Distributed K-means over Compressed Binary Data
|
|
- Benjamin Shepherd
- 5 years ago
- Views:
Transcription
1 1 Distributed K-means over Comressed Binary Data Elsa DUPRAZ Telecom Bretagne; UMR CNRS 6285 Lab-STICC, Brest, France arxiv: v1 [cs.it] 12 Jan 2017 Abstract We consider a networ of binary-valued sensors with a fusion center. The fusion center has to erform K-means clustering on the binary data transmitted by the sensors. In order to reduce the amount of data transmitted within the networ, the sensors comress their data with a source coding scheme based on LDPC codes. We roose to aly the K-means algorithm directly over the comressed data without reconstructing the original sensors measurements, in order to avoid otentially comlex decoding oerations. We rovide aroximated exressions of the error robabilities of the K-means stes in the comressed domain. From these exressions, we show that alying the K- means algorithm in the comressed domain enables to recover the clusters of the original domain. Monte Carlo simulations illustrate the accuracy of the obtained aroximated error robabilities, and show that the coding rate needed to erform K-means clustering in the comressed domain is lower than the rate needed to reconstruct all the measurements. I. INTRODUCTION Networs of sensors have long been emloyed in various domains such as environmental monitoring, electrical energy management, and medicine [1]. In articular, inexensive binary-valued sensors are successfully used in a wide range of alications, such as traffic control in telecommunication systems [2], self-testing in nanonelectric devices [3], or activity recognition on home environments [4]. In this aer, we consider a networ of J binary-valued sensors that transmit their data to a fusion center. In such networ, the sensors otentially collect a large amount of data. The fusion center may realize comlex data analysis tass by aggregating the sensors measurements and by exloiting the diversity of the collected data. Clustering is a articular data analysis tas that consists of searating the data in a given number of classes with similar characteristics. One of the most oular clustering methods is the K-means algorithm [5] due to its simlicity and its efficiency. The K- means algorithm grous the J measurement vectors into K clusters so as to minimize the average distance between vectors in a cluster and the cluster center. If the measurements are realvalued, K-means usually considers the Euclidian distance [5], while in case of binary measurements, K-means relies on the Hamming distance [6]. In our context, the J sensors should send their measurements to the fusion center in a comressed form in order to greatly reduce the amount of data transmitted within the networ. Low Density Parity Chec (LDPC) codes, initially introduced in the context of channel coding [7], have been shown to be very efficient for distributed comression in a networ of sensors [8]. However, the standard distributed comression framewor [8] considers that the fusion center has to reconstruct all the measurements from all the sensors. Here, in order to avoid otentially comlex decoding oerations, we would lie to erform K-means directly over the comressed data. Distributed K-means over comressed data raises three questions: (i) How should the data be comressed so that the fusion center can erform K-means without having to reconstruct all the measurements? (ii) How good is clustering over comressed data comared to clustering over the original data? (iii) Is the rate needed to erform K-means lower than the rate needed to reconstruct all the data? Regarding the first two questions, [9], [10] considered realvalued measurement vectors comressed from Comressed Sensing (CS) techniques, and roosed to aly the K-means algorithm directly in the comressed domain. CS consists of comuting M random linear combinations of the N comonents of the measurement vectors, with M N. The results of [9] show that if M is large enough, the comression reserves the Euclidian distances with high robability, which enables to erform K-means in the comressed domain. Other than K-means, detection and arameter estimation can be alied over comressed real-valued data [11] [13], but also over binary data comressed with LDPC codes [14], [15]. However, none of these wors consider the K-means algorithm over comressed binary data. Regarding the third question, information theory has recently addressed data analysis tass such as distributed hyothesis testing [16], [17] or similarity queries [18], [19] over comressed data. These wors rovide analytic exressions of the minimum rates that need to be transmitted in order to erform the considered tass, although these general analytic exressions can be difficult to evaluate for articular source models. However, to the best of our nowledge, the K-means algorithm has not been studied yet with information theory. In this aer, we consider binary measurement vectors and we assume that the comression is realized from LDPC codes. We want to determine whether the K-means algorithm can be alied directly over the comressed data in order to recover the clusters of the original data. In the following, after describing the source coding system (Section II), we roose a formulation of the K-means algorithm over binary data in the comressed domain (Section III). We then carry a theoretical analysis of the erformance of the K-means algorithm in the comressed domain (Section IV). We in articular derive aroximated error robabilities of each of the two stes of the K-means algorithm. The theoretical analysis shows that alying the K-means algorithm in the comressed domain ermits to recover the clusters of the original domain. Monte Carlo simulations confirm the accuracy of the obtained aroximated error robabilities, and show that the effective rate needed to erform K-means over comressed data is lower than the rate that would be needed to reconstruct all the sensors measurements (Section V).
