From Social Trust Assisted Reciprocity (STAR) to Utility-Optimal Mobile Crowdsensing

Size: px
Start display at page:

Download "From Social Trust Assisted Reciprocity (STAR) to Utility-Optimal Mobile Crowdsensing"

Transcription

1 From ocial Trust Assisted eciprocity (TA) to Utility-Optimal Mobile Crowdsensin Xiaowen Gon, Xu Chen, Junshan Zhan, H. Vincent Poor chool of Electrical, Computer and Enery Enineerin Arizona tate University, Tempe, AZ {xon9, xchen79, Department of Electrical Enineerin Princeton University, Princeton, NJ Abstract Crowdsensin has been widely reconized as a promisin paradim for numerous applications in mobile networks. To realize the full benefit of crowdsensin, one fundamental challene is to incentivize users to participate. In this paper, we leverae social trust assisted reciprocity (TA), a syneristic marriae of social trust and reciprocity, to develop an incentive mechanism in order to stimulate users participation. We investiate thorouhly the efficacy of TA for satisfyin users sensin requests, for a iven social tie structure amon users. pecifically, we first show that all requests can be satisfied if and only if sufficient social credit can be transferred from users who request more sensin services than what they can provide to users who can provide more than what they request. Then we investiate utility maximization for sensin services, and show that it boils down to maximizin the utility of a circulation flow in the combined raph of the social raph and request raph. Accordinly, we develop an alorithm that iteratively cancels cycles of positive weihts in the residual raph, and thereby finds the optimal solution efficiently. I. INTODUCTION Mobile crowdsensin has recently emered as a promisin paradim for a variety of applications, thanks to the pervasive penetration of mobile devices in people s lives []. Althouh the benefit of crowdsensin is pronounced, a user would not participate in sensin without receivin adequate incentive. Therefore, effective incentive desin is essential for realizin the benefit of crowdsensin. ecent studies on incentive desin for crowdsensin (e.., [] [4]) mostly use monetary reward to stimulate users participation, which rely on a lobal (virtual) currency system that typically incurs sinificant implementation overhead. Therefore, it is appealin to desin a crowdsensin system that can motivate users to participate without usin a lobal currency, which is a subject of this study. Mobile users behaviors are increasinly influenced by their social relationships, mainly due to the rapid rowth of online social networkin services [5]. As an important aspect of social relationship, social trust can be exploited to stimulate crowdsensin: if Alice has social trust in Bob, then Alice is willin to help Bob since Alice can trust Bob, in the belief that Bob would help Alice in the future to return the favor. (a) (b) (c) (d) 4 4 (e) (f) Fi.. Examples of social trust assisted reciprocity cycles. (a)-(d) are special cases: (a) direct reciprocity cycle; (b) indirect reciprocity cycle; (c) direct social trust based cycle; (d) indirect social trust based cycle. olid edes are social edes. Dashed edes are request edes. In this paper, we devise an incentive mechanism to stimulate users participation in crowdsensin, by usin ocial Trust Assisted eciprocity (TA) - a syneristic marriae of social trust and reciprocity. The basic idea of TA is that Alice is willin to help Bob if someone who trusts Bob can help someone trusted by Alice (as illustrated in Fi. ). This is because that the overhead of Alice for helpin Bob is compensated, as the one trusted by Alice will help Alice in the future to return the favor. By takin advantae of reciprocity ( synchronous exchane ) with the assist of social trust ( asynchronous exchane ), TA can efficiently encourae users participation in crowdsensin. Furthermore, compared to traditional currency-based schemes, TA can incur a much lower implementation overhead due to the use of the existin social trust. The main thrust of this study is devoted to characterizin the fundamental performance of TA, particularly for satisfyin users sensin requests iven the social trust structure amon them. We are interested in answerin two important questions: What are the conditions under which all requests can be satisfied? What is the maximum utility that can be achieved by provided service? These two questions are similar in spirit to admission control and network utility maximization, respectively. We summarize the main contributions of this paper as follows. We desin TA, an incentive mechanism which stimulates users participation by usin social trust assisted reciprocity (TA). We investiate thorouhly the efficacy of TA for satisfyin users sensin requests, for a iven social trust structure amon

2 users. pecifically, we first show that all requests can be satisfied if and only if users who request more sensin service than what they can provide can transfer sufficient social credit to those users who can provide more than what they request. Then we investiate utility maximization for sensin service, and show that this problem is equivalent to maximizin the utility of a circulation flow in the combined social raph and request raph. Based on this observation, we develop an alorithm that iteratively cancels the cycles of positive weihts in the residual raph, and thereby finds the optimal solution efficiently. The rest of this paper is oranized as follows. In ection II, we desin an incentive mechanism based on social trust assisted reciprocity (TA). Based on TA, ection III investiates the conditions for satisfyin all sensin requests and the utility maximization for sensin service. The paper is concluded in ection IV. II. TA: OCIAL TUT AITED ECIPOCITY BAED INCENTIVE MECHANIM A. ystem Model We consider a crowdsensin system consistin of a set of mobile users V = {,, N}. Each user can request a certain amount of sensin service from another user. We model users sensin requests by a request raph G (V, E ), where user i and user j are connected by a directed request ede e ij E if user j requests sensin service from user i. The capacity ij > 0 of each request ede e ij represents the amount of service requested by user j from user i. The flow fij > 0 on the request ede e ij represents the amount of service provided by user i to user j. A user obtains utility from its requested sensin service, which depends on the amount of service it receives from each user requested by her. We assume that user j obtains a utility of U ij for each unit amount of service provided by user i. We further assume that a user s utility is equal to the total utility of the service provided to her. More complex forms of utility will be studied in future work. We model the social trust structure amon users by a social raph G (V, E ), where user i and user j are connected by a directed social ede e ij E if user j has social trust in user i. The capacity ij > 0 of each social ede e ij represents the social credit limit, which specifies the maximum amount of social credit that can be transferred from user i to user j. The flow fij on the social ede e ij represents the amount of social credit transferred between user i and user j. Note that fij = f ji holds for each pair of social edes between two users, where fij > 0 or f ji > 0 indicates that credit of amount fij or f ji is transferred from user i to user j or from user j to user i, respectively. For brevity, we use sensin service and service interchaneably throuhout the paper. (a) (c) (b) Fi.. An example of (a) the social raph; (b) the request raph; (c) the combined social and request raph; (d) two TA cycles in the socialrequest raph. B. Desin Description The basic incentive structure of the TA mechanism is a social trust assisted reciprocity cycle (TA) in which a set of users have incentive to provide service. It is defined in the combined social and request (social-request) raph G (V, E E ) (as illustrated in Fi. ). Definition : A social trust assisted reciprocity cycle is a directed cycle in the social-request raph G. In a TA cycle, a user is willin to provide service since the overhead is compensated by receivin credit or service from another user in the cycle. For each user in a TA cycle, the amount of service or credit it receives should be equal to that of service or credit it provides or spends, respectively. Let f c denote a balanced flow alon a TA cycle c, which has the same flow value on each ede in c. The flow on a social or request ede in the areate flow f of a set of balanced flows {f c, c C} alon cycles C is iven by X X X fij = f c f c, fij = f c c C:e ij c c C:e ji c c C:e ij c respectively. Note that the credit transferred from user i to j (i.e., the flow on e ij E ) in the balanced flow alon a TA cycle can be partly or completely canceled by that from user j to i in another TA cycle. Users can participate in a set of balanced flows alon TA cycles if and only if the areate flow satisfies the capacity constraints on request and social edes. Definition : A set of balanced flows alon TA cycles is feasible if the areate flow satisfies the followin capacity constraints: ji fij ij, fji = fij, e ij E () 0 f ij ij, e ij E. () Under the TA mechanism, all users are willin to participate in any feasible set of balanced flows alon TA cycles. III. EXPLOITING TA TO ATIFY ENING EQUET A. atisfyin All ensin equests Based on TA cycles, we first show that it suffices to focus on circulation flows in the social-request raph (d)

