Optimal Power Control for Multiple Access Channel

Size: px
Start display at page:

Download "Optimal Power Control for Multiple Access Channel"

Transcription

1 2005 International Conference on Wireless Networks, Counications and Mobile Coputing Optial Power Control for Multiple Access Channel with Peak and Average Power Constraints RongRong Chen and Yanzhu Lin Departent of Electrical and Coputer Engineering University of Utah {rchen, yanzhu Abstract In this paper, we study optial power control for ultiple access channel with peak and average power constraints. Perfect channel inforation is assued to be available at both the transitter and the receiver. We characterize the structures of the optial power control policy and show that the optial policy allows ultiple users to transit at peak power and at ost one user to transit at an interediate power level. This is different fro the optial TDMA policy (at ost one user is allowed to transit at any given tie) for the case of average power constraint only. We find closedfor expressions for coputing the optial power control policy and the axial su capacity. Nuerical results indicate that under the peak power constraint, the optial power control policy still achieves very close to the su capacity of the ultiple access channel with average power constraint only. I. INTRODUCTION Due to the tievarying nature of wireless channels, it is shown in [] that for a single user syste, when the channel inforation is available at both the transitter and the receiver, the wireless user should exploit tiediversity to adapt transission power according to the channel state and transit at higher rates when the channel is good. In a ultiuser syste, optial power control policies ([2], [3]) are developed to exploit both ultiuser diversity and tiediversity with the goal of axiizing the su capacity of ultiuser networks. For an uplink cellular syste, [2] shows that tie division ultiple access (TDMA) schees axiize the su capacity. The optial power control policy depends on the channel conditions of all users and it has a structure that, at any given tie, only one user with the best channel condition transits. However, since each user transits only when his channel is the best aong all users, the aount of tie that each user occupies the channel decreases as the nuber of users increases. Under the average power constraint, this iplies that each user would transit at a higher power level when it is his turn to transit. Consequently, as the syste size grows, each users' signal transission becoes increasingly bursty and large peaktoaverage power ratios occur (ore details are included in Section III). In this work, we study optial power control under both peak and average power constraint. The peak power constraint is independent of the nuber of users in the syste, therefore in our syste we have a fixed peak to average power ratio. We characterize the structures of the optial power control policy and provide closefor expressions for coputing the optial su capacity. Under the peak power constraint, we show that the optial policy is no longer a TDMA policy. Instead, it allows ultiple users to transit siultaneously, possibly all with the peak power. Our results show that the peak power constraint does not ipose uch capacity penalties against the case of average power constraint only. In addition, the nuber of siultaneous transissions can be kept sall. In other related work, optial power control with peak power constraint is studied in [4] for a single user syste. In this work, we consider a ultiuser syste. Optial power control for ultiple antenna channels are studied in [5] under the average power constraint. II. UPLIN OPTIMAL POWER CONTROL Consider an uplink cellular network with users. Let yi, i =,., be the channel gain between user i and the base station. Under Rayleigh fading, we assue that Aj_ has a Rayleigh distribution and yi has an exponential distribution with paraeter. Let y = (yr,, ) denote the channel gain vector of all users and ui(y) be the power allocation to user i when the channel gain vector is y. Under the power control policy ui(y), the received signal at the base station can be written as () y= xi+n, i=l where xi is the transitted signal fro user i which satisfies E(xi 2) =, n is white Gaussian noise with zero ean and unit variance. For a fixed y, equation () represents a Gaussian ultiple access channel with a su capacity of 2 log ( + Z= ui(y)'yi) [6]. Assue that channel fading inforation is available at both the transitter and the receiver, we can average over all possible fading realizations to obtain 'E [log ( + Ui(_Y)Yi) as the su capacity for the fading case. Our objective is to find the optial power control policy ui(y),i = to axiize the su capacity under both peak and average power constraints. Let p(y) be the probability density function of y. We forulate the following optiization proble. ax ff... f " log (I + E Ui(_Y)i) p(y)d 'y (2) subjectto ff...fui(y)p(y)dy<i, i= (3) and Ui)< P, i =,. (4) Note that we consider both the average power constraint (3) and the peak power constraint (4), while in [], [2], [3] only the average power constraint is considered /05$ IEEE 407

