Efficient Algorithm for Detecting Layered Space-Time Codes

Size: px
Start display at page:

Download "Efficient Algorithm for Detecting Layered Space-Time Codes"

Transcription

1 4TH INTERNATIONAL ITG CONFERENCE ON SOURCE AND CHANNEL CODING, BERLIN, JANUARY Effcent Algorthm for Detectng Layered Space-Tme Codes D. Wübben, J. Rnas, R. Böhnke, V. Kühn and K.D. Kammeyer Department of Communcatons Engneerng Unversty of Bremen, Germany Emal: {wuebben,rnas,boehnke,kuehn,kammeyer}@ant.un-bremen.de Abstract Layered space-tme codes have been desgned to explot the capacty advantage of multple antenna systems n Raylegh fadng envronments. In ths paper, we present a new effcent detecton algorthm based on a sorted QR decomposton. It only needs a fracton of computatonal effort compared to the standard detecton algorthm requrng multple calculatons of the pseudo nverse of the channel matrx. The derved algorthm s not restrcted to layered space-tme archtectures, but can generally be used for detecton n vector channel systems. Keywords Layered space-tme codes, dversty, MIMO system, wreless communcaton. I. Introducton In a Raylegh fadng envronment, multple antenna systems provde an enormous ncrease n capacty compared to sngle antenna systems [1]. Consequently, multple-nput multple-output (MIMO) systems are predestned for hgh data rate wreless communcatons. Space-Tme codes are desgned to explot ths hgh capacty by usng space as a second dmenson of codng [2, 3]. Layered space-tme (LST) codes are a specal knd of space-tme codes wth the advantage of a feasble decodng complexty. The orgnal D-BLAST (Dagonal Bell Labs Layered Space Tme) archtecture proposed by Foschn [4] uses a dagonally layered codng structure n whch code blocks are dspersed across dagonals n space-tme. Thereby, an averaged channel whch s the same for all layers s acheved and the probablty of deep fades s reduced. Due to the dagonal arrangement of the code blocks, D-BLAST s not feasble for real tme mplementatons. A smplfed verson was proposed n [5] and s known as V-BLAST (Vertcal BLAST). It assocates each layer wth a specfc transmt antenna wch leads to an easer detecton and decodng process. For detectng the layers, the multple calculaton of the pseudo nverse of the channel matrx s necessary. In order to sgnfcantly reduce the computatonal effort of detecton, we ntroduce a new and very effcent way of detectng layered space-tme codes. Ths work was supported n part by the German mnstry of educaton and research (BMBF) wthn the project HyEff (project no. 01 BU 153) and the German natonal scence foundaton (DFG) wthn the project AKOM (project #Ka 841/9-1) Ths approach utlzes an adjusted QR decomposton (QRD) by sortng the detecton sequence due to exchangng the columns of the channel matrx. Ths new algorthm s compared to V-BLAST by smulaton results and by an estmaton of the computatonal effort. The remander of ths paper s organzed as follows. In secton II, the MIMO system and the LST archtecture are descrbed. In secton III, V-BLAST and a QRD based algorthm for detectng LST archtectures are revewed. The new approach s ntroduced n secton IV and the performance of both detecton algorthms are compared n secton V. In secton VI forward correcton codng s added n each layer and the computatonal effort of both detectng algorthms s compared n secton VII. A summary and concludng remarks can be found n secton VIII. II. System descrpton We consder the mult antenna system wth n T transmt and n R n T receve antennas shown n Fg. 1. The data s demultplexed n n T data substreams of equal length (called layers). These substreams are mapped nto M-PSK or M-QAM symbols c 1,..., c nt. Alternatvely, a forward error correcton (FEC) code can be used to encode the data substreams before mappng. We wll nvestgate the applcaton of FEC code n secton VI and assume uncoded symbols untl then. The substreams are organzed n frames of length L and are transmtted over the n T antennas at the same tme. The system s equal to V-BLAST proposed n [4] and denoted as Layered Space-Tme (LST) archtecture n [6]. Transmtter Layer1 Layer2 LayernT c 1 c 2 c n T H x 1 x 2 x n R Detector Recever Fg. 1. Model of a MIMO system wth n T transmt and n R receve antennas In order to descrbe the MIMO system, one tme slot of the tme-dscrete baseband model of the rec.

