The Optimization of Framed Aloha based RFID Algorithms

Size: px
Start display at page:

Download "The Optimization of Framed Aloha based RFID Algorithms"

Transcription

1 The Optimization of Framed Aoha based RFID Agorithms Lei Zhu The Chinese University of Hong Kong Shatin, ew Territory Hong Kong, China Tak-Shing Peter Yum The Chinese University of Hong Kong Shatin, ew Territory Hong Kong, China ABSTRACT The anti-coision mechanism is a very important part in Radio-frequency Identification RFID systems. Among a the agorithms, the Framed Aoha based FA ones are most widey used due to simpicity and robustness. Previous works mainy focused on the tag popuation estimation, but determined the reading strategy based on the cassica resuts of Random Access RA systems. We show that a new theory is needed for the optimization of the RFID systems as they have characteristics very different from the RA systems. In this paper, We propose a new approach to minimize the tota expected reading time by choosing the most suitabe frame size based on the tag popuation distribution. We show that the optima strategy can be used in different appications. The mathematica anaysis and computer simuation show our approach outperforms the previous optimization works in the iterature. Categories and Subject Descriptors F.. [Anaysis of Agorithms and Probem Compexity]: onnumerica Agorithms and Probems; G.3 [Probabiity and Statistics]: Distribution functions, Markov processes Genera Terms Agorithms, Design, Performance, Theory Keywords Agorithm, RFID, Framed Aoha, Optimization 1. ITRODUCTIO In Radio-frequency Identification RFID systems, tags share a common communication channe. Therefore, if mutipe tags transmit at the same time, their packets wi coide and get ost [1]. Passive tags have bare-bone functionaity and no embedded power suppy. They cannot sense the media or cooperate with one another. The RFID reader needs to coordinate their transmissions to avoid coisions. The communication time between tags and readers are sotted. But Permission to make digita or hard copies of a or part of this work for persona or cassroom use is granted without fee provided that copies are not made or distributed for profit or commercia advantage and that copies bear this notice and the fu citation on the first page. To copy otherwise, to repubish, to post on servers or to redistribute to ists, requires prior specific permission and/or a fee. MSWiM 09, October 6 9, 009, Tenerife, Canary Isands, Spain. Copyright 009 ACM /09/10...$ Figure 1: and tags The communication between the reader unike CSMA system, tags need to reserve the channe before transmission. The tota communication time therefore incudes the contention time and the operation time. To iustrate, consider the tag reading operation in EPCgoba standards [] as shown in Figure 1. Within a contention sot, the reader broadcasts a trigger command Query or QueryRep. After receiving this command, each tag runs a random function to decide whether to repy or not. Tags ony repy a short packet named R16 random number 16 bits. It is used as the temporary ID for this tag. If mutipe tags repy or no tag repies, the reader sends an trigger command again. If ony one tag repies, the reader can receive the packet successfuy and operate on this tag by its R16 after this sot. The operation may incude reading data, writing new data, changing password, etc. Since the operation sot is coision-free, the tota operation time does not depend on the reading strategy. Therefore, the performance of anti-coision agorithms is conventionay evauated by the average contention time measured by the number of contention sots. In iterature, the sot usuay refers to the contention sot whie the reading time usuay refers to the contention time measured in contention sots. foow this convention in this paper. We Depending on working principes, RFID anti-coision agorithms can be divided into three main types: Tree based agorithms [5][6], Framed Aoha based FA agorithms [8-16] and Interva based agorithms [7]. Different types usuay require different hardware and software design of both the reader and the tags. Among a the types, FA agorithms are most widey used in RFID communication standards [- 4] due to simpicity and robustness. In most appications, the number of tags are unknown before identification. So a proper FA agorithm aways contains two parts: Popuation Estimation part and Reading Strat- 1

2 egy Determination part. The first part is for estimating the tag popuation based on tags repies whie the second part is for adjusting the command parameters, such as the frame size, based on the estimation. Previous works [8-16] emphasized Popuation Estimation methods and designed reading strategies based on the cassic resuts of Random Access RA Systems [10]. Since RFID systems and RA systems are fundamentay different the detais are in section 3, the use of RA resuts wi not ead to the optima reading strategy in RFID systems. In this paper, we mode the reading process as a Markov Chain and derive the optima reading strategy through first-passage-time anaysis. We show that the optima strategy can be easiy incorporated into the different appications to give significant performance improvement, especiay when the variance of tag popuation is arge. In section, we introduce the basic ideas of the FA agorithms. In section 3, we give a survey of the traditiona strategies of FA agorithms and point out an unjustified assumption used in previous attempts of reading strategy optimization. In section 4, a new mode is proposed to derive the optima reading strategy. In section 5, we show the appications of the optima strategy and compare its performance with the previous works.. FRAMED ALOHA-BASED RFID SYSTEMS Framed Aoha FA is a variation of sotted Aoha where a termina is permitted to transmit once per frame. The frame size L is broadcast by the reader at the beginning of every round; each tag randomy chooses a vaue from 0 to L 1 as its transmission deay. In RFID systems, the FA agorithms have some specia characteristics..1 Limited Choices of Frame Size Many RFID systems have imitations on the choice of frame size due to hardware constraints. For exampe, in EPCgobe standards, it is imited to ony 16 choices as Q,whereQ = 0, 1,,...,15.. Sience Command In the origina design of FA agorithms, tags do not know their transmission resuts as there is no feedback from the reader. They wi a transmit again in the next round of contention. Readers have difficuty ascertaining the end of the reading process as some tags may suffer coisions again and again tag starvation probem. This situation was changed by the introduction of the Sience Command 1 in EPCgobe standards. After identifying a tag, the reader wi broadcast its ID and ask it to keep sient..3 Reset Command As in Figure 1, the RFID reader has to broadcast a Trigger command in every time sot because tags need to extract power from the command signa to repy. The reader consequenty does not have to wait unti the end of a frame to change the repy probabiity by setting the appropriate frame size. Some designs introduce the Frame-size Reset 1 It is aso referred to as Ki command in iterature. In EPCgobe standards, it corresponds to the Seect command, which have other uses besides siencing a tag. Figure : The working mechanism of Type 4 Aohabased agorithms command to cance a running frame and initiate a new one..4 Spit Command Some FA agorithms [8] have the Spit Command of Treebased agorithms embedded. After a frame of reading, the reader may choose to initiate a new frame or just spit the coided sots. The reading process of agorithms embedded with the Spit Command is iustrated in Figure. This was shown to improve the performance at the expense of hardware compexity..5 Cassification of RFID Systems Depending on the tag-reader capabiity, or the set of commands supported, the RFID systems for FA agorithms can be cassified into four types as foows: 1: support ony Framed Aoha; : support Framed Aoha with Sience Command; 3: support Framed Aoha with Sience and Reset Command; 4: support Framed Aoha with Sience and Spit Command. ote the term Type RFID system refers to an RFID system hardware and software which supports a certain set of commands whie the term Type agorithm refers to a reading strategy which determines when and how to use these commands. In this paper, we wi focus on the Type RFID system, which is simpe enough and reativey efficient. In EPCgoba standards, it corresponds to the QueryAdjust command.

