Optimizing Power Allocation in Interference Channels Using D.C. Programming

Size: px
Start display at page:

Download "Optimizing Power Allocation in Interference Channels Using D.C. Programming"

Transcription

1 Otimizing Power Allocation in Interference Channels Using D.C. Programming Hussein Al-Shatri, Tobias Weber To cite this version: Hussein Al-Shatri, Tobias Weber. Otimizing Power Allocation in Interference Channels Using D.C. Programming. WiOt 10: odeling Otimization in obile, Ad Hoc, Wireless Networks, ay 2010, Avignon, France , <inria > HAL Id: inria htts://hal.inria.fr/inria Submitted on 13 Jul 2010 HAL is a multi-discilinary oen access archive for the deosit dissemination of scientific research documents, whether they are ublished or not. The documents may come from teaching research institutions in France or abroad, or from ublic or rivate research centers. L archive ouverte luridiscilinaire HAL, est destinée au déôt et à la diffusion de documents scientifiques de niveau recherche, ubliés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires ublics ou rivés.

2 RAWNET 2010 Otimizing Power Allocation in Interference Channels Using D.C. Programming Hussein Al-Shatri Tobias Weber Institute of Communications Engineering University of Rostock Richard-Wagner-Str. 31, Rostock, Germany Telehone:49) , Fax:49) Abstract Power allocation is a romising aroach for otimizing the erformance of mobile radio systems in interference channels. In the resent aer, the non-convex objective function of the ower allocation roblem aiming at maximizing the sum rate with a total ower constraint is reformulated as a difference of two concave functions. A global otimum ower allocation isfoundbyalyingabranchboundbasedalgorithmto the new formulation. The algorithm basically slits the feasible region consecutively into subregions where for every subregion the objective function is uer lower bounded. For a certain artition of the feasible region, a ower allocation corresonding to the highest lower bound which is uer bounded by the highest uer bound with some insignificant difference is found as the global otimum. A convex maximization formulation of the otimization roblem with a iecewise linearly outer aroximated feasible region is essentially alied for finding an uer bound which only requires solving a linear rogram roblem. The simulation results show a significant imrovement in the sum rate of the roosed algorithm over the conventional subotimal techniques. I. INTRODUCTION Interference is a dominant source of erformance degradations in mobile radio systems. If the nodes communicate autonomously through a shared channel, i.e., there is no cooeration among nodes, the interference channel can be considered as a system level model1]. In the interference channel, it is assumed that a number of transmitter-receiver airs communicate with each other through a shared medium where any transmission from a transmitter would not just result inausefulsignalatitscorresondingreceiverbutalsoinan interference signal at all other receivers. Power allocation lays a key role in imroving the system erformance in interference channels. A smart ower allocation resulting in minimizing the received interference thus maximizing the system sum rate is required. If the interference is treated as noise, the ower allocation otimization roblem aimingatmaximizingthesumratewithatotalowerconstraint is a non-convex roblem. Consequently, sub-otimal solutions of the roblem heuristic algorithms are roosed 2]. In the resent study, we solve this non-convex roblem by rewriting the non-convex objective function of the sum rate as a difference of two concave functions. The new formulation oftheroblemcanbesolvedusingaclassoftheglobalotimization methods called difference of two convex functions rogramming or shortly D.C. rogramming3]. Because of the nice roerties of the D.C. functions, D.C. rogramming attained a great attention during the last few decades several efficient algorithms for a variety of alications are roosed3],4]. Our aroach uses a branch bound algorithm. The algorithm initially estimates an uer bound a lower bound ofthed.c.functionofthesumrateoverthewholefeasible region. Then it slits the feasible region recursively into subregions where it estimates the bounds for every subregion. Considering the highest lower bound, many subregions with loweruerboundsarenotofinterest.alsoifthisbound reaches the highest uer bound for a certain artition of the feasible region with some insignificant difference, the corresonding ower allocation is taken as the otimum. Thefruitionofthealgorithmisbasedonagoodestimation ofthebounds.byintroducinganewvariable,i.e.,addinga new dimension to the roblem, the D.C. roblem is reformulated as a convex maximization roblem over a iecewise linearly outer aroximated convex set. An uer bound of a subregion is found by comuting the greatest distance with resecttothenewaddeddimensionbetweenaointinthe convexsetcorresondingtoalocallowerboundaointin the enveloe of the convex set. Furthermore, a corner oint in a subregion which leads to the highest sum rate is considered asalowerbound. In5], the authors find a global otimum ower allocation for multiuser DSL networks. Assuming a ower constraint er user, the otimization roblem for maximizing the sum rate is decouledacrossalltonestomakeitsolvableonaertone basis.sotheyformad.c.rogramoutofadualformofa weightedsumrateforasingletonewithweightedowersof all users. These weights are udated iteratively to meet both ower rate constraints. The D.C. roblem is solved using a rismatic branch bound algorithm which is roosed in 3]. Theremainderoftheaerisorganizedasfollows.Thenext section describes the system model. Section III introduces the roblem statement the D.C. formulation. In Section IV the roosed algorithm is described. Section V resents some simulation results. The conclusions are drawn in Section VI. 367

