MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK
|
|
- Bernice Mills
- 6 years ago
- Views:
Transcription
1 Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment of Comuter Engineering, Holon Academic Institute of Technology, Golomb 5, Holon 58 Tel: , Fax: The aer is devoted to study and evaluation of the erroneous ackets flow on the hysical layer of a wireless communication network. A mathematical model of the erroneous ackets assed to the communication channel has been structured and analysed. The statistical estimation of the erroneous ackets number is resented and discussed in the aer. Keywords: Wireless communication channel, erroneous ackets, error bursts.. Introduction Most communication systems are sensitive to random errors and synchronization failures. The Physical Layer analysis of any Comuter Communication network is very imortant. This is because many different roblems concerning network execution and utilization are caused by errors and failures on the Physical Layer. Wireless communication networks are not the excetion. Moreover, the roblem of achieving high reliability and error tolerance is urgent in modern communication technologies such as mobile Internet Protocol (IP) or General Packet Radio Service (GPRS) networks []. A number of roblems arise in a wireless communication channel context. These roblems are caused by the following reasons. The first reason is related to non-reliability of the radio channel. As a matter of fact, a sufficiently high Bit Error Rate (BER) and very high synchronization failure robability as oosed to the qualitative wire and esecially fiber otic channels characterize these channels. BER may 3 be rather within. The second reason is that BER in the radio channel is not a constant value. As soon as the reliability of the wireless channel deends on several external reasons, BER is essentially a time function. However, in recent years there has been an intensive interest in wireless channels. A number of aers devoted to the imact of burst errors on the network reliability and on acket synchronization have aeared [, 3], among others.. General Princiles for Determining the Probabilistic Model of the Wireless Channels A various range of BER within a given Virtual Connection characterizes wireless communication channels. Therefore, it is reasonable to create an aroriate robabilistic model of the wireless channel. The urose of this aer is to analyse the general number of erroneous ackets during a secific time interval. It should be mentioned that BER and Packet Error Rate (PER) do not change during a acket transmission in the resented model. The PER change is exected after the ending of a given acket transmission. Mention that PER is a BER function in a network model. Let us assume that there is n* various channel states. Each channel state is defined by a secific PER. Actually, is a discrete random variable. For each channel state i, is equal to i. Let s assume that the current channel state corresonding to the given acket transmission is. Then. For the () next acket transmission there exists a finite robability ( ) of non- changing of the current channel n* ( n*),( i state. Let us denote the robabilities set,...,,... ). ( i) () ( i) Each value secifies a robability that within a next acket transmission a channel state will be i. Actually, a simle Markov chain may describe the discrete rocess that determines the current channel state [4]. The chain is defined by the robability transition matrix Z z ) and by the initial robabilistic ( i) ( i () 3
2 vector π ( ) [...]. Evidently, dim(z)n*. The Markov chain is homogeneous. The homogeneity is caused by the following reasons: The acket flow in the communication channel is stationary. The acket transmission time is assumed to be finite and constant. It should be remarked that acket transmission time variance and in the acket rocessing time variance are omitted. The concise evaluation of the erroneous ackets number causes significant difficulties, which are related to the variability of the robability. Therefore, the roosed mathematical model is directed to the robabilistic evaluation of the researched characteristics. 3. The Distribution of the Erroneous Packets umber in Case n* Assume that a single change of the value is robable during a transmission of several ackets (Figure ). () c Figure. The channel state robability as a function of a transmitted acket number c in the case n*. The robability of the change of the channel state is equal to. It can be assumed that the channel state was changed after a transmission of (c-) ackets. Then the revious (c-) ackets are characterized by the PER while the next (-c+) cells are characterized by the PER. The ( ) ( ) following discrete random variables y and y are introduced: y y,..., c y y } } c,.... } } c () The discrete random variables () () c y and () c y are defined. c Since the random variables under consideration are discrete and integer, it is reasonable to determine the Generating Functions (GF) [4, 5] of the s abstract variable: π / c c+ x () c c x x} s () c x x} s [ [ ( ] x c+ ( ]. c, π / c () () Since the random variables c and c are indeendent for a fixed value (c-), then the Generating () () Function of the random variable + is determined as c c c ( ) ( c / c / c / c π ( s ) π ( s ) π ( s ) [ ( s )] [ ( s )]. () () c+ 33
