On Code Design for Simultaneous Energy and Information Transfer

Size: px
Start display at page:

Download "On Code Design for Simultaneous Energy and Information Transfer"

Transcription

1 On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Mehul Motani Electrical and Comuter Engineering National University of Singaore Lav R. Varshney Electrical and Comuter Engineering University of Illinois at Urbana-Chamaign Abstract We consider the roblem of binary code design for simultaneous energy and information transfer where the receiver comletely relies on the received signal for fulfilling its real-time ower requirements. The receiver, in this scenario, would need a certain amount of energy (derived from the received signal) within a sliding time window for its continuous oeration. In order to meet this energy requirement at the receiver, the transmitter should use only those codewords which carry sufficient energy. In this aer, we assume that the transmitter uses on-off keying where bit one corresonds to transmission of a high energy signal. The transmitter uses only those codewords which have at least d ones in a sliding window of W = d + bits. We show that with this constraint, the noiseless code caacity is achieved by sequences generated from a finite state Markov machine. We also investigate achievable rates when such constrained codes are used on noisy communication channels. Although a few of these results are well known for run-length limited codes used for data storage, they do not seem to aear in literature in the form resented here. I. INTRODUCTION When the receiver relies comletely on the received information-bearing signal for its real-time ower requirements, the roblem at the transmitter is to design codes which maximize the information rate while constraining codewords to carry sufficient energy for smooth receiver oeration. Even when the receiver harvests art of the received energy for future use, the aroach of using the signal as simultaneous source of both energy and information is more efficient than using the signal in a time-shared manner for energy-only and information-only recetion tasks [] [3]. Practical alications of wireless ower and information transfer include communication between a assive tag and an active reader in radio frequency identification (RFID) systems. Batteryless imlantable biomedical devices have been roosed for healthcare systems which receive both energy and control signals wirelessly from an external unit [4], [5]. Other examles of simultaneous energy and information transfer include owerline communication where information is sent over the same lines which carry electric ower [6]. An early work on analysis of fundamental tradeoffs between simultaneous information and energy transfer was conducted in []. The tradeoff involved the study of the limits of information transfer through the use of codewords for which the average received energy exceeds a threshold. When on-off keying is emloyed (where (res. ) is reresented by the resence (res. absence) of a carrier), a majority transmission of indicates a greater oortunity for the receiver to use the signal to fulfill its ower requirements. Given a secific constraint on the minimum number of ones in a time window, the task is to design codes which maximize the information rate while satisfying the window constraint. In this aer, we study binary codes in which each codeword is constrained to have at least d ones in a sliding window of W = d + consecutive bits. This constraint is equivalent to having at least d ones between successive zeros, which in turn defines a Tye- (d, ) run-length limited (RLL) code. Note that, in general, a Tye- (d, k) RLL code is one in which the number of ones between successive zeros in each codeword is at least d and at most k. We give a robabilistic roof that the noiseless caacity of a (d, ) RLL code can be achieved by using a d + state Markovian chain. The state transition robabilities for this Markov chain are exlicitly rovided and any sequence obtained from these state transitions satisfies the given codeword constraint. We also give analytical exressions for achievable rates when these constrained codes are used on the (i) binary symmetric channel, (ii) Z-channel and (iii) binary erasure channel. Although a few of these results are well known for run-length codes used for data storage, they do not seem to aear in literature in the form resented here. Tye- (d, k) RLL codes (where the number of zeros between successive ones are at least d and at most k) have been used for magnetic and otical recording and researchers usually refer to Tye- (d, k) RLL codes simly as (d, k) codes [7] []. However, unless secified otherwise in this aer, by (d, k) codes and (d, ) codes we shall mean Tye- (d, k) RLL codes and Tye- (d, ) RLL codes, resectively. Note that aart from the hysical interretation of constraints, there is no combinatorial difference between Tye- and Tye- RLL codes when they are used on symmetric channels. However differences arise when these codes are emloyed on asymmetric channels, like the Z-channel. A (d, ) code can be reresented by transitions between d + states as shown by the finite-state machine in Fig. [], []. We remark that a (d, k) code can be reresented by a state machine with k + states, but it is not desirable to view a (d, ) code as a secial case of (d, k) code with

