Algorithm for Equal Distribution of Identical Elements on One Dimensional Field
|
|
- Florence Hampton
- 6 years ago
- Views:
Transcription
1 Algorthm for Equal Dstrbuton of Identcal Elements on One Dmensonal Feld Mate Boban, Alen Lovrenčć Unversty of Zagreb, Faculty of Organzaton and Informatcs, Varaždn, Croata Mchael Kreutzer Technsche Unverstät Darmstadt, Darmstadt Centre for IT Securty Abstract: Ths paper descrbes an algorthm for an equal dstrbuton of m dentcal elements on onedmensonal feld of sze n wth m < n. Durng the development of the dscrete event smulaton of MANET (Moble Ad Hoc Networ), the need for equal dstrbuton of specal node roles (e.g. servers, clents or drectores) on the nodes had occurred. The soluton usng some of the exstng random number generators was out of the queston because we wanted to now to whch node had the role been assgned to so we needed an algorthmc soluton n order to predct on whch node whch types of roles wll be placed, f any. In the proposed algorthm, two specfc cases are regarded: trval case wth dstrbuton (n mod m) = 0, where every (n dv m) element of n s selected, and (n mod m) 0, where we mplement our algorthm. We show that usng the proposed algorthm the m elements are equally dstrbuted over sze n one-dmensonal feld. The algorthm s gven n pseudo-code and thoroughly commented. Keywords: one-dmensonal feld, algorthmc soluton. INTRODUCTION Durng the development of the dscrete event smulaton of MANET (Moble Ad Hoc Networ) for the purposes of the ARDOR project [5], we have come across the problem of specal node roles dstrbuton. Specfcally, when we were developng Java mplementaton of the servce dscovery protocol called HYDRA [6], we needed the algorthm whch wll dstrbute each of the node roles (namely clent, server and drectory) on the nodes n a way that we are able to determne where each of the node roles wll be placed, so we can set up the smulaton accordng to our preferences. The mportant fact s that the number of each node role (lets denote them wth m) s less than the number of the nodes (lets denote them wth n). The soluton where we dstrbute node roles every p = n m, was not satsfactory, because t would mean that there would be q (q = n mod m) nodes at the end of the nodes array that would not have node role assgned. Also, mplementng some of the random number generator functons was out of the queston, because the smulaton preferences couldn't be set up properly. Because of ths, we needed a soluton whch wll dstrbute node roles n a way that the mnmum dstance between two employed nodes s p, where p = n m, and the maxmum dstance s p+, where we have q (q = n mod m) of the sze p+ dstances, and m--q dstances of sze p. Also, the second condton the algorthm had to fulfll s that sze p and p+ dstances between employed nodes are unformly dstrbuted across the nodes, so that each node has equal "chance" to get each node role. Concernng the smulaton, t was mplemented n JST/SWANS (Java n Smulaton Tme/Scalable Wreless Ad hoc Networ Smulator, [3]) smulaton envronment. The rest of ths paper s structured as follows: We gve a formal descrpton of problem n Secton, provng that PS and GD problems are equvalent and defnng the optmal soluton to PS and GD problems. In Secton 3 we present a smple algorthmc soluton to the problems, whereas n Secton 4 we enhance the algorthmc soluton so the m- gaps of sze p and p+ are unformly dstrbuted across n (the number of nodes). Fnally, the paper concludes n Secton 5.
2 . FORMAL DESCRIPTION The problem we want to solve can be formally wrtten as followng: Process schedulng (PS): There are m processes and n processors, where m n. We have to dstrbute processes to processors n a way that maxmzes mnmal dstance between two employed processors, as well as t mnmzes maxmal dstance between processes. Formally, we have: x x < x mn j j max j j { } {,..., m,..., m} { } {,..., m,..., m} {,..., n}, where {,..., m} j where < j ( x x ) + ( x x ) + max mn Ths problem t rather unusual optmzaton problem, because t has two optmzaton functons whch have to be consdered. Example: Let we have 7 processors and 8 processes. Then optmal dstrbuton s gven wth followng vector (, 4, 6, 8, 0,, 4, 7). Gap Dstrbuton (GD): There s also an alternatve approach to the problem. We have m- gaps between employed processors. The gap sze s gven by formula δ =x + -x. Sum of all dstances should be n-. Now the problem could be formally wrtten as follows: m δ = n = mn δ max {,..., m } max δ mn {,..., m } Proposton : Problems PS and GD are equvalent problems. Proof: Let we have m processes and n processors. Then we clearly have m- dstances. Let (x,, x n ) be soluton for PS problem. Then vector (x -x,, x n -x n- ) gves soluton of problem GD, and vce versa. Q.E.D. Soluton : Let n be the number of processors and m number of processes. The nteger dvson of (n- ) and (m-) gves (n-)/(m-)=p (n-)=q mod (m-) Then we clam that optmal soluton to GD problem s every vector that has q values of p+ and n-q- values p. Theorem : Soluton descrbed n Soluton s optmal for GD problem. Proof: We have to prove that there s at least one gap that s less or equal to p. For m= the problem s trval. Let us assume therefore that m>. Let us assume that all gaps are greater than p. That means that all gaps are greater or equal to p+. It s easy to see that f there s m processes then there s m- gaps. Let x,, x m- be these gaps. Now we have m = x ( m ) ( p + ) = ( m ) p + ( m ) = n + m > n But ths s contradcton. So, we conclude that assumpton that all gaps are greater than p s wrong. In
