Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems

Size: px
Start display at page:

Download "Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems"

Transcription

1 Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Mojtaba Vaezi, Hazer Inaltekin, Wonjae Sin, H. Vincent Poor, and Junsan Zang* Department of Electrical Engineering, Princeton University, Princeton, NJ 08540, USA Department of Electrical and Computer Eng., Seoul National University, Seoul , Korea * Scool of Electrical, Computer and Energy Engineering, Arizona State University, Tempe, AZ 85287, USA {mvaezi, inaltek, poor}@princeton.edu, wonjae.sin@snu.ac.kr, junsan.zang@asu.edu Abstract In tis paper, beamforming design is investigated for a multi-antenna cooperative communication system in wic bot pysical links and social connections (trust degrees) between nodes are taken into account. An optimal beamformer aims to balance between te direct link and te cooperating link as well as respecting te trust degree. Te resulting optimization problem is nontrivial to solve, even numerically, as it is not convex. Te complexity of te problem is largely reduced by sowing tat a linear combination of te direct and cooperating links cannel vectors imizes te acievable rate. Ten, a computationally efficient numerical solution is used to imize te rate. Numerical results demonstrate tat significant gains in communication rates can be obtained wit te proposed optimal beamforming design. I. INTRODUCTION A salient caracteristic of mobile data networks is te dominant operating mode of one person beind eac device, wic differentiates tem from oter tecnological networks suc as sensor networks. A direct consequence of tis feature of mobile data networks is te existence of bot pysical coupling between mobile devices troug sared communication resources suc as wireless spectrum, and virtual coupling among te users beind tese devices in te social domain. Tese virtual ties, in many ways, sape te data traffic flows and quality-of-service (QoS) requirements in te pysical domain. Social interactions could be positive (representing friendsip) or negative (representing antagonism), wic yield non-trivial impact on users decision-making processes (e.g., in terms of cooperation) for data transmission and reception. We refer to tis two-layered network structure as a mobile/social network. A number of recent works, e.g., [1] [6], ave studied te integration of mobile data networks wit social networks in a variety of settings. In [1], a game teoretic framework called social group utility imization is developed to imize a weigted sum of te individual utilities rater tan a totally selfis utility. In [2] [5], social community-aware resource allocation is studied for device-to-device (D2D) networks. A social-aware peer discovery sceme for D2D systems is proposed in [6]. It exploits social network caracteristics to assist ad oc peer discovery and enance data transmission performance. Tis researc was supported by te U.S. Army Researc Office under Grant W911NF Tx RN (a) Pysical connections g Rx Tx RN (b) Trust degrees Fig. 1. A multi-antenna cooperative communication network wit pysical and social connections (trust degrees). Most of te above works develop communication strategies based on single-antenna nodes. In a recent study, Ryu et al. [7] proposed te use of social connections for beamforming in a cooperative communication system wit a single-antenna relay. Tis sceme uses trustwortiness between nodes to design beamforming for efficient data relaying. It is proved tat a linear combination of cannel vectors makes an optimal beamformer to imize expected acievable rate. To find a closed-form solution for te optimal weigts of te linear combination, a ig signal-to-noise ratio (SNR) approximation is used wic explicitly sows te effect of trust degrees on te beamforming design. In tis paper, we improve te acievable rate of [7] and extend it to te case were te relay as multiple antennas. Te rate improvement is based on two observations. First, we sow tat imum trust degree does not always result in te best rate performance. Tus, we consider optimization over trust degree as well as te beamforming vectors at te source and relay nodes. Second, unlike [7], our design is for te exact acievable rate, not just in te ig SNR regime. We use a computationally practical numerical solution tat acieves near optimal beamformer performance. Te resulting beamformer improves te rate performance wen compared wit te closed-form solution of te approximated rate given in [7]. Anoter contribution of te current paper is te extension of te beamforming design in [7] to te case in wic te relay as multiple antennas. Te paper is organized as follows. We describe te system model in Section II and formulate an optimization problem to imize te acievable rate at te destination in Section III. Rx

2 In Section IV, we prove tat optimal beamforming is acieved troug a linear combination of te cannel vectors for direct and cooperating links, respecting te trust degree. Numerical results are presented in Section V and te paper is concluded in Section VI. A. Notation We use ( ) t, ( ), ( ), and tr( ) to denote te transpose, conjugate, conjugate transpose, and trace of a matrix, respectively. Matrices are written in bold capital letters and vectors are written in bold small letters. I represents an identity matrix. For scalar x, 0 x 1, we define x = 1 x. x is te Euclidean norm of x. II. SYSTEM MODEL In tis paper, we consider a two-layered network structure, wic we call a mobile/social network. As sown in Fig. 1, te network as pysical connections (Fig. 1(a)) as well as social connections represented by trust degrees (Fig. 1(b)). We describe te details of tis two-layered network model below, starting wit te pysical system model. A. Pysical System Model Consider a multiple-input-multiple-output (MIMO) decodeand-forward (DF) full-duplex two-op relay network as sown in Fig. 1(a). We assume tat te source (S) and relay (R) ave N s and N r antennas, respectively, and te destination (D) as one antenna only. Let C Ns 1, H C Ns Nr, and g C Nr 1 represent te cannel coefficients for S-D, S-R, and R-D links, respectively. We assume tat cannel state information (CSI) is known at te transmitters, e.g., troug training/feedback and cannel reciprocity, so tat tey can steer teir beamforming vectors to imize teir transmission performance. In tis setting, information transmission can be divided into two pases, as described below. 1) Source Pase: In tis pase, te information symbol x s is first multiplied by a beamforming vector before being transmitted at S. Te complex baseband signal received at D and R can be represented as y SD = t x s + n SD, (1) y SR = H t x s + n SR, (2) were n SD CN (0, 1) and n SR CN (0, I) represent complex additive Gaussian noise at D and R, respectively. Te received SNRs at D and R are given by γ SD = t 2 P s, (3) γ SR = H t 2 P s. (4) Tus, te imum acievable rates of communication from S to D and S to R are given by C SD = log 2 (1 + γ SD ), (5) C SR = log 2 (1 + γ SR ). (6) 2) Relay Pase: In tis pase, R forwards its decoded symbol x r to D wit power P r troug transmission over N r antennas. Te complex baseband signal received at D is given by y RD = g t w r x r + n RD, (7) were n RD CN (0, 1). Te received SNR at D, in tis pase, is given by γ RD = g t w r 2 P r. (8) Ten, D can combine te signal received from S and R to improve te SNR. Te acievable rate for te composite link is given by [8] C D = log 2 (1 + γ SD + γ RD ). (9) Finally, te acievable rate for te DF system is obtained as C DF = min{c SR, C D } (10) { } = min log 2 (1 + γ SR ), log 2 (1 + γ SD + γ RD ). B. Trust Degrees Similar to [7], we model te social system by trust degrees. Defined for eac link between every two nodes, trust degree is a level of belief tat one node can elp te oter node for a specific action suc as relaying [7], [9]. Trust degree can be quantified based on te previous interactions between te nodes or can be estimated from te istory of past interactions in a social platform suc as in Facebook or Twitter [7], [9] [11]. Specifically, in our cooperative communication system (see Fig. 1), te relay would be willing to participate in cooperation wit probability α 1 and would use a fraction β 1 of its power for tis purpose, wit α 1, β 1 [0 1]. 1 Witout loss of generality, and for simplicity of presentation, we absorb β 1 in te relay power. Tat is, we assume P r is te fraction of relay power used for cooperation. Ten, te trust degree based rate will be R T = α 1 C DF + (1 α 1 )C SD { } = α 1 min log 2 (1 + γ SR ), log 2 (1 + γ SD + γ RD ) + ᾱ 1 log 2 (1 + γ SD ) (11) in wic C DF and C SD are from (10) and (5), and ᾱ 1 = 1 α 1. It is wort noting tat for α 1 = 1 we get R T = C DF and our system simplifies to a DF MIMO relay beamforming problem wic is a non-convex problem and as been extensively studied, e.g., see [8], [12], [13] and te reference terein. On te oter and, for α 1 = 0 we get R T = C SD and te system simplifies to multiple-input-single-output (MISO) cannel wic is a well-understood problem. 1 In general, for link i we can define te pair (α i, β i ), α i, β i [0 1], as a virtual (social) tie in wic α i denotes te probability of cooperation and β i denotes te fraction of power tat te node uses for collaboration [7]. Here, trust degrees are assumed to be bidirectional.