2 4TH INTERNATIONAL ITG CONFERENCE ON SOURCE AND CHANNEL CODING, BERLIN, JANUARY MIMO system s nvestgated. Let c = (c 1 c 2... c nt ) T denote the vector of transmtted symbols, then the correspondng receved sgnal vector x = (x 1 x 2... x nr ) T s calculated by x = H c + ν. (1) In equaton (1), ν = (ν 1 ν 2... ν nr ) T depcts the vector of nose terms at the n R recevng antennas, assumng uncorrelated whte gaussan nose of varance /2 per dmenson for all antennas. The transmtted symbols are normalzed so that the average receved energy per bt s one. The n R n T channel matrx h 1,1... h 1,nT H = (2) h nr,1... h nr,n T contans..d. complex fadng gans h j, descrbng the tap gans between transmt antenna and receve antenna j. Column of H s denoted by h and represents the sngle-nput multple-output (SIMO) channel between transmt antenna and the n R receve antennas. We assume a statc flat-fadng envronment,.e. the channel matrx H s constant over a frame and changes ndependently from frame to frame. The dstnct fadng gans are assumed to be uncorrelated and are perfectly known by the recever. III. Detectng Layered Space-Tme Codes In ths paragraph, two dfferent detecton algorthms for the LST archtecture are descrbed. Frst, the standard detecton algorthm proposed by Bell- Labs [5] and known as V-BLAST s depcted. Shu and Kahn utlzed the QR decomposton of the channel matrx for the detecton of the layers to derve error bounds for V-BLAST and D-BLAST n [6]. They presumed the knowledge of the best detecton sequence, but dd not dscuss the problem of an effcent assortng algorthm, whch s done n secton IV of ths paper. A. BLAST-Algorthm It s obvous from equaton (1) that the receved sgnals are a lnear combnaton of the n T transmtted sgnals. The optmum way of recoverng the n T sgnals at the recever would be maxmum-lkelhood detecton, whch s not feasble due to the enormous complexty. In [4] and [5], Foschn et al. proposed a successve nterference cancellaton technque whch nulls the nterferer by lnearly weghtng the receved sgnal vector wth a zero-forcng (ZF) nullng vector. In every detecton step, all sgnals but one are regarded as nterferer. By applyng the nullng vector to nterference cancellaton, the nfluence of these sgnals s nulled out, the target sgnal s detected and subsequently subtracted from the receved sgnal vector (Interference Cancellaton). For detectng sgnal, the nullng vector w has to be orthogonal to columns h l, l of the channel matrx. The condton 1 { w T 1 l = h l = (3) 0 l s fulflled by the -th row of the Moore-Penrose pseudo-nverse G := H + := ( H H H ) 1 H H, (4) of the channel matrx H. Wth g () denotng row of G, the receved sgnal vector x s lnearly weghted wth the nullng vector w T = g () and the result y = w T x = g () (H c + ν) (5) = c + ν. s used as a decson statstc for the -th substream where ν = g () ν denotes the actual nose. By applyng the quantzaton operaton Q[ ] approprate to the sgnal constellaton, sgnal can be estmated: ĉ = Q[y ]. (6) The nterference caused by the detected sgnal ĉ s now subtracted from the receved sgnal vector x x +1 = x h ĉ (7) and the correspondng column n the channel matrx s set to zero. The ndexed varables (H,G,x ) denote from now on the specfc varables n detecton step, begnnng wth the assgnment (H 1 = H, G 1 = G, x 1 = x) n the frst step. Usng the nomenclature ntroduced n [5], H +1 := H descrbes the nullng of column of the channel matrx H and corresponds to an equvalent system wth n T transmt and n R receve antennas. Thus, the pseudo nverse of ths reduced channel matrx H +1 s used to calculate the nullng vector for detectng layer + 1. The order of detectng affects the error probablty of the algorthm [5]. The sequence S = {k 1, k 2,..., k nt } s defned as a permutaton of the numbers 1, 2,..., n T to depct a specfc detecton sequel. Thus the values y k1, y k2,..., y knt are fltered one by one, the transmtted sgnals ĉ k1, ĉ k2,..., ĉ knt are estmated and the nterference s cancelled step by step accordng to equatons (5) to (7). In order to derve the mnmum total error probablty, t s optmal always to choose and detect the layer wth the largest post detecton sgnalto-nose rato [5]: E { c k 2} SNR k = E { n k 2 } w k 2 1 g (k ) 2. (8) 1 The transpose and conjugate transpose (Hermtan) of x are denoted by x T and x H, respectvely.

3 4TH INTERNATIONAL ITG CONFERENCE ON SOURCE AND CHANNEL CODING, BERLIN, JANUARY Consequently, t s optmal to choose the row g (k) of G wth mnmal norm and thus detect the assocated sgnal c k n detecton step. The whole detecton algorthm s shown n Fg. 2. (1) for = 1,..., n T (2) G = H + (3) k = arg mn j g (j) 2 (4) wk T = g (k) (5) y k = wk T x (6) ĉ k = Q[y k ] (7) x +1 = x h k ĉ k (8) H +1 = H k (9) end Fg. 2. V-BLAST algorthm for detectng layered space-tme sgnals B. QR decomposton of the channel matrx In [6], Shu and Kahn used the QR decomposton of the channel matrx H to derve bounds for the error probablty of LST codes. Therefore, the n R n T channel matrx H H = Q R, (9) s factorzed nto the untary n R n T matrx Q and the upper trangular n T n T matrx R. By denotng the column of H by h and column of Q by q, the decomposton n equaton (9) s descrbed columnwse by r 1,1... r 1,nT (h 1... h nt ) = (q 1... q nt ) r nt,n T (10) By multplyng equaton (1) from the left wth the Hermtan matrx of Q, a n T 1 modfed receved sgnal vector y = Q H x = R c + η. (11) s created from the n R 1 receved sgnal vector x. Snce Q s untary, the statstcal propertes of the nose term η = Q H ν reman unchanged. Element k of vector y becomes wth the nterference term y k = r k,k c k + η k + d k (12) d k = n T =k+1 r k, c. (13) Thus, y k depends on the weghted transmt sgnal r k,k c k, the nose η k and the nterference term d k. Snce R s upper trangular, d k s ndependent of the upper layer sgnals c 1,..., c k 1 and hence the lowest layer (transmt sgnal c nt ) s descrbed by y nt = r nt,n T c nt + η nt. (14) Then, the decson statstc y nt s ndependent of the remanng transmt sgnals and can be used to estmate ĉ nt [ ] ynt ĉ nt = Q (15) r nt,n T by applyng the quantzaton operaton Q[ ]. For detectng layer n T 1, the nterference term r nt 1,n T ĉ nt s elmnated n the modfed receved sgnal y nt 1 = r nt 1,n T 1 c nt 1+r nt 1,n T c nt +η nt 1. (16) Consequently, an nterference free decson statstc to estmate c nt 1 s obtaned under the assumpton ĉ nt = c nt. Detectng layer k = n T 1,..., 1 takes place n an equvalent way. Wth prevous decsons ĉ k+1,..., ĉ nt, the nterference term ˆd k s calculated and cancelled out n the modfed receved sgnal y k. Assumng that all prevous decsons are correct ( ˆd k = d k ), the value z k = y k ˆd k = r k,k c k + η k (17) s free of nterference and thus t can be used to detect c k wth ĉ k = Q[z k /r k,k ]. As already stated, the order of detecton s crucal for the error probablty of the LST system due to the rsk of error propagaton [5]. When usng the QR decomposton for detecton, the sequence of detecton s acheved by permutatng the elements of c and the correspondng columns of H and thereby results n dfferent matrces Q and R. The optmum R maxmzes SNR k = E { c k 2} r k,k 2 E { n k 2 } r k,k 2 (18) n each step of the detecton process (corresponds to the maxmzaton of r k,k for k = n T,..., 1) and can be found by performng O(n 2 T /2) QR decompostons of permutatons of H [7]. In order to reduce the computatonal effort of fndng a detecton sequence, we derve a suboptmal but less complex algorthm for sortng n the next secton. IV. Sorted QR decomposton In ths secton, a new and very effcent approach that comes close to the error performance of V- BLAST s ntroduced. It s bascally an extenson of the modfed Gram-Schmdt algorthm [8] by orderng the columns of H n each orthogonalzaton step. In order to descrbe ths new algorthm, we frst revew the modfed Gram-Schmdt algorthm wthout sortng. In the subsequent the motvaton for the sorted approach and the descrpton of the sorted QR decomposton are presented.

