12TH ICCRTS Adapting C2 to the 21st Century

Size: px
Start display at page:

Download "12TH ICCRTS Adapting C2 to the 21st Century"

Transcription

1 12TH ICCRTS Adapting C2 to the 21st Century Title of Paper: The Ipact of Entropic Drag on Coand and Control Paper ID: I-2 Track(s): Network Centric Experientation and Applications, C2 Concepts Theory and Policy, Organizational Issues Authors: David Scheidt, Michael Pekala Point of Contact: David Scheidt Nae of Organization: Johns Hopkins University Applied Physics Laboratory Coplete Address: Johns Hopkins University Applied Physics Laboratory 111 Johns Hopkins Road, Laurel, MD 2723 Telephone: (24) E-ail: Abstract: A coonly believed axio in signal detection theory is that "ore inforation is good" [1]. That is, when attepting to deterine the state of a partially observable syste the addition of correct inforation onotonically iproves the correctness of the state assessent. When diagnosing static systes the assertion that "the effect of inforation is to increase the likelihood of getting correct diagnosis, while reducing the likelihood of incorrect diagnosis" holds. However, when diagnosing dynaic systes, the iproveent in diagnosis is offset by increases in uncertainty generated by the dynaic forces within the syste being observed. A siilar effect occurs when controlling dynaic, stochastic systes. The act of exercising control requires a finite aount of tie, during which uncertainty enters into the syste reducing the efficacy of the control policy. The ipact of inforation processing delays increases in relevance as the coplexity and pace of both the syste and control apparatus increase. This paper defines a atheatical fraework describing the effect of inforation and inforation processing on the diagnosis of dynaic systes. 1

2 Introduction Regardless of the coand and control structure, the quality and speed of inforation flow between tea ebers directly ipacts the perforance of a tea. In all structures, latencies are caused by each hop in the counications chain. Counication liitations have been a topic of growing popularity since Shannon [2]. The iportance Shannon's inforation entropy has on coand and control has been studied by Perry [3], Moffett [4] and Caves [5]. However, these studies are tie insensitive and do not attept to easure and account for the dynaic forces associated with coplex, changing environents. In this paper we take a step toward filling that gap after initially laying the technical and conceptual foundations of abstract systes and inforation theory. Systes and Worlds An understanding of the inforation required to represent a syste begins with a foral definition of that syste. We refer to a syste being diagnosed or controlled as a world (W). Worlds are defined in ters of eleents, attributes, events, and state transitions, as follows. Definition: A world W = (K, E, A, Att, Val, f ), where K = {k 1, k n } is a finite set of eleents E = {e 1, e r } is a set of events A = {a 1, a p } is a finite set of attributes, each applicable to one or ore eleents. Att K A A 2... A P is an eleent-attribute relation in which ( k,( a,..., a )) Att i if and only if ki1 ki i( 1 i ) a k i are those and only j those attributes that apply to eleent k i. [Notation: A k denotes the set of k s attributes; i.e., A = a,..., a } k,( a,..., a )) ] k { ki 1 ki [Notation: a A ki j ki of values for attribute a ] ( i ki1 ki V a ki is the range j k i K, Val k i V a... V ki a 1 ki is a valuation relation for k i s attributes. Val = U Val k is the collection of i k i K valuation relations for all eleents in W. f : K Val E Val is a state transition function. Eleents represent real or siulated objects, e.g., baffles, therostats, switches, and ducts or their representations in a real or siulated HVAC world. Attributes provide descriptions of eleents, such as location and orientation. These are finite, constrained values which collectively define the scope of the world. The state of an eleent is an assignent of values to all its attributes; i.e., the state space (P k ) of eleent k is Val k. ki j P = V (1) k al k An individual state of k is represented by x k or equivalently by the list ( x,, ) k x k 1 K of values of k s attributes. Eleents change states via events. Laws that govern state transitions are apped through the function f. P W denotes the state space of W and is defined as the power set of the state spaces for all k K, i.e.; 2

3 Pw Pk Pk = P (2) Each eleent of P W is called a state of the world, or world state, soe of which are feasible (P f ) and others are infeasible (P i ). P f and P i are utually exclusive and coprehensive: P f Pi = Ø (3) Pw = Pf Pi (4) Inforation and Entropy The inforation content (I) of essage is the aount of inforation required to uniquely identify a state. At this point we only consider essages whose inforation content is ideally coded for the set of possible values that could be stored in the essage. That is, the representation schee uses the iniu nuber of bits to copletely represent the set of possible values. Inforation content relative to state space P is defined by Brillouin [6] as: cln P I = (5) Here, c is a constant associated with the size of the language used to represent a world state. In odern coputers and counications this language is binary allowing us to define inforation content as: k n I = log 2 P (6) Through Brillouin the nuber of feasible states that exist for a world after essage describing that world has been received (and processed) is I (log2 P 2 w ) P f = (7) or, alternatively, 2 I P w f = I I (8) The feasible space represents disorder, lack of knowledge, or inforation entropy (h) [7]. Shannon defines inforation entropy of a piece of inforation, a, as P 2 1 h ( a) = log2 (9) Pr( a) in which Pr(a) is the general probability of a. In a world of fixed size, the post-essage entropy of that world is: H = log 2 Pf = log2 Pw I (1) Inforation entropy is a useful construct that we will extend to collections of inforation and inforation exchanges. Inforation entropy and uncertainty are frequently used interchangeably. While both are used to easure disorder in a syste we distinguish the by the units in which they are easured. Inforation entropy, being a for of Shannon inforation, is easured in bits. Uncertainty is easured in natural units for the syste being described (e.g., eters). Equation (1) shows how new inforation can be used to reduce entropy within the representation of a world. In static worlds the inforation content of a essage that contains positive inforation (I >) decreases inforation entropy. For ideally coded essages, providing inforation about a previously unknown world (worlds in which H = log 2 P w ) the decrease in inforation entropy is equal to the size of the essage. ΔH I I ; Pw 2 = log2 Pw ; Pw < 2 I (11) If soe knowledge of the world exists prior to receipt of a essage, a portion of the essage ay be redundant, reducing the essage's inforation content. The inforation content of a essage about a world for which a priori inforation is available is expressed as: Δ H = log 2 P I p( I ) I (12) f where p(x) is a decoding function that produces a set of feasible states fro x. Uncertainty Due to Fidelity 3

