Detection in the Presence of Additive Noise and Unknown Offset

Size: px
Start display at page:

Download "Detection in the Presence of Additive Noise and Unknown Offset"

Transcription

1 Detectio i the Presece of Additive Noise ad Ukow Offset Kees A. Schouhamer Immik ad Jos H. Weber Abstract - The error performace of optical storage ad No-Volatile Memory (Flash) is susceptible to ukow offset of the retrieved sigal. Balaced codes offer immuity agaist ukow offset at the cost of a sigificat code redudacy, while miimum Pearso distace detectio offers immuity with low-redudat codes at the price of lesseed oise margi. We will preset a hybrid detectio method, the distace measure is a weighted sum of the Euclidea ad Pearso distace, so that the system desiger may trade oise margi versus amout of immuity to ukow offset. Key words: Costat compositio code, permutatio code, flash memory, digital data storage, No-Volatile Memory, NVM, mismatch, fadig, Pearso distace, Euclidea distace, parity check. I. INTRODUCTION The receiver of a trasmissio or storage system is ofte igorat of the exact value of the offset, also kow as drift or baselie wader, of the received sigal. I optical data storage, both the amplitude ad offset of the retrieved sigal deped o the reflective idex of the disc surface ad the dimesios of the writte features []. I ovolatile memories, such as floatig gate memories, the data is represeted by stored charge, which ca leak away. The amout of leakage depeds o various physical parameters ad, clearly, o the time elapsed betwee writig ad readig the data. I such a case, the covetioal approach of combattig the effects of chael mismatch by usig a automatic offset or gai cotrol that estimates the mismatch from the previously received data ca ot be applied, ad other methods have to be developed. I optical disc storage devices ad o-volatile memories, costraied codes, specifically dc-free or balaced codes, have bee used ad/or proposed to couter the effects of offset mismatch []. Jiag et al. [] addressed a q- ary balaced codig techique, called rak modulatio, for circumvetig the difficulties with flash memories havig agig offset levels. Zhou et al. [], Sala et al. [], ad Immik [6] ivestigated the usage of balaced codes for Kees A. Schouhamer Immik is with Turig Machies Ic, Willemskade b-d, 06 DK Rotterdam, The Netherlads. immik@turigmachies.com. Jos Weber is with Delft Uiversity of Techology, Delft, The Netherlads. j.h.weber@tudelft.l. eablig dyamic readig thresholds i o-volatile memories. Alterative detectio methods, such as miimum Pearso distace detectio, that are immue to offset ad gai mismatch, have bee preseted i [7]. Miimum Pearso distace detectio offers immuity to both gai ad offset mismatch, which is bought at the price of a lesseed oise margi. We will ivestigate the properties of a hybrid detector that weighs miimum Pearso ad miimum Euclidea distace measures, the desiger has the optio of tradig the amout of mismatch immuity o the oe had versus loss of oise margi o the other had. We start, i Sectio II, with a descriptio of hybrid miimum Pearso ad Euclidea distace detectio. I Sectio III, we preset a aalysis of the error performace of the hybrid detector, ad a mismatch sesitivity aalysis. I Sectio IV, we will show that a simple rate / parity-check code may improve the oise margi by slightly less tha db. I Sectio V, we will discuss implemetatio issues, ad i Sectio VI, we will describe our coclusios. II. DESCRIPTION OF HYBRID DETECTION We cosider a commuicatio codebook, S, of chose q- ary codewords x = (x, x,..., x ) over the q-ary alphabet Q = {0,,..., q }, q,, the legth of x, is a positive iteger. Suppose the set codeword, x, is received as the vector r = x + ν + b, r i R, b R is a ukow (dc-)offset, ad ν = (ν,..., ν ), ν i R are oise samples with distributio N(0, σ ). We use the shorthad otatio x + b = (x + b, x + b,..., x + b). Before we proceed with a descriptio of the ew detector, we will defie T -costraied codes. T -costraied codes, preseted i [6] for eablig simple dyamic threshold detectio of q-ary codewords, cosist of q-ary -legth codewords, T, 0 < T q, preferred or referece symbols must appear at least oce i a codeword. The code, deoted by S, comprises codewords the symbol 0 appears at least oce. The size of S equals [6] S = q (q ), q >. () For the biary case, q =, we simply fid S =, the all- word is deleted. We will assume that the code used is S = S. Immik & Weber [7] advocated the usage of the Pearso distace for chaels with both gai ad offset mismatch. 08

2 For chaels with offset mismatch oly, they itroduced the modified Pearso distace δ p (r, ˆx) = (r i ˆx i + ˆx), () i= betwee r ad ˆx, x are ˆx are take from S, ad ˆx = ˆx i. () i= The receiver outputs the codeword that is closest to r, or x o = arg mi ˆx S δ p (r, ˆx). () It has bee show i [7] that the outcome () is itrisically resistat to the ukow offset, b, at the cost of oise margi. We defie a ew hybrid distace measure by δ(r, ˆx) = γδ e (r, ˆx) + ( γ)δ p (r, ˆx), () δ e (r, ˆx) = (r i ˆx i ) (6) i= is the (squared) Euclidea distace betwee the received sigal vector r ad the codeword ˆx S. The parameter γ, 0 γ, ca be judiciously chose for tradig the sesitivity to offset mismatch versus oise margi loss. Clearly, for γ = we obtai a pure miimum Euclidea distace detector, which offers optimal oise margi, but it is sesitive to chael mismatch. O the other had, for γ = 0 we obtai a pure miimum Pearso distace detector, which is immue agaist offset mismatch, but it comes at a lesseed oise margi. Other values of γ will lead to a detector that balaces the properties of the two types of detectors. The hybrid detector outputs the codeword x o = arg mi ˆx S δ(r, ˆx). (7) A direct implemetatio of (7) requires aroud q computatios of (), which is prohibitive for larger values of. I Sectio V, we will show that the computatio of (7) ca be accomplished with much less computatioal load, for example, for q =, oly istead of evaluatios of () are eeded. I the ext sectio, we will compute the error performace of the ew detector. III. ERROR PERFORMANCE ANALYSIS The detector errs if there is at least oe codeword ˆx x, ˆx S, such that or δ(r, ˆx) < δ(r, x) (8) γ(δ e (r, ˆx) δ e (r, x)) + ( γ)(δ p (r, ˆx) δ p (r, x)) < 0. (9) We have ad δ e (r, ˆx) δ e (r, x) = δ p (r, ˆx) δ p (r, x) = e i ν i + i= e i (e i + b) i= (e i e)ν i + i= (e i e), i=, for clerical coveiece, we itroduce the short-had otatio e i = x i ˆx i (0) ad e = x ˆx. () The, we may rewrite the above iequality (8) by ζ 0 + ζ i ν i < 0, () ad ζ 0 = γ i= i= e i (e i + b) + ( γ) (e i e), () i= ζ i = γe i + ( γ)(e i e), i. () The oise samples ν i are draw from N(0, σ), so that the probability that a error is made, equals ( ) d(x, ˆx) P r(δ(r, ˆx) < δ(r, x)) = Q, σ the Q-fuctio is defied by Q(x) = e u du. π The oise distace, d(x, ˆx), betwee the codewords x ad ˆx is give by d(x, ˆx) = α β, () ad i= β = x α = ζ 0 (6) ζi. (7) i= Workig out yields α = γ e i (e i + b) + ( γ) (e i e) ad = ( γ)e + γbe + β = i= e i (8) i= [e i ( γ)e] i= = ( γ )e + e i. (9) i= 09