2 2 3 d d+ (a) 2 3 d d+ (b) - Fig.. State transition diagram of a (d, ) code. (a) State transitions labeled by outut bit, (b) State transitions labeled by transition robabilities. k = since the state sace becomes infinite. The use of (d, k) codes for simultaneous energy and information transfer has been roosed in [2], [3]. In [2], the tag-to-reader channel in RFID systems is modeled as a discretized Gaussian shift channel and the frame error rate of finite blocklength (d, k) codes is comared through simulations. In this aer, on the other hand, we consider alternate channel models and seek transmission rates at which the robability of error may be brought arbitrarily close to zero by increasing the blocklength. In [3], the receiver is assumed to be equied with a finite energy buffer and energy requirements at the receiver are modeled stochastically. The erformance of different (d, k) codes is comared through numerical otimization over state transition robabilities. In comarison, in this aer we do not assume energy buffering mechanism at the receiver and derive analytical exressions for state transition robabilities which lead to maximization of information rates using (d, ) codes. We analyze the noiseless caacity in Section II while achievable rates for noisy channels are investigated in Section III. Numerical results and conclusions are resented in Sections IV and V, resectively. II. (d, ) CODE CAPACITY If M N denotes the maximum number of distinct binary sequences of length N satisfying the (d, ) constraint, then the (d, ) code caacity is given by log C = lim 2 M N N N. () This was first studied by Shannon [4] and the code caacity is given by the logarithm of the largest root of the following characteristic equation (see [8] and [5]) z d+ z d =. (2) It is interesting to note that solutions to the above equation, for different values of d, are related to certain constants, called Meru constants, obtained from recurrence relations studied by the ancient mathematician Pingala in his work on rhythm and meter in Sanskrit oetry [6]. In articular, the first, second, and fourth Meru constants can be shown to be equal to the largest root of (2) for d =,, and d = 3, resectively. Let S n denote the state of the Markov machine in Fig. at time n where S n {, 2,..., d + }. A transition from state S n to state S n roduces bit X n. From Fig. (a) it follows that X n = when the machine transitions from state d + to state and X n = for all other state transitions. From Fig. (b) we note that the transition robability from state d + to state is denoted by and the transition robability from state d + to itself is equal to. This Markov machine is irreducible and aeriodic. Thus, it has a stationary robability distribution which we denote by {π j } d j= where π j is the steady state robability of the Markov chain being in state j. For this Markov chain, the entroy rate (or information rate) is R = H(S 2 S ) = π d H(), (3) where H() = + log 2 + ( ) log 2 ( ). The value of R is uniquely given by the choice of d and the transition robability. We will now rove that the sequences generated using the finite state machine given by Fig. achieve the binary (d, ) code caacity through an aroriate choice of the transition robability. That is, for a given d, the following relation is satisfied C = max R. (4) The asymtotic equiartition roerty (AEP) holds for Markov sources and the number of tyical sequences of length n is aroximately given by 2 nh(s2 S) where H(S 2 S ) is the entroy rate (or information rate) of the Markov source [7]. In general, if a constrained code is reresented by a finite Markov model then, using the AEP, it can be roved that there exist state transition robabilities such that the entroy rate of the Markov source matches the constrained code caacity []. A similar result is also obtained in [9] by enumerating the distinct sequences that a Markov source can generate using its associated connection matrix. Here, we give a simle roof of (4) when (d, ) constrained codes are reresented by Markov model in Fig.. A useful outcome of our roof is that closed-form exressions for the otimized transition robabilities are exlicitly resented. This seems not to have aeared in the literature before. Theorem. The maximum information rate of the Markov source governed by the state machine given in Fig. is equal to the (d, ) code caacity given by the logarithm of the largest real root of the following characteristic equation z d+ z d =. This caacity is achieved by choosing as the largest real value for which = ( ) d+. Proof: The steady state robability distribution satisfies [π π π d ] = [π π π d ] A, (5)

3 where A denotes the transition robability matrix for the finite state machine in Fig.. The (i, j) entry of A is the transition robability from state i to state j and A is given by A = (6) The diagonal of A is all zeros excet the bottom corner, which is. Solving (5), we get π = π = = π d = π d. (7) Since the steady state robabilities sum to one, we have π d = + d and π = = π d = + d. (8) Using (3) and (8), the information rate is given by R = H() + d. (9) To solve for which maximizes R, we equate the derivative of R with resect to to zero ( ) R ( + d) log = 2 dh() ( + d) 2 =. () The above equation yields Substituting () in (9), we get = ( ) d+. () R = log 2 ( ). (2) From (), we see that ( ) satisfies the equation z d+ = z. Equivalently, ( ) satisfies the equation z z (d+) = zd+ z d z d+ =. (3) Thus, the maximum information rate is given by the logarithm of the largest real root of the equation z d+ z d =. III. ACHIEVABLE RATE USING (d, ) CODE ON MEMORYLESS CHANNELS Consider a memoryless channel with inut sequence X N (satisfying the (d, ) constraint) and outut sequence Y N = (Y,..., Y N ). The channel caacity in this scenario is equal to C = lim N = lim N su I(X N ; Y N ) P (X N ) N su P (S N ) (4) I(S N ; Y N ), (5) N where, in the first equality the suremum is taken over all robabilities P (X N ) for the inut sequence. In the second equality, the suremum is taken over all robabilities P (S N ) for the sequence of states. The second equality follows since given the initial state, the sequences X N and S N are in oneto-one corresondence, and the initial states does not affect the average mutual information [8]. Although the channel caacity using (d, ) codes given by (5) is difficult to obtain for noisy channels, a useful lower bound on the caacity for a stationary Markovian source over memoryless channels is given as [7] C C LB = su P (S,S 2) I(S 2 ; Y 2 S ). (6) In general for a constrained code, an analytical exression for C LB is not available and thus its comutation is erformed either through numerical otimization [7] or through aroximation [8]. In this work we obtain analytical exressions for C LB when the finite state machine in Fig. generates the (d, ) code for the following channels: ) Binary Symmetric Channel 2) Z-Channel 3) Binary Erasure Channel A. Binary Symmetric Channel (BSC) A BSC is a binary-inut binary-outut memoryless channel with an associated crossover robability, P r( ) = P r( ), which we denote by q. The crossover robability reresents the robability of bit error by a hard-decision information decoder at the receiver due to channel noise. It may be temting to interret the transition of information bit to information bit due to channel noise as an energy loss, but the energy harvester at the receiver harvests energy radiated by the transmitter indeendent of the information decoder. Thus imosing the (d, ) code constraint at the transmitter hels to meet the energy requirement at the receiver even on noisy channels. The following roosition evaluates the achievable rate given by (6) for a BSC using (d, ) constrained codes. Proosition. The lower bound for caacity on BSC with crossover robability q when the Markovian state machine in Fig. is used to generate the (d, ) code is given by C LB = where satisfies the equation H( + q 2q) H(q), (7) + d ( q +2q) +d 2q dq = q dq ( q) d dq (+q 2q) 2q dq. (8) Proof: The average conditional mutual information in this case is given by I(S 2 ; Y 2 S ) = H(S 2 S ) + H(Y 2 S ) H(S 2, Y 2 S ) (9) = π d (H( + q 2q) H(q)) (2) H( + q 2q) H(q) =, + d (2)

