Encoded packet-assisted Rescue Approach to Reliable Unicast in Wireless Networks

Size: px
Start display at page:

Download "Encoded packet-assisted Rescue Approach to Reliable Unicast in Wireless Networks"

Transcription

1 Encoded pacet-asssted Rescue Approach to Relable Uncast n Wreless Networs Zhheng Zhou, Lang Zhou, Xng Wang, Yuanquan Tan Natonal Key Laboratory of Communcaton Unversty of Electronc Scence and Tech of Chna Chengdu, Chna E-mal: {zhzhou, lzhou, wangxng, tanyuanquan}@uestc.edu.cn Abstract Recently, there has been a growng nterest of usng networ codng to support relable uncast over an error-prone channel. However, prevous networ codng schemes focused only on natve pacets and gnored the role of encoded pacets. In ths paper, we develop an effcent retransmsson approach wth networ codng method, namely Encoded pacet-asssted Rescue (EAR), whch s able to overcome ths lmtaton. Usng the proposed networ codng approach, clents store the overheard encoded pacets and report to the sender. And then, when the sender maes codng decsons, t not only consders natve pacets, but also taes account of encoded pacets. In ths way, more codng opportuntes are emerged,.e. more pacets can be mxed together, resultng n mprovng the retransmsson effcency. Moreover, theoretcal analyss and smulaton results show that comparng wth the exstng schemes, our schemes can greatly reduce the total number of retransmssons. Keywords--Error-prone; Networ Codng; Uncast; Rescue; I. INTRODUCTION It s well-nown that wreless networs are error-prone because of fadng and nterference. Many researches have revealed that IEEE 8.-based wreless mesh networs suffer from severe pacet loss rado n wde condtons []. Hence, automatc repeat request (ARQ) [] technque s used to mae a wreless ln relable and further mprove end-to-end throughput. However, n tradtonal ARQ protocols, whenever a pacet gets erased, the sender smply retransmts t, whch usually consumes a consderable channel capacty. Then, Hybrd ARQ (HARQ) [] protocols that mplement Forward Error Codng (FEC) are ntroduced and have been proven to be more effcent than orgnal ARQ protocols or pure FEC schemes under wde condtons [4]. Recently networ codng (NC) [5] has emerged as a promsng technque to ncrease the networ bandwdth effcency and relablty, snce t enables to mx multple ncomng pacets n a sngle transmsson rather than ust relayng these ncomng pacets to output lns one by one, whch breas wth the conventonal store-and-forward way. Partcularly, authors of COPE [6] presented a practcal XORbased networ codng wth the concept of opportunestc lstenng and opportunstc codng for uncast n wreless mesh networs. It employed cumulatve ACK n ts COPE layer to provde relable transmsson. However, ts performance s only sub-optmal n lossy wreless networs. The reason s that COPE does not consder the ssue of how to effectvely retransmt lost pacets, whch could cause ts performance degradaton under the hgh loss rato. As an elegant relable retransmsson paradgm n one-to-many sngle-hop wreless networs, Nguyen et al. [8] combned networ codng technque wth the tradtonal ARQ technque, NC-ARQ, whch can sgnfcantly enhance the bandwdth effcency. Rozner et al. [9] modfed the retransmsson mechansm n COPE and proposed an effcent retransmsson approach (ER). Wth ER, pacets that need to be retransmtted are encoded together, such that multple pacet-loss for dfferent destnatons can be recovered by one retransmsson. Snce then, a lot of networ codng based retransmsson protocols [-4] have been presented to provde effcent and relable communcatons n lossy wreless networs. Nonetheless, all of these protocols only focal on natve pacets that need to be retransmtted, and none consder the role of encoded pacets, whch contaned these loss natve pacets and have been overheard by clents who aren t ther destnatons. Usng the tradtonal networ codng schemes, when clents overheard encoded pacets, they ust dscard them or smply store them but don t report these nformaton to the sender. Therefore, when the sender maes codng decsons, t can t utlze encoded pacets to explot codng opportuntes, whch s neffcent and expensve. Therefore, we study an effcent retransmsson approach wth networ codng technque, named Encoded pacet- Asssted Rescue (EAR) n ths paper, whch s able to explot the codng opportuntes of both natve and encoded pacets. Our contrbuton s summarzed as follows: We ntroduce a system model of the wreless one-tomany sngle-hop uncast system and then study the theoretcal analyss n terms of the number of retransmssons of the proposed scheme. We defne the weght of pacet-loss pattern, whch helps us to evaluate the EAR s performance more precsely and desgn a optmum codng algorthm to maxmze the beneft of coded pacets, namely to mnmze the total number of retransmssons The remander of ths paper s organzed as follows. In next Secton, we descrbe a system model n the context of wreless uncast scenaro. In Secton III, we present some theoretcal

