PERFORMANCE ANALYSIS OF MULTIPLE ACCESS CHAOTIC-SEQUENCE SPREAD-SPECTRUM COMMUNICATION SYSTEMS USING PARALLEL INTERFERENCE CANCELLATION RECEIVERS

Size: px
Start display at page:

Download "PERFORMANCE ANALYSIS OF MULTIPLE ACCESS CHAOTIC-SEQUENCE SPREAD-SPECTRUM COMMUNICATION SYSTEMS USING PARALLEL INTERFERENCE CANCELLATION RECEIVERS"

Transcription

1 Internationa Journa of Bifurcation and Chaos, Vo. 14, No. 10 (2004) c Word Scientific Pubishing Company PERFORMANCE ANALYSIS OF MULTIPLE ACCESS CHAOTIC-SEQUENCE SPREAD-SPECTRUM COMMUNICATION SYSTEMS USING PARALLEL INTERFERENCE CANCELLATION RECEIVERS WAI M. TAM, FRANCIS C. M. LAU and CHI K. TSE Department of Eectronic and Information Engineering, The Hong Kong Poytechnic University, Hong Kong, P. R. China tamwm@eie.poyu.edu.h encmau@poyu.edu.h enctse@poyu.edu.h Received August 1, 2003; Revised September 22, 2003 In this Letter, we appy combined inear detector/parae interference canceation (PIC) detectors to jointy decode symbos in a mutipe access chaotic-sequence spread-spectrum communication system. In particuar, three different types of inear detectors, namey singe-user detector, decorreating detector and minimum mean-square-error detector, are used to estimate the transmitted symbos at the first stage of the PIC detector. The technique for deriving the approximate bit error rate (BER) is described and computer simuations are performed to verify the anaytica BERs. Keywords: Chaos-based communications; mutipe access; mutiuser detection; spread-spectrum communications; parae interference canceation. 1. Introduction Spread-spectrum digita moduation schemes based on chaotic sequence was first proposed by Heidari- Bateni and McGiem [1994], and Paritz and Ergezinger [1994]. By assigning different chaotic sequences to different users, mutipe access in chaotic-sequence spread-spectrum systems can be accompished [Yang & Chua, 1997, 1998]. Since each transmitted symbo is spread by a chaotic sequence of finite ength, there exist finite nonzero crosscorreations between the spread symbos from different users. This introduces interference among the users and imits the performance of the system when the users symbos are decoded independenty. Mutiuser detection is an effective technique to reduce mutua interference between users in a mutipe access environment. Mutiuser detectors can be broady categorized into inear and noninear types. For the inear detectors, a inear transformation is performed at the receiver to mitigate the mutiuser interference [Lupas & Verdú, 1989; Lupas & Verdú, 1990; Verdú, 1986; Xie et a., 1990] whereas noninear detectors cance the interference in severa stages by subtracting the reconstructed signas from the received signas [Hui & Letaief, 1998; Xue et a., 2000; Yoon & Ness, 2002; Yoon et a., 1993]. Recenty, two noninear mutiuser detectors, namey parae interference canceation (PIC) and the successive interference canceation (SIC) detectors, have been appied to a chaotic-sequence spread-spectrum communication system [Argüeo et a., 2002]. The performance, however, has ony been evauated by computer simuations and no anaytica BER has been derived. Aso, the combined effects of the inear and noninear mutiuser detectors have not been examined. 3633

2 3634 W. M. Tam et a. Fig. 1. An N-user mutipe access chaotic-sequence spread-spectrum (MA-CSSS) communication system empoying singeuser detectors. In this Letter, we study three types of inear detectors appied in conjunction with parae interference canceation (PIC) detector in a mutipe access chaotic-sequence spread-spectrum (MA-CSSS) communication system [Tam et a., 2003]. The inear detectors incude conventiona singe-user detector, mutiuser decorreating detector (DD) and mutiuser minimum mean-squareerror (MMSE) detector [Madsen & Cho, 1999; Tam et a., 2002, 2004]. In Sec. 2, we give an overview of the MA-CSSS system. The structure of the PIC detector is described and the decision-maing mechanism is presented. The technique for deriving the approximate bit error rates (BERs) for the PIC detectors (i.e. conventiona/pic, DD/PIC and MMSE/PIC detectors) is aso shown. Finay, in Sec. 3, brute-force simuation resuts are presented and compared with the approximate BER vaues. 2. System Description 2.1. Mutipe access chaotic-sequence spread-spectrum communication system Consider an N-user mutipe access chaoticsequence spread-spectrum (MA-CSSS) communication system shown in Fig. 1. Denote the th transmitted symbo for the ith user by d (i), which assumes the vaue 1 or 1 with equa probabiity. Aso, we represent the chaotic sequence used to spread the binary symbo sequence of the ith user by {x (i) }. Assuming a spreading factor of γ, the transmitted signa for the ith user at the th symbo duration, i.e. at time = ( 1)γ 1, ( 1)γ 2,..., γ, can thus be expressed as s (i) = d(i) x (i). (1) The overa transmitted signa of the system at time is thus given by s = i=1 s (i). (2) Assuming a simpe additive white Gaussian noise (AWGN) channe, the received signa equas r = i=1 s (i) ξ (3) where ξ is an AWGN sampe with zero mean and variance N 0 /2. Assume that the chaotic spreading sequences can be reproduced exacty at the receiver. It is readiy shown that when conventiona singeuser detectors are empoyed, as in Fig. 1, the output of the jth correator (j = 1, 2,..., N), denoted by y, is equa to y = d γ (x )2 =( 1)γ1 i=1,i j γ d (i) =( 1)γ1 γ =( 1)γ1 x (i) x ξ x (4)

3 Mutipe Access Chaotic-Sequence Spread-Spectrum Communication Systems 3635 Fig. 2. A mutistage parae interference canceation (PIC) detector. Fig. 3. The nth stage of a PIC detector. ˆd, is com- and the decoded symbo, denoted by puted from ˆd = sgn[y ] (5) where sgn[ ] represents the sign function. In (4), the first term represents the desired signa, the second term denotes the inter-user interference and the third term comes from noise. It can be seen that the existence of the inter-user interference, which is nonzero, imits the performance of the system even when the noise power is sma Parae interference canceation (PIC ) detector A parae interference canceation (PIC) detector with mutipe stages is shown in Fig. 2. At the zeroth stage of the PIC detector, the transmitted symbos are first estimated using a inear detector such as a conventiona singe-user detector, decorreating detector or MMSE detector [Tam et a., 2002, 2004]. At each of the subsequent stages, the interuser interference wi be estimated and removed from the decision statistics. The structure of the nth (n 1) stage of the PIC detector is shown in Fig. 3. The transmitted symbos estimated by the previous stage are first spread by the corresponding chaotic sequences so as to approximate the transmitted signas for a users. Then, the inter-user interference is reconstructed and subtracted from the received signa for each of the users. At the nth stage, the output of the jth correator is given by y,(n) = γ =( 1)γ1 = d γ r =( 1)γ1 ˆd (i), x(i) i=1,i j (x )2 } {{ } required signa γ =( 1)γ1 i=1,i j x ( ) d (i) (i) ˆd, x (i) x } {{ } inter-user interference γ =( 1)γ1 ξ x } {{ } noise (6)