3 3. A SURVEY OF PREVIOUS WORKS FA agorithms are widey used in random-access systems. The cassica resut for throughput U with attempting terminas and frame size L is given in [10] as: U,L = L 1 1 L 1. 1 The throughput U can be optimized by setting the frame size equa to the termina number, or L =. The bound for arge is U = e 1. However, in RFID systems, the precise vaue of is usuay not avaiabe. Hence the throughput depends on the estimate of from tag repies. During the reading process, the reader can estimate the tag popuation based on the outcomes of the sots: whether they are empty, singeton or coided. There is usuay a misunderstanding that the reader shoud use severa frames of contention sots to estimate the tag popuation before the rea reading process starts. Actuay, it is ony usefu for the earier RFID systems, which do not support the reservation mechanism. Since the coision of the operation sots woud waste more time, the earier strategies prefer to use a sequence of training sots short sots to estimate the tag popuation and use it to set the frame size of the operation sots. However, in modern RFID systems, a singeton contention sot can reserve an operation sot. Tags can be identified whie the reader is doing estimation. Thus the training sequence approach is abandoned. Most agorithms do estimation throughout the reading process. Based on the estimation methods, agorithms can be divided into: the max-ikeihood approach and the probabiity distribution approach. 3.1 Max-ikeihood Approach Schoute [10] noticed that when is arge and L is suitaby chosen say L, the number of tags attempting each sot has a Poisson distribution with mean 1. The number of coided tags C at the end of a frame can be estimated as: C = round.39s c where s c is the number of coided sots in the frame. Therefore his strategy is to set L = round.39s c as the next frame size. Vogt [11] improved Schoute s strategy by using the statistics of empty sots s e and singeton sots s s in addition. Tag popuation is estimated to be the vaue that minimizes the error between the observed vaues of s e, s s, s c and their expected vaues using. Kodiaam [16] proposed an new estimation method based on the Centra Limit Theorem. That is when the number of contending tags is arge enough, the number of coision sots and empty sots in the current frame shoud obey the orma distribution. Thus using his method, one may obtain the estimation accuracy as we as the max-ikeihood tag popuation. But the frame size is aso set as L = E[]. Another exampe is the Q agorithm in EPCgoba standards []. The reader maintains a foating-point variabe Q fp. It decreases a typica vaue C when no tag repies, increases C when mutipe tags repy and stays unchanged when ony 1 tag repies. 3 The frame size is set to Q,where Q = roundq fp and wi be canceed whenever roundq fp changes. In [13][14], the efficiency of the Q agorithm was obtained with different choices of C and Q fp and some methods to improve efficiency were proposed. In summary, agorithms of this type compute the maximumikeihood tag popuation ˆ based on the reading resuts and set L = ˆ as the frame size. This approach is simpe but rough, as the expectation ony cannot fuy describe the variabe. 3. Probabiity Distribution Approach Foerkemeier [1][15] designed some new strategies based on 1. He assumes that a rough estimation of the target group size is aways avaiabe in the form of a distribution Pr = i and derives the next frame size as max L = L :max U = i, LPr = i, 3 L Υ i=0 where Υ is the set of possibe frame sizes. In every time sot, the reader updates the distribution by Bayesian method and cances the current frame whenever L changes according to 3. This approach can track the vaue of more accuratey. Since a random variabe is competey specified by its distribution and Bayesian method ensures no information oss in estimation, the Popuation Estimation part of Foerkemeier s agorithm is undisputabe, but the use of 1 in the Reading Strategy Determination part is unwise. 3.3 The eed for a ew Mode From this review, we can see that previous works focused on the Popuation Estimation, providing different ways to find a more accurate. For the Reading Strategy Determination part, they a use 1 for cacuating throughput. As we mentioned before, 1 is obtained from the theory of Random Access RA system. In RA system, the frame size is chosen to optimize the instantaneous throughput U. Sincea termina in an RA system woud sti attempts the channe after a successfu transmission, the contending group can be assumed unchange during a ong enough period. The ong-term throughput of a RA system is therefore equa to the expected instantaneous throughput U cacuated by 1. However, in RFID systems, identified tags are sienced by the reader, eading to tag popuation decrease during the reading process. When the frames are not identica, a concatenation of ocay optima soutions is not gobay optima. As an exampe, suppose the target group size is distributed as Pr = i = 0.99, i =0 0.01, i =10 From 3, the suitabe frame size shoud be L = 10, as it can maximize the throughput of the current frame. However, since this group is very ikey empty, it is better to use L =1 to check whether it contains tags or not even though the throughput of this checking frame is 0. 3 In EPCgobe standards, it is recommended that 0. C 0.5 and the initia Q fp =4 3

4 4. READIG STRATEGY OPTIMIZATIO We now present our method to find the gobay optima frame size. This method can be used for a types of FA agorithms. In this paper, We use the Type agorithm to iustrate. 4.1 The Optima Reading Strategy Since canceing a frame is not aowed in Type agorithms, the reading strategies are restricted to the choice of the next frame size. To choose a suitabe frame size L, thereader needs the information of the target group size. As discussed in Section 3, this information can be fuy described by a probabiity distribution. In appications, a rough distribution is often avaiabe as the reader has information of its previous readings. In the worst case where is competey unknown, a uniform distribution on [0, max] can be assumed as we cannot favor any vaue over the others. During the reading process, et Be denotethebeief of, or the conditiona distribution of based on a avaiabe information [17]. At the end of every frame, the beief can be updated by the Bayesian method [17]. To simpify the notation, et v n = Be = n andv =v 0,v 1,...,v max. Obviousy the accuracy of the beief affects the reading efficiency. Let T n v denote the expected contention time, measured by sots, for these n tags when the current beief is v. Then the expected finishing time is T v = max n=0 v nt n v. Our goa is to find the optima frame size L that can minimize T v for any given distribution v, or L = L : L Υ, mint v L. 4 ote 4 is different from 3 as it is designed to minimize the expected reading time T v instead of the expected instantaneous throughput U. ThusL is the gobay optima frame size. To find it, however, requires deriving the function of T v from the reading mechanism of Type agorithms. denote the set of a possibe states. For a group with the initia estimation P, et V 0 = P be the initia state and V T =1, 0, 0,...,0 be the termina state. Theorem 1. Foowing a distribution-based anti-coision agorithm, the reading process V 0V 1V...V T is a Markov Chain. Proof. At the end of frame j, etv j =v 0,v 1,...,v max V be the current state. For a distribution-based agorithm, the next frame size shoud be fixed given V j. Let V j+1 = u 0,u 1,...,u max be the beief of tag popuation at the end of frame j + 1. Obviousy it depends on the reading resuts of frame j + 1 as we as the previous beiefs. In frame j + 1, et random variabe S 0,S 1,S c denote the number of empty sots, singeton sots and coided sots. It can be proved that the position of the empty sots, singeton sots and coided sots does not matter and ony their tota numbers affect the beief. Since S 0 + S 1 + S c =, thereare at most = different outcomes. Thus for a given frame size, there are at most different choices of V j+1 that satisfy PrV j+1 V j > 0. Anaogous to the urn probem [18], the probabiity that s 1 urns contain ony 1 ba, s c urns contain more than 1 bas and the others are empty can be obtained as: PrS c = s c,s 1 = s 1 j = n, L = = s 0,s 1,s c n! n s 1! n m 1,m,...,msc, m 1 +m + +msc=n s 1 n s 1, m 1,m,...,m sc 5 where m 1,m,...,m sc denote the number of tags in each of the s c coided sots. Further, we can substitute the beief of j to obtain = PrS c = s c,s 1 = s 1 L = max n=0 v n PrS c = s c,s 1 = s 1 j = n, L =. 6 In an inteigent system, the optima decision depends ony on the current information, or the beief of a the reevant variabes [17]. Appying to RFID systems, the optima frame size depends ony on Be. 4 We et V j = Be j = v 0,v 1,...,v max denote the state of the reading process at the end of frame j, where j is unresoved tag popuation at the end of frame j. Since identified tags are sienced by the reader, we aways have j j+1. Furtheret V = v 0,v 1,...,v max v i 0, max i=0 v i =1 4 ote it is important to differentiate the unconditiona optima and the optima based on current beief. As an exampe, suppose = 10, but our current beief is Be = 9 = 1. Then the unconditiona optima frame size is 10, but the optima frame size based on the current knowedge is 9. Since the unconditiona optima frame size is not avaiabe unti the reading process is finished, in this paper we ony consider the optima one based on current beief. At the end of frame j + 1, we can obtain the vaues of s 0, s 1 and s c. By Bayes formua, the posterior distribution of j can be updated as: v i = Pr j = i S c = s c,s 1 = s 1,L= = PrSc = sc,s1 = s1 j = i, L = vi PrS c = s c,s 1 = s 1 L = As tags in the singeton sots are successfuy identified and sienced, we have j+1 = j s 1 with distribution given as 7 u i = Pr j+1 = i S c = s c,s 1 = s 1,L= = Pr j = i + s 1 S c = s c,s 1 = s 1,L= = v i+s 1, i =0, 1,,... 8 Since the transition probabiity from state V j =v 0,v 1,...,v max to V j+1 =u 0,u 1,...,u maxisjustprs c = s c,s 1 = s 1 L =, which depends ony on V j and V j+1,thestatesv 0V 1V...V T forms a Markov Chain. 4