3 γ= Fig.. Word error rate () of the ew detector as a fuctio of the sigal-to-oise ratio (SNR) for q =, = 8 ad γ = 0, γ = 0., ad γ =. No offset, b = 0. The diagram shows the error performace computed by upperboud (0) ad computer simulatios (dotted lies). 0 0 γ=0 γ= performace of the ew detector improves upo that of the traditioal Euclidea distace detector. At asymptotically high sigal-to-oise ratios, the word error rate () is overbouded by [8] < (q ) Q q ( dmi σ ), () the miimum distace betwee ay pair of codewords i S, d mi, is defied by d mi = We simply fid mi d(x, ˆx) = x, ˆx S ˆx x mi x, ˆx S x ˆx α β. () d mi = γ γ b. () γ Note that d mi is idepedet of the alphabet size q. By varyig the value of γ, we select a error performace that lies betwee that of a miimum Euclidea ad a miimum Pearso distace detector. For the ideal case, b = 0, we fid that the asymptotic codig gai, Γ(γ), equals 0 0 γ= Γ(γ) = γ. () γ 0 0 γ=0 γ=0. The term γ b i () shows how the offset mismatch affects the error performace. The receiver will completely fail if d mi Fig.. Word error rate () of the ew detector as a fuctio of the sigal-to-oise ratio (SNR) for q =, = 8 ad γ = 0, γ = 0., ad γ =. Offset b = 0.. The diagram shows results by computer simulatios. Note that the curve for γ = 0 (Pearso detectio) is the same as show i Figure. The word error rate () over all coded sequeces x is upperbouded by < ( ) d(x, ˆx) Q. (0) S σ x S ˆx x Figure shows results of computer simulatios (dotted lies) ad computatios ivokig (0) for q =, = 8, ad γ = 0, γ = 0., ad γ = for the matched case b = 0. The sigal-to-oise-ratio (SNR), is defied by SNR(dB) = 0 log 0 σ. () Figure shows results of computer simulatios (dotted lies) for the same parameters as used i Figure, but ow with a offset b = 0.. We otice that i this case the error or (b) worst (γ) γ ( γ ), (6) (b) worst (γ) deotes the maximum offset that the receiver ca tolerate just before collapsig. Clearly the maximum allowable offset (b) worst (γ) varies betwee 0. for Euclidea distace detectio (γ = ) ad ifiity for Pearso distace detectio (γ = 0). Usig () ad (6), we plotted i Figure the parametric equatio of the maximum offset that the receiver ca tolerate, (b) worst (γ), versus codig gai, 0 log Γ(γ) (db), for = 6, 8 ad 0. The curves show the crucial trade-off betwee codig gai ad offset tolerace. For example, for = 8, the desiger may buy for a ivestmet of 0. db codig loss, a maximum offset tolerace improvemet by a factor of aroud six with respect to regular Euclidea distace detectio. The receiver is completely immue to offset mismatch for the price of a codig loss of 0 log(7/8) 0.8 db. IV. PARITY CHECK CODES For certai applicatios it may be desirable to improve the oise margi at the expese of code redudacy. A parity check T -costraied code, deoted by S p, cosists 00

4 8 0 (b) worst o parity = =6 =8 = parity =6 =6 = logΓ(dB) Fig.. Parametric equatio of the maximum offset, (b) worst (γ), that the receiver ca tolerate just before failure versus codig gai 0 log Γ(γ) (db) for = 6, 8, ad 0. of codewords, x, take from S that additioally satisfy the parity check ( x i ) mod q = a, i= a Q is a iteger chose by the code desiger, for example, to maximize the code size. Below we will cocetrate o the biary case, q =, for a = ( + ) mod, the umber of codewords equals, so that the rate of these codes is exactly /. We easily compute that the miimum distace, d p,mi, betwee ay pair of codewords equals d p,mi = γ γ b. (7) γ The codig gai, Γ p (γ), uder matched coditios, b = 0, equals Γ p (γ) = γ γ. (8) Figure shows a compariso of the error performace of offset-resistat detectio with ad without extra parity check. For asymptotically large SNR, we may, for = ad γ = 0, expect to gai a factor Γ p (0)/Γ(0) = 0/ (=.6 db) i oise margi with respect to the o-parity case. We deduce from the diagram that the gai is aroud.9 db i the SNR regio show. The receiver will fail if (b) p,worst (γ) γ ( γ ). (9) We coclude that the parity check receiver is slightly more susceptible to offset mismatch tha a stadard receiver, see (6). We plotted i Figure the parametric equatio of the maximum offset that the receiver ca tolerate, (b) p,worst (γ), versus codig gai, 0 log Γ p (γ), for = 6, 8, ad 0. Fig.. Word error rate () of offset-resistat detectio, γ = 0, as a fuctio of the sigal-to-oise ratio (SNR) for q =, = 6 ad q =, =, with ad without parity check computed usig upperboud (0). (b) worst 7 6 =6 =8 = logΓp(dB) Fig.. Parametric equatio of the maximum offset, (b) p,worst (γ), that the parity-check receiver ca tolerate just before failure versus codig gai 0 log Γ p(γ) for = 6, 8, ad 0. V. IMPLEMENTATION ISSUES The proposed distace measure () is a weighted sum of two distace measures, ad, clearly, is more complicated to evaluate tha a sigle distace. After combiig (), (), (), ad (6), we may rewrite the distace as δ(r, ˆx) = ri r iˆx i + i= i= + ( γ)( ˆx + ˆx i= ˆx i r i ). (0) i= The two right-had terms are the extra load for the receiver with respect to traditioal Euclidea detectio, which is embodied by the three left-had terms. Before we further discuss the complexity issue of the distace measure, we will first discuss how may evaluatios of the distace are eeded per received word. We tacitly assumed that the 0