4 3636 W. M. Tam et a. and the symbo is estimated again according to the sign of y,(n), i.e.ˆd,(n) = sgn[y,(n) ]. (7) It can be easiy seen that when some symbos are correcty estimated, i.e. d (i) (i) = ˆd, for some i {1, 2,..., N}, some of the inter-user interference is eiminated and the estimation process becomes more reiabe Performance anaysis Consider the nth stage of the PIC detector. Without oss of generaity, we consider the jth user in an N-user system and we derive the probabiity of error for the first symbo, i.e. = 1. For brevity, we omit the subscript in the foowing anaysis. Define D = [D(1) D (2) D (j 1) D (j1) D (N) ]T (8) where T represents the transpose and D (i) = d(i) (i) ˆd (9) denotes the difference between the transmitted symbo of the ith user and the estimated symbo at the (n 1)th stage of the PIC detector. The input to the jth threshod detector, Eq. (6), is now rewritten as y (n) = d γ (x )2 =1 i=1,i j γ =1 D (i) γ =1 x (i) x ξ x. (10) Note that if the estimated symbo for the ith user is correct, i.e. d (i) (i) = ˆd, D(i) becomes zero and the interference from the ith user is eiminated. However, when d (i) (i) ˆd, D(i) equas ±2. Under such a condition, the interference may contribute positivey or negativey to the required signa of the jth user, depending on the signs of d (i), d and γ =1 x(i) x. Assume that the transmitted symbo is 1 for the jth user. For a given D, the mean and variance respectivey, and of y (n) can be shown equa to, E[y (n) (d = 1, D )] = γe[(x )2 ] (11) var[y (n) (d = 1, D )] = γ var[(x )2 ] γe[(x )2 ] γ γ γ =1 m=1,m i=1,i j =1 m=1,m cov[(x (D (i) )2 E[(x (i) )2 ] i=1,i j γ E[x (i) x(i) m ]E[x )2, (x m )2 ] x m ] γn 0 E[(x )2 ]/2 (12) where E[ ] and var[ ] represent the expectation and variance operators, respectivey, and cov[a, B] denotes the covariance between A and B. In the derivations of (11) and (12), we have assumed that the chaotic sequences are independent of one another because they are derived from different generators. Aso, the mean vaue of each chaotic sequence is zero in order to avoid transmitting any non-information-bearing dc components. Using a simiar procedure, we can derive E[y (n) (d = 1, D )] and var[y (n) (d = 1, D )]. Assuming that both y (n) (d = 1, D ) and y (n) (d = 1, D ) are norma when γ is arge, it can be readiy shown that the conditiona error probabiities of both cases are the same, i.e. Prob(y (n) 0 (d = 1, D )) = Prob(y (n) > 0 (d = 1, D = 1 2 erfc )) E[y (n) (d = 1, D )] 2var[y (n) (d = 1, D )] (13) where erfc[ ] denotes the compementary error function [Proais, 1995]. Therefore, the bit error probabiity for the j user at the nth stage of the

5 Mutipe Access Chaotic-Sequence Spread-Spectrum Communication Systems 3637 PIC detector can be computed from BER (n) = [Prob(y (n) 0 (d = 1, D )) Prob(d = 1) D Prob(y (n) > 0 (d = 1, D )) Prob(d = 1)] Prob(D ) = D 1 2 [Prob(y (n) 0 (d = 1, D )) Prob(y (n) > 0 (d = 1, D ))] Prob(D ) = D and Prob(D ) is cacuated using with Prob(y (n) 0 (d = 1, D )) Prob(D ) (14) Prob(D ) = d = [d (1) d (2) d (N) ] T (16) denoting the transmitted symbo vector. Note that in (14) and (15), there are a ot of terms to compute because a arge number of possibe combinations have to be considered. Instead of deaing with such a arge number of terms, we mae use of a simper approach to cacuate the bit error rate. Suppose that under the given condition D, at the (n 1)th stage, there are N e {0, 1,..., N 1} symbos (excuding the one for the jth user) that have been incorrecty estimated, i.e. d (i) (i) ˆd, i j. For such cases, (D(i) )2 = 4 (because D (i) = ±2) and hence (12) can be BER N 1 (n) = = u=0 N 1 u=0 Prob(D d { 1,1} N rewritten as d) Prob(d), (15) var[y (n) (d = 1, D )] = var[y (n) (d = 1, N e = γ var[(x )2 ] γ 4γN e E2 [(x γ )] γ =1 m=1,m γ )2 ] i=1,i j =1 m=1,m E[x (i) x(i) cov[(x )2, (x m ) 2 ] m ]E[x x m ] γn 0 E[(x )2 ]/2. (17) With the introduction of N e, the bit error probabiity in (14) can be expressed as Prob(y (n) 0 (d = 1, N e = u)) Prob(N e = u) 1 2 erfc E[y (n) (d = 1, N e = u)] 2 var[y (n) (d = 1, N e = u)] Prob(N e = u) (18) where E[y (n) (d = 1, N e = u)] = E[y (n) (d = 1, D )] = γe[(x )2 ]. (19) By computing the probabiity of occurrence of N e {0, 1,..., N 1} and using (17) (19), the bit error rate at the nth stage of the PIC detector, BER (n), can be found. In addition, Prob(N e =

6 3638 W. M. Tam et a. u) is ony significant when u is very sma. Therefore, not more than a few vaues of u need to be considered. 3. Resuts and Discussions Assume that a users use the cubic map [Geise & Fairen, 1984] x 1 = 4x 3 3x (20) to generate the chaotic sequences and each user uses a different initia condition. It is readiy shown that the mean vaue of each chaotic sequence is zero. Aso, the mean and variance in (19) and (17) can be simpified to, respectivey, E[y (n) (d = 1, N e = u)] = γp s (21) and var[y (n) (d = 1, N e = u)] = γ var[(x )2 ] 4γuP 2 s γn 0P s /2 (22) where P s denotes the average power of the chaotic sequence and is given by P s = E[(x (1) )2 ] = E[(x (2) )2 ] = = E[(x (N) ) 2 ]. (23) For brevity, we define Ψ = var[(x )2 ] P 2 s = var[(x )2 ] E 2 [(x )2 ]. (24) As a consequence, the bit error probabiity for the j user at the nth stage of the PIC detector can now be computed using [ BER (n) = 1 N 1 erfc 2 u=0 2Ψ γ 8u ( ) ] γ Eb Prob(N e N = u) (25) 0 where E b = γp s (26) denotes the average bit energy. Three inear detectors, namey conventiona singe-user detector, decorreating detector (DD) and minimum mean-square-error (MMSE) detector, have been appied as the first stage (Stage 0) of the PIC detector. These combined detectors are termed as, respectivey, conventiona/pic, DD/PIC and MMSE/PIC detectors. We assume that the cubic map defined as in (20) is used by a users, and each uses a different initia condition. Aso, the spreading factor (γ) is 100 and the number of users (N) is 10. We aso assume that Prob(N e = u) is sma when u is arge. Therefore, in our anaysis, we assume that Prob(N e = u) is negigibe under the foowing circumstances and the corresponding terms are negected in the computation of (25). u 3 for the conventiona/pic detector at the first stage (n = 1). u 2 for the conventiona/pic detector at the second stage and beyond. u 2 for the DD/PIC detector at the first stage and beyond. u 2 for the MMSE/PIC detector at the first stage and beyond. Detais on the cacuations of Prob(N e = u) can be found in the Appendix. Figures 4 6, respectivey, pot the simuated BERs for the conventiona/pic, DD/PIC and MMSE/PIC detectors, at various stages. The BER for a singe-user system, which is equivaent to an interference-free system, is aso given as a reference. For a the detectors under study, the BERs at Stage 1 are ower than those at Stage 0. For the conventiona/pic detector, the BER at Stage 2 is further reduced compared to that at Stage 1. The BER resuts for the conventiona/pic detector with three stages, the DD/PIC and the MMSE/PIC detectors with two stages, are cose to that of the singe-user system. When the number of stages is further increased, no improvement is observed. Overa, the resuts indicate that the parae interference canceation technique can further enhance the performance of inear mutiuser detectors. With a ow BER at Stage 0 and at subsequent stages, it is we justified that terms corresponding to arge vaue of u can be ignored in the computation of (25). Figures 7 to 9 pot the approximate BERs (using (25)) and the brute-force (BF) simuated BERs when the PIC detectors are appied. It can be observed that the approximate and the simuated resuts agree with each other for a the PIC

7 Mutipe Access Chaotic-Sequence Spread-Spectrum Communication Systems 3639 Fig. 4. Simuated BER versus E b /N 0 for the conventiona/pic detector at various stages. γ = 100 and N = 10. Fig. 5. Simuated BER versus E b /N 0 for the DD/PIC detector at various stages. γ = 100 and N = 10.