5 For a given state V j, et VV j, V denote the set of possibe V j+1, or VV j,= V j+1 PrV j+1 V j > 0. As proved in Theorem 1, V V j, Let T OV j denote the first passage time from V j to V T using the optima reading strategy. From the theory of Markov Chain [19], we have T O V j = L + = min V j+1 VV j,l + V j+1 VV j, PrV j+1 V j T O V j+1 PrV j+1 V j T O V j+1 9 In 9, the set VV j, and the transition probabiity PrV j+1 V j are given by 8 and 6. Theoreticay speaking, it can be soved to obtain the optima frame size L. In the foowing, we show how to sove 9 anayticay and numericay. 4. The Anaytica Soution of L In this section, we show how to sove 9 by some exampes. Since 9 is a recursive function, we begin from sma max cases 4..1 Case 1: max = In this case, the tag popuation can ony be 0, 1 or. Given V j = v =v 0,v 1,v, the probabiity of different outcomes of frame j + 1 can be obtained from 6 as: PrS c =0,S 1 =0 L = = v 0; PrS c =0,S 1 =1 L = = v 1; PrS c =0,S 1 = L = = 1 v ; PrS c =1,S 1 =0 L = = 1 v. From 7 and 8, we get the distribution of j+1 as Pr j+1 =0 S c =0,S 1 = s 1,L= =1; Pr j+1 = S c =1,S 1 =0,L= =1. Thus V j+1 has ony two possibe choices as VV j,= 1, 0, 0, 0, 0, 1 and the transition probabiity is Pr 1, 0, 0 v 0,v 1,v = 1 v + v 1 + v 0 Pr 0, 0, 1 v 0,v 1,v = 1 v Substituting them into 9, we have T Ov = min + 1 0, v TO 0, 1, 10 = min + 4v where T O 0, 0, 1 = 4 is the expected reading time for a group with exacty tags, which can be obtained in Case Figure 3: The soution set for max =3case 3. Sowehave L = T Ov = 1, v < 1, v 1 1+4v, v < 1 +v, v 1 To compare, we derived the frame size and average reading time of Foerkemeier s strategy from 3 as 1, v L = 1 >v, v 1 v 1+4v, v T f v = 1 >v +v, v 1 v Therefore, when the distribution v satisfies v 1 <v < 0.5, Foerkemeier s strategy is not optima. 4.. Case : max =3 ext, we move on to max = 3 and derive the recursive function as 1v3 1 T Ov =min + + v + v3 TOu, 11 where u is the distribution of j+1 on condition that S c =1 and S 1 =0inframej +1,or v v 3 u =u 0,u 1,u,u 3= 0, 0,,. v 3 + v v 3 + v Soving 11, the optima reading strategy can be simiary obtained as: L = T O v = 1, v Φ 1, v Φ 3, v Φ 3 1+v + v 3 T v3 x v +v 3 +3v v v + v 3 T 3 x v +v v v v + v 3 T 3 x 3v +v 3 where T x is a recursive function as T xα = 8, v Φ 1, v Φ, v Φ 3 α +4, 0 <α α αtx α 9, <α<1 3 α 16 5

6 whie Φ 1, Φ and Φ 3 are distribution regions specified in Figure 3. It shows that the choice of L is determined by v and v 3 instead of E[ A]. As an exampe, suppose Group X has tag popuation distribution as 0, 0.45, 0, 0.55 and Group Y0.4, 0, 0.5, 0.1. Their expected group size are cacuated to be E[ X]=.1 ande[ Y ]=1.3, but the optima frame size for Group X is 1 whie that for Group Y is. For max > 3 cases, the optima strategies can be obtained simiary. But the computation becomes more compex. efficiency RFID systems Random Access systems 4..3 Case 3: Tag Popuation known Let T n denote the average reading time for a group with tag popuation known as n, ort n =T Ov whenv n = 1. After one frame of reading, the popuation decreases to n = n s 1,wheres 1 is the number of singeton sots. So the remaining reading time is T n s 1. Substituting T n and T n s 1into9,wehave T n = min + s 1 s 1 =0 s c=0 PrS c = s c,s 1 = s 1 T n s 1. 1 The expicit form of the system equation after rearranging is T n = 13 s 1 + PrS c = s c,s 1 = s 1 T n s 1 s 1 =1 s c=0 min. 1 PrS c = s c,s 1 =0 s c=1 Soving 13, the optima frame size is obtained as L = n. The agorithm efficiency η = isshowninfigure4. We n T n can see that η decreases with n and approaches e 1,which coincides with the efficiency upper bound of Random Access systems [10]. 4.3 The umerica Soution of L Here, we introduce a method to compute the vaues of L by running a recursive program. From the ast section, we know for a group with known popuation k, the optima frame size is L = k and the average reading time is T k. It is easy to imagine for a group with tag popuation very ikey to be k, theoptima framesizeshoudasobel = k. In other words, if the distribution of satisfying: 1. v k >v i,wherei k and 0 i max, 1 k max;. Varv <δ,whereδ is a sma enough vaue, the optima frame size is sti L = k. If it does contain k tags, obviousy, the average reading time approaches T k when δ 0, or im δ 0 T k v =T k. Butifitcontains j tags, where j k, we et im δ 0 T j v = T k j j, tag termina popuation Figure 4: The efficiency of the Optima Type FA agorithm when tag popuation is known or T k j j is the average reading time for j tags starting with the wrong information that k. Averaging a these cases, we have max max im T v = im vjt j v = δ 0 δ 0 j=0 j=0 v jt k j j, 14 where T 0 j =T j forj = k. Simiar to the derivation in Case 3, the formua for T m can be obtained as: for m<0, + T m n = m 1 k=0 n+m S 1 =0 and for m 0, L + L X S 1 =1 S c=0 PrS c,s 1 L T m n S 1 PrS c = n S 1 k,s 1 L T k n S 1 X 1 1 PrS c = s c,s 1 =0 L, 15 s c=1 L + T m n = L L S 1 S 1 =1 S c=0 PrS c,s 1 L T m n S 1 L 1 PrS c,s 1 =0 L S c=1, 16 where L = m + n and X =minl S 1, n S 1. Limited by space, we skip the mathematica detais. With the above formuas, the computer program is designed as foows 5 : 5 This program is designed for S L = 1,, 3, 4,... case. If L is imited to the powers of, the program is simper. 6