5 receiver computes the distace () for all codewords i S before it will give its verdict o the codeword set. This would imply a expoetial icrease i the computatioal load with codeword legth. However, it was show i [7] that the codebook S cosists of K costat compositio codes. A costat compositio code is a set of codewords the umbers of occurreces of the symbols withi a codeword is the same for each codeword [9]. These specialize to costat weight codes i the biary case. It was show i [7] that we may sigificatly reduce the umber of distace computatios () to the umber of costat compositio codes, K, that costitute the full set S. For q =, sice S cosists of K = costat weight codes, istead of for a full set oly computatios are required. For a biary parity-check code the umber of costat weight subsets equals ( + )/ for odd ad / for eve, which reduces the umber of computatios eve more. Let a costat compositio code be deoted by Sw i, i K. Each costat compositio code, Sw i, is characterized by oe codeword of the code, called pivot word, deoted by x pi, i K. The pivot word x pi is, by defiitio, the largest word i the lexicographical orderig (the largest symbols first) of the codewords i Sw i. Thus, for a pivot word we have x pi Sw i ad x pi = (x pi,, x pi,,..., x pi,), x pi, x pi, x pi,... x pi, x pi,, i K. The remaiig codewords i S cosist of all distict sequeces that ca be formed by permutig the order of the symbols of each pivot word x pi, i K. Detectio of the received vector, r, is accomplished by ivokig the followig two-step procedure: ) The symbols of the received word, r, are sorted, largest to smallest, i the same way as taught i Slepia s prior art [0]. ) Compute the distace, usig (0), betwee the sorted received word ad all K pivot words. The receiver decides that a word take from Sw k, k K, was set i case the pivot word x pk is at miimum distace to the received vector r. Now that we kow that the word set is a member of Sw k, we ca decode the received word by Slepia s procedure for sigle permutatio codes. I a embodimet of the secod part of the above procedure, usig a micro-processor, for example, the receiver has tabulated ad stored i memory the K pivot words. I additio, the receiver has, for each pivot word, pre-computed the terms, see (), A j = x pj,i, j K ad, see (0), B j = i= x p j,i ( γ)a j, j K, i= which are idepedet of r. The receiver computes for each received codeword C = i= ad for each of the K pivot words, see (0), D j = << r, x pj >> +B j + CA j, j K, << u, v >> deotes the ier product of the vectors u ad v, ad r deotes the sorted received vector. Note that we do ot eed to compute the term r i, sice it is irrelevat. As we may observe from the above, the mai computatioal load is the computatio of the ier product. This is also the case for Euclidea detectio, ad we coclude that the hybrid detectio is oly slightly more ivolved tha Euclidea distace detectio. r i VI. CONCLUSIONS We have preseted a hybrid detectio method, the distace measure is a weighted sum of the Euclidea ad Pearso distace, which offers the desiger the optio of tradig oise margi versus amout of immuity agaist ukow offset. We have computed the error performace of the hybrid detectio method i the presece of ukow offset ad additive oise. We have computed the maximum allowable offset, (b) worst, ad the pealty i oise margi. We have itroduced parity-check T -costraied codes, ad have show that with a code rate /, we may gai aroud - db i oise margi with respect to regular T - costraied codes. We have discussed issues related to the computatioal load of the hybrid detector. REFERENCES [] G. Bouwhuis, J. Braat, A. Huijser, J. Pasma, G. va Rosmale, ad K.A.S. Immik, Priciples of Optical Disc Systems, Adam Hilger Ltd, Bristol ad Bosto, 98. [] J.H. Weber ad K.A.S. Immik, Kuth s Balacig of Codewords Revisited, IEEE Tras Iform Theory, vol. 6, o., pp , 00. [] A. Jiag, R. Mateescu, M. Schwartz, ad J. Bruck, Rak Modulatio for Flash Memories, IEEE Tras. Iform. Theory, vol. IT-, o. 6, pp , Jue 006. [] H. Zhou, A. Jiag, ad J. Bruck, Error-correctig schemes with dyamic thresholds i ovolatile memories, IEEE It. Symposium i Iform. Theory (ISIT), St Petersburg, July 0. [] F. Sala, R. Gabrys, ad L. Dolecek, Dyamic Threshold Schemes for Multi-Level No-Volatile Memories, IEEE Tras. o Commu., pp. 6-6, Vol. 6, July 0. [6] K.A.S. Immik, Codig Schemes for Multi-Level Flash Memories that are Itrisically Resistat Agaist Ukow Gai ad/or Offset Usig Referece Symbols, Electroics Letters, vol. 0, pp. 0-, 0. [7] K.A.S. Immik ad J.H. Weber, Miimum Pearso Distace Detectio for Multi-Level Chaels with Gai ad/or Offset Mismatch, IEEE Tras. Iform. Theory, vol. 60, pp , Oct. 0. [8] G.D. Forey Jr., Maximum-Likelihood Sequece Estimatio of Digital Sequeces i the Presece of Itersymbol Iterferece, IEEE Tras. Iform. Theory, vol. IT-8, pp. 6-78, May. 97. [9] W. Chu, C.J. Colbour, ad P. Dukes, O Costat Compositio Codes, Discrete Applied Mathematics, Volume, Issue 6, pp. 9-99, April 006. [0] D. Slepia, Permutatio Modulatio, Proc. IEEE, vol., pp. 8-6, March 96. 0

THE RECEIVER of a transmission or storage system is

THE RECEIVER of a transmission or storage system is 3290 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 9, SEPTEMBER 2015 Hybrid Miimum Pearso Euclidea Distace Detectio Kees A. Schouhamer Immik, Fellow, IEEE, JosH.Weber,Seior Member, IEEE Abstract The

More information

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes

The Maximum-Likelihood Decoding Performance of Error-Correcting Codes The Maximum-Lielihood Decodig Performace of Error-Correctig Codes Hery D. Pfister ECE Departmet Texas A&M Uiversity August 27th, 2007 (rev. 0) November 2st, 203 (rev. ) Performace of Codes. Notatio X,

More information

Rank Modulation with Multiplicity

Rank Modulation with Multiplicity Rak Modulatio with Multiplicity Axiao (Adrew) Jiag Computer Sciece ad Eg. Dept. Texas A&M Uiversity College Statio, TX 778 ajiag@cse.tamu.edu Abstract Rak modulatio is a scheme that uses the relative order

More information

6.3 Testing Series With Positive Terms

6.3 Testing Series With Positive Terms 6.3. TESTING SERIES WITH POSITIVE TERMS 307 6.3 Testig Series With Positive Terms 6.3. Review of what is kow up to ow I theory, testig a series a i for covergece amouts to fidig the i= sequece of partial

More information

Problem Set 4 Due Oct, 12

Problem Set 4 Due Oct, 12 EE226: Radom Processes i Systems Lecturer: Jea C. Walrad Problem Set 4 Due Oct, 12 Fall 06 GSI: Assae Gueye This problem set essetially reviews detectio theory ad hypothesis testig ad some basic otios

