Phase Transitions for Mutual Information

Size: px
Start display at page:

Download "Phase Transitions for Mutual Information"

Transcription

1 Phase Transitions for Mtal Information K. Raj Kmar*, Payam Pakzad t, Amir Hesam Salavati* and Amin Shokrollahi* *Laboratoire d' algorithmiqe Ecole Poly techniqe Federale de Lasanne, 05 Lasanne, Switzerland tqalcomm, Inc., 395 Kifer Road, Santa Clara, CA 9505, USA Abstract-We consider ensembles of binary linear error correcting codes, obtained by sampling each colmn of the generator matrix G or parity check matrix H independently from the set of all binary vectors of weight d (of appropriate dimension). We investigate the circmstances nder which the mtal information between a randomly chosen codeword and the vector obtained after its transmission over a binary inpt memoryless symmetric channel (BIMSC) e is exactly n times the capacity of e, where n is the length of the code. For several channels sch as the binary symmetric channel (BSC) and the binary-inpt additive white Gassian noise (AWGN) channel, we prove that the probability of this event has a threshold behavior, depending on whether n/k is smaller than a certain qantity (that depends on the particlar channel e and d), where k is the nmber of sorce bits. To show this, we prove a generalization of the following wellknown theorem: the expectation of the size of the right kernel of G has a phase transition from to infinity, depending on whether or not n/k is smaller than a certain qantity depending on the chosen ensemble. I. INTRODUCTION The development of the theory of modern codes over the past two decades has reslted in the constrction of practical error correcting codes that operate extremely close to the performance limits dictated by information theory. These modern codes admit low complexity decoding techniqes based on the idea of belief propagation. It has been shown that the ensemble of low density parity check (LDPC) codes and Raptor codes are capacity achieving over the binary erasre channel (BEC). Roghly speaking, the BEC is an idealized channel in which information symbols (bits) are either "lost", or recovered with no error, which may be sed to model for example a packetized commnication system with perfect error detection. However, most practical channels also involve errors, casing information symbols to be confsed with one another. When one moves away from the framework of the BEC to more general memoryless symmetric channels, very few analytical reslts exist regarding the performance of modern coding ensembles. The goal of this paper is to investigate sch reslts from an information theoretic point of view. We consider the transmission of a vector X E lf over a general binary inpt memoryless symmetric channel (BIMSC) e. The vector X is transformed by a linear encoder into a vector Y E lf throgh the mapping Y = XG, with the "generator matrix" G E lf xn (note that we are not assming that n :: k, so G is not a generator matrix in traditional sense). The vector Y is then transmitted over the channel e, to obtain Z. We will consider the case that the encoder G corresponds to a family of "LTlRaptor-like" or "LDPC-like" codes. In order to make this notion more precise, we define Cd(, m) to be the ensemble of all x m matrices whose colmns are sampled independently from the set of vectors v E lf of weight d. For brevity, we will se the notation Cd for the ensemble Cd(, m), the dimensions will be clear from context. Frther, we will call an ensemble of codes to be d-niform if either the generator matrix of the code or the parity check matrix of the code is drawn from Cd. We will be interested in evalating the performance of sch d-niform ensembles of codes. For this setting, the primary qestion that we wold like to answer is the following: nder the assmption of long blocklengths, what is the probability that the mtal information I (X; Z) is close to n times the capacity of the channel e? For a particlar d-niform ensemble of codes, we define the probability IId,e = Pr{I(X; Z) < ncap(e)}. For reasons of analytical tractability, we also define the following probability ITd,e = Pr{I(X; Z) < ncap(e) - o(n)}. We conjectre that the mtal information exhibits the following phase transition. Conjectre : For any BIMSC e and any integer d, there exists a positive real nmber B( d, e) sch that if n / k converges to a vale ] as n -+ 00, { then A 0 if ] < B( d, e) IId,e -+. if ] > B( d, e) In the crrent work, we attempt to prove this conjectre for a few important and practical classes of channels, inclding the binary symmetric channel (BSC) and the additive white Gassian noise (AWGN) channel. In certain cases, we will prove a weaker version of Conjectre, by showing that IId,e converges to 0 if n/k is below a certain threshold. In the most general case of an arbitrary BIMSC, the proof of Conjectre remains an open problem. It is very informative to look first at the case where the channel e = J is the trivial (error-free) channel, sch that Z = Y. In this case, it is easy to see that the mtal information I(X; Z) = rk( G), where rk( G) denotes the rank of the matrix /0/$6.00 0O IEEE 37