7 Figure 5: State machine uniform distributed in [1, 5] ================================== Function [T v,l v]=optimaaohav // reaize9 if varv <δ // the stopping condition T v = T v; // using 14 L v = E[]; return; end if =rounde[]; T v = ; for L t = Δ : +Δ // numericay find L temp =0; for s 1 =0:L t for s c =1:L t s 1 Cacuate Prs c,s 1 L t from 6 Cacuate b from 7 and 8; [T u,l u]=optimaaohau; temp=temp+ Prs c,s 1 L tt u; end for end for ift v >temp T v=temp; L v = L t; end if end for ================================== The input is a vector v representing the distribution. The program first checks its variance. If it is smaer than a threshod δ our experiment shows δ 0.4 is enough, the optima frame size is E[] and the average reading time is cacuated from 14; if not, it is numericay resoved. Since the variance of the input distribution decreases as the program is recursivey used, the stopping condition wi be fufied after severa oops. For impementation, these resuts can be precacuated and stored in database. There is no need to do any computation during the reading process. For exampe, when tag popuation is uniformy distributed from 1 to 5, the optima strategy is shown in Figure 5 as a state machine. 5. APPLICATIO EXAMPLES In a modern supermarket where a the merchandize are tagged, customers just need to wak their carts through a door for a items to be identified. Let denote the num- Figure 6: The frame size for different vaue of α ber of items in one customer s cart. Athough the precise vaue of is usuay unknown, a distribution of is often avaiabe from the past saes statistics. For a given distribution, most of the previous agorithms cangivetheoptimaframesizewhenthevarianceof is sma. But when the variance of is arge, the frame size is often inappropriatey chosen. Here we use a simpe exampe to show that the optima agorithm we proposed sti works efficienty for arge-variance sampes. Consider an express check-out supermarket counter where each customer is aowed to checkout no more than 0 items, or 0. To iustrate the effect of popuation variation on reading performance, we set E[] = 10 and change the variance. Var[] = 0 when a customers buy exacty 10 items each. Var[] is maximized when haf of them buy 0 items whie the other haf buy nothing. In our experiment, we choose: 1 Pr = n = n 10 + Z 10α, 0 n 0, 0, others where Z is the normaization constant and α is a variabe. Thevarianceof A increase with α whie E[] = 10 is independent of α. Specificay, when α,var approaches 0; when α =0, is uniformy distributed in [0, 0]; and when α,var is maximum. ote that this distribution is chosen for simpicity. Other distributions we tried give simiar resuts. Foowing Schoute s and Vogt s strategies L = E[], the suitabe frame size is just 10 regardess the choice of α. 6 For distribution-sensitive agorithms Foerkemeier s agorithm and the Optima Type agorithm, the choices of frame size are isted in Figure 6. The frame size of both agorithms start with 10 for sma variance cases, but diverge to 0 and 1 respectivey as the 6 We do not simuate Kodiaam s agorithm [16], because in his agorithm the reader uses severa training frames to estimate tag popuation before the rea reading process starts. As mentioned in section 3, this is not efficient for modern RFID systems. Thus its reading time woud be much onger compared other agorithms. 7

8 Figure 7: The average reading time from simuation variance increases. Figure 7 shows the average reading time of four strategies from computer simuation the average of 1 miion sampes for each point as a function of Var. We observe: The performance of Schoute s and Vogt s agorithms are barey distinguishabe. Foerkemeier s agorithm is marginay better than Schoute s when α<, or Var < 4 but poorer when above. The Optima Type agorithm is the best for a vaues of α and the performance gain increases with the variance of tag popuation; The minimum performance gain is obtained at α, orvar = 0, where the average reading time of the Optima Type agorithm is 4. sots, the same as that of Foerkemeier s agorithm. The maximum performance gain is obtained at α, where the average reading time of the Optima Type agorithm is reduced from 35.3 sots to 6.3 sots when compared to Foerkemeier s agorithm. The Optima Type agorithm is ony marginay better for sma variance cases, because it is usuay easier to find the suitabe frame size when the target group size does not change dramaticay. However, as the variance increases, traditiona agorithms fai to make suitabe choices whie the optima agorithm can sti work efficienty. Since the sampes to identify usuay have arge variance in rea appication, the improvement is considerabe. 6. SUMMARY In this paper, we proposed a new optimizing method for Framed Aoha based RFID anti-coision agorithms. It makes gobay optima decisions based on the current information. The optima parameters can be obtained by running an iterative program and adopted to different appications. Simuation resuts show that significant improvement was obtained, especiay when the variance of tag popuation is arge. 7. ACKOWLEDGMETS This work was partiay supported by the Competitive Earmarked Research Grant Project umber CUHK estabished under the University Grant Committee of the Hong Kong Specia Administrative Region, China. 8. REFERECES [1] K. Finkenzeer. RFID handbook - Second Edition. JOH WILEY & SOS, 003. [] EPCgoba. EPCgoba Cass 1 Generation UHF Air Interface Protoco Standard Version 1.0.9, [3] Internationa Organization for Standardization. Information technoogy - RFID for item management - Part 6: Parameters for air interface communications at 860 MHz to 960 MHz, 004. [4] Phiips Semiconductor. I-CODE1 Labe ICs Protoco Air Interface Datasheet, January 005. [5] J. Myung, W. Lee, J. Srivastatva, T.K. Shih. Tag-Spitting: Adaptive Coision Arbitration Protocos for RFID Tag Identification. IEEE Transactions on Parae and Disitributed Systems, Vo 18, o.6, June 007. [6] K.W. Chiang, C.Q. Hua and T.S.P. Yum. Prefix-Randomized Query-Tree Protoco for RFID Systems. IEEE ICC, 006 [7] P. Popovski, F.H.P. Fitzek, R. Prasad. Batch Confict Resoution Agorithm with Progressivey Accurate Mutipicity Estimation. ACM DIALM-POMC Oct [8] J.Park, M.Y. Chung and T.J. Lee. Identification of RFID Tags in Framed-Sotted ALOHA with Tag Estimation and Binary Spitting, Communications and Eectronics, 006 [9] J. Mosey, P.A. Humbet. A Cass of Efficient Contention Resoution Agorithms for Mutipe Access Channes. IEEE Transactions of communications, Vo. Com-33, o., Feb [10] F.C.Schoute. Dynamic Frame Length ALOHA. IEEE Transactions on Communications, COM-314: , Apr [11] H. Vogt. Efficient Object Identification with Passive RFID Tags. First Internationa Conference, PERVASIVE 00, voume 414 of Lecture otes in Computer Science LCS, pages , Zurich, Switzerand, August 00. Springer-Verag. [1] C. Foerkemeier. Transmission contro scheme for RFID object identification. Proceedings of the Pervasive Wireess etworking Workshop at IEE PERCOM 006, Pisa, Itay, 006 [13] B. Zhen, M. Kobayashi, M. Shimizu. Framed Aoha for Mutipe RFID objects Identification. IEICE Transactions of comminication. Vo.E88-B, o.3, March 005 [14] M. Buettner, D. Wethera. An Empirica Study of UHF RFID Performance. MobiCom, San Francisco, Caifornia, USA, 008 [15] C. Foerkemeier. Bayesian Transmission strategy for Framed ALOHA Based RFID Protocos. IEEE Internationa Conference on RFID, GayordTexanResort, Grapevine, TX, USA, March, 007 [16] M. Kodiaam, T. andagopa. Fast and Reiabe Estimation Schemes in RFID Systems. MobiCom, Los Angees, Caifornia, USA, Sepetember, 006 [17] J. Pear. Probabiistic Reasoning in Inteigent Systems: etworks of Pausibe Inference, Morgan Kaufmann Pubishers. [18] W. Feer. An Introduction to Probabiity Theory and Its Appications, Second edtion, Vo I, John Wiey. [19] S.M. Ross. Introduction to Probabiity Modes, Seventh Edition, Chapter 6, Academic Press. 8

