Coding for Noisy Write-Efficient Memories

Size: px
Start display at page:

Download "Coding for Noisy Write-Efficient Memories"

Transcription

1 Coding for oisy Write-Effiient Memories Qing Li Computer Si. & Eng. Dept. Texas A & M University College Station, TX qingli@se.tamu.edu Anxiao (Andrew) Jiang CSE and ECE Departments Texas A & M University College Station, TX ajiang@se.tamu.edu Abstrat For nonvolatile memories suh as flash memories and phase-hange memories, endurane and reliability are both important hallenges. Write-Effiient Memory (WEM) is an important rewriting model to solve the endurane problem. An optimal rewriting ode has been proposed to approah the rewriting apaity of WEM. Aig at jointly solving the endurane and the data reliability problem, this work fouses on a ombined error orretion and rewriting ode for WEM. To that end, a new oding model, noisy WEM, is proposed here. Its noisy rewriting apaity is explored. An effiient oding sheme is onstruted for a speial ase of noisy WEM. Its deoding and rewriting operations an be done in time O( log ), with as the length of the odeword, and it provides a lower bound to the noisy WEM s apaity. I. ITRODUCTIO onvolatile memories (suh as flash memories and phase-hange memories (PCM)) are beog ubiquitous nowadays. Besides the well-known endurane [8] problem, another serious hallenge is the data reliability issue, e.g., retention error in AD flash memories and resistane drift in PCM. Write-effiient memory (WEM) [] is a oding model that an be used to solve the endurane problem for nonvolatile memories. In WEM, odewords are partitioned into several disjointed sets, where odewords of the same set represent the same data. A ost onstraint has to be satisfied during the rewriting (namely, updating the data stored in WEM). WEM is a natural model for PCM [], and an also be applied to flash memory when data representation sheme suh as rank modulation [3] is used. In WEM, there is a ost assoiated with hanging the level of a ell. For nonvolatile memories suh as PCM, this ost is important beause ells age with programg and have the endurane problem. An optimal ode [4] has been proposed to ahieve the rewriting apaity of WEM. However, rewriting odes ombined with error orretion are still limited [9], espeially for WEM [6]. In this paper, we propose a joint error orretion and rewriting sheme for WEM. While previous results are mainly for Write-One Memories [3], our work fouses on WEM. We propose a new oding model, noisy WEM, and provide a haraterization for its apaity. We present an effiient oding sheme based on polar odes [2] for a speial ase of noisy WEM. The sheme is related to the oding shemes in [], [3] and [9]. We also provide a lower bound to noisy WEM s apaity, and experimentally verify the ode onstrution s performane. The rest of this paper is organized as follows. In Setion II, we introdue noisy write-effiient memory model. In Setion III, we present haraterization of noisy rewriting apaity of noisy WEM. In Setion IV, we present an effiient ode onstrution for a speial ase of binary noisy WEM, and verify its performane experimentally. We onlude this paper in Setion V. II. OISY WRITE-EFFICIET MEMORY MODEL In this setion, we first introdue terms and notations used throughout the paper, and then formally present the definitions of noisy WEM and related parameters. A. Terms and notations Let X = {,,, q } be the alphabet of a symbol stored in a ell. (For example, for PCM, it denotes the q levels of a ell.) x, y X, let the rewriting ost of hanging a ell s level from x to y be ϕ(x, y). Given ells and, y X, let ϕ(x, y ) = i= ϕ(x i, y i ) be the rewriting ost of hanging the ell levels from x to y. Let M and D = {,,, M }. We use D to denote the M possible values of the data stored in the ells. Let the deoding funtion be D : X D, whih maps the ells levels to the data they represent. Let the rewriting funtion be R : X D X, whih hanges the ells levels to represent the new input data. aturally, we require D(R(x, i)) = i for any X and i D. Assume the sequene of data written to the storage medium is {M,, M t }, where we assume M i for i t is uniformly dis-

2 tributed over D, and the average rewriting ost def t is D = lim t t ϕ( (i), D(M i, x (i))), i= where (i) is the urrent ell states before the i th update. By assug the stationary distribution of ell levels (i) is π( ), D = π( ) j D D j ( ), where D j ( ) is the average rewriting ost of updating ell level states x to a odeword representing j D. Let P(X X ) be the set of joint probability distributions over X X. For a pair of random variables (S, X) (X, X ), let P SX, P S, P X S denote the joint probability distribution, the marginal distribution, and the onditional probability distribution, respetively. E( ) denotes the expetation operator. If X is uniformly distributed over {,,, q }, denote it by X U(q). B. oisy WEM with an average rewriting ost onstraint We formally present the definition of noisy WEM with an average rewriting ost onstraint as follows: Definition. An (, M, q, d) ave noisy WEM ode for the storage hannel P = (X, X, P Y X (y x)) onsists of D and C = i D C i, where C i X is the set of odewords representing data i. We require i j, C i Cj =. (Here P Y X (y x) represents the transition probability of the noisy hannel, whih hanges a ell s level from x to y.) It also onsists of a rewriting funtion R(s, i) and a deoding funtion D(y ). Let d R + be an upper bound to the average rewriting ost; namely, we require D d. The noisy WEM model is illustrated in Fig.. Here the -dimensional vetor s X is the urrent ell states, and the message M is the new information to write, whih is independent of s. The rewriter uses both s and M to hoose a new odeword X, whih will be programmed as the ells new states, suh that the average rewriting ost satisfies the predefined ost onstraint. The odeword passes a noisy hannel, and the noisy odeword y X is its output. The deoder an reliably deode y to reover the message M. The ell states s are drawn independently and identially from the probability distribution P S (s). The noisy hannel is memoryless, and is haraterized by the transition probabilities P Y X (y x). Let λ i = P r(d(y ) i = R(s, i)) be the deoding error probability given data i. Let λ () be max λ i. Let R = log M i D be the ode rate, and we say R is ahievable if there exists a (, 2 R, q, d) ave ode suh that λ () as. The noisy rewriting Fig.. The noisy WEM model. M, s,, y and ˆM are, respetively, the message, the urrent ell states, rewritten odeword, the noisy hannel s output, and the estimated message. apaity C(q, d) ave is the supremum of all ahievable rates. The noisy WEM problem is: given the average rewriting ost onstraint d, find the maximal rate R of reliable rewriting supported by the rewriter and the deoder despite the noisy hannel. Let P(q, d) be {P SX P(X X ) : P S = P X, E(ϕ(S, X)) d}. When there is no noise, C(q, d) ave is R(q, d) ave = max P SX P(q,d) []. C. oisy WEM with a maximal rewriting ost onstraint The WEM ode in definition puts a onstraint on the average rewriting ost. We now define a ode with a maximal rewriting ost onstraint. Definition 2. An (, M, q, d) noisy WEM ode for the storage hannel P = (X, X, P Y X (y x)) onsists of D and C = i D C i, where C i X is the set of odewords representing data i. We require i j, C i Cj =. It also onsists of a rewriting funtion R(s, i) and a deoding funtion D(y ). Let d R + be an upper bound to the maximal rewriting ost; namely, we require ϕ(s, R(s, i)) d for any s C and i D. The rate R and noisy rewriting apaity C(q, d) an be defined similarly as before. When there is no noise, C(q, d) is R(q, d) = R(q, d) ave []. III. CHARACTERIZIG OISY REWRITIG CAPACITY In this setion, we present the haraterization of noisy rewriting apaity of C(q, d) and C(q, d) ave, respetively. The haraterization of C(q, d) is presented below. It is effetively the generalization of that of Gel fand and Pinsker [7], whih onsiders the problem without ost onstraint. Due to the spae onstraint, we skip details of its proof and present its sketh below. A omplete proof is provided in the full version of this paper [2]. The diret part proof is based on random oding and typial sequenes; the onverse part is based on tehniques of Fano s inequality [4] and Csiszár sum identity [5], and auxiliary random variables identifiation. Lemma 3. For a given rewriting ost funtion ϕ(, ), C(q, d) = max {I(Y ; U) I(U; S)}, where U is P U S,P X U,S P SX P(q,d) an auxiliary random variable, and U (X, S) Y is a Markov hain.