2 dervatons on the total number of retransmssons wth the proposed EAR schemes. In Secton IV, theory and smulaton results are llustrated. Fnally, concluson s gven n Secton V. II. SYSTEM MODEL AND ASSUMPTIONS If multple flows traverse the same node, we called such node central node (unless otherwse stated we smply call t node C) and there s the opportunty to apply networ codng technques to mprove the overall retransmsson effcency for each flow crossed t. Consequently, we only consder the retransmssons between node C and ts neghbors even for the wheel scenaro n ths paper. And we also consder that the throughput rate of each flow over the networs has already stablzed. Furthermore, we assume node C employs a suffcent large retransmsson buffer to avod too early rescue process. In partcular, each recever would request a dstnct set of loss pacets, whch from node C s pont of vew, corresponds to supportng dfferent uncast sessons. Smlar wth [], we mae the followng assumptons about the wreless uncast retransmsson models. There are N (N >) recevers R ( 6 6 N), and the central node retransmts lost pacets after a fxed tme slot T. We suppose route of each flow would pass through node C to maxmze codng opportuntes [7]. Node C can always now the current pacet-loss states of both natve and encoded pacets at all recevers. Ths can be carred through by usng postve and negatve acnowledgements (ACK/NAKs). To smplfy the analyss, we assume all the feedbac are nstantaneous and relable. Pacet lost rates between node C and each recever are mutually ndependent and follow the Bernoull dstrbuton, where each pacet s lost wth a fxed probablty! ( s the recever s ID, 6 6 N ) at each recever. Let us consder the uncast topology, whch conssts of N recevers. Thereby, f each clent requests K dstnct pacets, then node C needs to successfully delver a total of K N pacets to all of them. To planly represent the pacet-loss state, we defne pacet-loss pattern as follow: Defnton. Pacet-loss pattern ½ P s a row vector that represents the current pacet-loss state of pacet P at all the recevers, thus ts dmenson s equal to the number of the recevers. When pacet P s successfully obtaned by recever R, the th entry n ½ P wll be mared, or else. In ths paper, the pacet-loss pattern relatng to the natve pacets s smply called natve pattern, and coded pattern denotes the one relatng to the encodng pacets. The followng defntons play crucal roles n ths paper. Defnton. The weght of a pacet-loss pattern W (½) s the number of non-zero elements n ½. In partcular, W (½) <N for N-recever scenaros. Remar: Note that, f all the ntended recevers of pacet P correctly receve t, there s no longer a pacet-loss pattern relevant to pacet P, vce versa. Furthermore, node C would retransmt P several tmes to delver t successfully to ts nexthop, for the reason that the wreless channel s error-prone. And the pacet-error pattern ½ P would be altered after each retransmsson of P. The weght of the newer loss pattern (f t exsts), however, s always no lghter than the prevous one, n respect that the recevers who have overheard P would reserve t untl the end of ths retransmsson process. At last, there are no less than one lost pacet relatng to a loss pattern. Thereby, unless otherwse stated, we relate a loss pattern to a set of pacets whch have the same loss state. Then, we defne P ½ as the set of lost pacets whch have the same loss pattern ½ durng the rescue process. Thus, n retransmsson process, f a non-empty set P ½ has been already transferred to the empty set,.e. no loss pacets relevant to ½, we state that the central node has rescued the loss pattern ½ or the set P ½. As we mentoned above, a pacet belongng to P ½ s elmnated from P ½ due to the followng two reasons: ) The ntended recever of ths pacet has receved t. ) The ntended recever s falure to receve t agan, yet the correspondng loss pattern s changed. To sum up, we present the followng theorem. Theorem. The expect number of retransmssons Ð ½ requested by the central node to rescue loss-pattern ½, whose the th r ( r N;r =;:::;N W (½)) entres are equal to, for N-recever scenaro s Or Ð ½ = Q ()! r where Or s the set consstng of the lost pacets whch have the same loss pattern ½ after the orgnal transmsson. And Ð ½!½ pacets n P ½ would be transferred to P ½ after the central node rescued P ½. Ð ½!½ =Ð ½ Prf½ ½g () where Prf½ ½g denotes the probablty that a pacet s transferred from P ½ to P ½. Proof: To smplfy the analyss, we suppose that node C would retransmts P ½ round by round, whch means node C frst transmts the entre pacets belongng to P ½ one by one, and collects ther receve-state to modfy P ½, and then t repeats the these steps for the resdual pacets n P ½ agan and agan untl these s no longer a pacet relatng to ½. We defne P ½ () ( >) as the set relevant to ½ after the th round, and P () ½ = Or. Let random varable Y ( >) represent the cardnalty of P ½ (), and we have Y = Or. For the reason that the delveres are..d. and follow the Bernoull dstrbuton, the random varables Y ( =; ;:::) are..d. and follow the bnomal dstrbuton. Further-more, a pacet s held n P ½ () after the th round, f and only f the recevers R r who lost t before are stll falure to receve t. Hence, we have E[Y ]=E[E[Y Y ]] = Y ( Y! r ) () due to Q! 6, the seres E[Y ] ( >) s convergent, the

3 expect number of retransmssons Ð ½, that node needs C to rescues ½, s Ð ½ = Y + X E[Y ] = = Y (Prf½g) + X Y ( Y! r ) = = Y X (Y! r ) Or = = Q (4)! r Now, let random varable Y ( >) represent the number of pacets that are transferred from P ½ to P ½, ½6=½, after the th round, partcularly, Y =. Random varables Y ( >) are..d as well and follow the bnomal dstrbuton. Then, we have E[Y] =E[E[YY ]] = E[Y ] Prf½ ½g = Y ( Y! r ) Prf½ ½g (5) due to Q! r 6, the seres E[Y ] ( >) s convergent, the number of pacets that are transferred from P ½ to P ½ after node C has rescued ½ s Ð ½!½ = X E[Y ] = = X Y ( Y! r ) ( ) Prf½ ½g = =Ð ½ Prf½ ½g that pacets n P ½ can be relocated to P ½. Obvously, ths theorem s sutable for both natve and coded patterns. Fnally, we ntroduce the followng concept. Defnton. If n pacets respectvely belongng to the sets P ½ ;P ½ ;:::;P ½n ( 6 n 6 N) can be coded together, we state the sets P ½ ;P ½ ;:::;P ½n can be encoded together, and we also say that the correspondng loss patterns,, n can be encoded together. III. PERFORMANCE ANALYSIS In ths secton, we frst revew the avalable wor on applyng networ codng to relable mult-uncast. Then, we study some theoretcal analyss n terms of total number of retransmssons of the tradtonal and the proposed EAR technques for both wheel and sngle-hop scenaros. Before delvng nto detals, we refer the reader to the followng symbols, whch be used n the rest of the paper. P : The set of natve pacets node R requests. ½ : The set of all possble loss patterns relatng to the natve pacets node R requests. ½ ;:::; n : The set of all possble coded patterns whch are n relaton to coded lost pacets, each of whch contans n pacets nodes R ;:::;R n requested separately, where N, 6 6 n, 6 n 6 N. P½ : the set of natve lost pacets whch are reque-sted by node R and have the loss state ½ = ½. P½ ;:::;n : the set of natve lost pacets have the loss state ½ = ½ ;:::; n. (6)!! P P P P P P P 4 P 4 Fgure. Example of NC-ARQ. (a) Two recevers uncast scenaro. (b) Possble retransmsson process: P P, P P, P 4 and P P. We also use notaton ½ P to denote the set of loss patterns relatng to pacets n P. However, when P s suffcently large, we have ½ P = ½ because of the law of large numbers. Thus, unless otherwse stated, we also utlze ½ to denote ½ P. And t s the same to ½ P ;:::;n. A. Overvew The ey dea of Nguyen et al. [8] and Rozner et al. [9] proposed networ codng schemes s to frst buffer the lost pacets n the retransmsson buffer durng some tme, then, nstead of transmttng them one by one, the source combnes the maxmum number of lost pacets wth dstnct ntended recevers nto one pacet and delvers ths coded pacet n one retransmsson. To llustrate how ths codng-base relable retransmsson scheme wors, we tae an example n Fg.. In the example, node C has transmtted P ( 6 6 4; =; ) to recevers R separately. As depcted n Fg (b), pacets P, P, P and have been falure to be receved by ther respectve P ntended recever but been correctly overheard by the other one. Tradtonally, each one of P, P, P and P s retransmtted one by one and each one of them has only one ntended recever. Wth the NC-ARQ scheme, node C can combne P wth P ; to Pen = P P, whch s avalable for both R and R. Smlarly, we can do the same operaton for P and P. Even so, P 4 stll has to be sent alone, snce recever R doesn t obtan t,.e. R s unable to remove P4 from the coded pacet contanng t to extract the ntended pacet. Furthermore, f P and P are lost agan, node C wll XOR them together for next retransmsson. From ths example we can explctly see that, by explorng the broadcast nature of wreless and mxng lost pacets tog-ether, the total number of retransmssons can be effectvely reduced. Authors of [] evaluated the performance of ths method for sngle-hop scenaros, and got the followng theorem. Theorem. Usng the NC-ARQ technque, when the number of pacets to be sent s suffcently large, the average number of retransmssons NUNC for the N-recever uncast sngle-hop scenaro s NUNC = Q NX N =! (7) N! = where! s the pacet loss rato between central node and recever R, and! 6! f N. In partcular, for the -recever scenaro,

