MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

Size: px
Start display at page:

Download "MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK"

Transcription

1 Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment of Comuter Engineering, Holon Academic Institute of Technology, Golomb 5, Holon 58 Tel: , Fax: The aer is devoted to study and evaluation of the erroneous ackets flow on the hysical layer of a wireless communication network. A mathematical model of the erroneous ackets assed to the communication channel has been structured and analysed. The statistical estimation of the erroneous ackets number is resented and discussed in the aer. Keywords: Wireless communication channel, erroneous ackets, error bursts.. Introduction Most communication systems are sensitive to random errors and synchronization failures. The Physical Layer analysis of any Comuter Communication network is very imortant. This is because many different roblems concerning network execution and utilization are caused by errors and failures on the Physical Layer. Wireless communication networks are not the excetion. Moreover, the roblem of achieving high reliability and error tolerance is urgent in modern communication technologies such as mobile Internet Protocol (IP) or General Packet Radio Service (GPRS) networks []. A number of roblems arise in a wireless communication channel context. These roblems are caused by the following reasons. The first reason is related to non-reliability of the radio channel. As a matter of fact, a sufficiently high Bit Error Rate (BER) and very high synchronization failure robability as oosed to the qualitative wire and esecially fiber otic channels characterize these channels. BER may 3 be rather within. The second reason is that BER in the radio channel is not a constant value. As soon as the reliability of the wireless channel deends on several external reasons, BER is essentially a time function. However, in recent years there has been an intensive interest in wireless channels. A number of aers devoted to the imact of burst errors on the network reliability and on acket synchronization have aeared [, 3], among others.. General Princiles for Determining the Probabilistic Model of the Wireless Channels A various range of BER within a given Virtual Connection characterizes wireless communication channels. Therefore, it is reasonable to create an aroriate robabilistic model of the wireless channel. The urose of this aer is to analyse the general number of erroneous ackets during a secific time interval. It should be mentioned that BER and Packet Error Rate (PER) do not change during a acket transmission in the resented model. The PER change is exected after the ending of a given acket transmission. Mention that PER is a BER function in a network model. Let us assume that there is n* various channel states. Each channel state is defined by a secific PER. Actually, is a discrete random variable. For each channel state i, is equal to i. Let s assume that the current channel state corresonding to the given acket transmission is. Then. For the () next acket transmission there exists a finite robability ( ) of non- changing of the current channel n* ( n*),( i state. Let us denote the robabilities set,...,,... ). ( i) () ( i) Each value secifies a robability that within a next acket transmission a channel state will be i. Actually, a simle Markov chain may describe the discrete rocess that determines the current channel state [4]. The chain is defined by the robability transition matrix Z z ) and by the initial robabilistic ( i) ( i () 3

2 vector π ( ) [...]. Evidently, dim(z)n*. The Markov chain is homogeneous. The homogeneity is caused by the following reasons: The acket flow in the communication channel is stationary. The acket transmission time is assumed to be finite and constant. It should be remarked that acket transmission time variance and in the acket rocessing time variance are omitted. The concise evaluation of the erroneous ackets number causes significant difficulties, which are related to the variability of the robability. Therefore, the roosed mathematical model is directed to the robabilistic evaluation of the researched characteristics. 3. The Distribution of the Erroneous Packets umber in Case n* Assume that a single change of the value is robable during a transmission of several ackets (Figure ). () c Figure. The channel state robability as a function of a transmitted acket number c in the case n*. The robability of the change of the channel state is equal to. It can be assumed that the channel state was changed after a transmission of (c-) ackets. Then the revious (c-) ackets are characterized by the PER while the next (-c+) cells are characterized by the PER. The ( ) ( ) following discrete random variables y and y are introduced: y y,..., c y y } } c,.... } } c () The discrete random variables () () c y and () c y are defined. c Since the random variables under consideration are discrete and integer, it is reasonable to determine the Generating Functions (GF) [4, 5] of the s abstract variable: π / c c+ x () c c x x} s () c x x} s [ [ ( ] x c+ ( ]. c, π / c () () Since the random variables c and c are indeendent for a fixed value (c-), then the Generating () () Function of the random variable + is determined as c c c ( ) ( c / c / c / c π ( s ) π ( s ) π ( s ) [ ( s )] [ ( s )]. () () c+ 33