4 4TH INTERNATIONAL ITG CONFERENCE ON SOURCE AND CHANNEL CODING, BERLIN, JANUARY A. Modfed Gram-Schmdt The Gram-Schmdt algorthm computes matrx R of the QR decomposton lne by lne from top to bottom and matrx Q columnwse from left to rght [8]. Startng wth the assgnment Q := H = (h 1,..., h nt ), the followng operatons are executed n every step = 1,..., n T : Assgn norm of column vector q to the dagonal element r, of the upper trangular matrx R (r, = q ) and subsequently scale q to length one (q = q /r, ). Orthogonalze columns q l, < l n T, wth regard to q,.e. subtract the component parallel to q. The component n the drecton of q s equal to the projecton r,l = q H q l and the orthogonal part s calculated by q l = q l r,l q. In every step the vectors q 1,..., q form an orthonormal bass of the vector space spanned by h 1,..., h and the vectors q l, < l n T, contan the components of the correspondng h l orthogonal to ths vector space. The dagonal element r, denotes the length of h orthogonal to q 1,..., q 1 or h 1,..., h 1, respectvely. Furthermore, the coeffcents r,l specfy the component of h l, < l n T, n the drecton of q. B. Sorted Gram-Schmdt From the explanaton n secton IV-A t s obvous that the modfed Gram-Schmdt process calculates the dagonal elements from r 1,1 to r nt,n T. As already stated, t would be optmal to maxmze r k,k by permutatng the rows of Q n every detecton step,.e from r nt,n T to r 1,1. Thus, the optmal detecton sequence S OPT maxmzes SNR k n every detectng step k, k = n T,..., 1. Unfortunately, the search for S OPT s very costly, because t requres O(n 2 T /2) QR decompostons. The sorted Gram-Schmdt process (Sorted QR Decomposton, SQRD) proposed here searches for the detecton sequence S that acheves small SNR k n the upper layers. Consequently, the absolut values of the dagonal elements r k,k n the upper left area of the trangular matrx R are small. Thus, a detecton fault caused by the lttle sgnal-to-nose rato SNR k nfluences only few layers 1,..., k 1 through error propagaton. In order to llustrate the functonalty, one orthogonalzaton step of the SQRD algorthm s explaned n detal. The frst 1 elements of the sequence S are already calculated and therefore the vectors q 1,..., q 1 are fxed. The orderng of the remanng columns s varable and s determned by the orderng rule n order to force small sgnal-tonose ratos for the upper layers. Therefore, the column wth mnmal norm s chosen from the vectors q,..., q nt and denoted wth q k. The correspondng h k has the smallest component orthogonal to the space spanned by q 1,..., q 1, wch leads to the smallest r, of the possble permutatons n step and thereby the smallest SNR. The only change to the modfed Gram-Schmdt algorthm s the reorderng of the columns of Q. In every decomposton step the column q,..., q nt wth the mnmal length orthogonal to the already spanned vector space q 1,..., q 1 s chosen. The whole algorthm for the sgnal detecton s shown n Fg. 3. It conssts of a decomposton part (lne (1) to (11)) and a detecton part (lne (12) to (17)). In the decomposton part, the orderng s done n lne (3) and (4) and provdes the permutaton vector S, the orthogonal matrx Q and the upper trangular matrx R. In the detecton part, the receved sgnal vector s sorted accordng to the permutaton S, and the modfed receved sgnal vector y s calculated (lne (12)). The followng lnes (13) to (17) represent the teratve detecton process descrbed n secton III-B. SQRD Algorthm (1) R = 0, Q = H, S = (1,..., n T ) (2) for = 1,..., n T (3) k = arg mn q l 2 l=,...,n T (4) exchange col. and k n Q, R, S (5) r, = q (6) q = q /r, (7) for l = + 1,..., n T (8) r,l = q H q l (9) q l = q l r,l q (10) end (11) end Sgnal Detecton (12) y = Q H x (13) for k = n T,..., 1 (14) ˆdk = n T =k+1 r k, ĉ (15) z k = y k ˆd k (16) ĉ k = Q[z k /r k,k ] (17) end (18) Permutate ĉ accordng to S Fg. 3. SQRD algorthm and sgnal detecton of layered space-tme codes V. Performance Analyss The performance of the proposed SQRD detecton algorthm and the standard LST detecton algorthm (V-BLAST, [5]) was compared by means of Monte Carlo smulatons for several scenaros. Fg. 4 shows the bt error rates (BER) for an uncoded transmsson of QPSK symbols n a system wth n T = 8 and n R = 12 antennas. The teratve methods unsorted QR decomposton, SQRD and V-BLAST acheves a performance enhancement n comparson to the smple multplcaton wth the

