Reliability Gain of Network Coding in Lossy Wireless Networks

Size: px
Start display at page:

Download "Reliability Gain of Network Coding in Lossy Wireless Networks"

Transcription

1 Relablty Gan of Network Codng n Lossy Wreless Networks Majd Ghader Deartment of Comuter Scence Unversty of Calgary mghader@cs.ucalgary.ca Don Towsley and Jm Kurose Deartment of Comuter Scence Unversty of Massachusetts Amherst {towsley,kurose}@cs.umass.edu Abstract The caacty gan of network codng has been extensvely studed n wred and wreless networks. Recently, t has been shown that network codng mroves network relablty by reducng the number of acket retransmssons n lossy networks. However, the extent of the relablty beneft of network codng s not known. Ths aer quantfes the relablty gan of network codng for relable multcastng n wreless networks, where network codng s most romsng. We defne the exected number of transmssons er acket as the erformance metrc for relablty and derve analytcal exressons characterzng the erformance of network codng. We also analyze the erformance of relablty mechansms based on rateless codes and automatc reeat request ARQ, and comare them wth network codng. We frst study network codng erformance n an access ont model, where an access ont broadcasts ackets to a grou of K recevers over lossy wreless channels. We show that the exected number of transmssons usng ARQ, comared to network codng, scales as Θlog K as the number of recevers becomes large. We then use the access ont model as a buldng block to study relable multcast n a tree toology. In addton to scalng results, we derve exressons for the exected number of transmssons for fnte multcast grous as well. Our results show that network codng sgnfcantly reduces the number of retransmssons n lossy networks comared to an ARQ scheme. However, rateless codng acheves asymtotc erformance results smlar to that of network codng. Index Terms Relablty, network codng, ARQ, asymtotc analyss. I. INTRODUCTION In tradtonal networks, data ackets are transmtted by store-and-forward mechansms n whch the ntermedate nodes relays or routers only reeat data ackets that they have receved. Wth network codng NC, a network node s allowed to combne several ackets that t has generated or receved nto one or several outgong ackets. The orgnal aer of Ahlswede et al. ] showed the caacty gan of network codng for multcast n wrelne networks. Recently, network codng has been aled to wreless networks and receved sgnfcant attenton as a means of mrovng network caacty and cong wth unrelable wreless lnks 2]. In fact, the unrelablty and broadcast nature of wreless lnks make wreless networks a natural settng for network codng. In ste of sgnfcant research on the caacty gan of network codng, the relablty gan of network codng s largely unknown. In ths aer, we study the alcaton of network codng as an error control technque for relable multcastng n a wreless network. Our goal s to quantfy the beneft of usng network codng comared to tradtonal error control technques such as ARQ and rateless codng. Recently, there has been some work on characterzng the relablty beneft of network codng n lossy networks 3] 5]. However, our work dffers from exstng work n that we rovde tght asymtotc bounds on the erformance of relablty mechansms based on both ARQ and NC. Addtonally, the exstng work only rovdes erformance results n terms of the exected number of transmssons wthout rovdng any nsght about the scalng behavor of dfferent relablty mechansms. Moreover, n addton to the commonly studed access ont model, we analyze relable multcast n a tree toology as well. Tree-based multcast has been revously studed n the context of wred networks and ARQ mechansms 6], 7]. In ths aer, we resent analytcal and numercal results for the erformance of end-to-end and lnk-by-lnk relablty mechansms based on ARQ, FEC and NC n a tree toology. An nterestng model can be constructed by allowng the recevers of the tradtonal access ont model to communcate locally n order to recover lost ackets. Ths model rovdes an effcent structure for relable multcast when the access ont transmssons are costly or the communcaton qualty among the recevers s sueror to that of the access ont, a scenaro occurrng often n mltary and satellte communcatons. Due to sace lmtatons, analyss of the extended access ont model s not resented n ths aer. Interested readers are referred to 8] for detals. Our contrbutons n ths aer are as follows: We resent a detaled characterzaton of the erformance of dfferent relablty mechansms based on ARQ, FEC and NC for the access ont model and tree-based multcast model. We resent both analytcal and numercal results. We rovde asymtotc bounds on the erformance of dfferent relablty mechansms for the toologes consdered n the aer, and show how our results can be used to analyze more comlcated toologes. The rest of the aer s organzed as follows. In Secton II, we analyze the access ont model whch serves as a bass for the analyss n followng sectons. In Secton III, we study four dfferent relablty mechansms for multcast n a tree

2 Fg.. AP K nodes The access ont model wth K recevers. toology. These mechansms are based on the alcaton of ARQ and FEC n a lnk-by-lnk or end-to-end fashon. For the three models consdered here, we derve exressons for the exected number of transmssons, and rovde asymtotc results for the erformance of relablty mechansms based on ARQ and NC. Our conclusons as well as future work are dscussed n Secton IV. II. ACCESS POINT MODEL The access ont model conssts of a sngle source, called the access ont AP, broadcastng to a set of K recevers over a lossy wreless channel as dected n Fg.. Transmssons from the AP to recevers are lossy wth losses dstrbuted by ndeendent dentcal ernoull rocesses wth arameter. We assume the use of block codng for NC, where denotes the sze of the codng block. Wth NC, the AP transmts random lnear combnatons of the ackets belongng to the same codng block. Hence, recevers need to receve ndeendent lnear combnatons n order to decode the orgnal ackets lease see 9] for more nformaton on random lnear codng. Throughout ths aer, we assume that feedback s relable, and hence, do not consder the overhead and comlexty of the feedback mechansm. Interested readers are referred to 8] for an analyss of the overhead of random lnear network codng. A. Dstrbuton of the Number of Transmssons Let N denote the number of transmssons of a acket by the AP untl the acket s receved by all K recevers. It s straghtforward to comute P {N n} as follows for more detals, see 6], 7] for ARQ, and 4], 5] for NC. ARQ Performance: The robablty that a node does not receve any acket out of n ackets transmtted by the AP s n. Therefore, wth robablty n the node receves at least one of the ackets. All K nodes have ndeendent losses, therefore, the robablty that every node receves at least one acket s P {N n} = n K, n. 2 NC Performance: We assume the block sze for network codng s. The robablty that a node receves at least coded ackets out of n ackets transmtted by the AP s gven by a bnomal dstrbuton. Each node needs ackets n order to decode and extract the orgnal ackets. Therefore, we obtan n K n P {N n} = n, n. 2 = K. Asymtotc Analyss The exact exressons derved n the revous subsecton do not rovde nsght about the scalng behavor of the number of transmssons wth resect to K and. In ths subsecton, we derve asymtotc exressons for the exected number of transmssons for the access ont model. In artcular, we are nterested n the asymtotc erformance of the ARQ and NC mechansms as the number of recevers becomes very large,.e., K. For NC, we only consder nfntely large block szes and assume that = ΩK, namely block sze grows to nfnty faster than the number of recevers. Interested readers are referred to 0] for relmnary results on the erformance of NC wth fnte block szes,.e., = O. Let N k denote the number of transmssons at the AP untl node k receves all the ackets one acket n ARQ, and ackets n NC. We are nterested n characterzng the followng exectaton as the erformance metrc ] E N] = E N k. 3 ARQ Performance: In ths case, N k has a geometrc dstrbuton. In other words, the robablty that node k receves the n-th transmtted acket s gven by P {N k = n} = n. 4 Therefore, E N] s the exected value of the mum of K geometrc random varables. For the sake of analyss, we aroxmate each geometrc random varable N k by an exonentally dstrbuted random varable X k wth rate µ. In order to fnd µ, we solve the equaton P {N k n} = P {X k n}, whch yelds µ = ln. We then aroxmate E N k ] by E X k ]. To comute the aroxmaton error, denoted by ɛ, we note that Therefore, E N k ] = E X k ] = P {N k > n} 5 n+ n P {X k > x} dx 6 ɛ = E N k ] E X k ] = n + e n+µ e nµ µ = n + n+ n µ = + ln. Let {X k } k =,..., K denote a set of K ndeendent exonentally dstrbuted random varables wth arameter µ. Then, usng roertes of exonentally dstrbuted random 7