3 Tx 1, 1 Tx K, K g 1K g K1 g 11 g KK σ 2 1 σ 2 K Rx 1 Rx K Fig. 1: An interference channel scenario containing K transmitter-receiver airs II. SYSTE ODEL A general memoryless interference channel with erfect channel knowledge at the transmitters is assumed. A scenario consisting of K transmitter-receiver airs which are couled by interfering links is considered. Let h kl be the channel coefficient of the link between the transmitter l the receiver k,where k, l = 1,..., K.Thenthecorresondingchannelgain isdenotedas g kl = h kl 2.Fig.1showsaK transmitterreceiverairsscenariowhere σk 2isthenoiseoweratreceiver k. Then g 11 g 12 g 1K g 21 g 22 g 2K G = g K1 g K2 g KK is the gain matrix where the matrix s non-diagonal elements corresondtotheinterferinglinks.let = 1,, K ) T be the vector of the transmitted owers. The main concern here is how to allocate owers to the individual transmitters under the total ower constraint k = tot, k 0 1) which directly reflects the resulting total interference. The sum rateisusedasameasureoferformancewhichiscalculated based on a simlified assumtion that the interference is treated as white Gaussian noise: g kk k C = ld 1 + σk ) g kl l III. PROBLE STATEENT Based on the assumtions stated on Section II, the otimum owerallocationvector ot isfoundbysolvingthefollowing maximization roblem: g kk k ot = argmax ld 1 + σk 2 + g kl l 3) l k l k k = tot, k 0. 4) This roblem is non-convex a closed form solution is not known. Using a quotient roerty of the logarithms which statesthat loga/b) = loga) logb)for A, B > 0,the sumratefunctioncanbewrittenasadifferenceoftwoconcave functions. Therefore, the maximization roblem of3)-4) can be reformulated as a D.C. roblem: where ot = argmax f ) g )} 5) f ) = g ) = k = tot, k 0 6) ) K ld σk 2 + g kl l, 7) l=1 ld σ k 2 + l k g kl l. 8) Both functions of7) 8) are concave functions. IV. BRANCH AND BOUND ALGORITH Inthissection,analgorithmbasedonthebranchbound technique is described. The algorithm basically finds a global otimum ower allocation by searching over a full binary tree. A. Constructing the Tree Definition 1. A K-simlex T has the K + 1 vertices v 0),, v K) with v 0) beingthevertexattheorigin thereresentation x = K k=0 λk) v k) isuniqueforall x T where k λk) = 1 0 λ k) 1for k = 0,, K. The root of the tree corresondsto an initial K 1)- dimensionalface F 1),i.e., F 1) isobtainedbysetting λ 0) = 0 in a K-simlex, which covers exactly the whole feasible regionoftheowerallocationstheverticesof F 1) are the corners of the feasible region, i.e., F 1) = tot, 0,, 0),0, tot, 0,, 0),, 0,, 0, tot )] = 1), 2),, K)]. Eachnode ihastwochildren.theyareconstructedbyslitting F i) overitslongestedge.thisrocessiscalledbranching.now,consideranode iwith F i) = 1),, K)] whichhas Kverticesthelongestedgeisinbetweenthe vertices x) y).thenthenewvertexwhichisshared by F 2i) F 2i+1) is k) = 1 2 x) + y)).thetwonew K 1)-dimensional faces are F 2i) = 1),, x), k),, K)], 10) 9) 368

4 F 1) 3 3) F 2) F 3) F 4) F 5) F 6) F 7) F 1) 2) 2 Fig. 2: The structure of the tree where every node corresonds toafacecoveringthewholeorartofthefeasibleregion. F 2i+1) = 1),, y), k),, K)]. 11) ThestructureoftheresultingtreeisshowninFig.2.For examle, in a three-user scenario, the initial 2-dimensional face is F 1) = tot, 0, 0),0, tot, 0),0, 0, tot )] = 1), 2), 3)]. Itisslitintotwofaces F 2) = F 3) = 12) 1), 3), 4)], 13) 2), 3), 4)] 14) where 4) = 1 1) + 2)). 15) 2 This rocess is illustrated in Fig. 3. B. Searching Over the Tree Aly a breath-first search through the tree. For every node i in the tree, comute an uer bound u i) of max f ) g )} a lower bound l i) of max f ) g )}withthecorresondingowerallocation LB,i.Thecomutationofanuerboundalowerbound is described in details in Sections IV-C IV-D, resectively. This rocess is usually called bounding. Then udate the global lower bound as β i) = max β i 1), l i)} where β 1) = l 1) itscorresonding owerallocationis ot,i.accordingly,therearethreecases: 1) If u i) β i) < 0theowerallocationwhichmaximizes f ) g )isnotin F i).so,thereisnoneedtoinsect the children. 2) If u i) β i) > ǫforsometolerancevalue ǫ > 0,the face F i) maycontainaowerallocationcorresonding to the globalmaximumbut a lower boundwhich is closetotheuerbound u i) withsomearbitrarysmall 1 1 1) 1) 3 a) F 1) 3) F 2) F 3) 4) b) F 2) F 3) 2) Fig. 3: An examle of slitting a 2-dimensional face. difference ǫstillhastobefound.sothetwochildren nodes 2i 2i + 1needtobeinsected. 3) If 0 u i) β i) ǫthelowerbound β i) isthe localmaximumof F i) withsomeaccetablerecision if ot,i F i) itcanbeaglobalmaximumifno other nodes with higher lower bounds are found. Finally, the algorithm terminates when no more nodes have to beinsectedwithaglobalotimumowerallocation ot,i corresondingto β I) where Ireresentstheindexofthelast checked node. C. Comuting an Uer Bound Let i) = i 1) max,i 1 }with 1) = V F 1)) reresenting a set of feasible ower allocations where max,i 1 isafeasibleowerallocationwhichisfoundwhen calculatingtheuerbound u i 1) V F i)) isthesetof verticesoftheface F i). } f i) ) = min j ) T f j ) + f j ) j i) 2 16) 369

5 asanaroximationoftheconcavefunction f )withthe following roerties: f i) )isiecewiselinearconcave. ) f )isanouteraroximation. f i) f i) ) = f ), i). From i 1) i) follows f i 1) From f i) ) f )follows: ) > f i) ). } max f ) g )} max f i) ) g ). 17) } As a result, max f i) ) g ) is an uer bound of max f ) g )}. } The maximization roblem max f i) ) g ) with the total ower constraint can be reformulated as a convex maximization roblem: t u, u ) = argmax t g )} 18) t, k = tot, k 0, 19) t f i) ) 0. 20) The two constraints in19) 20) reresent a new feasible region which is described as a olytoe } E i) =, t) : a i) t A i) b i), k = tot, 21) i.e., the region is closed has linear boundaries, where I K K f 1 ) T A i) =., 22) ) T f i) ) b i) = a i) = 0K 1 1 i) 1 0 K 1 f 1 ) 1 ) T f 1 ).. ) ) T f i) i) f i), 23) ). 24) Fig.4showsthefeasibleregion E i) ofatwouserscenario.theotimumoint, t)intheolytoe E i) which maximizes t g ) has to be at the convexenveloeof E i) where t = f i) ). Now consider the oints, t) which lead to a constant value t g ) = c i) where ϕi) ) 1), f i) 1) )) 1 u, t u ) 1) t E i) t = f i) ) 2), f i) 2) 2) )) Fig.4:Thefeasibleregion E i) oftheconvexmaximization roblem of a two-user scenario. c i) = max f i) k) ) g k))}.theseointsformakdimensionalconcavefunction ϕ i) ) = t = } c i) + g )at therangeof twith = : k = tot asshownin Fig.4.Thenthemaximumof t g )corresondstothe oint u, t u )ontheenveloeof E i) whichhasthegreatest distanceto ϕ i) )withresecttot-axis. A K-dimensionalsubsace Υ i) isuniquelydefinedbythe oints k), t k)) theoriginas 2 t h T = 0, 25) where hisak-dimensionalvectortheoints k), t k)) arefoundas t k) = c i) + g k)), 26) for k = 1,, K. For the sake of simlicity, consider thesubsace Υ i) insteadoftheconcavefunction ϕ i) ). Since ϕ i) )isconcave Υ i) intersects ϕ i) )atthe oints k), t k)), } every oint, t) in Υ i) with = : k = tot leadsto t g ) c i).fig.5showsthe intersectionbetweenthefeasibleregion E i) thesubsace Υ i) whichissannedbythevectors u v.itshowsthatthis intersectionisuerboundedby ϕ i) ).Ontheotherh, thegreatestdistance i) inthedirectionoft-axisbetween aoint, t)ontheenveloeof } E i) aoint, t)in Υ i) with = : k = tot is larger than the distance between ϕ i) )anyointontheenveloeof E i) intaxisdirection.therefore, i) +c i) isasuitableuerbound of t g ). Proosition1. Thegreatestdistance i) max between a oint, t)ontheenveloeof E i) aoint, t)in Υ i) with 370