5 4TH INTERNATIONAL ITG CONFERENCE ON SOURCE AND CHANNEL CODING, BERLIN, JANUARY pseudo nverse of H. The strong mpact of orderng the QR decomposton s obvous and only a small dfference of approxmately 0.5 db related to V-BLAST for a BER of 10 5 s vsble for the SQRD algorthm. PS Pseudo nverse Unsorted QRD SQRD V-BLAST BER ( ) 1 ( ) 2 Layer 4 Layer 3 Layer 2 Layer BER ( N ) Fg. 6. Gene detecton n a system wth n T = 4 and n R = 4 antennas, uncoded QPSK symbols 10 5 Fg. 4. Smulaton wth n T = 8 and n R = 12 antennas, uncoded QPSK symbols, spectral effcency of 16 Bt/s/Hz Fg. 5 shows the BER of the dfferent detecton algorthms for an uncoded system wth n T = 4 and n R = 6 antennas. These results confrm the good performance of the SQRD algorthm wth the reduced calculaton complexty n mnd. Pseudo nverse Unsorted QRD SQRD V-BLAST In Fg. 6 the BER per layer are shown for a system wth n T = 4 and n R = 4 antennas when the gene detecton s used. In every detecton step k = 4,..., 1 a dversty of g d = n R k+1 s acheved. Accordng to the dversty levels, the BER of layer k decays wth ( / ) g d. Thus the BER of the upper layers decay much steeper due to the hgher dversty levels n comparson to the layer detected frst (layer 4). VI. Applyng Channel Codng In order to mprove the performance of the sngle user to user communcaton, each layer s now ndependently encoded by a channel coder. For smplcty, we used the half rate (7, 5) oct convolutonal encoder and vterb decodng as shown n Fg. 7. Fg. 8 shows the Frame Error Rate (FER) of an BER 10 4 Transmtter FEC FEC FEC c 1 c 2 c n T H x 1 x 2 x n R Detector & Decoder Recever rec Fg. 5. Smulaton wth n T = 4 and n R = 6 antennas, uncoded QPSK symbols, spectral effcency of 8 Bt/s/Hz In [9] the gene detecton process was ntroduced to nvestgate the error propagaton of V- BLAST. Ths mples real nterference suppresson for each layer, but for subsequent layers deal detecton of the sgnals of precedng layers s assumed. Thus, only correct values are subtracted to reduce the system order and consequently no error propagaton takes place. Fg. 7. Coded LST archtecture wth n T transmt and n R receve antennas, FEC n each layer uncoded and a coded system equpped wth n T = 8 and n T = 12 antennas usng the V-BLAST or the SQRD detecton algorthm, respectvely. The transmtted QPSK sgnals are organzed n frames of length L = 100 symbols ncludng tal symbols for the coded case. The fgure shows the expected performance enhancement for coded systems and agan the SQRD detecton nearly reaches the error probablty of V-BLAST. Ths statement s confrmed by the smulaton result for a system wth n T = 4 and n R = 6 antennas,

6 4TH INTERNATIONAL ITG CONFERENCE ON SOURCE AND CHANNEL CODING, BERLIN, JANUARY FER uncoded SQRD uncoded V-BLAST coded SQRD coded V-BLAST as stated n Fg 2 needs f V BLAST = 8 n 4 T + 16 n 3 T n R + 8 n 2 T n R + 18 Ln T n R (19) floatng pont operatons. Usng the same countng, the SQRD algorthm needs f SQRD = 12 n 2 T n R 2 n T n R + n T (20) +L (4 n 2 T + 8 n T n R + 2 n T ) operatons. The computatonal requrements of the V-BLAST and the SQRD algorthm are compared by the quotent ρ = f SQRD f V BLAST. (21) Fg. 8. FER of uncoded and convolutonally coded system wth n T = 8 and n R = 12 antennas, frame length L = 100, QPSK symbols shown n Fg. 9. uncoded SQRD uncoded V-BLAST coded SQRD coded V-BLAST ρ ρ lm FER PS Fg. 10. Quotent ρ of requred floatng pont operatons for SQRD and V-BLAST wth n T = 8 and n R = 12 antennas varyng frame length L L Fg. 9. FER of uncoded and convolutonally coded system wth n T = 4 and n R = 6 antennas, frame length L = 100, QPSK symbols VII. Computatonal Effort The computatonal requrements of the proposed SQRD algorthm and V-BLAST are compared n ths secton. Therefore, the floatng pont operatons of these algorthms are specfed accordng to the system varables n T, n R and L, wth L denotng the frame length (.e. number of symbols transmtted wthn one layer). Real valued addtons, multplcatons and dvsons are equally counted as one flop to obtan a sngle value for the computatonal effort. Wth these assumptons, the V-BLAST algorthm Fg. 10 depcts the computatonal advantage of the SQRD algorthm over the V-BLAST algorthm for a system wth n T = 8 and n R = 12 antennas. Wth an ncreasng number L of symbols per layer the quotent ρ saturates to a lmt value. Ths value can be calculated by ρ lm = lm L ρ = 4 n T + 8 n R n R (22) and s shown n Fg. 10 as a horzontal lne. Furthermore, the computatonal demands of V- BLAST and SQRD concernng dfferent numbers of antennas are compared. A system wth L = 100 symbols per layer and a varyng number of transmt and receve antennas, wth n T = n R, s nvestgated. Fg. 11 shows the ncreasng computatonal advantage of the SQRD compared the V-BLAST algorthm for ncreasng number of antennas. Thus, the SQRD dramatcally reduces the computatonal requrements for systems wth larger amount of antennas.

7 4TH INTERNATIONAL ITG CONFERENCE ON SOURCE AND CHANNEL CODING, BERLIN, JANUARY ρ Effcency Wreless Communcatons Emplyng Mult- Element Arrays, IEEE Journal on Selected Areas n Commununcatons, vol. 17, no. 11, pp , November [8] G. Strang, Lnear Algebra and ts Applcatons, Harcout Brace Jovanovch College Publshers, Orlando, Florda, thrd edton, [9] S. Bäro, G. Bauch, A. Pavlc, and A. Semmler, Improvng BLAST Performance usng Space-Tme Block Codes and Turbo Decodng, n IEEE Proceedngs of Globecomm, San Francsco, CA, November n T = n R Fg. 11. Quotent ρ of requred floatng pont operatons for SQRD and V-BLAST wth L = 100 varyng n T = n R VIII. Summary and Conclusons We have descrbed a new detecton algorthm for LST codes. The algorthm s based on the Gram- Schmdt algorthm for QR decomposton and requres less computatonal effort n comparson to the standard detecton algorthm wth only small degradaton n error performance. We presented smulaton results for several scenaros and analytcally demonstrated the computatonal advantage of the proposed SQRD algorthm. Snce the core of our algorthm conssts of a sorted knd of QR decomposton, the derved algorthm s not restrcted to layered space-tme archtectures. It can generally be used to detect vector channel systems. References [1] E. Telatar, Capacty of Mult-antenna Gaussan Channels, AT & T-Bell Labs Internal Tech. Memo, June [2] S. M. Alamout, A Smple Transmt Dversty Technque for Wreless Communcatons, IEEE Journal on Selected Areas n Commununcatons, vol. 16, no. 8, pp , October [3] V. Tarokh, N. Seshadr, and A. R. Calderbank, Space- Tme Codes for Hgh Rate Wreless Communcaton: Performance Crteron and Code Constructon, IEEE Transactons on Informaton Theory, vol. 44, no. 2, pp , March [4] G. J. Foschn, Layered Space-Tme Archtecture for Wreless Communcaton n a Fadng Envronment when Usng Multple Antennas, Bell Labs Techncal Journal, vol. 1, no. 2, pp , Autumn [5] P. W. Wolnansky, G. J. Foschn, G. D. Golden, and R. A. Valenzuela, V-BLAST: An Archtecture for Realzng Very Hgh Rates Over the Rch-Scatterng Wreless Channel, n IEEE Proceedngs of ISSSE-98, Psa, Italy, 29. September [6] D. Shu and J.M. Kahn, Layered Space-Tme Codes for Wreless Communcatons usng Multple Transmt Antennas, n IEEE Proceedngs of Internatonal Conference on Communcatons (ICC 99), Vancouver, B.C., June [7] G. J. Foschn, G. D. Golden, A. Valenzela, and P. W. Wolnansky, Smplfed Processng for Hgh Spectral