2 2 II. SYSTEM DESCRIPTION In this section, we first introduce our notations and assumtions for the binary measurement vectors collected by the sensors. We then resent the source coding technique based on LDPC codes that is used in the system. A. Source Model The networ is comosed by J sensors and a fusion center. Each sensor j 1, J erforms N binary measurements x j,n {0, 1} that are stored in a vector x j of size N. Consider K different clusters C where each cluster is associated to a centroid θ of length N. The binary comonents θ,n of θ are indeendent and identically distributed (i.i.d.). with P (θ,n = 1) = c. We assume that each measurement vector x j belongs to one of the K clusters. The cluster assignment variables e j, are defined as e j, = 1 if x j C, e j, = 0 otherwise. Let Θ = {θ 1,, θ K } and E = {e 1,1,, e J,K } be the sets of centroids and of cluster assignment variables, resectively. Within cluster C, each vector x j C is generated as x j = θ b j, (1) where reresents the XOR comonentwise oeration, and b j is a vector of size N with binary i.i.d. comonents such that P (b j,n = 1) =. In the following, we assume that the cluster assignment variables e j,, the centroids θ, and the arameter and c are unnown. This model is equivalent to the model resented in [20] for K-means clustering with binary data. Some instances of the K-means algorithm have been roosed to deal with an unnown number of clusters K [5]. However, here, as a first ste, K is assumed to be nown in order to focus on the comression asects of the roblem. Each sensor has to transmit its data to the fusion center that should erform K-means on the received data in order to recover the cluster assignments E and the centroids Θ. We now describe the source coding technique that is used in our system in order to greatly reduce the amount of data transmitted to the fusion center. B. Source Coding with Low Density Parity Chec Codes In [8], it is shown that LDPC codes are very efficient to erform distributed source coding in a networ of sensors, and in [14], [15] it is shown that they allow arameter estimation over the comressed data. Denote by H the binary arity chec matrix of size N M (M < N) of an LDPC code. Denote by d v M the number of non-zero comonents in any row of H, and denote by d c N the number of non-zero comonents in any column of H. In our system, each sensor j transmits to the fusion center a binary vector u j of length M, obtained as u j = H T x j. (2) For each sensor, the coding rate is given by r = M N = dv d c. The set of all the ossible vectors x j is called the original domain and it is denoted as X N = {0, 1} N. The set of all the ossible vectors u j is called the comressed domain and it is denoted by U M {0, 1} M. The comressed domain U M deends on the considered code H. As in [8], we assume that the vectors u j are transmitted reliably to the fusion center. We consider this assumtion in order to focus on the source coding asects of the roblem, and we do not describe the channel codes that should be used in the system in order to satisfy this assumtion. The source coding technique described by (2) was initially roosed in [8] in a context where the fusion center has to reconstruct all the measurement vectors x j. However, reconstructing all the sensor measurements usually requires comlex decoding oerations and may need a higher coding rate r than simly alying K-means over the comressed data. Hence, in the following, we roose to aly the K-means algorithm directly over the comressed vectors u j, without having to reconstruct the original vectors x j. III. K-MEANS ALGORITHM The K-means algorithm for clustering binary vectors x j in the original domain X N was initially roosed in [6] and it maes use of the Hamming distance. In this section, we restate the K-means algorithm of [6] in the comressed domain U M. The Hamming distance between two vectors a, b U M in the comressed domain is defined as d(a, b) = M m=1 a m b m. Denote ψ = H T θ and Ψ = {ψ 1,..., ψ K } the comressed versions of the centroids θ. Alying the K-means algorithm in the comressed domain corresonds to minimizing the objective function F(Ψ, E) = J j=1 =1 K e j, d(u j, ψ ). (3) with resect to the comressed centroids ψ and to the cluster assignment variables e j,. We initialize the K-means algorithm with K comressed centroids ψ (0) that may be either selected at random among the set of inut vectors u j, or obtained from the K-means++ rocedure [21]. Denote by L the number of iterations of the K- means algorithm. In the following, exonent l always refers to a quantity obtained at the l-th iteration of the algorithm. At iteration l 1, L, K-means roceeds in two stes. First, from the centroids ψ (l 1) obtained at iteration l 1, it assigns each vector u j to a cluster as j,, e (l) j, = { 1 if d(uj, ψ (l 1) ) = min d(u j, ψ (l 1) ), 1,K 0 otherwise. (4) Second, the algorithm udates the centroids as follows: j, n, ψ (l),n = 1 if J e (l) j=1 0 otherwise., j, u j,n 1 2 J (l) where J (l) is the number of vectors assigned to cluster at iteration l. The cluster assignment ste (4) assigns each vector u j to the cluster with the closest comressed centroid ψ (l). The centroid comutation ste (5) is a majority voting oeration which can be shown to minimize the average distances (5)
3 3 between the centroid ψ (l) and all the vectors u j assigned to cluster at iteration l. Following the same reasonning as for K-means in the original domain [6], it is easy to show that when alying K-means in the comressed domain, the objective function F(Ψ (l), E (l) ) is decreasing with l and at least converges to a local minimum. However, this roerty does not guarantee that the cluster assignment variables e (l) j, obtained from the algorithm in the comressed domain will corresond to the correct cluster assignments in the original domain. In order to justify that the K-means algorithm alied in the comressed domain can recover the correct clusters of the original domain, we now roose a theoretical analysis of the two stes of the algorithm. IV. K-MEANS PERFORMANCE EVALUATION In this section, in order to assess the erformance of the K- means algorithm in the comressed domain, we evaluate each ste of the algorithm individually. We rovide an aroximated exression of the error robability of the cluster assignment ste in the comressed domain, assuming that the comressed cluster centroids ψ are erfectly nown. In the same way, we rovide an aroximated exression of the error robability of the centroid estimation ste in the comressed domain, assuming that the cluster assignment variables e j, are erfectly nown. Although evaluated in the most favorable cases, these error robabilities will enable us determine whether it is reasonable to aly K-means in the comressed domain in order to recover the clusters of the original domain. The exressions of the error robabilities we derive rely on two functions B M and f defined as ( ) M B M (m, ) = m (1 ) M m, (6) m f(d, ) = (1 2)d. (7) A. Error Probability of the Cluster Assignment Ste The following roosition evaluates the error robability of the cluster assignment ste (4) alied to the comressed centroids ψ. Proosition 1. Let ê j, be the cluster assignments obtained when alying the cluster assignment ste (4) to the true comressed centroids ψ. The error robability P a = P (ê j, = 0 x j C ) can be aroximated as P a (K 1) M