4 In practical ters worlds are represented as abstractions. In odern counications, seantics for encoding attributes (and eleents, in this paper) are defined and encoded in bits. Soe real-world inforation is naturally discrete. Soe, though, is naturally continuous and can only be approxiated with binary representations. The aount of uncertainty associated with a discrete representation of continuous attributes (ε r ) is liited (i.e., bounded fro below) by the nuber of bits used to encode the data and the diensionality of the data. For exaple, when counicating attributes describing positions in Cartesian space, a essage ust be transitted digitally at soe point, liiting the fidelity by the least precise representation used in the counications path, which is the unit distance (r ˆ) of the representation. In this discussion we assue that a noralized representation schee is used and all states are equally probable. MacKay [8] showed that a noralized representation schee axiizes the inforation content per transitted bit. Since we are priarily interested in expressing the liits of counication we can assue optial, noralized encoding is used and one bit of transitted data equals one bit of un-decayed Shannon inforation. The unit distance defines the iniu uncertainty of our knowledge such that the iniu aount of error is: n ˆ 2 n ε r = r; r Z (13) where r is the unit size of representation and n is the diensionality of the space. For a world of fixed size, the size of the state space is derived fro the range of attributes within the syste and the unit distance of each attribute. Specifically, xi x Pk = (14) x X rˆ x where x and x i are the iniu and axiu values of an ordered attribute and rˆ is the unit distance of the attribute. When a attribute diensions are equivalent (e.g. Cartesian coordinates), then P k n xi x = (15) and the size of the state space of the world is P w = x i rˆ x rˆ K n (16) The inforation content of a regular world (i.e. a world in which transitions between states are Markovian) can now be shown as a function of diensions of the world and the unit distance: I w = K n( log 2 ( xi x ) log 2 rˆ ) (17) Entropic Drag So far we have liited our discussion to static worlds, in which inforation entropy is decreased by each successive essage that describes the world. On the other hand, in dynaic worlds the decrease in entropy achieved by a essage can be offset by an increase in entropy due to the world's dynaic forces. We call this entropic drag (Γ), as the increase in entropy creates a drag on an observer's ability to understand the world. Entropic drag is derived fro the rate at which the dynaic forces create unpredictable change. To define these dynaic forces recall that a world's state space P w is divided into feasible and infeasible states and that the transition between these states is Markovian, defined by the transition function ƒ, defined above. For any set of infeasible states there exists a boundary layer between it and feasible states. The rate at which infeasible states transition to feasible states is the driving force behind entropic drag. We forally define entropic drag as the log 2 of the rate at which previously infeasible world states becoe feasible: di dx Γ w ( t) = H w( I ) = log2 Pf ( x) (18) dt dt 4

5 The ipact of entropic drag on inforation is shown as a decrease in the inforation content on a world after an observation such that: t I = ( + ) Γ( ) w I I 1 t dt (19) where t is the tie required to process the essage, I is the inforation content on the world prior to processing the essage and I is the inforation content of the essage. The forces of entropic drag continuously degrade inforation on a world whether essages continue to arrive or not. Only through the continual acquisition of new inforation can a state of knowledge of a dynaic world be aintained. If a coander's objective is to ake a decision with axial inforation he ust be cognizant of the rate of entropy and the value of new inforation. An iportant feature of equation (19) is that, if the tie required to process a essage is sufficiently long, the loss of inforation associated with entropic drag will exceed the inforation content of the essage and the net result of processing the essage will be an inforation loss! Obtaining and using inforation takes soe finite aount of tie. The process of obtaining and using inforation was described by Boyd as the Observe, Orient, Decide and Act (OODA) loop. The first part of this loop consists of a sensor observing the environent and transitting a essage to an inforation sink where it is fused with additional inforation to create a consistent odel of the world. The delay (δ) between an observation (beginning) at tie t o and the incorporation of the observed data at t' is the su of the sensor processing (δ s ), counications (δ c ) and data fusion (δ f ) delays. t ' = t + δ = t + δ s + δ c + δ f (2) We assue there are no additional delays, for instance placing on hold a essage between the copletion of processing and the onset of counications. The sensor processing and counications channels are assued to process inforation at a fixed rate easured in bits per second ( β ). The data processing profile for data fusion varies by technique, with soe techniques, such as nearest-tie replaceent, operating at a fixed rate, and others, such as search-based techniques, incurring exponential increases in latency as the nuber of observations increase. For the purpose of this paper we will assue that each eleent in the observe-orient chain operates at a fixed rate in bits per second. or δ β I δ = (21a) I t = β = (21b) By applying this definition to (19) we can express inforation content in ters of essage size and bandwidth. I I ( ) ( ) w = I + I 1 Γ β t dt (22) and I Γ ( I + I ) β t dt ΔI w = I ( ) (23) Fro (18) we can see that inforation is only gained fro a single essage if the rate of inforation entropy is less than the bandwidth. I > iff β > Γ (24) Δ w Inforation entropy progresses along a frontier between the feasible state space and the infeasible state space. The frontier (S) is set of piecewise sooth surfaces (s i S) within P w that are defined as the boundaries between infeasible states x` P i that are reachable fro a feasible state x`` P f through an event in accordance to the transition function. Each piecewise sooth surface is either a eber of a set of surfaces that for a closed n-diensional surface that encapsulates positive or negative inforation, or a eber of a 5

6 sei-closed surface whose edges abut liits of P w space. S changes at a rate that is defined by the entropic drag with the boundary perpetually growing the aount of feasible space and shrinking the infeasible space. The entropic drag for a surface s i is: dh r dx Γs ( t) = H s ( t) = log si v i i 2 (25) dt dt where v r is the n-diensional vector of unpredictable change noralized to s i. The entropic drag for the entire world is the su of the entropic drag for each surface. dh Γw ( t ) = H s ( t) i (26) dt s Positive and Negative Inforation i Positive inforation (P + ) is a set of assertions that one or ore states are true. + P = { x1,x2,..,xn} (27) Positive inforation usually represents highly iprobable states, so essages containing positive inforation provide a large aount of inforation content. For exaple, a essage stating that an ant was observed at a given location at tie t is positive inforation that, through inference, ensures that that specific ant was not at any other location at t. Negative inforation (P - ) is a set of assertions that one or ore states are false; i.e., that the negation of each state holds. P = { x1, x2,.., xn} (28) Figure 1 A negative observation in P w projected onto Z 2 space For exaple, a essage stating that an observation at tie t found that an eleent did not exist at a specific location is negative inforation. Inforation partially describing a world state can be expressed either through positive inforation or negative inforation. In practice, observations frequently produce a ixture of positive and negative inforation. Positive and negative inforation both create infeasible regions in the state space and the inforation gain fro a essage is proportional to the reduction in feasible states. This can be visualized as If essage encodes negative inforation, the inforation gain fro is I = P log 2 (29) inforation describing a hole of infeasibility in the state space [Fig. 1]. 6