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correlated Channel Failures

Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correlated Channel Failures Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correated Channe Faiures Andrey Lyakhov Vadimir Vishnevsky Institute for Information Transmission Probems of RAS B. Karetny 19, Moscow, 127994, Russia

More information

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with?

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with? Bayesian Learning A powerfu and growing approach in machine earning We use it in our own decision making a the time You hear a which which coud equay be Thanks or Tanks, which woud you go with? Combine

More information

Unconditional security of differential phase shift quantum key distribution

Unconditional security of differential phase shift quantum key distribution Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice

More information

AST 418/518 Instrumentation and Statistics

AST 418/518 Instrumentation and Statistics AST 418/518 Instrumentation and Statistics Cass Website: http://ircamera.as.arizona.edu/astr_518 Cass Texts: Practica Statistics for Astronomers, J.V. Wa, and C.R. Jenkins, Second Edition. Measuring the

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

Target Location Estimation in Wireless Sensor Networks Using Binary Data

Target Location Estimation in Wireless Sensor Networks Using Binary Data Target Location stimation in Wireess Sensor Networks Using Binary Data Ruixin Niu and Pramod K. Varshney Department of ectrica ngineering and Computer Science Link Ha Syracuse University Syracuse, NY 344

More information

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract Stochastic Compement Anaysis of Muti-Server Threshod Queues with Hysteresis John C.S. Lui The Dept. of Computer Science & Engineering The Chinese University of Hong Kong Leana Goubchik Dept. of Computer

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

A Novel Learning Method for Elman Neural Network Using Local Search

A Novel Learning Method for Elman Neural Network Using Local Search Neura Information Processing Letters and Reviews Vo. 11, No. 8, August 2007 LETTER A Nove Learning Method for Eman Neura Networ Using Loca Search Facuty of Engineering, Toyama University, Gofuu 3190 Toyama

More information

Statistical Learning Theory: A Primer

Statistical Learning Theory: A Primer Internationa Journa of Computer Vision 38(), 9 3, 2000 c 2000 uwer Academic Pubishers. Manufactured in The Netherands. Statistica Learning Theory: A Primer THEODOROS EVGENIOU, MASSIMILIANO PONTIL AND TOMASO

More information

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient

More information

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron Neura Information Processing - Letters and Reviews Vo. 5, No. 2, November 2004 LETTER A Soution to the 4-bit Parity Probem with a Singe Quaternary Neuron Tohru Nitta Nationa Institute of Advanced Industria

More information

Improved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization

Improved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization Improved Min-Sum Decoding of LDPC Codes sing -Dimensiona Normaization Juntan Zhang and Marc Fossorier Department of Eectrica Engineering niversity of Hawaii at Manoa Honouu, HI 968 Emai: juntan, marc@spectra.eng.hawaii.edu

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION

NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION Hsiao-Chang Chen Dept. of Systems Engineering University of Pennsyvania Phiadephia, PA 904-635, U.S.A. Chun-Hung Chen

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM

DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM MIKAEL NILSSON, MATTIAS DAHL AND INGVAR CLAESSON Bekinge Institute of Technoogy Department of Teecommunications and Signa Processing

More information

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay Throughput Optima Scheduing for Wireess Downinks with Reconfiguration Deay Vineeth Baa Sukumaran vineethbs@gmai.com Department of Avionics Indian Institute of Space Science and Technoogy. Abstract We consider

More information

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Brandon Maone Department of Computer Science University of Hesini February 18, 2014 Abstract This document derives, in excrutiating

More information

Age of Information: The Gamma Awakening

Age of Information: The Gamma Awakening Age of Information: The Gamma Awakening Eie Najm and Rajai Nasser LTHI, EPFL, Lausanne, Switzerand Emai: {eie.najm, rajai.nasser}@epf.ch arxiv:604.086v [cs.it] 5 Apr 06 Abstract Status update systems is

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea-Time Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process

More information

Uniformly Reweighted Belief Propagation: A Factor Graph Approach

Uniformly Reweighted Belief Propagation: A Factor Graph Approach Uniformy Reweighted Beief Propagation: A Factor Graph Approach Henk Wymeersch Chamers University of Technoogy Gothenburg, Sweden henkw@chamers.se Federico Penna Poitecnico di Torino Torino, Itay federico.penna@poito.it

More information

A simple reliability block diagram method for safety integrity verification

A simple reliability block diagram method for safety integrity verification Reiabiity Engineering and System Safety 92 (2007) 1267 1273 www.esevier.com/ocate/ress A simpe reiabiity bock diagram method for safety integrity verification Haitao Guo, Xianhui Yang epartment of Automation,

More information

8 Digifl'.11 Cth:uits and devices

8 Digifl'.11 Cth:uits and devices 8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,

More information

Tracking Control of Multiple Mobile Robots

Tracking Control of Multiple Mobile Robots Proceedings of the 2001 IEEE Internationa Conference on Robotics & Automation Seou, Korea May 21-26, 2001 Tracking Contro of Mutipe Mobie Robots A Case Study of Inter-Robot Coision-Free Probem Jurachart

