Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Size: px
Start display at page:

Download "Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging"

Transcription

1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie Wireless Intelligent Networks Center WINC, Nile University, Giza, Egyt. arxiv: v1 [cs.it] 1 Jan 2014 Abstract We consider a secondary user SU with energy harvesting caability. We design access schemes for the SU which incororate random sectrum sensing and random access, and which make use of the rimary automatic reeat request ARQ feedback. We study two roblem-formulations. In the first, we characterize the stability region of the roosed schemes. The sensing and access robabilities are obtained such that the secondary throughut is maximized under the constraints that both the rimary and secondary queues are stable. Whereas in the second, the secondary throughut is maximized under the stability of the rimary queue and that the rimary queueing delay is ket lower than a secified value needed to guarantee a certain quality of service QoS for the rimary user PU. We consider sectrum sensing errors and assume multiacket recetion MPR caabilities. Numerical results show the enhanced erformance of our roosed system over a random access system, and demonstrate the benefit of leveraging the rimary feedback. Index Terms Cognitive radio, energy harvesting, queues, stability, dominant system, queueing delay. I. INTRODUCTION Cognitive radio technology rovides an efficient means of utilizing the radio sectrum [2]. The basic idea is to allow secondary users to access the sectrum while roviding certain guaranteed quality of service QoS erformance measures for the rimary users PUs. The secondary user SU is a battery-owered device in many ractical situations and its oeration, which involves sectrum sensing and access, is accomanied by energy consumtion. Consequently an energy-constrained SU must otimize its sensing and access decisions to efficiently utilize the energy at its disosal. An emerging technology for energy-constrained terminals is energy harvesting which allows the terminal to gather energy from its environment. An overview of the different energy harvesting technologies is rovided in [3] and the references therein. Data transmission by an energy harvester with a rechargeable battery has got a lot of attention recently [4] [11]. The otimal online olicy for controlling admissions into the data buffer is derived in [4] using a dynamic rogramming framework. In [5], energy management olicies which stabilize the data queue are roosed for single-user communication and some delay-otimaroerties are derived. Throughut Part of this work has been resented in the 8th International Conference on Wireless and Mobile Comuting, Networking and Communications WiMob, 2012 [1]. otimal energy allocation is investigated in [6] for energy harvesting systems in a time-constrained slotted setting. In [7], [8], minimization of the transmission comletion time is considered in an energy harvesting system and the otimal solution is obtained using a geometric framework. In [9], energy harvesting transmitters with batteries of finite energy storage caacity are considered and the roblem of throughut maximization by a deadline is solved for a static channel. The authors of [10] consider the scenario in which a set of nodes shares a common channel. The PU has a rechargeable battery and the SU is lugged to a reliable ower suly. They obtain the maximum stable throughut region which describes the maximum arrival rates that maintain the stability of the network queues. In [11], the authors investigate the effects of network layer cooeration in a wireless three-node network with energy harvesting nodes and bursty traffic. In [12], Sultan investigated the otimal cognitive sensing and access olicies for an SU with an energy queue. The analysis is based on Markov-decision rocess MDP. In [13], the authors investigated the maximum stable throughut of a backlogged secondary terminal with energy harvesting caability. The SU randomly accesses the channel at the beginning of the time slot without emloying any channel sensing. The secondary terminal can leverage the availability of rimary feedback and exloit the multiacket recetion MPR caability of the receivers to enhance its throughut. In this aer, we develo sectrum sensing and transmission methods for an energy harvesting SU. We leverage the rimary automatic reeat request ARQ feedback for secondary access. Due to the broadcast nature of the wireless channel, this feedback can be overheard and utilized by the secondary node assuming that it is unencryted. The roosed rotocols can alleviate the negative imact of channel sensing because the secondary access is on basis of the sensed rimary state as well as the overheard rimary feedback. The roblem with deending on sectrum sensing only is that sensing does not inform the secondary terminal about its imact on the rimary receiver. This issue has induced interest in utilizing the feedback from the rimary receiver to the rimary transmitter to otimize the secondary transmission strategies. For instance, in [14], the SU observes the ARQ feedback from the rimary receiver as it reflects the PU s achieved acket rate. The SU s objective is to maximize its throughut while guaranteeing a certain acket rate for the PU. In [15], the authors use a artially observable Markov decision rocess POMDP

2 Q PR aer. The secondary access without incororating the rimary feedback is investigated in Section III. In Section IV, we discuss the feedback-based scheme. The case of delay-aware PUs is investigated in Section V. We rovide numerical results and conclusions in Section VI. l e l s Q s Q e Fig. 1. Primary and secondary queues and links. The PU has data queue Q, whereas the secondary terminal has data queue Q s and energy queue Q e. There is a feedback channel between the rimary receiver PR and the PU to acknowledge the recetion of data ackets. This feedback channel is overheard by the secondary transmitter. Both the PR and the secondary receiver SR may suffer interference from the other link. to otimize the secondary action on the basis of the sectrum sensing outcome and rimary ARQ feedback. Secondary ower control based on rimary feedback is investigated in [16]. In [17] and [18], the otimal transmission olicy for the SU when the PU adots a retransmission based error control scheme is investigated. The olicy of the SU determines how often it transmits according to the retransmission state of the acket being served by the PU. The contributions of this aer can be summarized as follows. We investigate the case of a SU equied with an energy harvesting mechanism and a rechargeable battery. We roose a novel access and sensing scheme where the SU ossibly senses the channel for a certain fraction of the time slot duration and accesses the channel with some access robability that deends on the sensing outcome. The SU may access the channerobabilistically without sensing in order to utilize the whole slot duration for transmission. Instead of the collision channel model, we assume a generalized channel model in which the receiving nodes have MPR caability. We consider two roblem formulations. In the first, we characterize the stability region of the roosed schemes, whereas in the second, we include a constraint on the rimary queueing delay to the otimization roblem for delay-aware PUs. We comare our system with the conventional access system in which the SU senses the channel and accesses unconditionally if the PU is sensed to be inactive. The numerical results show the gains of our roosed systems in terms of the secondary throughut. The rest of the aer is organized as follows. In the next section, we discuss the system model adoted in this SR II. SYSTEM MODEL We consider the system model shown in Fig. 1. The model consists of one PU and one SU. The channel is slotted in time and a slot duration equals the acket transmission time. The PU and the SU have infinite buffer queues, Q and Q s, resectively, to store fixed-length data ackets. If a terminal transmits during a time slot, it sends exactly one acket to its receiver. The arrivals at Q and Q s are indeendent and identically distributed i.i.d. Bernoulli random variables from slot to slot with means λ and λ s, resectively. The SU has an additional energy queue, Q e, to store harvested energy from the environment. The arrival at the energy queue is also Bernoulli with mean λ e and is indeendent from arrivals at the other queues. The Bernoulli model is simle, but it catures the random availability of ambient energy sources. More imortantly, in the analysis of discrete-time queues, Bernoulli arrivals see time averages BASTA. This is the BASTA roerty equivalent to the Poisson arrivals see time averages PASTA roerty in continuous-time systems [19]. It is assumed that the transmission of one data acket consumes one acket of energy. We adot a late arrival model as in [10], [11], [13], [20] where an arrived acket at a certain time slot cannot be served at the arriving slot even if the queue is emty. Denote by V t the number of arrivals to queue Q at time slot t, and Z t the number of deartures from queue Q at time slot t. The queue length evolves according to the following form: Q t+1 = Q t Z t + +V t 1 where z + denotes maxz,0. Adequate system oeration requires that all the queues are stable. We emloy the standard definition of stability for queue as in [20], [21], that is, a queue is stable if and only if its robability of being emty does not vanish as time rogresses. Precisely, lim t Pr{Q t = 0} > 0. If the arrival and service rocesses are strictly stationary, then we can aly Loynes theorem to check for stability conditions [22]. This theorem states that if the arrivarocess and the service rocess of a queue are strictly stationary rocesses, and the average service rate is greater than the average arrival rate of the queue, then the queue is stable. If the average service rate is lower than the average arrival rate, the queue is unstable [20]. Instead of the collision channel model where simultaneous transmission by different terminals leads to sure acket loss, we assume that the receivers have multiacket recetion MPR caability as in [23] [25]. This means that transmitted data ackets can survive the interference caused by concurrent transmissions if the received signal to interference and noise ratio SINR exceeds the threshold required for successful decoding at the receiver. With MPR caability, the SU may use the channel simultaneously with the PU.