6 } = : k = tot is found using the linear rogram } ) Λ i) max, t max = argmax t λ k) t k) 27) Λ i),t a i) t A i) P i) Λ i) b i), 28) 1 1 K P i) Λ i)) = tot, 29) where Λ i) = λ 1),, λ K)) T is a vector of weighting factors λ k) ofthevertices k) P i) beingamatrixwith columns k), k. Proof:Thegreatestdistance i) max is described as max,i, t max ) = argmax t h T } 30),t), t) E i). 31) Basedondefinition1,everyowerallocation F i) is uniquely reresentable as = λ k) k) 32) with K λ k) = 1, λ k) 0, k = 1,, K.Thensubstituting 32)to t h T gives K t h T λ k) k) = t λ k) h T k). 33) Since Υ i) ϕ i) )attheoints k), t k)),theseoints satisfy h T k) = t k) c i). 34) Substituting34) in33) gives t λ k) t k) c i)) = t λ k) t k) +c i) = i) +c i) 35) where λ k) = 1.Usingtheresultof35),theotimization k roblem of30)-31) is equivalent to the linear rogram of 27)-29). The linear rogram of27)-29) can be solved using the active-setmethodwithaninitialoint k), t k)) corresondingto c i) 6].Thentheuerboundis where u i) = c i) + i) max, 36) i) max = t max max,i, t max ) = λ k) max tk), 37) )) P i) Λ i) max, f P i) Λ i) max 38) 1), f i) 1), t 1)) 1 u, t u ) u 1) t max,i, t max ) i) max ϕ i) ) )) 2), f i) )) 2) 1) Υ i) E i) v 2), t 2)) 2) Fig.5:Thesubsace Υ i) withbasisvectors u vintersects the feasible region E i) in between the oints k), t k)) where this intersection is lower than the concave function ϕ i) )int-axisdirection. isthecornerointontheenveloeof E i) withthegreatest } distanceto Υ i) with = : k = tot in the directionoft-axis max,i = P i) Λ i) max is a ower allocation whichcanbealiedasalowerboundcidate. D. Comuting a Lower Bound Foreachnode i,alowerboundiscomutedas l i) = max f ) g )}, 39) the corresonding ower allocation is with LB,i = argmax f ) g )}, 40) 2 V F i)) }, max,i. 41) V. NUERICAL RESULTS In this section, the erformance of the roosed algorithm isdemonstratedasafunctionoftheseudosignaltonoise ratio γ SNR whichisdefinedastheratioofthetotaltransmit owertothenoiseoweratthereceiversindecibel γ SNR = 10log tot /σk 2 ), k. For the following, well known sub-otimal ower allocation schemes are used as benchmarks. The first scheme is the greedy ower allocation which serves only the user with the highest channel gain: k = tot k = k max, k 0 otherwise 42) 371

7 C/bit with k max = argmax g kk }, k. 43) k Also the equal ower allocation which serves all users with equal owers is considered: k = tot, k. 44) K The third scheme is the signal to interference ratio balancing schemesir balancing) which equalizes the signal to interference ratios at all receivers: γ k) = g kk k = γ 45) g kl l l k where γ is the resulting signal to interference ratio. As introduced in1], the waterfilling scheme neglects the interference art in2) solves the resulting convex roblem of3)-4) using the Lagrangian multilier method. The allocated ower at k-thuseris } k = max 0, w σ2 k 46) g kk where w isthewaterlevel.soitassignsowerstousers basedonthenoiseowertothechannelgainrationcr). Finally, an iterative algorithm which calculates the interference ower based on the ower allocation of the revious iteration isconsideredasroosedin2].atthe j-thiteration,the interference art in2) is constant, i.e., calculated from the ower allocation in iteration j 1. The otimization roblem of3)-4) is solvable using the Lagrangian multilier method. Theassignedowertothe k-thuserat j-thiterationis σ2 k + g kl j 1) l j) k = max 0, j) w l k 47) g kk where w j) isthewaterleveliniteration j.itisshownin 2] that excluding some users, i.e., allocates no ower to some users, alying this algorithm to the other users increases the sum rate significantly. Therefore, we imlement thisalgorithminsuchawaythatitallocatesowerstoasubset of users aiming at achieving the highest sum rate. Aart from the conventional distributed iterative waterfilling roosed in 7], this algorithm is also called iterative waterfilling in the sensethatitrefillsowerstousersonthetoofthenoiselus interference to the channel gain ratiosnicr), i.e., similar to waterfilling. Assuming equal noise owers for all users, a scenario of three transmitter-receiver airs is considered with G = ) Fig.6showsthesumrateachievedatdifferent γ SNR using different ower allocation schemes. Because the SIR balancing branch bound algorithm iterative waterfilling greedy allocation SIR balancing waterfilling equal ower γ SNR /db Fig.6:Sumrateversustheseudosignaltonoiseratio γ SNR for different ower allocation schemes. scheme serves all users the high interference to the first user caused by serving the second user, the achieved sum rateislowascomaredtotheotherschemeseseciallyat high γ SNR.oreover,alyingequalowerallocation,the achieved sum rate is low but increases monotonically with γ SNR tillitsaturatesathigh γ SNR. Waterfillingservesthefirstuserorthefirsttwousersatlow γ SNR,i.e.,thethirduserhasahigherNCRascomaredtothe waterlevel.butathigh γ SNR itservesalluserswithalmost equalowersbecausethencr sforallusersareverysmall as comared to the assigned owers. Therefore, waterfilling equalowerallocationarealignedathigh γ SNR. Greedy ower allocation achieves high sum rates by serving onlythefirstuseratlow γ SNR.Butatmoderateinterference, both iterative waterfilling the branch bound algorithm achievehighersumratesbyservingboththefirstuserthe third user. Finally, because the iterative waterfilling is a sub-otimal ower allocation scheme, it achieves lower sum rates as comared to the branch bound algorithm which outerforms the other schemes reaches the global otimum ower allocation. VI. CONCLUSION In this aer, a D.C.difference of two concave functions) formulation of the non-convex otimization roblem of ower allocation aiming at maximizing the sum rate with a total ower constraint is resented. A branch bound algorithm withagoodestimationoftheboundsis roosed.foran uer bound, both the convex maximization formulation of the roblem the iecewise linear aroximation of the 372