More information

BER results for a narrowband multiuser receiver based on successive subtraction for M-PSK modulated signals

BER results for a narrowband multiuser receiver based on successive subtraction for M-PSK modulated signals results for a arrowbad multiuser receiver based o successive subtractio for M-PSK modulated sigals Gerard J.M. Jasse Telecomm. ad Traffic-Cotrol Systems Group Dept. of Iformatio Techology ad Systems Delft

More information

Channel coding, linear block codes, Hamming and cyclic codes Lecture - 8

Channel coding, linear block codes, Hamming and cyclic codes Lecture - 8 Digital Commuicatio Chael codig, liear block codes, Hammig ad cyclic codes Lecture - 8 Ir. Muhamad Asial, MSc., PhD Ceter for Iformatio ad Commuicatio Egieerig Research (CICER) Electrical Egieerig Departmet

More information

Discrete Orthogonal Moment Features Using Chebyshev Polynomials

Discrete Orthogonal Moment Features Using Chebyshev Polynomials Discrete Orthogoal Momet Features Usig Chebyshev Polyomials R. Mukuda, 1 S.H.Og ad P.A. Lee 3 1 Faculty of Iformatio Sciece ad Techology, Multimedia Uiversity 75450 Malacca, Malaysia. Istitute of Mathematical

More information

Probability of error for LDPC OC with one co-channel Interferer over i.i.d Rayleigh Fading

Probability of error for LDPC OC with one co-channel Interferer over i.i.d Rayleigh Fading IOSR Joural of Electroics ad Commuicatio Egieerig (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 4, Ver. III (Jul - Aug. 24), PP 59-63 Probability of error for LDPC OC with oe co-chael

More information

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound

Lecture 27. Capacity of additive Gaussian noise channel and the sphere packing bound Lecture 7 Ageda for the lecture Gaussia chael with average power costraits Capacity of additive Gaussia oise chael ad the sphere packig boud 7. Additive Gaussia oise chael Up to this poit, we have bee

More information

ECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220

ECE 564/645 - Digital Communication Systems (Spring 2014) Final Exam Friday, May 2nd, 8:00-10:00am, Marston 220 ECE 564/645 - Digital Commuicatio Systems (Sprig 014) Fial Exam Friday, May d, 8:00-10:00am, Marsto 0 Overview The exam cosists of four (or five) problems for 100 (or 10) poits. The poits for each part

More information

REGRESSION WITH QUADRATIC LOSS

REGRESSION WITH QUADRATIC LOSS REGRESSION WITH QUADRATIC LOSS MAXIM RAGINSKY Regressio with quadratic loss is aother basic problem studied i statistical learig theory. We have a radom couple Z = X, Y ), where, as before, X is a R d

More information

An Introduction to Randomized Algorithms

An Introduction to Randomized Algorithms A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis

More information

Entropies & Information Theory

Entropies & Information Theory Etropies & Iformatio Theory LECTURE I Nilajaa Datta Uiversity of Cambridge,U.K. For more details: see lecture otes (Lecture 1- Lecture 5) o http://www.qi.damtp.cam.ac.uk/ode/223 Quatum Iformatio Theory

More information

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary Recursive Algorithm for Geeratig Partitios of a Iteger Sug-Hyuk Cha Computer Sciece Departmet, Pace Uiversity 1 Pace Plaza, New York, NY 10038 USA scha@pace.edu Abstract. This article first reviews the

More information

Infinite Sequences and Series

Infinite Sequences and Series Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet

More information

Lecture Overview. 2 Permutations and Combinations. n(n 1) (n (k 1)) = n(n 1) (n k + 1) =

Lecture Overview. 2 Permutations and Combinations. n(n 1) (n (k 1)) = n(n 1) (n k + 1) = COMPSCI 230: Discrete Mathematics for Computer Sciece April 8, 2019 Lecturer: Debmalya Paigrahi Lecture 22 Scribe: Kevi Su 1 Overview I this lecture, we begi studyig the fudametals of coutig discrete objects.

More information

EE / EEE SAMPLE STUDY MATERIAL. GATE, IES & PSUs Signal System. Electrical Engineering. Postal Correspondence Course

EE / EEE SAMPLE STUDY MATERIAL. GATE, IES & PSUs Signal System. Electrical Engineering. Postal Correspondence Course Sigal-EE Postal Correspodece Course 1 SAMPLE STUDY MATERIAL Electrical Egieerig EE / EEE Postal Correspodece Course GATE, IES & PSUs Sigal System Sigal-EE Postal Correspodece Course CONTENTS 1. SIGNAL

More information

Discrete Mathematics for CS Spring 2007 Luca Trevisan Lecture 22

Discrete Mathematics for CS Spring 2007 Luca Trevisan Lecture 22 CS 70 Discrete Mathematics for CS Sprig 2007 Luca Trevisa Lecture 22 Aother Importat Distributio The Geometric Distributio Questio: A biased coi with Heads probability p is tossed repeatedly util the first

More information

A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence

A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece,, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet as

More information

Sequences, Mathematical Induction, and Recursion. CSE 2353 Discrete Computational Structures Spring 2018

Sequences, Mathematical Induction, and Recursion. CSE 2353 Discrete Computational Structures Spring 2018 CSE 353 Discrete Computatioal Structures Sprig 08 Sequeces, Mathematical Iductio, ad Recursio (Chapter 5, Epp) Note: some course slides adopted from publisher-provided material Overview May mathematical

More information

IP Reference guide for integer programming formulations.

IP Reference guide for integer programming formulations. IP Referece guide for iteger programmig formulatios. by James B. Orli for 15.053 ad 15.058 This documet is iteded as a compact (or relatively compact) guide to the formulatio of iteger programs. For more

More information

Information-based Feature Selection

Information-based Feature Selection Iformatio-based Feature Selectio Farza Faria, Abbas Kazeroui, Afshi Babveyh Email: {faria,abbask,afshib}@staford.edu 1 Itroductio Feature selectio is a topic of great iterest i applicatios dealig with

More information

A survey on penalized empirical risk minimization Sara A. van de Geer

A survey on penalized empirical risk minimization Sara A. van de Geer A survey o pealized empirical risk miimizatio Sara A. va de Geer We address the questio how to choose the pealty i empirical risk miimizatio. Roughly speakig, this pealty should be a good boud for the

More information

Algorithm Analysis. Chapter 3

Algorithm Analysis. Chapter 3 Data Structures Dr Ahmed Rafat Abas Computer Sciece Dept, Faculty of Computer ad Iformatio, Zagazig Uiversity arabas@zu.edu.eg http://www.arsaliem.faculty.zu.edu.eg/ Algorithm Aalysis Chapter 3 3. Itroductio