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver

More information

BP neural network-based sports performance prediction model applied research

BP neural network-based sports performance prediction model applied research Avaiabe onine www.jocpr.com Journa of Chemica and Pharmaceutica Research, 204, 6(7:93-936 Research Artice ISSN : 0975-7384 CODEN(USA : JCPRC5 BP neura networ-based sports performance prediction mode appied

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

<C 2 2. λ 2 l. λ 1 l 1 < C 1

<C 2 2. λ 2 l. λ 1 l 1 < C 1 Teecommunication Network Contro and Management (EE E694) Prof. A. A. Lazar Notes for the ecture of 7/Feb/95 by Huayan Wang (this document was ast LaT E X-ed on May 9,995) Queueing Primer for Muticass Optima

More information

A proposed nonparametric mixture density estimation using B-spline functions

A proposed nonparametric mixture density estimation using B-spline functions A proposed nonparametric mixture density estimation using B-spine functions Atizez Hadrich a,b, Mourad Zribi a, Afif Masmoudi b a Laboratoire d Informatique Signa et Image de a Côte d Opae (LISIC-EA 4491),

More information

A Statistical Framework for Real-time Event Detection in Power Systems

A Statistical Framework for Real-time Event Detection in Power Systems 1 A Statistica Framework for Rea-time Event Detection in Power Systems Noan Uhrich, Tim Christman, Phiip Swisher, and Xichen Jiang Abstract A quickest change detection (QCD) agorithm is appied to the probem

More information

Determining The Degree of Generalization Using An Incremental Learning Algorithm

Determining The Degree of Generalization Using An Incremental Learning Algorithm Determining The Degree of Generaization Using An Incrementa Learning Agorithm Pabo Zegers Facutad de Ingeniería, Universidad de os Andes San Caros de Apoquindo 22, Las Condes, Santiago, Chie pzegers@uandes.c

More information

Atomic Hierarchical Routing Games in Communication Networks

Atomic Hierarchical Routing Games in Communication Networks Atomic Hierarchica Routing Games in Communication etworks Vijay Kambe, Eitan Atman, Rachid E-Azouzi Vinod Sharma Dept. of Industria Engineering Management, IIT - Kharagpur, West Benga, India Maestro group,

More information

The EM Algorithm applied to determining new limit points of Mahler measures

The EM Algorithm applied to determining new limit points of Mahler measures Contro and Cybernetics vo. 39 (2010) No. 4 The EM Agorithm appied to determining new imit points of Maher measures by Souad E Otmani, Georges Rhin and Jean-Marc Sac-Épée Université Pau Veraine-Metz, LMAM,

More information

Data Search Algorithms based on Quantum Walk

Data Search Algorithms based on Quantum Walk Data Search Agorithms based on Quantum Wak Masataka Fujisaki, Hiromi Miyajima, oritaka Shigei Abstract For searching any item in an unsorted database with items, a cassica computer takes O() steps but

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea- Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process Management,

More information

ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK

ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK Aexander Arkhipov, Michae Schne German Aerospace Center DLR) Institute of Communications and Navigation Oberpfaffenhofen, 8224 Wessing, Germany

More information

Efficient Generation of Random Bits from Finite State Markov Chains

Efficient Generation of Random Bits from Finite State Markov Chains Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

II. PROBLEM. A. Description. For the space of audio signals

II. PROBLEM. A. Description. For the space of audio signals CS229 - Fina Report Speech Recording based Language Recognition (Natura Language) Leopod Cambier - cambier; Matan Leibovich - matane; Cindy Orozco Bohorquez - orozcocc ABSTRACT We construct a rea time

More information

Gauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law

Gauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law Gauss Law 1. Review on 1) Couomb s Law (charge and force) 2) Eectric Fied (fied and force) 2. Gauss s Law: connects charge and fied 3. Appications of Gauss s Law Couomb s Law and Eectric Fied Couomb s

More information

Paper presented at the Workshop on Space Charge Physics in High Intensity Hadron Rings, sponsored by Brookhaven National Laboratory, May 4-7,1998

Paper presented at the Workshop on Space Charge Physics in High Intensity Hadron Rings, sponsored by Brookhaven National Laboratory, May 4-7,1998 Paper presented at the Workshop on Space Charge Physics in High ntensity Hadron Rings, sponsored by Brookhaven Nationa Laboratory, May 4-7,998 Noninear Sef Consistent High Resoution Beam Hao Agorithm in

More information

HYDROGEN ATOM SELECTION RULES TRANSITION RATES

HYDROGEN ATOM SELECTION RULES TRANSITION RATES DOING PHYSICS WITH MATLAB QUANTUM PHYSICS Ian Cooper Schoo of Physics, University of Sydney ian.cooper@sydney.edu.au HYDROGEN ATOM SELECTION RULES TRANSITION RATES DOWNLOAD DIRECTORY FOR MATLAB SCRIPTS

More information

SVM: Terminology 1(6) SVM: Terminology 2(6)

SVM: Terminology 1(6) SVM: Terminology 2(6) Andrew Kusiak Inteigent Systems Laboratory 39 Seamans Center he University of Iowa Iowa City, IA 54-57 SVM he maxima margin cassifier is simiar to the perceptron: It aso assumes that the data points are

More information

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische

More information

Inductive Bias: How to generalize on novel data. CS Inductive Bias 1

Inductive Bias: How to generalize on novel data. CS Inductive Bias 1 Inductive Bias: How to generaize on nove data CS 478 - Inductive Bias 1 Overfitting Noise vs. Exceptions CS 478 - Inductive Bias 2 Non-Linear Tasks Linear Regression wi not generaize we to the task beow

More information

Improving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees

Improving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees Improving the Accuracy of Booean Tomography by Expoiting Path Congestion Degrees Zhiyong Zhang, Gaoei Fei, Fucai Yu, Guangmin Hu Schoo of Communication and Information Engineering, University of Eectronic

More information

Fast Blind Recognition of Channel Codes

Fast Blind Recognition of Channel Codes Fast Bind Recognition of Channe Codes Reza Moosavi and Erik G. Larsson Linköping University Post Print N.B.: When citing this work, cite the origina artice. 213 IEEE. Persona use of this materia is permitted.