8 3640 W. M. Tam et a. Fig. 6. Simuated BER versus E b /N 0 for the MMSE/PIC detector at various stages. γ = 100 and N = 10. Fig. 7. Approximate and brute-force (BF) simuated BERs versus E b /N 0 for the conventiona/pic detector. γ = 100 and N = 10.

9 Mutipe Access Chaotic-Sequence Spread-Spectrum Communication Systems 3641 Fig. 8. Approximate and brute-force (BF) simuated BERs versus E b /N 0 for the DD/PIC detector. γ = 100 and N = 10. Fig. 9. Approximate and brute-force (BF) simuated BERs versus E b /N 0 for the MMSE/PIC detector. γ = 100 and N = 10.

10 3642 W. M. Tam et a. Fig. 10. Comparison of the conventiona/pic, DD/PIC and MMSE/PIC detectors. γ = 100 and N = 10. detectors under study. Finay, we compared the simuated BERs for the conventiona/pic, DD/PIC and MMSE/PIC detectors. The resuts shown in Fig. 10 indicate that the BERs for the DD/PIC and MMSE/PIC detectors are amost the same. At Stage 1 of the PIC detector, the performances of the DD/PIC and MMSE/PIC detectors are better than that of the conventiona/pic detector. With an additiona stage (Stage 2), the conventiona/pic can achieve the same performance as the DD/PIC and MMSE/PIC detectors. 4. Concusion In this Letter, we have appied three combined inear detector/parae interference canceation (PIC) detectors, namey conventiona singe-user detector/pic, decorreating detector/pic and minimum mean-square-error/pic detectors to a mutipe access chaotic-sequence spread-spectrum communication system. The technique for deriving the approximate BERs has been described. It is found that the approximate BERs agree with the simuation resuts. Aso, it is shown that the PIC detectors can further improve the bit error performance compared to that of the inear mutiuser detectors. With ony one or two PIC stages, the bit error performance of the PIC detectors approaches to that of a singe-user (interference free) system. Increasing the number of PIC stages further wi not enhance the bit error performance because the system is now imited by noise. Acnowedgment This wor was supported by a Hong Kong Poytechnic University Research Grant. References Argüeo, F., Bugao, M. & Amor, M. [2002] Muti-user receivers for spread spectrum communications based on chaotic sequences, Int. J. Bifurcation and Chaos 12, Geise, T. & Fairen, V. [1984] Statistica properties of chaos in Chebyshev maps, Phys. Lett. A105, Heidari-Bateni, G. & McGiem, C. D. [1994] A chaotic direct-sequence spread-spectrum communication system, IEEE Trans. Commun. 42, Hui, A. L. C. & Letaief, K. B. [1998] Successive interference canceation for mutiuser asynchronous DS/CDMA detectors in mutipath fading ins, IEEE Trans. Commun. 46, Lupas, R. & Verdú, S. [1989] Linear muti-user de-

11 Mutipe Access Chaotic-Sequence Spread-Spectrum Communication Systems 3643 tectors for synchronous code-division mutipe-access channes, IEEE Trans. Inform. Th. 35, Lupas, R. & Verdú, S. [1990] Near-far resistance of muti-user detectors in asynchronous channe, IEEE Trans. Commun. 35, Madsen, A. H. & Cho, K. S. [1999] MMSE/PIC mutiuser detector for DS/CDMA systems with inter- and intra-ce interference, IEEE Trans. Commun. 47, Paritz, U. & Ergezinger, S. [1994] Robust communication based on chaotic spreading sequences, Phys. Lett. A188, Proais, J. G. [1995] Digita Communications (McGraw- Hi, Singapore). Tam, W. M., Lau, F. C. M. & Tse, C. K. [2002] Muti-user detection techniques for mutipe access chaos-based digita communication system, Proc. Int. Symp. Noninear Theory and Appications, Xi an, China, pp Tam, W. M., Lau, F. C. M. & Tse, C. K. [2003] Performance anaysis of mutipe access chaotic-sequence spread-spectrum communication systems empoying parae interference canceation detectors, Proc. IEEE Int. Symp. Circuits and Systems, Bango, Thaiand, Vo. III, pp Tam, W. M., Lau, F. C. M. & Tse, C. K. [2004] An approach to cacuating the bit error rates of mutipe access chaotic-sequence spread-spectrum communication systems empoying muti-user detectors, Int. J. Bifurcation and Chaos 14, Verdú, S. [1986] Minimum probabiity of error for asynchronous Gaussian mutipe-access channes, IEEE Trans. Inform. Th. IT-32, Xie, Z., Short, R. T. & Rushforth, C. K. [1990] A famiy of suboptimum detectors for coherent muti-user communications, IEEE J. Se. Areas in Commun. 8, Xue, G., Weng, J. F., Ngoc, T. L. & Tahar, S. [2000] An anaytica mode for performance evauation of parae interference canceers in CDMA systems, IEEE Commun. Lett. 4, Yang, T. & Chua, L. O. [1997] Chaotic digita code-division mutipe access (CDMA) communication systems, Int. J. Bifurcation and Chaos 7, Yang, T. & Chua, L. O. [1998] Error performance of chaotic digita code-division mutipe access (CDMA) systems, Int. J. Bifurcation and Chaos 8, Yoon, Y. C., Kohno, R. & Imai, H. [1993] A spreadspectrum mutiaccess system with cochanne interference canceation for mutipath fading channes, IEEE J. Se. Areas in Commun. 11, Yoon, S. & Ness, Y. B. [2002] Performance anaysis for inear mutiuser detectors of randomy spread CDMA using Gaussian approximation, IEEE J. Se. Areas in Commun. 20, Appendix Cacuation of the Probabiity of Occurrence of N e A symbos are defined as in Sec. 2. Reca in (16) that the transmitted symbo vector d is defined as d = [d (1) d (2) d (N) ] T. (A.1) Here, we denote ˆd as the estimated symbo vector at the (n 1) stage of the PIC detector, i.e. (1) ˆd = [ ˆd ˆd (2) ˆd(N) ]T. (A.2) Aso, when some of the eements are removed from d, we denote the resutant vector by d w where w is the vector containing the indices of the eements that have been removed. For exampe, assuming i < j, d (i,j) = [d (1) d (2) d (i 1) d (i1) d (j 1) d (j1) d (N) ] T. (A.3) Simiary, we denote the resutant vector by ˆd w where w contains the indices of the eements that have been removed from ˆd. Probabiity that N e = 1 The probabiity that N e = 1 can be shown equa to [Madsen & Cho, 1999] Prob(N e = 1) = i=1,i j i=1,i j Prob(d (i) Prob(d (i) = (N 1)BER. (i) ˆd, d(i,j) (i,j) = ˆd ) ˆd (i) ) We approximate Prob(N e bound (N 1)BER (A.4) = 1) by its upper. The approximation is good when the probabiity of error of each user is sma, e.g. ess than Using the anaytica BERs of the inear detectors, namey the conventiona singeuser detector, decorreating detector and MMSE detector [Tam et a., 2002, 2004], as the BER vaues of the zeroth stage (denoted by BER ), and by