More information

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame

Information Theory Tutorial Communication over Channels with memory. Chi Zhang Department of Electrical Engineering University of Notre Dame Iformatio Theory Tutorial Commuicatio over Chaels with memory Chi Zhag Departmet of Electrical Egieerig Uiversity of Notre Dame Abstract A geeral capacity formula C = sup I(; Y ), which is correct for

More information

Feedback in Iterative Algorithms

Feedback in Iterative Algorithms Feedback i Iterative Algorithms Charles Byre (Charles Byre@uml.edu), Departmet of Mathematical Scieces, Uiversity of Massachusetts Lowell, Lowell, MA 01854 October 17, 2005 Abstract Whe the oegative system

More information

The multiplicative structure of finite field and a construction of LRC

The multiplicative structure of finite field and a construction of LRC IERG6120 Codig for Distributed Storage Systems Lecture 8-06/10/2016 The multiplicative structure of fiite field ad a costructio of LRC Lecturer: Keeth Shum Scribe: Zhouyi Hu Notatios: We use the otatio

More information

A Block Cipher Using Linear Congruences

A Block Cipher Using Linear Congruences Joural of Computer Sciece 3 (7): 556-560, 2007 ISSN 1549-3636 2007 Sciece Publicatios A Block Cipher Usig Liear Cogrueces 1 V.U.K. Sastry ad 2 V. Jaaki 1 Academic Affairs, Sreeidhi Istitute of Sciece &

More information

Hashing and Amortization

Hashing and Amortization Lecture Hashig ad Amortizatio Supplemetal readig i CLRS: Chapter ; Chapter 7 itro; Sectio 7.. Arrays ad Hashig Arrays are very useful. The items i a array are statically addressed, so that isertig, deletig,

More information

It is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function.

It is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function. MATH 532 Measurable Fuctios Dr. Neal, WKU Throughout, let ( X, F, µ) be a measure space ad let (!, F, P ) deote the special case of a probability space. We shall ow begi to study real-valued fuctios defied

More information

EXAMINATIONS OF THE ROYAL STATISTICAL SOCIETY

EXAMINATIONS OF THE ROYAL STATISTICAL SOCIETY EXAMINATIONS OF THE ROYAL STATISTICAL SOCIETY GRADUATE DIPLOMA, 016 MODULE : Statistical Iferece Time allowed: Three hours Cadidates should aswer FIVE questios. All questios carry equal marks. The umber

More information

Universal source coding for complementary delivery

Universal source coding for complementary delivery SITA2006 i Hakodate 2005.2. p. Uiversal source codig for complemetary delivery Akisato Kimura, 2, Tomohiko Uyematsu 2, Shigeaki Kuzuoka 2 Media Iformatio Laboratory, NTT Commuicatio Sciece Laboratories,

More information

Statistical Pattern Recognition

Statistical Pattern Recognition Statistical Patter Recogitio Classificatio: No-Parametric Modelig Hamid R. Rabiee Jafar Muhammadi Sprig 2014 http://ce.sharif.edu/courses/92-93/2/ce725-2/ Ageda Parametric Modelig No-Parametric Modelig

More information

Lecture 10: Universal coding and prediction

Lecture 10: Universal coding and prediction 0-704: Iformatio Processig ad Learig Sprig 0 Lecture 0: Uiversal codig ad predictio Lecturer: Aarti Sigh Scribes: Georg M. Goerg Disclaimer: These otes have ot bee subjected to the usual scrutiy reserved

More information

Information Theory and Coding

Information Theory and Coding Sol. Iformatio Theory ad Codig. The capacity of a bad-limited additive white Gaussia (AWGN) chael is give by C = Wlog 2 ( + σ 2 W ) bits per secod(bps), where W is the chael badwidth, is the average power

More information

5. Likelihood Ratio Tests

5. Likelihood Ratio Tests 1 of 5 7/29/2009 3:16 PM Virtual Laboratories > 9. Hy pothesis Testig > 1 2 3 4 5 6 7 5. Likelihood Ratio Tests Prelimiaries As usual, our startig poit is a radom experimet with a uderlyig sample space,

More information

Regression with quadratic loss

Regression with quadratic loss Regressio with quadratic loss Maxim Ragisky October 13, 2015 Regressio with quadratic loss is aother basic problem studied i statistical learig theory. We have a radom couple Z = X,Y, where, as before,

More information

1 Review of Probability & Statistics

1 Review of Probability & Statistics 1 Review of Probability & Statistics a. I a group of 000 people, it has bee reported that there are: 61 smokers 670 over 5 960 people who imbibe (drik alcohol) 86 smokers who imbibe 90 imbibers over 5

More information

5.1 A mutual information bound based on metric entropy

5.1 A mutual information bound based on metric entropy Chapter 5 Global Fao Method I this chapter, we exted the techiques of Chapter 2.4 o Fao s method the local Fao method) to a more global costructio. I particular, we show that, rather tha costructig a local

More information

Proof of Goldbach s Conjecture. Reza Javaherdashti

Proof of Goldbach s Conjecture. Reza Javaherdashti Proof of Goldbach s Cojecture Reza Javaherdashti farzijavaherdashti@gmail.com Abstract After certai subsets of Natural umbers called Rage ad Row are defied, we assume (1) there is a fuctio that ca produce

More information

4.1 Sigma Notation and Riemann Sums

4.1 Sigma Notation and Riemann Sums 0 the itegral. Sigma Notatio ad Riema Sums Oe strategy for calculatig the area of a regio is to cut the regio ito simple shapes, calculate the area of each simple shape, ad the add these smaller areas

More information

1 Hash tables. 1.1 Implementation

1 Hash tables. 1.1 Implementation Lecture 8 Hash Tables, Uiversal Hash Fuctios, Balls ad Bis Scribes: Luke Johsto, Moses Charikar, G. Valiat Date: Oct 18, 2017 Adapted From Virgiia Williams lecture otes 1 Hash tables A hash table is a

More information

Perspectives on Balanced Sequences

Perspectives on Balanced Sequences Perspectives o Balaced Seueces Jos H. Weber, Kees A. Schouhamer Immik, Paul H. Siegel, ad Theo G. Swart arxiv:30.6484v [cs.it] 8 Ja 03 Abstract We examie ad compare several differet classes of balaced

More information

Lecture 3: August 31

Lecture 3: August 31 36-705: Itermediate Statistics Fall 018 Lecturer: Siva Balakrisha Lecture 3: August 31 This lecture will be mostly a summary of other useful expoetial tail bouds We will ot prove ay of these i lecture,

More information

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece 1, 1, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet

More information

Lecture 5: April 17, 2013

Lecture 5: April 17, 2013 TTIC/CMSC 350 Mathematical Toolkit Sprig 203 Madhur Tulsiai Lecture 5: April 7, 203 Scribe: Somaye Hashemifar Cheroff bouds recap We recall the Cheroff/Hoeffdig bouds we derived i the last lecture idepedet