7 envisioned as the feasibility frontier growing outward fro a clustered set of feasible states [Fig. 3]. Inforation content decreases until eventually all states becoe feasible. As negative inforation entropies, inforation is decreasingly lost in proportion to the diensionality of the world. This can be envisioned as the feasibility frontier growing inward, reoving a diinishing set of clustered infeasible states [Fig. 4]. Figure 2 A positive observation of a unique object in P w projected onto Z 2 space The inforation gained fro positive inforation given in essage is equal to the size of the space outside of the positive inforation set: + + I = log 2 Pw log2 P (3) This can be visualized as a feasibility volue surrounded by infeasibility [Fig. 2]. Figure 4 Reducing infeasible state space after a negative observation Figure 3 Reducing infeasible state space after a positive observation Each closed surface either grows (I + ) or shrinks (I - ) due to entropic drag until it: (i) terinates in a singularity; (ii) terinates against other surfaces; or (iii) terinates against the boundaries of the state space. The inforation loss for the world is a piecewise linear surface that is the su of the inforation loss for each surface [Fig. 5]. In Fig. 5, s i is the border between the shaded feasibility state space and the unshaded infeasible state space. As inforation fro positive observations entropies, inforation is increasingly lost at a rate that increases in proportion to the diensionality of the original essages. The loss of positive inforation can be 7

8 Figure 5 Piecewise linear state space resulting fro I + and I - essages Inforation Channels Inforation channels (C(t)) are streas of inforation, with inforation flow easured in bits per second being the bandwidth of a channel (β). We use inforation channel as an abstraction representing the aggregate ability of a syste to acquire and process new inforation although inforation can be, and often is, a traditional counications channel. The axiu capacity of an inforation channel defines the rate at which a syste is capable of acquiring new inforation. In ideal conditions where C(t) = ax β, inforation on a static world increases linearly until the inforation capacity of the world is reached [Fig. 6]. When the inforation in a channel describes a dynaic world, the rate of inforation gained fro a constant inforation channel is reduced by the entropic drag on inforation within the channel and the entropic drag on previously acquired inforation. The aount of inforation accuulation on a world fro an inforation channel is: I β I = I + ( C t) Γ( t ) ( dt (31) ) As entioned briefly above, edge effects can play an iportant role in the rate of entropic drag. We highlight two basic cases here. In the first case the inforation gathering bandwidth is sufficient to exhaustively describe the world before the inforation content of the first essage has vanished in a singularity or against an edge. In this case the inforation bandwidth exceeds the axiu entropic drag and the inforation content will becoe axiized when the inforation space has been transitted. log 2 ( P w ) tax (32) β Figure 7 - Inforation accuulation with entropic drag Figure 6 Inforation accuulation fro ideal counications Once again assuing our ideal continuous channel where C(t) = ax β, the inforation accuulation for a dynaic syste with sufficient bandwidth is shown in Fig. 7. In this figure the axiu inforation is 8

9 log2( P ax = log2 Pw Γ β ) w I (33) In this case inforation onotonically increases until tie t ax after which further essages can only aintain the current aount of inforation, as the inforation gained by successive essages cannot exceed the cobination of inforation lost due to entropic drag and the inforation loss through redundancy with prior inforation. Figure 8 Inforation accuulation In the second case the bandwidth is less than the axiu entropic drag on the entire world and, as the entropic drag increases in proportion to the inforation known about the world, a stable point will be reached when the entropic drag equals the bandwidth. This point of inforational stability is the axiu feasible inforation for the syste [Fig. 8]. Note that in both cases the axiu inforation reached is less than the inforation space of the world. This gap is the iniu inforation loss associated with describing a dynaic world. Uncertainty Redux A key design decision for the construction of coand and control systes is the selection of the fidelity of inforation being counicated. Fidelity is adjustable as the designer can arbitrarily decide the unit easure for each diension in the world within sensor liitations. For exaple, a designer can choose to send positions in which the lowest bit of inforation represents a illieter, eter or kiloeter. Typically the fidelity, or bit accuracy, of a easureent is set to be slightly less than the resolving power of the sensor. This is a useful heuristic when the uncertainty associated with sensor fidelity is uch larger than the uncertainty associated with inforation entropy. However, when the speed of that which is being observed increases, or the coplexity of the world being observed increases, or the nuber of recipients of the observed inforation increases the uncertainty related to inforation can becoe an iportant design criterion for the coand and control syste. It is these cases that we are ost interested in understanding. Earlier we showed how a iniu aount of uncertainty (ε) is associated with the choice of representation. The iniu uncertainty of a syste (U) at soe tie t is the aggregation of the syste's representational uncertainty (U r ) and the feasible state space translated fro bits to real world units. U = U + rˆ (34) r P f If a syste designer wanted to design a syste to obtain the axiu aount of inforation possible, and an ideal sensor capable of observing the entire world was available, what level of fidelity should be used? At observation tie our ideal sensor would reduce the feasible state space to a single state: P ƒ = 1. The representational uncertainty is the product of the size of the inforation frontier and the inforational error: U r = S t ε r (35) where s i S t is the set of piecewise sooth surfaces that define the boundary between P f and P i at tie t. By substitution in (34), uncertainty becoes 9

10 U St ε r + r Pf (36) Both ters of the uncertainty equation (34) vary as a function of size unit vector. However, the rate at which they vary differs, with the uncertainty due to representational error becoing predoinant as the unit representation grows and the uncertainty due to entropy becoing predoinant as the unit representation shrinks. This duality allows us to identify the optial unit representation for axiizing uncertainty. = ˆ To explore this relationship let us exaine the siple case in which a C2 designer has an oniscient caera capable of copletely viewing the entire world at any level of fidelity. Fro (16), the aount of tie required to counicate the caera's observation is δ log2 Pw K xi x = = log 2 β β x X rˆ (37) x For a regular world in which all n diensions are equal, this evolves to K n δ = ( log 2 a log 2 r) (38) β in which a is a constant proportional to the size of a diension. If we assue independent entities, the feasibility space will be δ r P f = K v( t) dt (39) where v r is again the n-diensional vector of unpredictable change noralized to S t. In this case S t is a set of K unit possibilities. The perieter of this space is r S t = K v( t) dt (4) δ By applying (39) to (36) we obtain a representational uncertainty of K rˆ n r U r = v( t) dt 2 δ and by (36), the overall uncertainty is (41) K rˆ n v δv U = ( t) dt + rˆ K δ ( t) dt (42) 2 This is a soewhat essy equation that expresses inial uncertainty as a function of the unit representation (because the tie δ over which the functions are now evaluated in ters of the unit representation). This equation can be evaluated when the exact diensions of the world are known and a odel of the entropic forces is available. When evaluated it shows inial uncertainty for a given unit length. An exaple evaluation for a siple twodiensional world is shown in Fig. 9, in which the graph of uncertainty diinishes rapidly as fidelity increases (oving fro right to left in the figure) until it reaches the optial resolution at the local iniu after which uncertainty begins to increase as entropic drag takes hold. Figure 9 Uncertainty as a Function of Unit Resolution Observation Inefficiencies We have been assuing that essages are ideal, with each observation bit translating to a single bit of inforation. This is true if and only if no a priori knowledge exists. This includes infeasible states derived fro prior observations as well as probability distributions across the state space. When a priori knowledge exists, the actual inforation gained is the product of the efficiency (γ) of an observation and the 1

