Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE)
|
|
- Colleen Welch
- 6 years ago
- Views:
Transcription
1 KAUST Reository Outage erformance of cognitive radio systems with Imroer Gaussian signaling Item tye Authors Erint version DOI Publisher Journal Rights Conference Paer Amin Osama; Abediseid Walid; Alouini Mohamed-Slim Post-rint.9/ISIT Institute of Electrical and Electronics Engineers IEEE 5 IEEE International Symosium on Information Theory ISIT c 5 IEEE. Personal use of this material is ermitted. Permission from IEEE must be obtained for all other users including rerinting/ reublishing this material for advertising or romotional uroses creating new collective works for resale or redistribution to servers or lists or reuse of any coyrighted comonents of this work in other works. Downloaded 8-Ar-8 9:36: Link to item htt://hdl.handle.net/754/579495
2 Outage Performance of Cognitive Radio Systems with Imroer Gaussian Signaling Osama Amin Walid Abediseid and Mohamed-Slim Alouini Comuter Electrical and Mathematical Sciences and Engineering CEMSE Division King Abdullah University of Science and Technology KAUST Thuwal Makkah Province Saudi Arabia. {osama.amin walid.abediseid Abstract Imroer Gaussian signaling has roved its ability to imrove the achievable rate of the systems that suffer from interference comared with roer Gaussian signaling. In this aer we first study imact of imroer Gaussian signaling on the erformance of the cognitive radio system by analyzing the outage robability of both the rimary user PU and the secondary user SU. We derive exact ression of the SU outage robability and uer and lower bounds for the PU outage robability. Then we design the SU signal by adjusting its transmitted ower and the circularity coefficient to minimize the SU outage robability while maintaining a certain PU quality-ofservice. Finally we evaluate the roosed bounds and adative algorithms by numerical results. I. INTRODUCTION The innovative rogress of wireless technology results in a roliferation of attractive wireless devices and diversity of services. In this era of the massive demand for data throughut and traffic the shortage of sectrum resources can limit significantly the wireless network erformance. Cognitive radio CR is a hierarchical dynamic sectrum access technique that can meet the market demand and solve the sectrum scarcity roblem. CR allows secondary users SU i.e. unlicensed users to access the sectrum as long as they do not affect the transmission quality of the rimary users PU i.e. licensed users. The cognitive techniques are achieved by either defining transmission eriods for SU as in overlay and interweave methods or by limiting the SU ower to avoid unaccetable interference levels at the PU as in the underlay method []. Adoting the underlay technique steers the research focus to mitigate the interference received at the PU end from the SU. Mitigating the interference in communication systems is a challenging research roblem and receives a lot of attention. Recently statistical signal characteristics are shown to affect significantly the maximum achievable rate. Different from the usual assumtion of roer Gaussian signaling which imose comlex signal with uncorrelated real and imaginary comonents and equal ower for each comonents imroer Gaussian signaling is shown to increase the achievable rate over interference channels systems []. Proer signaling term was introduced in the information theory field for the first time by Neeser and Massey in [3] where they defined new second order statistics quantity called seudo-covariance to fully describe the roertness of any comlex random variable besides the well known conventional The work of M.-S. Alouini was suorted by the Qatar National Research Fund a member of Qatar Foundation under NPRP Grant NPRP The statements made herein are solely the resonsibility of the authors. covariance. To study the imact of the imroer Gaussian signaling on communication systems Taubök investigated the influence of imroer Gaussian signaling on information theoretic quantities such as entroy divergence and caacity [4]. In cognitive radio research imroer Gaussian signaling is emloyed in [5] where the PU is assumed to have roer Gaussian signaling since there is no control uon it. On the other hand the SU is assumed to use imroer Gaussian signaling and have access on instantaneous channel state information of both the PU and SU communication channels. The instantaneous achievable rate of both PU and SU are studied then the SU ower and the circularity coefficient are adjusted to maximize its rate while achieving the PU qualityof-service QoS. In this aer we study the outage robability of underlay CR with imroer Gaussian signaling assumtions at the SU. We derive a closed form ression for the SU outage robability and uer and lower bounds of the outage robability for the PU. Different from [5] where erfect CSI for all links are assumed to be known at the SU nodes we assume a ractical scenario where only average CSI is available at the SU nodes. Then we adjust the SU ower and circularity coefficient to maximize the SU rate while satisfying PU QoS. A. Preliminaries II. SYSTEM DESCRIPTION Consider a zero mean scalar random variable x whose conventional variance is defined as σx = E[ x ] and its seudo-variance is defined as σ x = E[x ] [3]. Definition : [3] [6] A comlex random variable is called roer if its seudo-variance is equal to zero otherwise it is called imroer. Definition : [7] The imroriety degree of x is measured by the circularity coefficient that is defined as C x = σ x /σ x where C x C x = denotes roer signal and C x = denotes maximally imroer signal. B. Underlay Cognitive Radio System We assume a sectrum sharing system consisting of SU air of transmitter and secondary receiver that coexist with another licensed communication air of the PU. The communication channels via all links are modelled as Rayleigh fading channels and the noise at the receivers end is modelled an additive white zero-mean circularly symmetric comlex Gaussian with variance σ. The SU transmitter needs to adjust its ower s without exceeding the maximum allowable interference level