2 A. Structures of the optial power control policy In order to characterize the structures of the optial power control policy, we first introduce the Lagrange ultipliers, Ai, corresponding to each average power constraint in (3). The Lagrangian function is expressed as L(ui, {>i})= Jf... log ( + )ui(y)i p(7)d y (AiJ...f u i(y)p(y)d ). (5) Due to the convexity of the logarith, the arushuhntucker (T) conditions [7] are necessary and sufficient for optiality. Taking the derivative with respect to ui, we obtain a set of T conditions for every i =,.., and y. 7i > + S uj(q)4yj if 'uiqy) = P (6) Ai Ai X = u5(ay)'yj if O<ui(y)<P (7) ~~J= A < luj(7)'yj if uj(7)=0 (8) Since the suation ters in (6)(8) are the sae for all i.=..,, we ake the following observation: () If s'> aq then we ust have ui (y) >.uiq) (2) At ost one user can be allocated an interediate power level 0 < ui(y) < P. This is true because the probability that the left hand side of (7) is the sae for two different users equals 0. Hence, when there is no peak power constraint (or P = oo), the optial power control policy reduces to the TDMA policy in [2]. (3) Let us reorder the sequence {yi/ai, i =, } such that JXl > JYi2 >X >X A2 Ai It then follows fro () and (2) that, the optial power control policy satisfies the following properties: (a) there exists an integer N (which depends on y) such that the best N users il, in are allocated full power P. (b) User in+ either uses an interediate power level or is inactive (zero power allocation). (c) Users in+2,,i are all inactive. Next, we will show how to deterine the value of N and the optial power allocation for user in+. For notation siplicity, we assue that 7 > MY >,,* A A2 A For every i =,, let ai =iand bi = +P Yj Note that bi equals the suation ter + = uj ('y)yj in (6)(8) if the first i users are allocated peak power and the reaining users are inactive. Since {ai} is an nonincreasing sequence and bi is a nondecreasing sequence, we can find an integer N such that an. bn and an+i < bn+±i There are two cases shown in Figure, in which we let N = 4 as an exaple. 40E avl bli a2q a30 a40 N = 4 b5 y a5 (case ) b4l U5 b2t b3_ P'f4 a5 (case 2).iP'Y3 I Fig.. Optial power control policy with peak power constraint. Case Assue bn < an+ < bn+. In this case, user N + should not be allocated peak power P. Otherwise the T condition (6) will be violated. Since an+ > bn, we can allocate an interediate power level to user N + to ensure that the equality in the T condition (7) holds. The optial power allocation becoes UiX, Qy) = FP, an+bn 0 YN+ if i < N if i = N+ else. Using this power allocation, one can see that the suation ter in (6)(8) equals an+l. Due to the onotone property of the sequence {ai}, the T conditions are clearly satisfied for power control policies of the for (9). Case 2 Assue an+ < bn. In this case, user N + is inactive. The optial power allocation becoes ui(\ =P, if i < N 0 else. (9) (0) The corresponding suation ter in (6)(8) equals bn which also ensures that the T conditions are satisfied. As seen fro (9) and (0), we note a useful fact that the optial power allocation for user i only depends on (y, *, y). B. Coputation of the optial Lagrange ultiplier Given the structures of the optial power control policy (9) and (0), the optial Lagrange ultiplier can be found by choosing {Ai} such that the average power constraint (3) is satisfied for each user i. This, however, involves the evaluation of diensional integrals. In the following, we consider the scenario when the average power constraint Pi = Pa is the sae for all users. By syetry, all Ai ust be equal and we denote the coon value by A. In order to find A that satisfies (3), we need to siplify (3) as uch as possible and reduce the diension of integration.

3 Let {.} denote the indicator function. Since the users are syetric, we have E[ui(y)] = E [Ui(Y)l{user i has the th best channel}] g=i ( ) = E E [EUY)l{user has the th best channel}] = The case when rn = needs to be handled separately. For every rn > 2, we have E [Ur(7){user has the th best channel}]. = (_2) J[j(j...n() Yee(i )'d>dax(y+l.yl <li.. ). = () j [ju/n(i,) i)ea O ' Inorrto c ute(et=ei+ )dry+l(2d) eonsideyr () ~ ~ ~ ~ (2 f U('i = w us hae a.ba) therer d,y,.. daj (e' )fe7 dy. (2) In order to copute the integral in (2), we consider two cases with ub(yi...y) = P or O < ub (y... y) < P. (I) If Zu.(y y) =,we ust have a. > b. and therefore Y E Yi < A vy (3) (2) If 0 < u("ii,,y) < F, then we have b_i < a < b and therefore 2 Y A Y <.Y7j < A (4) It follows fro (9) that the optial power allocation is E (_) [ ~~~~A A,(7) gi (X) = x2ex/( 2)!. The integral in (6) can be siplified as Joe [J ry( d) I g, (x) dx JO ] f,a(y, + X) 9 (X) dx q (,Y) dy (7) where q(y) [exp(y)] [exp(yx)] f,a,(y,x) = /A[+P(x+ (l)"y)]/y r,a(}y) = niax(,(/a)/py) The forula for coputing A is therefore given by Pa = P]q/)d'j + IA i( ) d(y c F, + Z: (MD I ' i(x) dx + fi,,(a, x) 9 (X) dx qq(ry)ddy, (8) where the first two ters correspond to =. C. Coputation of the optial su capacity Once the optial A is found by solving (8), the optial power control policy is uniquely deterined. In this section, we derive analytical expressions for coputing the optial su capacity. Let c(qy) = + Z Uj(y)yj, we have Copt = E[og c(y)] u (t,,'y) = Z3'. (5) (Note that if we let n =, the optial power allocation (5) reduces to the optial waterfilling power control policy in [2] with only average power constraint.) Hence, the integral in (2) equals 00 [jx>.jo ( {. r<f{ A 'n ()( Y in { 2L "Y._ Y3. _ p }J I= *e = dy * d7 ( e7)eedy (6) Let'ai= 3' j =,* * *,and x = Ej ai. Then = 2 L.E 0'(c(')) l there are exactly active users = ) E 2 Ilog(c(7)) { active users. user has th best channel}] = 2 () E [og(c()) active users} 2 S r= lfin(y....y.j)>,ax(y.+j.....y )<Y }] = 2 5 (D) E09(C(7) factive users} = the probability density function of x has a gaa distribution We again consider two cases. 409 l{in(y,...,y) >'yrn,ax(y+i,.,r ). Y } ({U()=P} + {O<U (Y) <P})] (9)