3 The random variable c determines the erroneous ackets number under the condition that the channel state was switched on after the (c-) acket transmission. The GF π / c ( s) characterizes conditional distribution of the erroneous ackets number under the following condition: c-l+. Here l denotes the number of ackets, which have been transmitted in channel state. The GF corresonding to the unconditional distribution is generated as π { π / l P( l)} {[ [ l ( ] l ( ] l [ ( ( { P() + P() ) ( ( l ( ] P( l)} P( )}. P(l) is the random variable l distribution [6]. Clearly, the sum from the equation () is essentially the GF ( of the random variable l with the argument, which substitutes the argument s. Consequently, ( ( π [ ( ] π l. ( (3) The equation (3) contains information about by means of the items P(l). The first item of π (s) () [ ( ] determines GF of the binomial (Bernoulli) distribution with the argument s. Let us take u the limit transition that is investigated if. Such situation is relevant if the number of transmitted ackets is sufficiently large. For this urose the following rates are introduced: () a, a, d. () () The random variable that is characterized by the binomial distribution with the GF π s) [ ( ], is also introduced. The urose is to determine ( () da ( s) lim π lim [ a ( ] e. Considering the PER switching mechanism let s find the limit of the second item of the π (s). Clearly, () () P() ( ), P() ( ),..., P( ), P( ). Hence, ( π l ( ( () ( () ) () ) ( () ( ) ( )( ) s s ( ) ( ) s s () ( ( ) () ( + ( ( ) () () () ( + + ( + + ( () ). ( By carrying out all actions related to the determining of the lim π l, we conclude that ( dv( s) d da ( ) ( ) s d e e π s lim π e e +, (5) v + vs where v a a. In summary, any order initial distribution moment of the random variable under consideration is determined on the π ( s ) base. As a matter of fact, exact determination of the erroneous ackets number is ossible if n and the only single switch of the channel mode is robable. () () (4) 34
4 4. Analysis of the Erroneous Packets umber in Case n*> In a general case, if during a secific interval S, the number of channel modes switches is more than one, as well as in the case n*3, the distinct calculation of π ( s ) is rather comlicated. The roblem discussion is resented for n*3. It can be assumed that the channel switching rocedure is deicted in Figure. Q 3 Q () ( ) Q () ( ) () c c c Figure. The channel state robability as a function of a transmitted cell number c in case n*3. The following assumtions are made:. The only two leas of the robability are ossible during a secific time interval S.. On the first stage,. It means that no error takes lace during the transmission of (c-) ackets. 3. The two channel state switches are ossible with the robabilities and after the transmission of ( c ) and ( c ) ackets resectively. As a result the grah (c) includes the tree areas: Q, Q and Q 3. The channel state switch robability in the area Q or Q is variables () y and or consequently. In the area Q 3 this robability is equal to. The random () y are defined as in the revious case. Then π π l [ ( ] ( ) + ( ( (6) + ( π l[ ( ] π l[ ( ] ( ))). ( + ( According to the assumtion, no acket error is ossible in the range [,,c-]. The arguments of the GFs π l{ f ( s )} essentially are the functions of s. Therefore π l{ f } are formed from (4) by means of ( the argument changing of f. Clearly, the deendence π (s) on is reflected in ( the argument change. Such deendence is absent in (6) in the obvious form. The considerable calculation difficulties arise during a limit transition when. The function π as well as in the revious d case contains the item e. Contrary to the revious model, π ( ) is not reresented as the multilication of the GFs number. However, this roblem can be solved by means of numerical methods based on the comuter calculations. The resented Table demonstrates the mathematical exectation and variance of the erroneous ackets number considering the arameters,,,,. s 35