4 UNC = μ!! +! (8)!! B. EAR performs on the N-recever uncast scenaro In ths subsecton, we evaluate the performance of the proposed EAR approach for the uncast topology. We frst present how to use pacet-loss pattern to dentfy the codng opportuntes over retransmsson process. Theorem. Let R ½ denote the set consstng of node(s) whch s/are the ntended recever(s) for pacets n P ½. In rescue process, the loss pacets P, P,,P n ( 6 n 6 N), each of whch can be natve or coded pacet, wth respect to the patterns ½ ;:::;½ n can be coded together f and only f R ½ \ R ½ = Á; 6= and only the th entry of the th column of matrx F =[½ T ::: ½ T n ] T s equal to, where R R ½, [;n] and [; S n = ]. R½ Proof: Frst of all, let us assume that there are two loss patterns ½ and ½ ( 6= ; ; n) whch satsfy R ½ \ R ½ =fr cap g. Suppose P contans the natve pacet P cap and the correspondng pacet n P s P cap. Under these assumptons, there would be two possbltes:. P cap 6=P cap, obvously, R cap cannot decode such coded pacet;. P cap = P cap, then R cap cannot obtan ths pacet, for the reason P cap P cap =. Nether of them s expected by us. Hence, there must be R ½ \ R ½ = Á; 6=. Wthout loss of generalty, let us consder node R. To nsure that the node R get ts correspondng pacet P, t must have correctly overheard the pacets P ;=;:::;n. So based on Defnton, the th entry n ½ ;=;:::;n s equal to,.e. the th column of matrx F s only the frst entry that s equal to. It s the same to other recevers. On the other hand, f the th column of matrx F s only the th entry that s equal to, where R R ½. It means that R has already obtaned the pacets P t ;t=;:::;n;t6=,.e. t enable to elmnatep t from the coded pacet. Under the assumpton, all pacets except P can be removed by R. Clearly, there are the same results for all other recevers. Therefore, based on the code rule of COPE [], all the pacets can be mxed together to one pacet. Defnton 4. The set CG = f½ ;½ ;:::;½ g ; 6 6 N (9) where error patterns ½ ;½ ;:::;½ can be coded together, s called the Code Group. Partcularly, though there are no less than one code group nterrelatng wth a error pattern, f all the th ( = S n = R ½ ) columns of matrx F must be zero n Theorem 5, and then each combnaton of loss patterns fulfllng the theorem s unque,.e f ½ CG and ½ CG, then CG = CG, and acheve ther maxmum codng opportuntes. In ths way, all the code groups we mentoned are lmted to ths restrcton n the rest of ths paper. In last sub-phase, we ntroduce the NC-ARQ approach. However, t only consdered the natve pacets and gnored the encoded pacets, whch contan codng opportuntes and have P P P P P pacets to be sent s suffcently large, the average number of P Fgure. Three recevers uncast scenaro. Let s tae an example n Fg. to llustrate how to utlze them to mprove the retransmsson effcency. In ths example, node C has transmtted P ( =; ; ) to recevers R separately. The receve-state of pacets P, P and P s depcted n Fg 6(a). Due to the assumpton, only P and P can be XORed together. Therefore, node C mxes them together and forwards encoded pacet P P to the downstream nodes. However, P P would be lost agan over the nosy channel, f ts receve-state s the showed n Fg. 6(b), then the best codng decson would be to combne P P and P together, and not to delver them respectvely. From ths example we can explctly see that, by consderng the encoded pacets generated n rescue process, the number of retransmssons would be effectvely reduced. Lemma. Usng the NC-ARQ technque, for N- recever scenaro, f ½ r and ½r can be coded together and P½ r 6 P½ r,! r 6! r, then the entre pacets n P½ r can be XORed wth the ones belongng to P r ½ n recovery process, and we say that ½ r s domnated by ½r. Ths relaton s denoted by ½ r  ½ r. In partcular, node C need to retransmt Ð r ½ tmes to rescue ½ r. And Ð Natve natve pacets would be sent alone. Ð r ½ = P r ½ ()! r r Ð Natve = P r P ½ ½ (! r ) ()! r potental to enhance the retransmsson effcency as well. We use nducton method to prove the lemma. Interested readers can fnd detals of the proof n the Appendx. Theorem 4. Usng the EAR method, when the number of retransmssons EUNC for the N-recever uncast sngle-hop scenaro s EUNC = Q NX N =! N = Q N =! () where! s the pacet loss rato between central node and recever R, and! 6! f N. Proof: Frst, we consder the -recever scenaro. Let ½ =[ ], ½ =[ ], ½ =[ ] and ½ =[ ]. Let random varable X, X, X and X, separately, denote the number of lost pacets relevant to loss pattern ½, ½, ½ and ½ after K transmssons. X ( =; ; ; ) follow the bnomal dstrbuton. As we mentoned above, node C would rescue ½ and ½ frst. Then based on Theorem, we have

5 Ð ½ =Ð ½ = K!!!! () Ð ½!½ =Ð ½! (! ) (4) Ð ½!½ =Ð ½ (! )! (5) Snce Ð ½!½ 6Ð ½!½ and E[X ]6E[X ], then E[X ] +Ð ½!½ =m 6m =E[X ]+Ð ½!½. Based on Lemma, we drectly get ½ Â ½, and Ð ½ = m! (6) Combnng () and (6), the expected number of retransmssons to successfully delver K encoded pacets to R and R s gven by Ð all =Ð ½ +Ð ½ +Ð ½ = K! + K!! (7)!!! The proof for N(>) recevers scenaro wll be found n the Appendx. Remar: Though no encoded pacets would be utlzed n -recever uncast scenaro, the EAR approach also outperforms the NC-ARQ technque as shown n Fg., where! =!. The reason s that the EAR approach not only studes the potental of encoded pacets, but also consders that loss pacets should synchronously update ther loss-state over rescue process, whch would result n more codng opportuntes. The average number of retransmsson EAR NC-ARQ Pacet loss rate Fgure. The average number of retransmssons on -recever scenaro. Note that, n proof we suppose each coded pacet can be dvded nto several natve pacets, all of whch are the same receve-state and would be recovered separately, even the recevers cannot decode t. However, ths hypothess does clearly not hold n actual applcatons. As a result, some encoded pacets are unable to be mxed wth any other pacet. We call them the unwanted pacets. We stll tae the - recever uncast scenaro to llustrate how t happens. The zero weght patterns and CG = f½ ;½ ;½ g don t produce undecodabe pacets n each node. Consequently, there are only three codng combnatons that would create unwanted pacets, meanwhle, though each coded pacet has sx possble loss-state, only three of them as shown n Fg. 4(a) would generate undecodable pacets n unntended node. Based on Theorem, the potental codng schemes for these patterns are depcted n Fg. 4(b). ½ ½ ½ + ½ + ½ + ½ + ½ + ½ + ½ ½ ½ + ½ + ½ + ½ + ½ + ½ ½ (a) ½ ½ ½ + ½ + ½ + ½ + (b) ½ + ½ + ½ + ½ ½ ½ ½ Fgure 4. Example of the nfluence of unwanted pacets. (a) The effectve coded patterns. (b) The codng schemes for coded patterns. To smplfy analyss, we assume! =! =! =!. In the lght of Theorem, we have N = P ½ = P ½ = K!(!) P ½ =! P ½ = P ½ = P ½ = P ½ = P ½ = P ½ and we carry out P ½ + =P ½ + =P ½ + =P ½ + =P ½ + =P ½ + N =P + ½ =P + ½ =P + ½ = K!4 (!) (! )(! ) Clearly, CG =f½ + ;½ + ;½ + g and CG =f½ + ;½ + ; ½ + g would not create unwanted pacets, for the reason that the expect number of retransmssons requested to rescue each error pattern s the same. Moreover, f N >N, then ½ + Â ½, ½+ Â ½ and ½+ Â ½, and the remanng pacets n P½, P½ and P½, respectvely, are the same sze based on Lemma. Snce ½, ½ and ½ can be XORed together, CG = f½ + ; ½ g, CG 4 = f½ + ;½ g and CG 5 = f½ + ;½ g would not produce unwanted pacets ether. On the contrary, f N <N, then the resdual pacets n P½ +, P½ + and P½ + have to be recovered separately. However, the pacets n P + ½ and P + ½ are not unwanted pacets, n respect that they stll combne wth the pacets requested by node R. Therefore, only the one n P + ½ s called unwanted pacet. The expect number of delveres to recover them s Ð= K!(!)(! +! ) (! )(! (8) ) where! +! >. Though Theorem 4 only provdes the upper bound of the performance of the EAR approach on N-recever sngle-hop uncast scenaro, the smulaton results ndcate that the nfluence of the unwanted pacets s small and the performance degradaton t caused s consdered neglgble.

