arxiv: v2 [cond-mat.stat-mech] 4 Apr 2018

Size: px
Start display at page:

Download "arxiv: v2 [cond-mat.stat-mech] 4 Apr 2018"

Transcription

1 arxiv: v [cond-mat.stat-mech] 4 Ar 018 Designing Memory Bits with Dissiation lower than the Landauer s Bound Saurav Talukdar, Shreyas Bhaban, James Melbourne and Murti V. Salaaka* 00 Union Street SE, University of Minnesota, Minneaolis, MN 55455, USA *murtis@umn.edu March 018 Abstract. A Brownian article in a symmetric double well otential is used as a reresentation for a single bit memory, where, the location of the article in either well denotes one of the two states of a single bit memory. This article analyzes the effect of modifications to a symmetric double well otential on the minimum heat dissiation associated with erasure of the information stored in a single bit memory. Two tyes of modifications are considered, viz., overla between the two wells and the asymmetry between the two wells of a bit of memory. Moreover, the analysis resented here, takes into account the uncertainty in the success of the erasure rocess. We quantify the effect of the roosed modifications on the heat dissiation accomanying erasure of a bit of information with a comarison to the Landauer s bound. In articular, we conclude that the roosed modifications could result in the minimum heat dissiation being lower than the Landauer s bound in quasi-static erasure rocesses. Furthermore, we quantify the hysical asect ratio for designing a memory bit which could imrove memory density. 1. Introduction: file rearation and submission Over the last four decades, the semiconductor industry has made significant headway in imroving the erformance of CMOS-FET devices, while consistently reducing their size. It has enabled tremendous imrovements in the caabilities of ersonal comuters, latos and smart hones; to the oint where a modern smart hone is several hundred times faster than the comutational abilities of devices that guided the NASA s travel to the moon in A crucial enabler is increase in energy efficiency of comuting devices without comromising on erformance. Recent research is focused toward investigating fundamental limits on how efficient a device can be or how small its hysical dimensions can get; an idea resonating with the limit on heat engine efficiency roosed by Carnot [1]. Subsequent fundamental contributions [, 3, 4] demonstrated a link between the fields of Thermodynamics and Information Theory, leading to an imortant understanding of the limits on the consumtion of energy in erforming bit level oerations.

2 Author guidelines for IOP Publishing journals in L A TEX ε 6 5 U(x)(k b T ) E Distance(m) 10-6 Figure 1. A symmetric double well otential, U(x), where the location of the article in the left and right well designate the state zero and one resectively of a single bit memory. Here, E denotes the barrier height. A oular model of a single bit memory is a Brownian article in a symmetric double well otential in a heat bath of constant temerature T, with the two identical wells searated by a barrier of sufficient height as shown in Fig. 1. The resence of the article in either well denotes one of the ossible two states of a single bit memory. In this article, we designate the article s resence in the left well and right well as state zero and one of the memory resectively. The resence of an energy barrier of sufficient height ( k B T, k B is the Boltzmann constant), ensures that information is retained for a long duration, as is desired from a memory bit. Erasure of a bit of information is a comutational ste, where the outcome is zero irresective of the initial state of the memory bit. In simle terms, irresective of whether the article resides in the right or left well, it needs to be transorted to the left well to accomlish a successful erasure. Landauer s rincile [], asserts that, erasure of a bit of information, rovided both states of a single bit memory are identical, is accomanied by an average heat dissiation of at least k B T ln. Landauer argued that erasure of information lowers the entroy of the overall system and thus, is to be accomanied by heat dissiation to the surrounding. Bennett further utilized Landauer s argument to exlain Maxwell s demon to avoid a aradox violating the second law of thermodynamics [4, 5]. Following the original work of Landauer, there are numerous analytical[6, 7] and exerimental studies[8, 9, 10, 11, 1, 13, 14] focused on the minimal energy consumtion related to information rocessing. A recent interest is on devising erasure mechanisms which result in heat dissiation lower than k B T ln (also referred to as the Landauer s bound). In this regard, researchers have studied the effect of uncertainty in the erasure rocess and have shown that artially successful erasures result in heat dissiation lower than the Landauer s bound [15, 16]. It is shown in [15, 16] that an average heat dissiation of k B T (ln + ln +(1 ) ln (1 )), referred as the Generalized Landauer Bound, is associated with erasure of a bit of

3 Author guidelines for IOP Publishing journals in L A TEX ε 3 information stored in a symmetric one bit memory, with being success roortion of the erasure rocess. An interesting observation is that, a slight comromise on accuracy (by about 10%) of the erasure lowers the associated minimum heat dissiation significantly (by about 50%). Here, the assumtion as made in the revious studies [6, 8, 9, 10, 11, 1, 13, 14] is that, there is insignificant overla between the two hysical states that realize the single bit memory, that is, the two states of a memory bit have sufficient hysical searation. In this article, we analyze the Generalized Landauer Bound (GLB) and its relation to the hysical searation between the two states of a one bit memory (that is, size of the memory bit) in the cases where the two states are identical or not identical. We refer to allowing overla and asymmetry between the two states as introducing modifications in a memory bit. This article analyzes the effect of these modifications on the Generalized Landauer Bound and rovides directions for designing memory devices with lower dissiation. Our aroach introduces an overla arameter and uses roerties of mixture of Gaussian distributions to derive bounds on change in entroy associated with artial information erasure. The derived bounds converge to the GLB when the overla between the two states become insignificant and hence is consistent with existing results in the literature [15, 16, 6]. We quantify the relationshi between the overla and the reduction in entroy change and utilize it to arrive at GLB. Here, we derive sub-gaussian uer bounds analytically as oosed to the numerical study of entroy aroximations for bit erasure in [17]. Furthermore, we obtain comlimentary lower bounds on the decrease in thermodynamic entroy, demonstrating that these bounds are reasonably shar; and for bi-stable wells, hysically searated by lengths close to their standard deviation, the error in entroy aroximation incurred by the insignificant overla aroximation is significant. These quantitative results are of immediate alication as they allow a tight aroximation of the change in entroy in erasure rocess, relevant to the recise estimation of the associated minimal heat dissiation. A quantitative analysis is also rovided for the case when the two states of memory are non identical and the erasure rocess moves the state into the well with higher volume. Moreover, we also quantify a hysical asect ratio for designing a memory bit, where a value higher than the one secified in this article is inconsequential from the energetics standoint and could ossibly imrove memory density.. Single Bit Memory and Erasure Process Following the original work of [], we consider a Brownian article in a double well otential as a model for a single bit memory. The location of the article in either well designates the state of the memory as 0 or 1. In this article, if the article is located in the left well, we denote the state of memory as 0 and if the article is located in the right well, we denote the state as 1. The article in either well is in thermal equilibrium with the surrounding whose temerature is assumed to be a constant T. For most art of this article, we assume that both the wells are identical unless secified.