More information

A Comparison Study of the Test for Right Censored and Grouped Data

A Comparison Study of the Test for Right Censored and Grouped Data Communications for Statistica Appications and Methods 2015, Vo. 22, No. 4, 313 320 DOI: http://dx.doi.org/10.5351/csam.2015.22.4.313 Print ISSN 2287-7843 / Onine ISSN 2383-4757 A Comparison Study of the

More information

Limited magnitude error detecting codes over Z q

Limited magnitude error detecting codes over Z q Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica

More information

Copyright information to be inserted by the Publishers. Unsplitting BGK-type Schemes for the Shallow. Water Equations KUN XU

Copyright information to be inserted by the Publishers. Unsplitting BGK-type Schemes for the Shallow. Water Equations KUN XU Copyright information to be inserted by the Pubishers Unspitting BGK-type Schemes for the Shaow Water Equations KUN XU Mathematics Department, Hong Kong University of Science and Technoogy, Cear Water

More information

Paragraph Topic Classification

Paragraph Topic Classification Paragraph Topic Cassification Eugene Nho Graduate Schoo of Business Stanford University Stanford, CA 94305 enho@stanford.edu Edward Ng Department of Eectrica Engineering Stanford University Stanford, CA

More information

6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7

6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7 6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17 Soution 7 Probem 1: Generating Random Variabes Each part of this probem requires impementation in MATLAB. For the

More information

A SIMPLIFIED DESIGN OF MULTIDIMENSIONAL TRANSFER FUNCTION MODELS

A SIMPLIFIED DESIGN OF MULTIDIMENSIONAL TRANSFER FUNCTION MODELS A SIPLIFIED DESIGN OF ULTIDIENSIONAL TRANSFER FUNCTION ODELS Stefan Petrausch, Rudof Rabenstein utimedia Communications and Signa Procesg, University of Erangen-Nuremberg, Cauerstr. 7, 958 Erangen, GERANY

More information

Centralized Coded Caching of Correlated Contents

Centralized Coded Caching of Correlated Contents Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv:1711.03798v1

More information

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity

More information

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization Scaabe Spectrum ocation for Large Networks ased on Sparse Optimization innan Zhuang Modem R&D Lab Samsung Semiconductor, Inc. San Diego, C Dongning Guo, Ermin Wei, and Michae L. Honig Department of Eectrica

More information

Numerical solution of one dimensional contaminant transport equation with variable coefficient (temporal) by using Haar wavelet

Numerical solution of one dimensional contaminant transport equation with variable coefficient (temporal) by using Haar wavelet Goba Journa of Pure and Appied Mathematics. ISSN 973-1768 Voume 1, Number (16), pp. 183-19 Research India Pubications http://www.ripubication.com Numerica soution of one dimensiona contaminant transport

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

Reliability Improvement with Optimal Placement of Distributed Generation in Distribution System

Reliability Improvement with Optimal Placement of Distributed Generation in Distribution System Reiabiity Improvement with Optima Pacement of Distributed Generation in Distribution System N. Rugthaicharoencheep, T. Langtharthong Abstract This paper presents the optima pacement and sizing of distributed

More information

Do Schools Matter for High Math Achievement? Evidence from the American Mathematics Competitions Glenn Ellison and Ashley Swanson Online Appendix

Do Schools Matter for High Math Achievement? Evidence from the American Mathematics Competitions Glenn Ellison and Ashley Swanson Online Appendix VOL. NO. DO SCHOOLS MATTER FOR HIGH MATH ACHIEVEMENT? 43 Do Schoos Matter for High Math Achievement? Evidence from the American Mathematics Competitions Genn Eison and Ashey Swanson Onine Appendix Appendix

More information

Alberto Maydeu Olivares Instituto de Empresa Marketing Dept. C/Maria de Molina Madrid Spain

Alberto Maydeu Olivares Instituto de Empresa Marketing Dept. C/Maria de Molina Madrid Spain CORRECTIONS TO CLASSICAL PROCEDURES FOR ESTIMATING THURSTONE S CASE V MODEL FOR RANKING DATA Aberto Maydeu Oivares Instituto de Empresa Marketing Dept. C/Maria de Moina -5 28006 Madrid Spain Aberto.Maydeu@ie.edu

More information

Statistical Learning Theory: a Primer

Statistical Learning Theory: a Primer ??,??, 1 6 (??) c?? Kuwer Academic Pubishers, Boston. Manufactured in The Netherands. Statistica Learning Theory: a Primer THEODOROS EVGENIOU AND MASSIMILIANO PONTIL Center for Bioogica and Computationa

More information

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR 1 Maximizing Sum Rate and Minimizing MSE on Mutiuser Downink: Optimaity, Fast Agorithms and Equivaence via Max-min SIR Chee Wei Tan 1,2, Mung Chiang 2 and R. Srikant 3 1 Caifornia Institute of Technoogy,

More information

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes A Fundamenta Storage-Communication Tradeoff in Distributed Computing with Stragging odes ifa Yan, Michèe Wigger LTCI, Téécom ParisTech 75013 Paris, France Emai: {qifa.yan, michee.wigger} @teecom-paristech.fr

More information

Separation of Variables and a Spherical Shell with Surface Charge

Separation of Variables and a Spherical Shell with Surface Charge Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation

More information

Stochastic Variational Inference with Gradient Linearization

Stochastic Variational Inference with Gradient Linearization Stochastic Variationa Inference with Gradient Linearization Suppementa Materia Tobias Pötz * Anne S Wannenwetsch Stefan Roth Department of Computer Science, TU Darmstadt Preface In this suppementa materia,

More information

The influence of temperature of photovoltaic modules on performance of solar power plant

The influence of temperature of photovoltaic modules on performance of solar power plant IOSR Journa of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vo. 05, Issue 04 (Apri. 2015), V1 PP 09-15 www.iosrjen.org The infuence of temperature of photovotaic modues on performance

More information

Optimal Control of Assembly Systems with Multiple Stages and Multiple Demand Classes 1

Optimal Control of Assembly Systems with Multiple Stages and Multiple Demand Classes 1 Optima Contro of Assemby Systems with Mutipe Stages and Mutipe Demand Casses Saif Benjaafar Mohsen EHafsi 2 Chung-Yee Lee 3 Weihua Zhou 3 Industria & Systems Engineering, Department of Mechanica Engineering,

More information

Analysis method of feeder partition capacity considering power supply security and distributed generation

Analysis method of feeder partition capacity considering power supply security and distributed generation The 6th Internationa Conference on Renewabe Power Generation (RPG) 19 20 October 2017 Anaysis method of feeder capacity considering power suppy security and distributed generation Weifu Wang 1, Zhaojing

More information

An approximate method for solving the inverse scattering problem with fixed-energy data

An approximate method for solving the inverse scattering problem with fixed-energy data J. Inv. I-Posed Probems, Vo. 7, No. 6, pp. 561 571 (1999) c VSP 1999 An approximate method for soving the inverse scattering probem with fixed-energy data A. G. Ramm and W. Scheid Received May 12, 1999

More information

Data Mining Technology for Failure Prognostic of Avionics

Data Mining Technology for Failure Prognostic of Avionics IEEE Transactions on Aerospace and Eectronic Systems. Voume 38, #, pp.388-403, 00. Data Mining Technoogy for Faiure Prognostic of Avionics V.A. Skormin, Binghamton University, Binghamton, NY, 1390, USA

More information

FRST Multivariate Statistics. Multivariate Discriminant Analysis (MDA)

FRST Multivariate Statistics. Multivariate Discriminant Analysis (MDA) 1 FRST 531 -- Mutivariate Statistics Mutivariate Discriminant Anaysis (MDA) Purpose: 1. To predict which group (Y) an observation beongs to based on the characteristics of p predictor (X) variabes, using

More information

Automobile Prices in Market Equilibrium. Berry, Pakes and Levinsohn

Automobile Prices in Market Equilibrium. Berry, Pakes and Levinsohn Automobie Prices in Market Equiibrium Berry, Pakes and Levinsohn Empirica Anaysis of demand and suppy in a differentiated products market: equiibrium in the U.S. automobie market. Oigopoistic Differentiated