4 where the last equality above follows from (8). To solve for which maximizes I(S 2 ; Y 2 S ), we equate its derivative with resect to to zero ( r r I = ( + d)( 2q) log ) 2 d (H(r) H(q)) ( + d) 2 =, where r = + q 2q. Using the relation H(r) = r log 2 ( r r (22) ) log 2 ( r), (23) equation (22) can be simlified to obtain (8). Finally, (7) follows from (6) and (2). Remark. Following observations can be made on the alication of Pro. for the secial case of q = and d =. When the BSC crossover robability q =, (7) and (8) reduce to (9) and (), resectively. In this case, C LB corresonds to the (d, ) code caacity C. For this reason, C is also called the noiseless caacity under the (d, ) RLL code constraint. When d =, the code becomes unconstrained and the robability of number of zeros in a codeword is reresented by. In this case, (8) reduces to = and (7) corresonds to the unconstrained BSC caacity H(q). B. Z-Channel The Z-channel is memoryless with inut alhabet X = {, }, outut alhabet Y = {, } and satisfies P r( ) =. We will denote the robability P r( ) by q. The following roosition gives an exlicit exression for the achievable rate C LB, given by (6), for the Z-channel. Proosition 2. When the Markovian state machine in Fig. is used to generate the (d, ) code for a Z-channel with q = P r( ), the achievable rate C LB is given by C LB = log 2 ( ) q log 2 ( + where satisfies the equation q( ) ), (24) ( ) (d+)( q) = (q( ) + ) (d+)q q (d+)q. (25) Proof: The average conditional mutual information in this case can be exressed as H (( )( q)) ( )H( q) I(S 2 ; Y 2 S ) =. + d (26) To solve for which maximizes I(S 2 ; Y 2 S ), we equate its derivative with resect to to zero and simlify to get (25). We get (24) by substituting the constraint (25) in (26). Remark 2. Following observations can be made on the alication of Pro. 2 to the secial case of q = and d =. When q =, (24) and (25) reduce to (2) and (), resectively, and C LB becomes equal to C. When d =, the code becomes unconstrained and the robability of number of zeros in a codeword is reresented by. In this case, (25) reduces to = ( q) ( + 2H(q)/( q)), (27) which is equal to the robability for the occurrence of for achieving the unconstrained caacity on a Z-channel. C. Binary Erasure Channel In this subsection we consider the BEC, a memoryless channel with inut alhabet X = {, }, outut alhabet Y = {, ɛ, } and transition robabilities P r(ɛ ) = q ; P r( ) = q, P r(ɛ ) = q ; P r( ) = q, where q is called the erasure robability. The following roosition evaluates the achievable rate for the BEC using (d, ) constrained codes. Proosition 3. When the Markovian state machine in Fig. is used to generate the (d, ) code for a BEC with erasure robability q, the achievable rate C LB is given by C LB = ( q)c, (28) where C is the noiseless code caacity for a (d, ) code. Proof: The average conditional mutual information in this case can be shown to satisfy I(S 2 ; Y 2 S ) = ( q)h(). (29) + d To solve for which maximizes I(S 2 ; Y 2 S ), we equate its derivative with resect to to zero and simlify to get (). Substituting () in (29), we get C LB = ( q) log 2 ( ) = ( )C. (3) Remark 3. Following observations can be made from Pro. 3 and its roof. The otimized value of in this case which maximizes the average conditional mutual information is indeendent of q. For a given d, this is equal to the corresonding value for the noiseless case. The lower bound C LB is tight for the case q = and is equal to the noiseless code caacity C. IV. NUMERICAL EXAMPLE The noiseless (d, ) code caacity C is lotted in Fig. 2 as a function of d. The dotted curves corresond to evaluation of the entroy rate, given by (9), for fixed values of the state transition robability. The otimized value of which achieves C is obtained by solving = ( ) d+ and is tabulated in Table I. A higher value of d imlies increased transmission of ones in every codeword and hence greater