More information

Binary codes from graphs on triples and permutation decoding

Binary codes from graphs on triples and permutation decoding Biary codes from graphs o triples ad permutatio decodig J. D. Key Departmet of Mathematical Scieces Clemso Uiversity Clemso SC 29634 U.S.A. J. Moori ad B. G. Rodrigues School of Mathematics Statistics

More information

Formation of A Supergain Array and Its Application in Radar

Formation of A Supergain Array and Its Application in Radar Formatio of A Supergai Array ad ts Applicatio i Radar Tra Cao Quye, Do Trug Kie ad Bach Gia Duog. Research Ceter for Electroic ad Telecommuicatios, College of Techology (Coltech, Vietam atioal Uiversity,

More information

Lecture 9: Hierarchy Theorems

Lecture 9: Hierarchy Theorems IAS/PCMI Summer Sessio 2000 Clay Mathematics Udergraduate Program Basic Course o Computatioal Complexity Lecture 9: Hierarchy Theorems David Mix Barrigto ad Alexis Maciel July 27, 2000 Most of this lecture

More information

NEW SELF-DUAL [54, 27, 10] CODES EXTENDED FROM [52, 26, 10] CODES 1. v (denoted by wt( v ) ) is the number

NEW SELF-DUAL [54, 27, 10] CODES EXTENDED FROM [52, 26, 10] CODES 1. v (denoted by wt( v ) ) is the number NEW SELF-DUAL [54, 7, 10] CODES EXTENDED FROM [5, 6, 10] CODES 1 Nikolay I. Yakov ABSTRACT: Usig [5, 6, 10] biary self-dual codes, possesig a automorphism of order 3, we costruct ew [54, 7, 10] biary self-dual

More information

7. Modern Techniques. Data Encryption Standard (DES)

7. Modern Techniques. Data Encryption Standard (DES) 7. Moder Techiques. Data Ecryptio Stadard (DES) The objective of this chapter is to illustrate the priciples of moder covetioal ecryptio. For this purpose, we focus o the most widely used covetioal ecryptio

More information

Lecture Notes 15 Hypothesis Testing (Chapter 10)

Lecture Notes 15 Hypothesis Testing (Chapter 10) 1 Itroductio Lecture Notes 15 Hypothesis Testig Chapter 10) Let X 1,..., X p θ x). Suppose we we wat to kow if θ = θ 0 or ot, where θ 0 is a specific value of θ. For example, if we are flippig a coi, we

More information

Lecture 11: Pseudorandom functions

Lecture 11: Pseudorandom functions COM S 6830 Cryptography Oct 1, 2009 Istructor: Rafael Pass 1 Recap Lecture 11: Pseudoradom fuctios Scribe: Stefao Ermo Defiitio 1 (Ge, Ec, Dec) is a sigle message secure ecryptio scheme if for all uppt

More information

CHAPTER I: Vector Spaces

CHAPTER I: Vector Spaces CHAPTER I: Vector Spaces Sectio 1: Itroductio ad Examples This first chapter is largely a review of topics you probably saw i your liear algebra course. So why cover it? (1) Not everyoe remembers everythig

More information

THE SYSTEMATIC AND THE RANDOM. ERRORS - DUE TO ELEMENT TOLERANCES OF ELECTRICAL NETWORKS

THE SYSTEMATIC AND THE RANDOM. ERRORS - DUE TO ELEMENT TOLERANCES OF ELECTRICAL NETWORKS R775 Philips Res. Repts 26,414-423, 1971' THE SYSTEMATIC AND THE RANDOM. ERRORS - DUE TO ELEMENT TOLERANCES OF ELECTRICAL NETWORKS by H. W. HANNEMAN Abstract Usig the law of propagatio of errors, approximated

More information

Ω ). Then the following inequality takes place:

Ω ). Then the following inequality takes place: Lecture 8 Lemma 5. Let f : R R be a cotiuously differetiable covex fuctio. Choose a costat δ > ad cosider the subset Ωδ = { R f δ } R. Let Ωδ ad assume that f < δ, i.e., is ot o the boudary of f = δ, i.e.,

More information

Linear regression. Daniel Hsu (COMS 4771) (y i x T i β)2 2πσ. 2 2σ 2. 1 n. (x T i β y i ) 2. 1 ˆβ arg min. β R n d

Linear regression. Daniel Hsu (COMS 4771) (y i x T i β)2 2πσ. 2 2σ 2. 1 n. (x T i β y i ) 2. 1 ˆβ arg min. β R n d Liear regressio Daiel Hsu (COMS 477) Maximum likelihood estimatio Oe of the simplest liear regressio models is the followig: (X, Y ),..., (X, Y ), (X, Y ) are iid radom pairs takig values i R d R, ad Y

More information

Properties and Hypothesis Testing

Properties and Hypothesis Testing Chapter 3 Properties ad Hypothesis Testig 3.1 Types of data The regressio techiques developed i previous chapters ca be applied to three differet kids of data. 1. Cross-sectioal data. 2. Time series data.

More information

Statistical Inference (Chapter 10) Statistical inference = learn about a population based on the information provided by a sample.

Statistical Inference (Chapter 10) Statistical inference = learn about a population based on the information provided by a sample. Statistical Iferece (Chapter 10) Statistical iferece = lear about a populatio based o the iformatio provided by a sample. Populatio: The set of all values of a radom variable X of iterest. Characterized

More information

Analysis of Algorithms. Introduction. Contents

Analysis of Algorithms. Introduction. Contents Itroductio The focus of this module is mathematical aspects of algorithms. Our mai focus is aalysis of algorithms, which meas evaluatig efficiecy of algorithms by aalytical ad mathematical methods. We

More information

R. van Zyl 1, A.J. van der Merwe 2. Quintiles International, University of the Free State

R. van Zyl 1, A.J. van der Merwe 2. Quintiles International, University of the Free State Bayesia Cotrol Charts for the Two-parameter Expoetial Distributio if the Locatio Parameter Ca Take o Ay Value Betwee Mius Iity ad Plus Iity R. va Zyl, A.J. va der Merwe 2 Quitiles Iteratioal, ruaavz@gmail.com

More information

Topic 9: Sampling Distributions of Estimators

Topic 9: Sampling Distributions of Estimators Topic 9: Samplig Distributios of Estimators Course 003, 2018 Page 0 Samplig distributios of estimators Sice our estimators are statistics (particular fuctios of radom variables), their distributio ca be