3 s P P P P 4 Fi.. The extended social raph constructed from the social raph in Fi. where P > 0, P = 0, P < 0, P 4 < 0, P 5 = 0, P > 0. The notation next to an ede is its capacity. defined as follows. Definition : A flow f in the social-request raph G is a circulation if f satisfies the capacity constraints (), (), and the flow Xconservation X constraints X fij + fij = fji, i V. () j:e ij E j:e ij E j:e ji E It is clear that the areate flow of any feasible set of balanced flows alon TA cycles is a circulation flow in G. The followin lemma shows that the converse is also true. Lemma : Any circulation flow in the social-request raph amounts to the areate flow of a feasible set of balanced flows alon TA cycles. Due to space limitation, all the proofs of this paper are iven in our online technical report []. We define P i as the total amount of service requested by user i minus the amount that user i can X provide: X P i ji ij. j:e ji E j:e ij E Then we construct an extended social raph G + from the social raph G by addin a directed ede with capacity P i from a virtual source node s to each node i with P i > 0, and addin a directed ede with capacity P i from each node i with P i < 0 to a virtual destination node t (as illustrated in Fi. ). X Let P be defined X as P P i = P i. i:p i >0 i:p i <0 Theorem : All sensin requests can be satisfied under TA if and only if P is equal to the maximum flow value from s to t in the extended social raph G +. emark : Theorem provides a useful insiht: all requests can be satisfied if and only if users who request more service than what they can provide can transfer sufficient social credit to users who can provide more than what they request, to compensate their imbalance in requests. Intuitively speakin, the social raph serves as a buffer to partially or completely absorb the mismatch amon users requests. It is worth notin that the maximum amount of service provided under TA is in eneral not equal to the maximum flow value from s to t in G +. emark : We note that an important difference between [7] and our study is that the results in [7] is based on the assumption that all users are connected in the social network, whereas our model here does not have this assumption. This is essentially because that reciprocity is t used in TA but not in [7]. B. Utility Maximization for ensin ervice Due to the mismatch of sensin service requests and social credit limits, it is possible that not all requests can be satisfied. In this case, a natural objective is to maximize the total utility of provided service. The next result follows from Lemma. Theorem : The maximum utility of sensin service provided under TA is equal to the maximum utility of a circulation flow in the social-request raph. Note that the flow on a social ede does not enerate any utility. By Theorem, Xour problem can be written as maximize U ij f fij,f ij ij (4) i,j:e ij E subject to constraints (), (), (). Note that we can maximize the total amount of service provided under TA by solvin problem (4) with the utility U ij set to for each request ede e ij. In the followin, we will solve problem (4) usin an alorithm inspired by the cycle-cancelin alorithm for solvin the minimum cost flow problem [8]. We should note that problem (4) is very different from a typical network flow problem in that two nodes can be connected by multiple edes (request edes and social edes). Furthermore, request edes and social edes carry different types of flows: the flows on all request edes are non-neative and independent (as in constraint ()), while the flows on social edes can be neative and must be inverse between a pair of users (as in constraint ()). We start with constructin a residual raph G f (V, Ef E f ) of the social-request raph G for a iven flow f. pecifically, for each request ede e ij E, we construct a forward ede e ij E f and a backward ede e ji Ef with capacity ij = ij fij, ij = fij respectively. For each pair of social edes e ij, e ji E, we construct a pair of edes e ij, e ji E f with capacity ij = ij fij, ji = ji fji respectively. We do not construct an ede in the residual raph if its capacity is zero. Then we set the weiht of each forward ede e ij E f and each backward ede e ji Ef as W ij = U ij, W ij = U ij respectively. The weihts of each pair of edes e ij, e ji E f are set to W ij = W ji = 0. The followin lemma establishes the optimality condition for solvin problem (4). Lemma : A flow f is optimal for problem (4) if and only if there exists no cycle of positive weiht in the residual raph G f.

4 () (0) () (0) (0) (0) (0) (0) (0) (0) 4 4 () () 4() () ( ) 4(0) (a) 4 () ( ) () ( ) (c) (0) (0) 4() ( ) ( ) 4(0) (b) 4 ( ) ( ) () () (d) (0) (0) Fi. 4. An example of runnin Alorithm. (a) Initial social-request raph with the empty flow; (b) esidual raph after aumentin with a flow of value alon cycle 4 ; (c) esidual raph after aumentin with a flow of value alon cycle ; (d) esidual raph after aumentin with a flow of value alon cycle 4. For each ede, the number before () is its capacity; the number in () is its weiht. Usin Lemma, we can develop an alorithm as described in Alorithm to solve problem (4). The alorithm starts with the empty flow in the network. It iteratively searches for a cycle of positive weiht in the residual raph and cancels the cycle by aumentin the current flow in the raph with a balanced flow alon the cycle, until no cycle of positive weiht exists. In each iteration, the value of the flow to aument with is set to be the residual capacity of the cycle, which is the minimum capacity of all edes in that cycle. We show how Alorithm works by an illustrative example in Fi. 4. As for step in Alorithm, we can use an alorithm similar to the Bellman-Ford alorithm [9] to find a cycle of positive weiht in the residual raph, if there exists one. For ease of exposition, we will focus on problem (4) with rational parameters: the utilities and capacities of all social and request edes are rational numbers. This settin is of important interest in eneral, since the parameters of most practical problems are rational numbers. Then problem (4) with rational parameters can be equivalently converted to one with interal parameters by multiplyin with a suitably lare inteer K. The solution of the oriinal problem (with rational parameters) is equal to the solution of the new problem (with interal parameters) divided by K. For problem (4) with rational parameters, let U and denote the maximum utility and maximum capacity of a request ede, respectively (i.e., U = max eij E U ij, = max eij E ij). The followin theorem shows that Alorithm is correct and efficient. Theorem : For problem (4) with divisible sensin service and rational parameters, Alorithm finds the optimal flow and has runnin time O( V E ( E + Alorithm : Find the optimal flow for problem (4) in social-request raph G input : ocial-request raph G output: The optimal flow for problem (4) Initialize an empty flow f in G; while There exists a cycle of positive weiht in the residual raph G f of flow f do Find a cycle c of positive weiht in G f ; 4 Compute the residual capacity r c of cycle c; 5 Aument flow f with a balanced flow of value r c alon cycle c; end 7 return Flow f; E )UK ). emark : It is worth notin that, when sensin service is indivisible such that its amount has to be an inteer, problem (4) is essentially an inteer linear proram, which is NP-hard to solve in eneral. In this case, we can still use Alorithm to find the optimal flow for problem (4). In other words, usin a network flow approach, we can capture and exploit the specific combinatorial structure of problem (4), based on which a polynomial-time alorithm can be developed to solve it. IV. CONCLUION In this paper, we have desined TA, an incentive mechanism usin a syneristic marriae of social trust and reciprocity. Based on the TA mechanism, we have established the conditions under which all sensin requests can be satisfied. We have also developed an efficient alorithm to maximize the utility of sensin service provided under TA. An interestin research direction underway is to leverae the social tie structure amon mobile users to stimulate their altruistic behaviors for cooperative networkin. EFEENCE []. K. Ganti, Y. Fan, and L. Hui, Mobile crowdsensin: current state and future challenes, IEEE Communications Maazine, pp. 9, 0. [] D. Yan, G. Xue, X. Fan, and J. Tan, Crowdsourcin to smartphones: incentive mechanism desin for mobile phone sensin, in ACM MOBICOM 0. [] T. Luo and C.-K. Tham, Fairness and social welfare in incentivizin participatory sensin, in IEEE ECON 0. [4] I. Koutsopoulos, Optimal incentive-driven desin of participatory sensin systems, in IEEE INFOCOM 0. [5] emarketer: ocial networkin reaches nearly one in four around the world. [Online]. Available: Networkin-eaches-Nearly-One-Four-Around-World/00997 [] X. Gon, X. Chen, J. Zhan, and H. V. Poor, From social trust assisted reciprocity (TA) to utility-optimal crowdsensin in mobile networks, Technical eport. [Online]. Available: [7] Z. Liu, H. Hu, Y. Liu, K. W. oss, Y. Wan, and M. Mobius, PP tradin in social networks: The value of stayin connected, in IEEE INFOCOM 00. [8]. Ahuja, T. Mananti, and J. Orlin, Network flows: Theory, alorithms, and applications. Prentice Hall, 99. [9] X. Huan, Neative-weiht cycle alorithms, in 00 International Conference on Foundations of Computer cience.