4 Author guidelines for IOP Publishing journals in L A TEX ε 4 In recent exerimental validations of Landauer s rincile [8, 18, 9, 1], it is seen that the double well otential in the neighborhood of the two stable states can locally be aroximated as a convex quadratic function. It then follows from the Canonical distribution exression that the equilibrium robability distribution is aroximately a Gaussian distribution. Henceforth, we assume that the equilibrium robability distributions of the article in the left and right well are N ( µ, σ ) and N (µ, σ ) resectively, where N (µ, σ ) denotes a Normal distribution with mean µ and variance σ. Thus, if the memory is in the state 0 the equilibrium robability distribution of the article is f 0 (x) = Ce (x+µ) /σ and if the memory state is 1 the equilibrium robability distribution of the article state is f 1 (x) = Ce (x µ) /σ, where x denotes the osition of the article and C is the normalization constant. This assumtion is consistent with the notion of memory as described in [19], where a single bit memory is defined as a system with two stable states, such that, the system is locally in equilibrium in either state and stays in one of the stable states (information retention) for the duration the memory bit is valid (related to the Kramer s escae time across a barrier), after which, stored information is said to be lost. In this article we study the effect of overla between the two wells of the double well otential (that is, the effect of overla between the two equilibrium robability distributions of the two states of a single bit memory) on the Landauer s bound. The two distributions intersect at x = 0, where, f 0 (0) = f 1 (0) = Ce / with := µ/σ. Thus, the overla between the two distributions is characterized by the arameter, which is referred to as the overla arameter. Higher(lower) the value of, lower(greater) is the overla between the two equilibrium distributions. Moreover, is also indicative of the asect ratio of the memory bit as well as hysical extent of the memory bit for a known standard deviation of the equilibrium robability distributions. Prior to erasure, it is equally likely for the state of the memory, M, to be zero or one, that is, P (M = 0) = P (M = 1) = 1. The robability of finding the Brownian article between x and x + dx is given by, P (X (x, x + dx)) = P (M = 0)P (X (x, x + dx) M = 0) + P (M = 1)P (X (x, x + dx) M = 1) = 1 f 0(x)dx + 1 f 1(x)dx. (1) Thus, the robability distribution function,f(x), of the article rior to undergoing an erasure rocess, is an equally weighted mixture of f 0 (x) and f 1 (x). In order to reresent a valid single bit memory, this distribution must be a bi-modal distribution (due to a symmetric double well stable otential). In this regard, an interesting result from the Statistics community is worth mentioning: an equally weighted mixture of symmetric Gaussian distributions is uni-modal if and only if 1; otherwise it is bi-modal [0]. Thus, in order to reresent a symmetric single bit memory with two well defined states, f(x) needs to be a bi-modal distribution with the two modes being alike. Hence, a single bit memory must have > 1 in order to be a valid memory bit.

5 Author guidelines for IOP Publishing journals in L A TEX ε 5 (a) (b) Figure. (a) Probability distribution and (b) the resulting single well otential obtained from simulations. Here, µ = 30 nm, σ = 36 nm and thus < 1. (a) (b) Figure 3. (a) Probability distribution and (b) resulting double well otential obtained from simulations. Here, µ = 700 nm,, σ = 36 nm and thus > 1. Fig. shows the equivalent robability distribution f(x), obtained by binning samles drawn at random from f(x), and otential U(x) = ln f(x) k C BT obtained, when µ = 30 nm, σ = 36 nm(that is, < 1). It is seen that the distribution is uni-modal (the corresonding otential is a single well otential), and cannot be used to realize the two states of a single bit memory. However, µ = 700 nm and σ = 36 nm results in > 1, thereby ensuring a symmetric bimodal distribution and a symmetric double well otential as seen in Fig. 3, which results in a well defined memory bit. It is imortant to note that the overla arameter deends on the hysical design of the memory bit (the double well otential recisely). The > 1 condition is satisfied in recent studies on Landauer s bound [8, 18, 9, 1]. Erasure is a rocess where irresective of the initial state of the memory bit, the final state is zero (also known as reset to zero). With regards to the article in a double well otential reresentation of a single bit memory, irresective of the initial location of the article, the article needs to be transferred to the left well. The Generalized Landauer Bound (GLB) from [15, 16, 8] states that, if the robability of success of the erasure rocess is, then the associated average heat dissiation is at least k B T (ln + ln + (1 ) ln(1 )). The GLB evaluates to k B T ln for = 1; to 0

6 Author guidelines for IOP Publishing journals in L A TEX ε 6 Figure 4. GLB as a function of success roortion. for = 0.5 and is shown in Fig. 4 as a function of the success robability. Note that < 0.5 is not considered here as it would imly a reset to one oeration. It is imortant to oint out that the success roortion,, deends on the rotocol used for accomlishing the erasure. We would like to bring the attention of the reader to [8, 1, 1], where, the authors discuss the deendence of success roortion on rotocol arameters. Under the assumtion of > 1, we analyze the effect of overla arameter on the generalized Landauer bound. The robability distribution function of the article before undergoing erasure, f(x), is given by, f(x) = 1 f 0(x) + 1 f 1(x) (see eq. (1)). After alying an erasure rotocol to the memory bit with success robability, the robability of finding a article between x and x + dx is given by, P (X (x, x + dx)) = f 0 (x)dx + (1 )f 1 (x)dx. () Let, g(x) := f 0 (x) + (1 )f 1 (x). The thermodynamic entroy of the system before erasure is, S f = k B f(x) ln(f(x))dx, and after undergoing erasure rocess with a success roortion is, S g = k B g(x) ln(g(x))dx. It follows from the nd Law of Thermodynamics that the average heat dissiation, where, I 1 = 1 π e x e 1 π e Q d T (S f S g ) = k B T (I 1 I ), x e (e x + (1 )e x ) ln(e x + (1 )e x )dx. cosh(x) ln(cosh(x))dx and I = The deendence of I 1 I on the overla arameter, is shown in Fig. 5. It is seen that k B T (I 1 I ) aroaches the GLB for large values of the overla arameter. Note that for.1, the decrease in thermodynamic entroy, k B (I 1 I ) is less than k B ( ln +(1 ) ln(1 )+ln ) and is aroximately equal to k B ( ln +(1 ) ln(1 ) + ln ), when > 5. Thus, as seen from Fig. 5, for a given success roortion and 1 < < 5, the associated minimum average heat dissiation due to erasure is lower than the GLB. Hence, introducing overla (by reducing the hysical searation)