More information

OFDM Precoder for Minimizing BER Upper Bound of MLD under Imperfect CSI

OFDM Precoder for Minimizing BER Upper Bound of MLD under Imperfect CSI MIMO-OFDM OFDM Precoder for Miimizig BER Upper Boud of MLD uder Imperfect CSI MCRG Joit Semiar Jue the th 008 Previously preseted at ICC 008 Beijig o May the st 008 Boosar Pitakdumrogkija Kazuhiko Fukawa

More information

Reliability and Queueing

Reliability and Queueing Copyright 999 Uiversity of Califoria Reliability ad Queueig by David G. Messerschmitt Supplemetary sectio for Uderstadig Networked Applicatios: A First Course, Morga Kaufma, 999. Copyright otice: Permissio

More information

Comparison Study of Series Approximation. and Convergence between Chebyshev. and Legendre Series

Comparison Study of Series Approximation. and Convergence between Chebyshev. and Legendre Series Applied Mathematical Scieces, Vol. 7, 03, o. 6, 3-337 HIKARI Ltd, www.m-hikari.com http://d.doi.org/0.988/ams.03.3430 Compariso Study of Series Approimatio ad Covergece betwee Chebyshev ad Legedre Series

More information

Chapter 6 Infinite Series

Chapter 6 Infinite Series Chapter 6 Ifiite Series I the previous chapter we cosidered itegrals which were improper i the sese that the iterval of itegratio was ubouded. I this chapter we are goig to discuss a topic which is somewhat

More information

Diversity Combining Techniques

Diversity Combining Techniques Diversity Combiig Techiques Whe the required sigal is a combiatio of several waves (i.e, multipath), the total sigal amplitude may experiece deep fades (i.e, Rayleigh fadig), over time or space. The major

More information

On a Smarandache problem concerning the prime gaps

On a Smarandache problem concerning the prime gaps O a Smaradache problem cocerig the prime gaps Felice Russo Via A. Ifate 7 6705 Avezzao (Aq) Italy felice.russo@katamail.com Abstract I this paper, a problem posed i [] by Smaradache cocerig the prime gaps

More information

Lecture 6 Simple alternatives and the Neyman-Pearson lemma

Lecture 6 Simple alternatives and the Neyman-Pearson lemma STATS 00: Itroductio to Statistical Iferece Autum 06 Lecture 6 Simple alteratives ad the Neyma-Pearso lemma Last lecture, we discussed a umber of ways to costruct test statistics for testig a simple ull

More information

ECE 901 Lecture 14: Maximum Likelihood Estimation and Complexity Regularization

ECE 901 Lecture 14: Maximum Likelihood Estimation and Complexity Regularization ECE 90 Lecture 4: Maximum Likelihood Estimatio ad Complexity Regularizatio R Nowak 5/7/009 Review : Maximum Likelihood Estimatio We have iid observatios draw from a ukow distributio Y i iid p θ, i,, where

More information

OPTIMAL PIECEWISE UNIFORM VECTOR QUANTIZATION OF THE MEMORYLESS LAPLACIAN SOURCE

OPTIMAL PIECEWISE UNIFORM VECTOR QUANTIZATION OF THE MEMORYLESS LAPLACIAN SOURCE Joural of ELECTRICAL EGIEERIG, VOL. 56, O. 7-8, 2005, 200 204 OPTIMAL PIECEWISE UIFORM VECTOR QUATIZATIO OF THE MEMORYLESS LAPLACIA SOURCE Zora H. Perić Veljo Lj. Staović Alesadra Z. Jovaović Srdja M.

More information

A New Class of Ternary Zero Correlation Zone Sequence Sets Based on Mutually Orthogonal Complementary Sets

A New Class of Ternary Zero Correlation Zone Sequence Sets Based on Mutually Orthogonal Complementary Sets IOSR Joural of Electroics ad Commuicatio Egieerig (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 0, Issue 3, Ver. I (May - Ju.205), PP 08-3 www.iosrjourals.org A New Class of Terary Zero Correlatio

More information

SOME TRIBONACCI IDENTITIES

SOME TRIBONACCI IDENTITIES Mathematics Today Vol.7(Dec-011) 1-9 ISSN 0976-38 Abstract: SOME TRIBONACCI IDENTITIES Shah Devbhadra V. Sir P.T.Sarvajaik College of Sciece, Athwalies, Surat 395001. e-mail : drdvshah@yahoo.com The sequece

More information

Linear Support Vector Machines

Linear Support Vector Machines Liear Support Vector Machies David S. Roseberg The Support Vector Machie For a liear support vector machie (SVM), we use the hypothesis space of affie fuctios F = { f(x) = w T x + b w R d, b R } ad evaluate

More information

NICK DUFRESNE. 1 1 p(x). To determine some formulas for the generating function of the Schröder numbers, r(x) = a(x) =

NICK DUFRESNE. 1 1 p(x). To determine some formulas for the generating function of the Schröder numbers, r(x) = a(x) = AN INTRODUCTION TO SCHRÖDER AND UNKNOWN NUMBERS NICK DUFRESNE Abstract. I this article we will itroduce two types of lattice paths, Schröder paths ad Ukow paths. We will examie differet properties of each,

More information

Lecture #20. n ( x p i )1/p = max

Lecture #20. n ( x p i )1/p = max COMPSCI 632: Approximatio Algorithms November 8, 2017 Lecturer: Debmalya Paigrahi Lecture #20 Scribe: Yua Deg 1 Overview Today, we cotiue to discuss about metric embeddigs techique. Specifically, we apply

More information

2 Banach spaces and Hilbert spaces

2 Banach spaces and Hilbert spaces 2 Baach spaces ad Hilbert spaces Tryig to do aalysis i the ratioal umbers is difficult for example cosider the set {x Q : x 2 2}. This set is o-empty ad bouded above but does ot have a least upper boud

More information

EECS564 Estimation, Filtering, and Detection Hwk 2 Solns. Winter p θ (z) = (2θz + 1 θ), 0 z 1

EECS564 Estimation, Filtering, and Detection Hwk 2 Solns. Winter p θ (z) = (2θz + 1 θ), 0 z 1 EECS564 Estimatio, Filterig, ad Detectio Hwk 2 Sols. Witer 25 4. Let Z be a sigle observatio havig desity fuctio where. p (z) = (2z + ), z (a) Assumig that is a oradom parameter, fid ad plot the maximum

More information

OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES

OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES OPTIMAL ALGORITHMS -- SUPPLEMENTAL NOTES Peter M. Maurer Why Hashig is θ(). As i biary search, hashig assumes that keys are stored i a array which is idexed by a iteger. However, hashig attempts to bypass

More information

Discrete Mathematics for CS Spring 2005 Clancy/Wagner Notes 21. Some Important Distributions

Discrete Mathematics for CS Spring 2005 Clancy/Wagner Notes 21. Some Important Distributions CS 70 Discrete Mathematics for CS Sprig 2005 Clacy/Wager Notes 21 Some Importat Distributios Questio: A biased coi with Heads probability p is tossed repeatedly util the first Head appears. What is the