m 1=0 M m 2=m 1 B M (m 1, q 1 )B M (m 2, q 2 ) (8) with q 1 = f(d c, ), q 2 = f(d c, (1 )f(2, c )). Proof: We first evaluate the error robabilities P a, = P (ê j, = 1 x j C ),. Let a = u j ψ = H T b j, a = u j ψ = H T (θ θ b j ). (9) and define A = M m=1 a,m, A = M m=1 a,m. According to the cluster assignment ste (4), the error robability P a, can be exressed as P a, = P (A A ) which can be aroximated as M M P a, P (A = u) P (A = v). (10) u=0 v=u In order to get (10) we imlicitly assume that the random variables A and A are indeendent, and hence (10) is only an aroximation of P a,. Assuming that the a,m and a,m are all indeendent, we get P (A = u) B M (u, q 1 ) and P (A = v) B M (v, q 2 ). To finish, the error robability of the cluster assignment ste is given by P a = P a, = (K 1)P a, since P a, does not deend on. It can be seen from (8) that the aroximated error robability P a does not deend on the considered cluster. The exression (8) is only an aroximation of the error robability of the cluster assignment ste, since it assumes that the comonents of the vector H T b j are indeendent, which is not true in general. However, it is shown in [14], [22] that this assumtion is reasonable for arameter estimation over LDPC codes. In Section V, we verify the accuracy of the aroximation by comaring the values of (8) to the error robabilities measured from Monte Carlo simulations. B. Error Probability of the Centroid Comutation Ste The following roosition evaluates the error robability of the centroid comutation ste in the comressed domain. Proosition 2. Let ˆΨ be the estimated comressed centroids obtained after alying the centroid estimation ste (5) to the true cluster assignment variables e j,. The error robability P c, = P ( ˆψ,m ψ,m ) for cluster can be aroximated as P c, J j= J 2 B J (j, d ) (11) where J is the number of vectors in cluster, and d = f(d c, ). Proof: From the model defined in Section II, a codeword u j (j C ), can be exressed as u j = H T (θ b j ) = ψ a j, (12) where a j = H T b j is such that P (a j,m = 1) = d. Let A j = J j=1 a j,m. The error robability of the centroid comutation ste can be evaluated as P c, = P ( A j J ) 2 J j= J 2 B J (j, d ). (13) The aroximation comes from the fact that (11) assumes that the a j,m are indeendent. It can be seen from (11) that the aroximated error robability P c, only deends on the considered cluster through the number J of vectors in cluster C. The exression (8) is only an aroximation of the error robability of the centroid assignment ste for the same reasons as for the cluster assignment ste. We will also verify the accuracy of this aroximation in Section V.
4 4 M=250, theoretic M=250, ractical M=500, theoretic M=500, ractical 1e (a) M=250, theoretic M=250, ractical M=500, theoretic M=500, ractical 1e (b) M=250 M= (c) Fig. 1. (a) Comarison of error robability redicted by theory with error robability measured in ractice for the cluster assignment ste (b) Comarison of error robability redicted by theory with error robability measured in ractice for the centroid estimation ste (c) Error robability of the K-means algorithm with L = 10 iterations V. SIMULATION RESULTS In this section, we evaluate through simulations the erformance of the K-means algorithm in the comressed domain. We first consider each ste of the algorithm individually, and we verify the accuracy of the aroximated error robabilities obtained in Section IV. We then assess the erformance of the full algorithm and we evaluate the rate needed to erform K-means over comressed data. Throughout the section, we set J = 200, K = 4, c = 0.1 and we consider two LDPC codes of length N = 1000 with d v = 2. The two codes are constructed from the Progressive Edge Growth algorithm [23]; the first code is of rate r = 1/4 with M = 250 and d c = 8, and the second one is of rate r = 1/2, with M = 500 and d c = 4. We set d v = 2 for the two considered codes, since it can be shown from (8) and (11) that the error robabilities P a and P c, are increasing with d v (d v is necessarily greater than 2). A. Accuracy of the error robability aroximations We comare the aroximated exressions P a (4) and P c, (11) with the effective error robabilities measured from Monte Carlo simulations for each ste of the algorithm for the two constructed codes over N t = simulations. Figure 1(a) reresents the obtained error robabilities for the cluster assignment ste, while Figure 1(b) reresents the centroid estimation ste. We see that for the two considered codes, the theoretic error robabilities P a and P c, are close to the measured error robabilities for the two stes of the algorithm, which shows the accuracy of the roosed aroximations. Figure 1(a) also illustrates that the cluster assignment ste in the comressed domain can indeed recover the correct clusters of the original domain, since it is ossible to reach error robabilities from 10 3 to The same conclusion holds for Figure 1(b) for the centroid estimation ste. B. K-means algorithm and rate evaluation In addition to analyzing the erformance of the K-means algorithm in the comressed domain, we also want to comare the coding rate r needed to erform K-means to the rate that would be needed to reconstruct all the sensors measurements. From [24], the minimum coding rate (er symbol normalized by the number of sources J) the fusion center should receive to reconstruct all the x j is given by R d = 1 J H(X 1,, X J ), where H(X 1,, X J ) is the joint entroy of the sources (X 1,, X J ). Since no closed-form exression of R d exist, we evaluate the rate R d from Monte-Carlo simulations. We run over N t = simulations the K-means algorithm in the comressed domain initialized with the K- means++ rocedure and L = 10 iterations. In order to evaluate the erformance of the algorithm, we measure the error robability of the cluster assignments decided by the algorithm in the comressed domain with resect to the correct clusters in the original domain. Figure 1(c) reresents the error robabilities with resect to obtained for the two considered codes. As exected, the error robability is increasing with and is decreasing with the coding rate r. We then comare the rate needed to erform K-means over comressed data to the rate needed to reconstruct all the sensors measurements. For c = 0.1 and = 0.1, we get R d = 0.68 bits/symbol, and, for c = 0.05 and = 0.1, we obtain R d = 0.43 bits/symbol. The results of Figure 1(c) show that for c = 0.1 and = 0.1, the code of rate r = 1/2 < 0.68 enables to erform K-means with an error robability lower than For c = 0.1 and = 0.05, the code of rate r = 1/4 < 0.43 also enables to erform K-means with a low error robability P e = This shows that the rate needed to erform K-means is lower than the rate needed to reconstruct all the sensors measurements, which justifies the use of the method resented in the aer. VI. CONCLUSION In this aer, we considered a networ of sensors which transmit their comressed binary measurements to a fusion center. We roosed to aly the K-means algorithm directly over the comressed data, without reconstructing the sensor measurements. From a theoretical analysis and Monte Carlo simulations, we showed the efficiency of alying K-means in the comressed domain. We also showed that the rate needed to erform K-means on the comressed vectors is lower than the rate needed to reconstruct all the measurements.