3 varables, t follows that see 0] for detals ] E X] = E X k = K k= kµ = µ HK, where, HK s the K-th harmonc number. It s well-known that for large K lm HK = ln K + γ, 9 K where, γ s Euler s constant. Hence, we have lm E N] = lm K K E X] + ɛ = ln K ln + 8 γ ln + + ln. 0 From ths we conclude that E N] = Θlog K, where log K = ln K ln /. 2 NC Performance: In ths case, N k has a negatve bnomal dstrbuton, that s n P {N k = n} = n. Ths means that ackets have been receved untl acket n, and acket n s receved too. We are nterested n characterzng the exected number of transmssons er acket: E N] = ] E. 2 N k However, t s dffcult to comute E N] usng the negatve bnomal formulaton n. Fortunately, we can reresent N k by a dfferent form, whch s then amenable to analyss. In an alternatve but equvalent form, N k can be consdered as the sum of IID geometrc random varables wth arameter. Each geometrc random varable reresents the number of transmssons at the AP untl one of the ackets s receved at node k. That s N k = G k + + G k, 3 where, G k n s the number of transmssons at the AP untl node k receves the n-th acket, gven that t has already receved n ackets. For geometrc random varables we have P { G k n = } =, 4 and, E Gn] k =. Now, we rewrte 2 as follows, E N] = ] ] E = E = E N k G k + + G k ]. N k 5 We are nterested n comutng E N] as. We have lm E N] = lm E G k + + G k ] = E lm G k + + G k ] 6. Note that the G k n s are IID and hence, by alyng the law of large numbers, we obtan G k + + G k lm y substtutng nto 6, we obtan lm E N] = E C. Relablty Gan of NC = ] = = Θ. 7 8 Let N ARQ and N NC denote the number of transmssons n the case of ARQ and NC, resectvely. Defne the relablty gan of network codng as follows: Relablty Gan = E N ARQ] E N NC ], 9 where, E N ARQ ] and E N NC ] are gven by 0 and 8, resectvely. Then, the relablty gan of network codng for the access ont model s of order Θlog K as K becomes large. In the followng secton, we show that the logarthmc gan of network codng s achevable n tree toology as well n 8] we have shown that the same scalng holds for an extended access ont toology n whch recevers are allowed to communcate locally n order to recover lost ackets wthout nvolvng the access ont. III. MULTICAST OVER A TREE TOPOLOGY In ths secton, we study the erformance of dfferent relablty mechansms for relable multcast over a tree toology as dected n Fg. 2. We base our analyss on the access ont model, and derve exact and asymtotc exressons for the relablty gan of network codng. The followng relablty mechansms are consdered: End-to-End ARQ: The root of the multcast tree retransmts each acket untl t s correctly receved by all the multcast recevers. All other nodes n the tree only forward ackets they receve from ther arents to ther chldren. 2 End-to-End FEC: Ths technque s commonly referred to as rateless codng ]. Smlar to end-to-end ARQ, only the root of the multcast tree s resonsble for retransmttng a acket untl t s receved by all recevers. All other nodes only forward the ackets they receve from ther arents to ther chldren. For FECbased schemes, we assume the use of a block codng technque to create coded ackets for transmsson. 3 Lnk-by-Lnk ARQ: Every node of the multcast tree s resonsble for the relable transmsson of ackets to ts chldren. That s, a node retransmts the acket t has receved from ts arent to ts chldren untl the acket s correctly receved by all of ts chldren. Note that some chldren may receve more than one coy of the acket because of the random nature of acket losses.