3 III. SECONDARY ACCESS WITHOUT EMPLOYING PRIMARY FEEDBACK The first roosed system is denoted by Φ NF. Under this rotocol, the PU accesses the channel whenever it has a acket to send. The secondary transmitter, given that it has energy, senses the channel or ossibly transmits the acket at the head of its queue immediately at the beginning of the time slot without sensing the channel. We exlain below why direct transmission can be beneficial for system erformance. The SU oeration can be summarized as follows. If the secondary terminal s energy and data queues are not emty, it senses the channel with robability s from the beginning of the time slot for a duration of τ seconds to detect the ossible activity of the PU. If the slot duration is T, τ < T. If the channel is sensed to be free, the secondary transmitter accesses the channel with robability f. If the PU is detected to be active, it accesses the channel with robability b. If at the beginning of the time slot the SU decides not to sense the sectrum which haens with robability 1 s, it immediately decides whether to transmit with robability t or to remain idle for the rest of the time slot with robability 1 t. 1 This means that the transmission duration is T seconds if the SU accesses the channel without sectrum sensing and T τ seconds if transmission is receded by a sensing hase. We assume that the energy consumed in sectrum sensing is negligible, whereas data transmission dissiates exactly one unit of energy from Q e. We study now secondary access in detail to obtain the mean service rates of queues Q s, Q e and Q. The meaning of the various relevant symbols are rovided in Table I. For the secondary terminal to be served, its energy queue must be nonemty. If the SU does not sense the channel, which haens with robability 1 s, it transmits with robability t. If the PU s queue is emty and, hence, the PU is inactive, secondary transmission is successful with robability P, whose exression as a function of the secondary link arameters, transmission time T, and the data acket size is rovided in Aendix A. If Q 0, the success robability is see Aendix A. If the SU decides to sense the channel, there are four ossibilities deending on the sensing outcome and the state of the rimary queue. If the PU is sensed to be free, secondary transmission takes lace with robability f. This takes lace with robability 1 P FA if the PU is actually silent. In this case, the robability of successful secondary transmission is P, which is lower than P as roven in [1]. On the other hand, if the PU is on, the robability of detecting the channel to be free is P MD and the robability of successful secondary transmission is. If the channel is sensed to be busy, the secondary terminal transmits with robability b. Sensing the PU to be active occurs with robability P FA if the PU is actually inactive, or with robability 1 P MD if the PU is actively transmitting. The robability of successful 1 Throughout the aer X =1 X. τ T s P MD P FA t f b P P P Sensing duration Slot duration Probability of sensing the channel Misdetection robability False alarm robability Probability of direct channel access if the channel is not sensed Probability of channel access if the channel is sensed to be free Probability of channel access if the channel is sensed to be busy Probability of successfurimary transmission to the rimary receiver if the secondary terminal is silent Probability of successfurimary transmission to the rimary receiver with concurrent secondary transmission Probability of successful secondary transmission if the PU is silent and transmission occurs over T seconds Probability of successful secondary transmission if the PU is silent and transmission occurs over T τ seconds Probability of successful secondary transmission if the PU is active and transmission occurs over T seconds Probability of successful secondary transmission if the PU is active and transmission occurs over T τ seconds TABLE I LIST OF SYMBOLS INVOLVED IN THE QUEUES MEAN SERVICE RATES. secondary transmission is P when the PU is silent and when the PU is active. Given these ossibilities, we can write the following exression for the mean secondary service rate. µ s = 1 s t Pr{Q = 0,Q e 0}P +1 s t Pr{Q 0,Q e 0} + s f Pr{Q = 0,Q e 0}1 P FA P + s f Pr{Q 0,Q e 0}P MD + s b Pr{Q = 0,Q e 0}P FA P + s b Pr{Q 0,Q e 0}1 P MD Based on the above analysis, it can be shown that the mean 2

4 service rate of the energy queue is µ e = 1 s t Pr{Q s 0} + s f P MD Pr{Q s 0,Q 0} +1 P FA Pr{Q s 0,Q = 0} + s b P FA Pr{Q s 0,Q = 0} +1 P MD Pr{Q s 0,Q 0} 3 u0 u1 l m m u lm m u2 m 3 Fig. 2. Markov chain of the PU under dominant system S 1. State selftransitions are omitted for visual clarity. Probabilities µ = 1 µ and λ = 1 λ. A acket from the rimary queue can be served in either one of the following events. If the SU is silent because either of its data queue or energy queue is emty, the rimary transmission is successful with robabilityp. If both secondary queues are nonemty, secondary oeration roceeds as exlained above. In all cases, if the SU does not access the channel, the robability of successfurimary transmission is P, else it is. 2 Therefore, µ = 1 Pr{Q s 0,Q e 0} P +Pr{Q s 0,Q e 0} [ 1 s t P c +1 t P + s P MD f +1 f P ] + s 1 P MD b P c +1 b P Following are some imortant remarks on the roosed access and sensing scheme. The roosed access and sensing scheme can mitigate the negative imact of sensing errors. Secifically, the SU under the roosed rotocol randomly accesses the channel if the PU is either sensed to be active or inactive. Hence, the false alarm robability and the misdetection robability are controllable using the sectrum access robabilities. These access robabilities can take any value between zero and one. Hence, the SU can mitigate the imact of the sensing errors via adjusting the values of the access robabilities. Accordingly, this would enhance the secondary throughut and revent the violation of the PU s QoS. We also note that when the MPR caabilities of the receivers are high which means 4 P and is P is for i = 0,1, the SU does not need to sense the channel at all, i.e., s = 0. This is due to the fact that the SU does not need to emloy channel sensing as it can transmit each time slot simultaneously with the PU without violating the rimary QoS because the receivers can decode ackets under interference with a robability almost equal to the robability when nodes transmit alone. As in [10], [13], we assume that the energy queue is modeled as M/D/1 queue with mean service and arrival rates µ e = 1 and λ e, resectively. Hence, the robability that the secondary energy queue being nonemty is λ e /µ e = λ e [26]. Based on this assumtion, the energy queue emties faster than in the actual system, thereby lowering the robability that the queue is nonemty. This reduces the secondary throughut by increasing the robability that the secondary node does not have energy. Therefore, our aroximation result in a lower bound on the secondary service rate or throughut [1], [13]. We denote the system under the aroximation of one acket consumtion er time slot as S. Since the queues in the aroximated system, S, are interacting with each other, we resort to the concet of the dominant system to obtain the stability region of the system. The dominant system aroach is first introduced in [27]. The basic idea is that we construct an aroriate dominant system, which is a modification of system S with the queues decouled, hence we can comute the dearture rocesses of all queues. The modified system ensures that the queue sizes in the dominant system are, at all times, at least as large as those of system S rovided that the queues in both systems have the same initial sizes. Thus, the stability region of the new system is an inner bound of system S. At the boundary oints of the stability region, both the dominant system and system S coincide. This is the essence of the indistinguishability argument resented in many aers such as [10], [20], [25], [27]. Next, we construct two dominant systems and the stability region of aroximated system S is the union of the stability region of the dominant systems. We would like to emhasize here that system S is an inner bound on the original system, Φ NF. A. First Dominant System In the first dominant system queue, denoted ass 1, Q s transmits dummy ackets when it is emty and the PU behaves as it would in the original system. Under this dominant system, we have Pr{Q s = 0} = 0. Substituting by Pr{Q s = 0} = 0 into 4, the average rimary service rate after some simlifications can be given by µ = P λ e s t + s P MD f + s P MD b 5 2 We assume that the access delay of the SU does not affect the rimary outage robability. This is valid as far as 1 τ e e, which is true here T as τ T. For details, see Aendix A. where =P 0. The Markov chain modeling the rimary queue under this dominant system is rovided in Fig.