3 The next lemma presents us the haraterization of C ave (q, d), whih is the same as C(q, d). We omit its proof as any ode for (, M, q, d) is a ode for (, M, q, d) ave, therefore R ave C(q, d). The onverse part is the same as previous one. Lemma 4. For a given rewriting ost funtion ϕ(, ), C ave (q, d) = C(q, d) = max {I(Y ; U) I(U; S)}, P U S,P X U,S P SX P(q,d) where U (X, S) Y is a Markov hain. IV. A CODE COSTRUCTIO FOR BIARY DEGRADED AD SYMMETRIC OISY WEM Let P s (q, d) = {P SX P(X X ) : P S = P X, S U(q), E(ϕ(S, X)) d} be the set of joint probabilities with uniform marginal distributions. Let symmetri rewriting apaity be defined as R s (q, d) = max H(X S). Let W SX be P SX P s (q,d) arg max H(X S). We all W = (X, X, W X S) P XS P s (q,d) the WEM hannel. We say Q = (X, Z, Q Z X ) is degraded with respet to W = (X, Y, W Y X ) (whih we denote by Q W) if there exists a hannel P = (Y, Z, P Y Z ) suh that for all z Z and x X, we have Q Z X (z x) = W Y X (y x) P Z Y (z y). y Y In this setion, we onsider symmetri rewriting apaity, and present a ode onstrution for noisy WEM when the WEM hannel W is degraded with respet to the symmetri storage hannel P. We fous on binary ells, namely, X = 2. We all suh WEM a binary degraded and symmetri noisy WEM. (ote that when the flipping rates meet W X S > P Y X, the degradation ondition is naturally satisfied.) A. A nested polar ode onstrution for binary degraded and symmetri noisy WEM with an average rewriting ost onstraint ) A brief introdution to binary polar odes [2]: Let W : X Y be a binary-input disrete memoryless (DMC) ) hannel. Let G n 2 be n-th Kroneker produt of. Let Z(W ) = WY X (y )W Y X (y ). ( 2 u i+ i= y Y The polar ode C (F, u F ) is { = u G n 2 : u F {, } F }, where F {,,, }, u F is the subvetor u i : i F, and u F {, } F. Let W (i) : {, } Y {, } i be a sub-hannel with W (i) (y, u i def u i ) = W Y X (y i (u G n 2 ) i), and (u G n 2 ) i denotes the i-th element of u G n 2. Fig. 2. Illustration of relationship between F W and F P. The line represents the indexes, and F W and F P are the frozen set for the WEM hannel W and the storage hannel P, respetively. 2) The ode onstrution: We fous on the ode onstrution with symmetri rewriting ost funtion, whih satisfies x, y, z {, }, ϕ(x, y) = ϕ(x + z, y + z), where + is the XOR operation over GF(2). (Many ost funtions, suh as the Hamg-distane based ost funtion satisfies this onstraint.) Algorithm IV. A ode onstrution for binary degraded and symmetri noisy WEM and storage hannel P : Let C (F P, u FP ) be a polar ode [2] designed for the storage hannel P, where F P = {i {,,, } : Z(P (i) ) 2 β } and u FP is set to. 2: Let C (F W, u FW ) be a polar ode designed for the WEM hannel W, where F W = {i {,,, } : Z(W (i) ) 2 β } and F P F W. 3: The (, M, 2, d) ave ode is C = C (F P, u FP ) = {C (F W /F P, u FW/FP (i))}, where u FW/FP (i) is the binary representation form of i {,, M }. The ode onstrution is presented in Algorithm IV., where we use nested polar odes (i.e., the polar ode for hannel oding [2] and the polar ode for WEM [4]) to design noisy WEM odes. The fat that F P F W follows from [, lemma 4.7]. Fig. 2 presents us a pitorial presentation of F W and F P. The rewriting funtion is presented in Algorithm IV.2. It is very similar to that of [4] exept for how to set u F. The deoding funtion is presented in Algorithm IV.3, where we use the SC (Suessive Canellation) deoding [2] to assure λ () as. 3) Theoretial performane analysis: a) Code analysis: Theorem 5. For a binary degraded symmetri noisy WEM, fix d, R R s (2, d) ave H(P Y X ) and any < β < 2, there exists a sequene of nested polar odes of length with rates R R so that under the above rewriting and deoding operations, D d + O(2 β ), λ () O(2 β ), and the rewriting as well as the deoding operation omplexity is O( log ). Proof: Let ɛ and < β < 2 be some onstants.