8 constraints relax the roblem into a linear rogram roblem. The results show that the roosed algorithm reaches the global otimum as well as it outerforms other subotimum schemes in all SNR values. ACKNOWLEDGENT This work is suorted by the German Research Foundation DFG. REFERENCES 1] T.CoverJ.Thomas,ElementsofInformationTheory,2nded. John Wiley&Sons,July ] H. Al-Shatri, N. Palleit, T. Weber, Transmitter ower allocation for otimizing sum caacity interference channels, in 14th International OFD-Worksho, Setember 2009, ] R. Horst, P. Pardalos, N. Thoai, Introduction to Global Otimization, 2nd ed., ser. Nonconvex Otimization its Alications. Kluwer Acadimic Publishers, January 2000, vol ] R. Horst V. Thoai, DC rogramming: Overview,, in Journal of Otimization Theory Alications, vol. 103, no. 1, October 1999, ] Y. Xu, T. Le-Ngoc, S. Panigrahi, Global concave minimization for otimal sectrum balancing in multi-user DSL networks, in IEEE Transactions on Signal Processing, vol. 56, no. 7, July 2008, ] P. Gill, W. urray,. Saunders,. Wright, Procedures for otimization roblems with a mixture of bounds general linear constraints, in AC Transactions on athematical Software, vol. 10, no. 3, Setember 1984, ] W. Yu, G. Ginis, J. Cioffi, Distributed multiuser ower control for digital subscriber lines, in IEEE Journal on Selected Areas in Communications, vol. 20, no. 5, June 2002,

The Arm Prime Factors Decomposition

The Arm Prime Factors Decomposition The Arm Prime Factors Decomosition Boris Arm To cite this version: Boris Arm. The Arm Prime Factors Decomosition. 2013. HAL Id: hal-00810545 htts://hal.archives-ouvertes.fr/hal-00810545 Submitted on 10

More information

A filter-based computational homogenization method for handling non-separated scales problems

A filter-based computational homogenization method for handling non-separated scales problems A filter-based comutational homogenization method for handling non-searated scales roblems Julien Yvonnet, Amen Tognevi, Guy Bonnet, Mohamed Guerich To cite this version: Julien Yvonnet, Amen Tognevi,

More information

On the performance of greedy algorithms for energy minimization

On the performance of greedy algorithms for energy minimization On the erformance of greedy algorithms for energy minimization Anne Benoit, Paul Renaud-Goud, Yves Robert To cite this version: Anne Benoit, Paul Renaud-Goud, Yves Robert On the erformance of greedy algorithms

More information

A construction of bent functions from plateaued functions

A construction of bent functions from plateaued functions A construction of bent functions from lateaued functions Ayca Cesmelioglu, Wilfried Meidl To cite this version: Ayca Cesmelioglu, Wilfried Meidl. A construction of bent functions from lateaued functions.

More information

Algebraic Parameter Estimation of Damped Exponentials

Algebraic Parameter Estimation of Damped Exponentials Algebraic Parameter Estimation of Damed Exonentials Aline Neves, Maria Miranda, Mamadou Mbou To cite this version: Aline Neves, Maria Miranda, Mamadou Mbou Algebraic Parameter Estimation of Damed Exonentials

More information

A numerical approach of Friedrichs systems under constraints in bounded domains

A numerical approach of Friedrichs systems under constraints in bounded domains A numerical aroach of Friedrichs systems under constraints in bounded domains Clément Mifsud, Bruno Desrés To cite this version: Clément Mifsud, Bruno Desrés. A numerical aroach of Friedrichs systems under

More information

The sum of digits function in finite fields

The sum of digits function in finite fields The sum of digits function in finite fields Cécile Dartyge, András Sárközy To cite this version: Cécile Dartyge, András Sárközy. The sum of digits function in finite fields. Proceedings of the American

More information

Understanding Big Data Spectral Clustering

Understanding Big Data Spectral Clustering Understanding Big Data Sectral Clustering Romain Couillet, Florent Benaych-Georges To cite this version: Romain Couillet, Florent Benaych-Georges. Understanding Big Data Sectral Clustering. IEEE 6th International

More information

AN OPTIMAL CONTROL CHART FOR NON-NORMAL PROCESSES

AN OPTIMAL CONTROL CHART FOR NON-NORMAL PROCESSES AN OPTIMAL CONTROL CHART FOR NON-NORMAL PROCESSES Emmanuel Duclos, Maurice Pillet To cite this version: Emmanuel Duclos, Maurice Pillet. AN OPTIMAL CONTROL CHART FOR NON-NORMAL PRO- CESSES. st IFAC Worsho

More information

Training sequence optimization for frequency selective channels with MAP equalization

Training sequence optimization for frequency selective channels with MAP equalization 532 ISCCSP 2008, Malta, 12-14 March 2008 raining sequence otimization for frequency selective channels with MAP equalization Imed Hadj Kacem, Noura Sellami Laboratoire LEI ENIS, Route Sokra km 35 BP 3038

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

A new simple recursive algorithm for finding prime numbers using Rosser s theorem

A new simple recursive algorithm for finding prime numbers using Rosser s theorem A new simple recursive algorithm for finding prime numbers using Rosser s theorem Rédoane Daoudi To cite this version: Rédoane Daoudi. A new simple recursive algorithm for finding prime numbers using Rosser

More information

Decentralized Interference Channels with Noisy Feedback Possess Pareto Optimal Nash Equilibria

Decentralized Interference Channels with Noisy Feedback Possess Pareto Optimal Nash Equilibria Decentralized Interference Channels with Noisy Feedback Possess Pareto Optimal Nash Equilibria Samir M. Perlaza Ravi Tandon H. Vincent Poor To cite this version: Samir M. Perlaza Ravi Tandon H. Vincent

More information

Smart Bolometer: Toward Monolithic Bolometer with Smart Functions

Smart Bolometer: Toward Monolithic Bolometer with Smart Functions Smart Bolometer: Toward Monolithic Bolometer with Smart Functions Matthieu Denoual, Gilles Allègre, Patrick Attia, Olivier De Sagazan To cite this version: Matthieu Denoual, Gilles Allègre, Patrick Attia,

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

Methylation-associated PHOX2B gene silencing is a rare event in human neuroblastoma.