5 2. Solving the state balance equations, it is straightforward to show that the robability that the rimary queue has k ackets is [ ] k 1 λ µ ν k = ν 6 µ λ µ where λ = 1 λ and µ = 1 µ. Using the condition k=0 ν k = 1, ν = 1 λ µ 7 For the sum k=0 ν k to exist, we should have λ < µ. This is equivalent to Loynes theorem. SincePr{Q = 0} = 1 λ µ, [ 1 λ µ s =λ e s t P + s b P FA P + s f P FA P µ ] Let + λ µ s t + s f P MD + s b P MD 8 µ = P +D P 9 where denotes vector transosition, P=[ t, b, f ] and ]. D= λ e [ s, s P MD, s P MD Substituting from 9 into 8, λ µ s = 1 A λ P + P +D P P +D P G P 10 [ ] where G = s t, s P MD, s P MD and A = [ ]. s P, s P FA P, s P FA P After some mathematical maniulations, we get µ s = P λ A P+P DA P+λ G P P +D P 11 The ortion of the stability region based on the first dominant system is characterized by the closure of the rate airs λ,λ s. One method to obtain this closure is to solve a constrained otimization roblem such that λ s is maximized for each λ under the stability of the rimary and the secondary queues. The otimization roblem is given by max. s,p=[ t, b, f ] µ s, s.t. 0 t, s, f, b 1, λ µ 12 For a fixed s, the otimization roblem 12 can be shown to be a quasiconcave rogram over P. We need to show that the objective function is quasiconcave over convex set and under convex constraints. From 9, µ is affine and hence convex over P for a fixed s. The Hessian of the numerator of µ s is given by H = AD +DA. Let y be an arbitrary 3 1 vector. The matrix H is negative semidefinite if y Hy 0. Since the matrices AD and DA are generated using a linear combination of a single vector, the rank of each is 1 and therefore each of them has at least two zero eigenvalues. The trace of each is negative and equal to Λ= λ e 2 s P + 2 s P FAP P MD + 2 s P MDP FA P 0. Hence, AD and DA are negative semidefinite with eigenvalues 0,0,Λ. Accordingly, yad y 0, yda y 0 and their sum is also negative. Based on these observations for a fixed s, the numerator of 11 is nonnegative 3 and concave over P and the denominator is ositive and affine over P, hence it is quasiconcave, as is derived in Aendix B. Since the objective function of the otimization roblem is quasiconcave and the constraints are convex for a fixed s, the roblem is a quasiconcave rogram for each s. We solve a family of quasiconcave rograms arameterized by s. The otima s is chosen as the one which yields the highest objective function in 12. The roblem of maximizing a quasiconcave function over a convex set under convex constraints can be efficiently and reliably solved by using the bisection method [28]. Based on the construction of the dominant system S 1 of system S, it can be noted that the queues of the dominant system are never less than those of system S, rovided that they are both initialized identically. This is because the SU transmits dummy ackets even if it does not have any ackets of its own, and therefore it always interferes with PU even if it is emty. The mean service rate of rimary queue is thus reduced in the dominant system and Q is emtied less frequently, thereby reducing also the mean service rate of the secondary queue. Given this, if the queues are stable in the dominant system, then they are stable in system S. That is, the stability conditions of the dominant system are sufficient for the stability of system S. Now if Q s saturates in the dominant system, the SU will not transmit dummy ackets as it always has its own ackets to send. For λ < µ, this makes the behavior of the dominant system identical to that of system S and both systems are indistinguishable at the boundary oints. The stability conditions of the dominant system are thus both sufficient and necessary for the stability of system S given that λ < µ. To get some insights for this system under the first dominant system, we consider the roblem when λ /P is high, which means that the rimary queue is nonemty most of the time, hence the otimal sensing decision is s = 0. 4 The maximum secondary stable throughut is given by solving the following otimization roblem: max. 0 t 1 λ e t [ 1 λ µ P + λ µ ], s.t. λ µ 13 The roblem is convex and can be solved using the Lagrangian formulation. The access robability t is uerbounded by F { } P λ F = min 1, λ e P P c 14 The second term in F must be nonnegative for the roblem 3 The non-negativity of the numerator and the denominator of µ s follow from the definition of the service rate. 4 This is also true when the MPR caability is high, i.e., strong MPR caability.

6 to be feasible. The otimal access robability is thus given by c }} P λ 1 P { t {F,max = min P λ e P /P,0 15 with 0 λ µ. From the otimal solution, we notice the following remarks. As λ increases, the secondary accesses robability, t, decreases as well. This is because the ossibility of collisions increases with increasing the access robability or increasing the secondary access to the channel and since the PU is busy most of the time, the ossibility of collisions and ackets loss increase as well. In addition, by observing the otimal solution in 15, we notice that as λ e increases, the access robability decreases. This is because accessing the channel most of the time with the availability of energy most of the time may cause high average acket loss for the PU. We note that as the caability of MPR of the rimary receiver, i.e., P c, increases, the access robability of the secondary queue increases because the ossibility of decoding the rimary acket under interference is almost equal to that robability without interference when MPR caability is high. Hence, the secondary throughut increases. In addition, as the ability of the secondary receiver of decoding the secondary ackets under interference, which is reresented by /P, increases, the access robability of the secondary terminal increases as far as the rimary stability condition is satisfied. B. Second Dominant System In the second dominant system, denoted as S 2, queue Q transmits dummy ackets when it is emty and the SU behaves as it would in systems. By substituting withpr{q = 0} = 0 into 2, the average secondary service rate is given by [ ] µ s = s t + s f P MD + s b P MD Pr{Q e 0} 16 where Pr{Q e 0}=λ e. Under this dominant system, the SU otimal sensing decision is s = 0. This is because the PU is always nonemty. Hence, Q s mean service rate in 16 is rewritten as µ s = t λ e 17 The robability of Q s being nonemty is λ s /µ s. Hence, the rimary queue mean service rate is given by µ = 1 λ s λ e P + λ [ ] s λ e t P c +1 t P 18 µ s µ s After some simlifications, the rimary mean service rate is given by µ = P λ s P 19 Note that µ is indeendent of t. The ortion of the stability region of S based on S 2 is obtained by solving a constrained otimization roblem in which µ is maximized under the stability of the rimary and the secondary queues. Since the rimary mean service rate is indeendent of t, the stability region of the second dominant system is given by solving the following otimization feasibility roblem max. P λ s 0 t 1 s.t. λ s t λ e P, Hence, the otimal access robability is t λ s λ e with λ s λ e. Based on 21, the solution is a range of t. We note that as the secondary mean arrival rate, λ s, increases, the lower limit of t increases as well. This is because the SU must increase its service rate, which increases with the increasing of the access robability, to maintain its queue stability. We also note that one of the feasible oints is λ s = µ s, which means a backlogged SU the arrival rate is equal to the service rate, hence Pr{Q s 0}=λ s /µ s =1. This system is equivalent to a system with random access without emloying any channel sensing with backlogged saturated rimary and secondary transmitters. Since the stability region of system S is the union of both dominant system, the stability region of the roosed rotocol always contains that of the random access without emloying any sectrum sensing. Based on this observation, we can say that at high rimary arrival rate, or at high robability of nonemty rimary queue, the random access without emloying any sensing scheme is otimal, i.e., the SU should not emloy channel sensing in such case. This is because the PU is always active and therefore there is no need to sense the channel and waste τ seconds of the data transmission time. IV. FEEDBACK-BASED ACCESS In this section, we analyze the use of the rimary feedback messages by the cognitive terminal. This system is denoted by Φ F. In the feedback-based access scheme, the SU utilizes the available rimary feedback information for accessing the channel in addition to sectrum sensing. Leveraging the rimary feedback is valid when it is available and unencryted. In the roosed scheme, the SU monitors the PU feedback channel. It may overhear an acknowledgment ACK if the rimary receiver correctly decodes the rimary transmission, a negative acknowledgment NACK if decoding fails, or nothing if there is no rimary transmission. We introduce the following modification to the rotocol introduced earlier in the aer. If a NACK is overheard by the SU, it assumes that the PU will retransmit the lost acket during the next time slot [29]. Being sure that the PU will be active, the secondary terminal does not need to sense the channel to ascertain the state of rimary activity. Therefore, it just accesses the channel with some robability r. If an ACK is observed on the feedback channel or no rimary feedback is overheard, the SU roceeds to oerate as exlained earlier in Section III. We assume the feedback ackets are very short comared to T