4 () Assue urn (y) = P. To ensure that there are exactly active users, we require that a, > b > a+,. Hence, the following conditions ust be satisfied: su capacity can be written as copt= [j /sl(yl,o) d'7 + j ' l(y )log (i) d,l 7Y+ < A (I+ P Z½ ) z>yj A I < A _p c(?) = b = li + PEZY (20) (2) Note that (2) and (20) iply that y+ <' It follows that the integral ter in (9) that involves {U ()=} equals oo roo OC ro A((I +E') Z=P E a y ~~e j=+ r77?)dy+l ***dw *e(z='yj)d7yl... dy i] ey d7y *(e A (+e P ) (r) e ( Jyjd) dyj dryj ed7t (23) (2) Assue 0 < un(7) < P. We have bi < a < bn which guarantees that there are exactly active users. Hence, we ust have Ey A p _ X _ E l i< A, P tyr c(y) = a = AA (22) where o At + E_ () s[(fyf xg (x) dx dy +fo g (ii\) IT )r9y) ( dx qqty)dayrn] (27) S (Q, ) = log ( + P(Ty + x)) * (e Y) * [ ea\(p(mry+2))]. and the first two ters in (27) correspond to =. III. NUMERICAL RESULTS In this section, we present nuerical results based on the closefor expressions derived in Section II. First, we study the case with only average power constraint to establish our perforance benchark. We assue an average transission power of P, = 0 such that the received signaltonoise power ratio 0 logo Pa equals 0 db. Given a total of users in the syste, the optial power control policy (average power constraint only) allows a axiu transission power Pax() = /A. As shown in Figure 2, the axiu to average power ratio Pax() /Pa increases linearly with respect to due to the fact that as increases, the aount of tie each user transits decreases. When = 6, we have Pax/Pa = 6.03 and the optial su capacity equals bits a 4 X 2 8[ (28) It follows that the integral {o<u(y)<p} equals ter in (9) that involves : nuber of users log i [ Ja ( > ) E { A l ' < I Yj < e e( 3= Yjd7j... d'yrn] ( e e) ne dy (26) Finally, we use the transforation yj = y and x = 2inI y* to arrive at a Gaa distribution and hence reduce the diensions of the integral. After siplifications, the optial Fig. 2. Maxiu to average power ratio versus the total nuber of users in a syste with average power constraint only. Next, we exaine the su capacity under both peak and average power constraints. Copared to the average power constraint only scenario where the axiu transission power Pax() increases linearly with, here we require that at any tie each users' transission power is no ore than P, which is independent of. In Figure 3, we plot the optial su capacity as a function of the peaktoaverage power ratio 0