3 III. PROBLEM FORMULATION AND TRANSFORMATION In tis section, we formulate a beamforming design problem to imize te objective function in (11). We ten transform tis problem into some equivalent problems tat can be tackled more easier. Our goal is to jointly optimize te beamforming vectors and w r as well as α to imize (11). Matematically, tis can be expressed as,w r,α R T s.t. 2 = 1, (12) w r 2 = 1, 0 α α 1, were R T is defined in (11). Tis is a non-convex optimization problem, 2 for wic standard convex optimization tecniques cannot be applied directly. As a first step to simplifying (12), we observe tat γ SD and γ SR are independent of w r, te beamforming vector at te relay. In oter words, w r merely affects γ RD. Hence, te imal ratio transmission (MRT) beamformer [8], [13], [14] is optimal, i.e., wr = g g. (13) Wit tis, te problem reduces to [ α min{log2 (1 + γ SR ), log 2 (1 + γ SD + γrd)},α s.t. 2 = 1, + ᾱ log 2 (1 + γ SD ) ] (14) 0 α α 1, in wic γ RD = g 2 P r is obtained from (13) and (8). A. An Upper Bound Lemma 1. An upper bound on te acievable rate in (11) is given by R T α 1 log 2 (1 + γ SD + γ RD) + ᾱ 1 log 2 (1 + γ SD) (15) = α 1 log 2 (1 + 2 P s + g 2 P r ) + ᾱ 1 log 2 (1 + 2 P s ) in wic γ SD is obtained from (3) for w s =. Proof. Using (14), we can write { } R T = α min log 2 (1 + γ SR ), log 2 (1 + γ SD + γrd) + ᾱ log 2 (1 + γ SD ) α log 2 (1 + γ SD + γ RD) + ᾱ log 2 (1 + γ SD ) α 1 log 2 (1 + γ SD + γ RD) + ᾱ 1 log 2 (1 + γ SD ) α 1 log 2 (1 + γ SD + γ RD) + ᾱ 1 log 2 (1 + γ SD) (16) were te first inequality is due to te fact tat min{a, b} b, te second inequality follows from 1 + γ SD + γ RD 1 + γ SD and te fact tat α α 1, and te tird inequality is due to a 2 R T includes logaritmic functions of quadratic functions of ; tus, it is a combination of concave and convex functions wic is non-convex. simple optimization over γ SD in wic γsd is obtained from (3) for ws =. It is wort noting tat te above upper bound is acievable if te link between S and R is strong enoug so tat it is not te bottleneck of te system. Tis is expected if te relay as multiple antennas and/or is close enoug to te transmitter. More accurately, we ave te following result. Teorem 1. If H t 2 P s 2 P s + g 2 P r for ws =, ten w s = is an optimal beamformer of (14), and R T = α 1 log 2 (1 + 2 P s + g 2 P r ) + ᾱ 1 log 2 (1 + 2 P s ) is acievable for te system depicted in Fig. 1. Proof. Te proof follows from Lemma 1 because te upper bound above is acievable for ws = if Ht 2 P s 2 P s + g 2 P r. B. Transforming te Optimization Problem Te optimization problem (12) is a non-convex problem, even for a fixed α. In te following, we aim at simplifying it by converting it into more tractable problems. More specifically, we break (12) into tree optimization problems, as described below. 1) γ SR γ SD : In suc a case, te relay link is not strong enoug to be elpful. Ten, from (14), it is straigtforward to ceck tat te optimal α is zero (α = 0) and te problem simplifies to log 2 (1 + γ SD ) s.t. 2 = 1, (17) γ SR γ SD. Ten, witout te last constraint, can be easily designed as an MRT beamformer; i.e., ws =. Tus, an optimal beamformer is given by ws = provided tat te inequality γ SR γ SD olds. Te optimal is not trivial in general. 2) γ SR γ SD + γrd : Tis appens, for example, wen te relay is very close to te transmitter. In tis case, R T = α log 2 (1 + γ SD + γrd ) + ᾱ log 2(1 + γ SD ). Now, since te argument of te first logaritm is always greater tan or equal to tat of te second one, we ave α = α 1, and (14) reduces to α 1 log 2 (1 + γ SD + γrd) + ᾱ 1 log 2 (1 + γ SD ) s.t. 2 = 1, (18) γ SR γ SD + γ RD. Ten again, ws = is optimal if te inequality γ SR γ SD + γrd olds. In suc a case, we get R T = α 1 log 2 (1 + 2 P s + g 2 P r ) + ᾱ 1 log 2 (1 + 2 P s ). Note tat tis is te best acievable rate we can expect from te optimization problem in (12).

4 3) γ SD < γ SR < γ SD + γrd : In tis case, since γ SD < γ SR, it can be cecked from (14) tat α = α 1 is optimal. Pysically, tis means tat te relay is strong enoug and te social connection is fully exploited. Furter, in view of γ SR < γ SD + γrd, (14) simplifies to α 1 log 2 (1 + γ SR ) + ᾱ 1 log 2 (1 + γ SD ) s.t. 2 = 1, (19) γ SD < γ SR, γ SR < γ SD + γ RD. Te new optimization problems defined by (17), (18), and (19) are simpler tan (14) in tat te optimization over te variable α is already carried out. Wit tis divide and conquer approac, we readily obtain te following useful lemmas. Lemma 2. Te optimal value of α in (14) is eiter zero or α 1. Lemma 3. Let R T1, R T2 and R T3 be te solutions to te optimization problems in (17), (18) and (19), respectively. Ten, te optimum rate acieved by te solution of (14) is equal to {R T1, R T2, R T3 }. Furter, te optimum beamforming vector at te source is te one corresponding to te imum R Ti for i = 1, 2, 3 C. Semidefinite Relaxation By converting te original optimization problem into tree subproblems, we fixed te value of α in te previous subsection. However, te new optimization problems are still nonconvex and difficult to solve. A computationally efficient way to tackle te optimization problem in (17) is to use semidefinite relaxation (SDR) [15], as described below. It can be cecked tat te same tat imizes (17) is also optimal for te following problem: min γ SD s.t. 2 = 1, (20) γ SR γ SD. Since γ SD and γ SR are quadratic in, tis new problem is a quadratically constrained quadratic program (QCQP), and can be solved by te SDR tecnique [15]. To see tis, let us write γ SR = H 2 P = w sh H P = tr(h H w s)p = P tr(aw), (21) were we ave defined A = H H and W = w s. Ten, we can transform te above optimization problem to min s.t. t P tr(aw) t tr(w) = 1 (22) rank(w) = 1, W 0, in wic W 0 means tat W is a positive semidefinite matrix. Now, te objective function is obviously a convex function. Also, te trace constraints are linear in W. However, te rank constraint is non-convex. 3 We can relax tis optimization problem by dropping te rank constraint, wic is called SDR. Te resulting optimization problem is convex and can be solved efficiently using interior point metods, in polynomial time. We note tat SDR converts an NP-ard problem to a polynomial-time solvable problem. But tis analytical convenience comes at te expense of conversion of te globally optimal solution of te relaxed problem into a feasible solution of (22). Randomization is an effective metod for converting te solution of te relaxed problem to an approximate solution of te original problem [15], [16]. Unfortunately, even SDR is not applicable to (18) and (19), as teir objective functions can be neiter quadratic nor convex. IV. AN EFFICIENT HEURISTIC APPROACH FOR BEAMFORMING In te previous section, we explained tat te optimization problem (14) is ard to solve even wen te trust degree is fixed. Te main problem lies in te fact tat te resulting optimization formulation is not convex, wic does not lend itself to an analytically or numerically efficient solution. Likewise, te SDR metod is not applicable to tis problem in general. In order to alleviate tis problem, we propose an efficient euristic metodology to construct te beamforming vector and reduce te dimension of te optimum beamforming problem in tis section. Tis approac will lead to a numerically efficient solution for trust degree based beamforming in cooperative mobile data and social networks. Te optimization problem formulated in (14) clearly indicates tat te beamforming vector sould alter te values of γ SD and γ SR in a way to imize te transmission rates. On te oter and, from (3) and (4), we observe tat γ SD and γ SR are functions of and H, respectively. Tus, it is intuitive to expect an efficient construction of te beamforming vector based on te knowledge of and H. More concretely, te optimal sould be a vector in te span of te space generated by te columns of and H. One immediate solution to tis end would be te normalization of c + N r i=1 c i i, were i is te it column of H. However, suc a leads to an intractable form wen substituted back into (14), as and te i s are not necessarily ortogonal. A more amenable form would be obtained if an ortogonal basis of te subspace defined by tese vectors is used. Tis is te approac we follow below. Te ortogonal projection of H onto te column space of is given by Π H, were Π ( ) 1 is te standard ortogonal projection matrix [17]. 4 Since Π is a projection Π onto, it is easy to ceck tat eac column of H Π H is equal to. Also, te ortogonal projection of H onto te 3 Te sum of two rank-one matrices as generic rank two. 4 Let Π X X(X X) 1 X be te ortogonal projection onto te column space of X. Ten, Π X I Π X represents te ortogonal projection onto te ortogonal complement of te column space of X [17].