5 Proof of Lemma APPENDIX Consider a non-empty circulation flow f. We can find a node v with a positive flow on an outoin ede from v and trace alon this ede to another node v. Due to the flow conservation constraint, we can find an outoin ede from v with a positive flow and trace alon it to a node v. We continue this tracin process until we visit a node v j that has been visited before, i.e., v i = v j for some i < j, and hence we find a TA cycle v i v i+ v j. Then we subtract flow f by a balanced flow alon this cycle with value equal to the minimum flow value on an ede in that cycle. Thus the remainin flow is still a circulation flow in which the number of edes with non-zero flows is reduced. We can repeat this arument to subtract the remainin flow by a balanced flow alon a cycle until it is empty. This implies that flow f is the areate flow of the subtracted balanced flows alon the cycles, which is also feasible. Proof of Theorem By Lemma, all requests can be satisfied if and only if there is a circulation flow f in the social-request raph G that saturates all request edes (i.e., fij = ij, e ij E ). We first show the if part. uppose is equal to the value of the maximum flow f + from s to t in G +. Let f be the flow comprised of the flows on the social edes E in f + (i.e., not includin the edes from s and to t in G + ). Let f be the flow in the request raph G that saturates all request edes. Then we aument flow f in the social-request raph G with flow f to obtain a flow f in G. Accordin to the construction of G +, we have P j:e ij E f ij = P i for each node i V, while we also have P j:e ji E f ji P j:e ij E f ij = P i. This shows that f is a circulation flow. Next we show the only if part. uppose f is a circulation flow in G that saturates all request edes. Let f be the flow comprised of the flows on the social edes E in f. Then we aument flow f with saturated flows on the edes from s and to t in G + to obtain a flow f + in G +. Accordin to the construction of G +, f + is a flow in G + satisfyin the capacity and flow conservation constraints, with a flow value of P from s to t. Proof of Lemma The only if part is easy to show: If there exists a cycle of positive weiht in G f, then we can aument the flow f with a balanced flow of value ϵ > 0 alon that cycle to construct a circulation flow with larer utility. Next we show the if part. uppose there exists no cycle of positive weiht in G f but there exists a circulation flow f in G with larer utility than f. imilar to the residual raph G f, we construct a raph G (V, E E ) from G by constructin e ij, e ij E for each e ij E and e ij, e ji E for each pair of e ij, e ji E, and settin their weihts the same as those in G f. The difference between G f and G is that all the edes are constructed in G (an ede is not constructed in G f if its capacity is 0) and have unlimited capacities. Therefore, the edes in G f is a subset of the edes in G. Then we can define a flow in G by definin the flows in on the edes of G as ij = max{0, f ij fij }, e ij E ij = max{0, fij f ij }, e ij E ij = f ij f ij, e ij E. It follows from the definition that ij ij = f ij fij, e ij E. Then Xthe net flow value at each node i V in flow is X ij + X ji + X ij X ij ji j: e ij E X j: e ji E j: e ij E j: e ij E j: e ji Š X Š X E Š = f ij fij f ji fji + f ij fij j:e ij E j:e ji E j:e ij E = X f ij j:e ij E X X Ž + f ij f ji j:e ij E j:e ji E X X X fij + fij fji = 0 j:e ij E j:e ij E j:e ji E where the last equality follows from that f and f are circulation flows in G. Therefore, is a circulation flow in G. We observe that the flow on any ede e E \ Ef is zero in because ) if e = e ij, then we have f ij = ij and hence ij = 0; ) if e = e ij, then we have f ij = 0 and hence ij = 0. We further observe that ij 0 for any ede e ij E \ Ef since we have f ij = ij. ince W ij = 0, e ij E, the weiht of flow in G is X W ij ij + W Š X Š ij ij = U ij f ij fij i,j: e ij E X i,j:e ij E X = U ij f ij U ij fij > 0 i,j:e ij E i,j:e ij E where the last inequality follows from the assumption that f has larer utility than f in G. ince only has positive flows on the edes in G f, usin a similar arument as in the proof of Lemma, is the areate flow of balanced flows alon cycles each comprised of edes in G f. Then the total weiht of these flows alon the cycles in G f is equal to the weiht of flow in G, which is reater than 0. This implies that there must exist a cycle of positive weiht in G f, which is a contradiction to the previous assumption. This completes the proof. Proof of Theorem As discussed earlier, we first equivalently convert the problem to one with interal parameters by multiplyin them by an inteer K. ince the capacities of all edes in the raph are interal Ž

6 and the initial empty flow is interal, the residual capacity of the cycle found in the first iteration of the alorithm is interal, and hence the flow after aumentation is interal. Thus, by induction, the updated flow after each iteration is also interal. This shows that the alorithm finds an interal flow when it terminates, which is optimal by Lemma. The utility of the initial empty flow is 0. The utility of any flow is upper bounded by the utility of the flow that saturates all request edes, which is E UK. ince the capacities of all edes are interal, the flow utility increases by an inteer no less than one at each iteration of Alorithm. Therefore, it takes the alorithm at most E UK iterations to terminate. ince each iteration has runnin time O( V ( E + E ), the desired result follows.