3 at the PU receiver. The received signal at the PU is ressed as y = h x + s g s x s + n where is the PU transmitted ower x is the PU transmitted symbols which is assumed to be roer zero mean Gaussian signal with unity variance x s is the SU signal with circularity coefficient C x h is the fading channel of the PU transmission g s is the SU interfering channel to the PU and n is the noise at the PU receiver. Similarly the SU received signal is ressed as y s = s h s x s + g x + n s where h s is the SU direct link channel g is the PU interfering channel to the SU and n s is the noise at the SU. As a result of the imroer Gaussian signaling the achievable rate of the PU is ressed as [5] [8] R s C x = log + h σ + s g s + C log y CI 3 where C y and C I are the circularity coefficients of the received and interference-lus-noise signals at the PU resectively which are given by s g s C x C y = s g s + h + σ C I = s g s C x s g s + σ. 4 From 3 and 4 we observe that the PU rate in imroer Gaussian signaling is always higher than the roer Gaussian signaling case i.e. C x =. In the later the second term in 3 vanishes while in the former it gives always a ositive value which increases the rate of the PU. After some maniulations R s C x can be written as R s C x = s g s log + h + σ s g s 4 Cx σ + s g s s g s 4 Cx 5 where the circularity coefficient of the interference-lus-noise terms equals zero. As for the SU the circularity coefficient of the interference term equals zero thus the SU achievable rate is ressed as R s s C x = log s h s 4 Cx g + σ + s hs g + σ +. III. OUTAGE PROBABILITY ANALYSIS The error erformance achieved by the otimal coding and decoding strategies is limited by the so-called outage robability. In this section the overall outage robability of our system is analyzed in details. A. Secondary User Outage Probability Let R s be defined as the target rate of the SU channel. The outage robability of the SU P outs is defined as 6 P outs s C x = Pr [R s s C x < R s ]. 7 Substituting 6 in 7 we get [ ] s C x γ s P outs s C x = Pr + I + sγs Γ s < + I 8 where Γ s = Rs γ s = h s /σ is an onential random variable that reresents the direct-channel-to-noiseratio of the SU with mean E{γ s } = γ s and I = g /σ is an onential random variable with mean E{I } = I that reresents the interference-channel-to-noise-ratio of the PU on the SU. By solving the inequality that aears inside the robability of 8 one can show that the conditional SU outage robability conditioned on I is given by P outs s C x I = γso γ s xγs dx 9 where γ so = I+ s C + x Γs Cx reresents the non-negative root that satisfies the inequality in 8. By evaluating 9 we get P outs s C x I = I + Cx Ψ s C x where Ψ s C x = + Γs Cx / s γ s. By averaging over the onential statistics of I we obtain P outs s C x = E I {P outs s C x I } = C x C x + I Ψ s C x Ψ s C x C x For C x = the above outage robability reduces to P outs s =. + I Ψ s Ψ s On the other extreme when C x yields Γs P outs s = lim Poutss Cx = sγ s. 3 C x + IΓs sγ s B. Primary User Outage Probability Similar to the above subsection our goal here is to find a closed form for the PU outage robability in terms of the signal and channels arameters. Let R be defined as the target rate of the SU channel. The outage robability of the PU P out s C x is defined as P out s C x = Pr [R s C x < R ]. 4 Substituting 5 in 4 we get [ P out s C x = Pr γ + s + γ ] Γ [ si s + s Cx ] < 5 where Γ = R γ = h /σ is an onential random variable that reresents the direct-channel-to-noiseratio of the PU with mean E{γ } = γ and = g s /σ is an onential random variable with mean E{ } = that reresents the interference-channel-to-noise-ratio of the SU on the PU. By solving the inequality that aears inside the robability of 5 one can show that the conditional SU outage robability conditioned on is given by P out s C x = γ o /γ 6
4 [ where γ o = sis+ + Γ sc x/ s + ] reresents the root that satisfies the inequality in 5. Averaging 6 over the statistics of we get P out s C x = E Is {P out s C x } = z sz + Ψ Cx sz + sz dz 7 where Ψ x = + Γ [ x ] / γ. Obtaining a closed form ression for the aforementioned integral is very difficult excet for C x = where it reduces to P out s = Ψ + s Ψ. 8 For all values of C x i.e. for imroer Gaussian signaling we will resort to deriving lower and uer bounds of the PU outage robability to rovide us with PU outage robability behavior limits. Lower Bound of the PU Outage Probability: One way to lower bound the PU outage robability is by using the fact that for z we have s z/ + s z. In this case we may lower bound P out s C x for any value of C x as P out s C x = z sz + Ψ C x dz Ψ Cx = Pout LB s C x. 9 + sψ C x Uer Bound of the PU Outage Probability: An uer bound can be obtained for z where we have that s z/ + s z. However the drawback of using the above bound is that the deendency of the outage ression on the imortant imroer arameter C x will vanish and result in a loose PU outage robability uer bound. To obtain a tighter bound we slit the integral in 7 as follows P out s C x = zis P out s C x = zdz a + zis P out s C = zdz zis sz + Ψ dz zis Cx s sz + Ψ dz + s = P UB out s C x where a follows from using the fact that for z we have sz + sz in the first integral and the fact that for z we have sz + s sz + s in the second integral. Evaluating both integrals we get + Ψ Pout UB I s s s C x = + Ψ + sψ + sψ + Ψ I s s + sψ C x + C x +. The best uer bound can be obtained by finding the value of that minimizes P UB out s C x P UB out s C x = min which can equivalently found from [ ] Cx + Ψ Ψ + sis Cx sψ + P UB out s C x + γ + γ Ψ Cx + sis C γ Γ x Cx sψ + =. 