2 d Q(d,:!) B(d,:!) TABLE I VALUES OF Q(d,:!) AND B(d,:!) FOR VARIOUS d G. Hence in this case, we have that IId,:/ = Pr{rk(G) < n}. Using the nion bond, one can show that Pr{rk(G) < n} :::; le[llker(g)i] -l, () where lker( G) denotes the left kernel of the matrix G. We have the following well-known reslt on the phase transition behavior of the size of the left-kernel, see [3, Theorem 3.5.]. Theorem : Let the generator matrix G be drawn from the ensemble Cd, with d 3. Frther, let a( d,:) be defined as the first component of the vector (a, x,..\) that is the niqe soltion of the system of eqations e - x cosh(..\) ( ad )a ad _ x ( ad: xr/ d..\ tanh(..\) Sppose that k, n sch that njk -+ a. Then, if a < a( d, :), then E[llker( G) I] -+, and if a > a( d, :), then E[llker(G)I] Notice that this immediately yields that IId,:/ -+ 0 if a < a( d, :), bt only yields a trivial bond on IId,:/ if a > a( d, :). The following theorem from [5] proves Conjectre for the case e =:. Theorem : Let In(d 'Y d - := d(l _ (d) d -l ' where (d is the smallest root of z ( - In z) - ;:t In z - = o for z E [0,]. Then Conjectre is tre for e = : and O(d,:) := 'Y d. In other words, if n, k sch that njk -+ a and a < O( d, :), then ITd,:/ -+ 0, whereas ITd,:/ -+ if a> O(d,:). Table I gives vales of O(d,:) and a(d,:) for varios d. Finally, we wold like to comment on literatre related to the topic of this paper. The reslts that are closest to the spirit of those in this paper are the ones in []-[3], [5]; one can think of these reslts as special cases of or reslts when the channel e is error-free. There is a whole set of other papers that discss nder which conditions I (X; Z) = k, so that ML-decoding is sccessfl'. The most general among sch reslts (bt with a limited range i For G to achieve capacity, we need to have that lex; Z) = k; however, we are interested in this paper in the case when I (X; Z) = ncap( e). These two qantities are eqal only if k = ncap( e), so that the rate of the code is eqal to the capacity.,, x. of applicability) are those of MacMllan and Collins [6] which analyze the inherent gap of certain families of binary linear codes sch as the Hamming and Golay codes to the capacity of the BSC. For ensembles of sparse matrices the qestion of achievability of capacity is not new, of corse. Already in his thesis, Gallager [7, pp ] showed that the rate of a right (or check-) reglar LDPC code that achieves reliable commnication over a BSC sing ML decoding is bonded away from the capacity of the channel by a fnction depending on the right degree of the nderlying graph. In particlar, the right degree has to go to infinity if the code is to approach capacity. Richardson et al. [8] proved that the same conclsion holds for the maximm right degree, if the graph is not rightreglar; this implies that the reslt also applies when taking the average right degree, instead. Brshtein et al. [9] generalized these reslts to general BIMSC. These reslts were themselves generalized and optimized by Sason and Urbanke [0] who gave rather close gaps to capacity for LDPC codes with given average right degree. Thogh it may seem to a reader that this paper is investigating a similar problem as those of the above papers, this is not entirely the case. In all the above cases, either k - I (X; Z) is calclated directly (e.g., in [6]), or an pper bond is obtained on the entropy H (Z) to show that I (X; Z) is bonded away from k (as is the case in [7]-[0]). For s a direct calclation of k - I(X; Z) is very difficlt, so that the reslts of [6] are not directly applicable. Moreover, we are interested in lower bonds for H(Z) (or rather, its expectation), rather than pper bonds, so the mentioned reslts are not applicable either. II. THE CASE e = BSC(p) In this section, we stdy the case of a BSC with crossover probability p, denoted by e = BSC(p). The main theorem of this section is the following. Theorem 3: Let Bw denote the nmber of words of weight w in the right kernel of the matrix G. Then Pr[I(X; Z) < ncap(e)] :::; 0g (t, le[bw](l - P) W). Note that if we assme e = :, so that p = 0, then I(X; Z) is the rank of the matrix G, and Lw Bw is the size of the right kernel of G. Hence, the statement of the theorem says that Pr[rk(G) < n] :::; 0g(lE[llker(G)J) :::; le[llker(g)i] -, and we have retrieved (). To prove Theorem 3, we need an axiliary reslt, which may be interesting in its own right. Theorem 4: Let D be a distribtion on F, with entropy H(D), and let P := PrD[x = ]. For v E F let qv := L, (lv) = l P, where ( v) is the scalar prodct of and v (over F ). Then we have n - H(D) :::; 0g (L ( - Qv) ). vef' 38