7 Author guidelines for IOP Publishing journals in L A TEX ε 7 I 1 - I = 0.6 = 1.1 = 1.6 =.1 =.6 = 3.1 = 3.6 = 4.1 = 4.6 = 8 = 10 = 14 = 18 = 0 ln()+(1-)ln(1-)+ln Success Proortion() Figure 5. I 1 I as a function of for various values of. I 1 I aroaches ln + (1 ) ln(1 ) + ln (red curve) as increases. between the two states of the memory bit can enable energy dissiation lower than the GLB in erasure rocesses. We would like to mention that the success roortion is deendent on the rotocol used for erforming erasure. The reader should refer to [8, 1] to understand that success roortion is deendent on a rotocol arameter and the nature of the double well otential. So, in order to achieve the same success roortion with different values of, the rotocol needs to be changed accordingly. Designing of erasure rotocols which maintains the roortion of success for various values of the overla arameter is beyond the scoe of this article. We now derive uer and lower bounds to the change in entroy as a function of the success roortion and searation arameter, that converge to the GLB as the arameter. Consider, Y g g(.) := N( µ, σ ) + (1 )N(µ, σ ), X g g(.) := N (, 1) + (1 )N (, 1), then, S g = S g + k B ln σ []. Similarly, for = 1, and X f f(.) := 1 N (, 1)+ 1N (, 1), we have S f = S f +k B ln σ. Thus, S f S g = S f S g. Henceforth, we will consider f 0 (x) = Ce (x+ ) and f 1 (x) = Ce (x ), where C = 1 π symbol x is overloaded and scaled with σ. and the 3. Uer and lower bounds on the change in entroy during erasure For the derivation below it is assumed that [0.5, 1) and > 1. Aendix) that, It follows (see f 0 (x) ln(f 0 (x) + (1 )f 1 (x))dx f 0 (x) ln (f 0 (x))dx < C((1 ) + ln ( e4 ))e /. (3)

8 Author guidelines for IOP Publishing journals in L A TEX ε 8 Similarly, one can show that, (1 )f 1 (x) ln(f 0 (x) + (1 )f 1 (x))dx (1 )f 1 (x) ln ((1 )f 1 (x))dx < C( + (1 ) ln ( e4 1 ))e /. (4) Let K := f 0(x) ln(f 0 (x))dx = f 1(x) ln(f 1 (x))dx. Using eq. (3) and eq. (4) with = 1 leads to the following lower bound on S f, S f k B ( K + ln C( ln )e / ). (5) From eq. (3) and (4), it also follows that, S g k B ( ln + (1 ) ln(1 ) + K + C( + ln + (1 ) ln(1 ) + 4 )e / ). (6) In the Aendix, we also derive lower bounds for the difference, f 0 (x) ln(f 0 (x) + (1 )f 1 (x))dx (1 )f 1 (x) ln(f 0 (x) + (1 )f 1 (x))dx f 0 (x) ln (f 0 (x))dx, and, (1 )f 1 (x) ln ((1 )f 1 (x))dx. Using eq. (16) and (17) with = 1/, we obtain the following uer bound on S f, S f k B ( K + ln ln (1 + e )). (7) Furthermore, from eq. (16) and (17), we obtain the following lower bound on S g, S g k B (K + ln + (1 ) ln (1 ) + ln(1 + 1 ) + (1 ) ln(1 + )). e 1 e (8) It follows from eq. (5) and (7) that, k B ( K + ln C( ln )e / ) Similarly, it follows from eq. (6) and (8) that, S f k B ( K + ln ln (1 + e )). (9) k B (K H() + ln(1 + 1 e ) + (1 ) ln(1 + 1 e )) S g k B (K H() + C( H() + 4 )e / ), (10)

9 Author guidelines for IOP Publishing journals in L A TEX ε 9 Bounds on (S f -S g )/k B Lower Bound GLB Uer Bound Figure 6. Lower and Uer bounds of (S f S g )/k B and the GLB as a function of for = 0.8. where, H() = ln (1 ) ln (1 ). Using eq. (9) and (10), the difference between the initial and final entroy, S f S g, satisfies the following bounds, S f S g k B (ln H() ln (1 + e ) + C( H() + 4 )e / ), and, (11) S f S g k B (ln H() C( ln )e / + ln(1 + 1 e )+ (1 ) ln(1 + 1 e )). (1) 4. Relationshi to the Generalized Landauer Bound Note from eq. (11) and (1), lim S f S g = k B [ln()+ ln()+(1 ) ln(1 )](GLB); where the uer and lower bounds on the change in entroy, both converge to the GLB. The convergence to the limit is exonentially fast with regards to the overla arameter for the uer and lower bound. Thus, in the limiting case of, it follows from Q d T the nd Law of Thermodynamics that, k B [ln() + ln() + (1 ) ln(1 )], imlying that for a quasi static erasure with success roortion, Q d = k B T [ln() + ln() + (1 ) ln(1 )]. In Figure 6, we resent the above lower and uer bounds on (S f S g )/k B as a function of the overla arameter for = 0.8. The exonential convergence to the GLB value for = 0.8 is evident. Table 1 lists the difference between the uer (eq. (11)) and lower (eq. (1)) bounds of (S f S g )/k B for various values of the overla arameter,, and success roortion,, where, 5 is the seen as the transition oint, beyond which, increasing (that is, the size of the memory bit) has insignificant gains from an energetics ersective. The recent exerimental studies on verification of the Landauer s bound [8, 1, 9] had 0, which indicates that there is scoe to realize memory that is more closely acked. The case of = 1 has to be considered searately. S g = k B K. It then follows from eq. (5) and (7) that, S f S g k B (ln C( ln )e / ), S f S g k B (ln ln (1 + e )). If = 1, g(x) = f 0 (x) and

10 Author guidelines for IOP Publishing journals in L A TEX ε 10 Table 1. Difference between the uer(eq. (11)) and lower(eq. (1)) bounds of (S f S g )/k B as a function of and e e e 4 In the case = 1 as well, it follows that lim S f S g Landauer s bound. = k B ln(), which is the 5. Extensions to Asymmetric 1 bit Memory In this section, we extend the GLB to asymmetric single bit memory, where the two states are non identical wells. An asymmetric one bit memory and the associated minimum heat dissiation for its erasure is discussed in [19, 11]. In articular, [11] resents an exerimental study of the minimum heat dissiation for erfect erasures of a bit of asymmetric memory, with one well being wider than the other, and considers the two cases of resetting the bit into the wider and narrower well. Motivated from the discussion in [11], we extend the GLB to the case of non-identical wells, where, one well is wider than the other. We assume that initially, the article has equal robability to be in either well and the initial robability distribution of the article is given by f(x) as described earlier (see eq. (1)). Similarly, for erasures with success roortion, the final robability distribution of the article is given as g(x) (see eq. ()) Erasing into low entroy well (x µ) e (βσ) Consider f 0 (x) = Ce (x+µ) σ and f 1 (x) = C with β > 1. The article has higher β entroy in the state 1 as comared to state 0. In this case, for reset to zero with success roortion, once can show that lim S f S g = k B [ ln + (1 ) ln(1 ) + ( 1 (1 )) ln β +ln ]. The rate of convergence is exonential with resect to the arameter and deends inversely on the arameter β. Thus, in the limiting case of the two wells being sufficiently far aart and a quasi-static erasure rocess with success roortion, Q d = k B T [ ln +(1 ) ln(1 )+( 1 (1 )) ln β+ln ]. Here, the bit was erased into the well with lower entroy, hence, the limiting value of the change in entroy is higher than the identical wells case. In Figure 7 the heat dissiation associated with erasing into the low entroy well is shown for various values of the asymmetry arameter β and is comared with the Generalized Landauer Bound. It is seen that, as the asymmetry arameter is increased, the associated heat dissiation also increases for various success