3 Assuming the we obtain the aroximate ression Ψ I s s P out s C x = + + sψ Ψ Ψ + sψ I C s s x. 4 + sψ C x IV. SU ADAPTIVE SIGNAL ADJUSTMENT In this section we aim to adjust the SU signal arameters s and C x to imrove the SU erformance measured by the outage robability while maintaining redetermined PU QoS reresented in an outage robability threshold of a target rate. According to the PU ersective the system is designed to achieve a target QoS considering an accetable interference margin. In this case P outth is ressed in term of the maximum interference ower P int as ] P outth = Pr [log + h < R σ + P int = + Imax + Γ 5 γ where I max = P int /σ is the maximum allowable interference-to-noise ratio at the PU receiver end. Thus the PU should adjust its ower according to = + I max γ log P outth + Γ. 6 As a result the SU has to consider the PU design conditions while adjusting its signal arameters. For the design urose we consider different cases in the following subsections. A. Proer Gaussian signaling Design For the roer signaling case the SU system adjusts s to suress its interference to the PU to be within the accetable margin. In other words s needs to be comuted such that P out s satisfy a redefined outage threshold P outth for a given rate R which is ressed as P outth = + s Ψ Ψ. 7 After some simlifications s is found to be s = Ψ P outth Ψ P outth. 8 From 8 and 7 the SU can oerate while satisfying the PU QoS requirements if Ψ > P outth which is valid as long as the maximum marginal interference-to-noise ratio does not equal zero otherwise the SU remains silent.
5 B. Imroer Gaussian signaling Design For the imroer Gaussian signaling case we have an additional design arameter i.e. C x which controls the signal imroriety. Thus we ect to have an infinite s C x set that satisfy the PU QoS. This design flexibility gives us the oortunity to consider another objective to imrove in addition to achieving the PU erformance requirement. In this work the SU signal arameters s and C x is adatably comuted to minimize the SU outage robability while satisfying the PU QoS i.e. P out s C x P outth. For this urose we formulate the following otimization roblem min P outs s C x s C x s.t. P out s C x P outth s smax C x where smax is the maximum SU transmitter ower budget. To simlify this roblem we use the bounds derived in the revious section and obtain the following simlified roblems. Lower-bound-based design: Thanks to the simlified PU lower bound ression obtained in 9 we can obtain s that can satisfy the PU QoS i.e. Pout LB s C x = P outth in terms of C x and P outth as s C x = Ψ C x P outth Ψ C x P outth. 9 In this case we observe that Ψ C x > P outth is always valid which means that the SU may always transmit. In the same time increasing the signal imroriety results in a large increase of s which should be considered carefully to meet the maximum SU ower budget. Based on 9 and the outage robability of the SU can be ressed in terms of C x. Therefore we obtain the following simlified otimization roblem min C x P outs C x subject to C x < s C x smax 3 to comute C x then we can find s from 9. To solve 3 first we can rove that P outs C x is monotonically decreasing in C x while s C x is monotonically increasing in C x. Thus the SU can achieve lower outage if it uses maximally imroer signal with the maximum ossible transmitted ower. As a result the lower bound ower solution is smax and the corresonding C x is comuted from Algorithm I where C o is comuted from C o = + [ { } /Is s + γ Γ Γ W γ ] P outth s s and W {.} is the Lambert-W function [9]. Algorithm I : Inut smax γ Γ and P outth. : if smax then 3: C x 4: else 5: C x C o 6: end if Uer-bound-based design: Uer bound ression can be used to simlify the design roblem by imosing the PU outage constraint on the derived uer bound in 4 i.e. Pout UB s C x = P outth. As a result C x can be ressed in terms of s as + C x = + Γ [ γ + γ { }] + /Is s Γ s + W P outth Λ s s 3 where Λ s is defined as Ψ + Λ s = + sψ sis Ψ. 3 + sψ Algorithm II : Inut smax γ Γ and P outth. : if smax then 3: C x 4: s smax 5: else 6: if C x smax > then 7: C x 8: s C x s 9: else : s smax : C x C x smax : end if 3: end if Alternatively if we wish to use the PU outage robability aroximate ression to obtain another simlified otimization roblem we follow similar stes to that of the uer bound and obtain C x in terms of s as C x s = + + γ / I s s Γ Γ W P outth µ s where µ s is defined as µ s = Ψ + sψ Ψ s + sψ γ s ] Then the SU signal arameters can be obtained using the aroximate formula 33 in Algorithm II. V. NUMERICAL RESULTS In this section we comare the PU outage robability bounds with the exact ressions. Then we use these bounds to design the SU signal arameters to minimize the SU outage while satisfying the PU QoS. Examle : This examle assumes that the PU is working to achieve R = b/sec with = W. Fig. lots the PU outage robability versus γ based on the exact value comuted from 7 lower bound 9 uer bound and the aroximate ression 4. The SU is assumed to have s = W C x =.5 and = 5 db. is assumed to be comuted from 3. We observe that the bounds is tight