Low Complexity Soft-Input Soft-Output Hamming Decoder

Low Complexity Soft-Input Soft-Output Hamming Decoder Low Complexty Soft-Input Soft-Output Hammng Der Benjamn Müller, Martn Holters, Udo Zölzer Helmut Schmdt Unversty Unversty of the Federal Armed Forces Department of Sgnal Processng and Communcatons Holstenhofweg

More information

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Linear dispersion code with an orthogonal row structure for simplifying sphere decoding

Linear dispersion code with an orthogonal row structure for simplifying sphere decoding tle Lnear dsperson code wth an orthogonal row structure for smplfyng sphere decodng Author(s) Da XG; Cheung SW; Yuk I Ctaton he 0th IEEE Internatonal Symposum On Personal Indoor and Moble Rado Communcatons

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Wreless Informaton Transmsson System Lab. Chapter 7 Channel Capacty and Codng Insttute of Communcatons Engneerng atonal Sun Yat-sen Unversty Contents 7. Channel models and channel capacty 7.. Channel models

More information

Composite Hypotheses testing

Composite Hypotheses testing Composte ypotheses testng In many hypothess testng problems there are many possble dstrbutons that can occur under each of the hypotheses. The output of the source s a set of parameters (ponts n a parameter

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

DC-Free Turbo Coding Scheme Using MAP/SOVA Algorithms

DC-Free Turbo Coding Scheme Using MAP/SOVA Algorithms Proceedngs of the 5th WSEAS Internatonal Conference on Telecommuncatons and Informatcs, Istanbul, Turkey, May 27-29, 26 (pp192-197 DC-Free Turbo Codng Scheme Usng MAP/SOVA Algorthms Prof. Dr. M. Amr Mokhtar

More information

Appendix B: Resampling Algorithms

Appendix B: Resampling Algorithms 407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles

More information

Iterative Multiuser Receiver Utilizing Soft Decoding Information

Iterative Multiuser Receiver Utilizing Soft Decoding Information teratve Multuser Recever Utlzng Soft Decodng nformaton Kmmo Kettunen and Tmo Laaso Helsn Unversty of Technology Laboratory of Telecommuncatons Technology emal: Kmmo.Kettunen@hut.f, Tmo.Laaso@hut.f Abstract

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Chapter 7 Channel Capacty and Codng Contents 7. Channel models and channel capacty 7.. Channel models Bnary symmetrc channel Dscrete memoryless channels Dscrete-nput, contnuous-output channel Waveform

More information

Time-Varying Systems and Computations Lecture 6

Time-Varying Systems and Computations Lecture 6 Tme-Varyng Systems and Computatons Lecture 6 Klaus Depold 14. Januar 2014 The Kalman Flter The Kalman estmaton flter attempts to estmate the actual state of an unknown dscrete dynamcal system, gven nosy

More information

Digital Modems. Lecture 2

Digital Modems. Lecture 2 Dgtal Modems Lecture Revew We have shown that both Bayes and eyman/pearson crtera are based on the Lkelhood Rato Test (LRT) Λ ( r ) < > η Λ r s called observaton transformaton or suffcent statstc The crtera

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

Consider the following passband digital communication system model. c t. modulator. t r a n s m i t t e r. signal decoder.

Consider the following passband digital communication system model. c t. modulator. t r a n s m i t t e r. signal decoder. PASSBAND DIGITAL MODULATION TECHNIQUES Consder the followng passband dgtal communcaton system model. cos( ω + φ ) c t message source m sgnal encoder s modulator s () t communcaton xt () channel t r a n

More information

MIMO Systems and Channel Capacity

MIMO Systems and Channel Capacity MIMO Systems and Channel Capacty Consder a MIMO system wth m Tx and n Rx antennas. x y = Hx ξ Tx H Rx The power constrant: the total Tx power s x = P t. Component-wse representaton of the system model,

More information

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k)

Hongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k) ISSN 1749-3889 (prnt), 1749-3897 (onlne) Internatonal Journal of Nonlnear Scence Vol.17(2014) No.2,pp.188-192 Modfed Block Jacob-Davdson Method for Solvng Large Sparse Egenproblems Hongy Mao, College of

More information

Mapping QR Decomposition Algorithm for MIMO Detection

Mapping QR Decomposition Algorithm for MIMO Detection 0 7th Internatonal ICST Conference on Communcatons and etworng n Chna (CIACO) appng QR Decomposton Algorthm for IO Detecton Xe, Xnng * ; Wang, Xngln # ; Tan, nqang #, Zhang, Feng # ; e, Zhqang * * Key

More information

An Improved multiple fractal algorithm

An Improved multiple fractal algorithm Advanced Scence and Technology Letters Vol.31 (MulGraB 213), pp.184-188 http://dx.do.org/1.1427/astl.213.31.41 An Improved multple fractal algorthm Yun Ln, Xaochu Xu, Jnfeng Pang College of Informaton

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

OPTIMAL COMBINATION OF FOURTH ORDER STATISTICS FOR NON-CIRCULAR SOURCE SEPARATION. Christophe De Luigi and Eric Moreau

OPTIMAL COMBINATION OF FOURTH ORDER STATISTICS FOR NON-CIRCULAR SOURCE SEPARATION. Christophe De Luigi and Eric Moreau OPTIMAL COMBINATION OF FOURTH ORDER STATISTICS FOR NON-CIRCULAR SOURCE SEPARATION Chrstophe De Lug and Erc Moreau Unversty of Toulon LSEET UMR CNRS 607 av. G. Pompdou BP56 F-8362 La Valette du Var Cedex

More information

x = x 1 + :::+ x K and the nput covarance matrces are of the form ± = E[x x y ]. 3.2 Dualty Next, we ntroduce the concept of dualty wth the followng t

x = x 1 + :::+ x K and the nput covarance matrces are of the form ± = E[x x y ]. 3.2 Dualty Next, we ntroduce the concept of dualty wth the followng t Sum Power Iteratve Water-fllng for Mult-Antenna Gaussan Broadcast Channels N. Jndal, S. Jafar, S. Vshwanath and A. Goldsmth Dept. of Electrcal Engg. Stanford Unversty, CA, 94305 emal: njndal,syed,srram,andrea@wsl.stanford.edu

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

Lossy Compression. Compromise accuracy of reconstruction for increased compression.