Methylation-associated PHOX2B gene silencing is a rare event in human neuroblastoma. Methylation-associated PHOX2B gene silencing is a rare event in human neuroblastoma. Loïc De Pontual, Delphine Trochet, Franck Bourdeaut, Sophie Thomas, Heather Etchevers, Agnes Chompret, Véronique Minard,

More information

Modelling and control of urban bus networks in dioids algebra

Modelling and control of urban bus networks in dioids algebra Modelling and control of urban bus networks in dioids algebra Laurent Houssin, Sébastien Lahaye, Jean-Louis Boimond To cite this version: Laurent Houssin, Sébastien Lahaye, Jean-Louis Boimond. Modelling

More information

Bonding a linearly piezoelectric patch on a linearly elastic body

Bonding a linearly piezoelectric patch on a linearly elastic body onding a linearly iezoelectric atch on a linearly elastic body Christian Licht, omsak Orankitjaroen, Patcharakorn Viriyasrisuwattana, Thibaut Weller To cite this version: Christian Licht, omsak Orankitjaroen,

More information

An efficient method for generalized linear multiplicative programming problem with multiplicative constraints

An efficient method for generalized linear multiplicative programming problem with multiplicative constraints DOI 0.86/s40064-06-2984-9 RESEARCH An efficient method for generalized linear multilicative rogramming roblem with multilicative constraints Yingfeng Zhao,2* and Sanyang Liu Oen Access *Corresondence:

More information

Decoding Linear Block Codes Using a Priority-First Search: Performance Analysis and Suboptimal Version

Decoding Linear Block Codes Using a Priority-First Search: Performance Analysis and Suboptimal Version IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 3, MAY 1998 133 Decoding Linear Block Codes Using a Priority-First Search Performance Analysis Subotimal Version Yunghsiang S. Han, Member, IEEE, Carlos

More information

Numerical Methods for Particle Tracing in Vector Fields

Numerical Methods for Particle Tracing in Vector Fields On-Line Visualization Notes Numerical Methods for Particle Tracing in Vector Fields Kenneth I. Joy Visualization and Grahics Research Laboratory Deartment of Comuter Science University of California, Davis

More information

COMPARISON OF VARIOUS OPTIMIZATION TECHNIQUES FOR DESIGN FIR DIGITAL FILTERS

COMPARISON OF VARIOUS OPTIMIZATION TECHNIQUES FOR DESIGN FIR DIGITAL FILTERS NCCI 1 -National Conference on Comutational Instrumentation CSIO Chandigarh, INDIA, 19- March 1 COMPARISON OF VARIOUS OPIMIZAION ECHNIQUES FOR DESIGN FIR DIGIAL FILERS Amanjeet Panghal 1, Nitin Mittal,Devender

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

On Newton-Raphson iteration for multiplicative inverses modulo prime powers

On Newton-Raphson iteration for multiplicative inverses modulo prime powers On Newton-Raphson iteration for multiplicative inverses modulo prime powers Jean-Guillaume Dumas To cite this version: Jean-Guillaume Dumas. On Newton-Raphson iteration for multiplicative inverses modulo

More information

On the longest path in a recursively partitionable graph

On the longest path in a recursively partitionable graph On the longest path in a recursively partitionable graph Julien Bensmail To cite this version: Julien Bensmail. On the longest path in a recursively partitionable graph. 2012. HAL Id:

More information

Passerelle entre les arts : la sculpture sonore

Passerelle entre les arts : la sculpture sonore Passerelle entre les arts : la sculpture sonore Anaïs Rolez To cite this version: Anaïs Rolez. Passerelle entre les arts : la sculpture sonore. Article destiné à l origine à la Revue de l Institut National

More information

On the Capacity of Full-Duplex Causal Cognitive Interference Channels to within a Constant Gap

On the Capacity of Full-Duplex Causal Cognitive Interference Channels to within a Constant Gap On the Caacity of Full-Dulex Causal Cognitive Interference Channels to within a Constant Ga Martina Cardone, Daniela Tuninetti, Raymond Kno, Umer Salim To cite this version: Martina Cardone, Daniela Tuninetti,

More information

Decentralized Simultaneous Energy and Information Transmission in Multiple Access Channels

Decentralized Simultaneous Energy and Information Transmission in Multiple Access Channels Decentralized Simultaneous Energy and Information Transmission in Multiple Access Channels Selma Belhadj Amor, Samir M. Perlaza To cite this version: Selma Belhadj Amor, Samir M. Perlaza. Decentralized

More information

Full-order observers for linear systems with unknown inputs

Full-order observers for linear systems with unknown inputs Full-order observers for linear systems with unknown inputs Mohamed Darouach, Michel Zasadzinski, Shi Jie Xu To cite this version: Mohamed Darouach, Michel Zasadzinski, Shi Jie Xu. Full-order observers

More information

Evolution of the cooperation and consequences of a decrease in plant diversity on the root symbiont diversity

Evolution of the cooperation and consequences of a decrease in plant diversity on the root symbiont diversity Evolution of the cooperation and consequences of a decrease in plant diversity on the root symbiont diversity Marie Duhamel To cite this version: Marie Duhamel. Evolution of the cooperation and consequences

More information

From Unstructured 3D Point Clouds to Structured Knowledge - A Semantics Approach

From Unstructured 3D Point Clouds to Structured Knowledge - A Semantics Approach From Unstructured 3D Point Clouds to Structured Knowledge - A Semantics Approach Christophe Cruz, Helmi Ben Hmida, Frank Boochs, Christophe Nicolle To cite this version: Christophe Cruz, Helmi Ben Hmida,

More information

Decentralized K-User Gaussian Multiple Access Channels

Decentralized K-User Gaussian Multiple Access Channels Decentralized K-User Gaussian Multiple Access Channels Selma Belhadj Amor, Samir Perlaza To cite this version: Selma Belhadj Amor, Samir Perlaza. Decentralized K-User Gaussian Multiple Access Channels.