5 C Otimized =. = = =.7 CLB in bits er channel use unconstrained BSC caacity d = d = d = d q, BSC crossover robability Fig. 2. C as a function of d for (d, ) codes. Fig. 3. C LB as a function of the BSC crossover robability d 2 5 C TABLE I TABLE OF C AND OPTIMIZED AS A FUNCTION OF d oortunity for the receiver to use the received signal to fulfill its energy requirements. Fig. 3 lots C LB, the lower bound on the achievable rate using (d, ) code, versus the BSC crossover robability q. For q =, the lower bound is tight and is equal to the noiseless code caacity C. The lower bound is also tight for the case d =, in which case it is equal to the unconstrained BSC caacity. The otimized value of which satisfies the constraint given by (8) and maximizes the average conditional mutual information I(S 2 ; Y 2 S ) for BSC is lotted in Fig. 4. We observe that the otimized value of varies both with d and with BSC crossover robability q. The lower bound on the achievable rate using (d, ) code on the Z-channel is lotted in Fig. 5. This lower bound is tight for d = in which case it is equal to the unconstrained Z-channel caacity. The otimized value of which satisfies (25) and maximizes I(S 2 ; Y 2 S ) is shown in Fig. 6. The curve corresonding to d = in Fig. 6 deicts the value of robability of occurrence of zeros for achieving the unconstrained caacity for a Z-channel. The lower bound on the achievable rate using (d, ) code on BEC is lotted in Fig. 5. The otimized value of in this case satisfies the constraint () and is indeendent of the robability of erasure. These otimized values of are same as in the noiseless case and are tabulated in Table I as a function of d q, BSC crossover robability Fig. 4. Otimized for BSC V. CONCLUSION d = d = d = We analyzed achievable rates using Tye- (d, ) runlength limited codes for noiseless and noisy channels. The imact of increasing d on the achievable information rate was resented through otimization of a single arameter. The relation which this arameter, denoting the state transition robability, satisfies in order to maximize information rate was given exlicitly for different channel models. The use of (d, ) codes was motivated by the codeword constraint of having at least d ones in a moving window of size W = d + bits. The case when binary codewords are constrained to have at least d ones in a window of size W > d + oens interesting roblems on quantifying achievable rates for different channels. These roblems may be generalized to the study of constrained codewords over alhabets of size greater than two.

6 CLB in bits er channel use unconstrained Z channel caacity q, Pr( ) in Z channel Fig. 5. C LB for Z-channel d = d = d = q, Pr( ) in Z channel d = d = d = REFERENCES [] L. R. Varshney, Transorting information and energy simultaneously, in Proc. 28 IEEE Int. Sym. Inf. Theory, Jul. 28, [2] P. Grover and A. Sahai, Shannon meets Tesla: Wireless information and ower transfer, in Proc. 2 IEEE Int. Sym. Inf. Theory, Jun. 2, [3] L. R. Varshney, On energy/information cross-layer architectures, in Proc. 22 IEEE Int. Sym. Inf. Theory, Jul. 22, [4] R. R. Harrison, P. T. Watkins, R. J. Kier, R. O. Lovejoy, D. J. Black, B. Greger, and F. Solzbacher, A low-ower integrated circuit for a wireless -electrode neural recording system, IEEE J. Solid-State Circuits, vol. 42, no., , 27. [5] A. Yakovlev, S. Kim, and A. Poon, Imlantable biomedical devices: Wireless owering and communication, IEEE Commun. Mag., vol. 5, no. 4, , 22. [6] S. Huczynska, Powerline communication and the 36 officers roblem, Phil. Trans. R. Soc. A, vol. 364, no. 849, , Dec. 26. [7] E. Zehavi and J. K. Wolf, On runlength codes, IEEE Trans. Inf. Theory, vol. 34, no., , 988. [8] S. Shamai and Y. Kofman, On the caacity of binary and Gaussian channels with run-length-limited inuts, IEEE Trans. Commun., vol. 38, no. 5, , 99. [9] K. A. S. Immink, Codes for Mass Data Storage Systems. Shannon Foundation Publishers, The Netherlands, 999. [] B. H. Marcus, R. M. Roth, and P. H. Siegel. (2, October) An introduction to coding for constrained systems. [Online]. Available: htt:// marcus/handbook/index.html [] C. V. Freiman and A. D. Wyner, Otimum block codes for noiseless inut restricted channels, Inf. Control, vol. 7, no. 3, , 964. [2] Á. I. Barbero, E. Rosnes, G. Yang, and Ø. Ytrehus, Constrained codes for assive RFID communication, in Proc. 2 Inf. Theory Al. Worksho, Feb. 2. [3] A. M. Fouladgar, O. Simeone, and E. Erki, Constrained codes for joint energy and information transfer, 23, arxiv:3.87v [cs.it]. [4] C. E. Shannon, A mathematical theory of communication, Bell Syst. Tech. J., no. 27, , 948. [5] J. J. Ashley and P. H. Siegel, A note on the Shannon caacity of runlength-limited codes, IEEE Trans. Inf. Theory, vol. 33, no. 4,. 6 65, 987. [6] L. R. Varshney, Local fidelity, constrained codes, and the Meru Prastāra, IEEE Potentials, vol. 27, no. 2, , March 28. [7] R. G. Gallager, Princiles of Digital Communication. Cambridge University Press, 28. Fig. 6. Otimized for Z-channel CLB in bits er channel use unconstrained BEC caacity d = d = d =..6.8 q, robability of erasure Fig. 7. C LB for BEC

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

Interactive Hypothesis Testing Against Independence

Interactive Hypothesis Testing Against Independence 013 IEEE International Symosium on Information Theory Interactive Hyothesis Testing Against Indeendence Yu Xiang and Young-Han Kim Deartment of Electrical and Comuter Engineering University of California,