5 ortogonal complement column space of is given by Π H, were Π I Π. Next, let Π H [ 1 H 1 ] were 1 is te first column of Π H and H 1 contains te remaining N r 1 columns of Π H. We can find te ortogonal projection of H 1 onto te column space of 1 by Π 1 H 1, were Π 1 1 ( 1 1 ) 1 1. Likewise, te ortogonal projection of H 1 onto te ortogonal complement column space of 1 is given by Π 1 H 1. We now denote Π 1 H 1 [ 2 H 2 ] and find ortogonal projections of H 2 onto te column space and ortogonal complement column space of 2. We repeat tis procedure until H i becomes empty. Note tat i N r as Π H as N r (independent) columns at most. 5 At tis point, te ortogonalization process is completed and we can write w (23) w i i i, i {1,..., N r}. (24) By definition, we ave w wi, i.e., w.wi = 0 i {1,..., N r }. Te optimal structure of te beamforming vector is ten given by te following lemma. Teorem 2. Te transmit beamformer tat imizes te acievable rate in (10) can be represented as = N r γ 0 w + γi w i (25) i=1 in wic w and te w i s are ortonormal bases spanning te column space of and H, respectively, as defined in (23) and (24), and γ 0 + γ γ Nr = 1. Proof. We prove tis lemma by contradiction, similar to [7]. To simplify te proof, let us rewrite (25) as = γ 0 w + γ 0 w (26) in wic we define w 1 γ0 Nr i=1 γi w i. Next, suppose tat C Ns 1 is an optimal beamformer. Obviously, can be represented as = η 1 f 1 + η 2 f η Ns f Ns were te f i s form an ortonormal basis. Since w and w are ortonormal vectors, witout loss of generality, let f 1 = w and f 2 = w. Ten, we get = η 1 w + η 2 w + η 3 f η Ns f Ns (27) in wic f i w = 0 and f i w = 0 for i 3. Next, we argue tat η i sould be zero for any i 3. To tis end, we sow tat using as a beamformer, γ SD and γ SR do not depend on η i, i 3. Te former is rater simple as γ SD = t 2 P s = η 1 2 P s, in view of (27) and (23). It is also easy to verify tat γ SR = H t 2 P is independent of η i, i 3. To see tis, recall from te ortogonalization process in (24) tat te w i s form an ortonormal basis spanning te column space of H. Hence, eac column of H is a linear combination of te w i s, and tus, is ortogonal to f i for i 3 5 Here, we ave assumed N r N s. In general, i min{n r, N s}. due to te construction of te f i s in (27) and tat of w in (26). Tis means tat ŵ s = η 1 w + ˆη 2 w wit ˆη 2 = η 2 +η η Ns can strictly increase te optimum value of te data rate in (14) wen compared wit. But, tis contradicts te assumption tat is an optimal beamformer and not equal to. Terefore, any optimum beamformer must be equal to given in (26). Tis completes te proof. Remark 1. Note tat te problem as been largely simplified in Teorem 2 as only N r real numbers are to be determined wereas in te original problem we needed to find N s complex numbers. Note tat, in practical systems, N s N r and N r is usually 1, 2, or 4 as typical relay nodes are assumed to be network users rater tan being extra middle-boxes to elp for cooperative communication. Remark 2. For te MISO case (N r = 1), from (26), it is easy to see tat w = w 1. Ten, to determine in (25), we only need to find γ 0. We sould igligt tat tis case was studied in [7], were te autors found a closed-form solution for γ 0, based on an approximated acievable rate. However, te optimization problem in [7] is solved for a fixed α, i.e., α = α 1, wereas in Lemma 2 we proved tat te optimal α can be 0 or α 1. In addition, te solution obtained for γ 0 is only for an approximated acievable rate in te ig SNR regime, wic tends to lose its accuracy wen SNR values become smaller. V. NUMERICAL RESULTS We evaluate te performance of te proposed approac for generating beamforming vectors and compare it wit te existing scemes in tis section. For te purposes of simulation, we will assume tat te cannels, H and g are complex Gaussian vectors wose entries are independent and identical distributed (i.i.d.) Gaussian random variables wit zero means and variances σ 2, σ2 H, and σ2 g, respectively. Unlike [7], we optimize te exact acievable rate given by (14), not just a ig SNR approximation of tat. All graps are based on averaging over 10,000 cannel realizations. We first focus on te MISO case and compare our results wit tose of [7], for N s = 4 and (σ 2, σ2 H, σ2 g) = ( 5, 4, 10)dB. In Fig. 2, we sow te effect of optimizing over α rater tan fixing it at α = α 1, wic is te case in [7]. Recall from Lemma 2 tat α {0, α 1 }. Hence, we coose between α = 0 or α = α 1, wicever coice gives a better rate. In Fig. 2, we take α 1 = 0.7 and direct transmission refers to te case wit α = 0. Tis figure clearly sows tat using te imum trust degree (α 1 ) is not always te best approac to optimize data rates, and, depending on te cannel conditions, te transmission rate may increase by using a finetuned α smaller tan α 1. As can be seen in Fig. 3, tere is a visible gap between our sceme and te one proposed in [7] for different values of N s at all SNRs, altoug tis gap reduces as N s increases or te relay link becomes stronger. In Fig. 4, we consider te MIMO case and compare te acievable rates for different values of N r. Expectedly, as te