5 5 REFERENCES [1] J. Yic, B. Muherjee, and D. Ghosal, Wireless sensor networ survey, Comuter networs, vol. 52, no. 12, , [2] L. Y. Wang, J.-F. Zhang, and G. G. Yin, System identification using binary sensors, IEEE Transactions on Automatic Control, vol. 48, no. 11, , [3] E. Colinet and J. Juillard, A weighted least-squares aroach to arameter estimation roblems based on binary measurements, IEEE Transactions on Automatic Control, vol. 55, no. 1, , [4] F. J. Ordóñez, P. de Toledo, and A. Sanchis, Activity recognition using hybrid generative/discriminative models on home environments using binary sensors, Sensors, vol. 13, no. 5, , [5] A. K. Jain, Data clustering: 50 years beyond K-means, Pattern recognition letters, vol. 31, no. 8, , [6] Z. Huang, Extensions to the K-means algorithm for clustering large data sets with categorical values, Data mining and nowledge discovery, vol. 2, no. 3, , [7] T. Richardson and R. Urbane, The caacity of low-density aritychec codes under message-assing decoding, IEEE Transactions on Information Theory, vol. 47, no. 2, , [8] Z. Xiong, A. Liveris, and S. Cheng, Distributed source coding for sensor networs, IEEE Signal Processing. Magazine, vol. 21, no. 5, , [9] C. Boutsidis, A. Zouzias, M. W. Mahoney, and P. Drineas, Randomized dimensionality reduction for K-means clustering, IEEE Transactions on Information Theory, vol. 61, no. 2, , [10] F. Pouramali-Anarai and S. Becer, Preconditioned data sarsification for big data with alications to PCA and K-means, arxiv rerint arxiv: , [11] M. Davenort, P. T. Boufounos, M. B. Wain, R. G. Baraniu et al., Signal rocessing with comressive measurements, IEEE Journal of Selected Toics in Signal Processing, vol. 4, no. 2, , [12] A. Bourrier, R. Gribonval, and P. rez, Comressive gaussian mixture estimation, in IEEE International Conference on Acoustics, Seech and Signal Processing, 2013, [13] A. Zebadua, P. O. Amblard, E. Moisan, and O. Michel, Comressed and quantized correlation estimators, To aear in IEEE Transactions on Signal Processing, [14] V. Toto-Zarasoa, A. Roumy, and C. Guillemot, Maximum lielihood bsc arameter estimation for the sleian-wolf roblem, IEEE Communications Letters, vol. 15, no. 2, , [15] S. Wang, L. Cui, L. Stanovic, V. Stanovic, and S. Cheng, Adative correlation estimation with article filtering for distributed video coding, IEEE Transactions on Circuits and Systems for Video Technology, vol. 22, no. 5, , May [16] M. S. Rahman and A. B. Wagner, On the otimality of binning for distributed hyothesis testing, IEEE Transactions on Information Theory, vol. 58, no. 10, , [17] G. Katz, P. Piantanida, and M. Debbah, Distributed binary detection with lossy data comression, arxiv rerint arxiv: , [18] E. Tuncel and D. Gunduz, Identification and lossy reconstruction in noisy databases, IEEE Transactions on Information Theory, vol. 60, no. 2, , [19] A. Ingber, T. Courtade, and T. Weissman, Comression for quadratic similarity queries, IEEE Transactions on Information Theory, vol. 61, no. 5, , [20] T. Li, A general model for clustering binary data, in Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, 2005, [21] D. Arthur and S. Vassilvitsii, K-means++: The advantages of careful seeding, in Proceedings of the eighteenth annual ACM-SIAM symosium on Discrete algorithms. Society for Industrial and Alied Mathematics, 2007, [22] E. Duraz, A. Roumy, and M. Kieffer, Source coding with side information at the decoder and uncertain nowledge of the correlation, IEEE Transactions on Communications, vol. 62, no. 1, , [23] X.-Y. Hu, E. Eleftheriou, and D. M. Arnold, Regular and irregular rogressive edge-growth tanner grahs, IEEE Transactions on Information Theory, vol. 51, no. 1, , [24] D. Sleian and J. K. Wolf, Noiseless coding of correlated information sources, IEEE Transactions on Information Theory, vol. 19, no. 4, , 1973.
arxiv: v2 [cs.it] 17 Jan 2018
K-means Algorithm over Compressed Binary Data arxiv:1701.03403v2 [cs.it] 17 Jan 2018 Elsa Dupraz IMT Atlantique, Lab-STICC, UBL, Brest, France Abstract We consider a networ of binary-valued sensors with
More informationECE 534 Information Theory - Midterm 2
ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You
More information4. Score normalization technical details We now discuss the technical details of the score normalization method.
SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules
More informationq-ary Symmetric Channel for Large q
List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu
More informationFAST AND EFFICIENT SIDE INFORMATION GENERATION IN DISTRIBUTED VIDEO CODING BY USING DENSE MOTION REPRESENTATIONS
18th Euroean Signal Processing Conference (EUSIPCO-2010) Aalborg, Denmark, August 23-27, 2010 FAST AND EFFICIENT SIDE INFORMATION GENERATION IN DISTRIBUTED VIDEO CODING BY USING DENSE MOTION REPRESENTATIONS
More informationEstimation of the large covariance matrix with two-step monotone missing data
Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationDistributed Rule-Based Inference in the Presence of Redundant Information
istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced
More informationFormal Modeling in Cognitive Science Lecture 29: Noisy Channel Model and Applications;
Formal Modeling in Cognitive Science Lecture 9: and ; ; Frank Keller School of Informatics University of Edinburgh keller@inf.ed.ac.uk Proerties of 3 March, 6 Frank Keller Formal Modeling in Cognitive
More informationImproved Capacity Bounds for the Binary Energy Harvesting Channel
Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,
More informationMATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK
Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment
More informationConvex Optimization methods for Computing Channel Capacity
Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem
More informationCompressed Sensing Based Video Multicast
Comressed Sensing Based Video Multicast Markus B. Schenkel a,b, Chong Luo a, Pascal Frossard b and Feng Wu a a Microsoft Research Asia, Beijing, China b Signal Processing Laboratory (LTS4), EPFL, Lausanne,
More informationOn Code Design for Simultaneous Energy and Information Transfer
On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter
More informationPARTIAL FACE RECOGNITION: A SPARSE REPRESENTATION-BASED APPROACH. Luoluo Liu, Trac D. Tran, and Sang Peter Chin
PARTIAL FACE RECOGNITION: A SPARSE REPRESENTATION-BASED APPROACH Luoluo Liu, Trac D. Tran, and Sang Peter Chin Det. of Electrical and Comuter Engineering, Johns Hokins Univ., Baltimore, MD 21218, USA {lliu69,trac,schin11}@jhu.edu
More informationCoding Along Hermite Polynomials for Gaussian Noise Channels
Coding Along Hermite olynomials for Gaussian Noise Channels Emmanuel A. Abbe IG, EFL Lausanne, 1015 CH Email: emmanuel.abbe@efl.ch Lizhong Zheng LIDS, MIT Cambridge, MA 0139 Email: lizhong@mit.edu Abstract
More informationSystem Reliability Estimation and Confidence Regions from Subsystem and Full System Tests
009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract
More informationInteractive Hypothesis Testing Against Independence
013 IEEE International Symosium on Information Theory Interactive Hyothesis Testing Against Indeendence Yu Xiang and Young-Han Kim Deartment of Electrical and Comuter Engineering University of California,
More informationMetrics Performance Evaluation: Application to Face Recognition
Metrics Performance Evaluation: Alication to Face Recognition Naser Zaeri, Abeer AlSadeq, and Abdallah Cherri Electrical Engineering Det., Kuwait University, P.O. Box 5969, Safat 6, Kuwait {zaery, abeer,
More informationSampling and Distortion Tradeoffs for Bandlimited Periodic Signals
Samling and Distortion radeoffs for Bandlimited Periodic Signals Elaheh ohammadi and Farokh arvasti Advanced Communications Research Institute ACRI Deartment of Electrical Engineering Sharif University
More informationUncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning
TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment
More informationConstruction of High-Girth QC-LDPC Codes
MITSUBISHI ELECTRIC RESEARCH LABORATORIES htt://wwwmerlcom Construction of High-Girth QC-LDPC Codes Yige Wang, Jonathan Yedidia, Stark Draer TR2008-061 Setember 2008 Abstract We describe a hill-climbing
More informationAnytime communication over the Gilbert-Eliot channel with noiseless feedback
Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anant Sahai, Salman Avestimehr, Paolo Minero Deartment of Electrical Engineering and Comuter Sciences University of California
More informationA Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition
A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino
More informationMODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More informationUniversal Finite Memory Coding of Binary Sequences
Deartment of Electrical Engineering Systems Universal Finite Memory Coding of Binary Sequences Thesis submitted towards the degree of Master of Science in Electrical and Electronic Engineering in Tel-Aviv
More information22.615, MHD Theory of Fusion Systems Prof. Freidberg Lecture 13: PF Design II The Coil Solver
.615, MHD Theory of Fusion Systems Prof. Freidberg Lecture 13: PF Design II The Coil Solver Introduction 1. Let us assume that we have successfully solved the Grad Shafranov equation for a fixed boundary
More informationRadial Basis Function Networks: Algorithms
Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.