3 other words, at least one of the gaps has to be less or equal to p. It s easy to see, by the defnton of the GD problem that m = x = n Let us assume that (n-) = q mod (m-) Then n = ( m ) p + q If q=0 then t s obvous that optmal soluton has to have all gaps of sze p. Let q>0. In ths case we have at least one gap whose sze s greater than p. In the other words, there has to be at least one gap wth sze greater or equal to p+. So, by the mnmzaton condton, t would be optmal f we could mae a decson wth maxmal gap of sze p+. But, as q<(m-), we can mae soluton that has q gaps of sze p+, and m-q- gaps of sze p. The wanted soluton s Soluton. Therefore, the soluton s optmal for GD problem. Q.E.D. Therefore, we have a very smple algorthm whch gves an optmal soluton of PS problem. 3. ALGORITHMIC SOLUTION Gap sze 4 3 Gap dstrbuton n = 6, m = Dstance between: Fgure. Algorthm gap dstrbuton Pseudo-code of Algorthm : CLASS dstrbute(n,m) //n represents number of processors, whle m represents number of processes nt p = (n-)/(m-) //we use n- and m- because frst process always goes //to frst processor nt q = (n-)mod(m-) CREATE ntegerarray[m-] //create nteger array of gaps FOR counter = 0 TO q DO ntegerarray[counter] = p+ //set frst q gaps to sze p+ ENDFOR FOR counter = q+ TO m- DO ntegerarray[counter] = p //set the rest of the gaps to sze p ENDFOR ENDCLASS Bascally, Algorthm dstrbutes gaps n a way that t sets the frst q gaps to sze p+, and the rest of the gaps (m-q-) to sze p. For example, f n = 6, m =, Algorthm wll place gaps as shown n Fg.. It s easy to see that ths algorthm has complexty of O(m), where m s number of processes. 4. ENHANCED ALGORITHMIC SOLUTION There s one more condton that we want to nclude n our soluton. Algorthm gves soluton that maes the frst q gaps of sze p+ and the last m-q- gaps of sze p. We want to fnd a soluton n whch gaps of sze p+ are unformly dstrbuted through the number of processors. Algorthm :
4 To create a soluton n whch gaps of sze p+ are unformly dstrbuted, we devsed an algorthm where we frst mae all the m- gaps of sze p, and afterwards we add the q of the remanng p+ gaps onto the gaps array replacng the exstng sze p gaps wth sze p+ gaps n the followng manner: Frst, we determne the mddle gap,.e. we fnd the mddle of the sze m- gaps array ; f m necessary, the value s rounded up to celng (.e. mddle = ). In the mddle element of the gaps array we replace sze p gap wth sze p+ gap. In the same (quc sort) manner, we are determnng the mddle of the newly created gaps array parts and placng sze p+ gaps nstead of sze p gaps on the mddle elements. Ths means that n the frst teraton over gaps array we are placng one sze p+ gap, n the second two sze p+ gaps, then 4, 8, 6, 3 etc. + So, we have = where equals the number of teratons over sze m- gaps array. = When we now ths, t s easy to calculate how many teratons we wll need to place q gaps of sze p+ over sze m- gaps array : + q + q + / log ( + ) log log( q + ) log( q + ) + log log( q + ) log. e. log( q + ) = log We are sure we wll be able to replace q sze p gaps wth sze p+ gaps n the teraton. However, t s obvous that we wll be able to unformly dstrbute q gaps over m- sze gaps array only f q = j, where j {,,3,... } (f q j, then the last teraton wll not reach the end of the gaps array, thus leadng to non-unformed dstrbuton). t log(q + ) Because of that, we frst dstrbute q gaps of sze p+, where t =. By dong log ths, we ensure that t gaps of sze p+ wll be unformly dstrbuted over m- sze gaps array. t Now we have z = q of sze p+ gaps left to dstrbute, and we wll dstrbute them n the r log(z + ) same manner,.e. n the next teraton we wll dstrbute z, where r = and log so on, untl there s no sze p+ gaps to dstrbute. Ths ensures us much better soluton to the GD (Gap Dstrbuton) problem. Pseudo-code of Algorthm : In pseudo-code we are usng the concept of borders: we ntroduce (left, rght) pars of borders for dstrbuted sze p+ gaps to ease the calculaton of the mddle element ("mddle gap") n the "gaps array". Therefore, the borders array s created. The frst (left, rght) par s the frst and the last element of the "gaps array"; (left, rght) = (0, m-). Example: m- = 9, q = 3 ndex: start p p p p p p p p p left,rght par: (0,8)