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

LDPC codes for the Cascaded BSC-BAWGN channel

LDPC codes for the Cascaded BSC-BAWGN channel LDPC codes for the Cascaded BSC-BAWGN channel Aravind R. Iyengar, Paul H. Siegel, and Jack K. Wolf University of California, San Diego 9500 Gilman Dr. La Jolla CA 9093 email:aravind,siegel,jwolf@ucsd.edu

More information

Formal Modeling in Cognitive Science Lecture 29: Noisy Channel Model and Applications;

Formal Modeling in Cognitive Science Lecture 29: Noisy Channel Model and Applications; Formal Modeling in Cognitive Science Lecture 9: and ; ; Frank Keller School of Informatics University of Edinburgh keller@inf.ed.ac.uk Proerties of 3 March, 6 Frank Keller Formal Modeling in Cognitive

More information

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding Homework Set # Rates definitions, Channel Coding, Source-Channel coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

New Information Measures for the Generalized Normal Distribution

New Information Measures for the Generalized Normal Distribution Information,, 3-7; doi:.339/info3 OPEN ACCESS information ISSN 75-7 www.mdi.com/journal/information Article New Information Measures for the Generalized Normal Distribution Christos P. Kitsos * and Thomas

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

EE/Stats 376A: Information theory Winter Lecture 5 Jan 24. Lecturer: David Tse Scribe: Michael X, Nima H, Geng Z, Anton J, Vivek B.

EE/Stats 376A: Information theory Winter Lecture 5 Jan 24. Lecturer: David Tse Scribe: Michael X, Nima H, Geng Z, Anton J, Vivek B. EE/Stats 376A: Information theory Winter 207 Lecture 5 Jan 24 Lecturer: David Tse Scribe: Michael X, Nima H, Geng Z, Anton J, Vivek B. 5. Outline Markov chains and stationary distributions Prefix codes

More information

Coding Along Hermite Polynomials for Gaussian Noise Channels

Coding Along Hermite Polynomials for Gaussian Noise Channels Coding Along Hermite olynomials for Gaussian Noise Channels Emmanuel A. Abbe IG, EFL Lausanne, 1015 CH Email: emmanuel.abbe@efl.ch Lizhong Zheng LIDS, MIT Cambridge, MA 0139 Email: lizhong@mit.edu Abstract

More information

I - Information theory basics

I - Information theory basics I - Information theor basics Introduction To communicate, that is, to carr information between two oints, we can emlo analog or digital transmission techniques. In digital communications the message is

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Convolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code.

Convolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code. Convolutional Codes Goals Lecture Be able to encode using a convolutional code Be able to decode a convolutional code received over a binary symmetric channel or an additive white Gaussian channel Convolutional

More information

Anytime communication over the Gilbert-Eliot channel with noiseless feedback

Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anant Sahai, Salman Avestimehr, Paolo Minero Deartment of Electrical Engineering and Comuter Sciences University of California

More information

Training sequence optimization for frequency selective channels with MAP equalization

Training sequence optimization for frequency selective channels with MAP equalization 532 ISCCSP 2008, Malta, 12-14 March 2008 raining sequence otimization for frequency selective channels with MAP equalization Imed Hadj Kacem, Noura Sellami Laboratoire LEI ENIS, Route Sokra km 35 BP 3038

More information

On a Markov Game with Incomplete Information

On a Markov Game with Incomplete Information On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information

More information

Sampling and Distortion Tradeoffs for Bandlimited Periodic Signals

Sampling and Distortion Tradeoffs for Bandlimited Periodic Signals Samling and Distortion radeoffs for Bandlimited Periodic Signals Elaheh ohammadi and Farokh arvasti Advanced Communications Research Institute ACRI Deartment of Electrical Engineering Sharif University

More information

Universal Finite Memory Coding of Binary Sequences

Universal Finite Memory Coding of Binary Sequences Deartment of Electrical Engineering Systems Universal Finite Memory Coding of Binary Sequences Thesis submitted towards the degree of Master of Science in Electrical and Electronic Engineering in Tel-Aviv

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE)

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE) KAUST Reository Outage erformance of cognitive radio systems with Imroer Gaussian signaling Item tye Authors Erint version DOI Publisher Journal Rights Conference Paer Amin Osama; Abediseid Walid; Alouini

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

Cryptanalysis of Pseudorandom Generators

Cryptanalysis of Pseudorandom Generators CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we

More information

Inequalities for the L 1 Deviation of the Empirical Distribution

Inequalities for the L 1 Deviation of the Empirical Distribution Inequalities for the L 1 Deviation of the Emirical Distribution Tsachy Weissman, Erik Ordentlich, Gadiel Seroussi, Sergio Verdu, Marcelo J. Weinberger June 13, 2003 Abstract We derive bounds on the robability

More information

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of

More information

Skip-Sliding Window Codes

Skip-Sliding Window Codes 1 Skip-Sliding Window Codes Ting-Yi Wu, Anshoo Tandon, Lav R. Varshney, Senior Member, IEEE, and Mehul Motani, Fellow, IEEE arxiv:1711.09494v2 [cs.it] 11 Jan 2018 Abstract Constrained coding is used widely

More information

Chapter 1 Fundamentals

Chapter 1 Fundamentals Chater Fundamentals. Overview of Thermodynamics Industrial Revolution brought in large scale automation of many tedious tasks which were earlier being erformed through manual or animal labour. Inventors