11 Author guidelines for IOP Publishing journals in L A TEX ε 11 Q d (k B T) β = 1.1 β = 1.6 β =.1 GLB Success Proortion() Figure 7. Minimum heat dissiation associated with erasing into low entroy well in a quasi static manner. roortions. The case of erasing into the high entroy well is much more interesting and is resented next. 5.. Erasing into high entroy well Consider erasing into the higher entroy well, that is, f 1 (x) = Ce (x µ) σ and f 0 (x) = (x+µ) e (βσ) C with β > 1. Here, the article has higher entroy in the state 0 as comared β to state 1. In this case, for reset to zero with success roortion, once can show that lim S f S g = k B [ ln + (1 ) ln(1 ) + ((1 ) 1 ) ln β + ln ]. The rate of convergence is exonential with resect to the arameter and deends inversely on the arameter β. Thus, in the limiting case of the two wells being sufficiently far aart, Q d = k B T [ ln +(1 ) ln(1 ) ( 1 (1 )) ln β+ln ]. Here, the bit was erased into the well with higher entroy, hence, the limiting value of the change in entroy is lower than the identical wells case. In Figure 8 the heat dissiation associated with erasing into the low entroy well is shown for various values of the asymmetry arameter β and is comared with the Generalized Landauer Bound. It is seen that, as the asymmetry arameter is increased, the associated heat dissiation also increases for various success roortions. In this case, it is seen that erasure can be achieved without any associated heat dissiation. Hence, asymmetry can be utilized toward realizing logically irreversible comutations with zero dissiation. 6. Conclusion We quantify the deendence of the decrease in entroy associated with erasure of a bit of information on the amount of overla between the equilibrium distributions of the two states of a one bit memory. It is seen that overla can lead to considerably lower heat dissiation as comared to the GLB in a quasi static erasure rocess. In articular, we resent quantitative bounds on the change in entroy associated with artial information erasure, which exonentially converge to the GLB when the hysical searation between

12 Author guidelines for IOP Publishing journals in L A TEX ε 1 Q d (k B T) β = 1.1 β = 1.6 β =.1 GLB Success Proortion() Figure 8. Minimum heat dissiation associated with erasing into high entroy well in a quasi static manner. the two states is large. A conclusion is reached that 5 reresents a threshold for energetics of comutation associated with a single bit memory, and memory bit designs with > 5 have insignificant gains comared to 5 case from an energetics ersective. This could ossibly be a memory bit design guideline, which might lead to imrovements in memory density. Furthermore, we discussed the effect of asymmetry between the two wells of a single bit memory on the associated minimum heat dissiation for erasure rocesses. It is seen that, the decrease in entroy associated with erasing into the state with lower volume, results in minimum heat dissiation for a quasi static erasure rocess being higher than the GLB. However, erasing into the state with higher volume, results in the associated minimum heat dissiation for a quasi static erasure rocess being not only lower than the GLB but also with no associated dissiation. Thus, hysical modifications in a single bit memory either due to overla between the two states or due to asymmetry between the two states, along with uncertainty in the outcome of the erasure rocess, are some mechanisms to realize erasures with heat dissiation lower than the Landauer bound. 7. Acknowledgments We would like to thank Prof. Arnab Sen, Deartment of Mathematics, University of Minnesota for initial discussion about the roblem. The authors acknowledge the suort of the National Science Foundation for funding the research under Grant No. CMMI References [1] Sadi Carnot, Hiolyte Carnot, and William Thomson Baron Kelvin. Reflections on the motive ower of heat and on machines fitted to develo that ower. J. Wiley, [] Rolf Landauer. Irreversibility and heat generation in the comuting rocess. IBM Journal of Research and Develoment, 5(3): , [3] John von Neumann and Arthur W Burks. Theory of self-reroducing automata

13 Author guidelines for IOP Publishing journals in L A TEX ε 13 [4] Charles H Bennett. The thermodynamics of comutation : A review. International Journal of Theoretical Physics, 1(1): , 198. [5] HS Lef and AF Rex. Maxwell demon : Entroy, classical and quantum information. Comuting (Institute of Physics Publishing, Bristol and Philadelhia, 003), 003. [6] Kousuke Shizume. Heat generation required by information erasure. Physical Review E, 5(4):3495, [7] Raoul Dillenschneider and Eric Lutz. Memory erasure in small systems. Physical Review Letters, 10(1):10601, 009. [8] Antoine Bérut, Artak Arakelyan, Artyom Petrosyan, Sergio Ciliberto, Raoul Dillenschneider, and Eric Lutz. Exerimental verification of landauer/ s rincile linking information and thermodynamics. Nature, 483(7388): , 01. [9] Yonggun Jun, Momčilo Gavrilov, and John Bechhoefer. High-recision test of landauer s rincile in a feedback tra. Physical review letters, 113(19):190601, 014. [10] Jeongmin Hong, Brian Lambson, Scott Dhuey, and Jeffrey Bokor. Exerimental test of landauers rincile in single-bit oerations on nanomagnetic memory bits. Science Advances, (3):e150149, 016. [11] Momčilo Gavrilov and John Bechhoefer. Erasure without work in an asymmetric double-well otential. Physical Review Letters, 117(0):00601, 016. [1] Saurav Talukdar, Shreyas Bhaban, and Murti V Salaaka. Memory erasure using time-multilexed otentials. Physical Review E, 95(6):0611, 017. [13] I Neri, M Loez-Suarez, D Chiuchiú, and L Gammaitoni. Reset and switch rotocols at landauer limit in a grahene buckled ribbon. EPL (Eurohysics Letters), 111(1):10004, 015. [14] Miquel Loez-Suarez, Igor Neri, and Luca Gammaitoni. Sub-kbt micro-electromechanical irreversible logic gate. Nature communications, 7, 016. [15] Luca Gammaitoni. Beating the landauer s limit by trading energy with uncertainty. arxiv rerint arxiv: , 011. [16] OJE Maroney. Generalizing landauers rincile. Physical Review E, 79(3):031105, 009. [17] D Chiuchiú, MC Diamantini, and L Gammaitoni. Conditional entroy and landauer rincile. EPL (Eurohysics Letters), 111(4):40004, 015. [18] Antoine Bérut, Artyom Petrosyan, and Sergio Ciliberto. Information and thermodynamics: exerimental verification of landauer s erasure rincile. Journal of Statistical Mechanics: Theory and Exeriment, 015(6):P06015, 015. [19] Juan MR Parrondo, Jordan M Horowitz, and Takahiro Sagawa. Thermodynamics of information. Nature Physics, 11(): , 015. [0] Hajo Holzmann and Sebastian Vollmer. A likelihood ratio test for bimodality in two-comonent mixtures with alication to regional income distribution in the eu. AStA Advances in Statistical Analysis, 9(1):57 69, 008. [1] Saurav Talukdar, Shreyas Bhaban, and Murti Salaaka. Beating landauers bound by memory erasure using time multilexed otentials. IFAC-PaersOnLine, 50(1): , 017. [] Thomas M Cover and Joy A Thomas. Elements of information theory. John Wiley & Sons, 01.