3 The random variable c determines the erroneous ackets number under the condition that the channel state was switched on after the (c-) acket transmission. The GF π / c ( s) characterizes conditional distribution of the erroneous ackets number under the following condition: c-l+. Here l denotes the number of ackets, which have been transmitted in channel state. The GF corresonding to the unconditional distribution is generated as π { π / l P( l)} {[ [ l ( ] l ( ] l [ ( ( { P() + P() ) ( ( l ( ] P( l)} P( )}. P(l) is the random variable l distribution [6]. Clearly, the sum from the equation () is essentially the GF ( of the random variable l with the argument, which substitutes the argument s. Consequently, ( ( π [ ( ] π l. ( (3) The equation (3) contains information about by means of the items P(l). The first item of π (s) () [ ( ] determines GF of the binomial (Bernoulli) distribution with the argument s. Let us take u the limit transition that is investigated if. Such situation is relevant if the number of transmitted ackets is sufficiently large. For this urose the following rates are introduced: () a, a, d. () () The random variable that is characterized by the binomial distribution with the GF π s) [ ( ], is also introduced. The urose is to determine ( () da ( s) lim π lim [ a ( ] e. Considering the PER switching mechanism let s find the limit of the second item of the π (s). Clearly, () () P() ( ), P() ( ),..., P( ), P( ). Hence, ( π l ( ( () ( () ) () ) ( () ( ) ( )( ) s s ( ) ( ) s s () ( ( ) () ( + ( ( ) () () () ( + + ( + + ( () ). ( By carrying out all actions related to the determining of the lim π l, we conclude that ( dv( s) d da ( ) ( ) s d e e π s lim π e e +, (5) v + vs where v a a. In summary, any order initial distribution moment of the random variable under consideration is determined on the π ( s ) base. As a matter of fact, exact determination of the erroneous ackets number is ossible if n and the only single switch of the channel mode is robable. () () (4) 34

4 4. Analysis of the Erroneous Packets umber in Case n*> In a general case, if during a secific interval S, the number of channel modes switches is more than one, as well as in the case n*3, the distinct calculation of π ( s ) is rather comlicated. The roblem discussion is resented for n*3. It can be assumed that the channel switching rocedure is deicted in Figure. Q 3 Q () ( ) Q () ( ) () c c c Figure. The channel state robability as a function of a transmitted cell number c in case n*3. The following assumtions are made:. The only two leas of the robability are ossible during a secific time interval S.. On the first stage,. It means that no error takes lace during the transmission of (c-) ackets. 3. The two channel state switches are ossible with the robabilities and after the transmission of ( c ) and ( c ) ackets resectively. As a result the grah (c) includes the tree areas: Q, Q and Q 3. The channel state switch robability in the area Q or Q is variables () y and or consequently. In the area Q 3 this robability is equal to. The random () y are defined as in the revious case. Then π π l [ ( ] ( ) + ( ( (6) + ( π l[ ( ] π l[ ( ] ( ))). ( + ( According to the assumtion, no acket error is ossible in the range [,,c-]. The arguments of the GFs π l{ f ( s )} essentially are the functions of s. Therefore π l{ f } are formed from (4) by means of ( the argument changing of f. Clearly, the deendence π (s) on is reflected in ( the argument change. Such deendence is absent in (6) in the obvious form. The considerable calculation difficulties arise during a limit transition when. The function π as well as in the revious d case contains the item e. Contrary to the revious model, π ( ) is not reresented as the multilication of the GFs number. However, this roblem can be solved by means of numerical methods based on the comuter calculations. The resented Table demonstrates the mathematical exectation and variance of the erroneous ackets number considering the arameters,,,,. s 35