A Constant Complexity Fair Scheduler with O(log N) Delay Guarantee

A Constant Complexity Fair Scheduler with O(log N) Delay Guarantee A Constant Complexity Fair Scheduler with O(lo N) Delay Guarantee Den Pan and Yuanyuan Yan 2 Deptment of Computer Science State University of New York at Stony Brook, Stony Brook, NY 79 denpan@cs.sunysb.edu

More information

Linearized optimal power flow

Linearized optimal power flow Linearized optimal power flow. Some introductory comments The advantae of the economic dispatch formulation to obtain minimum cost allocation of demand to the eneration units is that it is computationally

More information

Strong Interference and Spectrum Warfare

Strong Interference and Spectrum Warfare Stron Interference and Spectrum Warfare Otilia opescu and Christopher Rose WILAB Ruters University 73 Brett Rd., iscataway, J 8854-86 Email: {otilia,crose}@winlab.ruters.edu Dimitrie C. opescu Department

More information

LP Rounding and Combinatorial Algorithms for Minimizing Active and Busy Time

LP Rounding and Combinatorial Algorithms for Minimizing Active and Busy Time LP Roundin and Combinatorial Alorithms for Minimizin Active and Busy Time Jessica Chan, Samir Khuller, and Koyel Mukherjee University of Maryland, Collee Park {jschan,samir,koyelm}@cs.umd.edu Abstract.

More information

Including the Consumer Function. 1.0 Constant demand as consumer utility function

Including the Consumer Function. 1.0 Constant demand as consumer utility function Incluin the Consumer Function What we i in the previous notes was solve the cost minimization problem. In these notes, we want to (a) see what such a solution means in the context of solvin a social surplus

More information

Simple Optimization (SOPT) for Nonlinear Constrained Optimization Problem

Simple Optimization (SOPT) for Nonlinear Constrained Optimization Problem (ISSN 4-6) Journal of Science & Enineerin Education (ISSN 4-6) Vol.,, Pae-3-39, Year-7 Simple Optimization (SOPT) for Nonlinear Constrained Optimization Vivek Kumar Chouhan *, Joji Thomas **, S. S. Mahapatra

More information

Some results on max-min fair routing

Some results on max-min fair routing Some results on max-min fair routing Dritan Nace, Linh Nhat Doan University of Technology of Compiegne. Laboratory Heudiasyc UMR CNRS 6599, 60205 Compiègne Cedex, France. Phone: 00 33 344234302, fax: 00

More information

A Rate-Splitting Strategy for Max-Min Fair Multigroup Multicasting

A Rate-Splitting Strategy for Max-Min Fair Multigroup Multicasting A Rate-Splittin Stratey for Max-Min Fair Multiroup Multicastin Hamdi Joudeh and Bruno Clercx Department of Electrical and Electronic Enineerin, Imperial Collee London, United Kindom School of Electrical

More information

Termination criteria in the Moore-Skelboe Algorithm for Global Optimization by Interval Arithmetic

Termination criteria in the Moore-Skelboe Algorithm for Global Optimization by Interval Arithmetic To appear in series Nonconvex Global Optimization and Its Applications Kluwer Academic Publishers Termination criteria in the Moore-Skelboe Alorithm for Global Optimization by Interval Arithmetic M.H.

More information

Evidence and Skepticism in Verifiable Disclosure Games

Evidence and Skepticism in Verifiable Disclosure Games Evidence and Skepticism in Verifiable Disclosure Games Daniel Rappoport Columbia University February 2, 2017 Abstract A shared feature of communication ames with verifiable evidence is that the receiver

More information

Optimization of Mechanical Design Problems Using Improved Differential Evolution Algorithm

Optimization of Mechanical Design Problems Using Improved Differential Evolution Algorithm International Journal of Recent Trends in Enineerin Vol. No. 5 May 009 Optimization of Mechanical Desin Problems Usin Improved Differential Evolution Alorithm Millie Pant Radha Thanaraj and V. P. Sinh

More information

A simple scheme for realizing six-photon entangled state based on cavity quantum electrodynamics

A simple scheme for realizing six-photon entangled state based on cavity quantum electrodynamics J. At. Mol. Sci. doi: 10.4208/jams.041711.051011a Vol. 3, No. 1, pp. 73-77 February 2012 A simple scheme for realizin six-photon entanled state based on cavity quantum electrodynamics Den-Yu Zhan, Shi-Qin

More information

1 CHAPTER 7 PROJECTILES. 7.1 No Air Resistance

1 CHAPTER 7 PROJECTILES. 7.1 No Air Resistance CHAPTER 7 PROJECTILES 7 No Air Resistance We suppose that a particle is projected from a point O at the oriin of a coordinate system, the y-axis bein vertical and the x-axis directed alon the round The

More information

Applying Linguistic Cognitive Map Method to Deal with Multiple Criteria Decision-making Problems

Applying Linguistic Cognitive Map Method to Deal with Multiple Criteria Decision-making Problems Journal of Economics and Manaement, 2018, Vol. 14, No. 2, 133-146 Applyin Linuistic Conitive Map Method to Deal with Multiple Criteria Decision-makin Problems Chen-Tun Chen Department of Information Manaement,

More information

Decentralized Control Design for Interconnected Systems Based on A Centralized Reference Controller

Decentralized Control Design for Interconnected Systems Based on A Centralized Reference Controller Decentralized Control Desin for Interconnected Systems Based on A Centralized Reference Controller Javad Lavaei and Amir G Ahdam Department of Electrical and Computer Enineerin, Concordia University Montréal,

More information

Generalization of Vieta's Formula

Generalization of Vieta's Formula Rose-Hulman Underraduate Mathematics Journal Volume 7 Issue Article 4 Generalization of Vieta's Formula Al-Jalila Al-Abri Sultan Qaboos University in Oman Follow this and additional wors at: https://scholar.rose-hulman.edu/rhumj

More information

1. According to the U.S. DOE, each year humans are. of CO through the combustion of fossil fuels (oil,

1. According to the U.S. DOE, each year humans are. of CO through the combustion of fossil fuels (oil, 1. Accordin to the U.S. DOE, each year humans are producin 8 billion metric tons (1 metric ton = 00 lbs) of CO throuh the combustion of fossil fuels (oil, coal and natural as). . Since the late 1950's

More information

arxiv: v2 [math.oc] 11 Jun 2018

arxiv: v2 [math.oc] 11 Jun 2018 : Tiht Automated Converence Guarantees Adrien Taylor * Bryan Van Scoy * 2 Laurent Lessard * 2 3 arxiv:83.673v2 [math.oc] Jun 28 Abstract We present a novel way of eneratin Lyapunov functions for provin

More information

LP Rounding and Combinatorial Algorithms for Minimizing Active and Busy Time

LP Rounding and Combinatorial Algorithms for Minimizing Active and Busy Time LP Roundin and Combinatorial Alorithms for Minimizin Active and Busy Time Jessica Chan University of Maryland Collee Park, MD, USA jschan@umiacs.umd.edu Samir Khuller University of Maryland Collee Park,

More information

RATE OPTIMIZATION FOR MASSIVE MIMO RELAY NETWORKS: A MINORIZATION-MAXIMIZATION APPROACH

RATE OPTIMIZATION FOR MASSIVE MIMO RELAY NETWORKS: A MINORIZATION-MAXIMIZATION APPROACH RATE OPTIMIZATION FOR MASSIVE MIMO RELAY NETWORKS: A MINORIZATION-MAXIMIZATION APPROACH Mohammad Mahdi Nahsh, Mojtaba Soltanalian, Petre Stoica +, Maryam Masjedi, and Björn Ottersten Department of Electrical

More information

arxiv: v1 [math.co] 3 Apr 2019

arxiv: v1 [math.co] 3 Apr 2019 Reconstructin phyloenetic tree from multipartite quartet system Hiroshi Hirai Yuni Iwamasa April 4, 2019 arxiv:1904.01914v1 [math.co] 3 Apr 2019 Abstract A phyloenetic tree is a raphical representation

More information

Active filter synthesis based on nodal admittance matrix expansion

Active filter synthesis based on nodal admittance matrix expansion Tan et al. EURASIP Journal on Wireless Communications and Networkin (1) 1:9 DOI 1.118/s18-1-881-8 RESEARCH Active filter synthesis based on nodal admittance matrix expansion Linlin Tan, Yunpen Wan and

More information

ANALYZE In all three cases (a) (c), the reading on the scale is. w = mg = (11.0 kg) (9.8 m/s 2 ) = 108 N.