5 ndex: st teraton p p p p p+ p p p p left,rght pars: (0,3);(5,8) ndex: nd teraton p p p+ p p+ p p p+ p left,rght pars: (0,);(3,3);(5,6);(8,8) Table. Placement of the borders CLASS dstrbute(n,m) //n represents number of processors, whle m represents number of processes CREATE ArrayLst //create arraylst of sze 0 leftborder = //frst value of left border s zero rghtborder = no_of_nodes //frst value of rght border s the number of nodes arraylst.add(leftborder) //nsert left border arraylst.add(rghtborder) nt p = (n-)/(m-) nt q = (n-)mod(m-) CREATE ntegerarray[m-] //nsert rght border //we use n- and m- because frst process always //goes to the frst processor //create nteger array of gaps FOR counter = 0 TO m- DO ntegerarray[counter] = p //set all gaps to sze p ENDFOR nt = floor(log(q+)/log()) - log(q + ) = log nt SumOfPowerOfTwo = power(,) - //n frst teraton, we wll dstrbute p+ gaps WHILE(SumOfPowerOfTwo > 0) DO mddle = celng((leftborder+rghtborder)/) //fnd the mddle of the observed part of the gaps array, round t up to celng. ntarray[mddle++] //the gap n the mddle of the observed part of the nodes array becomes p+ poweroftwo-- //subtract one gap change At ths pont, we had splt our observed part of the nodes array nto two (as smlar n sze as possble) parts, so now we have to add two new borders, one wth the value that s (mddle - ); ths border s referred to as rghtborder and another wth the value (mddle + ); ths border s referred to as leftborder. Orgnal leftborder and rghtborder wll be the new (left, rght) par n the ArrayLst, and so wll leftborder and orgnal rghtborder. leftborder = mddle + rghtborder = mddle - The next part of the code s executed f the orgnal (n ths teraton) leftborder s less or equal to the new rghtborder AND f the orgnal (n ths teraton) rghtborder s not the last border n array,.e. t s not representng the last element of the "gaps array". IF (leftborder <= rghtborder) AND (rghtborder < no_of_nodes) THEN IF (leftborder + == rghtborder) THEN //don t add borders, leftborder and rghtborder are next to each other, //so we just fetch the next left rght border par store = arraylst. IndexOf(rghtBorder) left = arraylst.get(store + ) rght = arraylst.get(store + ) ELSE //add new borders store = arraylst.indexof(leftborder) //nsert rghtborder and leftborder between left and rght
6 arraylst.add(store +,rghtborder) arraylst.add(store +,leftborder) store = arraylst.indexof(rghtborder) //fetch the next left rght border par leftborder = arraylst.get(store + ) rghtborder = arraylst.get(store + ) The next part of the code s executed f the orgnal (n ths teraton) leftborder s less or equal to the new rghtborder: f leftborder and rghtborder are next to each other, we wll not add borders between them because t maes no sense, and f they are not next to each other we add a new border par. In both cases we are startng the next whle loop step from the start of the borders array. ELSEIF (leftborder <= rghtborder) THEN IF (leftborder + == rghtborder) THEN //don t add borders, leftborder and rghtborder are next to each other left = arraylst.get(0) // fetch the next left, rght border par rght = arraylst.get() ELSE store = arraylst.indexof(leftborder) //nsert rghtborder and leftborder between orgnal borders arraylst.add(store +,rghtborder) arraylst.add(store +,leftborder) //fetch the frst left rght border par of ArrayLst leftborder = arraylst.get(0) rghtborder = arraylst.get() The next part of the code s executed f the orgnal (n ths teraton) leftborder s equal to orgnal (n ths teraton) rghtborder (.e. leftborder = rghtborder). If we haven't reached the end of the borders array, we fetch the next (left, rght) par, else we start from the begnnng of the array. ELSEIF (leftborder == rghtborder) THEN IF((arrayLst.sze- > arraylst.ndexof(rghtborder))then store = arraylst.indexof(rghtborder) //fetch the next left rght par leftborder = arraylst.get(store + ) rghtborder = arraylst.get(store + ) ELSE //fetch the frst left rght par of ArrayLst leftborder = arraylst.get(0) rghtborder = arraylst.get() ELSE brea ENDWHILE IF q = SumOfPowerOfTwo THEN end algorthm //f q = ELSE nt remander = q - power(,) - //we stll have q gaps to dstrbute reman(num_of_border_pars, remander) If q there are stll some sze p+ gaps to dstrbute and we have mplemented recursve functon to dstrbute q of sze p+ gaps over the created border pars: actually, the remander of sze p+ gaps wll be placed n the mddle of the border pars, each sze p+ gap deletng the border par nsde whch t s placed (ths s done to enhance the unformty of dstrbuton: f we delete the border par nsde whch a gap replacement happens, we are sure no more gap replacements