12 3644 W. M. Tam et a. appying (A.4) and (25) repeatedy, the probabiity that N e = 1 at the (n 1)th stage can be found. Probabiity that N e = 2 Using a simiar approach, the probabiity that N e = 2 is given by Prob(N e = 2) = N i=1,i j v=1,v j,v<i i=1,i j v=1,v j,v<i Prob(d (i) Prob(d (i) ˆd (i), d(v) ˆd (i), d(v) (v) ˆd, d(i,j,v) (i,j,v) = ˆd ) ˆd (v) ). In the case where a conventiona singe-user detector is used as the zeroth stage of the PIC detector, i.e. n = 1, the probabiity that N e = 2 can be evauated by Prob(N e = 2) (A.5) Prob(d (i) i=1,i j v=1,v j,v<i ˆd (i), d(v) ˆd (v) (d(i), d (v) )) Prob(d (i), d (v) ) = i=1,i j v=1,v j,v<i [Prob(y (i) 0, y(v) 0 (d(i) = 1, d (v) = 1))Prob(d (i) = 1, d (v) = 1) Prob(y (i) 0, y(v) > 0 (d(i) = 1, d (v) = 1))Prob(d (i) = 1, d (v) = 1) Prob(y (i) > 0, y(v) 0 (d(i) = 1, d (v) = 1))Prob(d (i) = 1, d (v) = 1) Prob(y (i) > 0, y(v) > 0 (d(i) = 1, d (v) = 1))Prob(d (i) = 1, d (v) = 1)] = 1 2 (N 1)(N 2) [ , y(v) (d(i) = 1, d (v) = 1))dy (i) dy(v), y(v) (d(i) = 1, d (v) = 1))dy (i) dy(v), y(v) (d(i) = 1, d (v) = 1))dy (i) dy(v) ], y(v) (d(i) = 1, d (v) = 1))dy (i) dy(v) where y (i) and y(v) represent the outputs of the ith and vth correators, respectivey, in the singe-user detectors. In (A.6), f (ψ, ω) denotes the two-dimensiona (bivariate) norma probabiity density function (pdf) of ψ and ω and is given by 1 f(ψ, ω) = 2π var[ψ]var[ω](1 ρ 2 ) { [ 1 (ψ E[ψ]) 2 exp 2(1 ρ 2 2ρ ) var[ψ] (ψ E[ψ])(ω E[ω]) var[ψ]var[ω] ]} (ω E[ω])2 var[ω] (A.6) (A.7)

13 Mutipe Access Chaotic-Sequence Spread-Spectrum Communication Systems 3645 where ρ is the correation coefficient between ψ and ω, and is defined as It is readiy shown that = = = ρ = E[ψω] E[ψ]E[ω] var[ψ]var[ω]. (A.8), y(v) (d(i) = 1, d (v) = 1))dy (i) dy(v) 0 0 Hence, Prob(N e = 2) can be simpified to Prob(N e = 2) 1 2 (N 1)(N 2) 0 0, y(v) (d(i) = 1, d (v) = 1))dy (i) dy(v), y(v) (d(i) = 1, d (v) = 1))dy (i) dy(v), y(v) (d(i) = 1, d (v) = 1))dy (i) dy(v). (A.9), y(v) (d(i) = 1, d (v) = 1))dy (i) dy(v). (A.10) Simiar to the case for N e = 1, we approximate Prob ( N e = 2 ) by its upper bound given in (A.10). Probabiity that N e 3 The probabiity that N e 3 is given by Prob(N e = u) = j / u ũ, u ũ=, j / u ũ, u ũ=, u ũ j={1,2,...,n} u ũ j={1,2,...,n} Prob(d (j,u) (j,u) ˆd, d (j,ũ) (j,ũ) = ˆd ) Prob(d (j,u) (j,u) ˆd ) (A.11) where the vectors u and ũ contain the indices of the users that have made, respectivey, wrong decisions and correct decisions. Using simiar procedures as in the case N e = 2, if a conventiona singe-user detector is used as the zeroth stage, the probabiity that N e 3 can be shown equa to ( ) N 1 Prob(N e = u) u d { 1,1} u y (u) f(y d )dy (1) y (2) y (1) dy(2) dy (u) Prob(d ) (A.12) ( ) w where denotes the number of ways to choose v v items out of w. Aso, the vectors Y and d are defined as Y = [ŷ (1) ŷ (2) ŷ (u) ]T (A.13) d = [d (1) d (2) d (u) ] T. (A.14) The u-dimensiona norma pdf of Y for a given vector d is denoted by f(y d ). It is represented by f(ψ) = where 1 (2π) u det[u] [ exp 1 ] 2 (ψ E[ψ])T U 1 (ψ E[ψ]) (A.15) ψ = [ψ (1) ψ (2) ψ (u) ] T, (A.16)

14 3646 W. M. Tam et a. U 1 is the u u covariance matrix of the random variabes ψ (1), ψ (2),..., ψ (u), and det[ ] denotes the determinant operator. Probabiity that N e = 0 Since N 1 m=0 Prob(N e = m) = 1, (A.17) the probabiity that N e by Prob(N e = 0) = 0 can be evauated N 1 = 1 Prob(N e = m). m=1 (A.18)

AN APPROACH TO CALCULATE THE BIT ERROR RATES OF MULTIPLE ACCESS CHAOTIC-SEQUENCE SPREAD-SPECTRUM COMMUNICATION SYSTEMS EMPLOYING MULTI-USER DETECTORS

AN APPROACH TO CALCULATE THE BIT ERROR RATES OF MULTIPLE ACCESS CHAOTIC-SEQUENCE SPREAD-SPECTRUM COMMUNICATION SYSTEMS EMPLOYING MULTI-USER DETECTORS Internationa Journa of Bifurcation and Chaos, Vo. 4, No. 4 83 6 c Word Scientific Pubishing Company AN APPROACH TO CALCULATE THE BIT ERROR RATES OF MULTIPLE ACCESS CHAOTIC-SEQUENCE SPREAD-SPECTRUM COMMUNICATION

More information

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver

More information

LINEAR DETECTORS FOR MULTI-USER MIMO SYSTEMS WITH CORRELATED SPATIAL DIVERSITY

LINEAR DETECTORS FOR MULTI-USER MIMO SYSTEMS WITH CORRELATED SPATIAL DIVERSITY LINEAR DETECTORS FOR MULTI-USER MIMO SYSTEMS WITH CORRELATED SPATIAL DIVERSITY Laura Cottateucci, Raf R. Müer, and Mérouane Debbah Ist. of Teecommunications Research Dep. of Eectronics and Teecommunications

More information

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c) A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,

More information

FREQUENCY modulated differential chaos shift key (FM-

FREQUENCY modulated differential chaos shift key (FM- Accepted in IEEE 83rd Vehicuar Technoogy Conference VTC, 16 1 SNR Estimation for FM-DCS System over Mutipath Rayeigh Fading Channes Guofa Cai, in Wang, ong ong, Georges addoum Dept. of Communication Engineering,

More information

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient

More information

(This is a sample cover image for this issue. The actual cover is not yet available at this time.)