5 TABLE. Mathematical exectation E and variance V of the non-synchronous cells number.. E V Evaluation of the Erroneous Packets umber in Case of any n* and It should be stated that in a more general case it is not reasonable to study the erroneous ackets number by means of the discrete distributions. Therefore, the transition from the discrete random variable to the continuous one is required. Hence, study of the discrete random variable distribution is relaced by the evaluation of the continuous random variable U distribution moments. The researched characteristic U takes all ossible values in the range [, ]. Moreover, the and U mathematical U exectations are equal: E E. It should be assumed that the transition condition of the Central Limit Theorem takes lace, i.e. E U, is sufficiently large. According to the general rinciles of the research methods of continuous random variables, The Moment Generating Function (MGF) is introduced M U + Uη ( η) e ϕ( U ) du, where ϕ(u ) is the robability density of the random variable U. Evidently, GFs and MGFs are connected by common features. Analyzing the roblem under consideration M U (η ) is formed from π (or π ) by the η argument change s e. Consequently, based on the theorem of continuity and on the theorem of uniqueness [], the limit M lim M U (η) defines the U limit distribution function (or robability density η function) in the unique way if. The general theorem of continuity sets corresondence between the limit distribution functions and the MGFs of a certain argument. As a matter of fact, in the continuous distribution case, any initial or central U distribution moment of the -th order is not equal to the corresonding moment of the discrete distribution if. However, the following inequality is correct: µ U µ,. (7) Actually this inequality is caused by the following reasons: in the general case of the U continuous distribution for the analysis of the ( c ) function not a single realization with a given robability, but the random variable w distribution must be taken into account. Actually, w takes w m values that denote the channel switch from the current state to the m state for the next acket transmission (Figure 3). n* Obviously, the normalizing condition takes lace: P ( w m ). m The roosed mathematical method is based on the change of all random rocess realizations that corresond to the channel state b switch to the set of the other ossible channel states, by the average realization. This realization is secified by the channel state switch robability b n* m m b g, where g is the average robability of the channel state m. This fact immediately exlains the inequality (7). m m 36

6 ν 3 () () (3) ( ν ) c c c Figure 3. The channel state robability as a function of a transmitted acket number c in the case of any n* The case of n* will be discussed further. The transition from π ( ) (5) to the corresonding MGF is executed by means of argument change s e : η s M U ( η) e η da ( e ) e d η dv( e ) e e + v + vs d. (8) Assuming that is rather small, the first item tends to. Each -th order initial distribution moment is derived by means of the -th order derivative in the oint η. Hence the generated distribution function determines the low limit of any order initial (or central) distribution moment. In order to study the more general deendence ( c ) (Figure 3) the following limitations are introduced: d, a (conditions ). The first condition ( d ) takes lace in the case when the channel state switch (or switches) occurs with a sufficiently high robability if the cells transmission time is rather large. The second condition ( a ) covers the case when the channel switches are rather rare. Then the random variable U is transformed into the random variable B such as M ( η ) lim ( η). Based on the solution B M U d, a methods of the analogous roblems in Probability Theory in relation to the continuous distributions [5], the B random variable is reresented as the linear combination of the indeendent random variables B l. The Bl number deends uon the ( c ) ums. In fact for the model reresented by Figure the following equation is correct: B B ab. It is assumed that the acket error in the channel state is imossible. Here the B random variable follows the normal distribution with the mathematical exectation and the variance E ( B ) V ( B ) ad. The B random variable also follows the χ distribution with two degrees of freedom, i. e., the B robability density function is β / ϕ( B ) e. In the same way in the case n*3 from the revious aragrah B B ab ( a a ) B3. Here, a. 37

7 B is characterized by a normal distribution with the arameters E B ) V ( B ) a. Finally, B and ( d B 3 follow the χ distribution with two degrees of freedom. Analogously in the general case (Figure 3) the random variable is transformed into the continuous random variable B under the limit transition: B B aυ B ( a a ) B3 ( a a ) B +. υ υ υ υ υ (9) Here B is characterized by the normal distribution with the arameters f E( B ) V ( B ) aυ d, a f,. f f Consequently, the MGF of the erroneous ackets number, which is aroximated by the random variable B, is determined as the MGF items multilication. Indeed the B items distributions are known. If all items in (9) are of the close orders, then the B distribution tends to the normal distribution. This fact is confirmed by the Launov theorem: Assuming that the random variable z is resented as z z + z + zk, where z z, z,, zk are the indeendent random variables and k growth is unlimited. The random variable z k distribution function is F k ( z ) f ( z )dz. k z 3 E( zi E( zi )) i If lim k 3 / ( V ( z)), (**) z E( z) then lim ( ). ( ) F k z Φ k V z t y Here Φ( t) e dy is the Lalace function. Therefore, if the limit (**) takes lace and the π number of k items is sufficiently large, then the z random variable distribution is closed to the normal distribution. Otherwise, if among the items ( aυ a f ) f there are items greatly different from the others, then the B random variable is aroximated by the sum [6]: B B + hb, h const. Each initial B -th B B order distribution moment µ is calculated as d ( ) B µ M B s. Finally, µ is substituted by the ds U µ r evaluation in the inequalities (7). Conclusions The following remarks comlete the aer. It is ossible to create the similar mathematical model in the case when acket errors are not () neglected in the range [, c ]. The above mentioned range corresonds to the robability. The monotonous growth of the and values by the transmitted ackets number increment is assumed. evertheless, this assumtion is not necessary. Moreover, there are no limitations on the (c) or ( c ) functions ums if the conditions ( ) take lace. Actually, based on equation (9) in the non-monotonous ( c ) case the υ is equal to the maximal f robability. It should be mentioned that f value corresonds to a given channel state switch. Evidently, the items order in the sum is meaningless. Finally, the limit transition is legitimate if the transmitted cells number is sufficiently large. Several roblems are considered for future work. Based on the real data, the modified decoding algorithm that aroriates to the non-reliable noisy wireless environment should be chosen and alied in the modern mobile IP or GPRS technologies. Thus, the PER in the wireless network should be decreased. Consequently, the network reliability should be significantly imroved in comarison with the existing models. s 38