4 Algorithm R(, i). IV.2 The rewriting operation y = : Let v = + g, where g is a ommon and uniformly distributed message, and + is over GF(2). 2: Apply SC (Suessive Canellation) enoding [] to v, and this results in a vetor u = Û(v, u FW/FP (i)), that is, u j = (u FW/FP (i)) j if j F W/FP if j F P m and ŷ = u G n 3: y = ŷ + g. with probability 2. W(u j,v j m), W(u j m,v m ) Algorithm IV.3 The deoding operation u FW/FP (i) = D( ). : ŷ = + g. 2: Apply SC deoding to ŷ, and this results in y {, i.e., y j = if j F P arg m max P (j) (yj, ŷ m) else 3: u FW/FP (i) = (y (G n 2 ) ) ufw/fp. F P and F W are F W = {i : Z(W (i) ) 2 β }, F P = {i : Z(P (i) ) 2 β }. Based on [, lemma 2.6] lim P n r(z(w(i) ) 2 β ) = I(W) = R s (2, d) ave, thus F W Rs (2, d) ave +ɛ for suffiiently large. Similarly, F P H(P Y X) ɛ for suffiiently large. As mentioned, F P F W, thus R = F W F P R s (2, d) ave H(P Y X ). Sine the rewriting funtion is similar to that of [4], the rewriting ost is guaranteed by [4, theorem 8], i.e., D d + O(2 β ). The error probability λ () is guaranteed by [2, theorem 4], that is λ () Z(P (i) ) O(2 β ). i F P b) Covering radius of polar odes: In the following, we present overing radius to theoretially upper bound the maximal rewriting ost when the ost metri is the Hamg distane between old and new ell levels. Let the polar ode ensemble be C (F ) = {C (F, u F ) : u F {, } F }. Let the overing radius of C (F ) (whih we denote as H (C (F ))) be max d H (, y C (F,u F (i)) y C (F,u F (j)) d H (, y ), where ) is the Hamg distane between and y. Lemma 6. H (C (F )) = l F 2wt(l), where wt(l) is the number of ones in (i.e., Hamg weight of) the binary representation of l. Proof: H (C (F )) = max = max = max C (F,u F (i)) y C (F,u F (j)) C (F,u F (i)) y C (F,u F (j)) z C (F,u F (i)+u F (j)) d H (, y ), wt( y ), wt(z ), = max k l F 2wt(l), () = l F 2wt(l), where eq. () is based on [, lemma 6.2], i.e., the imal distane of polar ode C (F, u F ) is l F 2wt(l). The above results an be generalized to the following polar odes C,M (F ) = M C (F, u F (i)), where i= {u F (i)} forms a group under binary operations in GF(2). 4) Experimental performane: The experimental performane is presented in Fig. 3, where the rewriting ost funtion is the Hamg distane between old and new ell states, the upper bound of C(2, d) is H(d) [], the storage hannel P is the binary symmetri hannel with flipping rate p =., and the lower bound is H(d) H(p). λ () is set to be around 5. We an see that the rates and the average rewriting osts approah those of points of H(d) H(.) as the length of odeword inreases. Longer odewords are needed for further approahing the lower bound. B. A nested polar ode onstrution for binary degraded and symmetri noisy WEM with a maximal rewriting ost onstraint The ode onstrution in Algorithm IV., the rewriting funtion in Algorithm IV.2 and the deoding funtion in Algorithm IV.3 an be applied to noisy WEM odes with a maximal rewriting ost onstraint as well. Similar to the analysis of Theorem 5, we obtain the following result for the theoretial performane of the proposed ode onstrution. Theorem 7. For a binary degraded symmetri noisy WEM, fix d, δ, R R s (2, d) H(P Y X ) and any < β < 2, there exists a sequene of nested polar odes of length with rates R R, so that under the above rewriting operation and deoding operation, the probability that the rewriting ost between a urrent

5 We present our experimental results in Fig. 4. The rewriting ost funtion, storage hannel P, and λ () are the same as those of the previous subsetion. We let δ =.d, and d =.32,.24, and.9, respetively. The empirial probability Q(ϕ(y, ).d) is presented in Fig. 4. As predited by Theorem 7 it dereases (nearly exponentially) as the length of odeword inreases. However, even longer odewords are needed to make the probability to be truly negligible. V. COCLUDIG REMARKS In this paper, we analyze the apaity for noisy WEM, and present a ode onstrution for binary degraded and symmatri noisy WEM. The ode onstrution is both theoretially analyzed and experimentally verified. We are interested in extending the ode onstrution to q-ary ells, and to more general settings regarding hannel degradation. Those remain as our future researh diretions. Fig. 3. Experimental performane for noisy WEM with an average ost onstraint for polar ode with various lengths, where the x-axis is the rewriting rate, the y-axis the average rewriting ost, and the theoretial points are those points (R, d) (R {.2,.3,,.9}) satisfying R = H(d) H(.). Fig. 4. Experimental performane for noisy WEM with a maximal ost onstraint with d =.32,.24 and.9, respetively, where the x-axis is the odeword length, and y-axis is the empirial probability Q(ϕ(y, ).d). odeword y and its updated odeword x larger than d + δ is bounded by Q(ϕ(y, ) d + δ) < 2 β, λ () O(2 β ), and the deoding and rewriting operations omplexity of the ode is O( log ). VI. ACKOWLEDGEMET This work was supported in part by the SF Grant CCF REFERECES [] R. Ahlswede and Z. Zhang, Coding for write-effiient memory, Information and Computation, vol. 83, no., pp. 8 97, Otober 989. [2] E. Arikan, Channel polarization: a method for onstruting apaity-ahieving odes for symmetri binary-input memoryless hannels, IEEE Trans on Inf Theory, vol. 55, no. 7, pp , July 29. [3] D. Burshtein and A. Strugatski, Polar Write One Memory Codes, IEEE Transaation on Information Theory, vol. 59, no. 8, pp , August 23. [4] T. M. Cover and J. A. Thomas, Elements of Information Theory. ew York: Wiley, 99. [5] I. Criszar and J. Korner, Broadast hannels with onfidential messages, IEEE Transation on Information Theory, vol. 24, no. 3, pp , May 978. [6] F. Fu and R. W. Yeung, On the apaity and error-orreting odes of write-effiient memories, IEEE Trans on Inf Theory, vol. 46, no. 7, pp , ov 2. [7] S. I. Gel fand and M. S. Pinsker, Coding for Channel with Random Parameters, Problems of Control Theory, vol. 9, no., pp. 9 3, 98. [8] A. Jiang, V. Bohossian, and J. Bruk, Rewriting odes for joint information storage in flash memories, IEEE Trans on Inf Theory, vol. 56, no., pp , Otober 2. [9] A. Jiang, Y. Li, E. E. Gad, M. Lanberg, and J. Bruk, Joint rewriting and error orretion in write-one memories, in Pro. IEEE International Symposium on Information Theory(ISIT), Istanbul, Turkey, June 23, pp [] S. B. Korada, Polar odes for hannel and soure oding, Ph.D. dissertation, EPFL, 2. [] L. A. Lastras-Montano, M. Franeshini, T. Mittelholzer, J. Karidis, and M. Wegman, On the lifetime of multilevel memories, in Proeedings of the 29 IEEE international onferene on Symposium on Information Theory (ISIT 9), Coex, Seoul, Korea, 29, pp [2] Q. Li and A. Jiang, Coding on oisy Write-effiient Memories, available on faulty.s.tamu.edu/ajiang/publiations/24/wemfull.pdf. [3] Q. Li, Compressed Rank Modulation, in Pro. 5th Annual Allerton Conferene on Communiation, Control and Computing (Allerton), Montiello, IL, Otober 22. [4] Q. Li and A. Jiang, Polar odes are optimal for Write-effiient Memories, in pro 5th Annual Allerton Conferene on Communiation, Control and Computing (Allerton), Montiello, IL, Otober 23.