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

Age of Information: Whittle Index for Scheduling Stochastic Arrivals

Age of Information: Whittle Index for Scheduling Stochastic Arrivals Age of Information: Whittle Index for Scheduling Stochastic Arrivals Yu-Pin Hsu Deartment of Communication Engineering National Taiei University yuinhsu@mail.ntu.edu.tw arxiv:80.03422v2 [math.oc] 7 Ar

More information

THE development of efficient and simplified bounding

THE development of efficient and simplified bounding IEEE TRASACTIOS O IFORMATIO THEORY, VO. XX, O. XX, XXXX 4 ist ermutation invariant linear codes: Theory and Alications Kostis Xenoulis Abstract The class of q-ary list ermutation invariant linear codes

More information

Distributed K-means over Compressed Binary Data

Distributed K-means over Compressed Binary Data 1 Distributed K-means over Comressed Binary Data Elsa DUPRAZ Telecom Bretagne; UMR CNRS 6285 Lab-STICC, Brest, France arxiv:1701.03403v1 [cs.it] 12 Jan 2017 Abstract We consider a networ of binary-valued

More information

Probability Estimates for Multi-class Classification by Pairwise Coupling

Probability Estimates for Multi-class Classification by Pairwise Coupling Probability Estimates for Multi-class Classification by Pairwise Couling Ting-Fan Wu Chih-Jen Lin Deartment of Comuter Science National Taiwan University Taiei 06, Taiwan Ruby C. Weng Deartment of Statistics

More information

Some Results on the Generalized Gaussian Distribution

Some Results on the Generalized Gaussian Distribution Some Results on the Generalized Gaussian Distribution Alex Dytso, Ronit Bustin, H. Vincent Poor, Daniela Tuninetti 3, Natasha Devroye 3, and Shlomo Shamai (Shitz) Abstract The aer considers information-theoretic

More information

Generalized Coiflets: A New Family of Orthonormal Wavelets

Generalized Coiflets: A New Family of Orthonormal Wavelets Generalized Coiflets A New Family of Orthonormal Wavelets Dong Wei, Alan C Bovik, and Brian L Evans Laboratory for Image and Video Engineering Deartment of Electrical and Comuter Engineering The University

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging 1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014

More information

Improving on the Cutset Bound via a Geometric Analysis of Typical Sets

Improving on the Cutset Bound via a Geometric Analysis of Typical Sets Imroving on the Cutset Bound via a Geometric Analysis of Tyical Sets Ayfer Özgür Stanford University CUHK, May 28, 2016 Joint work with Xiugang Wu (Stanford). Ayfer Özgür (Stanford) March 16 1 / 33 Gaussian

More information

Convexification of Generalized Network Flow Problem with Application to Power Systems

Convexification of Generalized Network Flow Problem with Application to Power Systems 1 Convexification of Generalized Network Flow Problem with Alication to Power Systems Somayeh Sojoudi and Javad Lavaei + Deartment of Comuting and Mathematical Sciences, California Institute of Technology

More information

Analysis of M/M/n/K Queue with Multiple Priorities

Analysis of M/M/n/K Queue with Multiple Priorities Analysis of M/M/n/K Queue with Multile Priorities Coyright, Sanjay K. Bose For a P-riority system, class P of highest riority Indeendent, Poisson arrival rocesses for each class with i as average arrival

More information

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., DECEMBER 4 336 Some Unitary Sace Time Codes From Shere Packing Theory With Otimal Diversity Product of Code Size Haiquan Wang, Genyuan Wang, and Xiang-Gen

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various

More information

Spatial Outage Capacity of Poisson Bipolar Networks

Spatial Outage Capacity of Poisson Bipolar Networks Satial Outage Caacity of Poisson Biolar Networks Sanket S. Kalamkar and Martin Haenggi Deartment of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556, USA E-mail: skalamka@nd.edu,

More information

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu

More information

On a class of Rellich inequalities

On a class of Rellich inequalities On a class of Rellich inequalities G. Barbatis A. Tertikas Dedicated to Professor E.B. Davies on the occasion of his 60th birthday Abstract We rove Rellich and imroved Rellich inequalities that involve

More information

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is

More information

Positivity, local smoothing and Harnack inequalities for very fast diffusion equations

Positivity, local smoothing and Harnack inequalities for very fast diffusion equations Positivity, local smoothing and Harnack inequalities for very fast diffusion equations Dedicated to Luis Caffarelli for his ucoming 60 th birthday Matteo Bonforte a, b and Juan Luis Vázquez a, c Abstract

More information

On Doob s Maximal Inequality for Brownian Motion

On Doob s Maximal Inequality for Brownian Motion Stochastic Process. Al. Vol. 69, No., 997, (-5) Research Reort No. 337, 995, Det. Theoret. Statist. Aarhus On Doob s Maximal Inequality for Brownian Motion S. E. GRAVERSEN and G. PESKIR If B = (B t ) t

More information

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment Neutrosohic Sets and Systems Vol 14 016 93 University of New Mexico Otimal Design of Truss Structures Using a Neutrosohic Number Otimization Model under an Indeterminate Environment Wenzhong Jiang & Jun

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

A Bound on the Error of Cross Validation Using the Approximation and Estimation Rates, with Consequences for the Training-Test Split