6 Updatng algorthm: : ½ P = : Trumph = : Transform = false 4: for recevers = to N do 5: f R has obtaned P correctly then 6: f R s one of the destnaton of P then 7: Trumph = Trumph + 8: f Trumph s equal to NC(P ) then 9: delete P from the retransmsson queue P : f P s a coded pacet then : delete the correspondng natve pacets contaned n P : end f : return 4: end f 5: set the th entry of ½ P equal to 6: else 7: f R has gan P for the frst tme then 8: set the th entry of ½ P equal to 9: end f : Transform = true : end f : end for : f Transform s true and P s a coded pacet then 4: delete the correspondng natve pacets contaned n P 5: end f Fgure 5. Updatng algorthm for each loss pacet Eventually, node C must update the receve-state of loss pacets synchronously to effectvely mplement EAR. Thus, after C has receved N feedbac from R, =; :::;N for a pacet P, t wll execute the followng updatng algorthm, where NC(P ) denotes the number of the natve pacets contaned n P. Notce that when a coded pacet s lost by ts ntended recevers and ts loss-state s changed, then node C would only reserve these pacets and dscard the correspondng natve pacets comprsng t to save memory. IV. EXPERIMENTAL RESULTS AND DISCUSSIONS In ths secton, retransmsson gan s used to evaluate the retransmsson effcency of dfferent approaches by varyng the number of recevers and bt error rate (BER) under both uncast and wheel topology. The BER at each recever are mutually ndependent and follow the Bernoull dstrbuton. We defne the retransmsson gan as the total number of retransmssons usng a typcal retransmsson algorthm, whch s the HARQ or NC-HARQ technques, dvded by the total number of retransmssons usng our algorthm. A hgher retransmsson gan s preferred snce t ndcates fewer retransmssons. In the followng smulate, the pacet sze s to be 5 bytes and data s encoded wth RS (, 8, 4). We use CRC-6 for error detecton n all the smulatons. We record the total number of retransmssons over a mass of experments. In the nterest of space and clarty, we only present the average retransmsson gans n the followng smulaton results. Frst, we compare the performance of proposed EAR approach wth the NC-HARQ technque and the HARQ technque. Fg. 6 shows the effect of dfferent BERs on the retransmsson gan for the -recever uncast scenaros, respectvely. BERs between the sender and all ts recevers are the same, and vared from 4 to :5 n 5 4 ncrements. As expected, the smulaton results support our theoretcal dervatons. Though n large BERs regon the unwanted pacets would brng down the performance of the EAR approach as we dscussed before, the smulaton results for uncast scenaro show such declne s so small as to be neglectable. Furthermore, an nterestng phenomenon would be observed s that the retransmsson gans for uncast scenaro ncrease wth BER, and are very close to under the lght BERs. The reason s that the more awful nose the channels encounter, the more pacets are lost, that s to say the more encoded pacets would be generated from whch the EAR protocol enables to explore the codng opportuntes, yet NC-ARQ cannot. Then, we compare the performance of proposed EAR approach wth the NC-HARQ technque versus the number of clents for uncast and wheel topology. In the experment, BERs between the sender and all ts recevers are set equal to and. Fg. 7 shows the mpact of dfferent number of recevers, whch s vared from to 5, on the retransmsson gan. As seen, the retransmsson gans hardly. -recever Retransmsson gan recever Sm. 5-recever 5-recever Sm Bt error rate - Fgure 6. retransmsson gan versus BER for theory and smulaton. Retransmsson gan Theorem(.) Smulaton(.) Theorem(.) Smulaton(.) The number of recevers Fgure 7. Retransmsson gan versus the number of recevers for theory and smulaton.