6 Acievable Rate (bps/hz) Optimized α Ryu et al. BF [7] Direct transmission Acievable Rate (bps/hz) Proposed BF (Nr =4) Proposed BF (Nr =2) Proposed BF (Nr =1) Direct transmission Transmission SNR (db) Fig. 2. Acievable rates for te MISO case wit N s = 4, N r = 1, α 1 = 0.7, and (σ 2, σ2 H, σ2 g ) = ( 5, 4, 10)dB Transmission SNR (db) Fig. 4. Acievable rates for te MIMO case wit α 1 = 0.7, (σ 2, σ2 H, σ2 g) = ( 5, 0, 10)dB, N s = 4, and different N r s. Acievable Rate (bps/hz) Proposed BF Ryu et al. BF [7] Direct transmission Ns=8 Ns= Transmission SNR (db) Fig. 3. Acievable rates for te MISO case (N r = 1) wit α 1 = 0.7 and (σ 2, σ2 H, σ2 g ) = ( 5, 4, 10)dB. number of antennas increases, te acievable rate goes up. VI. CONCLUSION We ave developed a trust degree based beamforming design formulation for multi-antenna cooperative communication. Observing tat imum trust degree may not result in te best rate performance, we ave optimized te acievable rate over te trust degrees as well as te beamforming vectors at te source and relay nodes. We ave proved tat te optimal beamforming vector is a linear combination of te direct and cooperating links beamforming vectors, respecting te trust degree. Unlike existing works, te proposed sceme as been developed for te MIMO setting and is applicable to any SNR regime. For te MISO case, our sceme noticeably improves te acievable rate over tose of te existing scemes. REFERENCES [1] X. Cen, X. Gong, L. Yang, and J. Zang, A social group utility imization framework wit applications in database assisted spectrum access, in Proc. IEEE INFOCOM, pp , [2] Y. Li, S. Su, and S. Cen, Social-aware resource allocation for device-to-device communications underlaying cellular networks, IEEE Wireless Communications Letters, vol. 4, no. 3, pp , [3] F. Wang, Y. Li, Z. Wang, and Z. Yang, Social-community-aware resource allocation for D2D communications underlaying cellular networks, IEEE Transactions on Veicular Tecnology, vol. 65, no. 5, pp , [4] Y. Li, T. Wu, P. Hui, D. Jin, and S. Cen, Social-aware D2D communications: Qualitative insigts and quantitative analysis, IEEE Communications Magazine, vol. 52, no. 6, pp , [5] A. Ometov et al., Toward trusted, social-aware D2D connectivity: Bridging across te tecnology and sociality realms, IEEE Wireless Communications, vol. 23, no. 4, pp , [6] B. Zang, Y. Li, D. Jin, P. Hui, and Z. Han, Social-aware peer discovery for D2D communications underlaying cellular networks, IEEE Transactions on Wireless Communications, vol. 14, no. 5, pp , [7] J. Y. Ryu, J. Lee, and T. Q. Quek, Trust degree based beamforming for MISO cooperative communication system, IEEE Communications Letters, vol. 19, no. 11, pp , [8] J. Y. Ryu and W. Coi, Balanced linear precoding in decode-andforward based MIMO relay communications, IEEE Transactions on Wireless Communications, vol. 10, no. 7, pp , [9] J. P. Coon, Modelling trust in random wireless networks, in Proc. 11t IEEE International Symposium on Wireless Communications Systems, pp , [10] X. Gong, L. Duan, X. Cen, and J. Zang, Wen social network effect meets congestion effect in wireless networks: Data usage equilibrium and optimal pricing, IEEE Journal on Selected Areas in Communications, vol. 35, no. 2, pp , [11] X. Cen, B. Proulx, X. Gong, and J. Zang, Exploiting social ties for cooperative D2D communications: A mobile social networking case, IEEE/ACM Transactions on Networking, vol. 23, no. 5, pp , [12] X. Tang and Y. Hua, Optimal design of non-regenerative MIMO wireless relays, IEEE Transactions on Wireless Communications, vol. 6, no. 4, [13] K. Xiong, P. Fan, Z. Xu, H.-C. Yang, and K. B. Letaief, Optimal cooperative beamforming design for MIMO decode-and-forward relay cannels, IEEE Transactions on Signal Processing, vol. 62, no. 6, pp , [14] T. Lo, Maximum ratio transmission, IEEE Transactions on Communications, vol. 47, no. 10, pp , [15] Z.-Q. Luo, W.-K. Ma, A. M.-C. So, Y. Ye, and S. Zang, Semidefinite relaxation of quadratic optimization problems, IEEE Signal Processing Magazine, vol. 27, no. 3, pp , [16] K. T. Pan, S. A. Vorobyov, N. D. Sidiropoulos, and C. Tellambura, Spectrum saring in wireless networks via QoS-aware secondary multicast beamforming, IEEE Transactions on signal processing, vol. 57, no. 6, pp , [17] G. A. F. Seber, A Matrix Handbook for Statisticians. Hoboken, NJ: Jon Wiley & Sons, 2008.

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Introduction Main Results Simulation Conclusions Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Mojtaba Vaezi joint work with H. Inaltekin, W. Shin, H. V. Poor, and

More information

Volume 29, Issue 3. Existence of competitive equilibrium in economies with multi-member households

Volume 29, Issue 3. Existence of competitive equilibrium in economies with multi-member households Volume 29, Issue 3 Existence of competitive equilibrium in economies wit multi-member ouseolds Noriisa Sato Graduate Scool of Economics, Waseda University Abstract Tis paper focuses on te existence of

More information

Multi-User Communication: Capacity, Duality, and Cooperation. Nihar Jindal Stanford University Dept. of Electrical Engineering

Multi-User Communication: Capacity, Duality, and Cooperation. Nihar Jindal Stanford University Dept. of Electrical Engineering Multi-User Communication: Capacity, Duality, and Cooperation Niar Jindal Stanford University Dept. of Electrical Engineering February 3, 004 Wireless Communication Vision Cellular Networks Wireless LAN

More information

Symmetry Labeling of Molecular Energies

Symmetry Labeling of Molecular Energies Capter 7. Symmetry Labeling of Molecular Energies Notes: Most of te material presented in tis capter is taken from Bunker and Jensen 1998, Cap. 6, and Bunker and Jensen 2005, Cap. 7. 7.1 Hamiltonian Symmetry

More information

Pre-Calculus Review Preemptive Strike

Pre-Calculus Review Preemptive Strike Pre-Calculus Review Preemptive Strike Attaced are some notes and one assignment wit tree parts. Tese are due on te day tat we start te pre-calculus review. I strongly suggest reading troug te notes torougly

More information

A = h w (1) Error Analysis Physics 141

A = h w (1) Error Analysis Physics 141 Introduction In all brances of pysical science and engineering one deals constantly wit numbers wic results more or less directly from experimental observations. Experimental observations always ave inaccuracies.

More information

1 The concept of limits (p.217 p.229, p.242 p.249, p.255 p.256) 1.1 Limits Consider the function determined by the formula 3. x since at this point

1 The concept of limits (p.217 p.229, p.242 p.249, p.255 p.256) 1.1 Limits Consider the function determined by the formula 3. x since at this point MA00 Capter 6 Calculus and Basic Linear Algebra I Limits, Continuity and Differentiability Te concept of its (p.7 p.9, p.4 p.49, p.55 p.56). Limits Consider te function determined by te formula f Note

More information

Material for Difference Quotient

Material for Difference Quotient Material for Difference Quotient Prepared by Stepanie Quintal, graduate student and Marvin Stick, professor Dept. of Matematical Sciences, UMass Lowell Summer 05 Preface Te following difference quotient

More information

Financial Econometrics Prof. Massimo Guidolin

Financial Econometrics Prof. Massimo Guidolin CLEFIN A.A. 2010/2011 Financial Econometrics Prof. Massimo Guidolin A Quick Review of Basic Estimation Metods 1. Were te OLS World Ends... Consider two time series 1: = { 1 2 } and 1: = { 1 2 }. At tis

More information

Recall from our discussion of continuity in lecture a function is continuous at a point x = a if and only if

Recall from our discussion of continuity in lecture a function is continuous at a point x = a if and only if Computational Aspects of its. Keeping te simple simple. Recall by elementary functions we mean :Polynomials (including linear and quadratic equations) Eponentials Logaritms Trig Functions Rational Functions

More information

Characterization of Relay Channels Using the Bhattacharyya Parameter

Characterization of Relay Channels Using the Bhattacharyya Parameter Caracterization of Relay Cannels Using te Battacaryya Parameter Josepine P. K. Cu, Andrew W. Ecford, and Raviraj S. Adve Dept. of Electrical and Computer Engineering, University of Toronto, Toronto, Ontario,

More information

Continuity and Differentiability Worksheet

Continuity and Differentiability Worksheet Continuity and Differentiability Workseet (Be sure tat you can also do te grapical eercises from te tet- Tese were not included below! Typical problems are like problems -3, p. 6; -3, p. 7; 33-34, p. 7;

More information

Lecture XVII. Abstract We introduce the concept of directional derivative of a scalar function and discuss its relation with the gradient operator.

Lecture XVII. Abstract We introduce the concept of directional derivative of a scalar function and discuss its relation with the gradient operator. Lecture XVII Abstract We introduce te concept of directional derivative of a scalar function and discuss its relation wit te gradient operator. Directional derivative and gradient Te directional derivative

More information

MA455 Manifolds Solutions 1 May 2008

MA455 Manifolds Solutions 1 May 2008 MA455 Manifolds Solutions 1 May 2008 1. (i) Given real numbers a < b, find a diffeomorpism (a, b) R. Solution: For example first map (a, b) to (0, π/2) and ten map (0, π/2) diffeomorpically to R using

More information

SECTION 3.2: DERIVATIVE FUNCTIONS and DIFFERENTIABILITY

SECTION 3.2: DERIVATIVE FUNCTIONS and DIFFERENTIABILITY (Section 3.2: Derivative Functions and Differentiability) 3.2.1 SECTION 3.2: DERIVATIVE FUNCTIONS and DIFFERENTIABILITY LEARNING OBJECTIVES Know, understand, and apply te Limit Definition of te Derivative

More information

Numerical Differentiation

Numerical Differentiation Numerical Differentiation Finite Difference Formulas for te first derivative (Using Taylor Expansion tecnique) (section 8.3.) Suppose tat f() = g() is a function of te variable, and tat as 0 te function

More information

Quantum Mechanics Chapter 1.5: An illustration using measurements of particle spin.