A Bound on the Error of Cross Validation Using the Approximation and Estimation Rates, with Consequences for the Training-Test Split A Bound on the Error of Cross Validation Using the Aroximation and Estimation Rates, with Consequences for the Training-Test Slit Michael Kearns AT&T Bell Laboratories Murray Hill, NJ 7974 mkearns@research.att.com

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

Developing A Deterioration Probabilistic Model for Rail Wear

Developing A Deterioration Probabilistic Model for Rail Wear International Journal of Traffic and Transortation Engineering 2012, 1(2): 13-18 DOI: 10.5923/j.ijtte.20120102.02 Develoing A Deterioration Probabilistic Model for Rail Wear Jabbar-Ali Zakeri *, Shahrbanoo

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

q-ary Symmetric Channel for Large q

q-ary Symmetric Channel for Large q List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu

More information

Solved Problems. (a) (b) (c) Figure P4.1 Simple Classification Problems First we draw a line between each set of dark and light data points.

Solved Problems. (a) (b) (c) Figure P4.1 Simple Classification Problems First we draw a line between each set of dark and light data points. Solved Problems Solved Problems P Solve the three simle classification roblems shown in Figure P by drawing a decision boundary Find weight and bias values that result in single-neuron ercetrons with the

More information

Hotelling s Two- Sample T 2

Hotelling s Two- Sample T 2 Chater 600 Hotelling s Two- Samle T Introduction This module calculates ower for the Hotelling s two-grou, T-squared (T) test statistic. Hotelling s T is an extension of the univariate two-samle t-test

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle

Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle McMaster University Advanced Otimization Laboratory Title: Notes on duality in second order and -order cone otimization Author: Erling D. Andersen, Cornelis Roos and Tamás Terlaky AdvOl-Reort No. 000/8

More information

AI*IA 2003 Fusion of Multiple Pattern Classifiers PART III

AI*IA 2003 Fusion of Multiple Pattern Classifiers PART III AI*IA 23 Fusion of Multile Pattern Classifiers PART III AI*IA 23 Tutorial on Fusion of Multile Pattern Classifiers by F. Roli 49 Methods for fusing multile classifiers Methods for fusing multile classifiers

More information

Supplementary Materials for Robust Estimation of the False Discovery Rate

Supplementary Materials for Robust Estimation of the False Discovery Rate Sulementary Materials for Robust Estimation of the False Discovery Rate Stan Pounds and Cheng Cheng This sulemental contains roofs regarding theoretical roerties of the roosed method (Section S1), rovides

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS #A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,

More information

Infinite Number of Chaotic Generalized Sub-shifts of Cellular Automaton Rule 180

Infinite Number of Chaotic Generalized Sub-shifts of Cellular Automaton Rule 180 Infinite Number of Chaotic Generalized Sub-shifts of Cellular Automaton Rule 180 Wei Chen, Fangyue Chen, Yunfeng Bian, Jing Chen School of Science, Hangzhou Dianzi University, Hangzhou, Zhejiang, P. R.

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

44 CHAPTER 5. PERFORMACE OF SMALL SIGAL SETS In digital communications, we usually focus entirely on the code, and do not care what encoding ma is use

44 CHAPTER 5. PERFORMACE OF SMALL SIGAL SETS In digital communications, we usually focus entirely on the code, and do not care what encoding ma is use Performance of small signal sets Chater 5 In this chater, we show how to estimate the erformance of small-to-moderate-sized signal constellations on the discrete-time AWG channel. With equirobable signal

More information

Uncertainty Modeling with Interval Type-2 Fuzzy Logic Systems in Mobile Robotics

Uncertainty Modeling with Interval Type-2 Fuzzy Logic Systems in Mobile Robotics Uncertainty Modeling with Interval Tye-2 Fuzzy Logic Systems in Mobile Robotics Ondrej Linda, Student Member, IEEE, Milos Manic, Senior Member, IEEE bstract Interval Tye-2 Fuzzy Logic Systems (IT2 FLSs)

More information

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete

More information

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment

More information

A Note on Guaranteed Sparse Recovery via l 1 -Minimization

A Note on Guaranteed Sparse Recovery via l 1 -Minimization A Note on Guaranteed Sarse Recovery via l -Minimization Simon Foucart, Université Pierre et Marie Curie Abstract It is roved that every s-sarse vector x C N can be recovered from the measurement vector

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

An Introduction to Information Theory: Notes

An Introduction to Information Theory: Notes An Introduction to Information Theory: Notes Jon Shlens jonshlens@ucsd.edu 03 February 003 Preliminaries. Goals. Define basic set-u of information theory. Derive why entroy is the measure of information

More information

arxiv: v1 [quant-ph] 3 Feb 2015

arxiv: v1 [quant-ph] 3 Feb 2015 From reversible comutation to quantum comutation by Lagrange interolation Alexis De Vos and Stin De Baerdemacker 2 arxiv:502.0089v [quant-h] 3 Feb 205 Cmst, Imec v.z.w., vakgroe elektronica en informatiesystemen,

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

The analysis and representation of random signals

The analysis and representation of random signals The analysis and reresentation of random signals Bruno TOÉSNI Bruno.Torresani@cmi.univ-mrs.fr B. Torrésani LTP Université de Provence.1/30 Outline 1. andom signals Introduction The Karhunen-Loève Basis