5 P/Pa For each P/Pa, we first solve (8) nuerically to find the Lagrange ultiplier A. Then we apply (27) to copute the su capacity corresponding to the optial power control policy given by A. Figure 3 shows that as P increases, the su capacity also increases. When P/Pa = 6, the capacity with peak power constraint equals the capacity with average power constraint only ( bits). When P/Pa = 8, the su capacity with peak power constraint attains about / = 97.82% of the su capacity with average power constraint only. Note that by iposing the peak power constraint, we reduce the axiu to average power ratio fro Pax(6)/Pa 6 to P/Pa, = 8, which is a 3 db reduction, with only a 2% loss in su capacity. When P/Pa = 2, which corresponds to a 9 db reduction fro Prax(6)/Pa 6, the su capacity achieved is about 89.3% of the su capacity with average power constraint only. However, as shown in Figure 4, in this case we would require any users to transit siultaneously with large probabilities. 4.5 there is only one active user, hence the resulting optial power control policy is alost TDMA as in the case of average power constraint only. C,) L a) cz co Cu 0 a. Fig [ 0.5[ P/Pa Probability distribution of the nuber of active users *2 *3 *8 * * X 0 7 X* 6 *, 2 * a Ca 0. iu 4 E cx P/Pa Fig. 3. Optial su capacity versus peak to average power ratio. In Figure 4, we study the probability distribution of the nuber of active users under the peak power constraint. Let denote the nuber of active users. Given P, the probability that there are exactly active users can be coputed by evaluating the integral ters in (27) that correspond to active users, and replacing sy(,x) and log () by. In Figure 4, ultiple points are plotted for each P/Pa. The nuber to the right of each point represents, the nuber of active users. The ycoordinate of each point represents the probability that there are exactly active users. The highest point for a given P/Pa represents the ost likely (with the largest probability) nuber of active users. For instance, three points are plotted for P/Pa = 8. Fro top to botto, we see that with probabilities of 0.6, 0.36, and 0.03, there are two, three, and one active users, respectively. The probability that there is no active user is close to 0, hence not shown in the figure. We also observe that when P/Pa is sall, it is likely to have a large nuber of active users. For instance, when P/Pa = 2, with a probability of 0.3, there are 8 active users. However, as P/P,a increases, the nuber of active users reduces. When P/Pa = 8, active users. When P/Pa = 6, there are at ost three with a probability of IV. CONCLUSION In this paper, we study optial power control for ultiple access channel with peak and average power constraints. We obtain a coplete characterization of the optial power control policy which generalizes previous results on the optiality of TDMA type policies for ultiple access channels with only average power constraint. Analytical expressions are derived for coputing the optial policy, the optial su capacity, and the probability distribution of the nuber of active users, assuing that users in the network are syetric. By allowing ore than one user to transit at a given tie, the proposed power control policies under the peak power constraint have the advantage of reducing the axiu to average power ratio and shortening the transission delay due to opportunistic scheduling in the ultiuser network. In addition, the su capacity achieved by the proposed policies are close to that achieved with only the average power constraint. REFERENCES [] A. Goldsith and P. Varaiya, "Capacity of fading channel with channel side inforation," IEEE Trans. InJorn. Theory, vol. 43, pp , Nov [2] R. nopp and P. A. Hublet, "Inforation capacity and power control in singlecell ultiuser counications," IEEE Inter Conf: Connln. (ICC), vol., pp , Jun [3] D. Tse and S. Hanly, "Multiaccess fading channels: part I: Polyatroid structure, optial resource allocation and throughput capacities," IEEE Tranis. InJbrin. Theory, vol. 44, pp , Nov [4] M. A. hojastepour and B. Aazhang, "The capacity of average and peak power constrainted fading channels with channel side inforation," IEEE Wireless Cotnitnnications and Networking Conference (WCNC), vol., pp. 7782, Mar [5] W. Yu, W. Rhee, and J. M. Cioffi, "Optial power control in ultiple access fading channels with ultiple antennas," IEEE Inter ConfJ Cotninn. (ICC), vol. 2, pp , Jun [6] J. M. Cover and J. A. Thoas, Eleents of Inforination Theort. New York, Wiley and Sons, 99. [7] D. P. Bertsekas, Nonlinear Prograning. Belont, Massachusetts: Athena Scientific, 995.

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

Optimal Jamming Over Additive Noise: Vector Source-Channel Case

Optimal Jamming Over Additive Noise: Vector Source-Channel Case Fifty-first Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 2-3, 2013 Optial Jaing Over Additive Noise: Vector Source-Channel Case Erah Akyol and Kenneth Rose Abstract This paper

More information

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks 1 Optial Resource Allocation in Multicast Device-to-Device Counications Underlaying LTE Networks Hadi Meshgi 1, Dongei Zhao 1 and Rong Zheng 2 1 Departent of Electrical and Coputer Engineering, McMaster

More information

On the Design of MIMO-NOMA Downlink and Uplink Transmission

On the Design of MIMO-NOMA Downlink and Uplink Transmission On the Design of MIMO-NOMA Downlink and Uplink Transission Zhiguo Ding, Meber, IEEE, Robert Schober, Fellow, IEEE, and H. Vincent Poor, Fellow, IEEE Abstract In this paper, a novel MIMO-NOMA fraework for

