE 494/598, Fall 2016 Project #1 (Regular tasks = 20 points) Har copy of report is ue at the start of class on the ue ate. The rules on collaboration will be release separately. Please always follow the

More information

Math 1B, lecture 8: Integration by parts

Math 1B, lecture 8: Integration by parts Math B, lecture 8: Integration by parts Nathan Pflueger 23 September 2 Introuction Integration by parts, similarly to integration by substitution, reverses a well-known technique of ifferentiation an explores

More information

Transmission Line Matrix (TLM) network analogues of reversible trapping processes Part B: scaling and consistency

Transmission Line Matrix (TLM) network analogues of reversible trapping processes Part B: scaling and consistency Transmission Line Matrix (TLM network analogues of reversible trapping processes Part B: scaling an consistency Donar e Cogan * ANC Eucation, 308-310.A. De Mel Mawatha, Colombo 3, Sri Lanka * onarecogan@gmail.com

More information

u!i = a T u = 0. Then S satisfies

u!i = a T u = 0. Then S satisfies Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace

More information

APPROXIMATE SOLUTION FOR TRANSIENT HEAT TRANSFER IN STATIC TURBULENT HE II. B. Baudouy. CEA/Saclay, DSM/DAPNIA/STCM Gif-sur-Yvette Cedex, France

APPROXIMATE SOLUTION FOR TRANSIENT HEAT TRANSFER IN STATIC TURBULENT HE II. B. Baudouy. CEA/Saclay, DSM/DAPNIA/STCM Gif-sur-Yvette Cedex, France APPROXIMAE SOLUION FOR RANSIEN HEA RANSFER IN SAIC URBULEN HE II B. Bauouy CEA/Saclay, DSM/DAPNIA/SCM 91191 Gif-sur-Yvette Ceex, France ABSRAC Analytical solution in one imension of the heat iffusion equation

More information

Power Generation and Distribution via Distributed Coordination Control

Power Generation and Distribution via Distributed Coordination Control Power Generation an Distribution via Distribute Coorination Control Byeong-Yeon Kim, Kwang-Kyo Oh, an Hyo-Sung Ahn arxiv:407.4870v [math.oc] 8 Jul 204 Abstract This paper presents power coorination, power

More information

TIME-DELAY ESTIMATION USING FARROW-BASED FRACTIONAL-DELAY FIR FILTERS: FILTER APPROXIMATION VS. ESTIMATION ERRORS

TIME-DELAY ESTIMATION USING FARROW-BASED FRACTIONAL-DELAY FIR FILTERS: FILTER APPROXIMATION VS. ESTIMATION ERRORS TIME-DEAY ESTIMATION USING FARROW-BASED FRACTIONA-DEAY FIR FITERS: FITER APPROXIMATION VS. ESTIMATION ERRORS Mattias Olsson, Håkan Johansson, an Per öwenborg Div. of Electronic Systems, Dept. of Electrical

More information

CONTROL CHARTS FOR VARIABLES

CONTROL CHARTS FOR VARIABLES UNIT CONTOL CHATS FO VAIABLES Structure.1 Introuction Objectives. Control Chart Technique.3 Control Charts for Variables.4 Control Chart for Mean(-Chart).5 ange Chart (-Chart).6 Stanar Deviation Chart

More information

An inductance lookup table application for analysis of reluctance stepper motor model

An inductance lookup table application for analysis of reluctance stepper motor model ARCHIVES OF ELECTRICAL ENGINEERING VOL. 60(), pp. 5- (0) DOI 0.478/ v07-0-000-y An inuctance lookup table application for analysis of reluctance stepper motor moel JAKUB BERNAT, JAKUB KOŁOTA, SŁAWOMIR

More information

Hybrid Centralized-Distributed Resource Allocation for Device-to-Device Communication Underlaying Cellular Networks

Hybrid Centralized-Distributed Resource Allocation for Device-to-Device Communication Underlaying Cellular Networks Hybri Centralize-Distribute Resource Allocation for Device-to-Device Communication Unerlaying Cellular Networks 1 arxiv:1502.04539v1 [cs.gt] 16 Feb 2015 Setareh Maghsui an Sławomir Stańczak, Senior Member,

More information

Optimization of Geometries by Energy Minimization

Optimization of Geometries by Energy Minimization Optimization of Geometries by Energy Minimization by Tracy P. Hamilton Department of Chemistry University of Alabama at Birmingham Birmingham, AL 3594-140 hamilton@uab.eu Copyright Tracy P. Hamilton, 1997.