Lossy Compression. Compromise accuracy of reconstruction for increased compression. Lossy Compresson Compromse accuracy of reconstructon for ncreased compresson. The reconstructon s usually vsbly ndstngushable from the orgnal mage. Typcally, one can get up to 0:1 compresson wth almost

More information

Antenna Combining for the MIMO Downlink Channel

Antenna Combining for the MIMO Downlink Channel Antenna Combnng for the IO Downlnk Channel arxv:0704.308v [cs.it] 0 Apr 2007 Nhar Jndal Department of Electrcal and Computer Engneerng Unversty of nnesota nneapols, N 55455, USA Emal: nhar@umn.edu Abstract

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Formulas for the Determinant

Formulas for the Determinant page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use

More information

Linear Approximation with Regularization and Moving Least Squares

Linear Approximation with Regularization and Moving Least Squares Lnear Approxmaton wth Regularzaton and Movng Least Squares Igor Grešovn May 007 Revson 4.6 (Revson : March 004). 5 4 3 0.5 3 3.5 4 Contents: Lnear Fttng...4. Weghted Least Squares n Functon Approxmaton...

More information

Comparison of Regression Lines

Comparison of Regression Lines STATGRAPHICS Rev. 9/13/2013 Comparson of Regresson Lnes Summary... 1 Data Input... 3 Analyss Summary... 4 Plot of Ftted Model... 6 Condtonal Sums of Squares... 6 Analyss Optons... 7 Forecasts... 8 Confdence

More information

Negative Binomial Regression

Negative Binomial Regression STATGRAPHICS Rev. 9/16/2013 Negatve Bnomal Regresson Summary... 1 Data Input... 3 Statstcal Model... 3 Analyss Summary... 4 Analyss Optons... 7 Plot of Ftted Model... 8 Observed Versus Predcted... 10 Predctons...

More information

S Advanced Digital Communication (4 cr) Targets today

S Advanced Digital Communication (4 cr) Targets today S.72-3320 Advanced Dtal Communcaton (4 cr) Convolutonal Codes Tarets today Why to apply convolutonal codn? Defnn convolutonal codes Practcal encodn crcuts Defnn qualty of convolutonal codes Decodn prncples

More information

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,

More information

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have

More information

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for

More information

The Concept of Beamforming

The Concept of Beamforming ELG513 Smart Antennas S.Loyka he Concept of Beamformng Generc representaton of the array output sgnal, 1 where w y N 1 * = 1 = w x = w x (4.1) complex weghts, control the array pattern; y and x - narrowband

More information

Error Probability for M Signals

Error Probability for M Signals Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

P R. Lecture 4. Theory and Applications of Pattern Recognition. Dept. of Electrical and Computer Engineering /

P R. Lecture 4. Theory and Applications of Pattern Recognition. Dept. of Electrical and Computer Engineering / Theory and Applcatons of Pattern Recognton 003, Rob Polkar, Rowan Unversty, Glassboro, NJ Lecture 4 Bayes Classfcaton Rule Dept. of Electrcal and Computer Engneerng 0909.40.0 / 0909.504.04 Theory & Applcatons

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm Desgn and Optmzaton of Fuzzy Controller for Inverse Pendulum System Usng Genetc Algorthm H. Mehraban A. Ashoor Unversty of Tehran Unversty of Tehran h.mehraban@ece.ut.ac.r a.ashoor@ece.ut.ac.r Abstract:

More information

A NEW DISCRETE WAVELET TRANSFORM

A NEW DISCRETE WAVELET TRANSFORM A NEW DISCRETE WAVELET TRANSFORM ALEXANDRU ISAR, DORINA ISAR Keywords: Dscrete wavelet, Best energy concentraton, Low SNR sgnals The Dscrete Wavelet Transform (DWT) has two parameters: the mother of wavelets

More information

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method

More information

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011 Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected

More information

Rethinking MIMO for Wireless Networks: Linear Throughput Increases with Multiple Receive Antennas

Rethinking MIMO for Wireless Networks: Linear Throughput Increases with Multiple Receive Antennas Retnng MIMO for Wreless etwors: Lnear Trougput Increases wt Multple Receve Antennas ar Jndal Unversty of Mnnesota Unverstat Pompeu Fabra Jont wor wt Jeff Andrews & Steven Weber MIMO n Pont-to-Pont Cannels

More information

Research on Modified Root-MUSIC Algorithm of DOA Estimation Based on Covariance Matrix Reconstruction

Research on Modified Root-MUSIC Algorithm of DOA Estimation Based on Covariance Matrix Reconstruction Sensors & ransducers, Vol. 78, Issue 9, September 04, pp. 4-8 Sensors & ransducers 04 by IFSA Publshng, S. L. http://www.sensorsportal.com Research on Modfed Root-MUSIC Algorthm of DOA Estmaton Based on

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

Chapter 11: Simple Linear Regression and Correlation

Chapter 11: Simple Linear Regression and Correlation Chapter 11: Smple Lnear Regresson and Correlaton 11-1 Emprcal Models 11-2 Smple Lnear Regresson 11-3 Propertes of the Least Squares Estmators 11-4 Hypothess Test n Smple Lnear Regresson 11-4.1 Use of t-tests

More information

Secret Communication using Artificial Noise

Secret Communication using Artificial Noise Secret Communcaton usng Artfcal Nose Roht Neg, Satashu Goel C Department, Carnege Mellon Unversty, PA 151, USA {neg,satashug}@ece.cmu.edu Abstract The problem of secret communcaton between two nodes over

More information

Power Allocation for Distributed BLUE Estimation with Full and Limited Feedback of CSI