14 Author guidelines for IOP Publishing journals in L A TEX ε Aendix: Derivation of eq. (3) 9.1. Uer Bounds First, we derive an uer bound for the difference, which is simlified as, = C = C + C f 0 (x) ln(f 0 (x) + (1 )f 1 (x))dx f 0 (x) ln (f 0 (x))dx, f 0 (x) ln(1 + (1 )f 1(x) )dx f 0 (x) e t / ln(1 + (,) [3, ) 3 e t / ln(1 + (1 ) e (t ) )dt, (t := x + ), e t / (1 ) ln(1 + e (t ) )dt (1 ) e (t ) )dt. (13) Using the logarithmic inequality ln (1 + x) < x for x > 0, the first integral in eq. (13) satisfies, C e t / (1 ) ln(1 + e (t ) )dt (,) [3, ) < C(1 ) e (t ) / dt, = C(1 ) < C(1 ) (,) [3, ) e u / du, (u := t ), ue u / du, ( u > 1), = C(1 )e /. (14) Moreover, 0 (t ) 4 for t [, 3) and e 4 > 1, using which the last integral in eq. (13) satisfies, C 3 C 3 e t / ln(1 + C ln ( e4 ) e t / ln ( e4 )dt, (1 ) e (t ) )dt, e t / dt, C ln ( e4 )e /. (15) The inequality in eq. (3) then follows by combining eq. (14) and (15) with (13).

15 Author guidelines for IOP Publishing journals in L A TEX ε Lower Bounds We now derive a lower bound for the difference, = f 0 (x) ln(f 0 (x) + (1 )f 1 (x))dx e x / π ln(1 + (1 ) e (x ) )dx. f 0 (x) ln (f 0 (x))dx Notice that by direct comutation of second derivatives, it follows that the function ϕ(t) = ln(1 + 1 e(t ) ) is a convex function. Thus, we can exress, e x / π ln(1 + (1 ) e (x ) )dx = E(ϕ(Z)), where, Z is a standard Gaussian random variable. Alying Jensen s inequality [], we have, Similarly, one can show that, = E(ϕ(Z)) ϕ(e(z)), (1 )f 1 (x) ln(f 0 (x) + (1 )f 1 (x))dx = E(Ψ(Z)), e x / (1 ) ln(1 + π 1 e (x+) )dx = ln(1 + 1 e ). (16) (1 )f 1 (x) ln ((1 )f 1 (x))dx where, Ψ(t) = (1 ) ln(1+ 1 e (t+) ) is a convex function. Using Jensen s inequality, E(Ψ(Z)) Ψ(E(Z)) = (1 ) ln(1 + 1 e ). (17)

arxiv: v4 [cond-mat.stat-mech] 3 Mar 2017

arxiv: v4 [cond-mat.stat-mech] 3 Mar 2017 Memory Erasure using Time Multiplexed Potentials Saurav Talukdar, Shreyas Bhaban and Murti V. Salapaka University of Minnesota, Minneapolis, USA. (Dated: March, 7) arxiv:69.87v [cond-mat.stat-mech] Mar

More information

dn i where we have used the Gibbs equation for the Gibbs energy and the definition of chemical potential

dn i where we have used the Gibbs equation for the Gibbs energy and the definition of chemical potential Chem 467 Sulement to Lectures 33 Phase Equilibrium Chemical Potential Revisited We introduced the chemical otential as the conjugate variable to amount. Briefly reviewing, the total Gibbs energy of a system

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Maximum Entropy and the Stress Distribution in Soft Disk Packings Above Jamming

Maximum Entropy and the Stress Distribution in Soft Disk Packings Above Jamming Maximum Entroy and the Stress Distribution in Soft Disk Packings Above Jamming Yegang Wu and S. Teitel Deartment of Physics and Astronomy, University of ochester, ochester, New York 467, USA (Dated: August

More information

Thermodynamic Computing. Forward Through Backwards Time by RocketBoom

Thermodynamic Computing. Forward Through Backwards Time by RocketBoom Thermodynamic Computing 1 14 Forward Through Backwards Time by RocketBoom The 2nd Law of Thermodynamics Clausius inequality (1865) S total 0 Total Entropy increases as time progresses Cycles of time R.Penrose

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

Thermodynamic of computing. Fisica dell Energia - a.a. 2017/2018

Thermodynamic of computing. Fisica dell Energia - a.a. 2017/2018 Thermodynamic of computing Fisica dell Energia - a.a. 2017/2018 Landauer principle Minimum amount of energy required greater than zero Let assume the operation of bit reset # of initial states: 2 # of

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

On Isoperimetric Functions of Probability Measures Having Log-Concave Densities with Respect to the Standard Normal Law

On Isoperimetric Functions of Probability Measures Having Log-Concave Densities with Respect to the Standard Normal Law On Isoerimetric Functions of Probability Measures Having Log-Concave Densities with Resect to the Standard Normal Law Sergey G. Bobkov Abstract Isoerimetric inequalities are discussed for one-dimensional

More information

Maximum Power Output of Quantum Heat Engine. with Energy Bath

Maximum Power Output of Quantum Heat Engine. with Energy Bath Maximum Power Outut of Quantum Heat Engine with Energy Bath Shengnan Liu, Congjie Ou, College of Information Science and Engineering, Huaqiao University, Xiamen 360, China; 30008003@hqu.edu.cn Corresondence:

More information

Even if you're not burning books, destroying information generates heat.

Even if you're not burning books, destroying information generates heat. Even if you're not burning books, destroying information generates heat. Information and Thermodynamics: Experimental verification of Landauer's erasure principle with a colloidal particle Antoine Bérut,

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical

More information

Chapter 1 Fundamentals

Chapter 1 Fundamentals Chater Fundamentals. Overview of Thermodynamics Industrial Revolution brought in large scale automation of many tedious tasks which were earlier being erformed through manual or animal labour. Inventors

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

Statics and dynamics: some elementary concepts

Statics and dynamics: some elementary concepts 1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and

More information

Introduction to Probability and Statistics

Introduction to Probability and Statistics Introduction to Probability and Statistics Chater 8 Ammar M. Sarhan, asarhan@mathstat.dal.ca Deartment of Mathematics and Statistics, Dalhousie University Fall Semester 28 Chater 8 Tests of Hyotheses Based

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

arxiv: v1 [cond-mat.stat-mech] 24 Sep 2018

arxiv: v1 [cond-mat.stat-mech] 24 Sep 2018 Realizing Information Erasure in Finite Time James. Melbourne, Saurav. Talukdar, Murti. V. Salapaka arxiv:1809.09216v1 [cond-mat.stat-mech] 24 Sep 2018 Abstract In this article, we focus on erasure of

More information

Thermodynamic of computing. Fisica dell Energia - a.a. 2015/2016

Thermodynamic of computing. Fisica dell Energia - a.a. 2015/2016 Thermodynamic of computing Fisica dell Energia - a.a. 2015/2016 Landauer principle Minimum amount of energy required greater than zero Let assume the operation of bit reset # of initial states: 2 # of