7 wll occur between deleted borders par. Ths means that n the followng recursve functon, gap replacements wll happen only once between the created borders). FUNCTION reman (Num_of_border_pars, remander) IF (remander == ) THEN PowerOfTwo = //f we have just one p+ gap to place ELSE nt = celng(log(remander)/log()) - PowerOfTwo = power(, ) IF (remander > 0) THEN nt step = Num_of_border_pars/PowerOfTwo //calculate the step for gap dstrbuton Num_of_border_pars = Num_of_border_pars - PowerOfTwo //deduct the border pars that wll be removed n ths recurson leftborder = arraylst.get(0) rghtborder = arraylst.get() //fetch the frst border par remander = remander - PowerOfTwo //deduct the number of gaps that wll be placed n ths recurson WHILE (PowerOfTwo > 0) DO mddle = celng((leftborder+rghtborder)/) //fnd the mddle of the observed part of the gaps array, round t up to celng. ntarray[mddle++] //the gap n the mddle of the observed part of the nodes array becomes p+ //nstead of p. arraylst.remove(left) //remove the (left,rght) border par arraylst.remove(rght) leftborder = arraylst.get(store + *step - ) rghtborder = arraylst.get(store + *step) //get the next (left,rght) border par usng stored ponter and step of gaps //placement store = arraylst.indexof(rght) //set the ponter to rght border PowerOfTwo-- ENDWHILE reman(num_of_border_pars, remander) ELSE END ALGORITHM ENDFUNCTION ENDCLASS t In ths functon n each recurson we are dstrbutng gaps, where each placed gap deletes the border par nsde whch t s placed. We are able to do t because we have created border pars, ( > t) and t t, mod = 0 so we are sure recurson wll termnate approprately and all the p+ sze gaps wll be placed nstead of the p sze gaps. As an example, Fg. shows Algorthm gap dstrbuton usng the same n and m values (n = 6, m = ) used by Algorthm shown n Fg. Gap sze 4 3 Gap dstrbuton n = 6, m = Dstance between: Fgure. Algorthm gap dstrbuton
8 Let us see the complexty of ths algorthm. The frst part of the algorthm, n whch we mae all gaps of dstance p, s very smlar to the basc algorthm and has complexty of O(n). The complexty of second part of the algorthm s not so obvous. In ths part of the algorthm we use dvde-and-conquer method, and the complexty of ths part wll be presented by dvde-and conquer recurson: T ( m) = c + T ( m ) Let us use substtuton s = T ( ) () Then ( T ( ) = s = c + T ) = c + T ( ) = c + s The recurson s = c + s has soluton s = C + C (see []). But, because of substtuton () we have the followng formula: T ( m) C + C m That means that the second part of the algorthm has also complexty of O(m), so we can conclude that algorthm has as well as algorthm, complexty of O(m). 5. CONCLUSION In ths paper we develop an algorthm for unform dstrbuton of specfc node roles (clent, server and drectory) across the nodes. We fulfll the demands of the mnmum dstance between two employed nodes, p, where p = n m, and the maxmum dstance, p+, and we also fulfll the demand of unform dstrbuton of the p and p+ dstances across the nodes. There has been a lot of smlar wor n the feld of optmal puncturng scheme for the selecton of the bts for retransmsson n forward error correcton (FEC) and Channel codng [], []. The mnmal dstance between punctured bts s needed n puncturng algorthm also. However, wth puncturng, there s one more constrant: punctured bts have to be dstrbuted on all frames evenly, frames beng represented by two dmensonal array, each frame beng one column. Ths mples that some of the p+ dstances wll be changed n p, resultng wth sub optmal number of p and p+ dstances. Algorthm we developed has exactly q (q = n mod m) of the sze p+ dstances and the rest of the dstances s sze p. Also, algorthm has complexty of O(m), m beng the number of roles to dstrbute. Future research we ntend to conduct ncludes development of the algorthm for unform dstrbuton of the specal node roles regardng already dstrbuted roles of dfferent type. Specfcally, algorthm presented n ths paper, although t dstrbutes roles of one type as evenly as possble, t does not consder the collson of dfferent types of node roles. We ntend to ncorporate "role awareness" n our presented algorthm. REFERENCES [] 3GPP TSG RAN WG (999) R Optmsed puncturng scheme for Turbo codng Fujtsu. [] 3GPP TSG RAN WG (999) R-9964 Propertes of optmsed puncturng scheme, Semens. [3] Barr, Rmon (004) Java n Smulaton Tme/Scalable Wreless Ad hoc Networ Smulator, [4] Dvja,B.; Lovrenčć, A. (005) Dsretna matemata s teorjom grafova (Dscrete Mathematcs wth Graph Theory), TIVA-FOI, Varaždn [5] Kreutzer, Mchael; Kähmer, Martn (004) Ubqutous Computng Technology n Infrastructureless Envronments, Proceedngs of the IEEE Internatonal Conference on Systems, Man and Cybernetcs (IEEE SMC 004). Den Haag, Nederland 004. [6] Kreutzer, Mchael; Kähmer, Martn; Magdc, Karlo (004) Scalable Servce Dscovery n MANETS exemplfed n Moble Hosptals, IADIS e-socety, Avla, Span 004.