4 Fg. 2. S K nodes K h h Tree toology for relable multcast. 4 Lnk-by-Lnk FEC NC: We refer to ths technque as network codng NC because codng s erformed not only at the source but also wthn the network. That s, every node s resonsble for relable delvery of the block of ackets t has receved from ts arent to ts chldren. Wth NC, each node erforms rateless codng to delver a block of ackets to ts chldren. Note that lnk-by-lnk relablty mechansms are equvalent to the access ont model that we studed n the revous secton. Essentally, each node s resonsble for the relable delvery of the ackets t has receved from ts arent to ts chldren. Therefore, the exected number of transmssons at each node of the tree can be readly comuted from and 2, for ARQ and NC, resectvely. A. Dstrbuton of the Number of Transmssons In ths subsecton, we study the erformance of end-to-end relablty mechansms based on ARQ and FEC. Let N r denote the number of transmssons of a acket to the root of a subtree of heght r from ts arent before the acket s receved by all nodes of the subtree. For the source of a multcast tree of heght h, we nterret N = N h as the number of acket transmssons at the source untl the acket s receved by all of the multcast recevers. Defne F r n as follows: F r n = P {N r n}, 0 r h, n. 20 Smlar to 6], we develo recursve relatons to comute F r n. Frst, consder the case of r > 0, and denote the root of the subtree by s. The robablty that ackets out of n ackets that have been transmtted to node s are receved by node s s gven by a bnomal dstrbuton, P { n} = n n, 0 n. 2 Note that for the root of the multcast tree, the error robablty s zero,.e., = 0, and hence P { n} =, f = n, and P { n} = 0, otherwse. If node s receves ackets, t wll broadcast the receved ackets to ts chldren. For each chld, the robablty that all nodes of the subtree rooted at that chld receve a acket s gven by F r. Snce the chldren of a node have ndeendent acket losses, the robablty that all of the nodes of the subtrees rooted at chldren of node s receve a acket s gven by {F r } K, whch we denote by Fr K for notatonal smlcty. Therefore, by summng over all ossble values of, we obtan n n F r n = n F r, K 0 < r < h. =0 22 Hence, we have a recursve equaton for comutng F r n for r > 0. Interestngly, comutng F r n for r > 0 s ndeendent of the aled relablty mechansm. Next, we comute F 0 n for the leaves of the multcast tree as follows. End-to-End ARQ: The robablty that a leaf node does not receve any acket out of n transmtted ackets s gven by n. Therefore, wth robablty n the node receves at least one coy of the acket. Therefore, F 0 n = n, n End-to-End FEC: The robablty that a node receves at least coded ackets out of n transmtted ackets s gven by a bnomal dstrbuton. Therefore, n n F 0 n = n, n. 24 = So far, we have comuted F r n for all subtrees of heght r. As mentoned earler, for the root of the multcast tree, we have P {n n} =. Hence, the exresson for F h n can be smlfed as F h n = F K h n, where, F h n s gven by 22. That s P {N n} = F K h n.. Exected Number of Transmssons Usng the exressons for P {N n}, we can comute the exected number of transmssons at the root of the multcast tree,.e., E N]. Next, we comute the exected number of transmssons n the multcast tree not just at the root untl a acket s receved by all recevers. Let T denote the total number of transmssons n the multcast tree untl a acket s receved by all recevers. We are nterested n comutng E T ]. Lnk-by-Lnk Mechansms: Consder a multcast tree of heght h. At heght r of the tree, there are K h r nodes. For each of them, the exected number of transmssons E N] can be comuted from and 2, for ARQ and NC, resectvely. Ths results n E T ] = E N] h r= K h r = Kh E N]. 25 K Note that for K =, we have E T ] = he N]. 2 End-to-End Mechansms: Frst, we comute the exected number of transmssons n the tree for each transmsson at the root of the multcast tree. Let X r denote the number of transmssons n a subtree of heght r for each transmsson at the root of the subtree. Then, K E X r ] = + j=0 K j = + K E X r ], j K j je X r ] 26

5 where, X 0 = 0. The dea s that, for each acket receved at the root of a subtree, there s one transmsson at the root of the subtree. If j chldren out of the K chldren receve the acket, then n average, each of them wll have E X r ] transmssons n ther subtrees. Ths yelds E X r ] = Kqr Kq, 27 where, q =. Therefore, the exected number of transmssons er acket n the multcast tree s gven by E T ] = E X h ] E N] = Kqh E N]. 28 Kq Note that f Kq =, then t follows that E T ] = he N]. C. Asymtotc Analyss For the lnk-by-lnk relablty mechansms, the same bounds we derved for the access ont model aly to the tree tology as well. For end-to-end mechansms, we consder the case of havng K exonentally growng to nfnty,.e., log K. In ths case, we can aly the results from the access ont model to derve asymtotc exressons for the exected number of transmssons at the root of the multcast tree, and hence, wthn the tree. ARQ Performance: ased on the analyss of the access ont model, n order to delver a coy of a message to all leaf nodes,.e., nodes at heght 0, each node at heght needs to transmt the message Θlog K tmes. The key dea s that because log K, the law of large numbers can be aled n a fashon smlar to the access ont model. Hence, the nodes at heght 2 need to transmt only c = tmes more n order for each node at heght to receve log K coes of the acket. Therefore, we have E N] = Θ c h log K FEC Performance: We have the same argument for endto-end FEC excet that at each level of the tree, we need to retransmt a block of ackets only a constant number of tmes,.e., c = tmes. Therefore, we obtan E N] = Θ c h. 30 Table I has summarzed the relablty gan of network codng comared to other relablty mechansms for multcast n a tree toology. Interestngly, the asymtotc gan of network codng comared to end-to-end FEC,.e., rateless codng, s just a constant factor. However, deendng on the heght of the multcast tree h, and the loss robablty, the constant can be arbtrary large. IV. CONCLUSION In ths aer, we studed the beneft of network codng for relable multcast n lossy wreless networks. We analyzed the access ont model n whch an access ont broadcasts ackets to a set of K recevers. We showed that, for large codng blocks, the relablty gan of network codng comared Relablty Mechansm Relablty Gan Lnk-by-Lnk ARQ Θlog K End-to-End ARQ Θc h log K End-to-End FEC Θc h TALE I RELIAILITY GAIN OF NC IN A TREE TOPOLOGY OF HEIGHT h c =. to ARQ s of order Θlog K. We then used the access ont model to study the relablty gan of network codng n a tree-based relable multcast. For the tree toology, four dfferent relablty mechansms based on ARQ and NC were consdered. We showed that NC acheves the best erformance n terms of the requred number of transmssons n the tree. We also extended the access ont model by allowng nter recever communcaton to recover lost ackets, and showed that stll the log K relablty gan can be acheved whle mnmzng the number of transmssons at the access ont 8]. In the future, we would lke to extend our analyss to more comlcated network toologes such as a grd wth sgnfcant amount of ath dversty. V. ACKNOWLEDGEMENTS Ths research was suorted by DARPA CMANET and US/UK ITA rograms. REFERENCES ] R. Ahlswede, N. Ca, S.-Y. R. L, and R. W. Yeung, Network nformaton flow, IEEE Trans. Inform. Theory, vol. 46, no. 4, , July ] S. Katt, H. Rahul, W. Hu, D. Katab, M. M. Médard, and J. Crowcroft, XORs n the ar: Practcal wreless network codng, n Proc. ACM SIGCOMM, Psa, Italy, Setember ] D. S. Lun, M. Medard, and M. Effros, On codng for relable communcaton over acket networks, n Proc. Allerton, Urbana Chamagn, USA, Setember ] A. Erylmaz, A. Ozdaglar, and M. Medard, On delay erformance gans from network codng, n Proc. CISS, Prnceton, USA, March 2006, ] D. Nguyen, T. Nguyen, and. ose, Wreless broadcastng usng network codng, n Proc. NetCod, san Dego, USA, January ] P. hagwat, P. P. Mshra, and S. K. Trath, Effect of toology on erformance of relable multcast communcatons, n Proc. IEEE INFOCOM, Toronto, Canada, June 994, ] J. Nonnenmacher and E. W. ersack, Performance modellng of relable multcast transmsson, n Proc. IEEE INFOCOM, Kobe, Jaan, Arl 997, ] M. Ghader, D. Towsley, and J. Kurose, Relablty gan of network codng n lossy wreless networks, Deartment of Comuter Scence, Unversty of Calgary, Tech. Re , January Onlne]. Avalable: htt:// mghader/docs/relex.df 9] T. Ho, M. Medard, R. Koetter, D. R. Karger, M. Effros, J. Sh, and. Leong, A random lnear network codng aroach to multcast, IEEE Trans. Inform. Theory, vol. 52, no. 0, , October ] M. Ghader, D. Towsley, and J. Kurose, Relablty beneft of network codng, Deartment of Comuter Scence, Unversty of Massachusetts Amherst, Tech. Re. TR-07-08, February Onlne]. Avalable: htt:// mghader/docs/relablty.df ] J. yers, M. Luby, M. Mtzenmacher, and A. Rege, A dgtal fountan aroach to relable dstrbuton of bulk data, n Proc. ACM SIGCOMM, Vancouver, Canada, February 998.