Coding for Noisy Write-Efficient Memories

Coding for Noisy Write-Efficient Memories Coding for oisy Write-Efficient Memories Qing Li Computer Sci. & Eng. Dept. Texas A & M University College Station, TX 77843 qingli@cse.tamu.edu Anxiao (Andrew) Jiang CSE and ECE Departments Texas A &

More information

Polar Codes are Optimal for Write-Efficient Memories

Polar Codes are Optimal for Write-Efficient Memories Polar Codes are Optimal for Write-Efficient Memories Qing Li Department of Computer Science and Engineering Texas A & M University College Station, TX 7784 qingli@cse.tamu.edu Anxiao (Andrew) Jiang Department

More information

Research Collection. Mismatched decoding for the relay channel. Conference Paper. ETH Library. Author(s): Hucher, Charlotte; Sadeghi, Parastoo

Research Collection. Mismatched decoding for the relay channel. Conference Paper. ETH Library. Author(s): Hucher, Charlotte; Sadeghi, Parastoo Researh Colletion Conferene Paper Mismathed deoding for the relay hannel Author(s): Huher, Charlotte; Sadeghi, Parastoo Publiation Date: 2010 Permanent Link: https://doi.org/10.3929/ethz-a-005997152 Rights

More information

Nonreversibility of Multiple Unicast Networks

Nonreversibility of Multiple Unicast Networks Nonreversibility of Multiple Uniast Networks Randall Dougherty and Kenneth Zeger September 27, 2005 Abstrat We prove that for any finite direted ayli network, there exists a orresponding multiple uniast

More information

Broadcast Channels with Cooperating Decoders

Broadcast Channels with Cooperating Decoders To appear in the IEEE Transations on Information Theory, Deember 2006. 1 Broadast Channels with Cooperating Deoders Ron Dabora Sergio D. Servetto arxiv:s/0505032v3 [s.it] 1 Nov 2006 Abstrat We onsider

More information

ELG 5372 Error Control Coding. Claude D Amours Lecture 2: Introduction to Coding 2

ELG 5372 Error Control Coding. Claude D Amours Lecture 2: Introduction to Coding 2 ELG 5372 Error Control Coding Claude D Amours Leture 2: Introdution to Coding 2 Deoding Tehniques Hard Deision Reeiver detets data before deoding Soft Deision Reeiver quantizes reeived data and deoder

More information

On the Designs and Challenges of Practical Binary Dirty Paper Coding

On the Designs and Challenges of Practical Binary Dirty Paper Coding On the Designs and Challenges of Pratial Binary Dirty Paper Coding 04 / 08 / 2009 Gyu Bum Kyung and Chih-Chun Wang Center for Wireless Systems and Appliations Shool of Eletrial and Computer Eng. Outline

More information

Multi-version Coding for Consistent Distributed Storage of Correlated Data Updates

Multi-version Coding for Consistent Distributed Storage of Correlated Data Updates Multi-version Coding for Consistent Distributed Storage of Correlated Data Updates Ramy E. Ali and Vivek R. Cadambe 1 arxiv:1708.06042v1 [s.it] 21 Aug 2017 Abstrat Motivated by appliations of distributed

More information

Frequency hopping does not increase anti-jamming resilience of wireless channels

Frequency hopping does not increase anti-jamming resilience of wireless channels Frequeny hopping does not inrease anti-jamming resiliene of wireless hannels Moritz Wiese and Panos Papadimitratos Networed Systems Seurity Group KTH Royal Institute of Tehnology, Stoholm, Sweden {moritzw,

More information

Sensitivity Analysis in Markov Networks

Sensitivity Analysis in Markov Networks Sensitivity Analysis in Markov Networks Hei Chan and Adnan Darwihe Computer Siene Department University of California, Los Angeles Los Angeles, CA 90095 {hei,darwihe}@s.ula.edu Abstrat This paper explores

More information

Complexity of Regularization RBF Networks

Complexity of Regularization RBF Networks Complexity of Regularization RBF Networks Mark A Kon Department of Mathematis and Statistis Boston University Boston, MA 02215 mkon@buedu Leszek Plaskota Institute of Applied Mathematis University of Warsaw

More information

On the Bit Error Probability of Noisy Channel Networks With Intermediate Node Encoding I. INTRODUCTION

On the Bit Error Probability of Noisy Channel Networks With Intermediate Node Encoding I. INTRODUCTION 5188 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 11, NOVEMBER 2008 [8] A. P. Dempster, N. M. Laird, and D. B. Rubin, Maximum likelihood estimation from inomplete data via the EM algorithm, J.

More information

Millennium Relativity Acceleration Composition. The Relativistic Relationship between Acceleration and Uniform Motion

Millennium Relativity Acceleration Composition. The Relativistic Relationship between Acceleration and Uniform Motion Millennium Relativity Aeleration Composition he Relativisti Relationship between Aeleration and niform Motion Copyright 003 Joseph A. Rybzyk Abstrat he relativisti priniples developed throughout the six

More information

c-perfect Hashing Schemes for Binary Trees, with Applications to Parallel Memories

c-perfect Hashing Schemes for Binary Trees, with Applications to Parallel Memories -Perfet Hashing Shemes for Binary Trees, with Appliations to Parallel Memories (Extended Abstrat Gennaro Cordaso 1, Alberto Negro 1, Vittorio Sarano 1, and Arnold L.Rosenberg 2 1 Dipartimento di Informatia

More information

Probabilistic Graphical Models

Probabilistic Graphical Models Probabilisti Graphial Models David Sontag New York University Leture 12, April 19, 2012 Aknowledgement: Partially based on slides by Eri Xing at CMU and Andrew MCallum at UMass Amherst David Sontag (NYU)

More information

Chapter 8 Hypothesis Testing

Chapter 8 Hypothesis Testing Leture 5 for BST 63: Statistial Theory II Kui Zhang, Spring Chapter 8 Hypothesis Testing Setion 8 Introdution Definition 8 A hypothesis is a statement about a population parameter Definition 8 The two

More information

A Queueing Model for Call Blending in Call Centers

A Queueing Model for Call Blending in Call Centers A Queueing Model for Call Blending in Call Centers Sandjai Bhulai and Ger Koole Vrije Universiteit Amsterdam Faulty of Sienes De Boelelaan 1081a 1081 HV Amsterdam The Netherlands E-mail: {sbhulai, koole}@s.vu.nl

More information

THE classical noiseless index coding problem consists of. Lattice Index Coding. arxiv: v3 [cs.it] 7 Oct 2015

THE classical noiseless index coding problem consists of. Lattice Index Coding. arxiv: v3 [cs.it] 7 Oct 2015 Lattie Index Coding Lakshmi Natarajan, Yi Hong, Senior Member, IEEE, and Emanuele Viterbo, Fellow, IEEE arxiv:40.6569v3 [s.it] 7 Ot 05 Abstrat The index oding problem involves a sender with K messages

More information

Estimating the probability law of the codelength as a function of the approximation error in image compression

Estimating the probability law of the codelength as a function of the approximation error in image compression Estimating the probability law of the odelength as a funtion of the approximation error in image ompression François Malgouyres Marh 7, 2007 Abstrat After some reolletions on ompression of images using

More information

The Capacity Loss of Dense Constellations

The Capacity Loss of Dense Constellations The Capaity Loss of Dense Constellations Tobias Koh University of Cambridge tobi.koh@eng.am.a.uk Alfonso Martinez Universitat Pompeu Fabra alfonso.martinez@ieee.org Albert Guillén i Fàbregas ICREA & Universitat

More information

4828 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 9, SEPTEMBER 2015

4828 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 9, SEPTEMBER 2015 4828 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 9, SEPTEMBER 2015 Key Generation Algorithms for Pairwise Independent Networks Based on Graphial Models Lifeng Lai, Member, IEEE, and Siu-Wai Ho,

More information

Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets

Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Shivaprasad Kotagiri and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame,

More information

Developing Excel Macros for Solving Heat Diffusion Problems

Developing Excel Macros for Solving Heat Diffusion Problems Session 50 Developing Exel Maros for Solving Heat Diffusion Problems N. N. Sarker and M. A. Ketkar Department of Engineering Tehnology Prairie View A&M University Prairie View, TX 77446 Abstrat This paper