7 The average overhead. (bytes / pacet) 5 4 Scheme A(.) Scheme B(.) Scheme A(.) Scheme B(.) Scheme A(.5) Scheme B(.5) overcome the dsregard for the role of encoded pacets, an encoded pacet-asssted rescue approach (EAR) based on XOR networ codng has been proposed. The core features of the EAR approach are ) explore the codng opportuntes of encoded pacet; ) synchronously updatng the receve-state of loss pacets. Under the access pont model, some analytcal results are derved for the retransmsson eff-cency over the uncast scenaros. The theoretcal and smu-laton results show that the proposed EAR approach always outperforms the NC- HARQ technque n terms of the retran-smsson effcency for a typcal range of wreless networ condtons The number of recevers Fgure 8. The average overhead ncrease wth the number of clents on the lght BER, whereas the gans sgnfcantly advanced upon the heavy BER wth the slowng growth rate. The reason s that the probablty that a loss pacet s successfully receved at lease at one clent ncreases wth the number of the clents, and then more loss pacets are relate to one node, namely the growth rate of the total number of retransmssons s gettng slower and slower, when the number of recevers goes up. Fnally, to ensure each ntended recever s able to successfully decode a coded pacet, node C should add the nformaton, whch specfes whether t conssts of encoded pacets and whch encoded pacets are embraced, wthn the NC header. To acheve ths goal, there are two schemes. Scheme A: node C drectly records all the natve pacets that construct the coded pacets, regardless whether any one of them s or was a loss pacet. We utlze a -byte hashvalue to dentfy a pacet s source address and sequence number. Thereupon, n the worst condton, node C has to use K (! + +! N ) bytes to record these pacets. Scheme B: node C employs bt map to regster these natve pacets. In ths scenaro, C has to eep 9-byte for each destnaton, owng to the randomcty of loss-state of each pacet. Hence, n the worst condton, node C needs to append 9 N bytes. Fg. 8 shows the average length of header that records whch pacets n the combned pacets for both schemes. Pacet loss rate between the sender and all ts recevers are the same and equal to.,. and.5, respectvely. Through the fgure, we see that scheme A has much smaller overhead than scheme B. And we further notce that the overhead ncreases wth the number of recevers, but decreases when BERs rses. Even so, comparng to the length of the data pacets, the overhead assocated wth scheme A s no more than 5%, whch can be neglected. V. CONCLUTIONS In ths paper, we addressed the problem of exstng NCbased relable transmsson schemes for wreless mult-uncast system such as WF and WMAX networs. In order to REFERENCES [] D. Aguayo, J. Bcet, S. Bswas, G. Judd, and R. Morrs. Ln-level Measurements from an 8.b Mesh Networ, n Proc. of ACM SIGCOMM 4, August 4, pp. -. [] M. Naoh, S. Sampe, N. Mornaga, and Y. Kamo, ARQ schemes wth adaptve modulaton/tdma/tdd systems for wreless multmeda communcaton servces, The 8th IEEE Internatonal Symp. on PIMRC 97, Sept. 997, pp [] D. J. Costello, J. Hagenauer, H. Ima, and S. B. Wcer, Applcaton of error-control codng, IEEE Transactons on Informaton Theory, vol. 44, Oct. 998, pp [4] Jung-Fu Cheng, Codng performance of hybrd ARQ schemes, IEEE Trans. on Conmmun., vol. 54, no.6, June 6, pp [5] R. Ahlswede, N. Ca, S.-Y. R. L, and R. W. Yeung, Networ nformaton flow, IEEE Transactons on Informaton Theory, vol.46, no., July, pp [6] S. Katt, H. Rahul, W. Hu, D. Katab, M. Medard, and J. Crowcroft, XORs n The Ar: Practcal Wreless Networ Codng, n Proc. of ACM SIGCOMM 6, July 6. [7] S. Sengupta, S. Rayanchu and S. Baneree, An Analyss of Wreless Networ Codng for Uncast Sessons: The Case for Codng-Aware Routng, n Proc. of IEEE INFOCOM 7, May 7, pp [8] D. Nguyen, T. Nguyen and B. Bose, Wreless broadcastng usng networ codng, n Thrd Worshop on Networ Codng, Theory, and Applcatons, Jan. 7. [9] E. Rozner, A. P. Iyer, Y. Mehta, L. Qu, and M. Jafry, ER: effcent retransmsson scheme for wreless lans, n Proc. of the 7 ACM CoNEXT conference, Dec. 7, pp. -. [] T. Tran, T. Nguyen, B. Bose, and V. Gopal A Hybrd Networ Codng Technque for Sngle-Hop Wreless Networs, IEEE Journal on Selected Areas n Com., vol. 7, no. 5, June 9, pp [] Z. Zheng, and P. Snha, XBC: XOR-based buffer codng for relable transmssons over wreless networs, n: Proc. IEEE BROADNETS, Sep. 7, pp [] M. Ghader, D. Towsley, and J. Kurose, Relablty Gan of Networ Codng n Lossy Wreless Networs, n Proc. of IEEE INFOCOM, Aprl 8, pp [] A. A. Yazd, S. Sorour, S. Valaee, and R. Y. Km Optmum Networ Codng for Delay Senstve Applcatons n WMAX Uncast, n Proc. of INFOCOM 9, Aprl 9, pp [4] H. Sofane, M. Patrc, and R. Davd, On the Impact of Random Losses on TCP Performance n Coded Wreless Mesh Networs, n Proc. of IEEE INFOCOM, March. APPENDIX Proof of lemma : We stll suppose that the central node retransmts P½ r round by round. We defne P½ r () and P½ r () ( >) as the loss pacets sets relevant to ½ r and ½r after the th round and we get P½ r () = P½ r, P½ r () = P r ½. Let random varable Y and Z (>) represent the cardnalty of P½ r () and P½ r (), furthermore, we defne Y = P½ r,

8 Z = P½ r. As the delveres are..d. and follow the Bernoull dstrbuton, random varables Y and Z ( = ; ;:::) are..d too and follow the Bnomal dstrbuton. Due to Y 6 Z, the entre pacets n P½ r () s able to be combned wth the ones belongng to P½ r () n next round. After the frst round, Y =! r Y and m =Z Y pacets n P½ r () are not delvered,.e. Z =! r Y +m. Because of! r 6! r, we explctly have Y 6 Z. It means that the entre pacets wthn P½ r () can be mxed wth the ones belongng to P½ r () over the next round n the same way. Now, we suppose that Y n 6 Z n (n > ). Then after the n th round, node R s falure to receve Y n+ =! r Y n pacets, so the central node has to retransmt these pacets n the next round. Moreover, m n = Z n Y n pacets n P½ r (n) are not delvered,.e. Z n+ =! r Y n +m n. Clearly, we have Y n+ 6 Z n+, whch ndcates that we are able to combne the entre pacets n P½ r (n +) wth the ones belongng to P½ r (n +). Then we deduce ½  ½ by nducton, and wor out the expect number of retransmssons requred to rescue ½. Ð Code = X Y = P ½ (9) =! r In partcular, Ð Natve natve pacets relevant to ½ would be delvered alone. Ð Natve = Z = Z + X (! r )Y = = P ½ P ½ (! r ) ()! r The lemma has been proved. Proof of theorem 7: Frst, we separate each coded pattern nto the correspondng natve patterns, n respect that a coded pattern can be consdered as the set consstng of loss pacet(s) requested by dstnct node(s) wth the same errorstate. For example, f a encoded pacet P n P r ;r ;r ½ contans loss pacets P r and P r, then we put P r and P r nto P½ r r and P ½ respectvely, where ½ =½ =½. After that, we cancel P from P r ;r ;r ½ and repeat these steps untl P r ;r ;r ½ = Á. In ths way, we only consder natve pacets n the followng proof. Second, let denote the set that contans the error patterns whch belong to ½ ( <) and the th entry s nonzero, partcularly = Á. Let denote the subset of ½ consstng of all those error patterns whose the th ( >) entres are zero, specally = ½ ª, where ½ s zero vector, and N = ½ N. Then the set U = [ s called the prmary set for node R,. Clearly, U \ U = Á, 6= and S N = U = S N = ½. Based on the above concepts and Theorem 5, for any loss pattern ½ n, there s a unque code group, CG = f½ ª ; ½ ;:::;½ w w μ U, where w = W (½ ), N and h ; ½. Furthermore, only the and entres of vector are equal to, and,! 6!, thereby Pr ½ ª > Pr ½ ª. We defne the loss pacets set P (n) ½ relatng to ½ CG after the n th round, and P () ½ = P ½. Let random varable Y n = P ½ (n) (n>). Snce the delveres are..d. and follow the Bernoull dstrbuton, random varables Y n (n =; ;:::) are..d and follow the Bnomal dstrbuton. Then usng the EAR approach, when the ntended node(s) s/are falure to receve a encoded pacet and some clent overheard t for the frst tme, these contaned natve pacets would be elmnated from ther orgnal sets and transferred to the matched sets respectvely. Therefore, after the n th round, Y n+ = Y n Pr ½½ª pacets have to be retransmtted n the next round. Notce that t dffers from the result n Lemma. Ths s due to the fact that the NC-ARQ technque s only nterest n whether the ntended nodes have already correctly obtans the coded pacet, yet the EAR approach not merely taes care of t, but also consders how to combne more requested pacets together whether they are encoded pacets or not. Then to rescue ½, node C s expected to retransmt Ð ½ tmes, Ð ½ = X Y KP ½ n = = Pr () ½½ª and Ð ½!½ pacets s transformed from P ½ to P ½. Ð ½!½ =Ð Pr ½ ½ ª () Note that ths result s the same as Theorem. On the other hand, some loss pacets relatng to ½ U t (t 6 ) would be relocated to P ½ (½ CG), f Prf½½ g >. And based on the defnton of the sets and, there s always an error pattern ½ x = ½ x Ut (t<) and ½ y enables to be combned wth ½ y. Because the th entry of ½ x s zero and of ½ y s non-zero, then f½ xg\f½ yg = Á and f½ xg[f½ yg=. Due to ½ x = ½ x, then we have Prf½ xg=prf½ x g, Prf½ x½ zg=prf½ x ½ z g ( ½ z =½ z ), x g, namely Ð ½ = x > Ð ½ x!½. In addton, we also have Pr ½ ª y =Pr ½ ª y Pr ½ ª ½ y =Pr ½ ª () ½ y P ½ x = P ½ x and Prf½ ½ xg>prf½ ½ Ð ½ x and Ð ½ x!½ for the reason ½ ½ = ½ y ½ y. Hence, we dvde the loss pacet set nto three parts P½ =Or½ [ S ½ (Ð x ½ x!½ )ª [ S ½ (Ð y ½ y!½ )ª P½ =Or½ [ S (Ð ½ x ½ x!½ ) ª [ S ½ (Ð y ½ y!½ ) ª Due to Or½ = K Prf½ g > Or ½ = K Prf½ g, we have Or½ [ S ½ (Ð ½ )ª x x!½ > Or ½ [ S (Ð ½ x ½ x!½ ) ª. Now, we assume W (½ )=, then S ½ y (Ð ½ y!½ ) ª =