8 References [] Kurose J., Ross K. (3) Comuter etworking. A To Down Aroach Featuring the Internet, nd ed. Addison Wesley. [] ang L., Xiaokang L., Kewu P. (999) Cell Synchronization Under a Secial Error Protection Mechanism. In: Fifth Asia-Pacific Conference on Communications and Fourth Otoelectronics and Communications Conference (China), Vol., [3] Zorzi M. (999) On the Imact of Burst Errors on Wireless ATM, IEEE Personal Communications, [4] Paoulis A. (99) Probability, Random Variables, and Stochastic Processes, 3rd ed. McGraw- Hill. [5] Duduvicz E. J., Mishra S.. (998) Modern Mathematical Statistics. ew ork: Wiley. [6] Kordonsky X. (963) Alication of Probability Theory for Engineers. Moscow: State Publishing of the Mathematical and Physical Literature. Received on the st of May 5 39

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

An Analysis of TCP over Random Access Satellite Links

An Analysis of TCP over Random Access Satellite Links An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance

More information

Node-voltage method using virtual current sources technique for special cases

Node-voltage method using virtual current sources technique for special cases Node-oltage method using irtual current sources technique for secial cases George E. Chatzarakis and Marina D. Tortoreli Electrical and Electronics Engineering Deartments, School of Pedagogical and Technological

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 On the Relationshi Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 Imad Antonios antoniosi1@southernct.edu CS Deartment MO117 Southern Connecticut State University 501 Crescent St.

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is

More information

arxiv:cond-mat/ v2 25 Sep 2002

arxiv:cond-mat/ v2 25 Sep 2002 Energy fluctuations at the multicritical oint in two-dimensional sin glasses arxiv:cond-mat/0207694 v2 25 Se 2002 1. Introduction Hidetoshi Nishimori, Cyril Falvo and Yukiyasu Ozeki Deartment of Physics,

More information

On Code Design for Simultaneous Energy and Information Transfer

On Code Design for Simultaneous Energy and Information Transfer On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging 1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating

More information

Developing A Deterioration Probabilistic Model for Rail Wear

Developing A Deterioration Probabilistic Model for Rail Wear International Journal of Traffic and Transortation Engineering 2012, 1(2): 13-18 DOI: 10.5923/j.ijtte.20120102.02 Develoing A Deterioration Probabilistic Model for Rail Wear Jabbar-Ali Zakeri *, Shahrbanoo

More information

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,

More information

MULTIVARIATE SHEWHART QUALITY CONTROL FOR STANDARD DEVIATION

MULTIVARIATE SHEWHART QUALITY CONTROL FOR STANDARD DEVIATION MULTIVARIATE SHEWHART QUALITY CONTROL FOR STANDARD DEVIATION M. Jabbari Nooghabi, Deartment of Statistics, Faculty of Mathematical Sciences, Ferdowsi University of Mashhad, Mashhad-Iran. and H. Jabbari

More information

8 STOCHASTIC PROCESSES

8 STOCHASTIC PROCESSES 8 STOCHASTIC PROCESSES The word stochastic is derived from the Greek στoχαστικoς, meaning to aim at a target. Stochastic rocesses involve state which changes in a random way. A Markov rocess is a articular