More information

Optimization of Statistical Decisions for Age Replacement Problems via a New Pivotal Quantity Averaging Approach

Optimization of Statistical Decisions for Age Replacement Problems via a New Pivotal Quantity Averaging Approach Amerian Journal of heoretial and Applied tatistis 6; 5(-): -8 Published online January 7, 6 (http://www.sienepublishinggroup.om/j/ajtas) doi:.648/j.ajtas.s.65.4 IN: 36-8999 (Print); IN: 36-96 (Online)

More information

Case I: 2 users In case of 2 users, the probability of error for user 1 was earlier derived to be 2 A1

Case I: 2 users In case of 2 users, the probability of error for user 1 was earlier derived to be 2 A1 MUTLIUSER DETECTION (Letures 9 and 0) 6:33:546 Wireless Communiations Tehnologies Instrutor: Dr. Narayan Mandayam Summary By Shweta Shrivastava (shwetash@winlab.rutgers.edu) bstrat This artile ontinues

More information

Robust Recovery of Signals From a Structured Union of Subspaces

Robust Recovery of Signals From a Structured Union of Subspaces Robust Reovery of Signals From a Strutured Union of Subspaes 1 Yonina C. Eldar, Senior Member, IEEE and Moshe Mishali, Student Member, IEEE arxiv:87.4581v2 [nlin.cg] 3 Mar 29 Abstrat Traditional sampling

More information

Hankel Optimal Model Order Reduction 1

Hankel Optimal Model Order Reduction 1 Massahusetts Institute of Tehnology Department of Eletrial Engineering and Computer Siene 6.245: MULTIVARIABLE CONTROL SYSTEMS by A. Megretski Hankel Optimal Model Order Redution 1 This leture overs both

More information

A Spatiotemporal Approach to Passive Sound Source Localization

A Spatiotemporal Approach to Passive Sound Source Localization A Spatiotemporal Approah Passive Sound Soure Loalization Pasi Pertilä, Mikko Parviainen, Teemu Korhonen and Ari Visa Institute of Signal Proessing Tampere University of Tehnology, P.O.Box 553, FIN-330,

More information

A NETWORK SIMPLEX ALGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM

A NETWORK SIMPLEX ALGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM NETWORK SIMPLEX LGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM Cen Çalışan, Utah Valley University, 800 W. University Parway, Orem, UT 84058, 801-863-6487, en.alisan@uvu.edu BSTRCT The minimum

More information

Advances in Radio Science

Advances in Radio Science Advanes in adio Siene 2003) 1: 99 104 Copernius GmbH 2003 Advanes in adio Siene A hybrid method ombining the FDTD and a time domain boundary-integral equation marhing-on-in-time algorithm A Beker and V

More information

max min z i i=1 x j k s.t. j=1 x j j:i T j

max min z i i=1 x j k s.t. j=1 x j j:i T j AM 221: Advaned Optimization Spring 2016 Prof. Yaron Singer Leture 22 April 18th 1 Overview In this leture, we will study the pipage rounding tehnique whih is a deterministi rounding proedure that an be

More information

Taste for variety and optimum product diversity in an open economy

Taste for variety and optimum product diversity in an open economy Taste for variety and optimum produt diversity in an open eonomy Javier Coto-Martínez City University Paul Levine University of Surrey Otober 0, 005 María D.C. Garía-Alonso University of Kent Abstrat We

More information

DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS

DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS CHAPTER 4 DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS 4.1 INTRODUCTION Around the world, environmental and ost onsiousness are foring utilities to install

More information

The Effectiveness of the Linear Hull Effect

The Effectiveness of the Linear Hull Effect The Effetiveness of the Linear Hull Effet S. Murphy Tehnial Report RHUL MA 009 9 6 Otober 009 Department of Mathematis Royal Holloway, University of London Egham, Surrey TW0 0EX, England http://www.rhul.a.uk/mathematis/tehreports

More information

Sufficient Conditions for a Flexible Manufacturing System to be Deadlocked

Sufficient Conditions for a Flexible Manufacturing System to be Deadlocked Paper 0, INT 0 Suffiient Conditions for a Flexile Manufaturing System to e Deadloked Paul E Deering, PhD Department of Engineering Tehnology and Management Ohio University deering@ohioedu Astrat In reent

More information

(q) -convergence. Comenius University, Bratislava, Slovakia

(q) -convergence.   Comenius University, Bratislava, Slovakia Annales Mathematiae et Informatiae 38 (2011) pp. 27 36 http://ami.ektf.hu On I (q) -onvergene J. Gogola a, M. Mačaj b, T. Visnyai b a University of Eonomis, Bratislava, Slovakia e-mail: gogola@euba.sk

More information

Measuring & Inducing Neural Activity Using Extracellular Fields I: Inverse systems approach

Measuring & Inducing Neural Activity Using Extracellular Fields I: Inverse systems approach Measuring & Induing Neural Ativity Using Extraellular Fields I: Inverse systems approah Keith Dillon Department of Eletrial and Computer Engineering University of California San Diego 9500 Gilman Dr. La

More information

Joint Write-Once-Memory and Error-Control Codes

Joint Write-Once-Memory and Error-Control Codes 1 Joint Write-Once-Memory and Error-Control Codes Xudong Ma Pattern Technology Lab LLC, U.S.A. Email: xma@ieee.org arxiv:1411.4617v1 [cs.it] 17 ov 2014 Abstract Write-Once-Memory (WOM) is a model for many

More information

SPLINE ESTIMATION OF SINGLE-INDEX MODELS

SPLINE ESTIMATION OF SINGLE-INDEX MODELS SPLINE ESIMAION OF SINGLE-INDEX MODELS Li Wang and Lijian Yang University of Georgia and Mihigan State University Supplementary Material his note ontains proofs for the main results he following two propositions

More information

A NONLILEAR CONTROLLER FOR SHIP AUTOPILOTS

A NONLILEAR CONTROLLER FOR SHIP AUTOPILOTS Vietnam Journal of Mehanis, VAST, Vol. 4, No. (), pp. A NONLILEAR CONTROLLER FOR SHIP AUTOPILOTS Le Thanh Tung Hanoi University of Siene and Tehnology, Vietnam Abstrat. Conventional ship autopilots are

More information

). In accordance with the Lorentz transformations for the space-time coordinates of the same event, the space coordinates become

). In accordance with the Lorentz transformations for the space-time coordinates of the same event, the space coordinates become Relativity and quantum mehanis: Jorgensen 1 revisited 1. Introdution Bernhard Rothenstein, Politehnia University of Timisoara, Physis Department, Timisoara, Romania. brothenstein@gmail.om Abstrat. We first

More information

Average Rate Speed Scaling

Average Rate Speed Scaling Average Rate Speed Saling Nikhil Bansal David P. Bunde Ho-Leung Chan Kirk Pruhs May 2, 2008 Abstrat Speed saling is a power management tehnique that involves dynamially hanging the speed of a proessor.