9 S ½ (Ð ½ )ª =Á, thereby P y y!½ ½ =max fp ½g. If W (½ ) ½CG =, then Ð ½ y!½ 6= unless W (½ y)=. Based on (), () and (), we get Ð ½ y!½ > Ð ½ y!½ for each par (½ y ;½ y ), so P ½ =max fp ½g. Suppose P½ ½CG =max fp ½g ½CG s vald f W (½ )=n (n<). Then for W (½ )=n, there are [ (Ð ½ x!½ )ª = [ n (Ð ½ (w))ª w= x!½ [ ½ x ½ y (Ð ½ y!½ ) ª = [ n w= (Ð ½ y!½ (w)) ª where Ð ½!½ (w) s the set consstng of all the Ð ½!½ ( W (½) =w). Because of the assumpton, for each par (½ y; ½ y ), there arew (½ y) <n, and we have P ½ y > P ½ y, then accordng to (), () and (), we stll get Ð ½ y!½ > Ð ½ y!½. It s able to deduce Ð ½ x!½ (w) > Ð ½ y!½ (w), w [;n ]. Therefore, P½ =max fp ½g. ½CG Then by nducton, the equaton P½ =max fp ½g s ½CG avalable at all tme for each ½, where CG contans ½. Based on (), we have Ð ½ > Ð ½, namely after the central node retransmts Ð ½ tmes, CG has been already rescued, n other words CG s domnated by ½. Consequently, U Á and to rescue U s equvalent to recover loss pacets n P ½, ½. Furthermore, we defne that when the loss-state of a pacet n Or ½ (½ ) s altered, but stll belongs to, then ths pacet would be retaned n Or ½. Accordngly, rescue Or ½ means to delver a pacet n Or ½ untl ts loss-state ddn t belong to. In ths way, to recover P s equvalent to rescue Or. Now, let us proof that the expect number of retransmssons requred to rescue Or ½ ( ½ ) under the above defnton s Ð Or ½ = K Prf½g Q N =! (4) Frst, let ½ denote the pattern that ½ and W (½ )=, then Eq. (4) s obvously true for ½. Then Let ½ (t) denote the vector the t th entry s zero and W (½ (t)) =. Based on Theorem, to rescue loss pacets n Or ½ (t) relatng to ½ (t) (for smply, we also say that to rescue ½ (t) n Or ½ (t)), the expect number s Ð ½ (t) = K Prf½ (t)g Q! N t =! and to rescue ½ n Or ½ (t), the number s Ð ½ (t)!½ = Ð ½ (t) (! t) Q N =! Q N =! Snce ½ (t) can only be convert to ½, the number requred to rescue Or ½ (t) s Ð Or ½ (t) =Ð ½ (t) +Ð ½ (t)!½ = K Prf½ (t)g Q N =! Now, suppose, ths thess s true for any ½ n, W (½ n )= n +>. Then let ½ n (T ), T = ft :::;t n g, denote the pattern the T th entres are zero and W (½ n )= n. Usng Theorem, to rescue ½ n (T ) n Or ½n (T ), the number s Ð ½ n(t ) = K Prf½ n (T )g Q n =! t Q N =! and Ð ½n(T )!½ x(t ) =Ð ½ n (T ) Prf½ x(t )½ n (T )g pacets transformed to ½ x (T ), 6 x<n T =ft ;:::; t x g. If we operate these pacets as well as Or ½ x (T ), then n the lght of assumpton, the requred number to rescue them s Therefore, we have Ð Or ½n(T ) = X Ð Or ½x(T ) = Ð ½ n(t )!½ x(t ) Q N =! Ð Or +Ð ½ x(t ) ½x(T ½ ) n(t ) = Ð ½ n(t ) Q N =! X Prf½ x ½ n g +Ð ½ n(t ) ½ x(t ) = Ð ½ n(t ) ( Q n =! t ) Q N =! Q N =! +Ð ½ n(t ) = K Prf½ n(t )g Q N =! By nducton the proposton s proofed. Moreover, Ð =Ð Or = K P ½ Prf½g Q N =! = K Q N =! Q N =! then we fgure out the expected number of retransmssons requred to recover the entre loss pacets, NX NX NX Ð all = Ð U = Ð = = = = Dvdng KN, then gves the theorem. K Q N =! Q N =! (5)

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Lecture 4: November 17, Part 1 Single Buffer Management

Lecture 4: November 17, Part 1 Single Buffer Management Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Dynamic Method of Network Coding Based Retransmission for Wireless Multicast

Dynamic Method of Network Coding Based Retransmission for Wireless Multicast Dynamc Method of Networ Codng Based Retransmsson for Wreless Multcast Houy L State Key Lab of ISN Xdan Unversty X an Chna Emal: lhouy2013@hotmal.com Yng L State Key Lab of ISN Xdan Unversty X an Chna yl@mal.xdan.edu.com

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1]

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1] DYNAMIC SHORTEST PATH SEARCH AND SYNCHRONIZED TASK SWITCHING Jay Wagenpfel, Adran Trachte 2 Outlne Shortest Communcaton Path Searchng Bellmann Ford algorthm Algorthm for dynamc case Modfcatons to our algorthm

More information

The optimal delay of the second test is therefore approximately 210 hours earlier than =2.