11 axiu capacity of the counications channel. I actual C(t) = γ (43) I I = I + β γ ( C t) Γ( t ) ) ( dt (44) Koopan showed that optially efficient search patterns can exist for regular worlds [9], yet the ajority of real-world intelligence, surveillance and reconnaissance (ISR) systes are fundaentally inefficient because, over tie, sensors will traverse an area over which soe a priori knowledge exists. The rate of observational inefficiencies over tie can be highly nonlinear as oving sensors cross feasibility frontiers. However, inefficiency rates for observing a regular environent can be approxiated by decaying the inforation achieved with each successive observation such that I & = I( 1 λ) (45) where the rate of decay ( λ ) is proportional to the probability that a state deeed infeasible by the observation was previously known as infeasible ties inforation bandwidth. λ = β P( p i p ) o i a (46) In order to explore entropic relationships within inefficient systes we notionally describe this efficiency loss as a decay function. The loss in efficiency is highly dependent upon the syste and its current use the use of a decay function to represent loss of efficiency is a useful approxiation of real-world ISR [1]. Inefficiency results in a reduction in channel capacity, C(t). Because it reduces the aount of knowledge accuulated over tie, the forces of entropic drag increase the utility of researching previously observed areas. We easure this effect by replacing the constant inforation value in equations (19) with a decay function λ(i,t) I to show the relationships between inforation variant essages and inforation entropy. I ( ( I, t) Γ( λ( I, t)) ) = t λ dt (47) When deploying a sensor otion strategy that searches the coplete range of the world the entropic drag can becoe so large that it overcoes inforation gain. This effect is shown in Fig. 1 which shows the effect of a linear entropic drag on the observation environent shown in Fig. 9. Fig. 9 shows that the axiu aount of inforation is found after an ideal nuber of observations have occurred. If the goal of a coand and control syste is to ake decisions based upon the ost coplete inforation possible, decisions would be ade iediately after these observations as the entropic drag effect causes degradation beyond this point. Figure 1 While we use a linear function in our exaple, we recognize that the inforation function ay be highly non-linear. However, non-linearity does not negate the principle shown here. Entropic Drag and Network Topologies Siulation experients were conducted to exaine the effect of entropic drag on a siple coand and control network infrastructure. These experients exained the flow and relevance of inforation throughout the network. The bulk of the siulation s requireents lie in the ters 11

12 C2 network infrastructure and inforation. A coand and control network infrastructure consists of a set of counicating entities (or nodes) whose counications topology fors an acyclic tree. The lines of counication between nodes (edges) also correspond to the chain of coand. Thus, a node s authority in the network is inversely proportional to its depth in the counications tree (i.e., the root node of the tree has the highest authority and leaf nodes have the least). An additional property of the counications/coand tree is that all nodes at the sae depth in the tree have the sae nuber of directly reporting subordinates (child nodes). This apping of rank to nuber of iediate subordinates is the property that distinguishes alternate C2 infrastructures in the siulator. Within the siulator, inforation consists of data gathered fro the environent by leaf nodes in the C2 infrastructure. Each piece of inforation is an abstract quantity that is independent of other pieces of inforation (e.g., inforation does not overlap or correspond to ultiple easureents of a known target in the environent as ight be the case in a filtering proble). Inforation can be generated by leaf nodes periodically or stochastically, depending on the siulator configuration. The value of each piece of inforation is a nuber in the interval [,1], where 1 corresponds to axiu value and corresponds to no value. Another property of inforation is that it only becoes useful to an entity after the inforation has been fused into the local world odel. Thus, inforation is subject to two priary sources of latency before it can increase the knowledge of a network entity: latency due to network counications and latency due to the local inforation fusion algorith. Siulation Structure The C2 network inforation siulation is a odular, discrete tie-step-based siulation whose priary coponents are network entities, counications links, and inforation processing algoriths. In addition, the siulation tracks a nuber of etrics for each piece of inforation. Two key etrics are inforation area (the nuber of nodes that finished fusing the inforation in the current tie step) and inforation volue (the nuber of nodes that have fused the inforation at or before the current tie step). These etrics are taken fro the literature on the perforance of real-world networks. The overall value of a piece of inforation is derived by ultiplying the inforation volue by the associated entropic drag. Since these area and volue etrics are affected by the nuber of nodes in the network, when coparing different C2 topologies we typically consider topologies with the sae nuber of leaf nodes and then restrict the results to leaf node areas and volues. The siulation has a nuber of variable input paraeters including siulation duration (tie steps), C2 topology, entropic drag (value lost/tie step), latency along a network counications link (tie steps/observation), and latency due to fusion. Unlike other siulation paraeters which are constant, fusion latency can optionally be a function of the nuber of prior fusion operations (allowing for nonlinear fusion coplexity). Siulation Outputs Fig. 11 shows a saple inforation volue plot for a single siulation run. These plots generally contain three pieces of inforation: the ideal inforation volue (red line), the inforation volue without accounting for entropic drag (blue line) and the inforation volue with entropic drag (green line). The ideal inforation volue depicts the spread of inforation throughout the network assuing no latency due to counications or fusion and hence no 12