More information

Minimum Rates Scheduling for MIMO OFDM Broadcast Channels

Minimum Rates Scheduling for MIMO OFDM Broadcast Channels IEEE Ninth International Syposiu on Spread Spectru Techniques and Applications Miniu Rates Scheduling for MIMO OFDM Broadcast Channels Gerhard Wunder and Thoas Michel Fraunhofer Geran-Sino Mobile Counications

More information

Rateless Codes for MIMO Channels

Rateless Codes for MIMO Channels Rateless Codes for MIMO Channels Marya Modir Shanechi Dept EECS, MIT Cabridge, MA Eail: shanechi@itedu Uri Erez Tel Aviv University Raat Aviv, Israel Eail: uri@engtauacil Gregory W Wornell Dept EECS, MIT

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

a a a a a a a m a b a b

a a a a a a a m a b a b Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

Kernel Methods and Support Vector Machines

Kernel Methods and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic

More information

Introduction to Discrete Optimization

Introduction to Discrete Optimization Prof. Friedrich Eisenbrand Martin Nieeier Due Date: March 9 9 Discussions: March 9 Introduction to Discrete Optiization Spring 9 s Exercise Consider a school district with I neighborhoods J schools and

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels

Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels ISIT7, Nice, France, June 4 June 9, 7 Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels Ahed A. Farid and Steve Hranilovic Dept. Electrical and Coputer Engineering McMaster

More information

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings Ipact of Iperfect Channel State Inforation on ARQ

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Antenna Saturation Effects on MIMO Capacity

Antenna Saturation Effects on MIMO Capacity Antenna Saturation Effects on MIMO Capacity T S Pollock, T D Abhayapala, and R A Kennedy National ICT Australia Research School of Inforation Sciences and Engineering The Australian National University,

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

Final Exam Practice: Part II Math MULTIPLE CHOICE Choose the one alternative that best completes the statement or answers the question.

Final Exam Practice: Part II Math MULTIPLE CHOICE Choose the one alternative that best completes the statement or answers the question. MULTIPLE CHOICE Choose the one alternative that best copletes the stateent or answers the question. 1) Solve for y: y y 0 D) 4 9 ) Solve for : 0, 0 D) ) To Quig traveled 80 iles east of St. Louis. For

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

Principles of Optimal Control Spring 2008

Principles of Optimal Control Spring 2008 MIT OpenCourseWare http://ocw.it.edu 16.323 Principles of Optial Control Spring 2008 For inforation about citing these aterials or our Ters of Use, visit: http://ocw.it.edu/ters. 16.323 Lecture 10 Singular

More information

Homework 3 Solutions CSE 101 Summer 2017

Homework 3 Solutions CSE 101 Summer 2017 Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing

More information

Sparse beamforming in peer-to-peer relay networks Yunshan Hou a, Zhijuan Qi b, Jianhua Chenc

Sparse beamforming in peer-to-peer relay networks Yunshan Hou a, Zhijuan Qi b, Jianhua Chenc 3rd International Conference on Machinery, Materials and Inforation echnology Applications (ICMMIA 015) Sparse beaforing in peer-to-peer relay networs Yunshan ou a, Zhijuan Qi b, Jianhua Chenc College

More information

Principal Components Analysis

Principal Components Analysis Principal Coponents Analysis Cheng Li, Bingyu Wang Noveber 3, 204 What s PCA Principal coponent analysis (PCA) is a statistical procedure that uses an orthogonal transforation to convert a set of observations

More information

Support Vector Machines MIT Course Notes Cynthia Rudin

Support Vector Machines MIT Course Notes Cynthia Rudin Support Vector Machines MIT 5.097 Course Notes Cynthia Rudin Credit: Ng, Hastie, Tibshirani, Friedan Thanks: Şeyda Ertekin Let s start with soe intuition about argins. The argin of an exaple x i = distance

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

Support Vector Machines. Maximizing the Margin

Support Vector Machines. Maximizing the Margin Support Vector Machines Support vector achines (SVMs) learn a hypothesis: h(x) = b + Σ i= y i α i k(x, x i ) (x, y ),..., (x, y ) are the training exs., y i {, } b is the bias weight. α,..., α are the

More information

Secret-Key Sharing Based on Layered Broadcast Coding over Fading Channels

Secret-Key Sharing Based on Layered Broadcast Coding over Fading Channels Secret-Key Sharing Based on Layered Broadcast Coding over Fading Channels Xiaojun Tang WINLAB, Rutgers University Ruoheng Liu Princeton University Predrag Spasojević WINLAB, Rutgers University H. Vincent

More information

Ocean 420 Physical Processes in the Ocean Project 1: Hydrostatic Balance, Advection and Diffusion Answers

Ocean 420 Physical Processes in the Ocean Project 1: Hydrostatic Balance, Advection and Diffusion Answers Ocean 40 Physical Processes in the Ocean Project 1: Hydrostatic Balance, Advection and Diffusion Answers 1. Hydrostatic Balance a) Set all of the levels on one of the coluns to the lowest possible density.