3 that Proof" We will first remark some general facts. First, note -qv = -qv-qv = L P- L P = L( -) ( v) p, (lv)=o (lv)=l so that the vector (-qv I v E lf ) is the Hadamard transform of the vector (P I E lf ). Let H be the n x n-hadamard matrix. Since HI y'ri is a nitary matrix, we have ",, P = n ( - qv ). () EIF' v Note that by the concavity of the logarithm fnction, we have for all Xl,..., Xm 0 and all ai,..., am 0 with Li ai = : Specializing to m = k, and a = X = P, we see that L..J - JF ' p > II..,p = -H(D) so that which is the statement of the theorem. We omit the proof of the following corollary for lack of space. Corollary : Sppose that C is an [n, k]-code, and that Y = (Yb..., Yn) is a vector chosen from C niformly at random. Moreover, sppose that for i =,..., n the random variables ei are independent binary Bernolli random variables with Pr[ei = ] = Pi, and sppose that Y, eb.., en are independent. Let Z = (Zl'...' zn) be the vector with Zi = Yi + ei. Then we have Since log(x) is a concave fnction, we have for any random variable U over the positive real nmbers: IE [log (U)] :::; log(ie[u]), hence it sffices to prove that Pr[I(X; Z) < ncap(e)] :::; n - E [H(Z)]. Let be a random variable taking vales in the set {O,,..., t}, and let Pi denote the probability that the vale of is i. Then Pr[ < t] = Po Pt-l = - Pt :::; Pt-l + pt tpo = t - E []. We apply this reslt to = I(X; Z) and t = ncap(e) to obtain that the probability in qestion is pper bonded by ncap(e) -E[I(X; Z)]. Noting that I(X; Z) = H(Z) -H(ZIX) = H(Z) -n h(p), and that Cap(e) = - h(p), the reslt follows. The ineqality of Theorem 4 cannot be improved since it is tight for flat distribtions. In other words, if D is a niform distribtion over a k-dimensional sbspace of lf, where :::; k :::; n, then eqality is achieved. Using the above reslts, we obtain the following theorem whose proof is omitted for lack of space. Theorem 5: Let d 3 be fixed and e = BSC(p). Define f(>..) := ed cosh(>..)d/>..tanh(>..) (tanh(>..)) d (-p), >..tanh(>..) (tanh(>..)) >" tanh( >" ) ( d ) <> g(>.., ) := cosh(>") e d ->..tanh(>..) and ( ) - _ { _ (d ->..tanh(>..) ) >" tanh( >" )/d. >.. tanh(>..) e ( - p), ( <f>d) i)} + e - HI-. where H (z) is the entropy of the probability distribtion of the random variable z. In particlar, if all the Pi are eqal to p, then n -H(z) :::; log (t. Bw(l - P) W), where Bw is the nmber of words of weight w in the right kernel of G. The proof of Theorem 3 follows from the previos corollary. For lack of space, we confine orselves to providing a sketch only. Proof" (Of Theorem 3 - Sketch) Let C be the code generated by the rows of the matrix G. Then, by the previos corollary, we have n - E [H(Z)] :::; IE [IOg (t. Bw(l - P) W) ]. Let /00 be the maximm of f(>..) in the interval (0, (0), and let Ol be the largest positive vale of sch that g( >.., ) :::; for all >.. with >.. tanh( >..) :::; d. Also, let O be the maximm vale of 0 sch that ( ) < p. Set o:(d, e) := min (max(oo, Ol), (). Sppose that n, k go to infinity sch that nlk --+ 0:. Then IId,e if 0: < o:(d, e). The case d = is more involved. In fact, we cannot show that 0:(, BSC(p)) exists. However, it was proved in [4] that in this case the analogos threshold for fi,bsc(p)' viz., 0(, BSC(p)) exists and 0(, BSC(p)) = ( _ p ) Moreover, when d =, one can show that the largest vale of and happens when> O. fnction f(>..)! is eqal to ( p) Table II gives the vale of Cap(BSC(p) )o:( d, BSC(p)) = (-h(p))o:( d, BSC(p)) for varios d and p. One wold expect these vales to converge to as d grows. While this is seen to happen for p «: (see also Table I that corresponds to the limiting case of p = 0), the vales converge to arond / 39