More informationOn the capacity of the general trapdoor channel with feedback
On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:
More informationProbability Estimates for Multi-class Classification by Pairwise Coupling
Probability Estimates for Multi-class Classification by Pairwise Couling Ting-Fan Wu Chih-Jen Lin Deartment of Comuter Science National Taiwan University Taiei 06, Taiwan Ruby C. Weng Deartment of Statistics
More informationUncorrelated Multilinear Discriminant Analysis with Regularization and Aggregation for Tensor Object Recognition
TNN-2007-P-0332.R1 1 Uncorrelated Multilinear Discriminant Analysis with Regularization and Aggregation for Tensor Object Recognition Haiing Lu, K.N. Plataniotis and A.N. Venetsanooulos The Edward S. Rogers
More informationOutline. Markov Chains and Markov Models. Outline. Markov Chains. Markov Chains Definitions Huizhen Yu
and Markov Models Huizhen Yu janey.yu@cs.helsinki.fi Det. Comuter Science, Univ. of Helsinki Some Proerties of Probabilistic Models, Sring, 200 Huizhen Yu (U.H.) and Markov Models Jan. 2 / 32 Huizhen Yu
More informationA PEAK FACTOR FOR PREDICTING NON-GAUSSIAN PEAK RESULTANT RESPONSE OF WIND-EXCITED TALL BUILDINGS
The Seventh Asia-Pacific Conference on Wind Engineering, November 8-1, 009, Taiei, Taiwan A PEAK FACTOR FOR PREDICTING NON-GAUSSIAN PEAK RESULTANT RESPONSE OF WIND-EXCITED TALL BUILDINGS M.F. Huang 1,
More informationGeneralized optimal sub-pattern assignment metric
Generalized otimal sub-attern assignment metric Abu Sajana Rahmathullah, Ángel F García-Fernández, Lennart Svensson arxiv:6005585v7 [cssy] 2 Se 208 Abstract This aer resents the generalized otimal subattern
More informationState Estimation with ARMarkov Models
Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,
More informationAmin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE)
KAUST Reository Outage erformance of cognitive radio systems with Imroer Gaussian signaling Item tye Authors Erint version DOI Publisher Journal Rights Conference Paer Amin Osama; Abediseid Walid; Alouini
More informationTraining sequence optimization for frequency selective channels with MAP equalization
532 ISCCSP 2008, Malta, 12-14 March 2008 raining sequence otimization for frequency selective channels with MAP equalization Imed Hadj Kacem, Noura Sellami Laboratoire LEI ENIS, Route Sokra km 35 BP 3038
More informationLDPC codes for the Cascaded BSC-BAWGN channel
LDPC codes for the Cascaded BSC-BAWGN channel Aravind R. Iyengar, Paul H. Siegel, and Jack K. Wolf University of California, San Diego 9500 Gilman Dr. La Jolla CA 9093 email:aravind,siegel,jwolf@ucsd.edu
More informationOn Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm
On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm Gabriel Noriega, José Restreo, Víctor Guzmán, Maribel Giménez and José Aller Universidad Simón Bolívar Valle de Sartenejas,
More information2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S.
-D Analysis for Iterative Learning Controller for Discrete-ime Systems With Variable Initial Conditions Yong FANG, and ommy W. S. Chow Abstract In this aer, an iterative learning controller alying to linear
More informationarxiv: v1 [quant-ph] 22 Apr 2017
Quaternionic Quantum Particles SERGIO GIARDINO Institute of Science and Technology, Federal University of São Paulo (Unifes) Avenida Cesare G. M. Lattes 101, 147-014 São José dos Camos, SP, Brazil arxiv:1704.06848v1
More informationEstimation of Separable Representations in Psychophysical Experiments
Estimation of Searable Reresentations in Psychohysical Exeriments Michele Bernasconi (mbernasconi@eco.uninsubria.it) Christine Choirat (cchoirat@eco.uninsubria.it) Raffaello Seri (rseri@eco.uninsubria.it)
More informationConvolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code.
Convolutional Codes Goals Lecture Be able to encode using a convolutional code Be able to decode a convolutional code received over a binary symmetric channel or an additive white Gaussian channel Convolutional
More informationAI*IA 2003 Fusion of Multiple Pattern Classifiers PART III
AI*IA 23 Fusion of Multile Pattern Classifiers PART III AI*IA 23 Tutorial on Fusion of Multile Pattern Classifiers by F. Roli 49 Methods for fusing multile classifiers Methods for fusing multile classifiers
More informationUncorrelated Multilinear Discriminant Analysis with Regularization and Aggregation for Tensor Object Recognition
Uncorrelated Multilinear Discriminant Analysis with Regularization and Aggregation for Tensor Object Recognition Haiing Lu, K.N. Plataniotis and A.N. Venetsanooulos The Edward S. Rogers Sr. Deartment of
More informationAn Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem
An Ant Colony Otimization Aroach to the Probabilistic Traveling Salesman Problem Leonora Bianchi 1, Luca Maria Gambardella 1, and Marco Dorigo 2 1 IDSIA, Strada Cantonale Galleria 2, CH-6928 Manno, Switzerland
More informations v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4
Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work
More informationInformation collection on a graph
Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements
More informationImpossibility of a Quantum Speed-up with a Faulty Oracle
Imossibility of a Quantum Seed-u with a Faulty Oracle Oded Regev Liron Schiff Abstract We consider Grover s unstructured search roblem in the setting where each oracle call has some small robability of
More informationVISCOELASTIC PROPERTIES OF INHOMOGENEOUS NANOCOMPOSITES
VISCOELASTIC PROPERTIES OF INHOMOGENEOUS NANOCOMPOSITES V. V. Novikov ), K.W. Wojciechowski ) ) Odessa National Polytechnical University, Shevchenko Prosekt, 6544 Odessa, Ukraine; e-mail: novikov@te.net.ua
More informationNotes on Instrumental Variables Methods
Notes on Instrumental Variables Methods Michele Pellizzari IGIER-Bocconi, IZA and frdb 1 The Instrumental Variable Estimator Instrumental variable estimation is the classical solution to the roblem of
More informationA Recursive Block Incomplete Factorization. Preconditioner for Adaptive Filtering Problem
Alied Mathematical Sciences, Vol. 7, 03, no. 63, 3-3 HIKARI Ltd, www.m-hiari.com A Recursive Bloc Incomlete Factorization Preconditioner for Adative Filtering Problem Shazia Javed School of Mathematical
More informationCharacterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations
Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of
More informationIntroduction to Probability and Statistics
Introduction to Probability and Statistics Chater 8 Ammar M. Sarhan, asarhan@mathstat.dal.ca Deartment of Mathematics and Statistics, Dalhousie University Fall Semester 28 Chater 8 Tests of Hyotheses Based
More informationEvaluation of the critical wave groups method for calculating the probability of extreme ship responses in beam seas