Power Allocation for Distributed BLUE Estimation with Full and Limited Feedback of CSI Power Allocaton for Dstrbuted BLUE Estmaton wth Full and Lmted Feedback of CSI Mohammad Fanae, Matthew C. Valent, and Natala A. Schmd Lane Department of Computer Scence and Electrcal Engneerng West Vrgna

More information

Transform Coding. Transform Coding Principle

Transform Coding. Transform Coding Principle Transform Codng Prncple of block-wse transform codng Propertes of orthonormal transforms Dscrete cosne transform (DCT) Bt allocaton for transform coeffcents Entropy codng of transform coeffcents Typcal

More information

An Application of Fuzzy Hypotheses Testing in Radar Detection

An Application of Fuzzy Hypotheses Testing in Radar Detection Proceedngs of the th WSES Internatonal Conference on FUZZY SYSEMS n pplcaton of Fuy Hypotheses estng n Radar Detecton.K.ELSHERIF, F.M.BBDY, G.M.BDELHMID Department of Mathematcs Mltary echncal Collage

More information

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016 U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and

More information

Comparison of Wiener Filter solution by SVD with decompositions QR and QLP

Comparison of Wiener Filter solution by SVD with decompositions QR and QLP Proceedngs of the 6th WSEAS Int Conf on Artfcal Intellgence, Knowledge Engneerng and Data Bases, Corfu Island, Greece, February 6-9, 007 7 Comparson of Wener Flter soluton by SVD wth decompostons QR and

More information

Global Sensitivity. Tuesday 20 th February, 2018

Global Sensitivity. Tuesday 20 th February, 2018 Global Senstvty Tuesday 2 th February, 28 ) Local Senstvty Most senstvty analyses [] are based on local estmates of senstvty, typcally by expandng the response n a Taylor seres about some specfc values

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

A Feedback Reduction Technique for MIMO Broadcast Channels

A Feedback Reduction Technique for MIMO Broadcast Channels A Feedback Reducton Technque for MIMO Broadcast Channels Nhar Jndal Department of Electrcal and Computer Engneerng Unversty of Mnnesota Mnneapols, MN 55455, USA Emal: nhar@umn.edu Abstract A multple antenna

More information

Outage and Diversity of Linear Receivers in Flat-Fading MIMO Channels

Outage and Diversity of Linear Receivers in Flat-Fading MIMO Channels Outage and Dversty of Lnear Recevers n Flat-Fadng IO Channels Ahmadreza Hedayat ember, IEEE, and Ara Nosratna Senor ember, IEEE Abstract Ths correspondence studes lnear recevers for IO channels under frequency-nonselectve

More information

The optimal delay of the second test is therefore approximately 210 hours earlier than =2.

The optimal delay of the second test is therefore approximately 210 hours earlier than =2. THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple

More information

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013

ISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013 ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run

More information

Chapter - 2. Distribution System Power Flow Analysis

Chapter - 2. Distribution System Power Flow Analysis Chapter - 2 Dstrbuton System Power Flow Analyss CHAPTER - 2 Radal Dstrbuton System Load Flow 2.1 Introducton Load flow s an mportant tool [66] for analyzng electrcal power system network performance. Load

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

A Lower Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control

A Lower Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control A ower Bound on SIR Threshold for Call Admsson Control n Multple-Class CDMA Systems w Imperfect ower-control Mohamed H. Ahmed Faculty of Engneerng and Appled Scence Memoral Unversty of ewfoundland St.

More information

Modal Strain Energy Decomposition Method for Damage Detection of an Offshore Structure Using Modal Testing Information

Modal Strain Energy Decomposition Method for Damage Detection of an Offshore Structure Using Modal Testing Information Thrd Chnese-German Jont Symposum on Coastal and Ocean Engneerng Natonal Cheng Kung Unversty, Tanan November 8-16, 2006 Modal Stran Energy Decomposton Method for Damage Detecton of an Offshore Structure

More information

Hopfield Training Rules 1 N

Hopfield Training Rules 1 N Hopfeld Tranng Rules To memorse a sngle pattern Suppose e set the eghts thus - = p p here, s the eght beteen nodes & s the number of nodes n the netor p s the value requred for the -th node What ll the

More information

Average Decision Threshold of CA CFAR and excision CFAR Detectors in the Presence of Strong Pulse Jamming 1

Average Decision Threshold of CA CFAR and excision CFAR Detectors in the Presence of Strong Pulse Jamming 1 Average Decson hreshold of CA CFAR and excson CFAR Detectors n the Presence of Strong Pulse Jammng Ivan G. Garvanov and Chrsto A. Kabachev Insttute of Informaton echnologes Bulgaran Academy of Scences

More information

Multi-user Detection Based on Weight approaching particle filter in Impulsive Noise

Multi-user Detection Based on Weight approaching particle filter in Impulsive Noise Internatonal Symposum on Computers & Informatcs (ISCI 2015) Mult-user Detecton Based on Weght approachng partcle flter n Impulsve Nose XIAN Jn long 1, a, LI Sheng Je 2,b 1 College of Informaton Scence

More information

Lecture 12: Classification

Lecture 12: Classification Lecture : Classfcaton g Dscrmnant functons g The optmal Bayes classfer g Quadratc classfers g Eucldean and Mahalanobs metrcs g K Nearest Neghbor Classfers Intellgent Sensor Systems Rcardo Guterrez-Osuna

More information

Chapter 13: Multiple Regression

Chapter 13: Multiple Regression Chapter 13: Multple Regresson 13.1 Developng the multple-regresson Model The general model can be descrbed as: It smplfes for two ndependent varables: The sample ft parameter b 0, b 1, and b are used to

More information

Workshop: Approximating energies and wave functions Quantum aspects of physical chemistry

Workshop: Approximating energies and wave functions Quantum aspects of physical chemistry Workshop: Approxmatng energes and wave functons Quantum aspects of physcal chemstry http://quantum.bu.edu/pltl/6/6.pdf Last updated Thursday, November 7, 25 7:9:5-5: Copyrght 25 Dan Dll (dan@bu.edu) Department

More information

The Gaussian classifier. Nuno Vasconcelos ECE Department, UCSD

The Gaussian classifier. Nuno Vasconcelos ECE Department, UCSD he Gaussan classfer Nuno Vasconcelos ECE Department, UCSD Bayesan decson theory recall that we have state of the world X observatons g decson functon L[g,y] loss of predctng y wth g Bayes decson rule s