Quantum Mechanics Chapter 1.5: An illustration using measurements of particle spin. I Introduction. Quantum Mecanics Capter.5: An illustration using measurements of particle spin. Quantum mecanics is a teory of pysics tat as been very successful in explaining and predicting many pysical

More information

3. THE EXCHANGE ECONOMY

3. THE EXCHANGE ECONOMY Essential Microeconomics -1-3. THE EXCHNGE ECONOMY Pareto efficient allocations 2 Edgewort box analysis 5 Market clearing prices 13 Walrasian Equilibrium 16 Equilibrium and Efficiency 22 First welfare

More information

EFFICIENCY OF MODEL-ASSISTED REGRESSION ESTIMATORS IN SAMPLE SURVEYS

EFFICIENCY OF MODEL-ASSISTED REGRESSION ESTIMATORS IN SAMPLE SURVEYS Statistica Sinica 24 2014, 395-414 doi:ttp://dx.doi.org/10.5705/ss.2012.064 EFFICIENCY OF MODEL-ASSISTED REGRESSION ESTIMATORS IN SAMPLE SURVEYS Jun Sao 1,2 and Seng Wang 3 1 East Cina Normal University,

More information

Service Outage Based Power and Rate Allocation

Service Outage Based Power and Rate Allocation 1 Service Outage Based Power and Rate Allocation Jiangong Luo, Lang Lin, Roy Yates, and Predrag Spasojević Abstract Tis paper combines te concepts of ergodic capacity and capacity versus outage for fading

More information

232 Calculus and Structures

232 Calculus and Structures 3 Calculus and Structures CHAPTER 17 JUSTIFICATION OF THE AREA AND SLOPE METHODS FOR EVALUATING BEAMS Calculus and Structures 33 Copyrigt Capter 17 JUSTIFICATION OF THE AREA AND SLOPE METHODS 17.1 THE

More information

A MONTE CARLO ANALYSIS OF THE EFFECTS OF COVARIANCE ON PROPAGATED UNCERTAINTIES

A MONTE CARLO ANALYSIS OF THE EFFECTS OF COVARIANCE ON PROPAGATED UNCERTAINTIES A MONTE CARLO ANALYSIS OF THE EFFECTS OF COVARIANCE ON PROPAGATED UNCERTAINTIES Ronald Ainswort Hart Scientific, American Fork UT, USA ABSTRACT Reports of calibration typically provide total combined uncertainties

More information

NUMERICAL DIFFERENTIATION. James T. Smith San Francisco State University. In calculus classes, you compute derivatives algebraically: for example,

NUMERICAL DIFFERENTIATION. James T. Smith San Francisco State University. In calculus classes, you compute derivatives algebraically: for example, NUMERICAL DIFFERENTIATION James T Smit San Francisco State University In calculus classes, you compute derivatives algebraically: for example, f( x) = x + x f ( x) = x x Tis tecnique requires your knowing

More information

Department of Statistics & Operations Research, Aligarh Muslim University, Aligarh, India

Department of Statistics & Operations Research, Aligarh Muslim University, Aligarh, India Open Journal of Optimization, 04, 3, 68-78 Publised Online December 04 in SciRes. ttp://www.scirp.org/ournal/oop ttp://dx.doi.org/0.436/oop.04.34007 Compromise Allocation for Combined Ratio Estimates of

More information

MAT244 - Ordinary Di erential Equations - Summer 2016 Assignment 2 Due: July 20, 2016

MAT244 - Ordinary Di erential Equations - Summer 2016 Assignment 2 Due: July 20, 2016 MAT244 - Ordinary Di erential Equations - Summer 206 Assignment 2 Due: July 20, 206 Full Name: Student #: Last First Indicate wic Tutorial Section you attend by filling in te appropriate circle: Tut 0

More information

WYSE Academic Challenge 2004 Sectional Mathematics Solution Set

WYSE Academic Challenge 2004 Sectional Mathematics Solution Set WYSE Academic Callenge 00 Sectional Matematics Solution Set. Answer: B. Since te equation can be written in te form x + y, we ave a major 5 semi-axis of lengt 5 and minor semi-axis of lengt. Tis means

More information

Polynomial Interpolation

Polynomial Interpolation Capter 4 Polynomial Interpolation In tis capter, we consider te important problem of approximatinga function fx, wose values at a set of distinct points x, x, x,, x n are known, by a polynomial P x suc

More information

Copyright c 2008 Kevin Long

Copyright c 2008 Kevin Long Lecture 4 Numerical solution of initial value problems Te metods you ve learned so far ave obtained closed-form solutions to initial value problems. A closedform solution is an explicit algebriac formula

More information

How to Find the Derivative of a Function: Calculus 1

How to Find the Derivative of a Function: Calculus 1 Introduction How to Find te Derivative of a Function: Calculus 1 Calculus is not an easy matematics course Te fact tat you ave enrolled in suc a difficult subject indicates tat you are interested in te

More information

Complexity of Decoding Positive-Rate Reed-Solomon Codes

Complexity of Decoding Positive-Rate Reed-Solomon Codes Complexity of Decoding Positive-Rate Reed-Solomon Codes Qi Ceng 1 and Daqing Wan 1 Scool of Computer Science Te University of Oklaoma Norman, OK73019 Email: qceng@cs.ou.edu Department of Matematics University

More information

HOMEWORK HELP 2 FOR MATH 151

HOMEWORK HELP 2 FOR MATH 151 HOMEWORK HELP 2 FOR MATH 151 Here we go; te second round of omework elp. If tere are oters you would like to see, let me know! 2.4, 43 and 44 At wat points are te functions f(x) and g(x) = xf(x)continuous,

More information

Poisson Equation in Sobolev Spaces

Poisson Equation in Sobolev Spaces Poisson Equation in Sobolev Spaces OcMountain Dayligt Time. 6, 011 Today we discuss te Poisson equation in Sobolev spaces. It s existence, uniqueness, and regularity. Weak Solution. u = f in, u = g on

More information

Consider a function f we ll specify which assumptions we need to make about it in a minute. Let us reformulate the integral. 1 f(x) dx.

Consider a function f we ll specify which assumptions we need to make about it in a minute. Let us reformulate the integral. 1 f(x) dx. Capter 2 Integrals as sums and derivatives as differences We now switc to te simplest metods for integrating or differentiating a function from its function samples. A careful study of Taylor expansions

More information

Exercises for numerical differentiation. Øyvind Ryan

Exercises for numerical differentiation. Øyvind Ryan Exercises for numerical differentiation Øyvind Ryan February 25, 2013 1. Mark eac of te following statements as true or false. a. Wen we use te approximation f (a) (f (a +) f (a))/ on a computer, we can

More information

Solving Continuous Linear Least-Squares Problems by Iterated Projection

Solving Continuous Linear Least-Squares Problems by Iterated Projection Solving Continuous Linear Least-Squares Problems by Iterated Projection by Ral Juengling Department o Computer Science, Portland State University PO Box 75 Portland, OR 977 USA Email: juenglin@cs.pdx.edu

More information

Differentiation in higher dimensions

Differentiation in higher dimensions Capter 2 Differentiation in iger dimensions 2.1 Te Total Derivative Recall tat if f : R R is a 1-variable function, and a R, we say tat f is differentiable at x = a if and only if te ratio f(a+) f(a) tends

More information

MIMO decorrelation for visible light communication based on angle optimization

MIMO decorrelation for visible light communication based on angle optimization MIMO decorrelation for visible ligt communication based on angle optimization Haiyong Zang, and Yijun Zu Citation: AIP Conference Proceedings 80, 09005 (07); View online: ttps://doi.org/0.03/.4977399 View