ANALYZE In all three cases (a) (c), the reading on the scale is. w = mg = (11.0 kg) (9.8 m/s 2 ) = 108 N. Chapter 5 1. We are only concerned with horizontal forces in this problem (ravity plays no direct role). We take East as the +x direction and North as +y. This calculation is efficiently implemented on

More information

On Enabling Attribute-Based Encryption to Be Traceable against Traitors

On Enabling Attribute-Based Encryption to Be Traceable against Traitors On Enablin Attribute-Based Encryption to Be Traceable aainst Traitors Zhen Liu 1 and Duncan S. Won 2 1 Shanhai Jiao Ton University, China. liuzhen@sjtu.edu.cn 2 CryptoBLK. duncanwon@cryptoblk.io Abstract.

More information

Graph Entropy, Network Coding and Guessing games

Graph Entropy, Network Coding and Guessing games Graph Entropy, Network Codin and Guessin ames Søren Riis November 25, 2007 Abstract We introduce the (private) entropy of a directed raph (in a new network codin sense) as well as a number of related concepts.

More information

arxiv: v1 [cs.dm] 22 Jan 2019

arxiv: v1 [cs.dm] 22 Jan 2019 PARTIAL ORDER ON THE SET OF BOOLEAN REGULATORY FUNCTIONS A PREPRINT arxiv:1901.07623v1 [cs.dm] 22 Jan 2019 José E.R. Cury Departamento de Automação e Sistemas Universidade Federal de Santa Catarina, Florianópolis,

More information

Matrix multiplication: a group-theoretic approach

Matrix multiplication: a group-theoretic approach CSG399: Gems of Theoretical Computer Science. Lec. 21-23. Mar. 27-Apr. 3, 2009. Instructor: Emanuele Viola Scribe: Ravi Sundaram Matrix multiplication: a roup-theoretic approach Given two n n matrices

More information

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Introduction Main Results Simulation Conclusions Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Mojtaba Vaezi joint work with H. Inaltekin, W. Shin, H. V. Poor, and

More information

A complex variant of the Kuramoto model

A complex variant of the Kuramoto model A complex variant of the Kuramoto model Piet Van Miehem Delft University of Technoloy Auust, 009 Abstract For any network topoloy, we investiate a complex variant of the Kuramoto model, whose real part

More information

Impulse Response and Generating Functions of sinc N FIR Filters

Impulse Response and Generating Functions of sinc N FIR Filters ICDT 20 : The Sixth International Conference on Diital Telecommunications Impulse Response and eneratin Functions of sinc FIR Filters J. Le Bihan Laboratoire RESO Ecole ationale d'inénieurs de Brest (EIB)

More information

Advanced Methods Development for Equilibrium Cycle Calculations of the RBWR. Andrew Hall 11/7/2013

Advanced Methods Development for Equilibrium Cycle Calculations of the RBWR. Andrew Hall 11/7/2013 Advanced Methods Development for Equilibrium Cycle Calculations of the RBWR Andrew Hall 11/7/2013 Outline RBWR Motivation and Desin Why use Serpent Cross Sections? Modelin the RBWR Axial Discontinuity

More information

V DD. M 1 M 2 V i2. V o2 R 1 R 2 C C

V DD. M 1 M 2 V i2. V o2 R 1 R 2 C C UNVERSTY OF CALFORNA Collee of Enineerin Department of Electrical Enineerin and Computer Sciences E. Alon Homework #3 Solutions EECS 40 P. Nuzzo Use the EECS40 90nm CMOS process in all home works and projects

More information

The g-extra Conditional Diagnosability of Folded Hypercubes

The g-extra Conditional Diagnosability of Folded Hypercubes Applied Mathematical Sciences, Vol. 9, 2015, no. 146, 7247-7254 HIKARI Ltd, www.m-hikari.com http://dx.doi.or/10.12988/ams.2015.510679 The -Extra Conditional Dianosability of Folded Hypercubes Weipin Han

More information

A Multigrid-like Technique for Power Grid Analysis

A Multigrid-like Technique for Power Grid Analysis A Multirid-like Technique for Power Grid Analysis Joseph N. Kozhaya, Sani R. Nassif, and Farid N. Najm 1 Abstract Modern sub-micron VLSI desins include hue power rids that are required to distribute lare

More information

Journal of Inequalities in Pure and Applied Mathematics

Journal of Inequalities in Pure and Applied Mathematics Journal of Inequalities in Pure and Applied Mathematics L HOSPITAL TYPE RULES FOR OSCILLATION, WITH APPLICATIONS IOSIF PINELIS Department of Mathematical Sciences, Michian Technoloical University, Houhton,

More information

Asymptotic Behavior of a t Test Robust to Cluster Heterogeneity

Asymptotic Behavior of a t Test Robust to Cluster Heterogeneity Asymptotic Behavior of a t est Robust to Cluster Heteroeneity Andrew V. Carter Department of Statistics University of California, Santa Barbara Kevin. Schnepel and Doulas G. Steierwald Department of Economics

More information

directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time

directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time Network Flow 1 The Maximum-Flow Problem directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time 2 Maximum Flows and Minimum Cuts flows and cuts max flow equals

More information

5. Network Analysis. 5.1 Introduction

5. Network Analysis. 5.1 Introduction 5. Network Analysis 5.1 Introduction With the continued rowth o this country as it enters the next century comes the inevitable increase in the number o vehicles tryin to use the already overtaxed transportation

More information

Maximum flow problem (part I)

Maximum flow problem (part I) Maximum flow problem (part I) Combinatorial Optimization Giovanni Righini Università degli Studi di Milano Definitions A flow network is a digraph D = (N,A) with two particular nodes s and t acting as

More information

Design and implementation of model predictive control for a three-tank hybrid system

Design and implementation of model predictive control for a three-tank hybrid system International Journal of Computer cience and Electronics Enineerin (IJCEE) Volume 1, Issue 2 (2013) IN 2320 4028 (Online) Desin and implementation of model predictive control for a three-tank hybrid system

More information

Fully Sincere Voting

Fully Sincere Voting Fully Sincere Votin Alexander Wolitzky Massachusetts Institute of Technoloy Cambride, MA 0239 wolitzky@mit.edu Abstract In a eneral social choice framework where the requirement of strateyproofness may

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

No-envy in Queueing Problems

No-envy in Queueing Problems No-envy in Queueing Problems Youngsub Chun School of Economics Seoul National University Seoul 151-742, Korea and Department of Economics University of Rochester Rochester, NY 14627, USA E-mail: ychun@plaza.snu.ac.kr