The optimal delay of the second test is therefore approximately 210 hours earlier than =2. THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U) Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

18.1 Introduction and Recap

18.1 Introduction and Recap CS787: Advanced Algorthms Scrbe: Pryananda Shenoy and Shjn Kong Lecturer: Shuch Chawla Topc: Streamng Algorthmscontnued) Date: 0/26/2007 We contnue talng about streamng algorthms n ths lecture, ncludng

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

A new construction of 3-separable matrices via an improved decoding of Macula s construction

A new construction of 3-separable matrices via an improved decoding of Macula s construction Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work

More information

Graph Reconstruction by Permutations

Graph Reconstruction by Permutations Graph Reconstructon by Permutatons Perre Ille and Wllam Kocay* Insttut de Mathémathques de Lumny CNRS UMR 6206 163 avenue de Lumny, Case 907 13288 Marselle Cedex 9, France e-mal: lle@ml.unv-mrs.fr Computer

More information

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,

More information

Boostrapaggregating (Bagging)

Boostrapaggregating (Bagging) Boostrapaggregatng (Baggng) An ensemble meta-algorthm desgned to mprove the stablty and accuracy of machne learnng algorthms Can be used n both regresson and classfcaton Reduces varance and helps to avod

More information

Chapter - 2. Distribution System Power Flow Analysis

Chapter - 2. Distribution System Power Flow Analysis Chapter - 2 Dstrbuton System Power Flow Analyss CHAPTER - 2 Radal Dstrbuton System Load Flow 2.1 Introducton Load flow s an mportant tool [66] for analyzng electrcal power system network performance. Load

More information

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

Lecture 4. Instructor: Haipeng Luo

Lecture 4. Instructor: Haipeng Luo Lecture 4 Instructor: Hapeng Luo In the followng lectures, we focus on the expert problem and study more adaptve algorthms. Although Hedge s proven to be worst-case optmal, one may wonder how well t would

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

2.3 Nilpotent endomorphisms

2.3 Nilpotent endomorphisms s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms

More information

System in Weibull Distribution

System in Weibull Distribution Internatonal Matheatcal Foru 4 9 no. 9 94-95 Relablty Equvalence Factors of a Seres-Parallel Syste n Webull Dstrbuton M. A. El-Dacese Matheatcs Departent Faculty of Scence Tanta Unversty Tanta Egypt eldacese@yahoo.co

More information

Low Complexity Soft-Input Soft-Output Hamming Decoder

Low Complexity Soft-Input Soft-Output Hamming Decoder Low Complexty Soft-Input Soft-Output Hammng Der Benjamn Müller, Martn Holters, Udo Zölzer Helmut Schmdt Unversty Unversty of the Federal Armed Forces Department of Sgnal Processng and Communcatons Holstenhofweg

More information

Week 5: Neural Networks

Week 5: Neural Networks Week 5: Neural Networks Instructor: Sergey Levne Neural Networks Summary In the prevous lecture, we saw how we can construct neural networks by extendng logstc regresson. Neural networks consst of multple

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

Appendix B: Resampling Algorithms

Appendix B: Resampling Algorithms 407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles

More information

Markov Chain Monte Carlo Lecture 6

Markov Chain Monte Carlo Lecture 6 where (x 1,..., x N ) X N, N s called the populaton sze, f(x) f (x) for at least one {1, 2,..., N}, and those dfferent from f(x) are called the tral dstrbutons n terms of mportance samplng. Dfferent ways

More information

Expected Value and Variance

Expected Value and Variance MATH 38 Expected Value and Varance Dr. Neal, WKU We now shall dscuss how to fnd the average and standard devaton of a random varable X. Expected Value Defnton. The expected value (or average value, or

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

On the correction of the h-index for career length

On the correction of the h-index for career length 1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat

More information

Linear Approximation with Regularization and Moving Least Squares

Linear Approximation with Regularization and Moving Least Squares Lnear Approxmaton wth Regularzaton and Movng Least Squares Igor Grešovn May 007 Revson 4.6 (Revson : March 004). 5 4 3 0.5 3 3.5 4 Contents: Lnear Fttng...4. Weghted Least Squares n Functon Approxmaton...

More information

EEE 241: Linear Systems

EEE 241: Linear Systems EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Wreless Informaton Transmsson System Lab. Chapter 7 Channel Capacty and Codng Insttute of Communcatons Engneerng atonal Sun Yat-sen Unversty Contents 7. Channel models and channel capacty 7.. Channel models

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

COS 521: Advanced Algorithms Game Theory and Linear Programming

COS 521: Advanced Algorithms Game Theory and Linear Programming COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton

More information

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results. Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

Lecture 8: Time & Clocks. CDK: Sections TVS: Sections

Lecture 8: Time & Clocks. CDK: Sections TVS: Sections Lecture 8: Tme & Clocks CDK: Sectons 11.1 11.4 TVS: Sectons 6.1 6.2 Topcs Synchronzaton Logcal tme (Lamport) Vector clocks We assume there are benefts from havng dfferent systems n a network able to agree

More information

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA 4 Analyss of Varance (ANOVA) 5 ANOVA 51 Introducton ANOVA ANOVA s a way to estmate and test the means of multple populatons We wll start wth one-way ANOVA If the populatons ncluded n the study are selected

More information

MODELING TRAFFIC LIGHTS IN INTERSECTION USING PETRI NETS

MODELING TRAFFIC LIGHTS IN INTERSECTION USING PETRI NETS The 3 rd Internatonal Conference on Mathematcs and Statstcs (ICoMS-3) Insttut Pertanan Bogor, Indonesa, 5-6 August 28 MODELING TRAFFIC LIGHTS IN INTERSECTION USING PETRI NETS 1 Deky Adzkya and 2 Subono

More information

Affine transformations and convexity

Affine transformations and convexity Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

Chapter Newton s Method

Chapter Newton s Method Chapter 9. Newton s Method After readng ths chapter, you should be able to:. Understand how Newton s method s dfferent from the Golden Secton Search method. Understand how Newton s method works 3. Solve

More information

HMMT February 2016 February 20, 2016

HMMT February 2016 February 20, 2016 HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

arxiv: v1 [math.ho] 18 May 2008

arxiv: v1 [math.ho] 18 May 2008 Recurrence Formulas for Fbonacc Sums Adlson J. V. Brandão, João L. Martns 2 arxv:0805.2707v [math.ho] 8 May 2008 Abstract. In ths artcle we present a new recurrence formula for a fnte sum nvolvng the Fbonacc

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run

More information

Temperature. Chapter Heat Engine

Temperature. Chapter Heat Engine Chapter 3 Temperature In prevous chapters of these notes we ntroduced the Prncple of Maxmum ntropy as a technque for estmatng probablty dstrbutons consstent wth constrants. In Chapter 9 we dscussed the

More information

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or Sgnal Compresson Sgnal Compresson Entropy Codng Entropy codng s also known as zero-error codng, data compresson or lossless compresson. Entropy codng s wdely used n vrtually all popular nternatonal multmeda