(This is a sample cover image for this issue. The actual cover is not yet available at this time.) (This is a sampe cover image for this issue The actua cover is not yet avaiabe at this time) This artice appeared in a journa pubished by Esevier The attached copy is furnished to the author for interna

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

Improved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization

Improved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization Improved Min-Sum Decoding of LDPC Codes sing -Dimensiona Normaization Juntan Zhang and Marc Fossorier Department of Eectrica Engineering niversity of Hawaii at Manoa Honouu, HI 968 Emai: juntan, marc@spectra.eng.hawaii.edu

More information

A GENERAL METHOD FOR EVALUATING OUTAGE PROBABILITIES USING PADÉ APPROXIMATIONS

A GENERAL METHOD FOR EVALUATING OUTAGE PROBABILITIES USING PADÉ APPROXIMATIONS A GENERAL METHOD FOR EVALUATING OUTAGE PROBABILITIES USING PADÉ APPROXIMATIONS Jack W. Stokes, Microsoft Corporation One Microsoft Way, Redmond, WA 9852, jstokes@microsoft.com James A. Ritcey, University

More information

ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK

ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK Aexander Arkhipov, Michae Schne German Aerospace Center DLR) Institute of Communications and Navigation Oberpfaffenhofen, 8224 Wessing, Germany

More information

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

A Novel Approach to Security Enhancement of Chaotic DSSS Systems

A Novel Approach to Security Enhancement of Chaotic DSSS Systems A Nove Approach to Security Enhancement of Chaotic DSSS Systems Nguyen Xuan Quyen 1, Chuyen T. Nguyen 1, Pere Baret-Ros 2, and Reiner Dojen 3 1 Schoo of Eectronics and Teecommunications, Hanoi University

More information

MC-CDMA CDMA Systems. Introduction. Ivan Cosovic. Stefan Kaiser. IEEE Communication Theory Workshop 2005 Park City, USA, June 15, 2005

MC-CDMA CDMA Systems. Introduction. Ivan Cosovic. Stefan Kaiser. IEEE Communication Theory Workshop 2005 Park City, USA, June 15, 2005 On the Adaptivity in Down- and Upink MC- Systems Ivan Cosovic German Aerospace Center (DLR) Institute of Comm. and Navigation Oberpfaffenhofen, Germany Stefan Kaiser DoCoMo Euro-Labs Wireess Soution Laboratory

More information

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Brandon Maone Department of Computer Science University of Hesini February 18, 2014 Abstract This document derives, in excrutiating

More information

Performance of Direct-oversampling Correlator-type Receivers in Chaos-based DS-CDMA Systems Over Frequency Non-selective Fading Channels

Performance of Direct-oversampling Correlator-type Receivers in Chaos-based DS-CDMA Systems Over Frequency Non-selective Fading Channels Wireess Persona Communications manuscript No wi be inserted by the editor) Performance of Direct-oversamping Correator-type Receivers in Chaos-based DS-CDMA Systems Over Frequency Non-seective Fading Channes

More information

Some Measures for Asymmetry of Distributions

Some Measures for Asymmetry of Distributions Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester

More information

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems Source and Reay Matrices Optimization for Mutiuser Muti-Hop MIMO Reay Systems Yue Rong Department of Eectrica and Computer Engineering, Curtin University, Bentey, WA 6102, Austraia Abstract In this paper,

More information

Alberto Maydeu Olivares Instituto de Empresa Marketing Dept. C/Maria de Molina Madrid Spain

Alberto Maydeu Olivares Instituto de Empresa Marketing Dept. C/Maria de Molina Madrid Spain CORRECTIONS TO CLASSICAL PROCEDURES FOR ESTIMATING THURSTONE S CASE V MODEL FOR RANKING DATA Aberto Maydeu Oivares Instituto de Empresa Marketing Dept. C/Maria de Moina -5 28006 Madrid Spain Aberto.Maydeu@ie.edu

More information

Target Location Estimation in Wireless Sensor Networks Using Binary Data

Target Location Estimation in Wireless Sensor Networks Using Binary Data Target Location stimation in Wireess Sensor Networks Using Binary Data Ruixin Niu and Pramod K. Varshney Department of ectrica ngineering and Computer Science Link Ha Syracuse University Syracuse, NY 344

More information

BP neural network-based sports performance prediction model applied research

BP neural network-based sports performance prediction model applied research Avaiabe onine www.jocpr.com Journa of Chemica and Pharmaceutica Research, 204, 6(7:93-936 Research Artice ISSN : 0975-7384 CODEN(USA : JCPRC5 BP neura networ-based sports performance prediction mode appied

More information

Process Capability Proposal. with Polynomial Profile

Process Capability Proposal. with Polynomial Profile Contemporary Engineering Sciences, Vo. 11, 2018, no. 85, 4227-4236 HIKARI Ltd, www.m-hikari.com https://doi.org/10.12988/ces.2018.88467 Process Capabiity Proposa with Poynomia Profie Roberto José Herrera

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

Limited magnitude error detecting codes over Z q

Limited magnitude error detecting codes over Z q Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica

More information

Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1

Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1 Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rues 1 R.J. Marks II, S. Oh, P. Arabshahi Λ, T.P. Caude, J.J. Choi, B.G. Song Λ Λ Dept. of Eectrica Engineering Boeing Computer Services University

More information

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM

ANALYSIS OF A PARTIAL DECORRELATOR IN A MULTI-CELL DS/CDMA SYSTEM ANAYSIS OF A PARTIA DECORREATOR IN A MUTI-CE DS/CDMA SYSTEM Mohammad Saquib ECE Department, SU Baton Rouge, A 70803-590 e-mail: saquib@winlab.rutgers.edu Roy Yates WINAB, Rutgers University Piscataway

More information

SEMINAR 2. PENDULUMS. V = mgl cos θ. (2) L = T V = 1 2 ml2 θ2 + mgl cos θ, (3) d dt ml2 θ2 + mgl sin θ = 0, (4) θ + g l

SEMINAR 2. PENDULUMS. V = mgl cos θ. (2) L = T V = 1 2 ml2 θ2 + mgl cos θ, (3) d dt ml2 θ2 + mgl sin θ = 0, (4) θ + g l Probem 7. Simpe Penduum SEMINAR. PENDULUMS A simpe penduum means a mass m suspended by a string weightess rigid rod of ength so that it can swing in a pane. The y-axis is directed down, x-axis is directed

More information

Fast Blind Recognition of Channel Codes

Fast Blind Recognition of Channel Codes Fast Bind Recognition of Channe Codes Reza Moosavi and Erik G. Larsson Linköping University Post Print N.B.: When citing this work, cite the origina artice. 213 IEEE. Persona use of this materia is permitted.

More information

8 Digifl'.11 Cth:uits and devices

8 Digifl'.11 Cth:uits and devices 8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,

More information

Compression Ratio Expansion for Complementary Code Set Compressing a Signal to a Width of Several Sub-pulses

Compression Ratio Expansion for Complementary Code Set Compressing a Signal to a Width of Several Sub-pulses Compression Ratio Expansion for Compementary Code Set Compressing a Signa to a Width of Severa Sub-puses Reiji Sato 2nd Research Center, Technica R and D Institute Japan Defense Agency 1-2-24 Ikejiri,

More information

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR 1 Maximizing Sum Rate and Minimizing MSE on Mutiuser Downink: Optimaity, Fast Agorithms and Equivaence via Max-min SIR Chee Wei Tan 1,2, Mung Chiang 2 and R. Srikant 3 1 Caifornia Institute of Technoogy,

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

Automobile Prices in Market Equilibrium. Berry, Pakes and Levinsohn

Automobile Prices in Market Equilibrium. Berry, Pakes and Levinsohn Automobie Prices in Market Equiibrium Berry, Pakes and Levinsohn Empirica Anaysis of demand and suppy in a differentiated products market: equiibrium in the U.S. automobie market. Oigopoistic Differentiated