13 entropic drag. Thus, it provides an (adittedly unrealistic) upper bound on the aount of inforation in the network. Nonetheless, it provides a strong indication that an upper bound exists. The un-decayed inforation volue depicts the network inforation volue that would result when considering latency but not entropic drag. The decayed inforation volue takes into account both the effects of latency and entropic drag, and represents the ain result of interest. One expects both the ideal and un-decayed inforation volues to onotonically increase, with the entropic drag volue trailing behind the ideal volue. The entropic drag volue shows that there exists a axiu inforation volue (tie=175) for the syste. Further, it shows that this peak occurs prior to the coplete distribution of inforation across the network across the network (tie=24). evidence. We can also see that the tie at which the inforation axiu occurs varies with respect to the entropic drag. The inforation axiu occurs at tie step 23 for the runs with lower inforation drag (lines at the top of the graph), at tie step 175 for the runs with higher entropic drag (lines at the botto) and equally across tie step 23 and 175 for the lines in the iddle. Figure 12 Inforation volue as Γ varies Future Efforts Figure 11 Inforation volue in ideal static worlds, latent static worlds and dynaic worlds A key feature of the siulation output is the ability to copare one or ore siulation runs. Fig. 12 is a plot coparing ultiple runs of the siulation where the rate of entropic drag was varied while the other siulation properties were held constant. The upper lines in the plot have progressively lower decays. In Fig. 12 one the existence of axiu inforation volue prior to full disseination of inforation across the network is again in This paper is a first step in the application of inforation theoretic entropy to coand and control. Large bodies of work in inforation anageent, particularly data fusion, networking, and the pantheon of group control strategies need to be looked at though the lens of entropic drag. Our forward looking hypothesis is that an understanding of the entropic effects of inforation will allow C2 designers and inthe-field decision akers to eploy coand and control strategies that are optiized for any given situation. The next significant step will be to extend the study of entropic drag into the latter portion of the OODA loop, that portion which involves decisions and actions; Fry [11] akes the case that the inforation entropy ipact on the "DA" portion of the 13

14 loop is the dual of the "OO" portion of the loop. This view is also reflected by Alberts & Hayes [12]. We concur that the ipact of entropic drag on control, when viewed independently of observation, is equivalent to the ipact of entropic drag on observation. However, control is dependent upon observation and the ipact of entropic drag is likely to be exacerbated in the control portion of the OODA loop. Another area of investigation involves an application of these foraliss to realworld scenarios. The state of a dynaical syste changes according to the rules specified by the transition function f. The nature of this transition function can have a doinant effect on what set of states can becoe feasible in the future. The laws that govern the transition function are a priori inforation, reducing the state space of the syste. In this paper we assued ideal coding of inforation describing the state space. In practice it is ore coon (and practical) to encode inforation generally and to use inference based upon a priori inforation to reduce the working feasibility space. The investigation of these relationships will be a key part of the scenario-specific investigation. Another iportant aspect of this investigation ust be the entropic effects of the counications infrastructure. We divide counications infrastructures into channel counications and topologies. Further work will also be required to iprove the etrics that are used to easure the dynais within an environent. Environental dynaics are driven by coplexity and the pace of environental change; however, is not well understood how coplexity and pace should be easured in real-world environents. These further advanceents should enable the pursuit of our long-range objective, naely the construction of an adaptive coand and control syste that autonoously observes the environent and changes the network topology and inforation and decision-aking strategies to optiize C2 perforance. Conclusion We have shown that the loss of inforation due to dynaic forces within an environent can have a substantial ipact upon the inforation content of one or ore essages about the environent. This effect, called entropic drag, fundaentally ipacts the effectiveness of coand and control systes. The principles outlined in this paper can be used provide a better understanding of the utility of existing coand and control systes and to iprove the design of future ones. Entropic drag ipacts C2 systes in several iportant ways. First, entropic drag enforces a fundaental liit to the aount of inforation that can be known about a dynaic syste. This liit can be used by C2 designers to identify the axiu useful fidelity of C2 seantics. Second, by expressing the relationship between inforation and tie entropic drag allows a decision aker to identify when the optial aount of inforation has been acquired. Third, entropic drag provides a fraework for understanding the flow of inforation across a networked counity, providing insight into the utility (or lack thereof) of sharing inforation with each eber of the counity as well as providing insight into the utility of alternative network topologies. Fourth, entropic drag provides tools to better understand the tradeoff between inforation and latency in control, allowing decision akers to select the optial aount of inforation to use for perforing a specific task or set of tasks. Fifth, entropic drag provides tools to understand the utility of collaboration in shared decision aking, allowing decision akers to correctly scope the degree of collaboration for optial perforance of a task. Finally, entropic drag provides a fraework for the developent of next generation, adaptive C2 infrastructures, 14

15 infrastructures that autonoously adapt inforation and decision sharing strategies and networking topology at run tie in response to an environent's changing dynaic forces. References [1] Heeger, D., Signal Detection Theory, New York University. [2] Shannon, C. E., A Matheatical Theory of Counications, The Bell Systes Technical Journal, Vol 27, pp , , July, Oct; [3] Perry, Burton et al, Measures of Effectiveness for the Inforation Age Navy: The Effects of Net-Centric Operations on Cobat Outcoes. (22) RAND Santa Monica, CA, USA. [4] Moffat, Coplexity Theory and Network Centric Warfare. DoD Coand and Control Research Progra, 23. [5] Caves, C., Entropy and Inforation: How Much Inforation is Needed to Assign a Probability?, Coplexity, Entropy and the Physics of Inforation, Zuruk, W. (ed.), Westview Press, [6] Brillouin, L., Science and Inforation Theory 2 nd Ed., Dover Publications Inc., Mineola, NY, 24. [7] Sith, Effects Based Operations, DoD Coand and Control Research Progra, 22. [8] MacKay, D., Inforation Theory, Inference and Learning Algoriths, Cabridge University Press, pg 67, 25. [9] Koopan, B., Search and Screening. Operations Evaluations Group Report No. 56, Center for Naval Analyses, Alexandria, VA, [1] Stone, L., Theory of Optial Search. Acadeic Press, New York, [11] Fry, R. An inforation-theoretic forulation of intelligent weapon systes. Technical Meo A1F(1)6-U-53, Johns Hopkins University Applied Physics laboratory, Dec., 26. [12] Alberts, D., Hayes, R., Planning Coplex Endeavors [Counity Review version], CCRP, 26, pg. 67. Acknowledgeents This research effort was supported by Johns Hopkins University Applied Physics Laboratory internal research grant X9ANXC2M. Thanks to Mike Miller, Joe Peri and David Viel for their excellent critique and advice. Biographies David H. Scheidt received a B.S. in coputer engineering fro Case Western Reserve University in He is a branch scientist at the Johns Hopkins University Applied Physics Laboratory where he chairs the laboratory's Autonoy Research Thrust. His current research concentrations are: distributed robotics, coand and control of decentralized systes, distributed intelligent control and cooperative systes. Mr. Scheidt has twice received the National Perforance Review s Haer Award. Michael J. Pekala is a Coputer Scientist for the National Security Technology Departent of the Johns Hopkins University Applied Physics Laboratory. He received B.S. and M.S. degrees in Coputer Science fro the Johns Hopkins University in 1998 and 21 respectively. Mr. Pekala joined the Laboratory in 1998, and his current focus is on the research and developent of autonoous systes. His eail address is ike.pekala@jhuapl.edu. 15