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE Proceeding of the ASME 9 International Manufacturing Science and Engineering Conference MSEC9 October 4-7, 9, West Lafayette, Indiana, USA MSEC9-8466 MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL

More information

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,

More information

Error Exponents in Asynchronous Communication

Error Exponents in Asynchronous Communication IEEE International Syposiu on Inforation Theory Proceedings Error Exponents in Asynchronous Counication Da Wang EECS Dept., MIT Cabridge, MA, USA Eail: dawang@it.edu Venkat Chandar Lincoln Laboratory,

More information

A Note on the Applied Use of MDL Approximations

A Note on the Applied Use of MDL Approximations A Note on the Applied Use of MDL Approxiations Daniel J. Navarro Departent of Psychology Ohio State University Abstract An applied proble is discussed in which two nested psychological odels of retention

More information

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

Distributed Power Control in Full Duplex Wireless Networks

Distributed Power Control in Full Duplex Wireless Networks Distributed Power Control in Full Duplex Wireless Networks Yu Wang and Shiwen Mao Departent of Electrical and Coputer Engineering, Auburn University, Auburn, AL 36849-5201 Eail: yzw0049@tigerail.auburn.edu,

More information

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians Using EM To Estiate A Probablity Density With A Mixture Of Gaussians Aaron A. D Souza adsouza@usc.edu Introduction The proble we are trying to address in this note is siple. Given a set of data points

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

4920 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 12, DECEMBER 2015

4920 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 12, DECEMBER 2015 4920 IEEE TRASACTIOS O COMMUICATIOS, VOL. 63, O. 12, DECEMBER 2015 Energy Efficient Coordinated Beaforing for Multicell Syste: Duality-Based Algorith Design and Massive MIMO Transition Shiwen He, Meber,

More information

Scheduling Contract Algorithms on Multiple Processors

Scheduling Contract Algorithms on Multiple Processors Fro: AAAI Technical Report FS-0-04. Copilation copyright 200, AAAI (www.aaai.org). All rights reserved. Scheduling Contract Algoriths on Multiple Processors Daniel S. Bernstein, Theodore. Perkins, Shloo

More information

Birthday Paradox Calculations and Approximation

Birthday Paradox Calculations and Approximation Birthday Paradox Calculations and Approxiation Joshua E. Hill InfoGard Laboratories -March- v. Birthday Proble In the birthday proble, we have a group of n randoly selected people. If we assue that birthdays

More information

System Performance of Interference Alignment under TDD Mode with Limited Backhaul Capacity

System Performance of Interference Alignment under TDD Mode with Limited Backhaul Capacity Syste Perforance of Interference Alignent under TDD Mode with Liited Bachaul Capacity Matha Deghel, Mohaad Assaad and Mérouane Debbah Departent of Telecounications SUPELEC, Gif-sur-Yvette, France Matheatical

More information

Detection and Estimation Theory

Detection and Estimation Theory ESE 54 Detection and Estiation Theory Joseph A. O Sullivan Sauel C. Sachs Professor Electronic Systes and Signals Research Laboratory Electrical and Systes Engineering Washington University 11 Urbauer

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

1 Bounding the Margin

1 Bounding the Margin COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #12 Scribe: Jian Min Si March 14, 2013 1 Bounding the Margin We are continuing the proof of a bound on the generalization error of AdaBoost

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Efficient Filter Banks And Interpolators

Efficient Filter Banks And Interpolators Efficient Filter Banks And Interpolators A. G. DEMPSTER AND N. P. MURPHY Departent of Electronic Systes University of Westinster 115 New Cavendish St, London W1M 8JS United Kingdo Abstract: - Graphical

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

A remark on a success rate model for DPA and CPA

A remark on a success rate model for DPA and CPA A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance

More information

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels TO APPEAR IEEE INTERNATIONAL CONFERENCE ON COUNICATIONS, JUNE 004 1 Dirty Paper Coding vs. TDA for IO Broadcast Channels Nihar Jindal & Andrea Goldsmith Dept. of Electrical Engineering, Stanford University

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

Content-Type Coding. arxiv: v2 [cs.it] 3 Jun Linqi Song UCLA

Content-Type Coding. arxiv: v2 [cs.it] 3 Jun Linqi Song UCLA Content-Type Coding Linqi Song UCLA Eail: songlinqi@ucla.edu Christina Fragouli UCLA and EPFL Eail: christina.fragouli@ucla.edu arxiv:1505.03561v [cs.it] 3 Jun 015 Abstract This paper is otivated by the