4 d\p ;j A simple maniplation yields TABLE II THE VALUES OF (- h(p))a(d, BSC(p)) FOR VARIOUS VALUES OF d AND p. when p converges to /. This sggests that there is room for improvement in the bonds of Theorem 5. It can be shown that the reslts for the BSC also extend to reslts for the convex combination of BSCs. Details are omitted for brevity. III. THE AWGN CHANNEL We now trn or attention to the case when e = AWGN(p) is a binary inpt (real) AWGN channel, whose otpt Z E IRn may be written as Z=Y+W, where W rv i.i.d. N (0, i I). We assme standard binary phase shift keying (BP K) modlation for transmission over the AWGN channel, i.e., we map component-wise the binary codeword Y t-+ (-) Y prior to transmission over the channel. With a slight abse of notation, we refer to both the binary codeword and the modlated symbols with the same notation Y; the one being referred to will be clear from the context. Hence p denotes the signal to noise ratio (SNR) of the AWGN channel. As before, we first develop a lower bond on the mtal information between the inpt and otpt. I(X; Z) H(Z) -H(ZIX) = H(Z) -! log (7re) n. (3) p n Using Jensen's ineqality, we lower bond the entropy as H(Z) -log [/ p (Z) dz], (4) where p( Z) denotes the pdf of the otpt Z. Define the code Cy = { Y = XG I X E F } { Yb Y,,Yk} (note that if G is not fll-rank, then not all Yi are distinct). Then, we may write k p p (Z) = n/ _ '"' e- IZ-YiI. k ( )n We may hence evalate From (3), (4) and (5), we obtain Since BPSK modlation is sed, IYj -Yi l = 4dH (Yj, Yi), where dh(a, B) denotes the Hamming distance between A and B. Since we employ a linear code, we may frther simplify the above ineqality to obtain I(X; Z) -log " [ ( e) n/ k k exp { - p WH(Yi n, where WH(X) denotes the Hamming weight of X. If we define Cw to be the nmber of codewords with Hamming weight w, we may rewrite the above as: [( e ) n / n ] I(X;Z) -log " k C we- w p. (6) In order to examine Conjectre for e = AWGN(p), we evalate Pr { I(X; Z) < n(cap(e) - n :::; Pr { -log [ G) n / k t Cwe- w p] < n(cap(e) - )} = Pr { ( cap(e)-r ) n t. Cwe- w p > n }, (7) bn b where is a constant independent of n, k. An analysis of the term S n C e-p w L...w=l w, where = IKCap(e)-R Y' is a constant that is independent of n leads to the following theorem. Theorem 6: Let d 3 be a fixed constant, and e = AWGN(p). Define f().., 0) = In [b9 ( edo ) A ta:;h A]_ p).. tanh)" (0 - ).. tanh)" d + In cosh)" + ).. tanh )''In (ta:h).. ) (8) 40