Managing Capacity Through Reward Programs. on-line companion page. Byung-Do Kim Seoul National University College of Business Administration

Managing Capacity Through Reward Programs. on-line companion page. Byung-Do Kim Seoul National University College of Business Administration Managng Caacty Through eward Programs on-lne comanon age Byung-Do Km Seoul Natonal Unversty College of Busness Admnstraton Mengze Sh Unversty of Toronto otman School of Management Toronto ON M5S E6 Canada

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

A Mathematical Theory of Communication. Claude Shannon s paper presented by Kate Jenkins 2/19/00

A Mathematical Theory of Communication. Claude Shannon s paper presented by Kate Jenkins 2/19/00 A Mathematcal Theory of Communcaton Claude hannon s aer resented by Kate Jenkns 2/19/00 Publshed n two arts, July 1948 and October 1948 n the Bell ystem Techncal Journal Foundng aer of Informaton Theory

More information

TCP NewReno Throughput in the Presence of Correlated Losses: The Slow-but-Steady Variant

TCP NewReno Throughput in the Presence of Correlated Losses: The Slow-but-Steady Variant TCP NewReno Throughut n the Presence of Correlated Losses: The Slow-but-Steady Varant Roman Dunaytsev, Yevgen Koucheryavy, Jarmo Harju Insttute of Communcatons Engneerng Tamere Unversty of Technology Tamere,

More information

Digital PI Controller Equations

Digital PI Controller Equations Ver. 4, 9 th March 7 Dgtal PI Controller Equatons Probably the most common tye of controller n ndustral ower electroncs s the PI (Proortonal - Integral) controller. In feld orented motor control, PI controllers

More information

Algorithms for factoring

Algorithms for factoring CSA E0 235: Crytograhy Arl 9,2015 Instructor: Arta Patra Algorthms for factorng Submtted by: Jay Oza, Nranjan Sngh Introducton Factorsaton of large ntegers has been a wdely studed toc manly because of

More information

What Independencies does a Bayes Net Model? Bayesian Networks: Independencies and Inference. Quick proof that independence is symmetric

What Independencies does a Bayes Net Model? Bayesian Networks: Independencies and Inference. Quick proof that independence is symmetric Bayesan Networks: Indeendences and Inference Scott Daves and ndrew Moore Note to other teachers and users of these sldes. ndrew and Scott would be delghted f you found ths source materal useful n gvng

More information

Non-Ideality Through Fugacity and Activity

Non-Ideality Through Fugacity and Activity Non-Idealty Through Fugacty and Actvty S. Patel Deartment of Chemstry and Bochemstry, Unversty of Delaware, Newark, Delaware 19716, USA Corresondng author. E-mal: saatel@udel.edu 1 I. FUGACITY In ths dscusson,

More information

An application of generalized Tsalli s-havrda-charvat entropy in coding theory through a generalization of Kraft inequality

An application of generalized Tsalli s-havrda-charvat entropy in coding theory through a generalization of Kraft inequality Internatonal Journal of Statstcs and Aled Mathematcs 206; (4): 0-05 ISS: 2456-452 Maths 206; (4): 0-05 206 Stats & Maths wwwmathsjournalcom Receved: 0-09-206 Acceted: 02-0-206 Maharsh Markendeshwar Unversty,

More information

Not-for-Publication Appendix to Optimal Asymptotic Least Aquares Estimation in a Singular Set-up

Not-for-Publication Appendix to Optimal Asymptotic Least Aquares Estimation in a Singular Set-up Not-for-Publcaton Aendx to Otmal Asymtotc Least Aquares Estmaton n a Sngular Set-u Antono Dez de los Ros Bank of Canada dezbankofcanada.ca December 214 A Proof of Proostons A.1 Proof of Prooston 1 Ts roof

More information

Dr. Shalabh Department of Mathematics and Statistics Indian Institute of Technology Kanpur

Dr. Shalabh Department of Mathematics and Statistics Indian Institute of Technology Kanpur Analyss of Varance and Desgn of Exerments-I MODULE III LECTURE - 2 EXPERIMENTAL DESIGN MODELS Dr. Shalabh Deartment of Mathematcs and Statstcs Indan Insttute of Technology Kanur 2 We consder the models

More information

Joint Decoding of Content-Replication Codes for Flash Memories

Joint Decoding of Content-Replication Codes for Flash Memories Ffty-thrd Annual Allerton Conference Allerton House, UIUC, Illnos, USA Setember 29 - October 2, 2015 Jont Decodng of Content-Relcaton Codes for Flash Memores Qng L, Huan Chang, Anxao (Andrew) Jang, and

More information

Priority Queuing with Finite Buffer Size and Randomized Push-out Mechanism

Priority Queuing with Finite Buffer Size and Randomized Push-out Mechanism ICN 00 Prorty Queung wth Fnte Buffer Sze and Randomzed Push-out Mechansm Vladmr Zaborovsy, Oleg Zayats, Vladmr Muluha Polytechncal Unversty, Sant-Petersburg, Russa Arl 4, 00 Content I. Introducton II.