More information

Page 1 Lab 1 Elementary Matrix and Linear Algebra Spring 2011

Page 1 Lab 1 Elementary Matrix and Linear Algebra Spring 2011 Page Lab Eleentary Matri and Linear Algebra Spring 0 Nae Due /03/0 Score /5 Probles through 4 are each worth 4 points.. Go to the Linear Algebra oolkit site ransforing a atri to reduced row echelon for

More information

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models 2014 IEEE International Syposiu on Inforation Theory Copression and Predictive Distributions for Large Alphabet i.i.d and Markov odels Xiao Yang Departent of Statistics Yale University New Haven, CT, 06511

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information

The Methods of Solution for Constrained Nonlinear Programming

The Methods of Solution for Constrained Nonlinear Programming Research Inventy: International Journal Of Engineering And Science Vol.4, Issue 3(March 2014), PP 01-06 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.co The Methods of Solution for Constrained

More information

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat

More information

Biostatistics Department Technical Report

Biostatistics Department Technical Report Biostatistics Departent Technical Report BST006-00 Estiation of Prevalence by Pool Screening With Equal Sized Pools and a egative Binoial Sapling Model Charles R. Katholi, Ph.D. Eeritus Professor Departent

More information

Egyptian Mathematics Problem Set

Egyptian Mathematics Problem Set (Send corrections to cbruni@uwaterloo.ca) Egyptian Matheatics Proble Set (i) Use the Egyptian area of a circle A = (8d/9) 2 to copute the areas of the following circles with given diaeter. d = 2. d = 3

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

Uplink Transmission Design with Massive Machine Type Devices in Tactile Internet

Uplink Transmission Design with Massive Machine Type Devices in Tactile Internet Uplink Transission Design wi Massive Machine Type Devices in Tactile Internet Changyang She and Chenyang Yang School of Electronics and Inforation Engineering, Beihang University, Beijing, China Eail:

More information

Randomized Accuracy-Aware Program Transformations For Efficient Approximate Computations

Randomized Accuracy-Aware Program Transformations For Efficient Approximate Computations Randoized Accuracy-Aware Progra Transforations For Efficient Approxiate Coputations Zeyuan Allen Zhu Sasa Misailovic Jonathan A. Kelner Martin Rinard MIT CSAIL zeyuan@csail.it.edu isailo@it.edu kelner@it.edu

More information

OBJECTIVES INTRODUCTION

OBJECTIVES INTRODUCTION M7 Chapter 3 Section 1 OBJECTIVES Suarize data using easures of central tendency, such as the ean, edian, ode, and idrange. Describe data using the easures of variation, such as the range, variance, and

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

Matrix Inversion-Less Signal Detection Using SOR Method for Uplink Large-Scale MIMO Systems

Matrix Inversion-Less Signal Detection Using SOR Method for Uplink Large-Scale MIMO Systems Matrix Inversion-Less Signal Detection Using SOR Method for Uplin Large-Scale MIMO Systes Xinyu Gao, Linglong Dai, Yuting Hu, Zhongxu Wang, and Zhaocheng Wang Tsinghua National Laboratory for Inforation

More information

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co

More information

INTELLECTUAL DATA ANALYSIS IN AIRCRAFT DESIGN

INTELLECTUAL DATA ANALYSIS IN AIRCRAFT DESIGN INTELLECTUAL DATA ANALYSIS IN AIRCRAFT DESIGN V.A. Koarov 1, S.A. Piyavskiy 2 1 Saara National Research University, Saara, Russia 2 Saara State Architectural University, Saara, Russia Abstract. This article

More information

Energy Efficient Predictive Resource Allocation for VoD and Real-time Services

Energy Efficient Predictive Resource Allocation for VoD and Real-time Services Energy Efficient Predictive Resource Allocation for VoD and Real-tie Services Changyang She and Chenyang Yang 1 arxiv:1707.01673v1 [cs.it] 6 Jul 2017 Abstract This paper studies how to exploit the predicted

More information

When Short Runs Beat Long Runs

When Short Runs Beat Long Runs When Short Runs Beat Long Runs Sean Luke George Mason University http://www.cs.gu.edu/ sean/ Abstract What will yield the best results: doing one run n generations long or doing runs n/ generations long

More information

Spine Fin Efficiency A Three Sided Pyramidal Fin of Equilateral Triangular Cross-Sectional Area

Spine Fin Efficiency A Three Sided Pyramidal Fin of Equilateral Triangular Cross-Sectional Area Proceedings of the 006 WSEAS/IASME International Conference on Heat and Mass Transfer, Miai, Florida, USA, January 18-0, 006 (pp13-18) Spine Fin Efficiency A Three Sided Pyraidal Fin of Equilateral Triangular

More information

Ch 12: Variations on Backpropagation

Ch 12: Variations on Backpropagation Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith

More information

Topic 5a Introduction to Curve Fitting & Linear Regression

Topic 5a Introduction to Curve Fitting & Linear Regression /7/08 Course Instructor Dr. Rayond C. Rup Oice: A 337 Phone: (95) 747 6958 E ail: rcrup@utep.edu opic 5a Introduction to Curve Fitting & Linear Regression EE 4386/530 Coputational ethods in EE Outline

More information

Finite Horizon Throughput Maximization and Sensing Optimization in Wireless Powered Devices over Fading Channels

Finite Horizon Throughput Maximization and Sensing Optimization in Wireless Powered Devices over Fading Channels Finite Horizon Throughput Maxiization and Sensing Optiization in Wireless Powered Devices over Fading Channels Mehdi Salehi Heydar Abad, Ozgur Ercetin arxiv:1804.01834v2 [cs.it] 9 Sep 2018 Abstract Wireless

More information

Determining OWA Operator Weights by Mean Absolute Deviation Minimization

Determining OWA Operator Weights by Mean Absolute Deviation Minimization Deterining OWA Operator Weights by Mean Absolute Deviation Miniization Micha l Majdan 1,2 and W lodziierz Ogryczak 1 1 Institute of Control and Coputation Engineering, Warsaw University of Technology,

More information

N-Point. DFTs of Two Length-N Real Sequences

N-Point. DFTs of Two Length-N Real Sequences Coputation of the DFT of In ost practical applications, sequences of interest are real In such cases, the syetry properties of the DFT given in Table 5. can be exploited to ake the DFT coputations ore

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

Maximum a Posteriori Decoding of Turbo Codes

Maximum a Posteriori Decoding of Turbo Codes Maxiu a Posteriori Decoing of Turbo Coes by Bernar Slar Introuction The process of turbo-coe ecoing starts with the foration of a posteriori probabilities (APPs) for each ata bit, which is followe by choosing

More information

Paul M. Goggans Department of Electrical Engineering, University of Mississippi, Anderson Hall, University, Mississippi 38677

Paul M. Goggans Department of Electrical Engineering, University of Mississippi, Anderson Hall, University, Mississippi 38677 Evaluation of decay ties in coupled spaces: Bayesian decay odel selection a),b) Ning Xiang c) National Center for Physical Acoustics and Departent of Electrical Engineering, University of Mississippi,

More information

Understanding Machine Learning Solution Manual

Understanding Machine Learning Solution Manual Understanding Machine Learning Solution Manual Written by Alon Gonen Edited by Dana Rubinstein Noveber 17, 2014 2 Gentle Start 1. Given S = ((x i, y i )), define the ultivariate polynoial p S (x) = i []:y

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

Fourier Series Summary (From Salivahanan et al, 2002)

Fourier Series Summary (From Salivahanan et al, 2002) Fourier Series Suary (Fro Salivahanan et al, ) A periodic continuous signal f(t), - < t

More information

The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks

The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks Mingyue Ji, Student Meber, IEEE, Giuseppe Caire, Fellow, IEEE, and Andreas F. Molisch, Fellow, IEEE arxiv:3.637v [cs.it] 8 Jul 05 The

More information

e = n 1 ( ) 3 [ m 3] = n [ m 3] n

e = n 1 ( ) 3 [ m 3] = n [ m 3] n Magnetospheric Physics - Hoework Solutions, /7/4 7. Plasa definition Can a plasa be aintained at teperatures of T e K Hint: Calculate the density liit using the plasa paraeter and explain your result).

More information

Comparison of Stability of Selected Numerical Methods for Solving Stiff Semi- Linear Differential Equations

Comparison of Stability of Selected Numerical Methods for Solving Stiff Semi- Linear Differential Equations International Journal of Applied Science and Technology Vol. 7, No. 3, Septeber 217 Coparison of Stability of Selected Nuerical Methods for Solving Stiff Sei- Linear Differential Equations Kwaku Darkwah

More information

Multivariate Methods. Matlab Example. Principal Components Analysis -- PCA

Multivariate Methods. Matlab Example. Principal Components Analysis -- PCA Multivariate Methos Xiaoun Qi Principal Coponents Analysis -- PCA he PCA etho generates a new set of variables, calle principal coponents Each principal coponent is a linear cobination of the original

More information

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China 6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS A Thesis Presented to The Faculty of the Departent of Matheatics San Jose State University In Partial Fulfillent of the Requireents

More information

General Properties of Radiation Detectors Supplements

General Properties of Radiation Detectors Supplements Phys. 649: Nuclear Techniques Physics Departent Yarouk University Chapter 4: General Properties of Radiation Detectors Suppleents Dr. Nidal M. Ershaidat Overview Phys. 649: Nuclear Techniques Physics Departent

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information