6 Exact Lower bound Uer bound Aroximate = db - Lower bound Uer bound Aroximate Proer Gaussian - Pout =5dB Pouts =db - =db - =5dB γ γ s Fig.. A comarison between the exact PU outage robability lower bound uer bound and aroximate ressions versus γ s for = 5 db. Fig.. SU outage robability for roer and imroer Gaussian signaling versus γ s for = 5 db. to the exact PU outage robability for different ranges of γ and γ. Similar results are observed at different target rates. Examle : To examine the SU imroer Gaussian signal design we first assume the PU ower is adjusted to achieve a rate of b/sec with outage of. considering I max = db. The communication channels are assumed to have γ = db I = 3 db and = db and 5 db. The SU roer Gaussian design adjusts the ower according to 8 without violating the SU ower budget smax = W and the PU QoS requirements. The imroer SU signal design is based on either Algorithm I for lower bound or Algorithm II uer bound and aroximate ression. Fig. shows the SU outage robability versus γ s for different values. For = db all bounds reduces to the roer Gaussian signaling design because the SU interference signal ower is comarable to maximum allowable interference margin at the PU hence roer signaling tends to use the maximum ower. Therefore the imroer Gaussian signaling system cannot increase the imroriety degree because it will be at the cost of increasing the transmitted ower which cannot be achieved. On the other hand when the SU interference channel to the PU is strong the roer signaling design tends to use less ower to meet the PU QoS while imroer signaling design uses more ower to imrove its outage erformance and comensate its effect on the PU by increasing the signal imroriety. Fig. shows a -3 db imrovement of imroer Gaussian signaling over the roer Gaussian signaling design. VI. CONCLUSION In this aer we studied the outage robability of underlay cognitive radio system with imroer Gaussian signaling. We derived closed form ression for the SU outage robability and tight bounds for the PU. Based on the derived ressions and using the average CSI we adjusted the SU ower and circularity coefficient to imrove its erformance measured in terms of the outage robability while satisfying the PU QoS and meeting the SU ower budget. The simulation results show that the benefit of imroer Gaussian signaling system over the roer Gaussian signaling increases as the interference-tonoise ratio of the SU to the PU increases. REFERENCES [] Q. Zhao and B. M. Sadler A survey of dynamic sectrum access IEEE Signal Process. Mag. vol. 4 no May 7. [] Y. Zeng C. M. Yetis E. Gunawan Y. L. Guan and R. Zhang Transmit otimization with imroer Gaussian signaling for interference channels IEEE Trans. Signal Process. vol. 6 no Jun. 3. [3] F. D. Neeser and J. L. Massey Proer comlex random rocesses with alications to information theory IEEE Trans. Inf. Theory vol. 39 no Jul [4] G. Tauböck Comlex-valued random vectors and channels: entroy divergence and caacity IEEE Trans. Inf. Theory vol. 58 no May. [5] C. Lameiro I. Santamaria and P. Schreier Benefits of imroer signaling for underlay cognitive radio IEE Wireless Commun. Lett. vol. 4 no.. 5 Feb. 5. [6] P. J. Schreier and L. L. Scharf Statistical signal rocessing of comlexvalued data: the theory of imroer and noncircular signals. Cambridge University Press. [7] S. Lagen A. Agustin and J. Vidal Imroer Gaussian signaling for the Z-interferece channel in in Proc. IEEE International Conference on Acoustics Seech and Signal Processing ICASSP [8] Y. Zeng R. Zhang E. Gunawan and Y. L. Guan Otimized transmission with imroer Gaussian signaling in the K-user MISO interference channel IEEE Trans. Wireless Commun. vol. no Dec. 3. [9] R. M. Corless G. H. Gonnet D. E. Hare D. J. Jeffrey and D. E. Knuth On the lambertw function Advances in Comutational Mathematics vol. 5 no Dec. 996.
Sharing the Licensed Spectrum of Full-Duplex Systems using Improper Gaussian Signaling
Sharing the Licensed Spectrum of Full-Duple Systems using Improper Gaussian Signaling Mohamed Gaafar, Osama Amin, Walid Abediseid, and Mohamed-Slim Alouini Computer, Electrical and Mathematical Sciences
More informations v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4
Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work
More informationOptimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI
Otimal Power Control over Fading Cognitive Radio Channels by Exloiting Primary User CSI Rui Zhang Abstract arxiv:0804.67v2 [cs.it] 7 Feb 2009 This aer is concerned with sectrum sharing cognitive radio
More informationOn the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting
On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,
More informationA Unified Framework for GLRT-Based Spectrum Sensing of Signals with Covariance Matrices with Known Eigenvalue Multiplicities
A Unified Framework for GLRT-Based Sectrum Sensing of Signals with Covariance Matrices with Known Eigenvalue Multilicities Erik Axell and Erik G. Larsson Linköing University Post Print N.B.: When citing
More informationOptimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging
1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014
More informationOn Code Design for Simultaneous Energy and Information Transfer
On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter
More informationMATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK
Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment
More information4. Score normalization technical details We now discuss the technical details of the score normalization method.
SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules
More informationOptimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging
Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie Wireless Intelligent Networks Center WINC, Nile University,
More informationA MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION
O P E R A T I O N S R E S E A R C H A N D D E C I S I O N S No. 27 DOI:.5277/ord73 Nasrullah KHAN Muhammad ASLAM 2 Kyung-Jun KIM 3 Chi-Hyuck JUN 4 A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST
More informationMODEL-BASED MULTIPLE FAULT DETECTION AND ISOLATION FOR NONLINEAR SYSTEMS
MODEL-BASED MULIPLE FAUL DEECION AND ISOLAION FOR NONLINEAR SYSEMS Ivan Castillo, and homas F. Edgar he University of exas at Austin Austin, X 78712 David Hill Chemstations Houston, X 77009 Abstract A
More informationAnalyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems
Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Hsiao-Lan Chiang, Tobias Kadur, and Gerhard Fettweis Vodafone Chair for Mobile Communications Technische Universität
More informationTraining sequence optimization for frequency selective channels with MAP equalization
532 ISCCSP 2008, Malta, 12-14 March 2008 raining sequence otimization for frequency selective channels with MAP equalization Imed Hadj Kacem, Noura Sellami Laboratoire LEI ENIS, Route Sokra km 35 BP 3038
More informationFeedback-error control
Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller
More informationA Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression
Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi
More informationConvex Optimization methods for Computing Channel Capacity
Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem
More informationECE 534 Information Theory - Midterm 2
ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You
More informationThe decision-feedback equalizer optimization for Gaussian noise
Journal of Theoretical and Alied Comuter Science Vol. 8 No. 4 4. 5- ISSN 99-634 (rinted 3-5653 (online htt://www.jtacs.org The decision-feedback eualizer otimization for Gaussian noise Arkadiusz Grzbowski
More informationAn Analysis of TCP over Random Access Satellite Links
An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance
More informationImproved Capacity Bounds for the Binary Energy Harvesting Channel
Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,
More informationNew Information Measures for the Generalized Normal Distribution
Information,, 3-7; doi:.339/info3 OPEN ACCESS information ISSN 75-7 www.mdi.com/journal/information Article New Information Measures for the Generalized Normal Distribution Christos P. Kitsos * and Thomas
More informationCombining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)
Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment
More informationCoding Along Hermite Polynomials for Gaussian Noise Channels
Coding Along Hermite olynomials for Gaussian Noise Channels Emmanuel A. Abbe IG, EFL Lausanne, 1015 CH Email: emmanuel.abbe@efl.ch Lizhong Zheng LIDS, MIT Cambridge, MA 0139 Email: lizhong@mit.edu Abstract
More informationShadow Computing: An Energy-Aware Fault Tolerant Computing Model
Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms
More informationMODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More informationRobust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System
Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology
More informationAn Investigation on the Numerical Ill-conditioning of Hybrid State Estimators
An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical
More informationDistributed K-means over Compressed Binary Data
1 Distributed K-means over Comressed Binary Data Elsa DUPRAZ Telecom Bretagne; UMR CNRS 6285 Lab-STICC, Brest, France arxiv:1701.03403v1 [cs.it] 12 Jan 2017 Abstract We consider a networ of binary-valued
More informationKEY ISSUES IN THE ANALYSIS OF PILES IN LIQUEFYING SOILS
4 th International Conference on Earthquake Geotechnical Engineering June 2-28, 27 KEY ISSUES IN THE ANALYSIS OF PILES IN LIQUEFYING SOILS Misko CUBRINOVSKI 1, Hayden BOWEN 1 ABSTRACT Two methods for analysis
More informationDecoding Linear Block Codes Using a Priority-First Search: Performance Analysis and Suboptimal Version
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 3, MAY 1998 133 Decoding Linear Block Codes Using a Priority-First Search Performance Analysis Subotimal Version Yunghsiang S. Han, Member, IEEE, Carlos
More informationImproper Gaussian signaling for
Improper Gaussian signaling for multiple-access channels in underlay cognitive radio Christian Lameiro, Member, IEEE, Ignacio Santamaría, Senior Member, IEEE, arxiv:7.09768v [cs.it] 27 Nov 207 and Peter
More informationConvolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code.