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

Kernel Methods and Support Vector Machines

Kernel Methods and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic

More information

Ensemble Based on Data Envelopment Analysis

Ensemble Based on Data Envelopment Analysis Enseble Based on Data Envelopent Analysis So Young Sohn & Hong Choi Departent of Coputer Science & Industrial Systes Engineering, Yonsei University, Seoul, Korea Tel) 82-2-223-404, Fax) 82-2- 364-7807

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE Proceeding of the ASME 9 International Manufacturing Science and Engineering Conference MSEC9 October 4-7, 9, West Lafayette, Indiana, USA MSEC9-8466 MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL

More information

Ocean 420 Physical Processes in the Ocean Project 1: Hydrostatic Balance, Advection and Diffusion Answers

Ocean 420 Physical Processes in the Ocean Project 1: Hydrostatic Balance, Advection and Diffusion Answers Ocean 40 Physical Processes in the Ocean Project 1: Hydrostatic Balance, Advection and Diffusion Answers 1. Hydrostatic Balance a) Set all of the levels on one of the coluns to the lowest possible density.

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography Tight Bounds for axial Identifiability of Failure Nodes in Boolean Network Toography Nicola Galesi Sapienza Università di Roa nicola.galesi@uniroa1.it Fariba Ranjbar Sapienza Università di Roa fariba.ranjbar@uniroa1.it

More information

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo

More information

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China 6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith

More information

Graphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes

Graphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes Graphical Models in Local, Asyetric Multi-Agent Markov Decision Processes Ditri Dolgov and Edund Durfee Departent of Electrical Engineering and Coputer Science University of Michigan Ann Arbor, MI 48109

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

Forecasting Financial Indices: The Baltic Dry Indices

Forecasting Financial Indices: The Baltic Dry Indices International Journal of Maritie, Trade & Econoic Issues pp. 109-130 Volue I, Issue (1), 2013 Forecasting Financial Indices: The Baltic Dry Indices Eleftherios I. Thalassinos 1, Mike P. Hanias 2, Panayiotis

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lesson 1 4 October 2017 Outline Learning and Evaluation for Pattern Recognition Notation...2 1. The Pattern Recognition

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2016 Lessons 7 14 Dec 2016 Outline Artificial Neural networks Notation...2 1. Introduction...3... 3 The Artificial

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat

More information

EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS

EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS Jochen Till, Sebastian Engell, Sebastian Panek, and Olaf Stursberg Process Control Lab (CT-AST), University of Dortund,

More information

ma x = -bv x + F rod.

ma x = -bv x + F rod. Notes on Dynaical Systes Dynaics is the study of change. The priary ingredients of a dynaical syste are its state and its rule of change (also soeties called the dynaic). Dynaical systes can be continuous

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Chaotic Coupled Map Lattices

Chaotic Coupled Map Lattices Chaotic Coupled Map Lattices Author: Dustin Keys Advisors: Dr. Robert Indik, Dr. Kevin Lin 1 Introduction When a syste of chaotic aps is coupled in a way that allows the to share inforation about each

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks 1 Optial Resource Allocation in Multicast Device-to-Device Counications Underlaying LTE Networks Hadi Meshgi 1, Dongei Zhao 1 and Rong Zheng 2 1 Departent of Electrical and Coputer Engineering, McMaster

More information

Estimation of ADC Nonlinearities from the Measurement in Input Voltage Intervals

Estimation of ADC Nonlinearities from the Measurement in Input Voltage Intervals Estiation of ADC Nonlinearities fro the Measureent in Input Voltage Intervals M. Godla, L. Michaeli, 3 J. Šaliga, 4 R. Palenčár,,3 Deptartent of Electronics and Multiedia Counications, FEI TU of Košice,

More information

Lecture #8-3 Oscillations, Simple Harmonic Motion

Lecture #8-3 Oscillations, Simple Harmonic Motion Lecture #8-3 Oscillations Siple Haronic Motion So far we have considered two basic types of otion: translation and rotation. But these are not the only two types of otion we can observe in every day life.

More information

1 Bounding the Margin

1 Bounding the Margin COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #12 Scribe: Jian Min Si March 14, 2013 1 Bounding the Margin We are continuing the proof of a bound on the generalization error of AdaBoost

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

Birthday Paradox Calculations and Approximation

Birthday Paradox Calculations and Approximation Birthday Paradox Calculations and Approxiation Joshua E. Hill InfoGard Laboratories -March- v. Birthday Proble In the birthday proble, we have a group of n randoly selected people. If we assue that birthdays

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lessons 7 20 Dec 2017 Outline Artificial Neural networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

Qualitative Modelling of Time Series Using Self-Organizing Maps: Application to Animal Science

Qualitative Modelling of Time Series Using Self-Organizing Maps: Application to Animal Science Proceedings of the 6th WSEAS International Conference on Applied Coputer Science, Tenerife, Canary Islands, Spain, Deceber 16-18, 2006 183 Qualitative Modelling of Tie Series Using Self-Organizing Maps:

More information

INTELLECTUAL DATA ANALYSIS IN AIRCRAFT DESIGN

INTELLECTUAL DATA ANALYSIS IN AIRCRAFT DESIGN INTELLECTUAL DATA ANALYSIS IN AIRCRAFT DESIGN V.A. Koarov 1, S.A. Piyavskiy 2 1 Saara National Research University, Saara, Russia 2 Saara State Architectural University, Saara, Russia Abstract. This article

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub

More information

An Extension to the Tactical Planning Model for a Job Shop: Continuous-Time Control

An Extension to the Tactical Planning Model for a Job Shop: Continuous-Time Control An Extension to the Tactical Planning Model for a Job Shop: Continuous-Tie Control Chee Chong. Teo, Rohit Bhatnagar, and Stephen C. Graves Singapore-MIT Alliance, Nanyang Technological Univ., and Massachusetts

More information

Force and dynamics with a spring, analytic approach

Force and dynamics with a spring, analytic approach Force and dynaics with a spring, analytic approach It ay strie you as strange that the first force we will discuss will be that of a spring. It is not one of the four Universal forces and we don t use

More information

Tracking using CONDENSATION: Conditional Density Propagation

Tracking using CONDENSATION: Conditional Density Propagation Tracking using CONDENSATION: Conditional Density Propagation Goal Model-based visual tracking in dense clutter at near video frae rates M. Isard and A. Blake, CONDENSATION Conditional density propagation