More information

An Alternative Proof of Channel Polarization for Channels with Arbitrary Input Alphabets

An Alternative Proof of Channel Polarization for Channels with Arbitrary Input Alphabets An Alternative Proof of Channel Polarization for Channels with Arbitrary Input Alphabets Jing Guo University of Cambridge jg582@cam.ac.uk Jossy Sayir University of Cambridge j.sayir@ieee.org Minghai Qin

More information

Fiber Optic Cable Transmission Losses with Perturbation Effects

Fiber Optic Cable Transmission Losses with Perturbation Effects Fiber Opti Cable Transmission Losses with Perturbation Effets Kampanat Namngam 1*, Preeha Yupapin 2 and Pakkinee Chitsakul 1 1 Department of Mathematis and Computer Siene, Faulty of Siene, King Mongkut

More information

Packing Plane Spanning Trees into a Point Set

Packing Plane Spanning Trees into a Point Set Paking Plane Spanning Trees into a Point Set Ahmad Biniaz Alfredo Garía Abstrat Let P be a set of n points in the plane in general position. We show that at least n/3 plane spanning trees an be paked into

More information

Design and Development of Three Stages Mixed Sampling Plans for Variable Attribute Variable Quality Characteristics

Design and Development of Three Stages Mixed Sampling Plans for Variable Attribute Variable Quality Characteristics International Journal of Statistis and Systems ISSN 0973-2675 Volume 12, Number 4 (2017), pp. 763-772 Researh India Publiations http://www.ripubliation.om Design and Development of Three Stages Mixed Sampling

More information

Methods of evaluating tests

Methods of evaluating tests Methods of evaluating tests Let X,, 1 Xn be i.i.d. Bernoulli( p ). Then 5 j= 1 j ( 5, ) T = X Binomial p. We test 1 H : p vs. 1 1 H : p>. We saw that a LRT is 1 if t k* φ ( x ) =. otherwise (t is the observed

More information

Lightpath routing for maximum reliability in optical mesh networks

Lightpath routing for maximum reliability in optical mesh networks Vol. 7, No. 5 / May 2008 / JOURNAL OF OPTICAL NETWORKING 449 Lightpath routing for maximum reliability in optial mesh networks Shengli Yuan, 1, * Saket Varma, 2 and Jason P. Jue 2 1 Department of Computer

More information

Modeling Probabilistic Measurement Correlations for Problem Determination in Large-Scale Distributed Systems

Modeling Probabilistic Measurement Correlations for Problem Determination in Large-Scale Distributed Systems 009 9th IEEE International Conferene on Distributed Computing Systems Modeling Probabilisti Measurement Correlations for Problem Determination in Large-Sale Distributed Systems Jing Gao Guofei Jiang Haifeng

More information

SURFACE WAVES OF NON-RAYLEIGH TYPE

SURFACE WAVES OF NON-RAYLEIGH TYPE SURFACE WAVES OF NON-RAYLEIGH TYPE by SERGEY V. KUZNETSOV Institute for Problems in Mehanis Prosp. Vernadskogo, 0, Mosow, 75 Russia e-mail: sv@kuznetsov.msk.ru Abstrat. Existene of surfae waves of non-rayleigh

More information

MOTION-GUIDED QUANTIZATION FOR VIDEO TONE MAPPING

MOTION-GUIDED QUANTIZATION FOR VIDEO TONE MAPPING MOTION-GUIDED QUANTIZATION FOR VIDEO TONE MAPPING Ronan Boitard, Dominique Thoreau Tehniolor 975 Av. des Champs Blans 35576 Cesson-Sevigne, Frane first.last@tehniolor.om Rémi Cozot, Kadi Bouatouh IRISA

More information

On the Duality between Multiple-Access Codes and Computation Codes

On the Duality between Multiple-Access Codes and Computation Codes On the Duality between Multiple-Access Codes and Computation Codes Jingge Zhu University of California, Berkeley jingge.zhu@berkeley.edu Sung Hoon Lim KIOST shlim@kiost.ac.kr Michael Gastpar EPFL michael.gastpar@epfl.ch

More information

Study of EM waves in Periodic Structures (mathematical details)

Study of EM waves in Periodic Structures (mathematical details) Study of EM waves in Periodi Strutures (mathematial details) Massahusetts Institute of Tehnology 6.635 partial leture notes 1 Introdution: periodi media nomenlature 1. The spae domain is defined by a basis,(a

More information

A Characterization of Wavelet Convergence in Sobolev Spaces

A Characterization of Wavelet Convergence in Sobolev Spaces A Charaterization of Wavelet Convergene in Sobolev Spaes Mark A. Kon 1 oston University Louise Arakelian Raphael Howard University Dediated to Prof. Robert Carroll on the oasion of his 70th birthday. Abstrat

More information

SINCE Zadeh s compositional rule of fuzzy inference

SINCE Zadeh s compositional rule of fuzzy inference IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 14, NO. 6, DECEMBER 2006 709 Error Estimation of Perturbations Under CRI Guosheng Cheng Yuxi Fu Abstrat The analysis of stability robustness of fuzzy reasoning

More information

Solutions to Problem Set 1

Solutions to Problem Set 1 Eon602: Maro Theory Eonomis, HKU Instrutor: Dr. Yulei Luo September 208 Solutions to Problem Set. [0 points] Consider the following lifetime optimal onsumption-saving problem: v (a 0 ) max f;a t+ g t t

More information

An Electrothermal Model Based Adaptive Control of Resistance Spot Welding Process

An Electrothermal Model Based Adaptive Control of Resistance Spot Welding Process Intelligent Control and utomation, 05, 6, 34-46 Published Online May 05 in SiRes. http://www.sirp.org/journal/ia http://dx.doi.org/0.436/ia.05.604 n Eletrothermal Model Based daptive Control of Resistane

More information

Battery Sizing for Grid Connected PV Systems with Fixed Minimum Charging/Discharging Time

Battery Sizing for Grid Connected PV Systems with Fixed Minimum Charging/Discharging Time Battery Sizing for Grid Conneted PV Systems with Fixed Minimum Charging/Disharging Time Yu Ru, Jan Kleissl, and Sonia Martinez Abstrat In this paper, we study a battery sizing problem for grid-onneted

More information

Variation Based Online Travel Time Prediction Using Clustered Neural Networks

Variation Based Online Travel Time Prediction Using Clustered Neural Networks Variation Based Online Travel Time Predition Using lustered Neural Networks Jie Yu, Gang-Len hang, H.W. Ho and Yue Liu Abstrat-This paper proposes a variation-based online travel time predition approah

More information

Maximum Entropy and Exponential Families

Maximum Entropy and Exponential Families Maximum Entropy and Exponential Families April 9, 209 Abstrat The goal of this note is to derive the exponential form of probability distribution from more basi onsiderations, in partiular Entropy. It

More information

Remark 4.1 Unlike Lyapunov theorems, LaSalle s theorem does not require the function V ( x ) to be positive definite.