5 and (A ()) d [( tanh I A) A tanh A b g, A tanh A n (()d)b (d76 -AtanhA) -b cosh A] (() - ) 6 (A tanha) e. -po Let ()l «()) denote the maximm vale of () for which the fnction f(a, ()) (respectively, g(a, ()) is less than zero for all non-negative A sch that A tanh A 9 ' Set ()(d, e) = min {, max{()l, ()}}. If n, k sch that n/k --+ 0:, then ITd,e if 0: < ()(d, e). Proof" (Sketch) In order to analyze Cw, we consider two scenarios. When n ;::: k, we se a good channel code to transmit information across the channel. On the other hand, when n < k, we need to compress (qantize) the information to be sent over the channel. We first examine the case when n;::: k. ) Channel coding when n ;::: k: We define or channel coding ensemble in the following manner. Choose the parity check matrix H E lf n-k) x n from the ensemble ed. The qantity Cw is eqal to the nmber of vectors with weight w in the right kernel of H, or in the left kernel of H T. Along the lines of the proof of Theorem 3.5. in Sec. 3.6 of [3], we analyze S by splitting the sm into three regions, Sl = bn L::ow<o Cwe-P w, S = bn n LO n ::ow«l - o ) n Cw e-p w and S3 = (9) bn L ( - o ) n ::ow::o n Cw e-p w, where O. We otline the analysis of these terms in the seqel, omitting details for lack of space. a) Analysis of Sl: From the proof of Lemma 3.5. in [3], we can show that Sl E ', for some 8 > 0, where E ' > 0 is an arbitrary constant. b) Analysis of S: Define () = n/k. Along the lines of the analysis in [3], it can be shown that S vanishes if for all non-negative A sch that A tanh A 9 ' either f(a, ()) < 0 or g(a, ()) < 0, where the fnctions f and g are as defined in (8), (9). c) Analysis of S3: Along the lines of the proof of Lemma 3.5. in [3], we can show that S when we set E ;::: log (JI) bits. ) Compression (Qantization) for n < k: We fix G to be any k x n binary matrix that is of rank n. Hence, as X varies over all k-tples, Y varies over all n-tples, with each n-tple appearing k-n times in the qantizer codebook. This reslts in Cw = k-n ( :). Consider We may now evalate (7) as bnk-n t. (: ) e-p w bnk-n ( + e-pt. Pr{I(X; Z) < n( Cap( C)- E)} Pr {b*- ( + e-p) > }. d\ P(dH) TABLE III THE VALUES OF CAP( AWGN(p» 8(d, AWGN(p» FOR VARIOUS VALUES ofdand p. It can be show that if one sets E ;::: log (JI), the right-hand side converges to zero. Shown in Table III are the vales of Cap(AWGN(p))()(d,AWGN(p)) for several vales of p and d. Notice that the bonds for the case of the A WGN are very tight in terms of the threshold vales for the rate being almost at capacity for even moderate vales of d. However, or main theorem for the AWGN, Theorem 6 is in some sense weaker than the corresponding reslt for the BSC in Theorem 5, since the former proves a statement abot ITd,e involving a linear back-off from capacity, while the latter shows a reslt relating to IId,e with no back-off from capacity. IV. ACKNOWLEDGEMENTS This work was spported by Grant 80-ECCSciEng of the Eropean Research Concil. The athors wold like to thank Mahdi Cheraghchi, Venkat Grswami, Shlomo Shamai, Emre Telatar, and David Tse for helpfl discssions and comments dring the research on this paper. REFERENCES [] J. Blomer, R Karp, and E. Welzl, "The rank of sparse random matrices over finite fields;' Random Strctres and Algorithms, vol. 0, no. 4, pp , 997. [] N. Calkin, "Dependent sets of constant weight binary vectors;' Combinatorics, Probability, and Compting, vol. 6, pp , 003. [3] V.F. Kolchin, Random Graphs, Nmber 53 in Encyclopedia of Mathematics and its Applications, Cambridge University Press, 999. [4] O. Etesami and A. Shokrollahi, "Raptor codes on binary memoryless symmetric channels," IEEE Trans. Inform. Theory, vol. 5, no. 5, pp , 006. [5] P. Pakzad and A. Shokrollahi, "EXIT fnctions for LT and raptor codes, and asymptotic ranks of random matrices," in Proc. of the IEEE International Symposim on Information Theory (ISIT), pp. 4-45, Jne 007. [6] SJ. MacMllan and O.M. Collins, "The capacity of binary channels that se linear codes and decoders;' IEEE Trans. I'!form. Theory, vol. 44, pp. 97-4, 998. [7] RG. Gallager, Low Density Parity-Check Codes, MIT Press, Cambridge, MA,963. [8] T. Richardson, A. Shokrollahi, and R Urbanke, "Finite-length analysis of varios low-density parity-check ensembles for the binary erasre channel;' in Proc. of the IEEE International Symposim on Information Theory (ISIT), pp. I, 00. [9] D. Brshtein, M. Krivelevich, S. Litsyn, and G. Miller, "Upper bonds on the rate of LDPC codes;' IEEE Trans. Inform. Theory, vol. 48, no. 9, pp , 00. [0] I. Sason and R Urbanke, "Parity-check density verss performance of binary linear block codes over memoryless symmetric channels;' IEEE Trans. I'!form. Theory, vol. 49, pp ,003. 4