More information

Confidence interval for the two-parameter exponentiated Gumbel distribution based on record values

Confidence interval for the two-parameter exponentiated Gumbel distribution based on record values Iteratioal Joural of Applied Operatioal Research Vol. 4 No. 1 pp. 61-68 Witer 2014 Joural homepage: www.ijorlu.ir Cofidece iterval for the two-parameter expoetiated Gumbel distributio based o record values

More information

ECE 901 Lecture 12: Complexity Regularization and the Squared Loss

ECE 901 Lecture 12: Complexity Regularization and the Squared Loss ECE 90 Lecture : Complexity Regularizatio ad the Squared Loss R. Nowak 5/7/009 I the previous lectures we made use of the Cheroff/Hoeffdig bouds for our aalysis of classifier errors. Hoeffdig s iequality

More information

The picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled

The picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled 1 Lecture : Area Area ad distace traveled Approximatig area by rectagles Summatio The area uder a parabola 1.1 Area ad distace Suppose we have the followig iformatio about the velocity of a particle, how

More information

Power and Type II Error

Power and Type II Error Statistical Methods I (EXST 7005) Page 57 Power ad Type II Error Sice we do't actually kow the value of the true mea (or we would't be hypothesizig somethig else), we caot kow i practice the type II error

More information

Let us give one more example of MLE. Example 3. The uniform distribution U[0, θ] on the interval [0, θ] has p.d.f.

Let us give one more example of MLE. Example 3. The uniform distribution U[0, θ] on the interval [0, θ] has p.d.f. Lecture 5 Let us give oe more example of MLE. Example 3. The uiform distributio U[0, ] o the iterval [0, ] has p.d.f. { 1 f(x =, 0 x, 0, otherwise The likelihood fuctio ϕ( = f(x i = 1 I(X 1,..., X [0,

More information

A RANK STATISTIC FOR NON-PARAMETRIC K-SAMPLE AND CHANGE POINT PROBLEMS

A RANK STATISTIC FOR NON-PARAMETRIC K-SAMPLE AND CHANGE POINT PROBLEMS J. Japa Statist. Soc. Vol. 41 No. 1 2011 67 73 A RANK STATISTIC FOR NON-PARAMETRIC K-SAMPLE AND CHANGE POINT PROBLEMS Yoichi Nishiyama* We cosider k-sample ad chage poit problems for idepedet data i a

More information

Topic 9: Sampling Distributions of Estimators

Topic 9: Sampling Distributions of Estimators Topic 9: Samplig Distributios of Estimators Course 003, 2016 Page 0 Samplig distributios of estimators Sice our estimators are statistics (particular fuctios of radom variables), their distributio ca be

More information

Chapter 10: Power Series

Chapter 10: Power Series Chapter : Power Series 57 Chapter Overview: Power Series The reaso series are part of a Calculus course is that there are fuctios which caot be itegrated. All power series, though, ca be itegrated because

More information

CS284A: Representations and Algorithms in Molecular Biology

CS284A: Representations and Algorithms in Molecular Biology CS284A: Represetatios ad Algorithms i Molecular Biology Scribe Notes o Lectures 3 & 4: Motif Discovery via Eumeratio & Motif Represetatio Usig Positio Weight Matrix Joshua Gervi Based o presetatios by

More information

Report on Private Information Retrieval over Unsynchronized Databases

Report on Private Information Retrieval over Unsynchronized Databases Report o Private Iformatio Retrieval over Usychroized Databases Lembit Valgma Supervised by Vitaly Skachek May 25, 217 1 Problem Statemet There are may challeges cocerig olie privacy. Private iformatio

More information

Classification of problem & problem solving strategies. classification of time complexities (linear, logarithmic etc)

Classification of problem & problem solving strategies. classification of time complexities (linear, logarithmic etc) Classificatio of problem & problem solvig strategies classificatio of time complexities (liear, arithmic etc) Problem subdivisio Divide ad Coquer strategy. Asymptotic otatios, lower boud ad upper boud:

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

PROBLEM SET 5 SOLUTIONS 126 = , 37 = , 15 = , 7 = 7 1.

PROBLEM SET 5 SOLUTIONS 126 = , 37 = , 15 = , 7 = 7 1. Math 7 Sprig 06 PROBLEM SET 5 SOLUTIONS Notatios. Give a real umber x, we will defie sequeces (a k ), (x k ), (p k ), (q k ) as i lecture.. (a) (5 pts) Fid the simple cotiued fractio represetatios of 6

More information

2000 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes

2000 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes 2000 IEEE. Persoal use of this material is permitted. However, permissio to reprit/republish this material for advertisig or promotioal purposes or for creatig ew collective works for resale or redistributio

More information

Math 155 (Lecture 3)

Math 155 (Lecture 3) Math 55 (Lecture 3) September 8, I this lecture, we ll cosider the aswer to oe of the most basic coutig problems i combiatorics Questio How may ways are there to choose a -elemet subset of the set {,,,

More information

Last time, we talked about how Equation (1) can simulate Equation (2). We asserted that Equation (2) can also simulate Equation (1).

Last time, we talked about how Equation (1) can simulate Equation (2). We asserted that Equation (2) can also simulate Equation (1). 6896 Quatum Complexity Theory Sept 23, 2008 Lecturer: Scott Aaroso Lecture 6 Last Time: Quatum Error-Correctio Quatum Query Model Deutsch-Jozsa Algorithm (Computes x y i oe query) Today: Berstei-Vazirii

More information

Vector Permutation Code Design Algorithm. Danilo SILVA and Weiler A. FINAMORE

Vector Permutation Code Design Algorithm. Danilo SILVA and Weiler A. FINAMORE Iteratioal Symposium o Iformatio Theory ad its Applicatios, ISITA2004 Parma, Italy, October 10 13, 2004 Vector Permutatio Code Desig Algorithm Dailo SILVA ad Weiler A. FINAMORE Cetro de Estudos em Telecomuicações

More information

Are Slepian-Wolf Rates Necessary for Distributed Parameter Estimation?

Are Slepian-Wolf Rates Necessary for Distributed Parameter Estimation? Are Slepia-Wolf Rates Necessary for Distributed Parameter Estimatio? Mostafa El Gamal ad Lifeg Lai Departmet of Electrical ad Computer Egieerig Worcester Polytechic Istitute {melgamal, llai}@wpi.edu arxiv:1508.02765v2

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms Desig ad Aalysis of Algorithms Probabilistic aalysis ad Radomized algorithms Referece: CLRS Chapter 5 Topics: Hirig problem Idicatio radom variables Radomized algorithms Huo Hogwei 1 The hirig problem

More information