More information

The derivative function

The derivative function Roberto s Notes on Differential Calculus Capter : Definition of derivative Section Te derivative function Wat you need to know already: f is at a point on its grap and ow to compute it. Wat te derivative

More information

5 Ordinary Differential Equations: Finite Difference Methods for Boundary Problems

5 Ordinary Differential Equations: Finite Difference Methods for Boundary Problems 5 Ordinary Differential Equations: Finite Difference Metods for Boundary Problems Read sections 10.1, 10.2, 10.4 Review questions 10.1 10.4, 10.8 10.9, 10.13 5.1 Introduction In te previous capters we

More information

ERROR BOUNDS FOR THE METHODS OF GLIMM, GODUNOV AND LEVEQUE BRADLEY J. LUCIER*

ERROR BOUNDS FOR THE METHODS OF GLIMM, GODUNOV AND LEVEQUE BRADLEY J. LUCIER* EO BOUNDS FO THE METHODS OF GLIMM, GODUNOV AND LEVEQUE BADLEY J. LUCIE* Abstract. Te expected error in L ) attimet for Glimm s sceme wen applied to a scalar conservation law is bounded by + 2 ) ) /2 T

More information

Some Review Problems for First Midterm Mathematics 1300, Calculus 1

Some Review Problems for First Midterm Mathematics 1300, Calculus 1 Some Review Problems for First Midterm Matematics 00, Calculus. Consider te trigonometric function f(t) wose grap is sown below. Write down a possible formula for f(t). Tis function appears to be an odd,

More information

More on generalized inverses of partitioned matrices with Banachiewicz-Schur forms

More on generalized inverses of partitioned matrices with Banachiewicz-Schur forms More on generalized inverses of partitioned matrices wit anaciewicz-scur forms Yongge Tian a,, Yosio Takane b a Cina Economics and Management cademy, Central University of Finance and Economics, eijing,

More information

MANY scientific and engineering problems can be

MANY scientific and engineering problems can be A Domain Decomposition Metod using Elliptical Arc Artificial Boundary for Exterior Problems Yajun Cen, and Qikui Du Abstract In tis paper, a Diriclet-Neumann alternating metod using elliptical arc artificial

More information

The Complexity of Computing the MCD-Estimator

The Complexity of Computing the MCD-Estimator Te Complexity of Computing te MCD-Estimator Torsten Bernolt Lerstul Informatik 2 Universität Dortmund, Germany torstenbernolt@uni-dortmundde Paul Fiscer IMM, Danisc Tecnical University Kongens Lyngby,

More information

4. The slope of the line 2x 7y = 8 is (a) 2/7 (b) 7/2 (c) 2 (d) 2/7 (e) None of these.

4. The slope of the line 2x 7y = 8 is (a) 2/7 (b) 7/2 (c) 2 (d) 2/7 (e) None of these. Mat 11. Test Form N Fall 016 Name. Instructions. Te first eleven problems are wort points eac. Te last six problems are wort 5 points eac. For te last six problems, you must use relevant metods of algebra

More information

1. Questions (a) through (e) refer to the graph of the function f given below. (A) 0 (B) 1 (C) 2 (D) 4 (E) does not exist

1. Questions (a) through (e) refer to the graph of the function f given below. (A) 0 (B) 1 (C) 2 (D) 4 (E) does not exist Mat 1120 Calculus Test 2. October 18, 2001 Your name Te multiple coice problems count 4 points eac. In te multiple coice section, circle te correct coice (or coices). You must sow your work on te oter

More information

INTRODUCTION AND MATHEMATICAL CONCEPTS

INTRODUCTION AND MATHEMATICAL CONCEPTS INTODUCTION ND MTHEMTICL CONCEPTS PEVIEW Tis capter introduces you to te basic matematical tools for doing pysics. You will study units and converting between units, te trigonometric relationsips of sine,

More information

Continuity and Differentiability of the Trigonometric Functions

Continuity and Differentiability of the Trigonometric Functions [Te basis for te following work will be te definition of te trigonometric functions as ratios of te sides of a triangle inscribed in a circle; in particular, te sine of an angle will be defined to be te

More information

Order of Accuracy. ũ h u Ch p, (1)

Order of Accuracy. ũ h u Ch p, (1) Order of Accuracy 1 Terminology We consider a numerical approximation of an exact value u. Te approximation depends on a small parameter, wic can be for instance te grid size or time step in a numerical

More information

Fast Explicit and Unconditionally Stable FDTD Method for Electromagnetic Analysis Jin Yan, Graduate Student Member, IEEE, and Dan Jiao, Fellow, IEEE

Fast Explicit and Unconditionally Stable FDTD Method for Electromagnetic Analysis Jin Yan, Graduate Student Member, IEEE, and Dan Jiao, Fellow, IEEE Tis article as been accepted for inclusion in a future issue of tis journal. Content is final as presented, wit te exception of pagination. IEEE TRANSACTIONS ON MICROWAVE THEORY AND TECHNIQUES 1 Fast Explicit

More information

158 Calculus and Structures

158 Calculus and Structures 58 Calculus and Structures CHAPTER PROPERTIES OF DERIVATIVES AND DIFFERENTIATION BY THE EASY WAY. Calculus and Structures 59 Copyrigt Capter PROPERTIES OF DERIVATIVES. INTRODUCTION In te last capter you

More information

INTRODUCTION AND MATHEMATICAL CONCEPTS

INTRODUCTION AND MATHEMATICAL CONCEPTS Capter 1 INTRODUCTION ND MTHEMTICL CONCEPTS PREVIEW Tis capter introduces you to te basic matematical tools for doing pysics. You will study units and converting between units, te trigonometric relationsips

More information

Efficient algorithms for for clone items detection

Efficient algorithms for for clone items detection Efficient algoritms for for clone items detection Raoul Medina, Caroline Noyer, and Olivier Raynaud Raoul Medina, Caroline Noyer and Olivier Raynaud LIMOS - Université Blaise Pascal, Campus universitaire

More information

Polynomial Interpolation

Polynomial Interpolation Capter 4 Polynomial Interpolation In tis capter, we consider te important problem of approximating a function f(x, wose values at a set of distinct points x, x, x 2,,x n are known, by a polynomial P (x

More information

Cubic Functions: Local Analysis

Cubic Functions: Local Analysis Cubic function cubing coefficient Capter 13 Cubic Functions: Local Analysis Input-Output Pairs, 378 Normalized Input-Output Rule, 380 Local I-O Rule Near, 382 Local Grap Near, 384 Types of Local Graps

More information

Superconvergence of energy-conserving discontinuous Galerkin methods for. linear hyperbolic equations. Abstract

Superconvergence of energy-conserving discontinuous Galerkin methods for. linear hyperbolic equations. Abstract Superconvergence of energy-conserving discontinuous Galerkin metods for linear yperbolic equations Yong Liu, Ci-Wang Su and Mengping Zang 3 Abstract In tis paper, we study superconvergence properties of

More information

Numerical Experiments Using MATLAB: Superconvergence of Nonconforming Finite Element Approximation for Second-Order Elliptic Problems

Numerical Experiments Using MATLAB: Superconvergence of Nonconforming Finite Element Approximation for Second-Order Elliptic Problems Applied Matematics, 06, 7, 74-8 ttp://wwwscirporg/journal/am ISSN Online: 5-7393 ISSN Print: 5-7385 Numerical Experiments Using MATLAB: Superconvergence of Nonconforming Finite Element Approximation for

More information

Preface. Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Preface. Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my course tat I teac ere at Lamar University. Despite te fact tat tese are my class notes, tey sould be accessible to anyone wanting to learn or needing a refreser

More information

THE IDEA OF DIFFERENTIABILITY FOR FUNCTIONS OF SEVERAL VARIABLES Math 225

THE IDEA OF DIFFERENTIABILITY FOR FUNCTIONS OF SEVERAL VARIABLES Math 225 THE IDEA OF DIFFERENTIABILITY FOR FUNCTIONS OF SEVERAL VARIABLES Mat 225 As we ave seen, te definition of derivative for a Mat 111 function g : R R and for acurveγ : R E n are te same, except for interpretation:

More information

Quaternion Dynamics, Part 1 Functions, Derivatives, and Integrals. Gary D. Simpson. rev 01 Aug 08, 2016.