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

Fuzzy approach to solve multi-objective capacitated transportation problem

Fuzzy approach to solve multi-objective capacitated transportation problem Internatonal Journal of Bonformatcs Research, ISSN: 0975 087, Volume, Issue, 00, -0-4 Fuzzy aroach to solve mult-objectve caactated transortaton roblem Lohgaonkar M. H. and Bajaj V. H.* * Deartment of

More information

2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period

2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period -Adc Comlexty of a Seuence Obtaned from a Perodc Bnary Seuence by Ether Insertng or Deletng Symbols wthn One Perod ZHAO Lu, WEN Qao-yan (State Key Laboratory of Networng and Swtchng echnology, Bejng Unversty

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

The optimal delay of the second test is therefore approximately 210 hours earlier than =2.

The optimal delay of the second test is therefore approximately 210 hours earlier than =2. THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple

More information

Numerical Heat and Mass Transfer

Numerical Heat and Mass Transfer Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and

More information

Hidden Markov Model Cheat Sheet

Hidden Markov Model Cheat Sheet Hdden Markov Model Cheat Sheet (GIT ID: dc2f391536d67ed5847290d5250d4baae103487e) Ths document s a cheat sheet on Hdden Markov Models (HMMs). It resembles lecture notes, excet that t cuts to the chase

More information

A Quadratic Cumulative Production Model for the Material Balance of Abnormally-Pressured Gas Reservoirs F.E. Gonzalez M.S.

A Quadratic Cumulative Production Model for the Material Balance of Abnormally-Pressured Gas Reservoirs F.E. Gonzalez M.S. Natural as Engneerng A Quadratc Cumulatve Producton Model for the Materal Balance of Abnormally-Pressured as Reservors F.E. onale M.S. Thess (2003) T.A. Blasngame, Texas A&M U. Deartment of Petroleum Engneerng

More information

Matching Dyadic Distributions to Channels

Matching Dyadic Distributions to Channels Matchng Dyadc Dstrbutons to Channels G. Böcherer and R. Mathar Insttute for Theoretcal Informaton Technology RWTH Aachen Unversty, 5256 Aachen, Germany Emal: {boecherer,mathar}@t.rwth-aachen.de Abstract

More information

A Quadratic Cumulative Production Model for the Material Balance of Abnormally-Pressured Gas Reservoirs F.E. Gonzalez M.S.

A Quadratic Cumulative Production Model for the Material Balance of Abnormally-Pressured Gas Reservoirs F.E. Gonzalez M.S. Formaton Evaluaton and the Analyss of Reservor Performance A Quadratc Cumulatve Producton Model for the Materal Balance of Abnormally-Pressured as Reservors F.E. onale M.S. Thess (2003) T.A. Blasngame,

More information

Rate-Memory Trade-off for the Two-User Broadcast Caching Network with Correlated Sources

Rate-Memory Trade-off for the Two-User Broadcast Caching Network with Correlated Sources Rate-Memory Trade-off for the Two-User Broadcast Cachng Network wth Correlated Sources Parsa Hassanzadeh, Antona M. Tulno, Jame Llorca, Elza Erkp arxv:705.0466v [cs.it] May 07 Abstract Ths paper studes

More information

Confidence intervals for weighted polynomial calibrations

Confidence intervals for weighted polynomial calibrations Confdence ntervals for weghted olynomal calbratons Sergey Maltsev, Amersand Ltd., Moscow, Russa; ur Kalambet, Amersand Internatonal, Inc., Beachwood, OH e-mal: kalambet@amersand-ntl.com htt://www.chromandsec.com

More information

Dr. Shalabh Department of Mathematics and Statistics Indian Institute of Technology Kanpur

Dr. Shalabh Department of Mathematics and Statistics Indian Institute of Technology Kanpur Analyss of Varance and Desgn of Exerments-I MODULE II LECTURE - GENERAL LINEAR HYPOTHESIS AND ANALYSIS OF VARIANCE Dr. Shalabh Deartment of Mathematcs and Statstcs Indan Insttute of Technology Kanur 3.

More information

Michael Batty. Alan Wilson Plenary Session Entropy, Complexity, & Information in Spatial Analysis

Michael Batty. Alan Wilson Plenary Session Entropy, Complexity, & Information in Spatial Analysis Alan Wlson Plenary Sesson Entroy, Comlexty, & Informaton n Satal Analyss Mchael Batty m.batty@ucl.ac.uk @jmchaelbatty htt://www.comlexcty.nfo/ htt://www.satalcomlexty.nfo/ for Advanced Satal Analyss CentreCentre

More information

Advanced Topics in Optimization. Piecewise Linear Approximation of a Nonlinear Function

Advanced Topics in Optimization. Piecewise Linear Approximation of a Nonlinear Function Advanced Tocs n Otmzaton Pecewse Lnear Aroxmaton of a Nonlnear Functon Otmzaton Methods: M8L Introducton and Objectves Introducton There exsts no general algorthm for nonlnear rogrammng due to ts rregular

More information

A new Approach for Solving Linear Ordinary Differential Equations

A new Approach for Solving Linear Ordinary Differential Equations , ISSN 974-57X (Onlne), ISSN 974-5718 (Prnt), Vol. ; Issue No. 1; Year 14, Copyrght 13-14 by CESER PUBLICATIONS A new Approach for Solvng Lnear Ordnary Dfferental Equatons Fawz Abdelwahd Department of

More information

System in Weibull Distribution

System in Weibull Distribution Internatonal Matheatcal Foru 4 9 no. 9 94-95 Relablty Equvalence Factors of a Seres-Parallel Syste n Webull Dstrbuton M. A. El-Dacese Matheatcs Departent Faculty of Scence Tanta Unversty Tanta Egypt eldacese@yahoo.co

More information

arxiv: v1 [math.ho] 18 May 2008

arxiv: v1 [math.ho] 18 May 2008 Recurrence Formulas for Fbonacc Sums Adlson J. V. Brandão, João L. Martns 2 arxv:0805.2707v [math.ho] 8 May 2008 Abstract. In ths artcle we present a new recurrence formula for a fnte sum nvolvng the Fbonacc

More information

Neryškioji dichotominių testo klausimų ir socialinių rodiklių diferencijavimo savybių klasifikacija

Neryškioji dichotominių testo klausimų ir socialinių rodiklių diferencijavimo savybių klasifikacija Neryškoj dchotomnų testo klausmų r socalnų rodklų dferencjavmo savybų klasfkacja Aleksandras KRYLOVAS, Natalja KOSAREVA, Julja KARALIŪNAITĖ Technologcal and Economc Development of Economy Receved 9 May