More information

1. Introduction. ) exceeded the terminal velocity (U t

1. Introduction. ) exceeded the terminal velocity (U t Excerpt from the Proceedins of the COMOL Conference 010 India Cluster Diameter Determination of Gas-solid Dispersed Particles in a Fluidized Bed Reactor *Mitali Das Department of Biotechnoloy, PEIT Banalore

More information

Flows. Chapter Circulations

Flows. Chapter Circulations Chapter 4 Flows For a directed graph D = (V,A), we define δ + (U) := {(u,v) A : u U,v / U} as the arcs leaving U and δ (U) := {(u,v) A u / U,v U} as the arcs entering U. 4. Circulations In a directed graph

More information

Math 5490 Network Flows

Math 5490 Network Flows Math 90 Network Flows Lecture 8: Flow Decomposition Algorithm Stephen Billups University of Colorado at Denver Math 90Network Flows p./6 Flow Decomposition Algorithms Two approaches to modeling network

More information

A Probabilistic Analysis of Propositional STRIPS. Planning. Tom Bylander. Division of Mathematics, Computer Science, and Statistics

A Probabilistic Analysis of Propositional STRIPS. Planning. Tom Bylander. Division of Mathematics, Computer Science, and Statistics A Probabilistic Analysis of Propositional STRIPS Plannin Tom Bylander Division of Mathematics, Computer Science, and Statistics The University of Texas at San Antonio San Antonio, Texas 78249 USA bylander@riner.cs.utsa.edu

More information

Statistical Mechanics: A Possible Model for Market-based Electric Power Control

Statistical Mechanics: A Possible Model for Market-based Electric Power Control Proceedins of the 37th Hawaii International Conference on System Sciences - 4 Statistical Mechanics: A Possible Model for Market-based Electric Power Control David P Chassin Pacific orthwest ational Laboratory

More information

Altitude measurement for model rocketry

Altitude measurement for model rocketry Altitude measurement for model rocketry David A. Cauhey Sibley School of Mechanical Aerospace Enineerin, Cornell University, Ithaca, New York 14853 I. INTRODUCTION In his book, Rocket Boys, 1 Homer Hickam

More information

Conical Pendulum Linearization Analyses

Conical Pendulum Linearization Analyses European J of Physics Education Volume 7 Issue 3 309-70 Dean et al. Conical Pendulum inearization Analyses Kevin Dean Jyothi Mathew Physics Department he Petroleum Institute Abu Dhabi, PO Box 533 United

More information

Security Constrained Optimal Power Flow

Security Constrained Optimal Power Flow Security Constrained Optimal Power Flow 1. Introduction and notation Fiure 1 below compares te optimal power flow (OPF wit te security-constrained optimal power flow (SCOPF. Fi. 1 Some comments about tese

More information

The Computational Complexity Analysis of a MINLP-Based Chemical Process Control Design

The Computational Complexity Analysis of a MINLP-Based Chemical Process Control Design J.Oto.Ktrl.Inst (J.Auto.Ctrl.Inst Vol (, 00 ISSN : 085-57 Abstract The Computational Complexity Analysis of a MINLP-Based Chemical Process Control Desin E. Ekawati, S. Yuliar Center for Instrumentation

More information

Strongly Polynomial Algorithm for a Class of Minimum-Cost Flow Problems with Separable Convex Objectives

Strongly Polynomial Algorithm for a Class of Minimum-Cost Flow Problems with Separable Convex Objectives Strongly Polynomial Algorithm for a Class of Minimum-Cost Flow Problems with Separable Convex Objectives László A. Végh April 12, 2013 Abstract A well-studied nonlinear extension of the minimum-cost flow

More information

Analysis of Outage and Throughput for Opportunistic Cooperative HARQ Systems over Time Correlated Fading Channels

Analysis of Outage and Throughput for Opportunistic Cooperative HARQ Systems over Time Correlated Fading Channels Analysis of Outae and Throuhput for Opportunistic Cooperative HARQ Systems over Time Correlated Fadin Channels Xuanxuan Yan, Haichuan Din,3, Zhen Shi, Shaodan Ma, and Su Pan Department of Electrical and

More information

Amplitude Adaptive ASDM without Envelope Encoding

Amplitude Adaptive ASDM without Envelope Encoding Amplitude Adaptive ASDM without Envelope Encodin Kaspars Ozols and Rolands Shavelis Institute of Electronics and Computer Science 14 Dzerbenes Str., LV-16, Ria, Latvia Email: kaspars.ozols@edi.lv, shavelis@edi.lv

More information

4.3. Solving Friction Problems. Static Friction Problems. Tutorial 1 Static Friction Acting on Several Objects. Sample Problem 1.

4.3. Solving Friction Problems. Static Friction Problems. Tutorial 1 Static Friction Acting on Several Objects. Sample Problem 1. Solvin Friction Problems Sometimes friction is desirable and we want to increase the coefficient of friction to help keep objects at rest. For example, a runnin shoe is typically desined to have a lare

More information

Discrete Optimization 2010 Lecture 3 Maximum Flows

Discrete Optimization 2010 Lecture 3 Maximum Flows Remainder: Shortest Paths Maximum Flows Discrete Optimization 2010 Lecture 3 Maximum Flows Marc Uetz University of Twente m.uetz@utwente.nl Lecture 3: sheet 1 / 29 Marc Uetz Discrete Optimization Outline

More information

Two-Commodity Multiroute Maximum Flow Problem

Two-Commodity Multiroute Maximum Flow Problem Two-Commodity Multiroute Maximum Flow roblem Donglei Du R. Chandrasekaran August, 005 Abstract We consider a two-commodity multiroute maximum flow problem in an undirected network a generalization of the

More information

2.2 Differentiation and Integration of Vector-Valued Functions

2.2 Differentiation and Integration of Vector-Valued Functions .. DIFFERENTIATION AND INTEGRATION OF VECTOR-VALUED FUNCTIONS133. Differentiation and Interation of Vector-Valued Functions Simply put, we differentiate and interate vector functions by differentiatin

More information

Emotional Optimized Design of Electro-hydraulic Actuators

Emotional Optimized Design of Electro-hydraulic Actuators Sensors & Transducers, Vol. 77, Issue 8, Auust, pp. 9-9 Sensors & Transducers by IFSA Publishin, S. L. http://www.sensorsportal.com Emotional Optimized Desin of Electro-hydraulic Actuators Shi Boqian,

More information

REAL-TIME TIME-FREQUENCY BASED BLIND SOURCE SEPARATION. Scott Rickard, Radu Balan, Justinian Rosca

REAL-TIME TIME-FREQUENCY BASED BLIND SOURCE SEPARATION. Scott Rickard, Radu Balan, Justinian Rosca REAL-TIME TIME-FREQUENCY BASED BLIND SOURCE SEARATION Scott Rickard, Radu Balan, Justinian Rosca Siemens Corporate Research rinceton, NJ scott.rickard,radu.balan,justinian.rosca @scr.siemens.com ABSTRACT

More information

Nonlinear Model Reduction of Differential Algebraic Equation (DAE) Systems

Nonlinear Model Reduction of Differential Algebraic Equation (DAE) Systems Nonlinear Model Reduction of Differential Alebraic Equation DAE Systems Chuili Sun and Jueren Hahn Department of Chemical Enineerin eas A&M University Collee Station X 77843-3 hahn@tamu.edu repared for