More information

arxiv:hep-th/ v1 3 Feb 1993

arxiv:hep-th/ v1 3 Feb 1993 NBI-HE-9-89 PAR LPTHE 9-49 FTUAM 9-44 November 99 Matrix moel calculations beyon the spherical limit arxiv:hep-th/93004v 3 Feb 993 J. Ambjørn The Niels Bohr Institute Blegamsvej 7, DK-00 Copenhagen Ø,

More information

UNIFYING PCA AND MULTISCALE APPROACHES TO FAULT DETECTION AND ISOLATION

UNIFYING PCA AND MULTISCALE APPROACHES TO FAULT DETECTION AND ISOLATION UNIFYING AND MULISCALE APPROACHES O FAUL DEECION AND ISOLAION Seongkyu Yoon an John F. MacGregor Dept. Chemical Engineering, McMaster University, Hamilton Ontario Canaa L8S 4L7 yoons@mcmaster.ca macgreg@mcmaster.ca

More information

arxiv: v1 [cs.ds] 31 May 2017

arxiv: v1 [cs.ds] 31 May 2017 Succinct Partial Sums an Fenwick Trees Philip Bille, Aners Roy Christiansen, Nicola Prezza, an Freerik Rye Skjoljensen arxiv:1705.10987v1 [cs.ds] 31 May 2017 Technical University of Denmark, DTU Compute,

More information

Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes

Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Coes Kaiann Fu an Achilleas Anastasopoulos Electrical Engineering an Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

The Press-Schechter mass function

The Press-Schechter mass function The Press-Schechter mass function To state the obvious: It is important to relate our theories to what we can observe. We have looke at linear perturbation theory, an we have consiere a simple moel for

More information

Homework 2 Solutions EM, Mixture Models, PCA, Dualitys

Homework 2 Solutions EM, Mixture Models, PCA, Dualitys Homewor Solutions EM, Mixture Moels, PCA, Dualitys CMU 0-75: Machine Learning Fall 05 http://www.cs.cmu.eu/~bapoczos/classes/ml075_05fall/ OUT: Oct 5, 05 DUE: Oct 9, 05, 0:0 AM An EM algorithm for a Mixture

More information

Throughput Optimal Control of Cooperative Relay Networks

Throughput Optimal Control of Cooperative Relay Networks hroughput Optimal Control of Cooperative Relay Networks Emun Yeh Dept. of Electrical Engineering Yale University New Haven, C 06520, USA E-mail: emun.yeh@yale.eu Ranall Berry Dept. of Electrical an Computer

More information

Short Intro to Coordinate Transformation

Short Intro to Coordinate Transformation Short Intro to Coorinate Transformation 1 A Vector A vector can basically be seen as an arrow in space pointing in a specific irection with a specific length. The following problem arises: How o we represent

More information

The total derivative. Chapter Lagrangian and Eulerian approaches

The total derivative. Chapter Lagrangian and Eulerian approaches Chapter 5 The total erivative 51 Lagrangian an Eulerian approaches The representation of a flui through scalar or vector fiels means that each physical quantity uner consieration is escribe as a function

More information

Online Appendix for Trade Policy under Monopolistic Competition with Firm Selection

Online Appendix for Trade Policy under Monopolistic Competition with Firm Selection Online Appenix for Trae Policy uner Monopolistic Competition with Firm Selection Kyle Bagwell Stanfor University an NBER Seung Hoon Lee Georgia Institute of Technology September 6, 2018 In this Online

More information

Image Based Monitoring for Combustion Systems

Image Based Monitoring for Combustion Systems Image Base onitoring for Combustion Systems J. Chen, ember, IAENG an.-y. Hsu Abstract A novel metho of on-line flame etection in vieo is propose. It aims to early etect the current state of the combustion

More information

IERCU. Institute of Economic Research, Chuo University 50th Anniversary Special Issues. Discussion Paper No.210

IERCU. Institute of Economic Research, Chuo University 50th Anniversary Special Issues. Discussion Paper No.210 IERCU Institute of Economic Research, Chuo University 50th Anniversary Special Issues Discussion Paper No.210 Discrete an Continuous Dynamics in Nonlinear Monopolies Akio Matsumoto Chuo University Ferenc

More information

Generalized Tractability for Multivariate Problems

Generalized Tractability for Multivariate Problems Generalize Tractability for Multivariate Problems Part II: Linear Tensor Prouct Problems, Linear Information, an Unrestricte Tractability Michael Gnewuch Department of Computer Science, University of Kiel,

More information

Constraint Reformulation and a Lagrangian Relaxation based Solution Algorithm for a Least Expected Time Path Problem Abstract 1.

Constraint Reformulation and a Lagrangian Relaxation based Solution Algorithm for a Least Expected Time Path Problem Abstract 1. Constraint Reformulation an a Lagrangian Relaation base Solution Algorithm for a Least Epecte Time Path Problem Liing Yang State Key Laboratory of Rail Traffic Control an Safety, Being Jiaotong University,

More information

Construction of the Electronic Radial Wave Functions and Probability Distributions of Hydrogen-like Systems

Construction of the Electronic Radial Wave Functions and Probability Distributions of Hydrogen-like Systems Construction of the Electronic Raial Wave Functions an Probability Distributions of Hyrogen-like Systems Thomas S. Kuntzleman, Department of Chemistry Spring Arbor University, Spring Arbor MI 498 tkuntzle@arbor.eu

More information

A Novel Decoupled Iterative Method for Deep-Submicron MOSFET RF Circuit Simulation