More information

Delay characterization of multi-hop transmission in a Poisson field of interference

Delay characterization of multi-hop transmission in a Poisson field of interference 1 Delay characterization of multi-ho transmission in a Poisson field of interference Kostas Stamatiou and Martin Haenggi, Senior Member, IEEE Abstract We evaluate the end-to-end delay of a multi-ho transmission

More information

Beyond Worst-Case Reconstruction in Deterministic Compressed Sensing

Beyond Worst-Case Reconstruction in Deterministic Compressed Sensing Beyond Worst-Case Reconstruction in Deterministic Comressed Sensing Sina Jafarour, ember, IEEE, arco F Duarte, ember, IEEE, and Robert Calderbank, Fellow, IEEE Abstract The role of random measurement in

More information

Optimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI

Optimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI Otimal Power Control over Fading Cognitive Radio Channels by Exloiting Primary User CSI Rui Zhang Abstract arxiv:0804.67v2 [cs.it] 7 Feb 2009 This aer is concerned with sectrum sharing cognitive radio

More information

An Analysis of TCP over Random Access Satellite Links

An Analysis of TCP over Random Access Satellite Links An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance

More information

COMPARISON OF VARIOUS OPTIMIZATION TECHNIQUES FOR DESIGN FIR DIGITAL FILTERS

COMPARISON OF VARIOUS OPTIMIZATION TECHNIQUES FOR DESIGN FIR DIGITAL FILTERS NCCI 1 -National Conference on Comutational Instrumentation CSIO Chandigarh, INDIA, 19- March 1 COMPARISON OF VARIOUS OPIMIZAION ECHNIQUES FOR DESIGN FIR DIGIAL FILERS Amanjeet Panghal 1, Nitin Mittal,Devender

More information

GIVEN an input sequence x 0,..., x n 1 and the

GIVEN an input sequence x 0,..., x n 1 and the 1 Running Max/Min Filters using 1 + o(1) Comarisons er Samle Hao Yuan, Member, IEEE, and Mikhail J. Atallah, Fellow, IEEE Abstract A running max (or min) filter asks for the maximum or (minimum) elements

More information

Outline. Markov Chains and Markov Models. Outline. Markov Chains. Markov Chains Definitions Huizhen Yu

Outline. Markov Chains and Markov Models. Outline. Markov Chains. Markov Chains Definitions Huizhen Yu and Markov Models Huizhen Yu janey.yu@cs.helsinki.fi Det. Comuter Science, Univ. of Helsinki Some Proerties of Probabilistic Models, Sring, 200 Huizhen Yu (U.H.) and Markov Models Jan. 2 / 32 Huizhen Yu

More information

One step ahead prediction using Fuzzy Boolean Neural Networks 1

One step ahead prediction using Fuzzy Boolean Neural Networks 1 One ste ahead rediction using Fuzzy Boolean eural etworks 1 José A. B. Tomé IESC-ID, IST Rua Alves Redol, 9 1000 Lisboa jose.tome@inesc-id.t João Paulo Carvalho IESC-ID, IST Rua Alves Redol, 9 1000 Lisboa

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

HetNets: what tools for analysis?

HetNets: what tools for analysis? HetNets: what tools for analysis? Daniela Tuninetti (Ph.D.) Email: danielat@uic.edu Motivation Seven Ways that HetNets are a Cellular Paradigm Shift, by J. Andrews, IEEE Communications Magazine, March

More information

Almost 4000 years ago, Babylonians had discovered the following approximation to. x 2 dy 2 =1, (5.0.2)

Almost 4000 years ago, Babylonians had discovered the following approximation to. x 2 dy 2 =1, (5.0.2) Chater 5 Pell s Equation One of the earliest issues graled with in number theory is the fact that geometric quantities are often not rational. For instance, if we take a right triangle with two side lengths

More information

Recursive Estimation of the Preisach Density function for a Smart Actuator

Recursive Estimation of the Preisach Density function for a Smart Actuator Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator

More information

FAST AND EFFICIENT SIDE INFORMATION GENERATION IN DISTRIBUTED VIDEO CODING BY USING DENSE MOTION REPRESENTATIONS

FAST AND EFFICIENT SIDE INFORMATION GENERATION IN DISTRIBUTED VIDEO CODING BY USING DENSE MOTION REPRESENTATIONS 18th Euroean Signal Processing Conference (EUSIPCO-2010) Aalborg, Denmark, August 23-27, 2010 FAST AND EFFICIENT SIDE INFORMATION GENERATION IN DISTRIBUTED VIDEO CODING BY USING DENSE MOTION REPRESENTATIONS

More information

Self-Sustainability of Energy Harvesting Systems: Concept, Analysis, and Design

Self-Sustainability of Energy Harvesting Systems: Concept, Analysis, and Design 1 Self-Sustainability of Energy arvesting Systems: Concet, Analysis, and Design Sudarshan Guruacharya and Ekram ossain Deartment of Electrical and Comuter Engineering, University of Manitoba, Canada Emails:

More information

An Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem

An Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem An Ant Colony Otimization Aroach to the Probabilistic Traveling Salesman Problem Leonora Bianchi 1, Luca Maria Gambardella 1, and Marco Dorigo 2 1 IDSIA, Strada Cantonale Galleria 2, CH-6928 Manno, Switzerland

More information