Convolutional Codes Goals Lecture Be able to encode using a convolutional code Be able to decode a convolutional code received over a binary symmetric channel or an additive white Gaussian channel Convolutional
More informationMobility-Induced Service Migration in Mobile. Micro-Clouds
arxiv:503054v [csdc] 7 Mar 205 Mobility-Induced Service Migration in Mobile Micro-Clouds Shiiang Wang, Rahul Urgaonkar, Ting He, Murtaza Zafer, Kevin Chan, and Kin K LeungTime Oerating after ossible Deartment
More informationOptimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 29 proceedings Optimal Power Allocation for Cognitive Radio
More informationAn Adaptive Three-bus Power System Equivalent for Estimating Voltage Stability Margin from Synchronized Phasor Measurements
An Adative Three-bus Power System Equivalent for Estimating oltage Stability argin from Synchronized Phasor easurements Fengkai Hu, Kai Sun University of Tennessee Knoxville, TN, USA fengkaihu@utk.edu
More informationAnalysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks
Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their
More informationCharacterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations
Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of
More informationSpatial Outage Capacity of Poisson Bipolar Networks
Satial Outage Caacity of Poisson Biolar Networks Sanket S. Kalamkar and Martin Haenggi Deartment of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556, USA E-mail: skalamka@nd.edu,
More informationNon-orthogonal Multiple Access in Large-Scale. Underlay Cognitive Radio Networks
Non-orthogonal Multile Access in Large-Scale 1 Underlay Cognitive Radio Networks Yuanwei Liu, Zhiguo Ding, Maged Elkashlan, and Jinhong Yuan Abstract In this aer, non-orthogonal multile access (NOMA is
More informationMulti-Channel MAC Protocol for Full-Duplex Cognitive Radio Networks with Optimized Access Control and Load Balancing
Multi-Channel MAC Protocol for Full-Dulex Cognitive Radio etworks with Otimized Access Control and Load Balancing Le Thanh Tan and Long Bao Le arxiv:.3v [cs.it] Feb Abstract In this aer, we roose a multi-channel
More informationDamage Identification from Power Spectrum Density Transmissibility
6th Euroean Worksho on Structural Health Monitoring - h.3.d.3 More info about this article: htt://www.ndt.net/?id=14083 Damage Identification from Power Sectrum Density ransmissibility Y. ZHOU, R. PERERA
More informationBeamspace MIMO-NOMA for Millimeter-Wave Communications Using Lens Antenna Arrays
Beamsace MIMO-NOMA for Millimeter-Wave Communications Using Lens Antenna Arrays Bichai Wang 1, Linglong Dai 1,XiqiGao, and Lajos anzo 3 1 Tsinghua National Laboratory for Information Science and Technology
More informationAge of Information: Whittle Index for Scheduling Stochastic Arrivals
Age of Information: Whittle Index for Scheduling Stochastic Arrivals Yu-Pin Hsu Deartment of Communication Engineering National Taiei University yuinhsu@mail.ntu.edu.tw arxiv:80.03422v2 [math.oc] 7 Ar
More informationDegrees-of-Freedom for the 4-User SISO Interference Channel with Improper Signaling
Degrees-of-Freedom for the -User SISO Interference Channel with Improper Signaling C Lameiro and I Santamaría Dept of Communications Engineering University of Cantabria 9005 Santander Cantabria Spain Email:
More informationPlotting the Wilson distribution
, Survey of English Usage, University College London Setember 018 1 1. Introduction We have discussed the Wilson score interval at length elsewhere (Wallis 013a, b). Given an observed Binomial roortion
More information2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S.
-D Analysis for Iterative Learning Controller for Discrete-ime Systems With Variable Initial Conditions Yong FANG, and ommy W. S. Chow Abstract In this aer, an iterative learning controller alying to linear
More informationThe Noise Power Ratio - Theory and ADC Testing
The Noise Power Ratio - Theory and ADC Testing FH Irons, KJ Riley, and DM Hummels Abstract This aer develos theory behind the noise ower ratio (NPR) testing of ADCs. A mid-riser formulation is used for
More informationUniversal Finite Memory Coding of Binary Sequences
Deartment of Electrical Engineering Systems Universal Finite Memory Coding of Binary Sequences Thesis submitted towards the degree of Master of Science in Electrical and Electronic Engineering in Tel-Aviv
More informationAI*IA 2003 Fusion of Multiple Pattern Classifiers PART III
AI*IA 23 Fusion of Multile Pattern Classifiers PART III AI*IA 23 Tutorial on Fusion of Multile Pattern Classifiers by F. Roli 49 Methods for fusing multile classifiers Methods for fusing multile classifiers
More informationLDPC codes for the Cascaded BSC-BAWGN channel
LDPC codes for the Cascaded BSC-BAWGN channel Aravind R. Iyengar, Paul H. Siegel, and Jack K. Wolf University of California, San Diego 9500 Gilman Dr. La Jolla CA 9093 email:aravind,siegel,jwolf@ucsd.edu
More informationPartial Identification in Triangular Systems of Equations with Binary Dependent Variables
Partial Identification in Triangular Systems of Equations with Binary Deendent Variables Azeem M. Shaikh Deartment of Economics University of Chicago amshaikh@uchicago.edu Edward J. Vytlacil Deartment
More informationDistributed Rule-Based Inference in the Presence of Redundant Information
istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced
More informationAnalysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel
Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict
More informationBäckström, Tom; Fischer, Johannes Fast Randomization for Distributed Low-Bitrate Coding of Speech and Audio
Powered by TCPDF (www.tcdf.org) This is an electronic rerint of the original article. This rerint may differ from the original in agination and tyograhic detail. Bäckström, Tom; Fischer, Johannes Fast
More informationOn the capacity of the general trapdoor channel with feedback
On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:
More informationLower bound solutions for bearing capacity of jointed rock
Comuters and Geotechnics 31 (2004) 23 36 www.elsevier.com/locate/comgeo Lower bound solutions for bearing caacity of jointed rock D.J. Sutcliffe a, H.S. Yu b, *, S.W. Sloan c a Deartment of Civil, Surveying
More informationCHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules
CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is
More informationControllability and Resiliency Analysis in Heat Exchanger Networks
609 A ublication of CHEMICAL ENGINEERING RANSACIONS VOL. 6, 07 Guest Editors: Petar S Varbanov, Rongxin Su, Hon Loong Lam, Xia Liu, Jiří J Klemeš Coyright 07, AIDIC Servizi S.r.l. ISBN 978-88-95608-5-8;
More informationIterative Methods for Designing Orthogonal and Biorthogonal Two-channel FIR Filter Banks with Regularities
R. Bregović and T. Saramäi, Iterative methods for designing orthogonal and biorthogonal two-channel FIR filter bans with regularities, Proc. Of Int. Worsho on Sectral Transforms and Logic Design for Future
More informationCFD AS A DESIGN TOOL FOR FLUID POWER COMPONENTS
CFD AS A DESIGN TOOL FOR FLUID POWER COMPONENTS M. BORGHI - M. MILANI Diartimento di Scienze dell Ingegneria Università degli Studi di Modena Via Cami, 213/b 41100 Modena E-mail: borghi@omero.dsi.unimo.it
More informationResearch Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces
Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and
More informationPaper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation
Paer C Exact Volume Balance Versus Exact Mass Balance in Comositional Reservoir Simulation Submitted to Comutational Geosciences, December 2005. Exact Volume Balance Versus Exact Mass Balance in Comositional
More informationTopic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar
15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider
More informationNew Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms
New Schedulability Test Conditions for Non-reemtive Scheduling on Multirocessor Platforms Technical Reort May 2008 Nan Guan 1, Wang Yi 2, Zonghua Gu 3 and Ge Yu 1 1 Northeastern University, Shenyang, China
More informationFinite Mixture EFA in Mplus
Finite Mixture EFA in Mlus November 16, 2007 In this document we describe the Mixture EFA model estimated in Mlus. Four tyes of deendent variables are ossible in this model: normally distributed, ordered
More informationA Recursive Block Incomplete Factorization. Preconditioner for Adaptive Filtering Problem
Alied Mathematical Sciences, Vol. 7, 03, no. 63, 3-3 HIKARI Ltd, www.m-hiari.com A Recursive Bloc Incomlete Factorization Preconditioner for Adative Filtering Problem Shazia Javed School of Mathematical
More informationSome Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., DECEMBER 4 336 Some Unitary Sace Time Codes From Shere Packing Theory With Otimal Diversity Product of Code Size Haiquan Wang, Genyuan Wang, and Xiang-Gen
More informationDelay Performance of Threshold Policies for Dynamic Spectrum Access
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO. 7, JULY 83 Delay Performance of Threshold Policies for Dynamic Sectrum Access Rong-Rong Chen and Xin Liu Abstract In this aer, we analyze the delay
More informationq-ary Symmetric Channel for Large q
List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu
More informationFormal Modeling in Cognitive Science Lecture 29: Noisy Channel Model and Applications;
Formal Modeling in Cognitive Science Lecture 9: and ; ; Frank Keller School of Informatics University of Edinburgh keller@inf.ed.ac.uk Proerties of 3 March, 6 Frank Keller Formal Modeling in Cognitive
More informationEquivalence of Wilson actions
Prog. Theor. Ex. Phys. 05, 03B0 7 ages DOI: 0.093/te/tv30 Equivalence of Wilson actions Physics Deartment, Kobe University, Kobe 657-850, Jaan E-mail: hsonoda@kobe-u.ac.j Received June 6, 05; Revised August
More informationx and y suer from two tyes of additive noise [], [3] Uncertainties e x, e y, where the only rior knowledge is their boundedness and zero mean Gaussian
A New Estimator for Mixed Stochastic and Set Theoretic Uncertainty Models Alied to Mobile Robot Localization Uwe D. Hanebeck Joachim Horn Institute of Automatic Control Engineering Siemens AG, Cororate
More informationThe Nottingham eprints service makes this work by researchers of the University of Nottingham available open access under the following conditions.
Harvey, David I. and Leybourne, Stehen J. and Taylor, A.M. Robert (04) On infimum Dickey Fuller unit root tests allowing for a trend break under the null. Comutational Statistics & Data Analysis, 78..