A Novel Decoupled Iterative Method for Deep-Submicron MOSFET RF Circuit Simulation A Novel ecouple Iterative Metho for eep-submicron MOSFET RF Circuit Simulation CHUAN-SHENG WANG an YIMING LI epartment of Mathematics, National Tsing Hua University, National Nano evice Laboratories, an

More information

Separation of Variables

Separation of Variables Physics 342 Lecture 1 Separation of Variables Lecture 1 Physics 342 Quantum Mechanics I Monay, January 25th, 2010 There are three basic mathematical tools we nee, an then we can begin working on the physical

More information

d dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1

d dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1 Lecture 5 Some ifferentiation rules Trigonometric functions (Relevant section from Stewart, Seventh Eition: Section 3.3) You all know that sin = cos cos = sin. () But have you ever seen a erivation of

More information

BEYOND THE CONSTRUCTION OF OPTIMAL SWITCHING SURFACES FOR AUTONOMOUS HYBRID SYSTEMS. Mauro Boccadoro Magnus Egerstedt Paolo Valigi Yorai Wardi

BEYOND THE CONSTRUCTION OF OPTIMAL SWITCHING SURFACES FOR AUTONOMOUS HYBRID SYSTEMS. Mauro Boccadoro Magnus Egerstedt Paolo Valigi Yorai Wardi BEYOND THE CONSTRUCTION OF OPTIMAL SWITCHING SURFACES FOR AUTONOMOUS HYBRID SYSTEMS Mauro Boccaoro Magnus Egerstet Paolo Valigi Yorai Wari {boccaoro,valigi}@iei.unipg.it Dipartimento i Ingegneria Elettronica

More information

arxiv: v2 [cond-mat.stat-mech] 11 Nov 2016

arxiv: v2 [cond-mat.stat-mech] 11 Nov 2016 Noname manuscript No. (will be inserte by the eitor) Scaling properties of the number of ranom sequential asorption iterations neee to generate saturate ranom packing arxiv:607.06668v2 [con-mat.stat-mech]

More information

MASSIVE multiple-input multiple-output (MIMO) has

MASSIVE multiple-input multiple-output (MIMO) has IEEE SIGNAL PROCESSING LETTERS, VOL. 4, NO. 1, DECEMBER 017 1847 Spectral Efficiency uner Energy Constraint for Mixe-ADC MRC Massive MIMO Hessam Pirzaeh, Stuent Member, IEEE, an A. Lee Swinlehurst, Fellow,

More information

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS Yannick DEVILLE Université Paul Sabatier Laboratoire Acoustique, Métrologie, Instrumentation Bât. 3RB2, 8 Route e Narbonne,

More information

Lie symmetry and Mei conservation law of continuum system

Lie symmetry and Mei conservation law of continuum system Chin. Phys. B Vol. 20, No. 2 20 020 Lie symmetry an Mei conservation law of continuum system Shi Shen-Yang an Fu Jing-Li Department of Physics, Zhejiang Sci-Tech University, Hangzhou 3008, China Receive

More information

Web Appendix to Firm Heterogeneity and Aggregate Welfare (Not for Publication)

Web Appendix to Firm Heterogeneity and Aggregate Welfare (Not for Publication) Web ppeni to Firm Heterogeneity an ggregate Welfare Not for Publication Marc J. Melitz Harvar University, NBER, an CEPR Stephen J. Reing Princeton University, NBER, an CEPR March 6, 203 Introuction his

More information

Generalizing Kronecker Graphs in order to Model Searchable Networks

Generalizing Kronecker Graphs in order to Model Searchable Networks Generalizing Kronecker Graphs in orer to Moel Searchable Networks Elizabeth Boine, Babak Hassibi, Aam Wierman California Institute of Technology Pasaena, CA 925 Email: {eaboine, hassibi, aamw}@caltecheu

More information

A Better Model for Job Redundancy: Decoupling Server Slowdown and Job Size

A Better Model for Job Redundancy: Decoupling Server Slowdown and Job Size A Better Moel for Job Reunancy: Decoupling Server Slowown an Job Size Kristen Garner 1 Mor Harchol-Balter 1 Alan Scheller-Wolf Benny Van Hout 3 October 1 CMU-CS-1-131 School of Computer Science Carnegie

More information

Role of parameters in the stochastic dynamics of a stick-slip oscillator

Role of parameters in the stochastic dynamics of a stick-slip oscillator Proceeing Series of the Brazilian Society of Applie an Computational Mathematics, v. 6, n. 1, 218. Trabalho apresentao no XXXVII CNMAC, S.J. os Campos - SP, 217. Proceeing Series of the Brazilian Society

More information

arxiv: v1 [cs.it] 21 Aug 2017

arxiv: v1 [cs.it] 21 Aug 2017 Performance Gains of Optimal Antenna Deployment for Massive MIMO ystems Erem Koyuncu Department of Electrical an Computer Engineering, University of Illinois at Chicago arxiv:708.06400v [cs.it] 2 Aug 207

More information

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control 19 Eigenvalues, Eigenvectors, Orinary Differential Equations, an Control This section introuces eigenvalues an eigenvectors of a matrix, an iscusses the role of the eigenvalues in etermining the behavior

More information