More information

Analysis of Boyer and Moore s MJRTY algorithm

Analysis of Boyer and Moore s MJRTY algorithm Analysis of Boyer and Moore s MJRTY algorithm Laurent Alonso, Edward M. Reingold To cite this version: Laurent Alonso, Edward M. Reingold. Analysis of Boyer and Moore s MJRTY algorithm. Information Processing

More information

On the diversity of the Naive Lattice Decoder

On the diversity of the Naive Lattice Decoder On the diversity of the Naive Lattice Decoder Asma Mejri, Laura Luzzi, Ghaya Rekaya-Ben Othman To cite this version: Asma Mejri, Laura Luzzi, Ghaya Rekaya-Ben Othman. On the diversity of the Naive Lattice

More information

L institution sportive : rêve et illusion

L institution sportive : rêve et illusion L institution sportive : rêve et illusion Hafsi Bedhioufi, Sida Ayachi, Imen Ben Amar To cite this version: Hafsi Bedhioufi, Sida Ayachi, Imen Ben Amar. L institution sportive : rêve et illusion. Revue

More information

A Note on Guaranteed Sparse Recovery via l 1 -Minimization

A Note on Guaranteed Sparse Recovery via l 1 -Minimization A Note on Guaranteed Sarse Recovery via l -Minimization Simon Foucart, Université Pierre et Marie Curie Abstract It is roved that every s-sarse vector x C N can be recovered from the measurement vector

More information

Easter bracelets for years

Easter bracelets for years Easter bracelets for 5700000 years Denis Roegel To cite this version: Denis Roegel. Easter bracelets for 5700000 years. [Research Report] 2014. HAL Id: hal-01009457 https://hal.inria.fr/hal-01009457

More information

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE)

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE) KAUST Reository Outage erformance of cognitive radio systems with Imroer Gaussian signaling Item tye Authors Erint version DOI Publisher Journal Rights Conference Paer Amin Osama; Abediseid Walid; Alouini

More information

On Code Design for Simultaneous Energy and Information Transfer

On Code Design for Simultaneous Energy and Information Transfer On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter

More information

Case report on the article Water nanoelectrolysis: A simple model, Journal of Applied Physics (2017) 122,

Case report on the article Water nanoelectrolysis: A simple model, Journal of Applied Physics (2017) 122, Case report on the article Water nanoelectrolysis: A simple model, Journal of Applied Physics (2017) 122, 244902 Juan Olives, Zoubida Hammadi, Roger Morin, Laurent Lapena To cite this version: Juan Olives,

More information

On size, radius and minimum degree

On size, radius and minimum degree On size, radius and minimum degree Simon Mukwembi To cite this version: Simon Mukwembi. On size, radius and minimum degree. Discrete Mathematics and Theoretical Computer Science, DMTCS, 2014, Vol. 16 no.

More information

Multiple sensor fault detection in heat exchanger system

Multiple sensor fault detection in heat exchanger system Multiple sensor fault detection in heat exchanger system Abdel Aïtouche, Didier Maquin, Frédéric Busson To cite this version: Abdel Aïtouche, Didier Maquin, Frédéric Busson. Multiple sensor fault detection

More information

Vibro-acoustic simulation of a car window

Vibro-acoustic simulation of a car window Vibro-acoustic simulation of a car window Christophe Barras To cite this version: Christophe Barras. Vibro-acoustic simulation of a car window. Société Française d Acoustique. Acoustics 12, Apr 12, Nantes,

More information

Exact Comparison of Quadratic Irrationals

Exact Comparison of Quadratic Irrationals Exact Comparison of Quadratic Irrationals Phuc Ngo To cite this version: Phuc Ngo. Exact Comparison of Quadratic Irrationals. [Research Report] LIGM. 20. HAL Id: hal-0069762 https://hal.archives-ouvertes.fr/hal-0069762

More information

Completeness of the Tree System for Propositional Classical Logic

Completeness of the Tree System for Propositional Classical Logic Completeness of the Tree System for Propositional Classical Logic Shahid Rahman To cite this version: Shahid Rahman. Completeness of the Tree System for Propositional Classical Logic. Licence. France.

More information

Minimax Design of Nonnegative Finite Impulse Response Filters

Minimax Design of Nonnegative Finite Impulse Response Filters Minimax Design of Nonnegative Finite Imulse Resonse Filters Xiaoing Lai, Anke Xue Institute of Information and Control Hangzhou Dianzi University Hangzhou, 3118 China e-mail: laix@hdu.edu.cn; akxue@hdu.edu.cn

More information

Learning an Adaptive Dictionary Structure for Efficient Image Sparse Coding

Learning an Adaptive Dictionary Structure for Efficient Image Sparse Coding Learning an Adaptive Dictionary Structure for Efficient Image Sparse Coding Jérémy Aghaei Mazaheri, Christine Guillemot, Claude Labit To cite this version: Jérémy Aghaei Mazaheri, Christine Guillemot,

More information

AKRON: An Algorithm for Approximating Sparse Kernel Reconstruction

AKRON: An Algorithm for Approximating Sparse Kernel Reconstruction : An Algorithm for Aroximating Sarse Kernel Reconstruction Gregory Ditzler Det. of Electrical and Comuter Engineering The University of Arizona Tucson, AZ 8572 USA ditzler@email.arizona.edu Nidhal Carla

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

Can we reduce health inequalities? An analysis of the English strategy ( )

Can we reduce health inequalities? An analysis of the English strategy ( ) Can we reduce health inequalities? An analysis of the English strategy (1997-2010) Johan P Mackenbach To cite this version: Johan P Mackenbach. Can we reduce health inequalities? An analysis of the English

More information

Optimum Power Allocation in Parallel Interference Channels

Optimum Power Allocation in Parallel Interference Channels Nachrichtetechi Otimm Power Allocatio i Parallel Iterferece Chaels M.Sc. Hssei Al-Shatri hssei.al-shatri@i-rostoc.de 17.03.011 UNIVERSITÄT ROSTOCK AKULTÄT INORMATIK UND ELEKTROTECHNIK Nachrichtetechi Motivatio

More information

Soundness of the System of Semantic Trees for Classical Logic based on Fitting and Smullyan

Soundness of the System of Semantic Trees for Classical Logic based on Fitting and Smullyan Soundness of the System of Semantic Trees for Classical Logic based on Fitting and Smullyan Shahid Rahman To cite this version: Shahid Rahman. Soundness of the System of Semantic Trees for Classical Logic

More information

Sensitivity of hybrid filter banks A/D converters to analog realization errors and finite word length

Sensitivity of hybrid filter banks A/D converters to analog realization errors and finite word length Sensitivity of hybrid filter banks A/D converters to analog realization errors and finite word length Tudor Petrescu, Jacques Oksman To cite this version: Tudor Petrescu, Jacques Oksman. Sensitivity of

More information

Convolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code.

Convolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code. Convolutional Codes Goals Lecture Be able to encode using a convolutional code Be able to decode a convolutional code received over a binary symmetric channel or an additive white Gaussian channel Convolutional

More information

Maxisets for μ-thresholding rules

Maxisets for μ-thresholding rules Test 008 7: 33 349 DOI 0.007/s749-006-0035-5 ORIGINAL PAPER Maxisets for μ-thresholding rules Florent Autin Received: 3 January 005 / Acceted: 8 June 006 / Published online: March 007 Sociedad de Estadística

More information

Logistics Optimization Using Hybrid Metaheuristic Approach under Very Realistic Conditions

Logistics Optimization Using Hybrid Metaheuristic Approach under Very Realistic Conditions 17 th Euroean Symosium on Comuter Aided Process Engineering ESCAPE17 V. Plesu and P.S. Agachi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Logistics Otimization Using Hybrid Metaheuristic Aroach

More information

On Solving Aircraft Conflict Avoidance Using Deterministic Global Optimization (sbb) Codes

On Solving Aircraft Conflict Avoidance Using Deterministic Global Optimization (sbb) Codes On Solving Aircraft Conflict Avoidance Using Deterministic Global Optimization (sbb) Codes Sonia Cafieri, Frédéric Messine, Ahmed Touhami To cite this version: Sonia Cafieri, Frédéric Messine, Ahmed Touhami.

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

Solving an integrated Job-Shop problem with human resource constraints

Solving an integrated Job-Shop problem with human resource constraints Solving an integrated Job-Shop problem with human resource constraints Olivier Guyon, Pierre Lemaire, Eric Pinson, David Rivreau To cite this version: Olivier Guyon, Pierre Lemaire, Eric Pinson, David

More information

b-chromatic number of cacti

b-chromatic number of cacti b-chromatic number of cacti Victor Campos, Claudia Linhares Sales, Frédéric Maffray, Ana Silva To cite this version: Victor Campos, Claudia Linhares Sales, Frédéric Maffray, Ana Silva. b-chromatic number

More information

Thomas Lugand. To cite this version: HAL Id: tel

Thomas Lugand. To cite this version: HAL Id: tel Contribution à la Modélisation et à l Optimisation de la Machine Asynchrone Double Alimentation pour des Applications Hydrauliques de Pompage Turbinage Thomas Lugand To cite this version: Thomas Lugand.

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

The Windy Postman Problem on Series-Parallel Graphs

The Windy Postman Problem on Series-Parallel Graphs The Windy Postman Problem on Series-Parallel Graphs Francisco Javier Zaragoza Martínez To cite this version: Francisco Javier Zaragoza Martínez. The Windy Postman Problem on Series-Parallel Graphs. Stefan

More information

The sound power output of a monopole source in a cylindrical pipe containing area discontinuities

The sound power output of a monopole source in a cylindrical pipe containing area discontinuities The sound power output of a monopole source in a cylindrical pipe containing area discontinuities Wenbo Duan, Ray Kirby To cite this version: Wenbo Duan, Ray Kirby. The sound power output of a monopole

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

Recursive Estimation of the Preisach Density function for a Smart Actuator

Recursive Estimation of the Preisach Density function for a Smart Actuator Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator

More information

A Network-Flow Based Cell Sizing Algorithm

A Network-Flow Based Cell Sizing Algorithm A Networ-Flow Based Cell Sizing Algorithm Huan Ren and Shantanu Dutt Det. of ECE, University of Illinois-Chicago Abstract We roose a networ flow based algorithm for the area-constrained timing-driven discrete

More information

Impedance Transmission Conditions for the Electric Potential across a Highly Conductive Casing

Impedance Transmission Conditions for the Electric Potential across a Highly Conductive Casing Impedance Transmission Conditions for the Electric Potential across a Highly Conductive Casing Hélène Barucq, Aralar Erdozain, David Pardo, Victor Péron To cite this version: Hélène Barucq, Aralar Erdozain,

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

Dispersion relation results for VCS at JLab

Dispersion relation results for VCS at JLab Dispersion relation results for VCS at JLab G. Laveissiere To cite this version: G. Laveissiere. Dispersion relation results for VCS at JLab. Compton Scattering from Low to High Momentum Transfer, Mar

More information

A Novel Aggregation Method based on Graph Matching for Algebraic MultiGrid Preconditioning of Sparse Linear Systems

A Novel Aggregation Method based on Graph Matching for Algebraic MultiGrid Preconditioning of Sparse Linear Systems A Novel Aggregation Method based on Graph Matching for Algebraic MultiGrid Preconditioning of Sparse Linear Systems Pasqua D Ambra, Alfredo Buttari, Daniela Di Serafino, Salvatore Filippone, Simone Gentile,

More information

A Public-Key Cryptosystem Based on Lucas Sequences

A Public-Key Cryptosystem Based on Lucas Sequences Palestine Journal of Mathematics Vol. 1(2) (2012), 148 152 Palestine Polytechnic University-PPU 2012 A Public-Key Crytosystem Based on Lucas Sequences Lhoussain El Fadil Communicated by Ayman Badawi MSC2010

More information

Efficient Approximations for Call Admission Control Performance Evaluations in Multi-Service Networks

Efficient Approximations for Call Admission Control Performance Evaluations in Multi-Service Networks Efficient Aroximations for Call Admission Control Performance Evaluations in Multi-Service Networks Emre A. Yavuz, and Victor C. M. Leung Deartment of Electrical and Comuter Engineering The University

More information

An Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem

An Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem An Ant Colony Otimization Aroach to the Probabilistic Traveling Salesman Problem Leonora Bianchi 1, Luca Maria Gambardella 1, and Marco Dorigo 2 1 IDSIA, Strada Cantonale Galleria 2, CH-6928 Manno, Switzerland

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

Optimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI

Optimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI Otimal Power Control over Fading Cognitive Radio Channels by Exloiting Primary User CSI Rui Zhang Abstract arxiv:0804.67v2 [cs.it] 7 Feb 2009 This aer is concerned with sectrum sharing cognitive radio