College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009
College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:
More informationLecture Notes on Linear Regression
Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume
More informationCalculation of time complexity (3%)
Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add
More informationfind (x): given element x, return the canonical element of the set containing x;
COS 43 Sprng, 009 Dsjont Set Unon Problem: Mantan a collecton of dsjont sets. Two operatons: fnd the set contanng a gven element; unte two sets nto one (destructvely). Approach: Canoncal element method:
More informationVARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES
VARIATION OF CONSTANT SUM CONSTRAINT FOR INTEGER MODEL WITH NON UNIFORM VARIABLES BÂRZĂ, Slvu Faculty of Mathematcs-Informatcs Spru Haret Unversty barza_slvu@yahoo.com Abstract Ths paper wants to contnue
More informationOn the Multicriteria Integer Network Flow Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of
More informationECE559VV Project Report
ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate
More informationMath Review. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University
Math Revew CptS 223 dvanced Data Structures Larry Holder School of Electrcal Engneerng and Computer Scence Washngton State Unversty 1 Why do we need math n a data structures course? nalyzng data structures
More informationMMA and GCMMA two methods for nonlinear optimization
MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons
More informationFoundations of Arithmetic
Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an
More informationA PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS
HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,
More informationProblem Set 9 Solutions
Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem
More information2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification
E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton
More informationDynamic Programming. Preview. Dynamic Programming. Dynamic Programming. Dynamic Programming (Example: Fibonacci Sequence)
/24/27 Prevew Fbonacc Sequence Longest Common Subsequence Dynamc programmng s a method for solvng complex problems by breakng them down nto smpler sub-problems. It s applcable to problems exhbtng the propertes
More informationLecture 4: November 17, Part 1 Single Buffer Management
Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input
More informationHMMT February 2016 February 20, 2016
HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,
More informationChapter Newton s Method
Chapter 9. Newton s Method After readng ths chapter, you should be able to:. Understand how Newton s method s dfferent from the Golden Secton Search method. Understand how Newton s method works 3. Solve
More informationEconomics 101. Lecture 4 - Equilibrium and Efficiency
Economcs 0 Lecture 4 - Equlbrum and Effcency Intro As dscussed n the prevous lecture, we wll now move from an envronment where we looed at consumers mang decsons n solaton to analyzng economes full of
More informationAn Interactive Optimisation Tool for Allocation Problems
An Interactve Optmsaton ool for Allocaton Problems Fredr Bonäs, Joam Westerlund and apo Westerlund Process Desgn Laboratory, Faculty of echnology, Åbo Aadem Unversty, uru 20500, Fnland hs paper presents
More informationMin Cut, Fast Cut, Polynomial Identities
Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.
More informationprinceton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg
prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there
More informationSingular Value Decomposition: Theory and Applications
Sngular Value Decomposton: Theory and Applcatons Danel Khashab Sprng 2015 Last Update: March 2, 2015 1 Introducton A = UDV where columns of U and V are orthonormal and matrx D s dagonal wth postve real
More informationKernel Methods and SVMs Extension
Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general
More informationCase A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k.
THE CELLULAR METHOD In ths lecture, we ntroduce the cellular method as an approach to ncdence geometry theorems lke the Szemeréd-Trotter theorem. The method was ntroduced n the paper Combnatoral complexty
More informationSome modelling aspects for the Matlab implementation of MMA
Some modellng aspects for the Matlab mplementaton of MMA Krster Svanberg krlle@math.kth.se Optmzaton and Systems Theory Department of Mathematcs KTH, SE 10044 Stockholm September 2004 1. Consdered optmzaton
More informationSection 3.6 Complex Zeros
04 Chapter Secton 6 Comple Zeros When fndng the zeros of polynomals, at some pont you're faced wth the problem Whle there are clearly no real numbers that are solutons to ths equaton, leavng thngs there
More informationThe Minimum Universal Cost Flow in an Infeasible Flow Network
Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran
More informationLecture 4: Constant Time SVD Approximation
Spectral Algorthms and Representatons eb. 17, Mar. 3 and 8, 005 Lecture 4: Constant Tme SVD Approxmaton Lecturer: Santosh Vempala Scrbe: Jangzhuo Chen Ths topc conssts of three lectures 0/17, 03/03, 03/08),
More informationSimultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals
Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,
More informationOutline and Reading. Dynamic Programming. Dynamic Programming revealed. Computing Fibonacci. The General Dynamic Programming Technique
Outlne and Readng Dynamc Programmng The General Technque ( 5.3.2) -1 Knapsac Problem ( 5.3.3) Matrx Chan-Product ( 5.3.1) Dynamc Programmng verson 1.4 1 Dynamc Programmng verson 1.4 2 Dynamc Programmng
More informationStructure and Drive Paul A. Jensen Copyright July 20, 2003
Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.