More information

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method

More information

On Spatial Capacity of Wireless Ad Hoc Networks with Threshold Based Scheduling

On Spatial Capacity of Wireless Ad Hoc Networks with Threshold Based Scheduling On Spatal Capacty of Wreless Ad Hoc Networks wth Threshold Based Schedulng Yue Lng Che, Ru Zhang, Y Gong, and Lngje Duan Abstract arxv:49.2592v [cs.it] 9 Sep 24 Ths paper studes spatal capacty n a stochastc

More information

Lecture 10: May 6, 2013

Lecture 10: May 6, 2013 TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,

More information

Network Coding Based Schemes for Imperfect Wireless Packet Retransmission Problems: A Divide and Conquer Approach

Network Coding Based Schemes for Imperfect Wireless Packet Retransmission Problems: A Divide and Conquer Approach Wreless Pers Commun DOI 101007/s11277-010-0102-9 Network Codng Based Schemes for Imperfect Wreless Packet Retransmsson Problems: A Dvde and Conquer Approach Zhenguo Gao Me Yang Janpng Wang Klara Nahrstedt

More information

Adaptive Consensus Control of Multi-Agent Systems with Large Uncertainty and Time Delays *

Adaptive Consensus Control of Multi-Agent Systems with Large Uncertainty and Time Delays * Journal of Robotcs, etworkng and Artfcal Lfe, Vol., o. (September 04), 5-9 Adaptve Consensus Control of Mult-Agent Systems wth Large Uncertanty and me Delays * L Lu School of Mechancal Engneerng Unversty

More information

XOR Rescue: Exploiting Network Coding in Lossy Wireless Networks

XOR Rescue: Exploiting Network Coding in Lossy Wireless Networks XOR Rescue: Explotng Network Codng n Lossy Wreless Networks Fang-Chun Kuo Kun Tan XangYang L Jansong Zhang Xaomng Fu ABSTRACT Users ncreasngly depend on WLAN for busness and entertanment. It s well-recognzed

More information

Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability

Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability Connectng Multple-uncast and Network Error Correcton: Reducton and Unachevablty Wentao Huang Calforna Insttute of Technology Mchael Langberg Unversty at Buffalo, SUNY Joerg Klewer New Jersey Insttute of

More information

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem.

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem. Lecture 14 (03/27/18). Channels. Decodng. Prevew of the Capacty Theorem. A. Barg The concept of a communcaton channel n nformaton theory s an abstracton for transmttng dgtal (and analog) nformaton from

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information

x = , so that calculated

x = , so that calculated Stat 4, secton Sngle Factor ANOVA notes by Tm Plachowsk n chapter 8 we conducted hypothess tests n whch we compared a sngle sample s mean or proporton to some hypotheszed value Chapter 9 expanded ths to

More information

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41, The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003 Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel

More information

a b a In case b 0, a being divisible by b is the same as to say that

a b a In case b 0, a being divisible by b is the same as to say that Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :

More information

Homework Assignment 3 Due in class, Thursday October 15

Homework Assignment 3 Due in class, Thursday October 15 Homework Assgnment 3 Due n class, Thursday October 15 SDS 383C Statstcal Modelng I 1 Rdge regresson and Lasso 1. Get the Prostrate cancer data from http://statweb.stanford.edu/~tbs/elemstatlearn/ datasets/prostate.data.

More information

Generalized Linear Methods

Generalized Linear Methods Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

Lecture 12: Discrete Laplacian

Lecture 12: Discrete Laplacian Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly

More information

Economics 101. Lecture 4 - Equilibrium and Efficiency

Economics 101. Lecture 4 - Equilibrium and Efficiency Economcs 0 Lecture 4 - Equlbrum and Effcency Intro As dscussed n the prevous lecture, we wll now move from an envronment where we looed at consumers mang decsons n solaton to analyzng economes full of

More information

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,

More information

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests Smulated of the Cramér-von Mses Goodness-of-Ft Tests Steele, M., Chaselng, J. and 3 Hurst, C. School of Mathematcal and Physcal Scences, James Cook Unversty, Australan School of Envronmental Studes, Grffth

More information

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin Proceedngs of the 007 Wnter Smulaton Conference S G Henderson, B Bller, M-H Hseh, J Shortle, J D Tew, and R R Barton, eds LOW BIAS INTEGRATED PATH ESTIMATORS James M Calvn Department of Computer Scence

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

The Geometry of Logit and Probit

The Geometry of Logit and Probit The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.

More information

High resolution entropy stable scheme for shallow water equations

High resolution entropy stable scheme for shallow water equations Internatonal Symposum on Computers & Informatcs (ISCI 05) Hgh resoluton entropy stable scheme for shallow water equatons Xaohan Cheng,a, Yufeng Ne,b, Department of Appled Mathematcs, Northwestern Polytechncal

More information

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com

More information

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.

More information

Outline and Reading. Dynamic Programming. Dynamic Programming revealed. Computing Fibonacci. The General Dynamic Programming Technique

Outline and Reading. Dynamic Programming. Dynamic Programming revealed. Computing Fibonacci. The General Dynamic Programming Technique Outlne and Readng Dynamc Programmng The General Technque ( 5.3.2) -1 Knapsac Problem ( 5.3.3) Matrx Chan-Product ( 5.3.1) Dynamc Programmng verson 1.4 1 Dynamc Programmng verson 1.4 2 Dynamc Programmng

More information

Lecture 5 Decoding Binary BCH Codes

Lecture 5 Decoding Binary BCH Codes Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture

More information

Recover plaintext attack to block ciphers

Recover plaintext attack to block ciphers Recover plantext attac to bloc cphers L An-Png Bejng 100085, P.R.Chna apl0001@sna.com Abstract In ths paper, we wll present an estmaton for the upper-bound of the amount of 16-bytes plantexts for Englsh

More information

Turbulence classification of load data by the frequency and severity of wind gusts. Oscar Moñux, DEWI GmbH Kevin Bleibler, DEWI GmbH

Turbulence classification of load data by the frequency and severity of wind gusts. Oscar Moñux, DEWI GmbH Kevin Bleibler, DEWI GmbH Turbulence classfcaton of load data by the frequency and severty of wnd gusts Introducton Oscar Moñux, DEWI GmbH Kevn Blebler, DEWI GmbH Durng the wnd turbne developng process, one of the most mportant

More information

Parametric fractional imputation for missing data analysis. Jae Kwang Kim Survey Working Group Seminar March 29, 2010

Parametric fractional imputation for missing data analysis. Jae Kwang Kim Survey Working Group Seminar March 29, 2010 Parametrc fractonal mputaton for mssng data analyss Jae Kwang Km Survey Workng Group Semnar March 29, 2010 1 Outlne Introducton Proposed method Fractonal mputaton Approxmaton Varance estmaton Multple mputaton

More information

A Fast Computer Aided Design Method for Filters

A Fast Computer Aided Design Method for Filters 2017 Asa-Pacfc Engneerng and Technology Conference (APETC 2017) ISBN: 978-1-60595-443-1 A Fast Computer Aded Desgn Method for Flters Gang L ABSTRACT *Ths paper presents a fast computer aded desgn method

More information

Composite Hypotheses testing

Composite Hypotheses testing Composte ypotheses testng In many hypothess testng problems there are many possble dstrbutons that can occur under each of the hypotheses. The output of the source s a set of parameters (ponts n a parameter

More information