7 ϵ ϵ ϵ ϵ G a G G G a G 0 1 R 2 R R R l G a a G G 0 1F 2 F F 3F la a 0 a a Fig. 3. Markov chain of the PU for the feedback-based access scheme under dominant system S f 1. Probabilities Γ = 1 Γ and α = 1 α. State self-transitions are not deicted for visual clarity. η λ α +1 λ Γ π η λ Γ ǫ 0 π 1 ǫ 1 π k,k 2 π λ 1 α λ π λ +1 λ Γ 1 λ η π λ η 1 α ǫ k,k 2 π 1 λ 1 α [ ] k λ 1 η 1 η 2 1 λ η [ ] k λ 1 η 1 η 2 1 λ η and are always received correctly by both the rimary and secondary terminals due to the use of strong channel codes. It is imortant to emhasize here the benefit of emloying rimary feedback. By avoiding sectrum sensing, the secondary terminal does not have to waste τ seconds for channel sensing. It can use the whole slot duration for data transmission. As roven in [1], [30], this reduces the outage robability of the secondary link. Therefore, by differentiating between the rimary states of transmission, i.e., whether they are following the recetion of an ACK or not, the SU can otentially enhance its throughut by eliminating the need for sectrum sensing when the PU is about to retransmit a reviously lost acket. Note that we denote the system oerating exactly as system S with rimary feedback leveraging as S f. A. First dominant system As in the revious section, under the first dominant system, denoted by S f 1, Q s transmits dummy ackets when it is emty and the PU behaves as it would in system S f. The PU s queue evolution Markov chain under the first dominant system of this rotocol is shown in Fig. 3. The robability of the queue having k ackets and transmitting for the first time is π k, where F in Fig. 3 denotes first transmission. The robability of the queue having k ackets and retransmitting is ǫ k, where R in Fig. 3 denotes retransmission. Define α as the robability of successful transmission of the PU s acket in case of first transmission and Γ is the robability of successful transmission of the PU s acket in case of retransmission. It can be shown that both robabilities are given by: α = P λ e P P c s t + s P MD f + s P MD b 22 Γ = P λ e P P c r 23 Solving the state balance equations, we can obtain the state robabilities which are rovided in Table II. The robability k=1 π k k=1 ǫ k π λ Γ η λ = λ π λ η λ 1 α = λ Γ 1 α TABLE II STATE PROBABILITIES FOR THE FEEDBACK-BASED ACCESS SCHEME. π 0 is obtained using the normalization condition k=0 π k + ǫ k = 1. It should be noticed thatλ < η, whereη is defined in Table II, is a condition for the sum k=0 π k + ǫ k to exist. This condition ensures the existence of a stationary distribution for the Markov chain and guarantees the stability of the rimary queue. The service rate of the SU is given by: [ µ s = λ e π 0 s t P + s b P FA P + s f P FA P + π k s t + s f P MD k=1 + s b P MD + ǫ k k=1 r ] 24 Let H = λ e I, J = [D,0], Û = λ J +λ H, η = P + ˆP Û, ˆP = [t, f, b, r ], Γ = P + H ˆP, α = P ˆP J where r = I ˆP, I = [0,0,0,1]. After some algebra and substituting by the state robabilities in Table II, the secondary data queue mean service rate is given by µ s = [P λ K +õp I +λ P C ]ˆP+ ˆP ΨˆP P +H ˆP 25 where Ψ = ÛK + λ CH õji, C = [ s, sp MD, sp MD, õ = λ [, and. K= s P, s P FA P, s P FA P,0] It is straightforward to show that the Hessian matrix of the numerator of 25 is

8 2ˆP ˆP ΨˆP =Ψ+Ψ which is a negative semidefinite matrix and therefore the numerator is concave. 5 The denominator is affine over ˆP. Since for a given s the denominator is affine and the numerator is concave over ˆP, 25 is quasiconcave over ˆP for each s. For a fixed λ, the maximum mean service rate for the SU is given by solving the following otimization roblem using exression 24 for µ s max s, f, t, b, r µ s s.t. 0 s, f, t, b, r 1 λ η 26 The otimization roblem is a quasiconcave otimization roblem given s which can be solved efficiently using the bisection method [28]. For roof of quasiconcavity of the objective function, the reader is referred to Aendix B. The constraint λ η is affine over ˆP for a fixed s. Since the objective function is quasiconcave given s and the constraint is convex given s, 26 is quasiconcave rogram for a fixed s. Based on the construction of the dominant system S f 1, the queues of the dominant system are never less than those of system S f, rovided that they are both initialized identically. This is because the SU transmits dummy ackets even if it does not have any ackets of its own, and therefore it always interferes with PU even if it is emty. The mean service rate of rimary queue is thus reduced in the dominant system and Q is emtied less frequently, thereby reducing also the mean service rate of the secondary queue. Given this, if the queues are stable in the dominant system, then they are stable in system S f. That is, the stability conditions of the dominant system are sufficient for the stability of system S f. Now if Q s saturates in the dominant system, the SU will not transmit dummy ackets as it always has its own ackets to send. For λ < η, this makes the behavior of the dominant system identical to that of system S f and both systems are indistinguishable at the boundary oints. The stability conditions of the dominant system are thus both sufficient and necessary for the stability of system S f given that λ < η. B. Second dominant system The second dominant system ofs f is denoted bys f 2. Under S f 2, the PU sends dummy ackets when it is emty. This system reduces to a random access scheme without emloying any sectrum sensing and without leveraging the rimary feedback. This is because the PU is always nonemty and the otimal sensing decision is not to sense the channel at all. Moreover, the access robability of the SU is fixed over all rimary states. Hence, s = 0 and r = t. Accordingly, the second dominant system of S f is exactly the second dominant system of S. The stability region of system S f is the union of both dominant systems. 5 Ψ is a negative semidefinite because it comoses of three matrices ÛK, λ CH and õji each of which is a negative semidefinite matrix. These matrices are negative semidefinite because each of them is a nonositive matrix all elements are nonositive with rank1. Following are some imortant notes. First, the stability region of the first dominant systems for S and S f always contains that of the second dominant system. This can be easily shown by comaring the mean service rate of nodes in each dominant system. Second, the stability region of systems S and S f are inner bounds for the original systems Φ NF and Φ F, resectively, where the energy queue is oerating normally without the assumtion of one acket consumtion er time slot. Third, when the SU is lugged to a reliable ower source, the average arrival rate is λ e = 1 ackets er time slot. Under this case, the stability region of systems S and S f coincide with their corresonding original systems Φ NF and Φ F, resectively. This is because the energy queue in this case is always backlogged and never being emty regardless of the value of µ e. Hence, in general, the case of λ e = 1 ackets er time slot is an outer bound for the roosed systems, Φ NF and Φ F, as the SU can always send data whenever its data queue is nonemty. Next, we analyze the case of sectrum access without emloying any sensing scheme to give some insights for system S f. Note that the results obtained for this case are tight when λ /P is high. This is because, under this condition, the robability of the rimary queue being emty at a given time slot is almost zero and therefore the otimal sensing decision which avoids wasting τ seconds of the transmission time is s = 0. C. The case of s = 0 Under this case, the mean service rate of the SU is given by ] µ s =λ e [π 0 t P + π k t + ǫ k r k=1 k=1 27 Substituting with robability of summations in Table II, the secondary mean service rate is given by [ ] µ s =λ e π 0 t P +λ t + Γ α r 28 For a fixed λ, the maximum service rate for the SU is given by solving the following otimization roblem: max. t, r µ s s.t. 0 t, r 1, λ η 29 The otimization roblem is quasiconcave quasiconcave objective with a linear constraint and can be solved using bisection method [28]. Fixing r makes the otimization roblem a convex rogram arameterized by r. The otimal r is taken as that which yields the highest value of the objective function. Let l = λ e. We obtain the following otimization roblem for a given r : s.t. max. 0 t 1 Γ P λ l r λ +λ λ η Γ P P t λ l Γ 2 t 30 The objective function of 30 is concave over convex set under linear constraints, hence concave rogram. It can be solved