More information

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of

More information

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi

More information

Universal Finite Memory Coding of Binary Sequences

Universal Finite Memory Coding of Binary Sequences Deartment of Electrical Engineering Systems Universal Finite Memory Coding of Binary Sequences Thesis submitted towards the degree of Master of Science in Electrical and Electronic Engineering in Tel-Aviv

More information

Research of PMU Optimal Placement in Power Systems

Research of PMU Optimal Placement in Power Systems Proceedings of the 5th WSEAS/IASME Int. Conf. on SYSTEMS THEORY and SCIENTIFIC COMPUTATION, Malta, Setember 15-17, 2005 (38-43) Research of PMU Otimal Placement in Power Systems TIAN-TIAN CAI, QIAN AI

More information

t 0 Xt sup X t p c p inf t 0

t 0 Xt sup X t p c p inf t 0 SHARP MAXIMAL L -ESTIMATES FOR MARTINGALES RODRIGO BAÑUELOS AND ADAM OSȨKOWSKI ABSTRACT. Let X be a suermartingale starting from 0 which has only nonnegative jums. For each 0 < < we determine the best

More information

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu

More information

ON POLYNOMIAL SELECTION FOR THE GENERAL NUMBER FIELD SIEVE

ON POLYNOMIAL SELECTION FOR THE GENERAL NUMBER FIELD SIEVE MATHEMATICS OF COMPUTATIO Volume 75, umber 256, October 26, Pages 237 247 S 25-5718(6)187-9 Article electronically ublished on June 28, 26 O POLYOMIAL SELECTIO FOR THE GEERAL UMBER FIELD SIEVE THORSTE

More information

Uniform Law on the Unit Sphere of a Banach Space

Uniform Law on the Unit Sphere of a Banach Space Uniform Law on the Unit Shere of a Banach Sace by Bernard Beauzamy Société de Calcul Mathématique SA Faubourg Saint Honoré 75008 Paris France Setember 008 Abstract We investigate the construction of a

More information

arxiv: v1 [cs.sy] 3 Nov 2018

arxiv: v1 [cs.sy] 3 Nov 2018 Proceedings of the IX Encontro dos Alunos e Docentes do Deartamento de Engenharia de Comutação Automação At: Caminas 29 e 30 de setembro de 2016, SP Brazi, available in [2016 EADCA-IX]. The Burst Failure

More information

Calculation of MTTF values with Markov Models for Safety Instrumented Systems

Calculation of MTTF values with Markov Models for Safety Instrumented Systems 7th WEA International Conference on APPLIE COMPUTE CIENCE, Venice, Italy, November -3, 7 3 Calculation of MTTF values with Markov Models for afety Instrumented ystems BÖCÖK J., UGLJEA E., MACHMU. University

More information

Morten Frydenberg Section for Biostatistics Version :Friday, 05 September 2014

Morten Frydenberg Section for Biostatistics Version :Friday, 05 September 2014 Morten Frydenberg Section for Biostatistics Version :Friday, 05 Setember 204 All models are aroximations! The best model does not exist! Comlicated models needs a lot of data. lower your ambitions or get

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

Vision Graph Construction in Wireless Multimedia Sensor Networks

Vision Graph Construction in Wireless Multimedia Sensor Networks University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Conference and Worksho Paers Comuter Science and Engineering, Deartment of 21 Vision Grah Construction in Wireless Multimedia

More information

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment

More information

Factors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doped Fiber Amplifier

Factors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doped Fiber Amplifier Australian Journal of Basic and Alied Sciences, 5(12): 2010-2020, 2011 ISSN 1991-8178 Factors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doed Fiber Amlifier

More information

arxiv: v3 [physics.data-an] 23 May 2011

arxiv: v3 [physics.data-an] 23 May 2011 Date: October, 8 arxiv:.7v [hysics.data-an] May -values for Model Evaluation F. Beaujean, A. Caldwell, D. Kollár, K. Kröninger Max-Planck-Institut für Physik, München, Germany CERN, Geneva, Switzerland

More information

On Doob s Maximal Inequality for Brownian Motion

On Doob s Maximal Inequality for Brownian Motion Stochastic Process. Al. Vol. 69, No., 997, (-5) Research Reort No. 337, 995, Det. Theoret. Statist. Aarhus On Doob s Maximal Inequality for Brownian Motion S. E. GRAVERSEN and G. PESKIR If B = (B t ) t

More information

Availability and Maintainability. Piero Baraldi

Availability and Maintainability. Piero Baraldi Availability and Maintainability 1 Introduction: reliability and availability System tyes Non maintained systems: they cannot be reaired after a failure (a telecommunication satellite, a F1 engine, a vessel