More information

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA 4 Analyss of Varance (ANOVA) 5 ANOVA 51 Introducton ANOVA ANOVA s a way to estmate and test the means of multple populatons We wll start wth one-way ANOVA If the populatons ncluded n the study are selected

More information

Departure Process from a M/M/m/ Queue

Departure Process from a M/M/m/ Queue Dearture rocess fro a M/M// Queue Q - (-) Q Q3 Q4 (-) Knowledge of the nature of the dearture rocess fro a queue would be useful as we can then use t to analyze sle cases of queueng networs as shown. The

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Comparing two Quantiles: the Burr Type X and Weibull Cases

Comparing two Quantiles: the Burr Type X and Weibull Cases IOSR Journal of Mathematcs (IOSR-JM) e-issn: 78-578, -ISSN: 39-765X. Volume, Issue 5 Ver. VII (Se. - Oct.06), PP 8-40 www.osrjournals.org Comarng two Quantles: the Burr Tye X and Webull Cases Mohammed

More information

Department of Statistics University of Toronto STA305H1S / 1004 HS Design and Analysis of Experiments Term Test - Winter Solution

Department of Statistics University of Toronto STA305H1S / 1004 HS Design and Analysis of Experiments Term Test - Winter Solution Department of Statstcs Unversty of Toronto STA35HS / HS Desgn and Analyss of Experments Term Test - Wnter - Soluton February, Last Name: Frst Name: Student Number: Instructons: Tme: hours. Ads: a non-programmable

More information

Lecture 4: November 17, Part 1 Single Buffer Management

Lecture 4: November 17, Part 1 Single Buffer Management Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input

More information

Assortment Optimization under MNL

Assortment Optimization under MNL Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.

More information

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng

More information

Logistic regression with one predictor. STK4900/ Lecture 7. Program

Logistic regression with one predictor. STK4900/ Lecture 7. Program Logstc regresson wth one redctor STK49/99 - Lecture 7 Program. Logstc regresson wth one redctor 2. Maxmum lkelhood estmaton 3. Logstc regresson wth several redctors 4. Devance and lkelhood rato tests 5.

More information

Encoded packet-assisted Rescue Approach to Reliable Unicast in Wireless Networks

Encoded packet-assisted Rescue Approach to Reliable Unicast in Wireless Networks Encoded pacet-asssted Rescue Approach to Relable Uncast n Wreless Networs Zhheng Zhou, Lang Zhou, Xng Wang, Yuanquan Tan Natonal Key Laboratory of Communcaton Unversty of Electronc Scence and Tech of Chna

More information

SELECTION OF MIXED SAMPLING PLANS WITH CONDITIONAL DOUBLE SAMPLING PLAN AS ATTRIBUTE PLAN INDEXED THROUGH MAPD AND LQL USING IRPD

SELECTION OF MIXED SAMPLING PLANS WITH CONDITIONAL DOUBLE SAMPLING PLAN AS ATTRIBUTE PLAN INDEXED THROUGH MAPD AND LQL USING IRPD R. Samath Kumar, R. Vaya Kumar, R. Radhakrshnan /Internatonal Journal Of Comutatonal Engneerng Research / ISSN: 50 005 SELECTION OF MIXED SAMPLING PLANS WITH CONDITIONAL DOUBLE SAMPLING PLAN AS ATTRIBUTE

More information

Topology optimization of plate structures subject to initial excitations for minimum dynamic performance index

Topology optimization of plate structures subject to initial excitations for minimum dynamic performance index th World Congress on Structural and Multdsclnary Otmsaton 7 th -2 th, June 25, Sydney Australa oology otmzaton of late structures subject to ntal exctatons for mnmum dynamc erformance ndex Kun Yan, Gengdong

More information

1 Bref Introducton Ths memo reorts artal results regardng the task of testng whether a gven bounded-degree grah s an exander. The model s of testng gr

1 Bref Introducton Ths memo reorts artal results regardng the task of testng whether a gven bounded-degree grah s an exander. The model s of testng gr On Testng Exanson n Bounded-Degree Grahs Oded Goldrech Det. of Comuter Scence Wezmann Insttute of Scence Rehovot, Israel oded@wsdom.wezmann.ac.l Dana Ron Det. of EE { Systems Tel Avv Unversty Ramat Avv,

More information

Performance Evaluation of Deadline Monotonic Policy over protocol

Performance Evaluation of Deadline Monotonic Policy over protocol erformance Evaluaton of Deadlne Monotonc olcy over 80. rotocol Ines El Korb and Lela Azouz Sadane Natonal School of Comuter Scence Unversty of Manouba 00 Tunsa Emals: nes.korb@gmal.com Lela.sadane@ens.rnu.tn

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

SIO 224. m(r) =(ρ(r),k s (r),µ(r))

SIO 224. m(r) =(ρ(r),k s (r),µ(r)) SIO 224 1. A bref look at resoluton analyss Here s some background for the Masters and Gubbns resoluton paper. Global Earth models are usually found teratvely by assumng a startng model and fndng small

More information

Derivatives of Value at Risk and Expected Shortfall

Derivatives of Value at Risk and Expected Shortfall Dervatves of Value at Rsk and Exected Shortfall November 2003 Hans Rau-Bredow hans.rau-bredow@mal.un-wuerzburg.de Dr. Hans Rau-Bredow Unversty of Cologne; Unversty of Würzburg Leo Wesmantel Str. 4 D-97074

More information

Dynamic Method of Network Coding Based Retransmission for Wireless Multicast

Dynamic Method of Network Coding Based Retransmission for Wireless Multicast Dynamc Method of Networ Codng Based Retransmsson for Wreless Multcast Houy L State Key Lab of ISN Xdan Unversty X an Chna Emal: lhouy2013@hotmal.com Yng L State Key Lab of ISN Xdan Unversty X an Chna yl@mal.xdan.edu.com

More information

6. Hamilton s Equations

6. Hamilton s Equations 6. Hamlton s Equatons Mchael Fowler A Dynamcal System s Path n Confguraton Sace and n State Sace The story so far: For a mechancal system wth n degrees of freedom, the satal confguraton at some nstant

More information

Combinational Circuit Design

Combinational Circuit Design Combnatonal Crcut Desgn Part I: Desgn Procedure and Examles Part II : Arthmetc Crcuts Part III : Multlexer, Decoder, Encoder, Hammng Code Combnatonal Crcuts n nuts Combnatonal Crcuts m oututs A combnatonal