9 using the Lagrangian formulation. Setting the first derivative of the objective function to zero, the root of the first derivative is given by t = P λ l r λ +λ 2λ l P P 31 Since λ η = λ α +λ Γ and using 22, the access robability is uerbounded as t P λ l r λ λ l The otimal solution is then given by { t =min P λ l r λ, P λ l r λ +λ λ l 2λ l V. DELAY-AWARE PRIMARY USERS P P 32 } 33 In this section, we investigate the rimary queueing delay and lug a constraint on the rimary queueing delay to the otimization roblems. That is, we maximize µ s under the constraints that the rimary queue is stable and that the rimary acket delay is smaller than or equal a secified value D 1. 6 The value of D 1 is alication-deendent and is related to the required QoS for the PU. Delay analysis for interacting queues is a notoriously hard roblem [20]. To byass this difficulty, we consider the secial case where the secondary queue is always backlogged or saturated 7 while the rimary queue behaves exactly as it would in the original systems Φ NF and Φ F. This reresents a lower bound or worst-case scenario on erformance for the PU comared with the original systems in which the secondary queue is not backlogged all the time. Next, we comute the rimary queueing delay under each system. A. Primary Queueing Delay for System S Let D be the average delay of the rimary queue. Using Little s law and 6, D = 1 λ k=1 kν k = 1 λ µ λ 34 For the otimal random access and sensing, we solve the following constrained otimization roblem. We maximize the mean secondary service rate under the constraints that the rimary queue is stable and that the rimary acket delay is smaller than or equal a secified value D. The otimization roblem with µ given in 5 and µ s in 8 can be written as max s, f, b, t µ s s.t. 0 s, f, b, t 1 λ µ D D 35 6 Note that based on the adoted arrival model, the minimum rimary queueing delay is 1 time slot, i.e., D = 1 time slot. 7 This case equivalent to the first dominant systems of S and S f. The delay constraint in case of system S with backlogged SU can be converted to a constraint on the rimary mean service rate. That is, D = 1 λ µ λ D can be rewritten as µ λ + 1 λ D. The intersection of the stability constraint and the delay constraint is the delay constraint. That is, the set {λ : λ µ 1 λ D } {λ : λ µ } = {λ : λ µ 1 λ D }, both sets are equal when the delay constraint aroaches, i.e., D. Hence, the delay constraint subsumes the stability constraint. The otimization roblem is quasiconcave given s because µ s is quasiconcave as roven in Aendix B and the delay constraint is linear on the otimization arameters. At high λ /P, the robability of the rimary queue being emty at a given time slot is almost zero, hence the otimal sensing decision is s = 0. In this case, we can get the otimal solution of the otimization roblem as follows. The otimization roblem can be stated as [ max. λ e t 1 λ ] P + λ, s.t. λ µ, D D 0 t 1 µ µ 36 where µ = P λ e P P c t 37 The otimization roblem 36 is convex and can be solved using the Lagrangian formulation. The delay constraint subsumes the stability constraint, λ < µ, and t is uerbounded by U { U = min 1, P 1 λ D +λ { t {U,max = min P λ e P } 38 The second term in U must be nonnegative for the roblem to be feasible. The otimal access robability is thus given by c }} P λ 1 P λ e P /P,0 39 From the otimal solution 39, we can establish here a similar argument about the imact of each arameter on the secondary access robability as the one beneath 33. However, the difference here is that we have the imact of the delay constraint which has the following affect on the secondary access robability. As the delay constraint, D, increases, the access robability of the SU decreases to avoid increasing collisions with the PU and hence causes rimary throughut loss. If the amount of collisions is high, the delay constraint may be violated if the SU accesses with an access robability higher than t. B. Primary Queueing Delay for System S f Alying Little s law, the rimary queueing delay is given by D = 1 kπ k +ǫ k 40 λ k=1

10 Using the state robabilities rovided in Table II, D = α ηη λ 2 +1 λ 2 1 α η η λ 1 λ 1 ηγ 41 For a fixed λ, the maximum mean service rate for the SU is given by solving the following otimization roblem using exression 24 for µ s max s, f, t, b, r µ s s.t. 0 s, f, t, b, r 1 λ η D D 42 Note that µ s is given by 25. The otimization roblem is a quasiconcave otimization roblem for a given s and r. For roof of quasiconcavity of the objective function for a given s and r, see roof beneath 25. The delay constraint can be rewritten as E= η Γ η λ 2 +λ W η+ Dη λ η 1Γ λ 0 η η 43 where W=λ +λ Γ and D 1. The second derivative of E for a given r with resect to η is given by η E= 2Γ D 1λ 2 +η 3 η η E is always nonnegative. Hence, E is convex over η for a fixed r. Since η is affine over ˆP for a fixed s, E is then convex over ˆP. This comletes the roof of quasiconcavity of 42 for a given s and r. Note that we solve a family of quasiconcave roblems arameterized by s and r. The otimaair r, s is taken as the air which yields the highest objective function in 42. VI. NUMERICAL RESULTS AND CONCLUSIONS In this section, we rovide some numerical results for the otimization roblems resented in this aer. A random access without emloying sectrum sensing is simly obtained from system S by setting s to zero. Let S R and S f R denote the random access system without emloying any sectrum sensing without and with feedback leveraging, resectively. We also introduce the conventional scheme of sectrum access, denoted by S c. In this system, the SU senses the channel each time slot for τ seconds. If the PU is sensed to be inactive, the SU accesses with robability1. If the PU is sensed to be active, the SU remains silent. The mean service rates for this case are obtained from Section III with t = 0, s = 1, f = 1 and b = 0. We define here two variables δ = Pc and P δ = Pc, both of them are less than 1 as shown in Aendix P A. Fig. 4 shows the stability region of the roosed rotocols. Systems S R and S f R are also lotted. The arameters used to generate the figure are: λ e = 1 energy ackets/slot, P = 0.7, = 0.1, P = 0.8, = 0.1, P = 0.6, = 0.3, P FA = 0.01, and P MD = We can note that rimary feedback leveraging exands the stability region. It is also noted that randomly accessing the channel without channel sensing and with rimary feedback leveraging can outerform system S for some λ. This is because in system S f R the SU does not sense the channel at the following time slot to rimary acket decoding failure at the rimary destination. Therefore, the SU does not waste τ seconds in channel sensing and it is sure of the activity of the PU. Fig. 5 rovides a comarison between the maximum secondary stable throughut for the roosed systems and the conventional system. The arameters used to generate the figure are: λ e = 0.4 energy ackets/slot, P = 0.7, = 0.1, P = 0.8, = 0.1, P = 0.6, = 0.075, P FA = 0.05, and P MD = For the investigated arameters, over λ <0.475 ackets/slot, the roosed rotocols outerform the conventional system. Whereas over λ ackets/slot, all systems rovide the same erformance. This is because at high rimary arrival rate, the robability of the rimary queue being emty is very low and the PU will be active most of the time slots. Hence, the SU senses the channel each time slot and avoids accessing the channel when the PU is sensed to be active and at retransmission states. That is, t = 0, s = 1, r = 0, b = 0 and f = 1. We note that feedback leveraging always enhances the secondary throughut. Figs. 6 and 7 show the imact of the MPR caability at the receiving nodes on the stable throughut region. Without MPR caability, collisions are assumed to lead to sure acket loss. Therefore, a collision model without MPR corresonds to the case of the robabilities of correct recetion being zero when there are simultaneous transmissions. As shown in Fig. 6, the secondary service rate is reduced when there is no MPR caability. As the strength of MPR caability increases, the stability regions exand significantly. It can be noted that the erformance of S and S f are equal when the MPR caability is high. This is due to the fact that the SU does not need to emloy channel sensing or feedback leveraging as it can transmit each time slot simultaneously with the PU because the secondary receiver can decode ackets under interference with a robability almost equal to the robability when it transmits alone. The figure is lotted for different MPR strength of the secondary receiver, namely, for P 1 =δ =δ =0, P 2 =δ = δ =1/8, P 3 = δ =δ =1/4 and P 4 =δ =δ =1/2. The arameters used to generate the figure are: λ e = 0.4 energy ackets/slot, P = 0.7, = 0.1, P = 0.8, P = 0.6, P FA = 0.05, andp MD = Fig. 7 demonstrates the imact of the MRR caability of the rimary receiver on the stability region of system S. As can be seen, the increases of increases the secondary stable throughut for each λ. The arameters used to generate the figure are: λ e = 0.8 energy ackets/slot, P = 0.7, P = 0.8, = 0.1, P = 0.6, = 0.075, P FA = 0.05, and P MD = 0.01 and for different values of. Fig. 8 shows the imact of the energy arrival rate on the secondary stable throughut for the considered systems. The arameters used to generate the figure are: λ = 0.4 ackets/slot, P = 0.7, = 0.1, P = 0.8, = 0.1,