More information

Sums of independent random variables

Sums of independent random variables 3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where

More information

Chemical Kinetics and Equilibrium - An Overview - Key

Chemical Kinetics and Equilibrium - An Overview - Key Chemical Kinetics and Equilibrium - An Overview - Key The following questions are designed to give you an overview of the toics of chemical kinetics and chemical equilibrium. Although not comrehensive,

More information

VIBRATION ANALYSIS OF BEAMS WITH MULTIPLE CONSTRAINED LAYER DAMPING PATCHES

VIBRATION ANALYSIS OF BEAMS WITH MULTIPLE CONSTRAINED LAYER DAMPING PATCHES Journal of Sound and Vibration (998) 22(5), 78 85 VIBRATION ANALYSIS OF BEAMS WITH MULTIPLE CONSTRAINED LAYER DAMPING PATCHES Acoustics and Dynamics Laboratory, Deartment of Mechanical Engineering, The

More information

COMMUNICATION BETWEEN SHAREHOLDERS 1

COMMUNICATION BETWEEN SHAREHOLDERS 1 COMMUNICATION BTWN SHARHOLDRS 1 A B. O A : A D Lemma B.1. U to µ Z r 2 σ2 Z + σ2 X 2r ω 2 an additive constant that does not deend on a or θ, the agents ayoffs can be written as: 2r rθa ω2 + θ µ Y rcov

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

The Second Law: The Machinery

The Second Law: The Machinery The Second Law: The Machinery Chater 5 of Atkins: The Second Law: The Concets Sections 3.7-3.9 8th Ed, 3.3 9th Ed; 3.4 10 Ed.; 3E 11th Ed. Combining First and Second Laws Proerties of the Internal Energy

More information

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION O P E R A T I O N S R E S E A R C H A N D D E C I S I O N S No. 27 DOI:.5277/ord73 Nasrullah KHAN Muhammad ASLAM 2 Kyung-Jun KIM 3 Chi-Hyuck JUN 4 A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST

More information

On the q-deformed Thermodynamics and q-deformed Fermi Level in Intrinsic Semiconductor

On the q-deformed Thermodynamics and q-deformed Fermi Level in Intrinsic Semiconductor Advanced Studies in Theoretical Physics Vol. 11, 2017, no. 5, 213-223 HIKARI Ltd, www.m-hikari.com htts://doi.org/10.12988/ast.2017.61138 On the q-deformed Thermodynamics and q-deformed Fermi Level in

More information

Modeling and Estimation of Full-Chip Leakage Current Considering Within-Die Correlation

Modeling and Estimation of Full-Chip Leakage Current Considering Within-Die Correlation 6.3 Modeling and Estimation of Full-Chi Leaage Current Considering Within-Die Correlation Khaled R. eloue, Navid Azizi, Farid N. Najm Deartment of ECE, University of Toronto,Toronto, Ontario, Canada {haled,nazizi,najm}@eecg.utoronto.ca

More information

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is

More information

δq T = nr ln(v B/V A )

δq T = nr ln(v B/V A ) hysical Chemistry 007 Homework assignment, solutions roblem 1: An ideal gas undergoes the following reversible, cyclic rocess It first exands isothermally from state A to state B It is then comressed adiabatically

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

SIMULATION OF DIFFUSION PROCESSES IN LABYRINTHIC DOMAINS BY USING CELLULAR AUTOMATA

SIMULATION OF DIFFUSION PROCESSES IN LABYRINTHIC DOMAINS BY USING CELLULAR AUTOMATA SIMULATION OF DIFFUSION PROCESSES IN LABYRINTHIC DOMAINS BY USING CELLULAR AUTOMATA Udo Buschmann and Thorsten Rankel and Wolfgang Wiechert Deartment of Simulation University of Siegen Paul-Bonatz-Str.

More information

97.398*, Physical Electronics, Lecture 8. Diode Operation

97.398*, Physical Electronics, Lecture 8. Diode Operation 97.398*, Physical Electronics, Lecture 8 Diode Oeration Lecture Outline Have looked at basic diode rocessing and structures Goal is now to understand and model the behavior of the device under bias First

More information

Casimir Force Between the Two Moving Conductive Plates.

Casimir Force Between the Two Moving Conductive Plates. Casimir Force Between the Two Moving Conductive Plates. Jaroslav Hynecek 1 Isetex, Inc., 95 Pama Drive, Allen, TX 751 ABSTRACT This article resents the derivation of the Casimir force for the two moving

More information

Supplementary Materials for Robust Estimation of the False Discovery Rate

Supplementary Materials for Robust Estimation of the False Discovery Rate Sulementary Materials for Robust Estimation of the False Discovery Rate Stan Pounds and Cheng Cheng This sulemental contains roofs regarding theoretical roerties of the roosed method (Section S1), rovides

More information

arxiv:cond-mat/ v2 25 Sep 2002

arxiv:cond-mat/ v2 25 Sep 2002 Energy fluctuations at the multicritical oint in two-dimensional sin glasses arxiv:cond-mat/0207694 v2 25 Se 2002 1. Introduction Hidetoshi Nishimori, Cyril Falvo and Yukiyasu Ozeki Deartment of Physics,

More information

whether a process will be spontaneous, it is necessary to know the entropy change in both the

whether a process will be spontaneous, it is necessary to know the entropy change in both the 93 Lecture 16 he entroy is a lovely function because it is all we need to know in order to redict whether a rocess will be sontaneous. However, it is often inconvenient to use, because to redict whether

More information

Scaling Multiple Point Statistics for Non-Stationary Geostatistical Modeling

Scaling Multiple Point Statistics for Non-Stationary Geostatistical Modeling Scaling Multile Point Statistics or Non-Stationary Geostatistical Modeling Julián M. Ortiz, Steven Lyster and Clayton V. Deutsch Centre or Comutational Geostatistics Deartment o Civil & Environmental Engineering

More information

Uncertainty Modeling with Interval Type-2 Fuzzy Logic Systems in Mobile Robotics

Uncertainty Modeling with Interval Type-2 Fuzzy Logic Systems in Mobile Robotics Uncertainty Modeling with Interval Tye-2 Fuzzy Logic Systems in Mobile Robotics Ondrej Linda, Student Member, IEEE, Milos Manic, Senior Member, IEEE bstract Interval Tye-2 Fuzzy Logic Systems (IT2 FLSs)

More information

PHYSICAL REVIEW LETTERS

PHYSICAL REVIEW LETTERS PHYSICAL REVIEW LETTERS VOLUME 81 20 JULY 1998 NUMBER 3 Searated-Path Ramsey Atom Interferometer P. D. Featonby, G. S. Summy, C. L. Webb, R. M. Godun, M. K. Oberthaler, A. C. Wilson, C. J. Foot, and K.