More information

Multipath Wireless Network Coding: A Population Game Perspective

Multipath Wireless Network Coding: A Population Game Perspective Multath Wreless Network Codng: A Poulaton Game Persectve Vnth Reddy, rnvas hakkotta, Alex rntson and Natarajan Gautam Det. of ECE, Texas A&M Unversty Det. of IE, Texas A&M Unversty Emal: {vnth reddy, sshakkot,

More information

Using Genetic Algorithms in System Identification

Using Genetic Algorithms in System Identification Usng Genetc Algorthms n System Identfcaton Ecaterna Vladu Deartment of Electrcal Engneerng and Informaton Technology, Unversty of Oradea, Unverstat, 410087 Oradea, Româna Phone: +40259408435, Fax: +40259408408,

More information

Power Allocation/Beamforming for DF MIMO Two-Way Relaying: Relay and Network Optimization

Power Allocation/Beamforming for DF MIMO Two-Way Relaying: Relay and Network Optimization Power Allocaton/Beamformng for DF MIMO Two-Way Relayng: Relay and Network Optmzaton Je Gao, Janshu Zhang, Sergy A. Vorobyov, Ha Jang, and Martn Haardt Dept. of Electrcal & Computer Engneerng, Unversty

More information

Analysis of Discrete Time Queues (Section 4.6)

Analysis of Discrete Time Queues (Section 4.6) Analyss of Dscrete Tme Queues (Secton 4.6) Copyrght 2002, Sanjay K. Bose Tme axs dvded nto slots slot slot boundares Arrvals can only occur at slot boundares Servce to a job can only start at a slot boundary

More information

On Network Coding of Independent and Dependent Sources in Line Networks

On Network Coding of Independent and Dependent Sources in Line Networks On Network Codng of Independent and Dependent Sources n Lne Networks Mayank Baksh, Mchelle Effros, WeHsn Gu, Ralf Koetter Department of Electrcal Engneerng Department of Electrcal Engneerng Calforna Insttute

More information

On New Selection Procedures for Unequal Probability Sampling

On New Selection Procedures for Unequal Probability Sampling Int. J. Oen Problems Comt. Math., Vol. 4, o. 1, March 011 ISS 1998-66; Coyrght ICSRS Publcaton, 011 www.-csrs.org On ew Selecton Procedures for Unequal Probablty Samlng Muhammad Qaser Shahbaz, Saman Shahbaz

More information

2.3 Nilpotent endomorphisms

2.3 Nilpotent endomorphisms s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms

More information

Queueing Networks II Network Performance

Queueing Networks II Network Performance Queueng Networks II Network Performance Davd Tpper Assocate Professor Graduate Telecommuncatons and Networkng Program Unversty of Pttsburgh Sldes 6 Networks of Queues Many communcaton systems must be modeled

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

Coded Caching with Heterogenous Cache Sizes

Coded Caching with Heterogenous Cache Sizes Coded Cachng wth Heterogenous Cache Szes Snong Wang Department of Electronc Engneerng, Shangha Jao Tong Unversty {snwang}@sjtueducn arxv:50403v [csit] 3 Jul 05 Abstract We nvestgate the coded cachng scheme

More information

Burst Cloning: A Proactive Scheme to Reduce Data Loss in Optical Burst-Switched Networks

Burst Cloning: A Proactive Scheme to Reduce Data Loss in Optical Burst-Switched Networks Burst Clonng: A Proactve Scheme to Reduce Data Loss n Optcal Burst-Swtched Networks Xaodong Huang, Vnod M. Vokkarane, and Jason P. Jue Department of Computer Scence, The Unversty of Texas at Dallas, TX

More information

Timing-Driven Placement. Outline

Timing-Driven Placement. Outline Tmng-Drven Placement DAC 97 Tutoral 1997 Blaauw, Cong, Tsay Outlne Background + Net-Based Aroach Zero-Slack Algorthm Modfed Zero-Slack Algorthm Path-Based Aroach Analytcal Aroach Fall 99, Prof. Le He 1

More information

Lecture 10 Support Vector Machines II

Lecture 10 Support Vector Machines II Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed

More information

290 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: FUNDAMENTAL THEORY AND APPLICATIONS, VOL. 45, NO. 3, MARCH H d (e j! ;e j!

290 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: FUNDAMENTAL THEORY AND APPLICATIONS, VOL. 45, NO. 3, MARCH H d (e j! ;e j! 9 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: FUNDAMENTAL THEORY AND APPLICATIONS, VOL. 45, NO. 3, MARCH 998 Transactons Brefs Two-Dmensonal FIR Notch Flter Desgn Usng Sngular Value Decomoston S.-C. Pe,

More information

/ n ) are compared. The logic is: if the two

/ n ) are compared. The logic is: if the two STAT C141, Sprng 2005 Lecture 13 Two sample tests One sample tests: examples of goodness of ft tests, where we are testng whether our data supports predctons. Two sample tests: called as tests of ndependence

More information

Refined Coding Bounds for Network Error Correction

Refined Coding Bounds for Network Error Correction Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department

More information

BOOTSTRAP METHOD FOR TESTING OF EQUALITY OF SEVERAL MEANS. M. Krishna Reddy, B. Naveen Kumar and Y. Ramu

BOOTSTRAP METHOD FOR TESTING OF EQUALITY OF SEVERAL MEANS. M. Krishna Reddy, B. Naveen Kumar and Y. Ramu BOOTSTRAP METHOD FOR TESTING OF EQUALITY OF SEVERAL MEANS M. Krshna Reddy, B. Naveen Kumar and Y. Ramu Department of Statstcs, Osmana Unversty, Hyderabad -500 007, Inda. nanbyrozu@gmal.com, ramu0@gmal.com

More information

An Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control

An Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control An Upper Bound on SINR Threshold for Call Admsson Control n Multple-Class CDMA Systems wth Imperfect ower-control Mahmoud El-Sayes MacDonald, Dettwler and Assocates td. (MDA) Toronto, Canada melsayes@hotmal.com

More information

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results. Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson

More information

One-sided finite-difference approximations suitable for use with Richardson extrapolation

One-sided finite-difference approximations suitable for use with Richardson extrapolation Journal of Computatonal Physcs 219 (2006) 13 20 Short note One-sded fnte-dfference approxmatons sutable for use wth Rchardson extrapolaton Kumar Rahul, S.N. Bhattacharyya * Department of Mechancal Engneerng,