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost

More information

Analyzing Simulation Results

Analyzing Simulation Results Analyzing Siulation Results Dr. John Mellor-Cruey Departent of Coputer Science Rice University johnc@cs.rice.edu COMP 528 Lecture 20 31 March 2005 Topics for Today Model verification Model validation Transient

More information

Field Mass Generation and Control. Chapter 6. The famous two slit experiment proved that a particle can exist as a wave and yet

Field Mass Generation and Control. Chapter 6. The famous two slit experiment proved that a particle can exist as a wave and yet 111 Field Mass Generation and Control Chapter 6 The faous two slit experient proved that a particle can exist as a wave and yet still exhibit particle characteristics when the wavefunction is altered by

More information

Warning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network

Warning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network 565 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 07 Guest Editors: Zhuo Yang, Junie Ba, Jing Pan Copyright 07, AIDIC Servizi S.r.l. ISBN 978-88-95608-49-5; ISSN 83-96 The Italian Association

More information

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all Lecture 6 Introduction to kinetic theory of plasa waves Introduction to kinetic theory So far we have been odeling plasa dynaics using fluid equations. The assuption has been that the pressure can be either

More information

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians Using EM To Estiate A Probablity Density With A Mixture Of Gaussians Aaron A. D Souza adsouza@usc.edu Introduction The proble we are trying to address in this note is siple. Given a set of data points

More information

An improved self-adaptive harmony search algorithm for joint replenishment problems

An improved self-adaptive harmony search algorithm for joint replenishment problems An iproved self-adaptive harony search algorith for joint replenishent probles Lin Wang School of Manageent, Huazhong University of Science & Technology zhoulearner@gail.co Xiaojian Zhou School of Manageent,

More information

When Short Runs Beat Long Runs

When Short Runs Beat Long Runs When Short Runs Beat Long Runs Sean Luke George Mason University http://www.cs.gu.edu/ sean/ Abstract What will yield the best results: doing one run n generations long or doing runs n/ generations long

More information

Combining Classifiers

Combining Classifiers Cobining Classifiers Generic ethods of generating and cobining ultiple classifiers Bagging Boosting References: Duda, Hart & Stork, pg 475-480. Hastie, Tibsharini, Friedan, pg 246-256 and Chapter 10. http://www.boosting.org/

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

Spine Fin Efficiency A Three Sided Pyramidal Fin of Equilateral Triangular Cross-Sectional Area

Spine Fin Efficiency A Three Sided Pyramidal Fin of Equilateral Triangular Cross-Sectional Area Proceedings of the 006 WSEAS/IASME International Conference on Heat and Mass Transfer, Miai, Florida, USA, January 18-0, 006 (pp13-18) Spine Fin Efficiency A Three Sided Pyraidal Fin of Equilateral Triangular

More information

DESIGN OF THE DIE PROFILE FOR THE INCREMENTAL RADIAL FORGING PROCESS *

DESIGN OF THE DIE PROFILE FOR THE INCREMENTAL RADIAL FORGING PROCESS * IJST, Transactions of Mechanical Engineering, Vol. 39, No. M1, pp 89-100 Printed in The Islaic Republic of Iran, 2015 Shira University DESIGN OF THE DIE PROFILE FOR THE INCREMENTAL RADIAL FORGING PROCESS

More information

CS Lecture 13. More Maximum Likelihood

CS Lecture 13. More Maximum Likelihood CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood

More information

Figure 1: Equivalent electric (RC) circuit of a neurons membrane

Figure 1: Equivalent electric (RC) circuit of a neurons membrane Exercise: Leaky integrate and fire odel of neural spike generation This exercise investigates a siplified odel of how neurons spike in response to current inputs, one of the ost fundaental properties of

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

EE5900 Spring Lecture 4 IC interconnect modeling methods Zhuo Feng

EE5900 Spring Lecture 4 IC interconnect modeling methods Zhuo Feng EE59 Spring Parallel LSI AD Algoriths Lecture I interconnect odeling ethods Zhuo Feng. Z. Feng MTU EE59 So far we ve considered only tie doain analyses We ll soon see that it is soeties preferable to odel

More information

Torsion Experiment. Encoder #3 ( 3 ) Third encoder/disk for Model 205a only. Figure 1: ECP Torsion Experiment

Torsion Experiment. Encoder #3 ( 3 ) Third encoder/disk for Model 205a only. Figure 1: ECP Torsion Experiment Torsion Experient Introduction For the Torsion lab, there are two required experients to perfor and one extra credit assignent at the end. In experient 1, the syste paraeters need to be identified so that

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,

More information

Decision-Theoretic Approach to Maximizing Observation of Multiple Targets in Multi-Camera Surveillance

Decision-Theoretic Approach to Maximizing Observation of Multiple Targets in Multi-Camera Surveillance Decision-Theoretic Approach to Maxiizing Observation of Multiple Targets in Multi-Caera Surveillance Prabhu Natarajan, Trong Nghia Hoang, Kian Hsiang Low, and Mohan Kankanhalli Departent of Coputer Science,

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

Numerical Studies of a Nonlinear Heat Equation with Square Root Reaction Term

Numerical Studies of a Nonlinear Heat Equation with Square Root Reaction Term Nuerical Studies of a Nonlinear Heat Equation with Square Root Reaction Ter Ron Bucire, 1 Karl McMurtry, 1 Ronald E. Micens 2 1 Matheatics Departent, Occidental College, Los Angeles, California 90041 2

More information

About the definition of parameters and regimes of active two-port networks with variable loads on the basis of projective geometry

About the definition of parameters and regimes of active two-port networks with variable loads on the basis of projective geometry About the definition of paraeters and regies of active two-port networks with variable loads on the basis of projective geoetry PENN ALEXANDR nstitute of Electronic Engineering and Nanotechnologies "D

More information

Lost-Sales Problems with Stochastic Lead Times: Convexity Results for Base-Stock Policies

Lost-Sales Problems with Stochastic Lead Times: Convexity Results for Base-Stock Policies OPERATIONS RESEARCH Vol. 52, No. 5, Septeber October 2004, pp. 795 803 issn 0030-364X eissn 1526-5463 04 5205 0795 infors doi 10.1287/opre.1040.0130 2004 INFORMS TECHNICAL NOTE Lost-Sales Probles with

More information

Data-Driven Imaging in Anisotropic Media

Data-Driven Imaging in Anisotropic Media 18 th World Conference on Non destructive Testing, 16- April 1, Durban, South Africa Data-Driven Iaging in Anisotropic Media Arno VOLKER 1 and Alan HUNTER 1 TNO Stieltjesweg 1, 6 AD, Delft, The Netherlands