More informationChapter - 2. Distribution System Power Flow Analysis
Chapter - 2 Dstrbuton System Power Flow Analyss CHAPTER - 2 Radal Dstrbuton System Load Flow 2.1 Introducton Load flow s an mportant tool [66] for analyzng electrcal power system network performance. Load
More informationGrover s Algorithm + Quantum Zeno Effect + Vaidman
Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the
More informationSolutions to exam in SF1811 Optimization, Jan 14, 2015
Solutons to exam n SF8 Optmzaton, Jan 4, 25 3 3 O------O -4 \ / \ / The network: \/ where all lnks go from left to rght. /\ / \ / \ 6 O------O -5 2 4.(a) Let x = ( x 3, x 4, x 23, x 24 ) T, where the varable
More informationDr. Ing. J. H. (Jo) Walling Consultant Cables Standards Machinery
The common mode crcut resstance unbalance (CMCU) calculaton based on mn. / max. conductor resstance values and par to par resstance unbalance measurements ncludng loop resstance evsed and extended verson
More informationLinear Approximation with Regularization and Moving Least Squares
Lnear Approxmaton wth Regularzaton and Movng Least Squares Igor Grešovn May 007 Revson 4.6 (Revson : March 004). 5 4 3 0.5 3 3.5 4 Contents: Lnear Fttng...4. Weghted Least Squares n Functon Approxmaton...
More informationComplete subgraphs in multipartite graphs
Complete subgraphs n multpartte graphs FLORIAN PFENDER Unverstät Rostock, Insttut für Mathematk D-18057 Rostock, Germany Floran.Pfender@un-rostock.de Abstract Turán s Theorem states that every graph G
More informationTHE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens
THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of
More informationMore metrics on cartesian products
More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of
More informationNP-Completeness : Proofs
NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationSingle-Facility Scheduling over Long Time Horizons by Logic-based Benders Decomposition
Sngle-Faclty Schedulng over Long Tme Horzons by Logc-based Benders Decomposton Elvn Coban and J. N. Hooker Tepper School of Busness, Carnege Mellon Unversty ecoban@andrew.cmu.edu, john@hooker.tepper.cmu.edu
More informationMaximal Margin Classifier
CS81B/Stat41B: Advanced Topcs n Learnng & Decson Makng Mamal Margn Classfer Lecturer: Mchael Jordan Scrbes: Jana van Greunen Corrected verson - /1/004 1 References/Recommended Readng 1.1 Webstes www.kernel-machnes.org
More informationDUE: WEDS FEB 21ST 2018
HOMEWORK # 1: FINITE DIFFERENCES IN ONE DIMENSION DUE: WEDS FEB 21ST 2018 1. Theory Beam bendng s a classcal engneerng analyss. The tradtonal soluton technque makes smplfyng assumptons such as a constant
More informationModule 2. Random Processes. Version 2 ECE IIT, Kharagpur
Module Random Processes Lesson 6 Functons of Random Varables After readng ths lesson, ou wll learn about cdf of functon of a random varable. Formula for determnng the pdf of a random varable. Let, X be
More informationOn the correction of the h-index for career length
1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat
More informationStanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011
Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected
More informationLearning Theory: Lecture Notes
Learnng Theory: Lecture Notes Lecturer: Kamalka Chaudhur Scrbe: Qush Wang October 27, 2012 1 The Agnostc PAC Model Recall that one of the constrants of the PAC model s that the data dstrbuton has to be
More informationNote on EM-training of IBM-model 1
Note on EM-tranng of IBM-model INF58 Language Technologcal Applcatons, Fall The sldes on ths subject (nf58 6.pdf) ncludng the example seem nsuffcent to gve a good grasp of what s gong on. Hence here are
More information= z 20 z n. (k 20) + 4 z k = 4
Problem Set #7 solutons 7.2.. (a Fnd the coeffcent of z k n (z + z 5 + z 6 + z 7 + 5, k 20. We use the known seres expanson ( n+l ( z l l z n below: (z + z 5 + z 6 + z 7 + 5 (z 5 ( + z + z 2 + z + 5 5
More informationp 1 c 2 + p 2 c 2 + p 3 c p m c 2
Where to put a faclty? Gven locatons p 1,..., p m n R n of m houses, want to choose a locaton c n R n for the fre staton. Want c to be as close as possble to all the house. We know how to measure dstance
More informationModule 9. Lecture 6. Duality in Assignment Problems
Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept
More informationHashing. Alexandra Stefan
Hashng Alexandra Stefan 1 Hash tables Tables Drect access table (or key-ndex table): key => ndex Hash table: key => hash value => ndex Man components Hash functon Collson resoluton Dfferent keys mapped
More informationThe Gaussian classifier. Nuno Vasconcelos ECE Department, UCSD
he Gaussan classfer Nuno Vasconcelos ECE Department, UCSD Bayesan decson theory recall that we have state of the world X observatons g decson functon L[g,y] loss of predctng y wth g Bayes decson rule s
More informationNormally, in one phase reservoir simulation we would deal with one of the following fluid systems:
TPG4160 Reservor Smulaton 2017 page 1 of 9 ONE-DIMENSIONAL, ONE-PHASE RESERVOIR SIMULATION Flud systems The term sngle phase apples to any system wth only one phase present n the reservor In some cases
More informationChapter 12. Ordinary Differential Equation Boundary Value (BV) Problems
Chapter. Ordnar Dfferental Equaton Boundar Value (BV) Problems In ths chapter we wll learn how to solve ODE boundar value problem. BV ODE s usuall gven wth x beng the ndependent space varable. p( x) q(
More informationMarkov Chain Monte Carlo Lecture 6
where (x 1,..., x N ) X N, N s called the populaton sze, f(x) f (x) for at least one {1, 2,..., N}, and those dfferent from f(x) are called the tral dstrbutons n terms of mportance samplng. Dfferent ways
More informationCOS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture #16 Scribe: Yannan Wang April 3, 2014
COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture #16 Scrbe: Yannan Wang Aprl 3, 014 1 Introducton The goal of our onlne learnng scenaro from last class s C comparng wth best expert and
More informationThe optimal delay of the second test is therefore approximately 210 hours earlier than =2.
THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple
More informationSOLVING CAPACITATED VEHICLE ROUTING PROBLEMS WITH TIME WINDOWS BY GOAL PROGRAMMING APPROACH
Proceedngs of IICMA 2013 Research Topc, pp. xx-xx. SOLVIG CAPACITATED VEHICLE ROUTIG PROBLEMS WITH TIME WIDOWS BY GOAL PROGRAMMIG APPROACH ATMII DHORURI 1, EMIUGROHO RATA SARI 2, AD DWI LESTARI 3 1Department
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.65/15.070J Fall 013 Lecture 1 10/1/013 Martngale Concentraton Inequaltes and Applcatons Content. 1. Exponental concentraton for martngales wth bounded ncrements.
More informationNew modular multiplication and division algorithms based on continued fraction expansion
New modular multplcaton and dvson algorthms based on contnued fracton expanson Mourad Goucem a a UPMC Unv Pars 06 and CNRS UMR 7606, LIP6 4 place Jusseu, F-75252, Pars cedex 05, France Abstract In ths
More informationIntroduction to Algorithms
Introducton to Algorthms 6.046J/8.40J Lecture 7 Prof. Potr Indyk Data Structures Role of data structures: Encapsulate data Support certan operatons (e.g., INSERT, DELETE, SEARCH) Our focus: effcency of
More informationLecture 10: May 6, 2013
TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,
More information18.1 Introduction and Recap
CS787: Advanced Algorthms Scrbe: Pryananda Shenoy and Shjn Kong Lecturer: Shuch Chawla Topc: Streamng Algorthmscontnued) Date: 0/26/2007 We contnue talng about streamng algorthms n ths lecture, ncludng
More informationVapnik-Chervonenkis theory
Vapnk-Chervonenks theory Rs Kondor June 13, 2008 For the purposes of ths lecture, we restrct ourselves to the bnary supervsed batch learnng settng. We assume that we have an nput space X, and an unknown
More informationRemarks on the Properties of a Quasi-Fibonacci-like Polynomial Sequence
Remarks on the Propertes of a Quas-Fbonacc-lke Polynomal Sequence Brce Merwne LIU Brooklyn Ilan Wenschelbaum Wesleyan Unversty Abstract Consder the Quas-Fbonacc-lke Polynomal Sequence gven by F 0 = 1,
More informationarxiv: v1 [math.co] 1 Mar 2014
Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest
More informationFinding Primitive Roots Pseudo-Deterministically
Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms
More informationDefinition. Measures of Dispersion. Measures of Dispersion. Definition. The Range. Measures of Dispersion 3/24/2014
Measures of Dsperson Defenton Range Interquartle Range Varance and Standard Devaton Defnton Measures of dsperson are descrptve statstcs that descrbe how smlar a set of scores are to each other The more
More informationSociété de Calcul Mathématique SA
Socété de Calcul Mathématque SA Outls d'ade à la décson Tools for decson help Probablstc Studes: Normalzng the Hstograms Bernard Beauzamy December, 202 I. General constructon of the hstogram Any probablstc
More informationEEE 241: Linear Systems
EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they
More informationCHALMERS, GÖTEBORGS UNIVERSITET. SOLUTIONS to RE-EXAM for ARTIFICIAL NEURAL NETWORKS. COURSE CODES: FFR 135, FIM 720 GU, PhD
CHALMERS, GÖTEBORGS UNIVERSITET SOLUTIONS to RE-EXAM for ARTIFICIAL NEURAL NETWORKS COURSE CODES: FFR 35, FIM 72 GU, PhD Tme: Place: Teachers: Allowed materal: Not allowed: January 2, 28, at 8 3 2 3 SB
More informationEstimating the Fundamental Matrix by Transforming Image Points in Projective Space 1
Estmatng the Fundamental Matrx by Transformng Image Ponts n Projectve Space 1 Zhengyou Zhang and Charles Loop Mcrosoft Research, One Mcrosoft Way, Redmond, WA 98052, USA E-mal: fzhang,cloopg@mcrosoft.com
More informationLectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix
Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could
More informationComputing Correlated Equilibria in Multi-Player Games
Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,
More informationAmusing Properties of Odd Numbers Derived From Valuated Binary Tree
IOSR Journal of Mathematcs (IOSR-JM) e-iss: 78-578, p-iss: 19-765X. Volume 1, Issue 6 Ver. V (ov. - Dec.016), PP 5-57 www.osrjournals.org Amusng Propertes of Odd umbers Derved From Valuated Bnary Tree
More informationTHE ARIMOTO-BLAHUT ALGORITHM FOR COMPUTATION OF CHANNEL CAPACITY. William A. Pearlman. References: S. Arimoto - IEEE Trans. Inform. Thy., Jan.