More information

Non-linear Canonical Correlation Analysis Using a RBF Network

Non-linear Canonical Correlation Analysis Using a RBF Network ESANN' proceedngs - European Smposum on Artfcal Neural Networks Bruges (Belgum), 4-6 Aprl, d-sde publ., ISBN -97--, pp. 57-5 Non-lnear Canoncal Correlaton Analss Usng a RBF Network Sukhbnder Kumar, Elane

More information

/ n ) are compared. The logic is: if the two

/ n ) are compared. The logic is: if the two STAT C141, Sprng 2005 Lecture 13 Two sample tests One sample tests: examples of goodness of ft tests, where we are testng whether our data supports predctons. Two sample tests: called as tests of ndependence

More information

Inexact Newton Methods for Inverse Eigenvalue Problems

Inexact Newton Methods for Inverse Eigenvalue Problems Inexact Newton Methods for Inverse Egenvalue Problems Zheng-jan Ba Abstract In ths paper, we survey some of the latest development n usng nexact Newton-lke methods for solvng nverse egenvalue problems.

More information

On the correction of the h-index for career length

On the correction of the h-index for career length 1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat

More information

Suppose that there s a measured wndow of data fff k () ; :::; ff k g of a sze w, measured dscretely wth varable dscretzaton step. It s convenent to pl

Suppose that there s a measured wndow of data fff k () ; :::; ff k g of a sze w, measured dscretely wth varable dscretzaton step. It s convenent to pl RECURSIVE SPLINE INTERPOLATION METHOD FOR REAL TIME ENGINE CONTROL APPLICATIONS A. Stotsky Volvo Car Corporaton Engne Desgn and Development Dept. 97542, HA1N, SE- 405 31 Gothenburg Sweden. Emal: astotsky@volvocars.com

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

The Geometry of Logit and Probit

The Geometry of Logit and Probit The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.

More information

Communication with AWGN Interference

Communication with AWGN Interference Communcaton wth AWG Interference m {m } {p(m } Modulator s {s } r=s+n Recever ˆm AWG n m s a dscrete random varable(rv whch takes m wth probablty p(m. Modulator maps each m nto a waveform sgnal s m=m

More information

EEE 241: Linear Systems

EEE 241: Linear Systems EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they

More information

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U) Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of

More information

1 GSW Iterative Techniques for y = Ax

1 GSW Iterative Techniques for y = Ax 1 for y = A I m gong to cheat here. here are a lot of teratve technques that can be used to solve the general case of a set of smultaneous equatons (wrtten n the matr form as y = A), but ths chapter sn

More information

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin Proceedngs of the 007 Wnter Smulaton Conference S G Henderson, B Bller, M-H Hseh, J Shortle, J D Tew, and R R Barton, eds LOW BIAS INTEGRATED PATH ESTIMATORS James M Calvn Department of Computer Scence

More information

This column is a continuation of our previous column

This column is a continuation of our previous column Comparson of Goodness of Ft Statstcs for Lnear Regresson, Part II The authors contnue ther dscusson of the correlaton coeffcent n developng a calbraton for quanttatve analyss. Jerome Workman Jr. and Howard

More information

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003 Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel

More information

Report on Image warping

Report on Image warping Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

A Particle Filter Algorithm based on Mixing of Prior probability density and UKF as Generate Importance Function

A Particle Filter Algorithm based on Mixing of Prior probability density and UKF as Generate Importance Function Advanced Scence and Technology Letters, pp.83-87 http://dx.do.org/10.14257/astl.2014.53.20 A Partcle Flter Algorthm based on Mxng of Pror probablty densty and UKF as Generate Importance Functon Lu Lu 1,1,

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve

More information

ABSTRACT FOR MULTI-ANTENNA WIRELESS COMMUNICATION SYSTEMS. Zoltan Safar, Doctor of Philosophy, 2009

ABSTRACT FOR MULTI-ANTENNA WIRELESS COMMUNICATION SYSTEMS. Zoltan Safar, Doctor of Philosophy, 2009 ABSTRACT Ttle of Dssertaton: EFFICIENT CODING AND DECODING METHODS FOR MULTI-ANTENNA WIRELESS COMMUNICATION SYSTEMS Zoltan Safar, Doctor of Phlosophy, 9 Dssertaton drected by: Professor K. J. Ray Lu Department

More information

TOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION

TOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION 1 2 MULTIPLIERLESS FILTER DESIGN Realzaton of flters wthout full-fledged multplers Some sldes based on support materal by W. Wolf for hs book Modern VLSI Desgn, 3 rd edton. Partly based on followng papers:

More information

Homework Assignment 3 Due in class, Thursday October 15

Homework Assignment 3 Due in class, Thursday October 15 Homework Assgnment 3 Due n class, Thursday October 15 SDS 383C Statstcal Modelng I 1 Rdge regresson and Lasso 1. Get the Prostrate cancer data from http://statweb.stanford.edu/~tbs/elemstatlearn/ datasets/prostate.data.

More information

Some Comments on Accelerating Convergence of Iterative Sequences Using Direct Inversion of the Iterative Subspace (DIIS)

Some Comments on Accelerating Convergence of Iterative Sequences Using Direct Inversion of the Iterative Subspace (DIIS) Some Comments on Acceleratng Convergence of Iteratve Sequences Usng Drect Inverson of the Iteratve Subspace (DIIS) C. Davd Sherrll School of Chemstry and Bochemstry Georga Insttute of Technology May 1998

More information

Estimating the Fundamental Matrix by Transforming Image Points in Projective Space 1

Estimating the Fundamental Matrix by Transforming Image Points in Projective Space 1 Estmatng the Fundamental Matrx by Transformng Image Ponts n Projectve Space 1 Zhengyou Zhang and Charles Loop Mcrosoft Research, One Mcrosoft Way, Redmond, WA 98052, USA E-mal: fzhang,cloopg@mcrosoft.com

More information

arxiv:quant-ph/ Jul 2002

arxiv:quant-ph/ Jul 2002 Lnear optcs mplementaton of general two-photon proectve measurement Andrze Grudka* and Anton Wóck** Faculty of Physcs, Adam Mckewcz Unversty, arxv:quant-ph/ 9 Jul PXOWRZVNDR]QDRODQG Abstract We wll present

More information