Proceedings of the 6 th International Shi Stability Worsho, 5-7 June 207, Belgrade, Serbia Evaluation of the critical wave grous method for calculating the robability of extreme shi resonses in beam seas
More informationEfficient Approximations for Call Admission Control Performance Evaluations in Multi-Service Networks
Efficient Aroximations for Call Admission Control Performance Evaluations in Multi-Service Networks Emre A. Yavuz, and Victor C. M. Leung Deartment of Electrical and Comuter Engineering The University
More informationON OPTIMIZATION OF THE MEASUREMENT MATRIX FOR COMPRESSIVE SENSING
8th Euroean Signal Processing Conference (EUSIPCO-2) Aalborg, Denmark, August 23-27, 2 ON OPTIMIZATION OF THE MEASUREMENT MATRIX FOR COMPRESSIVE SENSING Vahid Abolghasemi, Saideh Ferdowsi, Bahador Makkiabadi,2,
More informationLower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data
Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment
More informationA Bound on the Error of Cross Validation Using the Approximation and Estimation Rates, with Consequences for the Training-Test Split
A Bound on the Error of Cross Validation Using the Aroximation and Estimation Rates, with Consequences for the Training-Test Slit Michael Kearns AT&T Bell Laboratories Murray Hill, NJ 7974 mkearns@research.att.com
More informationSome Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., DECEMBER 4 336 Some Unitary Sace Time Codes From Shere Packing Theory With Otimal Diversity Product of Code Size Haiquan Wang, Genyuan Wang, and Xiang-Gen
More informationAn Analysis of Reliable Classifiers through ROC Isometrics
An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit
More informationAggregate Prediction With. the Aggregation Bias
100 Aggregate Prediction With Disaggregate Models: Behavior of the Aggregation Bias Uzi Landau, Transortation Research nstitute, Technion-srael nstitute of Technology, Haifa Disaggregate travel demand
More informationAn Analysis of TCP over Random Access Satellite Links
An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance
More informationQuick Detection of Changes in Trac Statistics: Ivy Hsu and Jean Walrand 2. Department of EECS, University of California, Berkeley, CA 94720
Quic Detection of Changes in Trac Statistics: Alication to Variable Rate Comression Ivy Hsu and Jean Walrand 2 Deartment of EECS, University of California, Bereley, CA 94720 resented at the 32nd Annual
More informationInformation collection on a graph
Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements
More informationImproved Bounds on Bell Numbers and on Moments of Sums of Random Variables
Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating
More informationDETC2003/DAC AN EFFICIENT ALGORITHM FOR CONSTRUCTING OPTIMAL DESIGN OF COMPUTER EXPERIMENTS
Proceedings of DETC 03 ASME 003 Design Engineering Technical Conferences and Comuters and Information in Engineering Conference Chicago, Illinois USA, Setember -6, 003 DETC003/DAC-48760 AN EFFICIENT ALGORITHM
More informationProceedings of the 2017 Winter Simulation Conference W. K. V. Chan, A. D Ambrogio, G. Zacharewicz, N. Mustafee, G. Wainer, and E. Page, eds.
Proceedings of the 207 Winter Simulation Conference W. K. V. Chan, A. D Ambrogio, G. Zacharewicz, N. Mustafee, G. Wainer, and E. Page, eds. ON THE ESTIMATION OF THE MEAN TIME TO FAILURE BY SIMULATION Peter
More informationLower bound solutions for bearing capacity of jointed rock
Comuters and Geotechnics 31 (2004) 23 36 www.elsevier.com/locate/comgeo Lower bound solutions for bearing caacity of jointed rock D.J. Sutcliffe a, H.S. Yu b, *, S.W. Sloan c a Deartment of Civil, Surveying
More informationBeyond Worst-Case Reconstruction in Deterministic Compressed Sensing
Beyond Worst-Case Reconstruction in Deterministic Comressed Sensing Sina Jafarour, ember, IEEE, arco F Duarte, ember, IEEE, and Robert Calderbank, Fellow, IEEE Abstract The role of random measurement in
More informationOutline. EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Simple Error Detection Coding
Outline EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Error detection using arity Hamming code for error detection/correction Linear Feedback Shift
More informationLogistics Optimization Using Hybrid Metaheuristic Approach under Very Realistic Conditions
17 th Euroean Symosium on Comuter Aided Process Engineering ESCAPE17 V. Plesu and P.S. Agachi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Logistics Otimization Using Hybrid Metaheuristic Aroach
More informationImproving on the Cutset Bound via a Geometric Analysis of Typical Sets
Imroving on the Cutset Bound via a Geometric Analysis of Tyical Sets Ayfer Özgür Stanford University CUHK, May 28, 2016 Joint work with Xiugang Wu (Stanford). Ayfer Özgür (Stanford) March 16 1 / 33 Gaussian
More informationPairwise active appearance model and its application to echocardiography tracking
Pairwise active aearance model and its alication to echocardiograhy tracking S. Kevin Zhou 1, J. Shao 2, B. Georgescu 1, and D. Comaniciu 1 1 Integrated Data Systems, Siemens Cororate Research, Inc., Princeton,
More informationOn Wald-Type Optimal Stopping for Brownian Motion
J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of
More informationAKRON: An Algorithm for Approximating Sparse Kernel Reconstruction
: An Algorithm for Aroximating Sarse Kernel Reconstruction Gregory Ditzler Det. of Electrical and Comuter Engineering The University of Arizona Tucson, AZ 8572 USA ditzler@email.arizona.edu Nidhal Carla
More informationLilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3
Pesquisa Oeracional (2013) 33(1): 123-132 2013 Brazilian Oerations Research Society Printed version ISSN 0101-7438 / Online version ISSN 1678-5142 www.scielo.br/oe SOME RESULTS ABOUT THE CONNECTIVITY OF
More informationShadow Computing: An Energy-Aware Fault Tolerant Computing Model
Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms
More informationUsing the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process
Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process P. Mantalos a1, K. Mattheou b, A. Karagrigoriou b a.deartment of Statistics University of Lund
More informationRecent Developments in Multilayer Perceptron Neural Networks
Recent Develoments in Multilayer Percetron eural etworks Walter H. Delashmit Lockheed Martin Missiles and Fire Control Dallas, Texas 75265 walter.delashmit@lmco.com walter.delashmit@verizon.net Michael
More informationPercolation Thresholds of Updated Posteriors for Tracking Causal Markov Processes in Complex Networks
Percolation Thresholds of Udated Posteriors for Tracing Causal Marov Processes in Comlex Networs We resent the adative measurement selection robarxiv:95.2236v1 stat.ml 14 May 29 Patric L. Harrington Jr.