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao, Vivek Raghunathan, Stephen Hany, Vinod Sharma and. R. Kumar Abstract We consider a joint power contro

More information

Improving the Reliability of a Series-Parallel System Using Modified Weibull Distribution

Improving the Reliability of a Series-Parallel System Using Modified Weibull Distribution Internationa Mathematica Forum, Vo. 12, 217, no. 6, 257-269 HIKARI Ltd, www.m-hikari.com https://doi.org/1.12988/imf.217.611155 Improving the Reiabiity of a Series-Parae System Using Modified Weibu Distribution

More information

Indirect Optimal Control of Dynamical Systems

Indirect Optimal Control of Dynamical Systems Computationa Mathematics and Mathematica Physics, Vo. 44, No. 3, 24, pp. 48 439. Transated from Zhurna Vychisite noi Matematiki i Matematicheskoi Fiziki, Vo. 44, No. 3, 24, pp. 444 466. Origina Russian

More information

Distributed Optimization With Local Domains: Applications in MPC and Network Flows

Distributed Optimization With Local Domains: Applications in MPC and Network Flows Distributed Optimization With Loca Domains: Appications in MPC and Network Fows João F. C. Mota, João M. F. Xavier, Pedro M. Q. Aguiar, and Markus Püsche Abstract In this paper we consider a network with

More information

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines Recursive Constructions of Parae FIFO and LIFO Queues with Switched Deay Lines Po-Kai Huang, Cheng-Shang Chang, Feow, IEEE, Jay Cheng, Member, IEEE, and Duan-Shin Lee, Senior Member, IEEE Abstract One

More information

Section 6: Magnetostatics

Section 6: Magnetostatics agnetic fieds in matter Section 6: agnetostatics In the previous sections we assumed that the current density J is a known function of coordinates. In the presence of matter this is not aways true. The

More information

APPENDIX C FLEXING OF LENGTH BARS

APPENDIX C FLEXING OF LENGTH BARS Fexing of ength bars 83 APPENDIX C FLEXING OF LENGTH BARS C.1 FLEXING OF A LENGTH BAR DUE TO ITS OWN WEIGHT Any object ying in a horizonta pane wi sag under its own weight uness it is infinitey stiff or

More information

On the evaluation of saving-consumption plans

On the evaluation of saving-consumption plans On the evauation of saving-consumption pans Steven Vanduffe Jan Dhaene Marc Goovaerts Juy 13, 2004 Abstract Knowedge of the distribution function of the stochasticay compounded vaue of a series of future

More information

Rate Adaptation Games in Wireless LANs: Nash Equilibrium and Price of Anarchy

Rate Adaptation Games in Wireless LANs: Nash Equilibrium and Price of Anarchy Rate Adaptation Games in Wireess LANs: Nash Equiibrium and Price of Anarchy Prasanna Chaporkar, Aexandre Proutiere, and Božidar Radunović Technica Report MSR-TR-2008-137 Microsoft Research Microsoft Corporation

More information

Converting Z-number to Fuzzy Number using. Fuzzy Expected Value

Converting Z-number to Fuzzy Number using. Fuzzy Expected Value ISSN 1746-7659, Engand, UK Journa of Information and Computing Science Vo. 1, No. 4, 017, pp.91-303 Converting Z-number to Fuzzy Number using Fuzzy Expected Vaue Mahdieh Akhbari * Department of Industria

More information

Effective Appearance Model and Similarity Measure for Particle Filtering and Visual Tracking

Effective Appearance Model and Similarity Measure for Particle Filtering and Visual Tracking Effective Appearance Mode and Simiarity Measure for Partice Fitering and Visua Tracking Hanzi Wang David Suter and Konrad Schinder Institute for Vision Systems Engineering Department of Eectrica and Computer

More information

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c) A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,

More information

Emmanuel Abbe Colin Sandon

Emmanuel Abbe Colin Sandon Detection in the stochastic bock mode with mutipe custers: proof of the achievabiity conjectures, acycic BP, and the information-computation gap Emmanue Abbe Coin Sandon Abstract In a paper that initiated

More information

STA 216 Project: Spline Approach to Discrete Survival Analysis

STA 216 Project: Spline Approach to Discrete Survival Analysis : Spine Approach to Discrete Surviva Anaysis November 4, 005 1 Introduction Athough continuous surviva anaysis differs much from the discrete surviva anaysis, there is certain ink between the two modeing

More information

Evolutionary Product-Unit Neural Networks for Classification 1

Evolutionary Product-Unit Neural Networks for Classification 1 Evoutionary Product-Unit Neura Networs for Cassification F.. Martínez-Estudio, C. Hervás-Martínez, P. A. Gutiérrez Peña A. C. Martínez-Estudio and S. Ventura-Soto Department of Management and Quantitative

More information

Bayesian Unscented Kalman Filter for State Estimation of Nonlinear and Non-Gaussian Systems

Bayesian Unscented Kalman Filter for State Estimation of Nonlinear and Non-Gaussian Systems Bayesian Unscented Kaman Fiter for State Estimation of Noninear and Non-aussian Systems Zhong Liu, Shing-Chow Chan, Ho-Chun Wu and iafei Wu Department of Eectrica and Eectronic Engineering, he University

More information

arxiv: v2 [cond-mat.stat-mech] 14 Nov 2008

arxiv: v2 [cond-mat.stat-mech] 14 Nov 2008 Random Booean Networks Barbara Drosse Institute of Condensed Matter Physics, Darmstadt University of Technoogy, Hochschustraße 6, 64289 Darmstadt, Germany (Dated: June 27) arxiv:76.335v2 [cond-mat.stat-mech]

More information

PREDICTION OF DEFORMED AND ANNEALED MICROSTRUCTURES USING BAYESIAN NEURAL NETWORKS AND GAUSSIAN PROCESSES

PREDICTION OF DEFORMED AND ANNEALED MICROSTRUCTURES USING BAYESIAN NEURAL NETWORKS AND GAUSSIAN PROCESSES PREDICTION OF DEFORMED AND ANNEALED MICROSTRUCTURES USING BAYESIAN NEURAL NETWORKS AND GAUSSIAN PROCESSES C.A.L. Baier-Jones, T.J. Sabin, D.J.C. MacKay, P.J. Withers Department of Materias Science and

More information

Melodic contour estimation with B-spline models using a MDL criterion

Melodic contour estimation with B-spline models using a MDL criterion Meodic contour estimation with B-spine modes using a MDL criterion Damien Loive, Ney Barbot, Oivier Boeffard IRISA / University of Rennes 1 - ENSSAT 6 rue de Kerampont, B.P. 80518, F-305 Lannion Cedex

More information

Distributed average consensus: Beyond the realm of linearity

Distributed average consensus: Beyond the realm of linearity Distributed average consensus: Beyond the ream of inearity Usman A. Khan, Soummya Kar, and José M. F. Moura Department of Eectrica and Computer Engineering Carnegie Meon University 5 Forbes Ave, Pittsburgh,

More information

Algorithms to solve massively under-defined systems of multivariate quadratic equations

Algorithms to solve massively under-defined systems of multivariate quadratic equations Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations

More information