THE ARIMOTO-BLAHUT ALGORITHM FOR COMPUTATION OF CHANNEL CAPACITY Wllam A. Pearlman 2002 References: S. Armoto - IEEE Trans. Inform. Thy., Jan. 1972 R. Blahut - IEEE Trans. Inform. Thy., July 1972 Recall
More informationSome Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM
Example of Extended Eucldean Algorthm Recall that gcd(84, 33) = gcd(33, 18) = gcd(18, 15) = gcd(15, 3) = gcd(3, 0) = 3 We work backwards to wrte 3 as a lnear combnaton of 84 and 33: 3 = 18 15 [Now 3 s
More informationLecture 3. Ax x i a i. i i
18.409 The Behavor of Algorthms n Practce 2/14/2 Lecturer: Dan Spelman Lecture 3 Scrbe: Arvnd Sankar 1 Largest sngular value In order to bound the condton number, we need an upper bound on the largest
More informationVQ widely used in coding speech, image, and video
at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng
More informationLecture 20: Lift and Project, SDP Duality. Today we will study the Lift and Project method. Then we will prove the SDP duality theorem.
prnceton u. sp 02 cos 598B: algorthms and complexty Lecture 20: Lft and Project, SDP Dualty Lecturer: Sanjeev Arora Scrbe:Yury Makarychev Today we wll study the Lft and Project method. Then we wll prove
More informationAPPROXIMATE PRICES OF BASKET AND ASIAN OPTIONS DUPONT OLIVIER. Premia 14
APPROXIMAE PRICES OF BASKE AND ASIAN OPIONS DUPON OLIVIER Prema 14 Contents Introducton 1 1. Framewor 1 1.1. Baset optons 1.. Asan optons. Computng the prce 3. Lower bound 3.1. Closed formula for the prce
More informationGeneralized Linear Methods
Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set
More information4DVAR, according to the name, is a four-dimensional variational method.
4D-Varatonal Data Assmlaton (4D-Var) 4DVAR, accordng to the name, s a four-dmensonal varatonal method. 4D-Var s actually a drect generalzaton of 3D-Var to handle observatons that are dstrbuted n tme. The
More informationChapter 6. Supplemental Text Material
Chapter 6. Supplemental Text Materal S6-. actor Effect Estmates are Least Squares Estmates We have gven heurstc or ntutve explanatons of how the estmates of the factor effects are obtaned n the textboo.
More informationLecture 10 Support Vector Machines. Oct
Lecture 10 Support Vector Machnes Oct - 20-2008 Lnear Separators Whch of the lnear separators s optmal? Concept of Margn Recall that n Perceptron, we learned that the convergence rate of the Perceptron
More informationA Simple Inventory System
A Smple Inventory System Lawrence M. Leems and Stephen K. Park, Dscrete-Event Smulaton: A Frst Course, Prentce Hall, 2006 Hu Chen Computer Scence Vrgna State Unversty Petersburg, Vrgna February 8, 2017
More information5 The Rational Canonical Form
5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces
More informationn α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0
MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector
More informationDifference Equations
Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1
More informationAPPENDIX A Some Linear Algebra
APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,
More informationSpeeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem
H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence
More informationFundamental loop-current method using virtual voltage sources technique for special cases
Fundamental loop-current method usng vrtual voltage sources technque for specal cases George E. Chatzaraks, 1 Marna D. Tortorel 1 and Anastasos D. Tzolas 1 Electrcal and Electroncs Engneerng Departments,
More informationNotes on Frequency Estimation in Data Streams
Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to
More informationAssortment Optimization under MNL
Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.
More informationA Robust Method for Calculating the Correlation Coefficient
A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal
More informationCase Study of Markov Chains Ray-Knight Compactification
Internatonal Journal of Contemporary Mathematcal Scences Vol. 9, 24, no. 6, 753-76 HIKAI Ltd, www.m-har.com http://dx.do.org/.2988/cms.24.46 Case Study of Marov Chans ay-knght Compactfcaton HaXa Du and
More informationFirst day August 1, Problems and Solutions
FOURTH INTERNATIONAL COMPETITION FOR UNIVERSITY STUDENTS IN MATHEMATICS July 30 August 4, 997, Plovdv, BULGARIA Frst day August, 997 Problems and Solutons Problem. Let {ε n } n= be a sequence of postve
More informationError Probability for M Signals
Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal
More information