More information

CONVOLVED SUBSAMPLING ESTIMATION WITH APPLICATIONS TO BLOCK BOOTSTRAP

CONVOLVED SUBSAMPLING ESTIMATION WITH APPLICATIONS TO BLOCK BOOTSTRAP Submitted to the Annals of Statistics arxiv: arxiv:1706.07237 CONVOLVED SUBSAMPLING ESTIMATION WITH APPLICATIONS TO BLOCK BOOTSTRAP By Johannes Tewes, Dimitris N. Politis and Daniel J. Nordman Ruhr-Universität

More information

A Simple Throughput Model for TCP Veno

A Simple Throughput Model for TCP Veno A Simle Throughut Model for TCP Veno Bin Zhou, Cheng Peng Fu, Dah-Ming Chiu, Chiew Tong Lau, and Lek Heng Ngoh School of Comuter Engineering, Nanyang Technological University, Singaore 639798 Email: {zhou00,

More information

Probabilistic Analysis of a Computer System with Inspection and Priority for Repair Activities of H/W over Replacement of S/W

Probabilistic Analysis of a Computer System with Inspection and Priority for Repair Activities of H/W over Replacement of S/W International Journal of Comuter Alications (975 8887) Volume 44 o. Aril Probabilistic Analysis of a Comuter ystem with Insection and Priority for Reair Activities of /W over Relacement of /W Jyoti Anand

More information

I - Information theory basics

I - Information theory basics I - Information theor basics Introduction To communicate, that is, to carr information between two oints, we can emlo analog or digital transmission techniques. In digital communications the message is

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

A PROBABILISTIC POWER ESTIMATION METHOD FOR COMBINATIONAL CIRCUITS UNDER REAL GATE DELAY MODEL

A PROBABILISTIC POWER ESTIMATION METHOD FOR COMBINATIONAL CIRCUITS UNDER REAL GATE DELAY MODEL A PROBABILISTIC POWER ESTIMATION METHOD FOR COMBINATIONAL CIRCUITS UNDER REAL GATE DELAY MODEL G. Theodoridis, S. Theoharis, D. Soudris*, C. Goutis VLSI Design Lab, Det. of Electrical and Comuter Eng.

More information

Signaled Queueing. Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT. Categories and Subject Descriptors. General Terms. Keywords

Signaled Queueing. Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT. Categories and Subject Descriptors. General Terms. Keywords Signaled Queueing Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT Burstiness in queues where customers arrive indeendently leads to rush eriods when wait times are long. We roose a simle signaling scheme

More information

Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process

Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process P. Mantalos a1, K. Mattheou b, A. Karagrigoriou b a.deartment of Statistics University of Lund

More information

1-way quantum finite automata: strengths, weaknesses and generalizations

1-way quantum finite automata: strengths, weaknesses and generalizations 1-way quantum finite automata: strengths, weaknesses and generalizations arxiv:quant-h/9802062v3 30 Se 1998 Andris Ambainis UC Berkeley Abstract Rūsiņš Freivalds University of Latvia We study 1-way quantum

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

substantial literature on emirical likelihood indicating that it is widely viewed as a desirable and natural aroach to statistical inference in a vari

substantial literature on emirical likelihood indicating that it is widely viewed as a desirable and natural aroach to statistical inference in a vari Condence tubes for multile quantile lots via emirical likelihood John H.J. Einmahl Eindhoven University of Technology Ian W. McKeague Florida State University May 7, 998 Abstract The nonarametric emirical

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley Elements of Asymtotic Theory James L. Powell Deartment of Economics University of California, Berkeley Objectives of Asymtotic Theory While exact results are available for, say, the distribution of the

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

Statics and dynamics: some elementary concepts

Statics and dynamics: some elementary concepts 1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and

More information

A Model for Randomly Correlated Deposition

A Model for Randomly Correlated Deposition A Model for Randomly Correlated Deosition B. Karadjov and A. Proykova Faculty of Physics, University of Sofia, 5 J. Bourchier Blvd. Sofia-116, Bulgaria ana@hys.uni-sofia.bg Abstract: A simle, discrete,