Quaternion Dynamics, Part 1 Functions, Derivatives, and Integrals. Gary D. Simpson. rev 01 Aug 08, 2016. Quaternion Dynamics, Part 1 Functions, Derivatives, and Integrals Gary D. Simpson gsim1887@aol.com rev 1 Aug 8, 216 Summary Definitions are presented for "quaternion functions" of a quaternion. Polynomial

More information

A First-Order System Approach for Diffusion Equation. I. Second-Order Residual-Distribution Schemes

A First-Order System Approach for Diffusion Equation. I. Second-Order Residual-Distribution Schemes A First-Order System Approac for Diffusion Equation. I. Second-Order Residual-Distribution Scemes Hiroaki Nisikawa W. M. Keck Foundation Laboratory for Computational Fluid Dynamics, Department of Aerospace

More information

Digital Filter Structures

Digital Filter Structures Digital Filter Structures Te convolution sum description of an LTI discrete-time system can, in principle, be used to implement te system For an IIR finite-dimensional system tis approac is not practical

More information

MAT Calculus for Engineers I EXAM #1

MAT Calculus for Engineers I EXAM #1 MAT 65 - Calculus for Engineers I EXAM # Instructor: Liu, Hao Honor Statement By signing below you conrm tat you ave neiter given nor received any unautorized assistance on tis eam. Tis includes any use

More information

3.4 Worksheet: Proof of the Chain Rule NAME

3.4 Worksheet: Proof of the Chain Rule NAME Mat 1170 3.4 Workseet: Proof of te Cain Rule NAME Te Cain Rule So far we are able to differentiate all types of functions. For example: polynomials, rational, root, and trigonometric functions. We are

More information

NONLINEAR SYSTEMS IDENTIFICATION USING THE VOLTERRA MODEL. Georgeta Budura

NONLINEAR SYSTEMS IDENTIFICATION USING THE VOLTERRA MODEL. Georgeta Budura NONLINEAR SYSTEMS IDENTIFICATION USING THE VOLTERRA MODEL Georgeta Budura Politenica University of Timisoara, Faculty of Electronics and Telecommunications, Comm. Dep., georgeta.budura@etc.utt.ro Abstract:

More information

Click here to see an animation of the derivative

Click here to see an animation of the derivative Differentiation Massoud Malek Derivative Te concept of derivative is at te core of Calculus; It is a very powerful tool for understanding te beavior of matematical functions. It allows us to optimize functions,

More information

THE STURM-LIOUVILLE-TRANSFORMATION FOR THE SOLUTION OF VECTOR PARTIAL DIFFERENTIAL EQUATIONS. L. Trautmann, R. Rabenstein

THE STURM-LIOUVILLE-TRANSFORMATION FOR THE SOLUTION OF VECTOR PARTIAL DIFFERENTIAL EQUATIONS. L. Trautmann, R. Rabenstein Worksop on Transforms and Filter Banks (WTFB),Brandenburg, Germany, Marc 999 THE STURM-LIOUVILLE-TRANSFORMATION FOR THE SOLUTION OF VECTOR PARTIAL DIFFERENTIAL EQUATIONS L. Trautmann, R. Rabenstein Lerstul

More information

Inf sup testing of upwind methods

Inf sup testing of upwind methods INTERNATIONAL JOURNAL FOR NUMERICAL METHODS IN ENGINEERING Int. J. Numer. Met. Engng 000; 48:745 760 Inf sup testing of upwind metods Klaus-Jurgen Bate 1; ;, Dena Hendriana 1, Franco Brezzi and Giancarlo

More information

lecture 26: Richardson extrapolation

lecture 26: Richardson extrapolation 43 lecture 26: Ricardson extrapolation 35 Ricardson extrapolation, Romberg integration Trougout numerical analysis, one encounters procedures tat apply some simple approximation (eg, linear interpolation)

More information

Bayesian ML Sequence Detection for ISI Channels

Bayesian ML Sequence Detection for ISI Channels Bayesian ML Sequence Detection for ISI Cannels Jill K. Nelson Department of Electrical and Computer Engineering George Mason University Fairfax, VA 030 Email: jnelson@gmu.edu Andrew C. Singer Department

More information

4.2 - Richardson Extrapolation

4.2 - Richardson Extrapolation . - Ricardson Extrapolation. Small-O Notation: Recall tat te big-o notation used to define te rate of convergence in Section.: Definition Let x n n converge to a number x. Suppose tat n n is a sequence

More information

Explicit Interleavers for a Repeat Accumulate Accumulate (RAA) code construction

Explicit Interleavers for a Repeat Accumulate Accumulate (RAA) code construction Eplicit Interleavers for a Repeat Accumulate Accumulate RAA code construction Venkatesan Gurusami Computer Science and Engineering University of Wasington Seattle, WA 98195, USA Email: venkat@csasingtonedu

More information

1. Consider the trigonometric function f(t) whose graph is shown below. Write down a possible formula for f(t).

1. Consider the trigonometric function f(t) whose graph is shown below. Write down a possible formula for f(t). . Consider te trigonometric function f(t) wose grap is sown below. Write down a possible formula for f(t). Tis function appears to be an odd, periodic function tat as been sifted upwards, so we will use

More information

On the Identifiability of the Post-Nonlinear Causal Model

On the Identifiability of the Post-Nonlinear Causal Model UAI 9 ZHANG & HYVARINEN 647 On te Identifiability of te Post-Nonlinear Causal Model Kun Zang Dept. of Computer Science and HIIT University of Helsinki Finland Aapo Hyvärinen Dept. of Computer Science,

More information

1 Calculus. 1.1 Gradients and the Derivative. Q f(x+h) f(x)

1 Calculus. 1.1 Gradients and the Derivative. Q f(x+h) f(x) Calculus. Gradients and te Derivative Q f(x+) δy P T δx R f(x) 0 x x+ Let P (x, f(x)) and Q(x+, f(x+)) denote two points on te curve of te function y = f(x) and let R denote te point of intersection of

More information

Math 1241 Calculus Test 1

Math 1241 Calculus Test 1 February 4, 2004 Name Te first nine problems count 6 points eac and te final seven count as marked. Tere are 120 points available on tis test. Multiple coice section. Circle te correct coice(s). You do

More information

= 0 and states ''hence there is a stationary point'' All aspects of the proof dx must be correct (c)

= 0 and states ''hence there is a stationary point'' All aspects of the proof dx must be correct (c) Paper 1: Pure Matematics 1 Mark Sceme 1(a) (i) (ii) d d y 3 1x 4x x M1 A1 d y dx 1.1b 1.1b 36x 48x A1ft 1.1b Substitutes x = into teir dx (3) 3 1 4 Sows d y 0 and states ''ence tere is a stationary point''

More information

Teaching Differentiation: A Rare Case for the Problem of the Slope of the Tangent Line

Teaching Differentiation: A Rare Case for the Problem of the Slope of the Tangent Line Teacing Differentiation: A Rare Case for te Problem of te Slope of te Tangent Line arxiv:1805.00343v1 [mat.ho] 29 Apr 2018 Roman Kvasov Department of Matematics University of Puerto Rico at Aguadilla Aguadilla,

More information

Taylor Series and the Mean Value Theorem of Derivatives

Taylor Series and the Mean Value Theorem of Derivatives 1 - Taylor Series and te Mean Value Teorem o Derivatives Te numerical solution o engineering and scientiic problems described by matematical models oten requires solving dierential equations. Dierential

More information

ACCURATE SYNTHESIS FORMULAS OBTAINED BY USING A DIFFERENTIAL EVOLUTION ALGORITHM FOR CONDUCTOR-BACKED COPLANAR WAVEG- UIDES

ACCURATE SYNTHESIS FORMULAS OBTAINED BY USING A DIFFERENTIAL EVOLUTION ALGORITHM FOR CONDUCTOR-BACKED COPLANAR WAVEG- UIDES Progress In Electromagnetics Researc M, Vol. 10, 71 81, 2009 ACCURATE SYNTHESIS FORMULAS OBTAINED BY USING A DIFFERENTIAL EVOLUTION ALGORITHM FOR CONDUCTOR-BACKED COPLANAR WAVEG- UIDES S. Kaya, K. Guney,

More information

Precalculus Test 2 Practice Questions Page 1. Note: You can expect other types of questions on the test than the ones presented here!