More information

Problem Set 2 Solutions

Problem Set 2 Solutions UNIVERSITY OF ALABAMA Department of Physics and Astronomy PH 125 / LeClair Sprin 2009 Problem Set 2 Solutions The followin three problems are due 20 January 2009 at the beinnin of class. 1. (H,R,&W 4.39)

More information

arxiv: v1 [math.oc] 26 Sep 2017

arxiv: v1 [math.oc] 26 Sep 2017 Data-Driven Analysis of Mass-Action Kinetics Camilo Garcia-Tenorio, Duvan Tellez-Castro, Eduardo Mojica-Nava, and Jore Sofrony arxiv:1709.09273v1 [math.oc] 26 Sep 2017 Abstract The physical interconnection

More information

Flows and Cuts. 1 Concepts. CS 787: Advanced Algorithms. Instructor: Dieter van Melkebeek

Flows and Cuts. 1 Concepts. CS 787: Advanced Algorithms. Instructor: Dieter van Melkebeek CS 787: Advanced Algorithms Flows and Cuts Instructor: Dieter van Melkebeek This lecture covers the construction of optimal flows and cuts in networks, their relationship, and some applications. It paves

More information

Two Applications of Maximum Flow

Two Applications of Maximum Flow Two Applications of Maximum Flow The Bipartite Matching Problem a bipartite graph as a flow network maximum flow and maximum matching alternating paths perfect matchings 2 Circulation with Demands flows

More information

arxiv:cs/ v1 [cs.it] 4 Feb 2007

arxiv:cs/ v1 [cs.it] 4 Feb 2007 Hih-rate, Multi-Symbol-Decodable STBCs from Clifford Alebras Sanjay Karmakar Beceem Communications Pvt Ltd, Banalore skarmakar@beceemcom B Sundar Rajan Department of ECE Indian Institute of Science, Banalore

More information

Deadline-Sensitive User Recruitment for Mobile Crowdsensing with Probabilistic Collaboration

Deadline-Sensitive User Recruitment for Mobile Crowdsensing with Probabilistic Collaboration Deadline-Sensitive User Recruitment for Mobile Crowdsensing with Probabilistic Collaboration Mingun Xiao, Jie Wu, He Huang, Liusheng Huang, and Chang Hu School of Computer Science and echnology / Suzhou

More information

Mechanics Cycle 3 Chapter 12++ Chapter 12++ Revisit Circular Motion

Mechanics Cycle 3 Chapter 12++ Chapter 12++ Revisit Circular Motion Chapter 12++ Revisit Circular Motion Revisit: Anular variables Second laws for radial and tanential acceleration Circular motion CM 2 nd aw with F net To-Do: Vertical circular motion in ravity Complete

More information

Efficient method for obtaining parameters of stable pulse in grating compensated dispersion-managed communication systems

Efficient method for obtaining parameters of stable pulse in grating compensated dispersion-managed communication systems 3 Conference on Information Sciences and Systems, The Johns Hopkins University, March 12 14, 3 Efficient method for obtainin parameters of stable pulse in ratin compensated dispersion-manaed communication

More information

SIGN OF GREEN S FUNCTION OF PANEITZ OPERATORS AND THE Q CURVATURE

SIGN OF GREEN S FUNCTION OF PANEITZ OPERATORS AND THE Q CURVATURE SIGN OF GREEN S FUNCTION OF PANEIT OPERATORS AND THE Q CURVATURE FENGBO HANG AND PAUL C. YANG Abstract. In a conformal class of metrics with positive Yamabe invariant, we derive a necessary and su cient

More information

ONLINE: MATHEMATICS EXTENSION 2 Topic 6 MECHANICS 6.3 HARMONIC MOTION

ONLINE: MATHEMATICS EXTENSION 2 Topic 6 MECHANICS 6.3 HARMONIC MOTION ONINE: MATHEMATICS EXTENSION Topic 6 MECHANICS 6.3 HARMONIC MOTION Vibrations or oscillations are motions that repeated more or less reularly in time. The topic is very broad and diverse and covers phenomena

More information

A FORWARD-BACKWARD VIEW OF SOME PRIMAL-DUAL OPTIMIZATION METHODS IN IMAGE RECOVERY

A FORWARD-BACKWARD VIEW OF SOME PRIMAL-DUAL OPTIMIZATION METHODS IN IMAGE RECOVERY A FORWARD-BACKWARD VIEW OF SOME PRIMAL-DUAL OPTIMIZATION METHODS IN IMAGE RECOVERY P. L. Combettes, 1 L. Condat, 2 J.-C. Pesquet, 3 and B. C. Vũ 4 1 Sorbonne Universités UPMC Univ. Paris 06 Laboratoire

More information

Stochastic simulations of genetic switch systems

Stochastic simulations of genetic switch systems Stochastic simulations of enetic switch systems Adiel Loiner, 1 Azi Lipshtat, 2 Nathalie Q. Balaban, 1 and Ofer Biham 1 1 Racah Institute of Physics, The Hebrew University, Jerusalem 91904, Israel 2 Department

More information

Homework # 2. SOLUTION - We start writing Newton s second law for x and y components: F x = 0, (1) F y = mg (2) x (t) = 0 v x (t) = v 0x (3)

Homework # 2. SOLUTION - We start writing Newton s second law for x and y components: F x = 0, (1) F y = mg (2) x (t) = 0 v x (t) = v 0x (3) Physics 411 Homework # Due:..18 Mechanics I 1. A projectile is fired from the oriin of a coordinate system, in the x-y plane (x is the horizontal displacement; y, the vertical with initial velocity v =

More information

IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING 1

IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING 1 IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING 1 Intervention in Gene Reulatory Networks via a Stationary Mean-First-Passae-Time Control Policy Golnaz Vahedi, Student Member, IEEE, Babak Faryabi, Student

More information

The Compact Muon Solenoid Experiment. Conference Report. Mailing address: CMS CERN, CH-1211 GENEVA 23, Switzerland

The Compact Muon Solenoid Experiment. Conference Report. Mailing address: CMS CERN, CH-1211 GENEVA 23, Switzerland Available on CMS information server CMS CR-28/5 he Compact Muon Solenoid Experiment Conference Report Mailin address: CMS CERN, CH-1211 GENEVA 23, Switzerland 14 February 28 Observin Heavy op Quarks with

More information

Continuous-time double integrator consensus algorithms improved by an appropriate sampling

Continuous-time double integrator consensus algorithms improved by an appropriate sampling Continuous-time double interator consensus alorithms improved by an appropriate samplin Gabriel Rodriues de Campos, Alexandre Seuret o cite this version: Gabriel Rodriues de Campos, Alexandre Seuret. Continuous-time

More information

Buckling analysis of thin-walled members via semi-analytical finite strip transfer matrix method

Buckling analysis of thin-walled members via semi-analytical finite strip transfer matrix method Special Issue Article Bucklin analysis of thin-walled members via semi-analytical finite strip transfer matrix method Advances in Mechanical Enineerin 16, ol. 8() 1 11 Ó The Author(s) 16 DOI: 1.11/168811661

More information

Teams to exploit spatial locality among agents

Teams to exploit spatial locality among agents Teams to exploit spatial locality amon aents James Parker and Maria Gini Department of Computer Science and Enineerin, University of Minnesota Email: [jparker,ini]@cs.umn.edu Abstract In many situations,