More information

Estimation of Separable Representations in Psychophysical Experiments

Estimation of Separable Representations in Psychophysical Experiments Estimation of Searable Reresentations in Psychohysical Exeriments Michele Bernasconi (mbernasconi@eco.uninsubria.it) Christine Choirat (cchoirat@eco.uninsubria.it) Raffaello Seri (rseri@eco.uninsubria.it)

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

Decoding Linear Block Codes Using a Priority-First Search: Performance Analysis and Suboptimal Version

Decoding Linear Block Codes Using a Priority-First Search: Performance Analysis and Suboptimal Version IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 3, MAY 1998 133 Decoding Linear Block Codes Using a Priority-First Search Performance Analysis Subotimal Version Yunghsiang S. Han, Member, IEEE, Carlos

More information

Analysis of M/M/n/K Queue with Multiple Priorities

Analysis of M/M/n/K Queue with Multiple Priorities Analysis of M/M/n/K Queue with Multile Priorities Coyright, Sanjay K. Bose For a P-riority system, class P of highest riority Indeendent, Poisson arrival rocesses for each class with i as average arrival

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

START Selected Topics in Assurance

START Selected Topics in Assurance START Selected Toics in Assurance Related Technologies Table of Contents Introduction Statistical Models for Simle Systems (U/Down) and Interretation Markov Models for Simle Systems (U/Down) and Interretation

More information

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation Paer C Exact Volume Balance Versus Exact Mass Balance in Comositional Reservoir Simulation Submitted to Comutational Geosciences, December 2005. Exact Volume Balance Versus Exact Mass Balance in Comositional

More information

Finite Mixture EFA in Mplus

Finite Mixture EFA in Mplus Finite Mixture EFA in Mlus November 16, 2007 In this document we describe the Mixture EFA model estimated in Mlus. Four tyes of deendent variables are ossible in this model: normally distributed, ordered

More information

Probability Estimates for Multi-class Classification by Pairwise Coupling

Probability Estimates for Multi-class Classification by Pairwise Coupling Probability Estimates for Multi-class Classification by Pairwise Couling Ting-Fan Wu Chih-Jen Lin Deartment of Comuter Science National Taiwan University Taiei 06, Taiwan Ruby C. Weng Deartment of Statistics

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

Topic 7: Using identity types

Topic 7: Using identity types Toic 7: Using identity tyes June 10, 2014 Now we would like to learn how to use identity tyes and how to do some actual mathematics with them. By now we have essentially introduced all inference rules

More information

arxiv: v1 [cond-mat.stat-mech] 1 Dec 2017

arxiv: v1 [cond-mat.stat-mech] 1 Dec 2017 Suscetibility Proagation by Using Diagonal Consistency Muneki Yasuda Graduate School of Science Engineering, Yamagata University Kazuyuki Tanaka Graduate School of Information Sciences, Tohoku University

More information

Construction of High-Girth QC-LDPC Codes

Construction of High-Girth QC-LDPC Codes MITSUBISHI ELECTRIC RESEARCH LABORATORIES htt://wwwmerlcom Construction of High-Girth QC-LDPC Codes Yige Wang, Jonathan Yedidia, Stark Draer TR2008-061 Setember 2008 Abstract We describe a hill-climbing

More information

dn i where we have used the Gibbs equation for the Gibbs energy and the definition of chemical potential

dn i where we have used the Gibbs equation for the Gibbs energy and the definition of chemical potential Chem 467 Sulement to Lectures 33 Phase Equilibrium Chemical Potential Revisited We introduced the chemical otential as the conjugate variable to amount. Briefly reviewing, the total Gibbs energy of a system

More information

Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications

Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Bartłomiej Błaszczyszyn Paul Muhlethaler Nadjib Achir INRIA/ENS INRIA Rocquencourt INRIA Rocquencourt

More information

Efficient Approximations for Call Admission Control Performance Evaluations in Multi-Service Networks

Efficient Approximations for Call Admission Control Performance Evaluations in Multi-Service Networks Efficient Aroximations for Call Admission Control Performance Evaluations in Multi-Service Networks Emre A. Yavuz, and Victor C. M. Leung Deartment of Electrical and Comuter Engineering The University

More information

Session 5: Review of Classical Astrodynamics

Session 5: Review of Classical Astrodynamics Session 5: Review of Classical Astrodynamics In revious lectures we described in detail the rocess to find the otimal secific imulse for a articular situation. Among the mission requirements that serve