11 λ s [ackets/slot] S f S S f R S R λ s [ackets/slot] S f S S c Equaerformance X: Y: λ [ackets/slot] λ [ackets/slot] Fig. 4. Stability region of the roosed systems. Fig. 5. Stability region of the roosed systems. The conventional system, S c, is also lotted for comarison uroses. P = 0.6, = 0.075, P FA = 0.05, and P MD = As exected, the secondary service rate increasing with increasing λ e. We note that there are some constant arts in systems S R and S f R at high λ e. This is due to the fact that increasing the energy arrivals at the energy queue may not boost the secondary throughut because the SU even if it has a lot of energy ackets it cannot violate the rimary QoS. The violation of the rimary QoS may occur due to the resence of sensing errors. We also note that at low energy arrival rate, all systems have the same erformance. This is because the secondary access robabilities and the rate in each system are limited by the mean arrival rate of the secondary energy arrival rate. To facilitate investigating the imact of the secified delay constraint, Fig. 9 rovides the effect of varying this constraint on the secondary service rate. The arameters used to generate the figure are: λ e = 0.4 energy ackets/slot, P = 0.7, = 0.1, P = 0.8, = 0.1, P = 0.6, = 0.075, P FA = 0.05, and P MD = 0.01 and two different values of the rimary queueing delay constraint. As is clear from the figure, the secondary service rate is reduced when the rimary queueing delay constraint is more strict. APPENDIX A We adot a flat fading channel model and assume that the channel gains remain constant over the duration of the time slot. We do not assume the availability of transmit channel state information CSI at the transmitters. Each receiver is modeled as zero mean additive white Gaussian noise AWGN. We derive here a generic exression for the outage robability at the receiver of transmitter j node k when there is concurrent transmission from the transmitter v. Assume that node j starts transmission at iτ and node j starts transmission at nτ. Outage occurs when the sectral efficiency R i j = b, WT i j where W is the channel bandwidth, T i j is the transmission time of nodej andbis number of bits er data acket, exceeds λ s [ackets/slot] Fig. 6. λ s [ackets/slot] P 1 P2 P 3 S S f λ [ackets/slot] P 4 Stability region of the roosed systems. = 0.0 = 0.4 = P = λ [ackets/slot] Fig. 7. Stability region of system S for different values of the rimary receiver MPR caability.

12 λ s [ackets/slot] S f S S f R S R X: 0.2 Y: Equaerformance of these two random variables to obtain the outage as i j,in = 1 1 ex 1+ 2 Ri γvk,n σ j 1 2R j 1 47 vk γ jk,i σ jk γ jk,i σ jk We note that from the outage robability 47, the numerator is increasing function of R i j and the denominator is a decreasing function of R i j. Hence, the outage robability increases withri j. The robability of correct recetion jk,in jk,i = 1 Pc jk,i is thus given by Fig. 8. λ s [ackets/slot] λ [energy ackets/slot] e Maximum secondary throughut versus energy arrival rate. D = 1.8 D = λ [ackets/slot] Fig. 9. Maximum secondary throughut versus λ for secific rimary queueing delay. the channel caacity { j,in = Pr R i j > log 2 1+ γ } jk,iβ jk γ vk,n β vk +1 S f S 45 where the suerscrit c denotes concurrent transmission, Pr{.} denotes the robability of the argument,β jk is the channel gain of link j k, N k is the noise variance at receiver k in Watts, γ jk,i =P i j /N k, P i j Watts is the transmit ower emloyed by node j when it starts transmission at t=iτ, γ vk,n =P ν n /N k, and P n v is the used transmit ower by node v when it starts transmission at t=nτ. The outage robability can be written as γ vk,n β vk +1 < i 2R j j,in = Pr { γjk,i β jk } 1 46 Since β jk and β vk are indeendent and exonentially distributed Rayleigh fading channel gains with means σ jk and σ vk, resectively, we can use the robability density functions j,in = 1+ P jk,i b P jk,i 48 TW1 2 iτ T γvk,n σ 1 vk γ jk,i σ jk 2Ri j 1 γ jk,i σ jk where P jk,i =ex is the robability of acket correct decoding at receiver k when node j transmits singly without interference. As is obvious, the robability of correct recetion is lowered in the case of interference. Following are some imortant notes. First, note that if the PU s queue is nonemty, the PU transmits the acket at the head of its queue at the beginning of the time slot with a fixed transmit ower P and data transmission time T =T. Accordingly, the suerscrit i which reresents the instant that a transmitting node starts transmission in is removed in case of PU. Second, for the SU, the formula of robability of comlement outage of link s sd when the PU is active is given by s,i0 = 1+ ex b 2 TW1 iτ T 1 γ ssd,i σ ssd b 49 TW1 2 iτ T γsd,0 σ 1 sd γ ssd,i σ ssd where n = 0 because the PU always transmits at the beginning of the time slot and γ ssd,i = e/t1 iτ/tn sd = γ ssd,0 /1 iτ/t. The denominator of 49 is roortional to b TW1 2 iτ T 1 1 i τ T, which in turn monotonically decreasing with iτ. Using the first derivative with resect to b TW1 iτ T iτ, the numerator of 49, P s,i0 = ex 1 e, 2 T1 i τ T σ ssd can be easily shown to be decreasing with iτ as in [1], [30]. Since the numerator of 49 is monotonically decreasing with iτ and the denominator is monotonically increasing with i, s,i0 is monotonically decreasing with iτ. Therefore, the secondary access delay causes reduction in robability of secondary ackets correct recetion at the secondary destinations. Thirdly, for the PU, i = 0, j = and k = d, the formula of robability of comlement outage of link d when the SU transmits at nτ is given by,0n = P, b γsd,n σ TW 1 sd γ d,0 σ d

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging 1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014

More information

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

An Analysis of TCP over Random Access Satellite Links

An Analysis of TCP over Random Access Satellite Links An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Mohammed Karmoose 1 Ahmed Sultan 1 Moustafa Youseff 2 1 Electrical Engineering Dept, Alexandria University 2 E-JUST Agenda 1

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Multi-Channel MAC Protocol for Full-Duplex Cognitive Radio Networks with Optimized Access Control and Load Balancing

Multi-Channel MAC Protocol for Full-Duplex Cognitive Radio Networks with Optimized Access Control and Load Balancing Multi-Channel MAC Protocol for Full-Dulex Cognitive Radio etworks with Otimized Access Control and Load Balancing Le Thanh Tan and Long Bao Le arxiv:.3v [cs.it] Feb Abstract In this aer, we roose a multi-channel

More information

Delay characterization of multi-hop transmission in a Poisson field of interference

Delay characterization of multi-hop transmission in a Poisson field of interference 1 Delay characterization of multi-ho transmission in a Poisson field of interference Kostas Stamatiou and Martin Haenggi, Senior Member, IEEE Abstract We evaluate the end-to-end delay of a multi-ho transmission

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE)

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE) KAUST Reository Outage erformance of cognitive radio systems with Imroer Gaussian signaling Item tye Authors Erint version DOI Publisher Journal Rights Conference Paer Amin Osama; Abediseid Walid; Alouini

More information

Anytime communication over the Gilbert-Eliot channel with noiseless feedback

Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anant Sahai, Salman Avestimehr, Paolo Minero Deartment of Electrical Engineering and Comuter Sciences University of California

More information

Opportunistic Spectrum Access in Multiple Primary User Environments Under the Packet Collision Constraint

Opportunistic Spectrum Access in Multiple Primary User Environments Under the Packet Collision Constraint IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. Y, 1 Oortunistic Sectrum Access in Multile Primary User Environments Under the Packet Collision Constraint Eric Jung, Student Member, IEEE, and Xin Liu,

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

WIRELESS energy transfer (WET), where receivers harvest

WIRELESS energy transfer (WET), where receivers harvest 6898 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 10, OCTOBER 2016 User-Centric Energy Efficiency Maximization for Wireless Powered Communications Qingqing Wu, Student Member, IEEE, Wen Chen,

More information

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 On the Relationshi Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 Imad Antonios antoniosi1@southernct.edu CS Deartment MO117 Southern Connecticut State University 501 Crescent St.