More information

2.9 Feedback and Feedforward Control

2.9 Feedback and Feedforward Control 2.9 Feedback and Feedforward Control M. F. HORDESKI (985) B. G. LIPTÁK (995) F. G. SHINSKEY (970, 2005) Feedback control is the action of oving a anipulated variable in response to a deviation or error

More information

IN modern society that various systems have become more

IN modern society that various systems have become more Developent of Reliability Function in -Coponent Standby Redundant Syste with Priority Based on Maxiu Entropy Principle Ryosuke Hirata, Ikuo Arizono, Ryosuke Toohiro, Satoshi Oigawa, and Yasuhiko Takeoto

More information

Kinematics and dynamics, a computational approach

Kinematics and dynamics, a computational approach Kineatics and dynaics, a coputational approach We begin the discussion of nuerical approaches to echanics with the definition for the velocity r r ( t t) r ( t) v( t) li li or r( t t) r( t) v( t) t for

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

Multi-Scale/Multi-Resolution: Wavelet Transform

Multi-Scale/Multi-Resolution: Wavelet Transform Multi-Scale/Multi-Resolution: Wavelet Transfor Proble with Fourier Fourier analysis -- breaks down a signal into constituent sinusoids of different frequencies. A serious drawback in transforing to the

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

Analysis of Impulsive Natural Phenomena through Finite Difference Methods A MATLAB Computational Project-Based Learning

Analysis of Impulsive Natural Phenomena through Finite Difference Methods A MATLAB Computational Project-Based Learning Analysis of Ipulsive Natural Phenoena through Finite Difference Methods A MATLAB Coputational Project-Based Learning Nicholas Kuia, Christopher Chariah, Mechatronics Engineering, Vaughn College of Aeronautics

More information

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

Generalized Queries on Probabilistic Context-Free Grammars

Generalized Queries on Probabilistic Context-Free Grammars IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 20, NO. 1, JANUARY 1998 1 Generalized Queries on Probabilistic Context-Free Graars David V. Pynadath and Michael P. Wellan Abstract

More information

Mathematical Model and Algorithm for the Task Allocation Problem of Robots in the Smart Warehouse

Mathematical Model and Algorithm for the Task Allocation Problem of Robots in the Smart Warehouse Aerican Journal of Operations Research, 205, 5, 493-502 Published Online Noveber 205 in SciRes. http://www.scirp.org/journal/ajor http://dx.doi.org/0.4236/ajor.205.56038 Matheatical Model and Algorith

More information

OBJECTIVES INTRODUCTION

OBJECTIVES INTRODUCTION M7 Chapter 3 Section 1 OBJECTIVES Suarize data using easures of central tendency, such as the ean, edian, ode, and idrange. Describe data using the easures of variation, such as the range, variance, and

More information

ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER

ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER IEPC 003-0034 ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER A. Bober, M. Guelan Asher Space Research Institute, Technion-Israel Institute of Technology, 3000 Haifa, Israel

More information

CHAPTER 19: Single-Loop IMC Control

CHAPTER 19: Single-Loop IMC Control When I coplete this chapter, I want to be able to do the following. Recognize that other feedback algoriths are possible Understand the IMC structure and how it provides the essential control features

More information

Research in Area of Longevity of Sylphon Scraies

Research in Area of Longevity of Sylphon Scraies IOP Conference Series: Earth and Environental Science PAPER OPEN ACCESS Research in Area of Longevity of Sylphon Scraies To cite this article: Natalia Y Golovina and Svetlana Y Krivosheeva 2018 IOP Conf.

More information

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words) 1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu

More information

26 Impulse and Momentum

26 Impulse and Momentum 6 Ipulse and Moentu First, a Few More Words on Work and Energy, for Coparison Purposes Iagine a gigantic air hockey table with a whole bunch of pucks of various asses, none of which experiences any friction

More information

Reducing Vibration and Providing Robustness with Multi-Input Shapers

Reducing Vibration and Providing Robustness with Multi-Input Shapers 29 Aerican Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June -2, 29 WeA6.4 Reducing Vibration and Providing Robustness with Multi-Input Shapers Joshua Vaughan and Willia Singhose Abstract

More information

9 HOOKE S LAW AND SIMPLE HARMONIC MOTION

9 HOOKE S LAW AND SIMPLE HARMONIC MOTION Experient 9 HOOKE S LAW AND SIMPLE HARMONIC MOTION Objectives 1. Verify Hoo s law,. Measure the force constant of a spring, and 3. Measure the period of oscillation of a spring-ass syste and copare it

More information

Controlled Flooding Search with Delay Constraints

Controlled Flooding Search with Delay Constraints Controlled Flooding Search with Delay Constraints Nicholas B. Chang and Mingyan Liu Departent of Electrical Engineering and Coputer Science University of Michigan, Ann Arbor, MI 4809-222 Eail: {changn,ingyan}@eecs.uich.edu

More information

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS A Thesis Presented to The Faculty of the Departent of Matheatics San Jose State University In Partial Fulfillent of the Requireents

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks Intelligent Systes: Reasoning and Recognition Jaes L. Crowley MOSIG M1 Winter Seester 2018 Lesson 7 1 March 2018 Outline Artificial Neural Networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

Handwriting Detection Model Based on Four-Dimensional Vector Space Model

Handwriting Detection Model Based on Four-Dimensional Vector Space Model Journal of Matheatics Research; Vol. 10, No. 4; August 2018 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education Handwriting Detection Model Based on Four-Diensional Vector

More information

Tele-Operation of a Mobile Robot Through Haptic Feedback

Tele-Operation of a Mobile Robot Through Haptic Feedback HAVE 00 IEEE Int. Workshop on Haptic Virtual Environents and Their Applications Ottawa, Ontario, Canada, 7-8 Noveber 00 Tele-Operation of a Mobile Robot Through Haptic Feedback Nicola Diolaiti, Claudio

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

Support Vector Machines MIT Course Notes Cynthia Rudin

Support Vector Machines MIT Course Notes Cynthia Rudin Support Vector Machines MIT 5.097 Course Notes Cynthia Rudin Credit: Ng, Hastie, Tibshirani, Friedan Thanks: Şeyda Ertekin Let s start with soe intuition about argins. The argin of an exaple x i = distance

More information

Pattern Classification using Simplified Neural Networks with Pruning Algorithm

Pattern Classification using Simplified Neural Networks with Pruning Algorithm Pattern Classification using Siplified Neural Networks with Pruning Algorith S. M. Karuzzaan 1 Ahed Ryadh Hasan 2 Abstract: In recent years, any neural network odels have been proposed for pattern classification,

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information