More information

Slash Distributions and Applications

Slash Distributions and Applications CHAPTER 2 Slash Distributions and Alications 2.1 Introduction The concet of slash distributions was introduced by Kafadar (1988) as a heavy tailed alternative to the normal distribution. Further literature

More information

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels oname manuscrit o. will be inserted by the editor) Quantitative estimates of roagation of chaos for stochastic systems with W, kernels Pierre-Emmanuel Jabin Zhenfu Wang Received: date / Acceted: date Abstract

More information

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical

More information

Bayesian Spatially Varying Coefficient Models in the Presence of Collinearity

Bayesian Spatially Varying Coefficient Models in the Presence of Collinearity Bayesian Satially Varying Coefficient Models in the Presence of Collinearity David C. Wheeler 1, Catherine A. Calder 1 he Ohio State University 1 Abstract he belief that relationshis between exlanatory

More information

Anytime communication over the Gilbert-Eliot channel with noiseless feedback

Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anant Sahai, Salman Avestimehr, Paolo Minero Deartment of Electrical Engineering and Comuter Sciences University of California

More information

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete

More information

Adaptive estimation with change detection for streaming data

Adaptive estimation with change detection for streaming data Adative estimation with change detection for streaming data A thesis resented for the degree of Doctor of Philosohy of the University of London and the Diloma of Imerial College by Dean Adam Bodenham Deartment

More information

Preconditioning techniques for Newton s method for the incompressible Navier Stokes equations

Preconditioning techniques for Newton s method for the incompressible Navier Stokes equations Preconditioning techniques for Newton s method for the incomressible Navier Stokes equations H. C. ELMAN 1, D. LOGHIN 2 and A. J. WATHEN 3 1 Deartment of Comuter Science, University of Maryland, College

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

CERIAS Tech Report The period of the Bell numbers modulo a prime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education

CERIAS Tech Report The period of the Bell numbers modulo a prime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education CERIAS Tech Reort 2010-01 The eriod of the Bell numbers modulo a rime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education and Research Information Assurance and Security Purdue University,

More information

Statistical Multiplexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version)

Statistical Multiplexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version) 1 Statistical Multilexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version) Technical Reort: University of Virginia, CS-99-23, July 1999 Robert Boorstyn Almut Burchard Jörg Liebeherr y

More information

Temperature, current and doping dependence of non-ideality factor for pnp and npn punch-through structures

Temperature, current and doping dependence of non-ideality factor for pnp and npn punch-through structures Indian Journal of Pure & Alied Physics Vol. 44, December 2006,. 953-958 Temerature, current and doing deendence of non-ideality factor for n and nn unch-through structures Khurshed Ahmad Shah & S S Islam

More information

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino

More information

Decoding First-Spike Latency: A Likelihood Approach. Rick L. Jenison

Decoding First-Spike Latency: A Likelihood Approach. Rick L. Jenison eurocomuting 38-40 (00) 39-48 Decoding First-Sike Latency: A Likelihood Aroach Rick L. Jenison Deartment of Psychology University of Wisconsin Madison WI 53706 enison@wavelet.sych.wisc.edu ABSTRACT First-sike

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

Notes on Instrumental Variables Methods

Notes on Instrumental Variables Methods Notes on Instrumental Variables Methods Michele Pellizzari IGIER-Bocconi, IZA and frdb 1 The Instrumental Variable Estimator Instrumental variable estimation is the classical solution to the roblem of

More information

1 Probability Spaces and Random Variables

1 Probability Spaces and Random Variables 1 Probability Saces and Random Variables 1.1 Probability saces Ω: samle sace consisting of elementary events (or samle oints). F : the set of events P: robability 1.2 Kolmogorov s axioms Definition 1.2.1

More information

Statistics II Logistic Regression. So far... Two-way repeated measures ANOVA: an example. RM-ANOVA example: the data after log transform

Statistics II Logistic Regression. So far... Two-way repeated measures ANOVA: an example. RM-ANOVA example: the data after log transform Statistics II Logistic Regression Çağrı Çöltekin Exam date & time: June 21, 10:00 13:00 (The same day/time lanned at the beginning of the semester) University of Groningen, Det of Information Science May

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie Wireless Intelligent Networks Center WINC, Nile University,

More information

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE)

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE) KAUST Reository Outage erformance of cognitive radio systems with Imroer Gaussian signaling Item tye Authors Erint version DOI Publisher Journal Rights Conference Paer Amin Osama; Abediseid Walid; Alouini

More information