More information

Age of Information: Whittle Index for Scheduling Stochastic Arrivals

Age of Information: Whittle Index for Scheduling Stochastic Arrivals Age of Information: Whittle Index for Scheduling Stochastic Arrivals Yu-Pin Hsu Deartment of Communication Engineering National Taiei University yuinhsu@mail.ntu.edu.tw arxiv:80.03422v2 [math.oc] 7 Ar

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach

Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach PROC. WIOP 204 Power Aware Wireless File Downloading: A Constrained Restless Bandit Aroach Xiaohan Wei and Michael J. Neely, Senior Member, IEEE Abstract his aer treats ower-aware throughut maximization

More information

Delay Performance of Threshold Policies for Dynamic Spectrum Access

Delay Performance of Threshold Policies for Dynamic Spectrum Access IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO. 7, JULY 83 Delay Performance of Threshold Policies for Dynamic Sectrum Access Rong-Rong Chen and Xin Liu Abstract In this aer, we analyze the delay

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Asymptotically Optimal Simulation Allocation under Dependent Sampling Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications

Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Bartłomiej Błaszczyszyn Paul Muhlethaler Nadjib Achir INRIA/ENS INRIA Rocquencourt INRIA Rocquencourt

More information

Statics and dynamics: some elementary concepts

Statics and dynamics: some elementary concepts 1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and

More information

On Code Design for Simultaneous Energy and Information Transfer

On Code Design for Simultaneous Energy and Information Transfer On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter

More information

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies Online Aendix to Accomany AComarisonof Traditional and Oen-Access Aointment Scheduling Policies Lawrence W. Robinson Johnson Graduate School of Management Cornell University Ithaca, NY 14853-6201 lwr2@cornell.edu

More information

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding Homework Set # Rates definitions, Channel Coding, Source-Channel coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Lecture 21: Quantum Communication

Lecture 21: Quantum Communication CS 880: Quantum Information Processing 0/6/00 Lecture : Quantum Communication Instructor: Dieter van Melkebeek Scribe: Mark Wellons Last lecture, we introduced the EPR airs which we will use in this lecture

More information

Spatial Outage Capacity of Poisson Bipolar Networks

Spatial Outage Capacity of Poisson Bipolar Networks Satial Outage Caacity of Poisson Biolar Networks Sanket S. Kalamkar and Martin Haenggi Deartment of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556, USA E-mail: skalamka@nd.edu,

More information

ABSTRACT CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS. Title of dissertation: Anthony A. Fanous, Doctor of Philosophy, 2013

ABSTRACT CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS. Title of dissertation: Anthony A. Fanous, Doctor of Philosophy, 2013 ABSTRACT Title of dissertation: CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS Anthony A. Fanous, Doctor of Philosophy, 2013 Dissertation directed by: Professor Anthony Ephremides Department of Electrical

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

Approximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels

Approximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels Aroximate Dynamic Programming for Dynamic Caacity Allocation with Multile Priority Levels Alexander Erdelyi School of Oerations Research and Information Engineering, Cornell University, Ithaca, NY 14853,

More information

Periodic scheduling 05/06/

Periodic scheduling 05/06/ Periodic scheduling T T or eriodic scheduling, the best that we can do is to design an algorithm which will always find a schedule if one exists. A scheduler is defined to be otimal iff it will find a

More information

Optimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI

Optimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI Otimal Power Control over Fading Cognitive Radio Channels by Exloiting Primary User CSI Rui Zhang Abstract arxiv:0804.67v2 [cs.it] 7 Feb 2009 This aer is concerned with sectrum sharing cognitive radio

More information

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment

More information

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle] Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear

More information

Non-orthogonal Multiple Access in Large-Scale. Underlay Cognitive Radio Networks

Non-orthogonal Multiple Access in Large-Scale. Underlay Cognitive Radio Networks Non-orthogonal Multile Access in Large-Scale 1 Underlay Cognitive Radio Networks Yuanwei Liu, Zhiguo Ding, Maged Elkashlan, and Jinhong Yuan Abstract In this aer, non-orthogonal multile access (NOMA is

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

Developing A Deterioration Probabilistic Model for Rail Wear

Developing A Deterioration Probabilistic Model for Rail Wear International Journal of Traffic and Transortation Engineering 2012, 1(2): 13-18 DOI: 10.5923/j.ijtte.20120102.02 Develoing A Deterioration Probabilistic Model for Rail Wear Jabbar-Ali Zakeri *, Shahrbanoo

More information

q-ary Symmetric Channel for Large q

q-ary Symmetric Channel for Large q List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu

More information

A Simple Throughput Model for TCP Veno

A Simple Throughput Model for TCP Veno A Simle Throughut Model for TCP Veno Bin Zhou, Cheng Peng Fu, Dah-Ming Chiu, Chiew Tong Lau, and Lek Heng Ngoh School of Comuter Engineering, Nanyang Technological University, Singaore 639798 Email: {zhou00,

More information

Vision Graph Construction in Wireless Multimedia Sensor Networks

Vision Graph Construction in Wireless Multimedia Sensor Networks University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Conference and Worksho Paers Comuter Science and Engineering, Deartment of 21 Vision Grah Construction in Wireless Multimedia

More information

Analysis of M/M/n/K Queue with Multiple Priorities

Analysis of M/M/n/K Queue with Multiple Priorities Analysis of M/M/n/K Queue with Multile Priorities Coyright, Sanjay K. Bose For a P-riority system, class P of highest riority Indeendent, Poisson arrival rocesses for each class with i as average arrival

More information

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is

More information

End-to-End Delay Minimization in Thermally Constrained Distributed Systems

End-to-End Delay Minimization in Thermally Constrained Distributed Systems End-to-End Delay Minimization in Thermally Constrained Distributed Systems Pratyush Kumar, Lothar Thiele Comuter Engineering and Networks Laboratory (TIK) ETH Zürich, Switzerland {ratyush.kumar, lothar.thiele}@tik.ee.ethz.ch

More information

Understanding and Using Availability

Understanding and Using Availability Understanding and Using Availability Jorge Luis Romeu, Ph.D. ASQ CQE/CRE, & Senior Member C. Stat Fellow, Royal Statistical Society Past Director, Region II (NY & PA) Director: Juarez Lincoln Marti Int

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino

More information

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical

More information

An Outdoor Recreation Use Model with Applications to Evaluating Survey Estimators

An Outdoor Recreation Use Model with Applications to Evaluating Survey Estimators United States Deartment of Agriculture Forest Service Southern Research Station An Outdoor Recreation Use Model with Alications to Evaluating Survey Estimators Stanley J. Zarnoch, Donald B.K. English,

More information

Coding Along Hermite Polynomials for Gaussian Noise Channels

Coding Along Hermite Polynomials for Gaussian Noise Channels Coding Along Hermite olynomials for Gaussian Noise Channels Emmanuel A. Abbe IG, EFL Lausanne, 1015 CH Email: emmanuel.abbe@efl.ch Lizhong Zheng LIDS, MIT Cambridge, MA 0139 Email: lizhong@mit.edu Abstract

More information

Traffic Engineering in a Multipoint-to-Point Network

Traffic Engineering in a Multipoint-to-Point Network 1 Traffic Engineering in a Multioint-to-Point Network Guillaume Urvoy-Keller, Gérard Hébuterne, and Yves Dallery Abstract The need to guarantee Quality of Service (QoS) to multimedia alications leads to

More information

Brownian Motion and Random Prime Factorization

Brownian Motion and Random Prime Factorization Brownian Motion and Random Prime Factorization Kendrick Tang June 4, 202 Contents Introduction 2 2 Brownian Motion 2 2. Develoing Brownian Motion.................... 2 2.. Measure Saces and Borel Sigma-Algebras.........

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

Optimism, Delay and (In)Efficiency in a Stochastic Model of Bargaining

Optimism, Delay and (In)Efficiency in a Stochastic Model of Bargaining Otimism, Delay and In)Efficiency in a Stochastic Model of Bargaining Juan Ortner Boston University Setember 10, 2012 Abstract I study a bilateral bargaining game in which the size of the surlus follows

More information

DEPARTMENT OF ECONOMICS ISSN DISCUSSION PAPER 20/07 TWO NEW EXPONENTIAL FAMILIES OF LORENZ CURVES

DEPARTMENT OF ECONOMICS ISSN DISCUSSION PAPER 20/07 TWO NEW EXPONENTIAL FAMILIES OF LORENZ CURVES DEPARTMENT OF ECONOMICS ISSN 1441-549 DISCUSSION PAPER /7 TWO NEW EXPONENTIAL FAMILIES OF LORENZ CURVES ZuXiang Wang * & Russell Smyth ABSTRACT We resent two new Lorenz curve families by using the basic

More information

8 STOCHASTIC PROCESSES

8 STOCHASTIC PROCESSES 8 STOCHASTIC PROCESSES The word stochastic is derived from the Greek στoχαστικoς, meaning to aim at a target. Stochastic rocesses involve state which changes in a random way. A Markov rocess is a articular

More information

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of

More information

Proof: We follow thearoach develoed in [4]. We adot a useful but non-intuitive notion of time; a bin with z balls at time t receives its next ball at

Proof: We follow thearoach develoed in [4]. We adot a useful but non-intuitive notion of time; a bin with z balls at time t receives its next ball at A Scaling Result for Exlosive Processes M. Mitzenmacher Λ J. Sencer We consider the following balls and bins model, as described in [, 4]. Balls are sequentially thrown into bins so that the robability