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

Supplementary Material for Spectral Clustering based on the graph p-laplacian

Supplementary Material for Spectral Clustering based on the graph p-laplacian Sulementary Materal for Sectral Clusterng based on the grah -Lalacan Thomas Bühler and Matthas Hen Saarland Unversty, Saarbrücken, Germany {tb,hen}@csun-sbde May 009 Corrected verson, June 00 Abstract

More information

Lecture 9: Converse of Shannon s Capacity Theorem

Lecture 9: Converse of Shannon s Capacity Theorem Error Correctng Codes: Combnatorcs, Algorthms and Alcatons (Fall 2007) Lecture 9: Converse of Shannon s Caacty Theorem Setember 17, 2007 Lecturer: Atr Rudra Scrbe: Thanh-Nhan Nguyen & Atr Rudra In the

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

Comparison of Outlier Detection Methods in Crossover Design Bioequivalence Studies

Comparison of Outlier Detection Methods in Crossover Design Bioequivalence Studies Journal of Pharmacy and Nutrton Scences, 01,, 16-170 16 Comarson of Outler Detecton Methods n Crossover Desgn Boequvalence Studes A. Rasheed 1,*, T. Ahmad,# and J.S. Sddq,# 1 Deartment of Research, Dow

More information

Analysis of Queuing Delay in Multimedia Gateway Call Routing

Analysis of Queuing Delay in Multimedia Gateway Call Routing Analyss of Queung Delay n Multmeda ateway Call Routng Qwe Huang UTtarcom Inc, 33 Wood Ave. outh Iseln, NJ 08830, U..A Errol Lloyd Computer Informaton cences Department, Unv. of Delaware, Newark, DE 976,

More information

Differential Polynomials

Differential Polynomials JASS 07 - Polynomals: Ther Power and How to Use Them Dfferental Polynomals Stephan Rtscher March 18, 2007 Abstract Ths artcle gves an bref ntroducton nto dfferental polynomals, deals and manfolds and ther

More information

Error Probability for M Signals

Error Probability for M Signals Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem.

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem. Lecture 14 (03/27/18). Channels. Decodng. Prevew of the Capacty Theorem. A. Barg The concept of a communcaton channel n nformaton theory s an abstracton for transmttng dgtal (and analog) nformaton from

More information

Exercises of Chapter 2

Exercises of Chapter 2 Exercses of Chapter Chuang-Cheh Ln Department of Computer Scence and Informaton Engneerng, Natonal Chung Cheng Unversty, Mng-Hsung, Chay 61, Tawan. Exercse.6. Suppose that we ndependently roll two standard

More information

Introduction to Vapor/Liquid Equilibrium, part 2. Raoult s Law:

Introduction to Vapor/Liquid Equilibrium, part 2. Raoult s Law: CE304, Sprng 2004 Lecture 4 Introducton to Vapor/Lqud Equlbrum, part 2 Raoult s Law: The smplest model that allows us do VLE calculatons s obtaned when we assume that the vapor phase s an deal gas, and

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

Journal of Multivariate Analysis

Journal of Multivariate Analysis Journal of Multvarate Analyss 07 (202) 232 243 Contents lsts avalable at ScVerse ScenceDrect Journal of Multvarate Analyss journal homeage: www.elsever.com/locate/jmva James Sten tye estmators of varances

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

Lecture 3 Stat102, Spring 2007

Lecture 3 Stat102, Spring 2007 Lecture 3 Stat0, Sprng 007 Chapter 3. 3.: Introducton to regresson analyss Lnear regresson as a descrptve technque The least-squares equatons Chapter 3.3 Samplng dstrbuton of b 0, b. Contnued n net lecture

More information

Lecture 3 Examples and Problems

Lecture 3 Examples and Problems Lecture 3 Examles and Problems Mechancs & thermodynamcs Equartton Frst Law of Thermodynamcs Ideal gases Isothermal and adabatc rocesses Readng: Elements Ch. 1-3 Lecture 3, 1 Wllam Thomson (1824 1907) a.k.a.

More information

Parton Model. 2 q Q, 1

Parton Model. 2 q Q, 1 Parton Model How do we exect the structure functons w and w to behave? It s nstructve to consder some secal cases: ) e e elastc scatterng from a ont-lke roton w, q q q w, q q m m m Defnng and notng that

More information

Generalized Linear Methods

Generalized Linear Methods Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set

More information

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong

More information

( ) 2 ( ) ( ) Problem Set 4 Suggested Solutions. Problem 1

( ) 2 ( ) ( ) Problem Set 4 Suggested Solutions. Problem 1 Problem Set 4 Suggested Solutons Problem (A) The market demand functon s the soluton to the followng utlty-maxmzaton roblem (UMP): The Lagrangean: ( x, x, x ) = + max U x, x, x x x x st.. x + x + x y x,

More information

Random Partitions of Samples

Random Partitions of Samples Random Parttons of Samples Klaus Th. Hess Insttut für Mathematsche Stochastk Technsche Unverstät Dresden Abstract In the present paper we construct a decomposton of a sample nto a fnte number of subsamples

More information

Notes prepared by Prof Mrs) M.J. Gholba Class M.Sc Part(I) Information Technology

Notes prepared by Prof Mrs) M.J. Gholba Class M.Sc Part(I) Information Technology Inverse transformatons Generaton of random observatons from gven dstrbutons Assume that random numbers,,, are readly avalable, where each tself s a random varable whch s unformly dstrbuted over the range(,).

More information

PARTIAL QUOTIENTS AND DISTRIBUTION OF SEQUENCES. Department of Mathematics University of California Riverside, CA

PARTIAL QUOTIENTS AND DISTRIBUTION OF SEQUENCES. Department of Mathematics University of California Riverside, CA PARTIAL QUOTIETS AD DISTRIBUTIO OF SEQUECES 1 Me-Chu Chang Deartment of Mathematcs Unversty of Calforna Rversde, CA 92521 mcc@math.ucr.edu Abstract. In ths aer we establsh average bounds on the artal quotents

More information

A Note on Bound for Jensen-Shannon Divergence by Jeffreys

A Note on Bound for Jensen-Shannon Divergence by Jeffreys OPEN ACCESS Conference Proceedngs Paper Entropy www.scforum.net/conference/ecea- A Note on Bound for Jensen-Shannon Dvergence by Jeffreys Takuya Yamano, * Department of Mathematcs and Physcs, Faculty of

More information

Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability

Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability Connectng Multple-uncast and Network Error Correcton: Reducton and Unachevablty Wentao Huang Calforna Insttute of Technology Mchael Langberg Unversty at Buffalo, SUNY Joerg Klewer New Jersey Insttute of

More information