5 TABLE. Mathematical exectation E and variance V of the non-synchronous cells number.. E V Evaluation of the Erroneous Packets umber in Case of any n* and It should be stated that in a more general case it is not reasonable to study the erroneous ackets number by means of the discrete distributions. Therefore, the transition from the discrete random variable to the continuous one is required. Hence, study of the discrete random variable distribution is relaced by the evaluation of the continuous random variable U distribution moments. The researched characteristic U takes all ossible values in the range [, ]. Moreover, the and U mathematical U exectations are equal: E E. It should be assumed that the transition condition of the Central Limit Theorem takes lace, i.e. E U, is sufficiently large. According to the general rinciles of the research methods of continuous random variables, The Moment Generating Function (MGF) is introduced M U + Uη ( η) e ϕ( U ) du, where ϕ(u ) is the robability density of the random variable U. Evidently, GFs and MGFs are connected by common features. Analyzing the roblem under consideration M U (η ) is formed from π (or π ) by the η argument change s e. Consequently, based on the theorem of continuity and on the theorem of uniqueness [], the limit M lim M U (η) defines the U limit distribution function (or robability density η function) in the unique way if. The general theorem of continuity sets corresondence between the limit distribution functions and the MGFs of a certain argument. As a matter of fact, in the continuous distribution case, any initial or central U distribution moment of the -th order is not equal to the corresonding moment of the discrete distribution if. However, the following inequality is correct: µ U µ,. (7) Actually this inequality is caused by the following reasons: in the general case of the U continuous distribution for the analysis of the ( c ) function not a single realization with a given robability, but the random variable w distribution must be taken into account. Actually, w takes w m values that denote the channel switch from the current state to the m state for the next acket transmission (Figure 3). n* Obviously, the normalizing condition takes lace: P ( w m ). m The roosed mathematical method is based on the change of all random rocess realizations that corresond to the channel state b switch to the set of the other ossible channel states, by the average realization. This realization is secified by the channel state switch robability b n* m m b g, where g is the average robability of the channel state m. This fact immediately exlains the inequality (7). m m 36
6 ν 3 () () (3) ( ν ) c c c Figure 3. The channel state robability as a function of a transmitted acket number c in the case of any n* The case of n* will be discussed further. The transition from π ( ) (5) to the corresonding MGF is executed by means of argument change s e : η s M U ( η) e η da ( e ) e d η dv( e ) e e + v + vs d. (8) Assuming that is rather small, the first item tends to. Each -th order initial distribution moment is derived by means of the -th order derivative in the oint η. Hence the generated distribution function determines the low limit of any order initial (or central) distribution moment. In order to study the more general deendence ( c ) (Figure 3) the following limitations are introduced: d, a (conditions ). The first condition ( d ) takes lace in the case when the channel state switch (or switches) occurs with a sufficiently high robability if the cells transmission time is rather large. The second condition ( a ) covers the case when the channel switches are rather rare. Then the random variable U is transformed into the random variable B such as M ( η ) lim ( η). Based on the solution B M U d, a methods of the analogous roblems in Probability Theory in relation to the continuous distributions [5], the B random variable is reresented as the linear combination of the indeendent random variables B l. The Bl number deends uon the ( c ) ums. In fact for the model reresented by Figure the following equation is correct: B B ab. It is assumed that the acket error in the channel state is imossible. Here the B random variable follows the normal distribution with the mathematical exectation and the variance E ( B ) V ( B ) ad. The B random variable also follows the χ distribution with two degrees of freedom, i. e., the B robability density function is β / ϕ( B ) e. In the same way in the case n*3 from the revious aragrah B B ab ( a a ) B3. Here, a. 37