More information

https://doi.org/ /epjconf/

https://doi.org/ /epjconf/ HOW TO APPLY THE OPTIMAL ESTIMATION METHOD TO YOUR LIDAR MEASUREMENTS FOR IMPROVED RETRIEVALS OF TEMPERATURE AND COMPOSITION R. J. Sica 1,2,*, A. Haefee 2,1, A. Jaai 1, S. Gamage 1 and G. Farhani 1 1 Department

More information

On the Achievable Extrinsic Information of Inner Decoders in Serial Concatenation

On the Achievable Extrinsic Information of Inner Decoders in Serial Concatenation On the Achievabe Extrinsic Information of Inner Decoders in Seria Concatenation Jörg Kiewer, Axe Huebner, and Danie J. Costeo, Jr. Department of Eectrica Engineering, University of Notre Dame, Notre Dame,

More information

RELUCTANCE The resistance of a material to the flow of charge (current) is determined for electric circuits by the equation

RELUCTANCE The resistance of a material to the flow of charge (current) is determined for electric circuits by the equation INTRODUCTION Magnetism pays an integra part in amost every eectrica device used today in industry, research, or the home. Generators, motors, transformers, circuit breakers, teevisions, computers, tape

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

Rate-Distortion Theory of Finite Point Processes

Rate-Distortion Theory of Finite Point Processes Rate-Distortion Theory of Finite Point Processes Günther Koiander, Dominic Schuhmacher, and Franz Hawatsch, Feow, IEEE Abstract We study the compression of data in the case where the usefu information

More information

STA 216 Project: Spline Approach to Discrete Survival Analysis

STA 216 Project: Spline Approach to Discrete Survival Analysis : Spine Approach to Discrete Surviva Anaysis November 4, 005 1 Introduction Athough continuous surviva anaysis differs much from the discrete surviva anaysis, there is certain ink between the two modeing

More information

Maximum likelihood decoding of trellis codes in fading channels with no receiver CSI is a polynomial-complexity problem

Maximum likelihood decoding of trellis codes in fading channels with no receiver CSI is a polynomial-complexity problem 1 Maximum ikeihood decoding of treis codes in fading channes with no receiver CSI is a poynomia-compexity probem Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department

More information

Worst Case Analysis of the Analog Circuits

Worst Case Analysis of the Analog Circuits Proceedings of the 11th WSEAS Internationa Conference on CIRCUITS, Agios Nikoaos, Crete Isand, Greece, Juy 3-5, 7 9 Worst Case Anaysis of the Anaog Circuits ELENA NICULESCU*, DORINA-MIOARA PURCARU* and

More information

Related Topics Maxwell s equations, electrical eddy field, magnetic field of coils, coil, magnetic flux, induced voltage

Related Topics Maxwell s equations, electrical eddy field, magnetic field of coils, coil, magnetic flux, induced voltage Magnetic induction TEP Reated Topics Maxwe s equations, eectrica eddy fied, magnetic fied of cois, coi, magnetic fux, induced votage Principe A magnetic fied of variabe frequency and varying strength is

More information

SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS

SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS ISEE 1 SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS By Yingying Fan and Jinchi Lv University of Southern Caifornia This Suppementary Materia

More information

Simplified analysis of EXAFS data and determination of bond lengths

Simplified analysis of EXAFS data and determination of bond lengths Indian Journa of Pure & Appied Physics Vo. 49, January 0, pp. 5-9 Simpified anaysis of EXAFS data and determination of bond engths A Mishra, N Parsai & B D Shrivastava * Schoo of Physics, Devi Ahiya University,

More information

Title Sinusoidal Signals. Author(s) Sakai, Hideaki; Fukuzono, Hayato. Conference: Issue Date DOI

Title Sinusoidal Signals. Author(s) Sakai, Hideaki; Fukuzono, Hayato. Conference: Issue Date DOI Tite Anaysis of Adaptive Fiters in Fee Sinusoida Signas Authors) Sakai, Hideaki; Fukuzono, Hayato Proceedings : APSIPA ASC 2009 : Asi Citation Information Processing Association, Conference: 430-433 Issue

More information

Maximum Ratio Combining of Correlated Diversity Branches with Imperfect Channel State Information and Colored Noise

Maximum Ratio Combining of Correlated Diversity Branches with Imperfect Channel State Information and Colored Noise Maximum Ratio Combining of Correated Diversity Branches with Imperfect Channe State Information and Coored Noise Lars Schmitt, Thomas Grunder, Christoph Schreyoegg, Ingo Viering, and Heinrich Meyr Institute

More information

Improving the Reliability of a Series-Parallel System Using Modified Weibull Distribution

Improving the Reliability of a Series-Parallel System Using Modified Weibull Distribution Internationa Mathematica Forum, Vo. 12, 217, no. 6, 257-269 HIKARI Ltd, www.m-hikari.com https://doi.org/1.12988/imf.217.611155 Improving the Reiabiity of a Series-Parae System Using Modified Weibu Distribution

More information

Unconditional security of differential phase shift quantum key distribution

Unconditional security of differential phase shift quantum key distribution Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice

More information

In-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017

In-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017 In-pane shear stiffness of bare stee deck through she finite eement modes G. Bian, B.W. Schafer June 7 COLD-FORMED STEEL RESEARCH CONSORTIUM REPORT SERIES CFSRC R-7- SDII Stee Diaphragm Innovation Initiative

More information

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai

More information

Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correlated Channel Failures

Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correlated Channel Failures Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correated Channe Faiures Andrey Lyakhov Vadimir Vishnevsky Institute for Information Transmission Probems of RAS B. Karetny 19, Moscow, 127994, Russia

More information

Do Schools Matter for High Math Achievement? Evidence from the American Mathematics Competitions Glenn Ellison and Ashley Swanson Online Appendix

Do Schools Matter for High Math Achievement? Evidence from the American Mathematics Competitions Glenn Ellison and Ashley Swanson Online Appendix VOL. NO. DO SCHOOLS MATTER FOR HIGH MATH ACHIEVEMENT? 43 Do Schoos Matter for High Math Achievement? Evidence from the American Mathematics Competitions Genn Eison and Ashey Swanson Onine Appendix Appendix

More information

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes A Fundamenta Storage-Communication Tradeoff in Distributed Computing with Stragging odes ifa Yan, Michèe Wigger LTCI, Téécom ParisTech 75013 Paris, France Emai: {qifa.yan, michee.wigger} @teecom-paristech.fr

More information

On the Performance of Wireless Energy Harvesting Networks in a Boolean-Poisson Model

On the Performance of Wireless Energy Harvesting Networks in a Boolean-Poisson Model On the Performance of Wireess Energy Harvesting Networks in a Booean-Poisson Mode Han-Bae Kong, Ian Fint, Dusit Niyato, and Nicoas Privaut Schoo of Computer Engineering, Nanyang Technoogica University,

More information

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract Stochastic Compement Anaysis of Muti-Server Threshod Queues with Hysteresis John C.S. Lui The Dept. of Computer Science & Engineering The Chinese University of Hong Kong Leana Goubchik Dept. of Computer

More information

Converting Z-number to Fuzzy Number using. Fuzzy Expected Value

Converting Z-number to Fuzzy Number using. Fuzzy Expected Value ISSN 1746-7659, Engand, UK Journa of Information and Computing Science Vo. 1, No. 4, 017, pp.91-303 Converting Z-number to Fuzzy Number using Fuzzy Expected Vaue Mahdieh Akhbari * Department of Industria

More information

Asymptotic Gains of Generalized Selection Combining

Asymptotic Gains of Generalized Selection Combining Asymptotic Gains of Generaized Seection Combining Yao a Z Wang S Pasupathy Dept of ECpE Dept of ECE Dept of ECE Iowa State Univ Iowa State Univ Univ of Toronto, Emai: mayao@iastateedu Emai: zhengdao@iastateedu