More informationOpportunistic Spectrum Access in Multiple Primary User Environments Under the Packet Collision Constraint
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. Y, 1 Oortunistic Sectrum Access in Multile Primary User Environments Under the Packet Collision Constraint Eric Jung, Student Member, IEEE, and Xin Liu,
More informationModeling and Estimation of Full-Chip Leakage Current Considering Within-Die Correlation
6.3 Modeling and Estimation of Full-Chi Leaage Current Considering Within-Die Correlation Khaled R. eloue, Navid Azizi, Farid N. Najm Deartment of ECE, University of Toronto,Toronto, Ontario, Canada {haled,nazizi,najm}@eecg.utoronto.ca
More informationState Estimation with ARMarkov Models
Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,
More informationEE 508 Lecture 13. Statistical Characterization of Filter Characteristics
EE 508 Lecture 3 Statistical Characterization of Filter Characteristics Comonents used to build filters are not recisely redictable L C Temerature Variations Manufacturing Variations Aging Model variations
More informationTIME-FREQUENCY BASED SENSOR FUSION IN THE ASSESSMENT AND MONITORING OF MACHINE PERFORMANCE DEGRADATION
Proceedings of IMECE 0 00 ASME International Mechanical Engineering Congress & Exosition New Orleans, Louisiana, November 17-, 00 IMECE00-MED-303 TIME-FREQUENCY BASED SENSOR FUSION IN THE ASSESSMENT AND
More informationDetermination of the Best Apodization Function and Grating Length of Linearly Chirped Fiber Bragg Grating for Dispersion Compensation
84 JOURNAL OF COMMUNICATIONS, VOL. 7, NO., NOVEMBER Determination of the Best Aodization Function and Grating Length of Linearly Chired Fiber Bragg Grating for Disersion Comensation Sher Shermin A. Khan
More informationRobust Beamforming via Matrix Completion
Robust Beamforming via Matrix Comletion Shunqiao Sun and Athina P. Petroulu Deartment of Electrical and Comuter Engineering Rutgers, the State University of Ne Jersey Piscataay, Ne Jersey 8854-858 Email:
More informationOn Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm
On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm Gabriel Noriega, José Restreo, Víctor Guzmán, Maribel Giménez and José Aller Universidad Simón Bolívar Valle de Sartenejas,
More informationAn Analysis of Reliable Classifiers through ROC Isometrics
An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit
More informationMonopolist s mark-up and the elasticity of substitution
Croatian Oerational Research Review 377 CRORR 8(7), 377 39 Monoolist s mark-u and the elasticity of substitution Ilko Vrankić, Mira Kran, and Tomislav Herceg Deartment of Economic Theory, Faculty of Economics
More informationA Time-Varied Probabilistic ON/OFF Switching Algorithm for Cellular Networks
A Time-Varied Probabilistic ON/OFF Switching Algorithm for Cellular Networks Item Type Article Authors Rached, Nadhir B.; Ghazzai, Hakim; Kadri, Abdullah; Alouini, Mohamed-Slim Citation Rached NB, Ghazzai
More informationVision Graph Construction in Wireless Multimedia Sensor Networks
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Conference and Worksho Paers Comuter Science and Engineering, Deartment of 21 Vision Grah Construction in Wireless Multimedia
More informationDeformation Effect Simulation and Optimization for Double Front Axle Steering Mechanism
0 4th International Conference on Comuter Modeling and Simulation (ICCMS 0) IPCSIT vol. (0) (0) IACSIT Press, Singaore Deformation Effect Simulation and Otimization for Double Front Axle Steering Mechanism
More informationEXACTLY PERIODIC SUBSPACE DECOMPOSITION BASED APPROACH FOR IDENTIFYING TANDEM REPEATS IN DNA SEQUENCES
EXACTLY ERIODIC SUBSACE DECOMOSITION BASED AROACH FOR IDENTIFYING TANDEM REEATS IN DNA SEUENCES Ravi Guta, Divya Sarthi, Ankush Mittal, and Kuldi Singh Deartment of Electronics & Comuter Engineering, Indian
More informationLower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data
Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment
More informationA PEAK FACTOR FOR PREDICTING NON-GAUSSIAN PEAK RESULTANT RESPONSE OF WIND-EXCITED TALL BUILDINGS
The Seventh Asia-Pacific Conference on Wind Engineering, November 8-1, 009, Taiei, Taiwan A PEAK FACTOR FOR PREDICTING NON-GAUSSIAN PEAK RESULTANT RESPONSE OF WIND-EXCITED TALL BUILDINGS M.F. Huang 1,
More informationAnytime communication over the Gilbert-Eliot channel with noiseless feedback
Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anant Sahai, Salman Avestimehr, Paolo Minero Deartment of Electrical Engineering and Comuter Sciences University of California
More informationFAST AND EFFICIENT SIDE INFORMATION GENERATION IN DISTRIBUTED VIDEO CODING BY USING DENSE MOTION REPRESENTATIONS
18th Euroean Signal Processing Conference (EUSIPCO-2010) Aalborg, Denmark, August 23-27, 2010 FAST AND EFFICIENT SIDE INFORMATION GENERATION IN DISTRIBUTED VIDEO CODING BY USING DENSE MOTION REPRESENTATIONS
More informationA Coordinate System for Gaussian Networks
A Coordinate System for Gaussian Networs The MIT Faculty has made this article oenly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Abbe, Emmanuel,
More informationOn the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1
On the Relationshi Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 Imad Antonios antoniosi1@southernct.edu CS Deartment MO117 Southern Connecticut State University 501 Crescent St.
More informationUncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning
TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment
More informationVarious Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems
Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various
More informationEstimation of the large covariance matrix with two-step monotone missing data
Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationCharacteristics of Beam-Based Flexure Modules
Shorya Awtar e-mail: shorya@mit.edu Alexander H. Slocum e-mail: slocum@mit.edu Precision Engineering Research Grou, Massachusetts Institute of Technology, Cambridge, MA 039 Edi Sevincer Omega Advanced
More informationSIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING. Ruhul SARKER. Xin YAO
Yugoslav Journal of Oerations Research 13 (003), Number, 45-59 SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING Ruhul SARKER School of Comuter Science, The University of New South Wales, ADFA,
More information