7 B is characterized by a normal distribution with the arameters E B ) V ( B ) a. Finally, B and ( d B 3 follow the χ distribution with two degrees of freedom. Analogously in the general case (Figure 3) the random variable is transformed into the continuous random variable B under the limit transition: B B aυ B ( a a ) B3 ( a a ) B +. υ υ υ υ υ (9) Here B is characterized by the normal distribution with the arameters f E( B ) V ( B ) aυ d, a f,. f f Consequently, the MGF of the erroneous ackets number, which is aroximated by the random variable B, is determined as the MGF items multilication. Indeed the B items distributions are known. If all items in (9) are of the close orders, then the B distribution tends to the normal distribution. This fact is confirmed by the Launov theorem: Assuming that the random variable z is resented as z z + z + zk, where z z, z,, zk are the indeendent random variables and k growth is unlimited. The random variable z k distribution function is F k ( z ) f ( z )dz. k z 3 E( zi E( zi )) i If lim k 3 / ( V ( z)), (**) z E( z) then lim ( ). ( ) F k z Φ k V z t y Here Φ( t) e dy is the Lalace function. Therefore, if the limit (**) takes lace and the π number of k items is sufficiently large, then the z random variable distribution is closed to the normal distribution. Otherwise, if among the items ( aυ a f ) f there are items greatly different from the others, then the B random variable is aroximated by the sum [6]: B B + hb, h const. Each initial B -th B B order distribution moment µ is calculated as d ( ) B µ M B s. Finally, µ is substituted by the ds U µ r evaluation in the inequalities (7). Conclusions The following remarks comlete the aer. It is ossible to create the similar mathematical model in the case when acket errors are not () neglected in the range [, c ]. The above mentioned range corresonds to the robability. The monotonous growth of the and values by the transmitted ackets number increment is assumed. evertheless, this assumtion is not necessary. Moreover, there are no limitations on the (c) or ( c ) functions ums if the conditions ( ) take lace. Actually, based on equation (9) in the non-monotonous ( c ) case the υ is equal to the maximal f robability. It should be mentioned that f value corresonds to a given channel state switch. Evidently, the items order in the sum is meaningless. Finally, the limit transition is legitimate if the transmitted cells number is sufficiently large. Several roblems are considered for future work. Based on the real data, the modified decoding algorithm that aroriates to the non-reliable noisy wireless environment should be chosen and alied in the modern mobile IP or GPRS technologies. Thus, the PER in the wireless network should be decreased. Consequently, the network reliability should be significantly imroved in comarison with the existing models. s 38
8 References [] Kurose J., Ross K. (3) Comuter etworking. A To Down Aroach Featuring the Internet, nd ed. Addison Wesley. [] ang L., Xiaokang L., Kewu P. (999) Cell Synchronization Under a Secial Error Protection Mechanism. In: Fifth Asia-Pacific Conference on Communications and Fourth Otoelectronics and Communications Conference (China), Vol., [3] Zorzi M. (999) On the Imact of Burst Errors on Wireless ATM, IEEE Personal Communications, [4] Paoulis A. (99) Probability, Random Variables, and Stochastic Processes, 3rd ed. McGraw- Hill. [5] Duduvicz E. J., Mishra S.. (998) Modern Mathematical Statistics. ew ork: Wiley. [6] Kordonsky X. (963) Alication of Probability Theory for Engineers. Moscow: State Publishing of the Mathematical and Physical Literature. Received on the st of May 5 39
MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More information4. Score normalization technical details We now discuss the technical details of the score normalization method.
SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules
More informationAn Analysis of TCP over Random Access Satellite Links
An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance
More informationNode-voltage method using virtual current sources technique for special cases
Node-oltage method using irtual current sources technique for secial cases George E. Chatzarakis and Marina D. Tortoreli Electrical and Electronics Engineering Deartments, School of Pedagogical and Technological
More informationCombining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)
Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationOn split sample and randomized confidence intervals for binomial proportions
On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have
More informationSystem Reliability Estimation and Confidence Regions from Subsystem and Full System Tests
009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract
More informationOn the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1
On the Relationshi Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 Imad Antonios antoniosi1@southernct.edu CS Deartment MO117 Southern Connecticut State University 501 Crescent St.
More informationAnalysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks
Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their
More informationPositive decomposition of transfer functions with multiple poles
Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.
More informationCHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules
CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is
More informationarxiv:cond-mat/ v2 25 Sep 2002
Energy fluctuations at the multicritical oint in two-dimensional sin glasses arxiv:cond-mat/0207694 v2 25 Se 2002 1. Introduction Hidetoshi Nishimori, Cyril Falvo and Yukiyasu Ozeki Deartment of Physics,
More informationOn Code Design for Simultaneous Energy and Information Transfer
On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter
More informationShadow Computing: An Energy-Aware Fault Tolerant Computing Model
Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms
More informationTowards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK
Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)
More informationOptimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging
1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014
More informationImproved Capacity Bounds for the Binary Energy Harvesting Channel
Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,
More informationImproved Bounds on Bell Numbers and on Moments of Sums of Random Variables
Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating
More informationDeveloping A Deterioration Probabilistic Model for Rail Wear
International Journal of Traffic and Transortation Engineering 2012, 1(2): 13-18 DOI: 10.5923/j.ijtte.20120102.02 Develoing A Deterioration Probabilistic Model for Rail Wear Jabbar-Ali Zakeri *, Shahrbanoo
More informationOn the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting
On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,
More informationMULTIVARIATE SHEWHART QUALITY CONTROL FOR STANDARD DEVIATION
MULTIVARIATE SHEWHART QUALITY CONTROL FOR STANDARD DEVIATION M. Jabbari Nooghabi, Deartment of Statistics, Faculty of Mathematical Sciences, Ferdowsi University of Mashhad, Mashhad-Iran. and H. Jabbari
More information8 STOCHASTIC PROCESSES
8 STOCHASTIC PROCESSES The word stochastic is derived from the Greek στoχαστικoς, meaning to aim at a target. Stochastic rocesses involve state which changes in a random way. A Markov rocess is a articular
More informationCharacterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations
Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of
More informationA Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression
Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi
More informationUniversal Finite Memory Coding of Binary Sequences
Deartment of Electrical Engineering Systems Universal Finite Memory Coding of Binary Sequences Thesis submitted towards the degree of Master of Science in Electrical and Electronic Engineering in Tel-Aviv
More informationResearch of PMU Optimal Placement in Power Systems
Proceedings of the 5th WSEAS/IASME Int. Conf. on SYSTEMS THEORY and SCIENTIFIC COMPUTATION, Malta, Setember 15-17, 2005 (38-43) Research of PMU Otimal Placement in Power Systems TIAN-TIAN CAI, QIAN AI
More informationt 0 Xt sup X t p c p inf t 0
SHARP MAXIMAL L -ESTIMATES FOR MARTINGALES RODRIGO BAÑUELOS AND ADAM OSȨKOWSKI ABSTRACT. Let X be a suermartingale starting from 0 which has only nonnegative jums. For each 0 < < we determine the best
More informationEvaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models
Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu
More informationON POLYNOMIAL SELECTION FOR THE GENERAL NUMBER FIELD SIEVE
MATHEMATICS OF COMPUTATIO Volume 75, umber 256, October 26, Pages 237 247 S 25-5718(6)187-9 Article electronically ublished on June 28, 26 O POLYOMIAL SELECTIO FOR THE GEERAL UMBER FIELD SIEVE THORSTE
More informationUniform Law on the Unit Sphere of a Banach Space
Uniform Law on the Unit Shere of a Banach Sace by Bernard Beauzamy Société de Calcul Mathématique SA Faubourg Saint Honoré 75008 Paris France Setember 008 Abstract We investigate the construction of a
More informationarxiv: v1 [cs.sy] 3 Nov 2018
Proceedings of the IX Encontro dos Alunos e Docentes do Deartamento de Engenharia de Comutação Automação At: Caminas 29 e 30 de setembro de 2016, SP Brazi, available in [2016 EADCA-IX]. The Burst Failure
More informationCalculation of MTTF values with Markov Models for Safety Instrumented Systems
7th WEA International Conference on APPLIE COMPUTE CIENCE, Venice, Italy, November -3, 7 3 Calculation of MTTF values with Markov Models for afety Instrumented ystems BÖCÖK J., UGLJEA E., MACHMU. University
More informationMorten Frydenberg Section for Biostatistics Version :Friday, 05 September 2014
Morten Frydenberg Section for Biostatistics Version :Friday, 05 Setember 204 All models are aroximations! The best model does not exist! Comlicated models needs a lot of data. lower your ambitions or get
More informationInformation collection on a graph
Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements
More informationThe non-stochastic multi-armed bandit problem
Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at
More informationEstimation of the large covariance matrix with two-step monotone missing data
Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo
More informationMATH 2710: NOTES FOR ANALYSIS
MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite
More informationVision Graph Construction in Wireless Multimedia Sensor Networks
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Conference and Worksho Paers Comuter Science and Engineering, Deartment of 21 Vision Grah Construction in Wireless Multimedia
More informationLower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data
Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment
More informationFactors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doped Fiber Amplifier
Australian Journal of Basic and Alied Sciences, 5(12): 2010-2020, 2011 ISSN 1991-8178 Factors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doed Fiber Amlifier
More informationarxiv: v3 [physics.data-an] 23 May 2011
Date: October, 8 arxiv:.7v [hysics.data-an] May -values for Model Evaluation F. Beaujean, A. Caldwell, D. Kollár, K. Kröninger Max-Planck-Institut für Physik, München, Germany CERN, Geneva, Switzerland
More informationOn Doob s Maximal Inequality for Brownian Motion
Stochastic Process. Al. Vol. 69, No., 997, (-5) Research Reort No. 337, 995, Det. Theoret. Statist. Aarhus On Doob s Maximal Inequality for Brownian Motion S. E. GRAVERSEN and G. PESKIR If B = (B t ) t
More informationAvailability and Maintainability. Piero Baraldi
Availability and Maintainability 1 Introduction: reliability and availability System tyes Non maintained systems: they cannot be reaired after a failure (a telecommunication satellite, a F1 engine, a vessel
More informationCONVOLVED SUBSAMPLING ESTIMATION WITH APPLICATIONS TO BLOCK BOOTSTRAP
Submitted to the Annals of Statistics arxiv: arxiv:1706.07237 CONVOLVED SUBSAMPLING ESTIMATION WITH APPLICATIONS TO BLOCK BOOTSTRAP By Johannes Tewes, Dimitris N. Politis and Daniel J. Nordman Ruhr-Universität
More informationA Simple Throughput Model for TCP Veno
A Simle Throughut Model for TCP Veno Bin Zhou, Cheng Peng Fu, Dah-Ming Chiu, Chiew Tong Lau, and Lek Heng Ngoh School of Comuter Engineering, Nanyang Technological University, Singaore 639798 Email: {zhou00,
More informationProbabilistic Analysis of a Computer System with Inspection and Priority for Repair Activities of H/W over Replacement of S/W
International Journal of Comuter Alications (975 8887) Volume 44 o. Aril Probabilistic Analysis of a Comuter ystem with Insection and Priority for Reair Activities of /W over Relacement of /W Jyoti Anand
More informationI - Information theory basics
I - Information theor basics Introduction To communicate, that is, to carr information between two oints, we can emlo analog or digital transmission techniques. In digital communications the message is
More informationOn Wald-Type Optimal Stopping for Brownian Motion
J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of
More informationA PROBABILISTIC POWER ESTIMATION METHOD FOR COMBINATIONAL CIRCUITS UNDER REAL GATE DELAY MODEL
A PROBABILISTIC POWER ESTIMATION METHOD FOR COMBINATIONAL CIRCUITS UNDER REAL GATE DELAY MODEL G. Theodoridis, S. Theoharis, D. Soudris*, C. Goutis VLSI Design Lab, Det. of Electrical and Comuter Eng.
More informationSignaled Queueing. Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT. Categories and Subject Descriptors. General Terms. Keywords
Signaled Queueing Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT Burstiness in queues where customers arrive indeendently leads to rush eriods when wait times are long. We roose a simle signaling scheme
More informationUsing the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process
Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process P. Mantalos a1, K. Mattheou b, A. Karagrigoriou b a.deartment of Statistics University of Lund
More information1-way quantum finite automata: strengths, weaknesses and generalizations
1-way quantum finite automata: strengths, weaknesses and generalizations arxiv:quant-h/9802062v3 30 Se 1998 Andris Ambainis UC Berkeley Abstract Rūsiņš Freivalds University of Latvia We study 1-way quantum
More informationOn the capacity of the general trapdoor channel with feedback
On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:
More informationsubstantial literature on emirical likelihood indicating that it is widely viewed as a desirable and natural aroach to statistical inference in a vari
Condence tubes for multile quantile lots via emirical likelihood John H.J. Einmahl Eindhoven University of Technology Ian W. McKeague Florida State University May 7, 998 Abstract The nonarametric emirical
More informationarxiv: v1 [physics.data-an] 26 Oct 2012
Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch
More informationElements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley
Elements of Asymtotic Theory James L. Powell Deartment of Economics University of California, Berkeley Objectives of Asymtotic Theory While exact results are available for, say, the distribution of the
More informationECE 534 Information Theory - Midterm 2
ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You
More informationStatics and dynamics: some elementary concepts
1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and
More informationA Model for Randomly Correlated Deposition
A Model for Randomly Correlated Deosition B. Karadjov and A. Proykova Faculty of Physics, University of Sofia, 5 J. Bourchier Blvd. Sofia-116, Bulgaria ana@hys.uni-sofia.bg Abstract: A simle, discrete,
More informationEstimation of Separable Representations in Psychophysical Experiments
Estimation of Searable Reresentations in Psychohysical Exeriments Michele Bernasconi (mbernasconi@eco.uninsubria.it) Christine Choirat (cchoirat@eco.uninsubria.it) Raffaello Seri (rseri@eco.uninsubria.it)
More informations v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4
Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work
More informationState Estimation with ARMarkov Models
Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,
More informationDecoding Linear Block Codes Using a Priority-First Search: Performance Analysis and Suboptimal Version
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 3, MAY 1998 133 Decoding Linear Block Codes Using a Priority-First Search Performance Analysis Subotimal Version Yunghsiang S. Han, Member, IEEE, Carlos
More informationAnalysis of M/M/n/K Queue with Multiple Priorities
Analysis of M/M/n/K Queue with Multile Priorities Coyright, Sanjay K. Bose For a P-riority system, class P of highest riority Indeendent, Poisson arrival rocesses for each class with i as average arrival
More informationInformation collection on a graph
Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements
More informationFor q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i
Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:
More informationSTART Selected Topics in Assurance
START Selected Toics in Assurance Related Technologies Table of Contents Introduction Statistical Models for Simle Systems (U/Down) and Interretation Markov Models for Simle Systems (U/Down) and Interretation
More informationPaper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation
Paer C Exact Volume Balance Versus Exact Mass Balance in Comositional Reservoir Simulation Submitted to Comutational Geosciences, December 2005. Exact Volume Balance Versus Exact Mass Balance in Comositional
More informationFinite Mixture EFA in Mplus
Finite Mixture EFA in Mlus November 16, 2007 In this document we describe the Mixture EFA model estimated in Mlus. Four tyes of deendent variables are ossible in this model: normally distributed, ordered
More informationProbability Estimates for Multi-class Classification by Pairwise Coupling
Probability Estimates for Multi-class Classification by Pairwise Couling Ting-Fan Wu Chih-Jen Lin Deartment of Comuter Science National Taiwan University Taiei 06, Taiwan Ruby C. Weng Deartment of Statistics
More informationTopic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar
15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider
More informationJohn Weatherwax. Analysis of Parallel Depth First Search Algorithms
Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel
More informationTopic 7: Using identity types
Toic 7: Using identity tyes June 10, 2014 Now we would like to learn how to use identity tyes and how to do some actual mathematics with them. By now we have essentially introduced all inference rules
More informationarxiv: v1 [cond-mat.stat-mech] 1 Dec 2017
Suscetibility Proagation by Using Diagonal Consistency Muneki Yasuda Graduate School of Science Engineering, Yamagata University Kazuyuki Tanaka Graduate School of Information Sciences, Tohoku University
More informationConstruction of High-Girth QC-LDPC Codes
MITSUBISHI ELECTRIC RESEARCH LABORATORIES htt://wwwmerlcom Construction of High-Girth QC-LDPC Codes Yige Wang, Jonathan Yedidia, Stark Draer TR2008-061 Setember 2008 Abstract We describe a hill-climbing
More informationdn i where we have used the Gibbs equation for the Gibbs energy and the definition of chemical potential
Chem 467 Sulement to Lectures 33 Phase Equilibrium Chemical Potential Revisited We introduced the chemical otential as the conjugate variable to amount. Briefly reviewing, the total Gibbs energy of a system
More informationVehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications
Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Bartłomiej Błaszczyszyn Paul Muhlethaler Nadjib Achir INRIA/ENS INRIA Rocquencourt INRIA Rocquencourt
More informationEfficient Approximations for Call Admission Control Performance Evaluations in Multi-Service Networks
Efficient Aroximations for Call Admission Control Performance Evaluations in Multi-Service Networks Emre A. Yavuz, and Victor C. M. Leung Deartment of Electrical and Comuter Engineering The University
More informationSession 5: Review of Classical Astrodynamics
Session 5: Review of Classical Astrodynamics In revious lectures we described in detail the rocess to find the otimal secific imulse for a articular situation. Among the mission requirements that serve