More information

Unbiased minimum variance estimation for systems with unknown exogenous inputs

Unbiased minimum variance estimation for systems with unknown exogenous inputs Unbiased minimum variance estimation for systems with unknown exogenous inputs Mohamed Darouach, Michel Zasadzinski To cite this version: Mohamed Darouach, Michel Zasadzinski. Unbiased minimum variance

More information

Round-off Errors and Computer Arithmetic - (1.2)

Round-off Errors and Computer Arithmetic - (1.2) Round-off Errors and Comuter Arithmetic - (.). Round-off Errors: Round-off errors is roduced when a calculator or comuter is used to erform real number calculations. That is because the arithmetic erformed

More information

The Noise Power Ratio - Theory and ADC Testing

The Noise Power Ratio - Theory and ADC Testing The Noise Power Ratio - Theory and ADC Testing FH Irons, KJ Riley, and DM Hummels Abstract This aer develos theory behind the noise ower ratio (NPR) testing of ADCs. A mid-riser formulation is used for

More information

Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems

Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Hsiao-Lan Chiang, Tobias Kadur, and Gerhard Fettweis Vodafone Chair for Mobile Communications Technische Universität

More information

Influence of a Rough Thin Layer on the Potential

Influence of a Rough Thin Layer on the Potential Influence of a Rough Thin Layer on the Potential Ionel Ciuperca, Ronan Perrussel, Clair Poignard To cite this version: Ionel Ciuperca, Ronan Perrussel, Clair Poignard. Influence of a Rough Thin Layer on

More information

Electromagnetic characterization of magnetic steel alloys with respect to the temperature

Electromagnetic characterization of magnetic steel alloys with respect to the temperature Electromagnetic characterization of magnetic steel alloys with respect to the temperature B Paya, P Teixeira To cite this version: B Paya, P Teixeira. Electromagnetic characterization of magnetic steel

More information

A Simple Proof of P versus NP

A Simple Proof of P versus NP A Simple Proof of P versus NP Frank Vega To cite this version: Frank Vega. A Simple Proof of P versus NP. 2016. HAL Id: hal-01281254 https://hal.archives-ouvertes.fr/hal-01281254 Submitted

More information

Optimal array pattern synthesis with desired magnitude response

Optimal array pattern synthesis with desired magnitude response Otimal array attern synthesis with desired magnitude resonse A.M. Pasqual a, J.R. Arruda a and P. erzog b a Universidade Estadual de Caminas, Rua Mendeleiev, 00, Cidade Universitária Zeferino Vaz, 13083-970

More information

WIRELESS energy transfer (WET), where receivers harvest

WIRELESS energy transfer (WET), where receivers harvest 6898 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 10, OCTOBER 2016 User-Centric Energy Efficiency Maximization for Wireless Powered Communications Qingqing Wu, Student Member, IEEE, Wen Chen,

More information

When does vectored Multiple Access Channels (MAC) optimal power allocation converge to an FDMA solution?

When does vectored Multiple Access Channels (MAC) optimal power allocation converge to an FDMA solution? When does vectored Multiple Access Channels MAC optimal power allocation converge to an FDMA solution? Vincent Le Nir, Marc Moonen, Jan Verlinden, Mamoun Guenach Abstract Vectored Multiple Access Channels

More information

On the Chvatál-Complexity of Knapsack Problems

On the Chvatál-Complexity of Knapsack Problems R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew

More information

THE BAYESIAN ABEL BOUND ON THE MEAN SQUARE ERROR

THE BAYESIAN ABEL BOUND ON THE MEAN SQUARE ERROR THE BAYESIAN ABEL BOUND ON THE MEAN SQUARE ERROR Alexandre Renaux, Philippe Forster, Pascal Larzabal, Christ Richmond To cite this version: Alexandre Renaux, Philippe Forster, Pascal Larzabal, Christ Richmond

More information

A Study of the Regular Pentagon with a Classic Geometric Approach

A Study of the Regular Pentagon with a Classic Geometric Approach A Study of the Regular Pentagon with a Classic Geometric Approach Amelia Carolina Sparavigna, Mauro Maria Baldi To cite this version: Amelia Carolina Sparavigna, Mauro Maria Baldi. A Study of the Regular

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

q-ary Symmetric Channel for Large q

q-ary Symmetric Channel for Large q List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu

More information

HetNets: what tools for analysis?

HetNets: what tools for analysis? HetNets: what tools for analysis? Daniela Tuninetti (Ph.D.) Email: danielat@uic.edu Motivation Seven Ways that HetNets are a Cellular Paradigm Shift, by J. Andrews, IEEE Communications Magazine, March

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

A remark on a theorem of A. E. Ingham.

A remark on a theorem of A. E. Ingham. A remark on a theorem of A. E. Ingham. K G Bhat, K Ramachandra To cite this version: K G Bhat, K Ramachandra. A remark on a theorem of A. E. Ingham.. Hardy-Ramanujan Journal, Hardy-Ramanujan Society, 2006,

More information

Towards an active anechoic room

Towards an active anechoic room Towards an active anechoic room Dominique Habault, Philippe Herzog, Emmanuel Friot, Cédric Pinhède To cite this version: Dominique Habault, Philippe Herzog, Emmanuel Friot, Cédric Pinhède. Towards an active

More information

A Model for Randomly Correlated Deposition

A Model for Randomly Correlated Deposition A Model for Randomly Correlated Deosition B. Karadjov and A. Proykova Faculty of Physics, University of Sofia, 5 J. Bourchier Blvd. Sofia-116, Bulgaria ana@hys.uni-sofia.bg Abstract: A simle, discrete,

More information

Exogenous input estimation in Electronic Power Steering (EPS) systems

Exogenous input estimation in Electronic Power Steering (EPS) systems Exogenous input estimation in Electronic Power Steering (EPS) systems Valentina Ciarla, Carlos Canudas de Wit, Franck Quaine, Violaine Cahouet To cite this version: Valentina Ciarla, Carlos Canudas de

More information

Modeling Pointing Tasks in Mouse-Based Human-Computer Interactions

Modeling Pointing Tasks in Mouse-Based Human-Computer Interactions Modeling Pointing Tasks in Mouse-Based Human-Comuter Interactions Stanislav Aranovskiy, Rosane Ushirobira, Denis Efimov, Géry Casiez To cite this version: Stanislav Aranovskiy, Rosane Ushirobira, Denis

More information