Remark 4.1 Unlike Lyapunov theorems, LaSalle s theorem does not require the function V ( x ) to be positive definite. Leture Remark 4.1 Unlike Lyapunov theorems, LaSalle s theorem does not require the funtion V ( x ) to be positive definite. ost often, our interest will be to show that x( t) as t. For that we will need

More information

Conformal Mapping among Orthogonal, Symmetric, and Skew-Symmetric Matrices

Conformal Mapping among Orthogonal, Symmetric, and Skew-Symmetric Matrices AAS 03-190 Conformal Mapping among Orthogonal, Symmetri, and Skew-Symmetri Matries Daniele Mortari Department of Aerospae Engineering, Texas A&M University, College Station, TX 77843-3141 Abstrat This

More information

Assessing the Performance of a BCI: A Task-Oriented Approach

Assessing the Performance of a BCI: A Task-Oriented Approach Assessing the Performane of a BCI: A Task-Oriented Approah B. Dal Seno, L. Mainardi 2, M. Matteui Department of Eletronis and Information, IIT-Unit, Politenio di Milano, Italy 2 Department of Bioengineering,

More information

Error-Correcting Schemes with Dynamic Thresholds in Nonvolatile Memories

Error-Correcting Schemes with Dynamic Thresholds in Nonvolatile Memories 2 IEEE International Symposium on Information Theory Proceedings Error-Correcting Schemes with Dynamic Thresholds in Nonvolatile Memories Hongchao Zhou Electrical Engineering Department California Institute

More information

Convergence of reinforcement learning with general function approximators

Convergence of reinforcement learning with general function approximators Convergene of reinforement learning with general funtion approximators assilis A. Papavassiliou and Stuart Russell Computer Siene Division, U. of California, Berkeley, CA 94720-1776 fvassilis,russellg@s.berkeley.edu

More information

Graph-covers and iterative decoding of finite length codes

Graph-covers and iterative decoding of finite length codes Graph-overs and iterative deoding of finite length odes Ralf Koetter and Pasal O. Vontobel Coordinated Siene Laboratory Dep. of Elet. and Comp. Eng. University of Illinois at Urbana-Champaign 1308 West

More information

CORC Report TR : Short Version Optimal Procurement Mechanisms for Divisible Goods with Capacitated Suppliers

CORC Report TR : Short Version Optimal Procurement Mechanisms for Divisible Goods with Capacitated Suppliers CORC Report TR-2006-01: Short Version Optimal Prourement Mehanisms for Divisible Goods with Capaitated Suppliers Garud Iyengar Anuj Kumar First version: June 30, 2006 This version: August 31, 2007 Abstrat

More information

Development of Fuzzy Extreme Value Theory. Populations

Development of Fuzzy Extreme Value Theory. Populations Applied Mathematial Sienes, Vol. 6, 0, no. 7, 58 5834 Development of Fuzzy Extreme Value Theory Control Charts Using α -uts for Sewed Populations Rungsarit Intaramo Department of Mathematis, Faulty of

More information

Tight bounds for selfish and greedy load balancing

Tight bounds for selfish and greedy load balancing Tight bounds for selfish and greedy load balaning Ioannis Caragiannis Mihele Flammini Christos Kaklamanis Panagiotis Kanellopoulos Lua Mosardelli Deember, 009 Abstrat We study the load balaning problem

More information

10.2 The Occurrence of Critical Flow; Controls

10.2 The Occurrence of Critical Flow; Controls 10. The Ourrene of Critial Flow; Controls In addition to the type of problem in whih both q and E are initially presribed; there is a problem whih is of pratial interest: Given a value of q, what fators

More information

Simplification of Network Dynamics in Large Systems

Simplification of Network Dynamics in Large Systems Simplifiation of Network Dynamis in Large Systems Xiaojun Lin and Ness B. Shroff Shool of Eletrial and Computer Engineering Purdue University, West Lafayette, IN 47906, U.S.A. Email: {linx, shroff}@en.purdue.edu

More information

Complementarities in Spectrum Markets

Complementarities in Spectrum Markets Complementarities in Spetrum Markets Hang Zhou, Randall A. Berry, Mihael L. Honig and Rakesh Vohra EECS Department Northwestern University, Evanston, IL 6008 {hang.zhou, rberry, mh}@ees.northwestern.edu

More information

Investigation of the de Broglie-Einstein velocity equation s. universality in the context of the Davisson-Germer experiment. Yusuf Z.

Investigation of the de Broglie-Einstein velocity equation s. universality in the context of the Davisson-Germer experiment. Yusuf Z. Investigation of the de Broglie-instein veloity equation s universality in the ontext of the Davisson-Germer experiment Yusuf Z. UMUL Canaya University, letroni and Communiation Dept., Öğretmenler Cad.,

More information

Reliability Guaranteed Energy-Aware Frame-Based Task Set Execution Strategy for Hard Real-Time Systems

Reliability Guaranteed Energy-Aware Frame-Based Task Set Execution Strategy for Hard Real-Time Systems Reliability Guaranteed Energy-Aware Frame-Based ask Set Exeution Strategy for Hard Real-ime Systems Zheng Li a, Li Wang a, Shuhui Li a, Shangping Ren a, Gang Quan b a Illinois Institute of ehnology, Chiago,

More information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information 204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener

More information

Mean Activity Coefficients of Peroxodisulfates in Saturated Solutions of the Conversion System 2NH 4. H 2 O at 20 C and 30 C

Mean Activity Coefficients of Peroxodisulfates in Saturated Solutions of the Conversion System 2NH 4. H 2 O at 20 C and 30 C Mean Ativity Coeffiients of Peroxodisulfates in Saturated Solutions of the Conversion System NH 4 Na S O 8 H O at 0 C and 0 C Jan Balej Heřmanova 5, 170 00 Prague 7, Czeh Republi balejan@seznam.z Abstrat:

More information

LECTURE NOTES FOR , FALL 2004

LECTURE NOTES FOR , FALL 2004 LECTURE NOTES FOR 18.155, FALL 2004 83 12. Cone support and wavefront set In disussing the singular support of a tempered distibution above, notie that singsupp(u) = only implies that u C (R n ), not as

More information

Parallel disrete-event simulation is an attempt to speed-up the simulation proess through the use of multiple proessors. In some sense parallel disret

Parallel disrete-event simulation is an attempt to speed-up the simulation proess through the use of multiple proessors. In some sense parallel disret Exploiting intra-objet dependenies in parallel simulation Franeso Quaglia a;1 Roberto Baldoni a;2 a Dipartimento di Informatia e Sistemistia Universita \La Sapienza" Via Salaria 113, 198 Roma, Italy Abstrat

More information

1 sin 2 r = 1 n 2 sin 2 i

1 sin 2 r = 1 n 2 sin 2 i Physis 505 Fall 005 Homework Assignment #11 Solutions Textbook problems: Ch. 7: 7.3, 7.5, 7.8, 7.16 7.3 Two plane semi-infinite slabs of the same uniform, isotropi, nonpermeable, lossless dieletri with

More information

Beams on Elastic Foundation

Beams on Elastic Foundation Professor Terje Haukaas University of British Columbia, Vanouver www.inrisk.ub.a Beams on Elasti Foundation Beams on elasti foundation, suh as that in Figure 1, appear in building foundations, floating

More information

arxiv:gr-qc/ v2 6 Feb 2004

arxiv:gr-qc/ v2 6 Feb 2004 Hubble Red Shift and the Anomalous Aeleration of Pioneer 0 and arxiv:gr-q/0402024v2 6 Feb 2004 Kostadin Trenčevski Faulty of Natural Sienes and Mathematis, P.O.Box 62, 000 Skopje, Maedonia Abstrat It this

More information

Product Policy in Markets with Word-of-Mouth Communication. Technical Appendix

Product Policy in Markets with Word-of-Mouth Communication. Technical Appendix rodut oliy in Markets with Word-of-Mouth Communiation Tehnial Appendix August 05 Miro-Model for Inreasing Awareness In the paper, we make the assumption that awareness is inreasing in ustomer type. I.e.,

More information

Noise Modeling and Capacity Analysis for NAND Flash Memories

Noise Modeling and Capacity Analysis for NAND Flash Memories Noise Modeling and Capacity Analysis for NAND Flash Memories Qing Li, Anxiao (Andrew) Jiang, and Erich F. Haratsch Flash Components Division, LSI Corporation, San Jose, CA, 95131 Computer Sci. and Eng.