Precalculus Test 2 Practice Questions Page 1. Note: You can expect other types of questions on the test than the ones presented here! Precalculus Test 2 Practice Questions Page Note: You can expect oter types of questions on te test tan te ones presented ere! Questions Example. Find te vertex of te quadratic f(x) = 4x 2 x. Example 2.

More information

arxiv: v2 [quant-ph] 24 Oct 2016

arxiv: v2 [quant-ph] 24 Oct 2016 Projecting 3D color codes onto 3D toric codes Arun B. Alosious and Pradeep Kiran Sarvepalli Department of Electrical Engineering, Indian Institute of Tecnology Madras, Cennai 600 036, India (Dated: October

More information

SPECTRUM SHARING IN WIRELESS NETWORKS: A QOS-AWARE SECONDARY MULTICAST APPROACH WITH WORST USER PERFORMANCE OPTIMIZATION

SPECTRUM SHARING IN WIRELESS NETWORKS: A QOS-AWARE SECONDARY MULTICAST APPROACH WITH WORST USER PERFORMANCE OPTIMIZATION SPECTRUM SHARING IN WIRELESS NETWORKS: A QOS-AWARE SECONDARY MULTICAST APPROACH WITH WORST USER PERFORMANCE OPTIMIZATION Khoa T. Phan, Sergiy A. Vorobyov, Nicholas D. Sidiropoulos, and Chintha Tellambura

More information

AN ANALYSIS OF THE EMBEDDED DISCONTINUOUS GALERKIN METHOD FOR SECOND ORDER ELLIPTIC PROBLEMS

AN ANALYSIS OF THE EMBEDDED DISCONTINUOUS GALERKIN METHOD FOR SECOND ORDER ELLIPTIC PROBLEMS AN ANALYSIS OF THE EMBEDDED DISCONTINUOUS GALERKIN METHOD FOR SECOND ORDER ELLIPTIC PROBLEMS BERNARDO COCKBURN, JOHNNY GUZMÁN, SEE-CHEW SOON, AND HENRYK K. STOLARSKI Abstract. Te embedded discontinuous

More information

Quantum Numbers and Rules

Quantum Numbers and Rules OpenStax-CNX module: m42614 1 Quantum Numbers and Rules OpenStax College Tis work is produced by OpenStax-CNX and licensed under te Creative Commons Attribution License 3.0 Abstract Dene quantum number.

More information

2.11 That s So Derivative

2.11 That s So Derivative 2.11 Tat s So Derivative Introduction to Differential Calculus Just as one defines instantaneous velocity in terms of average velocity, we now define te instantaneous rate of cange of a function at a point

More information

Chapter 2 Limits and Continuity

Chapter 2 Limits and Continuity 4 Section. Capter Limits and Continuity Section. Rates of Cange and Limits (pp. 6) Quick Review.. f () ( ) () 4 0. f () 4( ) 4. f () sin sin 0 4. f (). 4 4 4 6. c c c 7. 8. c d d c d d c d c 9. 8 ( )(

More information

3.2 THE FUNDAMENTAL WELFARE THEOREMS

3.2 THE FUNDAMENTAL WELFARE THEOREMS Essential Microeconomics -1-3.2 THE FUNDMENTL WELFRE THEOREMS Walrasian Equilibrium 2 First welfare teorem 3 Second welfare teorem (conve, differentiable economy) 12 Te omotetic preference 2 2 economy

More information

THE ROYAL STATISTICAL SOCIETY GRADUATE DIPLOMA EXAMINATION MODULE 5

THE ROYAL STATISTICAL SOCIETY GRADUATE DIPLOMA EXAMINATION MODULE 5 THE ROYAL STATISTICAL SOCIETY GRADUATE DIPLOMA EXAMINATION NEW MODULAR SCHEME introduced from te examinations in 009 MODULE 5 SOLUTIONS FOR SPECIMEN PAPER B THE QUESTIONS ARE CONTAINED IN A SEPARATE FILE

More information

Derivatives of Exponentials

Derivatives of Exponentials mat 0 more on derivatives: day 0 Derivatives of Eponentials Recall tat DEFINITION... An eponential function as te form f () =a, were te base is a real number a > 0. Te domain of an eponential function

More information

Optimal parameters for a hierarchical grid data structure for contact detection in arbitrarily polydisperse particle systems

Optimal parameters for a hierarchical grid data structure for contact detection in arbitrarily polydisperse particle systems Comp. Part. Mec. 04) :357 37 DOI 0.007/s4057-04-000-9 Optimal parameters for a ierarcical grid data structure for contact detection in arbitrarily polydisperse particle systems Dinant Krijgsman Vitaliy

More information

Time (hours) Morphine sulfate (mg)

Time (hours) Morphine sulfate (mg) Mat Xa Fall 2002 Review Notes Limits and Definition of Derivative Important Information: 1 According to te most recent information from te Registrar, te Xa final exam will be eld from 9:15 am to 12:15

More information

LIMITS AND DERIVATIVES CONDITIONS FOR THE EXISTENCE OF A LIMIT

LIMITS AND DERIVATIVES CONDITIONS FOR THE EXISTENCE OF A LIMIT LIMITS AND DERIVATIVES Te limit of a function is defined as te value of y tat te curve approaces, as x approaces a particular value. Te limit of f (x) as x approaces a is written as f (x) approaces, as

More information

arxiv: v1 [math.na] 20 Nov 2018

arxiv: v1 [math.na] 20 Nov 2018 An HDG Metod for Tangential Boundary Control of Stokes Equations I: Hig Regularity Wei Gong Weiwei Hu Mariano Mateos Jon R. Singler Yangwen Zang arxiv:1811.08522v1 [mat.na] 20 Nov 2018 November 22, 2018

More information

Continuity. Example 1

Continuity. Example 1 Continuity MATH 1003 Calculus and Linear Algebra (Lecture 13.5) Maoseng Xiong Department of Matematics, HKUST A function f : (a, b) R is continuous at a point c (a, b) if 1. x c f (x) exists, 2. f (c)

More information

ALGEBRA AND TRIGONOMETRY REVIEW by Dr TEBOU, FIU. A. Fundamental identities Throughout this section, a and b denotes arbitrary real numbers.

ALGEBRA AND TRIGONOMETRY REVIEW by Dr TEBOU, FIU. A. Fundamental identities Throughout this section, a and b denotes arbitrary real numbers. ALGEBRA AND TRIGONOMETRY REVIEW by Dr TEBOU, FIU A. Fundamental identities Trougout tis section, a and b denotes arbitrary real numbers. i) Square of a sum: (a+b) =a +ab+b ii) Square of a difference: (a-b)

More information

The Verlet Algorithm for Molecular Dynamics Simulations

The Verlet Algorithm for Molecular Dynamics Simulations Cemistry 380.37 Fall 2015 Dr. Jean M. Standard November 9, 2015 Te Verlet Algoritm for Molecular Dynamics Simulations Equations of motion For a many-body system consisting of N particles, Newton's classical

More information

Robotic manipulation project

Robotic manipulation project Robotic manipulation project Bin Nguyen December 5, 2006 Abstract Tis is te draft report for Robotic Manipulation s class project. Te cosen project aims to understand and implement Kevin Egan s non-convex

More information

MATH745 Fall MATH745 Fall

MATH745 Fall MATH745 Fall MATH745 Fall 5 MATH745 Fall 5 INTRODUCTION WELCOME TO MATH 745 TOPICS IN NUMERICAL ANALYSIS Instructor: Dr Bartosz Protas Department of Matematics & Statistics Email: bprotas@mcmasterca Office HH 36, Ext

More information

Bootstrap confidence intervals in nonparametric regression without an additive model

Bootstrap confidence intervals in nonparametric regression without an additive model Bootstrap confidence intervals in nonparametric regression witout an additive model Dimitris N. Politis Abstract Te problem of confidence interval construction in nonparametric regression via te bootstrap

More information