More information

STRONG GLOBAL ATTRACTOR FOR A QUASILINEAR NONLOCAL WAVE EQUATION ON R N

STRONG GLOBAL ATTRACTOR FOR A QUASILINEAR NONLOCAL WAVE EQUATION ON R N Electronic Journal of Differential Equations, Vol. 2006(2006), No. 77, pp. 1 10. ISSN: 1072-6691. URL: http://ejde.math.txstate.edu or http://ejde.math.unt.edu ftp ejde.math.txstate.edu (loin: ftp) STRONG

More information

Steady State Analysis of Self-Excited Induction Generator using THREE Optimization Techniques

Steady State Analysis of Self-Excited Induction Generator using THREE Optimization Techniques ahilgupta / nternational Journal of Enineerin esearch and pplications (JE) N: 8-96 www.ijera.com ol., ssue, eptember- October 0, pp.6-7 teady tate nalysis of elf-excited nduction Generator usin THEE Optimization

More information

Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game

Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game IEEE ICC 202 - Wireless Networks Symposium Cooperation Stimulation in Cooperative Communications: An Indirect Reciprocity Game Yang Gao, Yan Chen and K. J. Ray Liu Department of Electrical and Computer

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information

Cmpt 250 Unsigned Numbers January 11, 2008

Cmpt 250 Unsigned Numbers January 11, 2008 Cmt 25 Unsined Numbers Januar, 28 These notes serve two uroses in the contet of Cmt 25: as we develo the basic desin of an inteer ALU, we ll review the basics of number reresentation and combinational

More information

Solution of Fuzzy Maximal Flow Network Problem Based on Generalized Trapezoidal Fuzzy Numbers with Rank and Mode

Solution of Fuzzy Maximal Flow Network Problem Based on Generalized Trapezoidal Fuzzy Numbers with Rank and Mode International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 9, Issue 7 (January 2014), PP. 40-49 Solution of Fuzzy Maximal Flow Network Problem

More information

Round-off Error Free Fixed-Point Design of Polynomial FIR Predictors

Round-off Error Free Fixed-Point Design of Polynomial FIR Predictors Round-off Error Free Fixed-Point Desin of Polynomial FIR Predictors Jarno. A. Tanskanen and Vassil S. Dimitrov Institute of Intellient Power Electronics Department of Electrical and Communications Enineerin

More information

STOCHASTIC ENERGY MANAGEMENT IN DISTRIBUTION GRIDS

STOCHASTIC ENERGY MANAGEMENT IN DISTRIBUTION GRIDS STOCHASTIC ENERGY MANAGEMENT IN DISTRIBUTION GRIDS Gan Wan, 1 Vassilis Kekatos, and Georios B. Giannakis 1 1 ECE Dept. and Diital Tech. Center, Univ. of Minnesota, Minneapolis, MN 55455, USA ECE Dept.,

More information

Secant Degeneracy Index of the Standard Strata in The Space of Binary Forms

Secant Degeneracy Index of the Standard Strata in The Space of Binary Forms Arnold Math J. https://doi.or/10.1007/s40598-017-0077-7 RESEARCH CONTRIBUTION Secant Deeneracy Index of the Standard Strata in The Space of Binary Forms Gleb Nenashev 1 Boris Shapiro 1 Michael Shapiro

More information

First- and Second Order Phase Transitions in the Holstein- Hubbard Model

First- and Second Order Phase Transitions in the Holstein- Hubbard Model Europhysics Letters PREPRINT First- and Second Order Phase Transitions in the Holstein- Hubbard Model W. Koller 1, D. Meyer 1,Y.Ōno 2 and A. C. Hewson 1 1 Department of Mathematics, Imperial Collee, London

More information

THE SIGNAL ESTIMATOR LIMIT SETTING METHOD

THE SIGNAL ESTIMATOR LIMIT SETTING METHOD ' THE SIGNAL ESTIMATOR LIMIT SETTING METHOD Shan Jin, Peter McNamara Department of Physics, University of Wisconsin Madison, Madison, WI 53706 Abstract A new method of backround subtraction is presented

More information

MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL

MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL Jing (Selena) He Department of Computer Science, Kennesaw State University Shouling Ji,

More information

GRAPH ALGORITHMS Week 7 (13 Nov - 18 Nov 2017)

GRAPH ALGORITHMS Week 7 (13 Nov - 18 Nov 2017) GRAPH ALGORITHMS Week 7 (13 Nov - 18 Nov 2017) C. Croitoru croitoru@info.uaic.ro FII November 12, 2017 1 / 33 OUTLINE Matchings Analytical Formulation of the Maximum Matching Problem Perfect Matchings

More information

arxiv: v1 [cs.ai] 15 Nov 2013

arxiv: v1 [cs.ai] 15 Nov 2013 Inferrin Multilateral Relations from Dynamic Pairwise Interactions arxiv:1311.3982v1 [cs.ai] 15 Nov 2013 Aaron Schein, Juston Moore, Hanna Wallach School of Computer Science University of Massachusetts

More information

Isotropic diffeomorphisms: solutions to a differential system for a deformed random fields study

Isotropic diffeomorphisms: solutions to a differential system for a deformed random fields study Isotropic diffeomorphisms: solutions to a differential system for a deformed random fields study Marc Briant, Julie Fournier To cite this version: Marc Briant, Julie Fournier. Isotropic diffeomorphisms:

More information

Scheduling non-preemptive hard real-time tasks with strict periods

Scheduling non-preemptive hard real-time tasks with strict periods Schedulin non-preemptive hard real-time tasks with strict periods Mohamed MAROUF INRIA Rocquencourt Domaine de Voluceau BP 05 785 Le Chesnay Cedex - France Email: mohamed.marouf@inria.fr Yves SOREL INRIA

More information

AN INNOVATIVE TYPE OF TUNED LIQUID DAMPER

AN INNOVATIVE TYPE OF TUNED LIQUID DAMPER 10NCEE Tenth U.S. National Conference on Earthquake Enineerin Frontiers of Earthquake Enineerin July 21-25, 2014 Anchorae, Alaska AN INNOVATIVE TYPE OF TUNED LIQUID DAMPER R. O. Ruiz 1, D. Lopez-Garcia

More information

THE North American Electric Reliability Corporation

THE North American Electric Reliability Corporation 1 Continency-Constrained Unit Commitment With Intervenin Time for System Adjustments Zhaomiao Guo, Richard Li-Yan Chen Member, IEEE, Nen Fan, and Jean-Paul Watson Member, IEEE arxiv:1604.05399v1 [math.oc]

More information

Approximate Binary Search Algorithms for Mean Cuts and Cycles

Approximate Binary Search Algorithms for Mean Cuts and Cycles Approximate Binary Search Algorithms for Mean Cuts and Cycles S. Thomas McCormick Faculty of Commerce and Business Administration University of British Columbia Vancouver, BC V6T 1Z2 Canada June 1992,

More information

On Two Class-Constrained Versions of the Multiple Knapsack Problem

On Two Class-Constrained Versions of the Multiple Knapsack Problem On Two Class-Constrained Versions of the Multiple Knapsack Problem Hadas Shachnai Tami Tamir Department of Computer Science The Technion, Haifa 32000, Israel Abstract We study two variants of the classic

More information