More information

FRST Multivariate Statistics. Multivariate Discriminant Analysis (MDA)

FRST Multivariate Statistics. Multivariate Discriminant Analysis (MDA) 1 FRST 531 -- Mutivariate Statistics Mutivariate Discriminant Anaysis (MDA) Purpose: 1. To predict which group (Y) an observation beongs to based on the characteristics of p predictor (X) variabes, using

More information

A simple reliability block diagram method for safety integrity verification

A simple reliability block diagram method for safety integrity verification Reiabiity Engineering and System Safety 92 (2007) 1267 1273 www.esevier.com/ocate/ress A simpe reiabiity bock diagram method for safety integrity verification Haitao Guo, Xianhui Yang epartment of Automation,

More information

Research Article On the Lower Bound for the Number of Real Roots of a Random Algebraic Equation

Research Article On the Lower Bound for the Number of Real Roots of a Random Algebraic Equation Appied Mathematics and Stochastic Anaysis Voume 007, Artice ID 74191, 8 pages doi:10.1155/007/74191 Research Artice On the Lower Bound for the Number of Rea Roots of a Random Agebraic Equation Takashi

More information

Two-sample inference for normal mean vectors based on monotone missing data

Two-sample inference for normal mean vectors based on monotone missing data Journa of Mutivariate Anaysis 97 (006 6 76 wwweseviercom/ocate/jmva Two-sampe inference for norma mean vectors based on monotone missing data Jianqi Yu a, K Krishnamoorthy a,, Maruthy K Pannaa b a Department

More information

Transmit Antenna Selection for Physical-Layer Network Coding Based on Euclidean Distance

Transmit Antenna Selection for Physical-Layer Network Coding Based on Euclidean Distance Transmit ntenna Seection for Physica-Layer Networ Coding ased on Eucidean Distance 1 arxiv:179.445v1 [cs.it] 13 Sep 17 Vaibhav Kumar, arry Cardiff, and Mar F. Fanagan Schoo of Eectrica and Eectronic Engineering,

More information

Precoding for the Sparsely Spread MC-CDMA Downlink with Discrete-Alphabet Inputs

Precoding for the Sparsely Spread MC-CDMA Downlink with Discrete-Alphabet Inputs IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.*, NO.*, MONTH 2016 1 Precoding for the Sparsey Spread MC-CDMA Downin with Discrete-Aphabet Inputs Min Li, Member, IEEE, Chunshan Liu, Member, IEEE, and Stephen

More information

Diversity Gain Region for MIMO Fading Broadcast Channels

Diversity Gain Region for MIMO Fading Broadcast Channels ITW4, San Antonio, Texas, October 4 9, 4 Diversity Gain Region for MIMO Fading Broadcast Channes Lihua Weng, Achieas Anastasoouos, and S. Sandee Pradhan Eectrica Engineering and Comuter Science Det. University

More information

Supervised i-vector Modeling - Theory and Applications

Supervised i-vector Modeling - Theory and Applications Supervised i-vector Modeing - Theory and Appications Shreyas Ramoji, Sriram Ganapathy Learning and Extraction of Acoustic Patterns LEAP) Lab, Eectrica Engineering, Indian Institute of Science, Bengauru,

More information

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische

More information

Statistical Astronomy

Statistical Astronomy Lectures for the 7 th IAU ISYA Ifrane, nd 3 rd Juy 4 p ( x y, I) p( y x, I) p( x, I) p( y, I) Statistica Astronomy Martin Hendry, Dept of Physics and Astronomy University of Gasgow, UK http://www.astro.ga.ac.uk/users/martin/isya/

More information

A proposed nonparametric mixture density estimation using B-spline functions

A proposed nonparametric mixture density estimation using B-spline functions A proposed nonparametric mixture density estimation using B-spine functions Atizez Hadrich a,b, Mourad Zribi a, Afif Masmoudi b a Laboratoire d Informatique Signa et Image de a Côte d Opae (LISIC-EA 4491),

More information

Polite Water-filling for the Boundary of the Capacity/Achievable Regions of MIMO MAC/BC/Interference Networks

Polite Water-filling for the Boundary of the Capacity/Achievable Regions of MIMO MAC/BC/Interference Networks 2011 IEEE Internationa Symposium on Information Theory Proceedings Poite Water-fiing for the Boundary of the Capacity/Achievabe Regions of MIMO MAC/BC/Interference Networks An iu 1, Youjian iu 2, Haige

More information

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance Send Orders for Reprints to reprints@benthamscience.ae 340 The Open Cybernetics & Systemics Journa, 015, 9, 340-344 Open Access Research of Data Fusion Method of Muti-Sensor Based on Correation Coefficient

More information

Stochastic Variational Inference with Gradient Linearization

Stochastic Variational Inference with Gradient Linearization Stochastic Variationa Inference with Gradient Linearization Suppementa Materia Tobias Pötz * Anne S Wannenwetsch Stefan Roth Department of Computer Science, TU Darmstadt Preface In this suppementa materia,

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

ASummaryofGaussianProcesses Coryn A.L. Bailer-Jones

ASummaryofGaussianProcesses Coryn A.L. Bailer-Jones ASummaryofGaussianProcesses Coryn A.L. Baier-Jones Cavendish Laboratory University of Cambridge caj@mrao.cam.ac.uk Introduction A genera prediction probem can be posed as foows. We consider that the variabe

More information

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron Neura Information Processing - Letters and Reviews Vo. 5, No. 2, November 2004 LETTER A Soution to the 4-bit Parity Probem with a Singe Quaternary Neuron Tohru Nitta Nationa Institute of Advanced Industria

More information

Nearly Optimal Constructions of PIR and Batch Codes

Nearly Optimal Constructions of PIR and Batch Codes arxiv:700706v [csit] 5 Jun 07 Neary Optima Constructions of PIR and Batch Codes Hia Asi Technion - Israe Institute of Technoogy Haifa 3000, Israe shea@cstechnionaci Abstract In this work we study two famiies

More information

Demonstration of Ohm s Law Electromotive force (EMF), internal resistance and potential difference Power and Energy Applications of Ohm s Law

Demonstration of Ohm s Law Electromotive force (EMF), internal resistance and potential difference Power and Energy Applications of Ohm s Law Lesson 4 Demonstration of Ohm s Law Eectromotive force (EMF), interna resistance and potentia difference Power and Energy Appications of Ohm s Law esistors in Series and Parae Ces in series and Parae Kirchhoff

More information

Fitting Algorithms for MMPP ATM Traffic Models

Fitting Algorithms for MMPP ATM Traffic Models Fitting Agorithms for PP AT Traffic odes A. Nogueira, P. Savador, R. Vaadas University of Aveiro / Institute of Teecommunications, 38-93 Aveiro, Portuga; e-mai: (nogueira, savador, rv)@av.it.pt ABSTRACT

More information

Akaike Information Criterion for ANOVA Model with a Simple Order Restriction

Akaike Information Criterion for ANOVA Model with a Simple Order Restriction Akaike Information Criterion for ANOVA Mode with a Simpe Order Restriction Yu Inatsu * Department of Mathematics, Graduate Schoo of Science, Hiroshima University ABSTRACT In this paper, we consider Akaike

More information

A MODEL FOR ESTIMATING THE LATERAL OVERLAP PROBABILITY OF AIRCRAFT WITH RNP ALERTING CAPABILITY IN PARALLEL RNAV ROUTES

A MODEL FOR ESTIMATING THE LATERAL OVERLAP PROBABILITY OF AIRCRAFT WITH RNP ALERTING CAPABILITY IN PARALLEL RNAV ROUTES 6 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES A MODEL FOR ESTIMATING THE LATERAL OVERLAP PROBABILITY OF AIRCRAFT WITH RNP ALERTING CAPABILITY IN PARALLEL RNAV ROUTES Sakae NAGAOKA* *Eectronic