More information

ON A PROCESS DERIVED FROM A FILTERED POISSON PROCESS

ON A PROCESS DERIVED FROM A FILTERED POISSON PROCESS ON A PROCESS DERIVED FROM A FILTERED POISSON PROCESS MARIO LEFEBVRE and JEAN-LUC GUILBAULT A ontinuous-time and ontinuous-state stohasti proess, denoted by {Xt), t }, is defined from a proess known as

More information

Diversity Analysis of Bit-Interleaved Coded Multiple Beamforming with Orthogonal Frequency Division Multiplexing

Diversity Analysis of Bit-Interleaved Coded Multiple Beamforming with Orthogonal Frequency Division Multiplexing IEEE ICC 03 - Wireless Communiations Symposium Diversity Analysis of Bit-Interleaved Coded Multiple Beamforming with Orthogonal Frequeny Division Multiplexing Boyu Li and Ender Ayanoglu Center for Pervasive

More information

7 Max-Flow Problems. Business Computing and Operations Research 608

7 Max-Flow Problems. Business Computing and Operations Research 608 7 Max-Flow Problems Business Computing and Operations Researh 68 7. Max-Flow Problems In what follows, we onsider a somewhat modified problem onstellation Instead of osts of transmission, vetor now indiates

More information

Counting Idempotent Relations

Counting Idempotent Relations Counting Idempotent Relations Beriht-Nr. 2008-15 Florian Kammüller ISSN 1436-9915 2 Abstrat This artile introdues and motivates idempotent relations. It summarizes haraterizations of idempotents and their

More information

Advanced Computational Fluid Dynamics AA215A Lecture 4

Advanced Computational Fluid Dynamics AA215A Lecture 4 Advaned Computational Fluid Dynamis AA5A Leture 4 Antony Jameson Winter Quarter,, Stanford, CA Abstrat Leture 4 overs analysis of the equations of gas dynamis Contents Analysis of the equations of gas

More information

COMBINED PROBE FOR MACH NUMBER, TEMPERATURE AND INCIDENCE INDICATION

COMBINED PROBE FOR MACH NUMBER, TEMPERATURE AND INCIDENCE INDICATION 4 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES COMBINED PROBE FOR MACH NUMBER, TEMPERATURE AND INCIDENCE INDICATION Jiri Nozika*, Josef Adame*, Daniel Hanus** *Department of Fluid Dynamis and

More information

"Research Note" ANALYSIS AND OPTIMIZATION OF A FISSION CHAMBER DETECTOR USING MCNP4C AND SRIM MONTE CARLO CODES *

Research Note ANALYSIS AND OPTIMIZATION OF A FISSION CHAMBER DETECTOR USING MCNP4C AND SRIM MONTE CARLO CODES * Iranian Journal of Siene & Tehnology, Transation A, Vol. 33, o. A3 Printed in the Islami Republi of Iran, 9 Shiraz University "Researh ote" AALYSIS AD OPTIMIZATIO OF A FISSIO CHAMBER DETECTOR USIG MCP4C

More information

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Nan Liu and Andrea Goldsmith Department of Electrical Engineering Stanford University, Stanford CA 94305 Email:

More information

Math 220A - Fall 2002 Homework 8 Solutions

Math 220A - Fall 2002 Homework 8 Solutions Math A - Fall Homework 8 Solutions 1. Consider u tt u = x R 3, t > u(x, ) = φ(x) u t (x, ) = ψ(x). Suppose φ, ψ are supported in the annular region a < x < b. (a) Find the time T 1 > suh that u(x, t) is

More information

Analysis of discretization in the direct simulation Monte Carlo

Analysis of discretization in the direct simulation Monte Carlo PHYSICS OF FLUIDS VOLUME 1, UMBER 1 OCTOBER Analysis of disretization in the diret simulation Monte Carlo iolas G. Hadjionstantinou a) Department of Mehanial Engineering, Massahusetts Institute of Tehnology,

More information

Exploring the feasibility of on-site earthquake early warning using close-in records of the 2007 Noto Hanto earthquake

Exploring the feasibility of on-site earthquake early warning using close-in records of the 2007 Noto Hanto earthquake Exploring the feasibility of on-site earthquake early warning using lose-in reords of the 2007 Noto Hanto earthquake Yih-Min Wu 1 and Hiroo Kanamori 2 1. Department of Geosienes, National Taiwan University,

More information

SOA/CAS MAY 2003 COURSE 1 EXAM SOLUTIONS

SOA/CAS MAY 2003 COURSE 1 EXAM SOLUTIONS SOA/CAS MAY 2003 COURSE 1 EXAM SOLUTIONS Prepared by S. Broverman e-mail 2brove@rogers.om website http://members.rogers.om/2brove 1. We identify the following events:. - wathed gymnastis, ) - wathed baseball,

More information

arxiv: v1 [physics.gen-ph] 5 Jan 2018

arxiv: v1 [physics.gen-ph] 5 Jan 2018 The Real Quaternion Relativity Viktor Ariel arxiv:1801.03393v1 [physis.gen-ph] 5 Jan 2018 In this work, we use real quaternions and the basi onept of the final speed of light in an attempt to enhane the

More information

Quasi-Monte Carlo Algorithms for unbounded, weighted integration problems

Quasi-Monte Carlo Algorithms for unbounded, weighted integration problems Quasi-Monte Carlo Algorithms for unbounded, weighted integration problems Jürgen Hartinger Reinhold F. Kainhofer Robert F. Tihy Department of Mathematis, Graz University of Tehnology, Steyrergasse 30,

More information

IMPEDANCE EFFECTS OF LEFT TURNERS FROM THE MAJOR STREET AT A TWSC INTERSECTION

IMPEDANCE EFFECTS OF LEFT TURNERS FROM THE MAJOR STREET AT A TWSC INTERSECTION 09-1289 Citation: Brilon, W. (2009): Impedane Effets of Left Turners from the Major Street at A TWSC Intersetion. Transportation Researh Reord Nr. 2130, pp. 2-8 IMPEDANCE EFFECTS OF LEFT TURNERS FROM THE

More information

Control Theory association of mathematics and engineering

Control Theory association of mathematics and engineering Control Theory assoiation of mathematis and engineering Wojieh Mitkowski Krzysztof Oprzedkiewiz Department of Automatis AGH Univ. of Siene & Tehnology, Craow, Poland, Abstrat In this paper a methodology

More information