More informationSlash Distributions and Applications
CHAPTER 2 Slash Distributions and Alications 2.1 Introduction The concet of slash distributions was introduced by Kafadar (1988) as a heavy tailed alternative to the normal distribution. Further literature
More informationQuantitative estimates of propagation of chaos for stochastic systems with W 1, kernels
oname manuscrit o. will be inserted by the editor) Quantitative estimates of roagation of chaos for stochastic systems with W, kernels Pierre-Emmanuel Jabin Zhenfu Wang Received: date / Acceted: date Abstract
More informationAn Investigation on the Numerical Ill-conditioning of Hybrid State Estimators
An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical
More informationBayesian Spatially Varying Coefficient Models in the Presence of Collinearity
Bayesian Satially Varying Coefficient Models in the Presence of Collinearity David C. Wheeler 1, Catherine A. Calder 1 he Ohio State University 1 Abstract he belief that relationshis between exlanatory
More informationAnytime communication over the Gilbert-Eliot channel with noiseless feedback
Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anant Sahai, Salman Avestimehr, Paolo Minero Deartment of Electrical Engineering and Comuter Sciences University of California
More informationRANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES
RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete
More informationAdaptive estimation with change detection for streaming data
Adative estimation with change detection for streaming data A thesis resented for the degree of Doctor of Philosohy of the University of London and the Diloma of Imerial College by Dean Adam Bodenham Deartment
More informationPreconditioning techniques for Newton s method for the incompressible Navier Stokes equations
Preconditioning techniques for Newton s method for the incomressible Navier Stokes equations H. C. ELMAN 1, D. LOGHIN 2 and A. J. WATHEN 3 1 Deartment of Comuter Science, University of Maryland, College
More informationElementary Analysis in Q p
Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some
More informationCERIAS Tech Report The period of the Bell numbers modulo a prime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education
CERIAS Tech Reort 2010-01 The eriod of the Bell numbers modulo a rime by Peter Montgomery, Sangil Nahm, Samuel Wagstaff Jr Center for Education and Research Information Assurance and Security Purdue University,
More informationStatistical Multiplexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version)
1 Statistical Multilexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version) Technical Reort: University of Virginia, CS-99-23, July 1999 Robert Boorstyn Almut Burchard Jörg Liebeherr y
More informationTemperature, current and doping dependence of non-ideality factor for pnp and npn punch-through structures
Indian Journal of Pure & Alied Physics Vol. 44, December 2006,. 953-958 Temerature, current and doing deendence of non-ideality factor for n and nn unch-through structures Khurshed Ahmad Shah & S S Islam
More informationA Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition
A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino
More informationDecoding First-Spike Latency: A Likelihood Approach. Rick L. Jenison
eurocomuting 38-40 (00) 39-48 Decoding First-Sike Latency: A Likelihood Aroach Rick L. Jenison Deartment of Psychology University of Wisconsin Madison WI 53706 enison@wavelet.sych.wisc.edu ABSTRACT First-sike
More informationAn Analysis of Reliable Classifiers through ROC Isometrics
An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit
More informationNotes on Instrumental Variables Methods
Notes on Instrumental Variables Methods Michele Pellizzari IGIER-Bocconi, IZA and frdb 1 The Instrumental Variable Estimator Instrumental variable estimation is the classical solution to the roblem of
More information1 Probability Spaces and Random Variables
1 Probability Saces and Random Variables 1.1 Probability saces Ω: samle sace consisting of elementary events (or samle oints). F : the set of events P: robability 1.2 Kolmogorov s axioms Definition 1.2.1
More informationStatistics II Logistic Regression. So far... Two-way repeated measures ANOVA: an example. RM-ANOVA example: the data after log transform
Statistics II Logistic Regression Çağrı Çöltekin Exam date & time: June 21, 10:00 13:00 (The same day/time lanned at the beginning of the semester) University of Groningen, Det of Information Science May
More informationOptimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging
Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie Wireless Intelligent Networks Center WINC, Nile University,
More informationAmin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE)
KAUST Reository Outage erformance of cognitive radio systems with Imroer Gaussian signaling Item tye Authors Erint version DOI Publisher Journal Rights Conference Paer Amin Osama; Abediseid Walid; Alouini
More information