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

The physics of information: from Maxwell s demon to Landauer. Eric Lutz University of Erlangen-Nürnberg

The physics of information: from Maxwell s demon to Landauer. Eric Lutz University of Erlangen-Nürnberg The physics of information: from Maxwell s demon to Landauer Eric Lutz University of Erlangen-Nürnberg Outline 1 Information and physics Information gain: Maxwell and Szilard Information erasure: Landauer

More information

Positivity, local smoothing and Harnack inequalities for very fast diffusion equations

Positivity, local smoothing and Harnack inequalities for very fast diffusion equations Positivity, local smoothing and Harnack inequalities for very fast diffusion equations Dedicated to Luis Caffarelli for his ucoming 60 th birthday Matteo Bonforte a, b and Juan Luis Vázquez a, c Abstract

More information

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Asymptotically Optimal Simulation Allocation under Dependent Sampling Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee

More information

arxiv: v3 [physics.data-an] 23 May 2011

arxiv: v3 [physics.data-an] 23 May 2011 Date: October, 8 arxiv:.7v [hysics.data-an] May -values for Model Evaluation F. Beaujean, A. Caldwell, D. Kollár, K. Kröninger Max-Planck-Institut für Physik, München, Germany CERN, Geneva, Switzerland

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi

More information

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment

More information

Temperature, current and doping dependence of non-ideality factor for pnp and npn punch-through structures

Temperature, current and doping dependence of non-ideality factor for pnp and npn punch-through structures Indian Journal of Pure & Alied Physics Vol. 44, December 2006,. 953-958 Temerature, current and doing deendence of non-ideality factor for n and nn unch-through structures Khurshed Ahmad Shah & S S Islam

More information

arxiv:cond-mat/ v2 [cond-mat.str-el] 23 May 2006

arxiv:cond-mat/ v2 [cond-mat.str-el] 23 May 2006 Quantum dot with ferromagnetic leads: a densiti-matrix renormaliation grou study C. J. Gaa, M. E. Torio, and J. A. Riera Instituto de Física Rosario, Consejo Nacional de Investigaciones Científicas y Técnicas,

More information

Kinetics of Protein Adsorption and Desorption on Surfaces with Grafted Polymers

Kinetics of Protein Adsorption and Desorption on Surfaces with Grafted Polymers 1516 Biohysical Journal Volume 89 Setember 2005 1516 1533 Kinetics of Protein Adsortion and Desortion on Surfaces with Grafted Polymers Fang Fang,* Javier Satulovsky, y and Igal Szleifer* *Deartment of

More information

DIFFERENTIAL evolution (DE) [3] has become a popular

DIFFERENTIAL evolution (DE) [3] has become a popular Self-adative Differential Evolution with Neighborhood Search Zhenyu Yang, Ke Tang and Xin Yao Abstract In this aer we investigate several self-adative mechanisms to imrove our revious work on [], which

More information

Characteristics of Beam-Based Flexure Modules

Characteristics of Beam-Based Flexure Modules Shorya Awtar e-mail: shorya@mit.edu Alexander H. Slocum e-mail: slocum@mit.edu Precision Engineering Research Grou, Massachusetts Institute of Technology, Cambridge, MA 039 Edi Sevincer Omega Advanced

More information

Chapter 7 Sampling and Sampling Distributions. Introduction. Selecting a Sample. Introduction. Sampling from a Finite Population

Chapter 7 Sampling and Sampling Distributions. Introduction. Selecting a Sample. Introduction. Sampling from a Finite Population Chater 7 and s Selecting a Samle Point Estimation Introduction to s of Proerties of Point Estimators Other Methods Introduction An element is the entity on which data are collected. A oulation is a collection

More information

arxiv: v1 [math-ph] 29 Apr 2016

arxiv: v1 [math-ph] 29 Apr 2016 INFORMATION THEORY AND STATISTICAL MECHANICS REVISITED arxiv:64.8739v [math-h] 29 Ar 26 JIAN ZHOU Abstract. We derive Bose-Einstein statistics and Fermi-Dirac statistics by Princile of Maximum Entroy alied

More information

How to Estimate Expected Shortfall When Probabilities Are Known with Interval or Fuzzy Uncertainty

How to Estimate Expected Shortfall When Probabilities Are Known with Interval or Fuzzy Uncertainty How to Estimate Exected Shortfall When Probabilities Are Known with Interval or Fuzzy Uncertainty Christian Servin Information Technology Deartment El Paso Community College El Paso, TX 7995, USA cservin@gmail.com

More information

General Linear Model Introduction, Classes of Linear models and Estimation

General Linear Model Introduction, Classes of Linear models and Estimation Stat 740 General Linear Model Introduction, Classes of Linear models and Estimation An aim of scientific enquiry: To describe or to discover relationshis among events (variables) in the controlled (laboratory)

More information

An Analysis of TCP over Random Access Satellite Links

An Analysis of TCP over Random Access Satellite Links An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance

More information

8.7 Associated and Non-associated Flow Rules

8.7 Associated and Non-associated Flow Rules 8.7 Associated and Non-associated Flow Rules Recall the Levy-Mises flow rule, Eqn. 8.4., d ds (8.7.) The lastic multilier can be determined from the hardening rule. Given the hardening rule one can more

More information

Robustness of classifiers to uniform l p and Gaussian noise Supplementary material

Robustness of classifiers to uniform l p and Gaussian noise Supplementary material Robustness of classifiers to uniform l and Gaussian noise Sulementary material Jean-Yves Franceschi Ecole Normale Suérieure de Lyon LIP UMR 5668 Omar Fawzi Ecole Normale Suérieure de Lyon LIP UMR 5668

More information

Plotting the Wilson distribution

Plotting the Wilson distribution , Survey of English Usage, University College London Setember 018 1 1. Introduction We have discussed the Wilson score interval at length elsewhere (Wallis 013a, b). Given an observed Binomial roortion

More information

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various

More information

Morten Frydenberg Section for Biostatistics Version :Friday, 05 September 2014

Morten Frydenberg Section for Biostatistics Version :Friday, 05 September 2014 Morten Frydenberg Section for Biostatistics Version :Friday, 05 Setember 204 All models are aroximations! The best model does not exist! Comlicated models needs a lot of data. lower your ambitions or get

More information

Mathematical Efficiency Modeling of Static Power Converters

Mathematical Efficiency Modeling of Static Power Converters Fabrício Hoff Duont Regional Integrated University of Uer Uruguai and Missions (URI Av. Assis Brasil, 9, 980 000 Frederico Westhalen, RS, Brazil Contact: fhd@ieee.org Mathematical Efficiency Modeling of

More information

VARIANTS OF ENTROPY POWER INEQUALITY

VARIANTS OF ENTROPY POWER INEQUALITY VARIANTS OF ENTROPY POWER INEQUALITY Sergey G. Bobkov and Arnaud Marsiglietti Abstract An extension of the entroy ower inequality to the form N α r (X + Y ) N α r (X) + N α r (Y ) with arbitrary indeendent

More information

CFD AS A DESIGN TOOL FOR FLUID POWER COMPONENTS

CFD AS A DESIGN TOOL FOR FLUID POWER COMPONENTS CFD AS A DESIGN TOOL FOR FLUID POWER COMPONENTS M. BORGHI - M. MILANI Diartimento di Scienze dell Ingegneria Università degli Studi di Modena Via Cami, 213/b 41100 Modena E-mail: borghi@omero.dsi.unimo.it

More information

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes Infinite Series 6.2 Introduction We extend the concet of a finite series, met in Section 6., to the situation in which the number of terms increase without bound. We define what is meant by an infinite

More information

CMSC 425: Lecture 4 Geometry and Geometric Programming

CMSC 425: Lecture 4 Geometry and Geometric Programming CMSC 425: Lecture 4 Geometry and Geometric Programming Geometry for Game Programming and Grahics: For the next few lectures, we will discuss some of the basic elements of geometry. There are many areas

More information

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018 Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3

More information

Deriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V.

Deriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V. Deriving ndicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V. Deutsch Centre for Comutational Geostatistics Deartment of Civil &

More information

Outline. Markov Chains and Markov Models. Outline. Markov Chains. Markov Chains Definitions Huizhen Yu

Outline. Markov Chains and Markov Models. Outline. Markov Chains. Markov Chains Definitions Huizhen Yu and Markov Models Huizhen Yu janey.yu@cs.helsinki.fi Det. Comuter Science, Univ. of Helsinki Some Proerties of Probabilistic Models, Sring, 200 Huizhen Yu (U.H.) and Markov Models Jan. 2 / 32 Huizhen Yu

More information

Developing A Deterioration Probabilistic Model for Rail Wear

Developing A Deterioration Probabilistic Model for Rail Wear International Journal of Traffic and Transortation Engineering 2012, 1(2): 13-18 DOI: 10.5923/j.ijtte.20120102.02 Develoing A Deterioration Probabilistic Model for Rail Wear Jabbar-Ali Zakeri *, Shahrbanoo

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation Paer C Exact Volume Balance Versus Exact Mass Balance in Comositional Reservoir Simulation Submitted to Comutational Geosciences, December 2005. Exact Volume Balance Versus Exact Mass Balance in Comositional

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

PERFORMANCE BASED DESIGN SYSTEM FOR CONCRETE MIXTURE WITH MULTI-OPTIMIZING GENETIC ALGORITHM

PERFORMANCE BASED DESIGN SYSTEM FOR CONCRETE MIXTURE WITH MULTI-OPTIMIZING GENETIC ALGORITHM PERFORMANCE BASED DESIGN SYSTEM FOR CONCRETE MIXTURE WITH MULTI-OPTIMIZING GENETIC ALGORITHM Takafumi Noguchi 1, Iei Maruyama 1 and Manabu Kanematsu 1 1 Deartment of Architecture, University of Tokyo,

More information

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes Infinite Series 6. Introduction We extend the concet of a finite series, met in section, to the situation in which the number of terms increase without bound. We define what is meant by an infinite series

More information

Recursive Estimation of the Preisach Density function for a Smart Actuator

Recursive Estimation of the Preisach Density function for a Smart Actuator Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator

More information

ONE. The Earth-atmosphere system CHAPTER

ONE. The Earth-atmosphere system CHAPTER CHAPTER ONE The Earth-atmoshere system 1.1 INTRODUCTION The Earth s atmoshere is the gaseous enveloe surrounding the lanet. Like other lanetary atmosheres, it figures centrally in transfers of energy between

More information

End-to-End Delay Minimization in Thermally Constrained Distributed Systems

End-to-End Delay Minimization in Thermally Constrained Distributed Systems End-to-End Delay Minimization in Thermally Constrained Distributed Systems Pratyush Kumar, Lothar Thiele Comuter Engineering and Networks Laboratory (TIK) ETH Zürich, Switzerland {ratyush.kumar, lothar.thiele}@tik.ee.ethz.ch

More information

Estimation of Separable Representations in Psychophysical Experiments

Estimation of Separable Representations in Psychophysical Experiments Estimation of Searable Reresentations in Psychohysical Exeriments Michele Bernasconi (mbernasconi@eco.uninsubria.it) Christine Choirat (cchoirat@eco.uninsubria.it) Raffaello Seri (rseri@eco.uninsubria.it)

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

Phase transition. Asaf Pe er Background

Phase transition. Asaf Pe er Background Phase transition Asaf Pe er 1 November 18, 2013 1. Background A hase is a region of sace, throughout which all hysical roerties (density, magnetization, etc.) of a material (or thermodynamic system) are

More information

arxiv: v1 [cond-mat.stat-mech] 1 May 2015

arxiv: v1 [cond-mat.stat-mech] 1 May 2015 Quantum Isothermal Reversible Process of Particles in a Box with a Delta Potential arxiv:155.68v1 [cond-mat.stat-mech] 1 May 15 Minho Park, Su Do Yi, and Seung Ki Baek Deartment of Physics, Pukyong National

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

An Improved Calibration Method for a Chopped Pyrgeometer

An Improved Calibration Method for a Chopped Pyrgeometer 96 JOURNAL OF ATMOSPHERIC AND OCEANIC TECHNOLOGY VOLUME 17 An Imroved Calibration Method for a Choed Pyrgeometer FRIEDRICH FERGG OtoLab, Ingenieurbüro, Munich, Germany PETER WENDLING Deutsches Forschungszentrum

More information

arxiv: v1 [quant-ph] 22 Apr 2017

arxiv: v1 [quant-ph] 22 Apr 2017 Quaternionic Quantum Particles SERGIO GIARDINO Institute of Science and Technology, Federal University of São Paulo (Unifes) Avenida Cesare G. M. Lattes 101, 147-014 São José dos Camos, SP, Brazil arxiv:1704.06848v1

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

Churilova Maria Saint-Petersburg State Polytechnical University Department of Applied Mathematics

Churilova Maria Saint-Petersburg State Polytechnical University Department of Applied Mathematics Churilova Maria Saint-Petersburg State Polytechnical University Deartment of Alied Mathematics Technology of EHIS (staming) alied to roduction of automotive arts The roblem described in this reort originated

More information

Yixi Shi. Jose Blanchet. IEOR Department Columbia University New York, NY 10027, USA. IEOR Department Columbia University New York, NY 10027, USA

Yixi Shi. Jose Blanchet. IEOR Department Columbia University New York, NY 10027, USA. IEOR Department Columbia University New York, NY 10027, USA Proceedings of the 2011 Winter Simulation Conference S. Jain, R. R. Creasey, J. Himmelsach, K. P. White, and M. Fu, eds. EFFICIENT RARE EVENT SIMULATION FOR HEAVY-TAILED SYSTEMS VIA CROSS ENTROPY Jose

More information

arxiv: v1 [stat.ml] 10 Mar 2016

arxiv: v1 [stat.ml] 10 Mar 2016 Global and Local Uncertainty Princiles for Signals on Grahs Nathanael Perraudin, Benjamin Ricaud, David I Shuman, and Pierre Vandergheynst March, 206 arxiv:603.03030v [stat.ml] 0 Mar 206 Abstract Uncertainty

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information