More information

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment

More information

Sets of Real Numbers

Sets of Real Numbers Chater 4 Sets of Real Numbers 4. The Integers Z and their Proerties In our revious discussions about sets and functions the set of integers Z served as a key examle. Its ubiquitousness comes from the fact

More information

Stability Analysis of Slotted Aloha with Opportunistic RF Energy Harvesting

Stability Analysis of Slotted Aloha with Opportunistic RF Energy Harvesting 1 Stability Analysis of Slotted Aloha with Opportunistic RF Energy Harvesting Abdelrahman M.Ibrahim, Ozgur Ercetin, and Tamer ElBatt arxiv:151.6954v2 [cs.ni] 27 Jul 215 Abstract Energy harvesting (EH)

More information

On the Chvatál-Complexity of Knapsack Problems

On the Chvatál-Complexity of Knapsack Problems R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew

More information

Understanding and Using Availability

Understanding and Using Availability Understanding and Using Availability Jorge Luis Romeu, Ph.D. ASQ CQE/CRE, & Senior Member Email: romeu@cortland.edu htt://myrofile.cos.com/romeu ASQ/RD Webinar Series Noviembre 5, J. L. Romeu - Consultant

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

t 0 Xt sup X t p c p inf t 0

t 0 Xt sup X t p c p inf t 0 SHARP MAXIMAL L -ESTIMATES FOR MARTINGALES RODRIGO BAÑUELOS AND ADAM OSȨKOWSKI ABSTRACT. Let X be a suermartingale starting from 0 which has only nonnegative jums. For each 0 < < we determine the best

More information

1 Gambler s Ruin Problem

1 Gambler s Ruin Problem Coyright c 2017 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins

More information

Uncertainty Modeling with Interval Type-2 Fuzzy Logic Systems in Mobile Robotics

Uncertainty Modeling with Interval Type-2 Fuzzy Logic Systems in Mobile Robotics Uncertainty Modeling with Interval Tye-2 Fuzzy Logic Systems in Mobile Robotics Ondrej Linda, Student Member, IEEE, Milos Manic, Senior Member, IEEE bstract Interval Tye-2 Fuzzy Logic Systems (IT2 FLSs)

More information

Joint Property Estimation for Multiple RFID Tag Sets Using Snapshots of Variable Lengths

Joint Property Estimation for Multiple RFID Tag Sets Using Snapshots of Variable Lengths Joint Proerty Estimation for Multile RFID Tag Sets Using Snashots of Variable Lengths ABSTRACT Qingjun Xiao Key Laboratory of Comuter Network and Information Integration Southeast University) Ministry

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Training sequence optimization for frequency selective channels with MAP equalization

Training sequence optimization for frequency selective channels with MAP equalization 532 ISCCSP 2008, Malta, 12-14 March 2008 raining sequence otimization for frequency selective channels with MAP equalization Imed Hadj Kacem, Noura Sellami Laboratoire LEI ENIS, Route Sokra km 35 BP 3038

More information

START Selected Topics in Assurance

START Selected Topics in Assurance START Selected Toics in Assurance Related Technologies Table of Contents Introduction Statistical Models for Simle Systems (U/Down) and Interretation Markov Models for Simle Systems (U/Down) and Interretation

More information

Stability analysis of a cognitive multiple access channel with primary QoS constraints

Stability analysis of a cognitive multiple access channel with primary QoS constraints tability analysis of a cognitive multiple access channel with primary o constraints J. Gambini 1,2,O.imeone 1, U. pagnolini 2,.Bar-Ness 1 andungsooim 3 1 CWCR, NJIT, Newark, New Jersey 07102-1982, UA 2

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

arxiv:cond-mat/ v2 25 Sep 2002

arxiv:cond-mat/ v2 25 Sep 2002 Energy fluctuations at the multicritical oint in two-dimensional sin glasses arxiv:cond-mat/0207694 v2 25 Se 2002 1. Introduction Hidetoshi Nishimori, Cyril Falvo and Yukiyasu Ozeki Deartment of Physics,

More information

Notes on Instrumental Variables Methods

Notes on Instrumental Variables Methods Notes on Instrumental Variables Methods Michele Pellizzari IGIER-Bocconi, IZA and frdb 1 The Instrumental Variable Estimator Instrumental variable estimation is the classical solution to the roblem of

More information

Mobility-Induced Service Migration in Mobile. Micro-Clouds

Mobility-Induced Service Migration in Mobile. Micro-Clouds arxiv:503054v [csdc] 7 Mar 205 Mobility-Induced Service Migration in Mobile Micro-Clouds Shiiang Wang, Rahul Urgaonkar, Ting He, Murtaza Zafer, Kevin Chan, and Kin K LeungTime Oerating after ossible Deartment

More information

Chapter 5 Notes. These notes correspond to chapter 5 of Mas-Colell, Whinston, and Green.

Chapter 5 Notes. These notes correspond to chapter 5 of Mas-Colell, Whinston, and Green. Chater 5 Notes These notes corresond to chater 5 of Mas-Colell, Whinston, and Green. 1 Production We now turn from consumer behavior to roducer behavior. For the most art we will examine roducer behavior

More information

Partial Identification in Triangular Systems of Equations with Binary Dependent Variables

Partial Identification in Triangular Systems of Equations with Binary Dependent Variables Partial Identification in Triangular Systems of Equations with Binary Deendent Variables Azeem M. Shaikh Deartment of Economics University of Chicago amshaikh@uchicago.edu Edward J. Vytlacil Deartment

More information

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation Paer C Exact Volume Balance Versus Exact Mass Balance in Comositional Reservoir Simulation Submitted to Comutational Geosciences, December 2005. Exact Volume Balance Versus Exact Mass Balance in Comositional

More information

Factors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doped Fiber Amplifier

Factors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doped Fiber Amplifier Australian Journal of Basic and Alied Sciences, 5(12): 2010-2020, 2011 ISSN 1991-8178 Factors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doed Fiber Amlifier

More information

Self-Sustainability of Energy Harvesting Systems: Concept, Analysis, and Design

Self-Sustainability of Energy Harvesting Systems: Concept, Analysis, and Design 1 Self-Sustainability of Energy arvesting Systems: Concet, Analysis, and Design Sudarshan Guruacharya and Ekram ossain Deartment of Electrical and Comuter Engineering, University of Manitoba, Canada Emails:

More information

Diverse Routing in Networks with Probabilistic Failures

Diverse Routing in Networks with Probabilistic Failures Diverse Routing in Networks with Probabilistic Failures Hyang-Won Lee, Member, IEEE, Eytan Modiano, Senior Member, IEEE, Kayi Lee, Member, IEEE Abstract We develo diverse routing schemes for dealing with

More information

Theory of Externalities Partial Equilibrium Analysis

Theory of Externalities Partial Equilibrium Analysis Theory of Externalities Partial Equilibrium Analysis Definition: An externality is resent whenever the well being of a consumer or the roduction ossibilities of a firm are directly affected by the actions

More information

Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems

Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Hsiao-Lan Chiang, Tobias Kadur, and Gerhard Fettweis Vodafone Chair for Mobile Communications Technische Universität

More information

Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Application

Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Application BULGARIA ACADEMY OF SCIECES CYBEREICS AD IFORMAIO ECHOLOGIES Volume 9 o 3 Sofia 009 Positive Definite Uncertain Homogeneous Matrix Polynomials: Analysis and Alication Svetoslav Savov Institute of Information

More information

Discrete-time Geo/Geo/1 Queue with Negative Customers and Working Breakdowns

Discrete-time Geo/Geo/1 Queue with Negative Customers and Working Breakdowns Discrete-time GeoGeo1 Queue with Negative Customers and Working Breakdowns Tao Li and Liyuan Zhang Abstract This aer considers a discrete-time GeoGeo1 queue with server breakdowns and reairs. If the server

More information

An Improved Calibration Method for a Chopped Pyrgeometer

An Improved Calibration Method for a Chopped Pyrgeometer 96 JOURNAL OF ATMOSPHERIC AND OCEANIC TECHNOLOGY VOLUME 17 An Imroved Calibration Method for a Choed Pyrgeometer FRIEDRICH FERGG OtoLab, Ingenieurbüro, Munich, Germany PETER WENDLING Deutsches Forschungszentrum

More information

On a Markov Game with Incomplete Information

On a Markov Game with Incomplete Information On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information

More information