More information

Doubly Iterative Receiver for Block Transmissions with EM-Based Channel Estimation

Doubly Iterative Receiver for Block Transmissions with EM-Based Channel Estimation 656 IEEE RANSACIONS ON WIRELESS COMMUNICAIONS, VOL. 8, NO. 2, FEBRUARY 2009 Douby Iterative Receiver for Bock ransmissions with EM-Based Channe Estimation he-hanh Pham, Ying-Chang Liang, Senior Member,

More information

Reliability: Theory & Applications No.3, September 2006

Reliability: Theory & Applications No.3, September 2006 REDUNDANCY AND RENEWAL OF SERVERS IN OPENED QUEUING NETWORKS G. Sh. Tsitsiashvii M.A. Osipova Vadivosto, Russia 1 An opened queuing networ with a redundancy and a renewa of servers is considered. To cacuate

More information

Distributed average consensus: Beyond the realm of linearity

Distributed average consensus: Beyond the realm of linearity Distributed average consensus: Beyond the ream of inearity Usman A. Khan, Soummya Kar, and José M. F. Moura Department of Eectrica and Computer Engineering Carnegie Meon University 5 Forbes Ave, Pittsburgh,

More information

C. Fourier Sine Series Overview

C. Fourier Sine Series Overview 12 PHILIP D. LOEWEN C. Fourier Sine Series Overview Let some constant > be given. The symboic form of the FSS Eigenvaue probem combines an ordinary differentia equation (ODE) on the interva (, ) with a

More information

Proceedings of Meetings on Acoustics

Proceedings of Meetings on Acoustics Proceedings of Meetings on Acoustics Voume 9, 23 http://acousticasociety.org/ ICA 23 Montrea Montrea, Canada 2-7 June 23 Architectura Acoustics Session 4pAAa: Room Acoustics Computer Simuation II 4pAAa9.

More information

On the Performance of Mismatched Data Detection in Large MIMO Systems

On the Performance of Mismatched Data Detection in Large MIMO Systems On the Performance of Mismatched Data Detection in Large MIMO Systems Chares Jeon, Arian Maei, and Christoph Studer arxiv:1605.034v [cs.it] Jun 016 Abstract We investigate the performance of mismatched

More information

Discrete Techniques. Chapter Introduction

Discrete Techniques. Chapter Introduction Chapter 3 Discrete Techniques 3. Introduction In the previous two chapters we introduced Fourier transforms of continuous functions of the periodic and non-periodic (finite energy) type, as we as various

More information

Introduction to Simulation - Lecture 13. Convergence of Multistep Methods. Jacob White. Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy

Introduction to Simulation - Lecture 13. Convergence of Multistep Methods. Jacob White. Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy Introduction to Simuation - Lecture 13 Convergence of Mutistep Methods Jacob White Thans to Deepa Ramaswamy, Micha Rewiensi, and Karen Veroy Outine Sma Timestep issues for Mutistep Methods Loca truncation

More information

IN recent years, the challenge of mitigating nonlinear

IN recent years, the challenge of mitigating nonlinear JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL.??, NO.?, MAY 2017 1 Equaization Methods for NLIN Mitigation Ori Goani, Meir Feder, and Mar Shtaif arxiv:1710.00625v1 [eess.sp] 22 Aug 2017 Abstract We investigate

More information

Modal analysis of a multi-blade system undergoing rotational motion

Modal analysis of a multi-blade system undergoing rotational motion Journa of Mechanica Science and Technoogy 3 (9) 5~58 Journa of Mechanica Science and Technoogy www.springerin.com/content/738-494x DOI.7/s6-9-43-3 Moda anaysis of a muti-bade system undergoing rotationa

More information

On the construction of bivariate exponential distributions with an arbitrary correlation coefficient

On the construction of bivariate exponential distributions with an arbitrary correlation coefficient Downoaded from orbit.dtu.d on: Sep 23, 208 On the construction of bivariate exponentia distributions with an arbitrary correation coefficient Badt, Mogens; Niesen, Bo Friis Pubication date: 2008 Document

More information

Interconnect effects on performance of Field Programmable Analog Array

Interconnect effects on performance of Field Programmable Analog Array nterconnect effects on performance of Fied Programmabe Anaog Array D. Anderson,. Bir, O. A. Pausinsi 3, M. Spitz, K. Reiss Motoroa, SPS, Phoenix, Arizona, USA, University of Karsruhe, Karsruhe, Germany,

More information

Approximate Minimum Bit-Error Rate Multiuser Detection

Approximate Minimum Bit-Error Rate Multiuser Detection Approximate Minimum Bit-Error Rate Multiuser Detection Chen-Chu Yeh, Renato R. opes, and John R. Barry School of Electrical and Computer Engineering Georgia Institute of Technology, Atlanta, Georgia 30332-0250

More information

Limits on Support Recovery with Probabilistic Models: An Information-Theoretic Framework

Limits on Support Recovery with Probabilistic Models: An Information-Theoretic Framework Limits on Support Recovery with Probabiistic Modes: An Information-Theoretic Framewor Jonathan Scarett and Voan Cevher arxiv:5.744v3 cs.it 3 Aug 6 Abstract The support recovery probem consists of determining

More information

Tracking Control of Multiple Mobile Robots

Tracking Control of Multiple Mobile Robots Proceedings of the 2001 IEEE Internationa Conference on Robotics & Automation Seou, Korea May 21-26, 2001 Tracking Contro of Mutipe Mobie Robots A Case Study of Inter-Robot Coision-Free Probem Jurachart

More information

1 Equivalent SDOF Approach. Sri Tudjono 1,*, and Patria Kusumaningrum 2

1 Equivalent SDOF Approach. Sri Tudjono 1,*, and Patria Kusumaningrum 2 MATEC Web of Conferences 159, 01005 (018) IJCAET & ISAMPE 017 https://doi.org/10.1051/matecconf/01815901005 Dynamic Response of RC Cantiever Beam by Equivaent Singe Degree of Freedom Method on Eastic Anaysis

More information

A Novel Learning Method for Elman Neural Network Using Local Search

A Novel Learning Method for Elman Neural Network Using Local Search Neura Information Processing Letters and Reviews Vo. 11, No. 8, August 2007 LETTER A Nove Learning Method for Eman Neura Networ Using Loca Search Facuty of Engineering, Toyama University, Gofuu 3190 Toyama

More information

Error Floor Approximation for LDPC Codes in the AWGN Channel

Error Floor Approximation for LDPC Codes in the AWGN Channel submitted to IEEE TRANSACTIONS ON INFORMATION THEORY VERSION: JUNE 4, 2013 1 Error Foor Approximation for LDPC Codes in the AWGN Channe Brian K. Buter, Senior Member, IEEE, Pau H. Siege, Feow, IEEE arxiv:1202.2826v2

More information

Discrete Techniques. Chapter Introduction

Discrete Techniques. Chapter Introduction Chapter 3 Discrete Techniques 3. Introduction In the previous two chapters we introduced Fourier transforms of continuous functions of the periodic and non-periodic (finite energy) type, we as various

More information

Width of Percolation Transition in Complex Networks

Width of Percolation Transition in Complex Networks APS/23-QED Width of Percoation Transition in Compex Networs Tomer Kaisy, and Reuven Cohen 2 Minerva Center and Department of Physics, Bar-Ian University, 52900 Ramat-Gan, Israe 2 Department of Computer

More information