More informationsensors ISSN
Sensors 2011, 11, 260-277; doi:10.3390/s110100260 OPEN ACCESS sensors ISSN 1424-8220 www.mdi.com/journal/sensors Article Roller Bearing Fault Diagnosis Based on Nonlinear Redundant Lifting Wavelet Pacet
More informationOptimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging
1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014
More informationGradient Based Iterative Algorithms for Solving a Class of Matrix Equations
1216 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 50, NO. 8, AUGUST 2005 Exanding (A3)gives M 0 8 T +1 T +18 =( T +1 +1 ) F = I (A4) g = 0F 8 T +1 =( T +1 +1 ) f = T +1 +1 + T +18 F 8 T +1 =( T +1 +1 )
More informationGenetic Algorithms, Selection Schemes, and the Varying Eects of Noise. IlliGAL Report No November Department of General Engineering
Genetic Algorithms, Selection Schemes, and the Varying Eects of Noise Brad L. Miller Det. of Comuter Science University of Illinois at Urbana-Chamaign David E. Goldberg Det. of General Engineering University
More informationSAFETY OPTIMIZATION OF A FERRY TECHNICAL SYSTEM IN VARIABLE OPERATION CONDITIONS ABSTRACT
Krzysztof Kolowrocki Joanna Soszynska Budny SAFETY OPTIIZATION OF A FERRY TECHNICAL SYSTE IN VARIABLE OPERATION CONDITIONS (Vol.) 0 arch SAFETY OPTIIZATION OF A FERRY TECHNICAL SYSTE IN VARIABLE OPERATION
More informationElliptic Curves and Cryptography
Ellitic Curves and Crytograhy Background in Ellitic Curves We'll now turn to the fascinating theory of ellitic curves. For simlicity, we'll restrict our discussion to ellitic curves over Z, where is a
More informationDeriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V.
Deriving ndicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V. Deutsch Centre for Comutational Geostatistics Deartment of Civil &
More informationMODEL-BASED MULTIPLE FAULT DETECTION AND ISOLATION FOR NONLINEAR SYSTEMS
MODEL-BASED MULIPLE FAUL DEECION AND ISOLAION FOR NONLINEAR SYSEMS Ivan Castillo, and homas F. Edgar he University of exas at Austin Austin, X 78712 David Hill Chemstations Houston, X 77009 Abstract A
More informationON THE DEVELOPMENT OF PARAMETER-ROBUST PRECONDITIONERS AND COMMUTATOR ARGUMENTS FOR SOLVING STOKES CONTROL PROBLEMS
Electronic Transactions on Numerical Analysis. Volume 44,. 53 72, 25. Coyright c 25,. ISSN 68 963. ETNA ON THE DEVELOPMENT OF PARAMETER-ROBUST PRECONDITIONERS AND COMMUTATOR ARGUMENTS FOR SOLVING STOKES
More informationCombining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)
Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment
More informationEvaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models
Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu
More information3.4 Design Methods for Fractional Delay Allpass Filters
Chater 3. Fractional Delay Filters 15 3.4 Design Methods for Fractional Delay Allass Filters Above we have studied the design of FIR filters for fractional delay aroximation. ow we show how recursive or
More informationProximal methods for the latent group lasso penalty
Proximal methods for the latent grou lasso enalty The MIT Faculty has made this article oenly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher Villa,
More informationDiscrete Signal Reconstruction by Sum of Absolute Values
JOURNAL OF L A TEX CLASS FILES, VOL., NO. 4, DECEMBER 22 Discrete Signal Reconstruction by Sum of Absolute Values Masaaki Nagahara, Senior Member, IEEE, arxiv:53.5299v [cs.it] 8 Mar 25 Abstract In this
More informationAnalysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks
Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their
More informationRecursive Estimation of the Preisach Density function for a Smart Actuator
Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator
More informationUnsupervised Hyperspectral Image Analysis Using Independent Component Analysis (ICA)
Unsuervised Hyersectral Image Analysis Using Indeendent Comonent Analysis (ICA) Shao-Shan Chiang Chein-I Chang Irving W. Ginsberg Remote Sensing Signal and Image Processing Laboratory Deartment of Comuter
More informationBayesian Model Averaging Kriging Jize Zhang and Alexandros Taflanidis
HIPAD LAB: HIGH PERFORMANCE SYSTEMS LABORATORY DEPARTMENT OF CIVIL AND ENVIRONMENTAL ENGINEERING AND EARTH SCIENCES Bayesian Model Averaging Kriging Jize Zhang and Alexandros Taflanidis Why use metamodeling
More informationSTABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS
STABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS Massimo Vaccarini Sauro Longhi M. Reza Katebi D.I.I.G.A., Università Politecnica delle Marche, Ancona, Italy
More information