Joint Transfer of Energy and Information in a Two-hop Relay Channel

Joint Transfer of Energy and Information in a Two-hop Relay Channel Joint Transfer of Energy and Information in a Two-hop Relay Channel Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, and Mohammad Reza Aref Information Systems and Secrity Lab (ISSL Department of Electrical

More information

FOUNTAIN codes [3], [4] provide an efficient solution

FOUNTAIN codes [3], [4] provide an efficient solution Inactivation Decoding of LT and Raptor Codes: Analysis and Code Design Francisco Lázaro, Stdent Member, IEEE, Gianligi Liva, Senior Member, IEEE, Gerhard Bach, Fellow, IEEE arxiv:176.5814v1 [cs.it 19 Jn

More information

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes

Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 32000, Israel 2009 IEEE International

More information

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehighed Zhiyan Yan Department of Electrical

More information

ECEN 655: Advanced Channel Coding

ECEN 655: Advanced Channel Coding ECEN 655: Advanced Channel Coding Course Introduction Henry D. Pfister Department of Electrical and Computer Engineering Texas A&M University ECEN 655: Advanced Channel Coding 1 / 19 Outline 1 History

More information

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehigh.ed Zhiyan Yan Department of Electrical

More information

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels

Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Jilei Hou, Paul H. Siegel and Laurence B. Milstein Department of Electrical and Computer Engineering

More information

FEA Solution Procedure

FEA Solution Procedure EA Soltion Procedre (demonstrated with a -D bar element problem) EA Procedre for Static Analysis. Prepare the E model a. discretize (mesh) the strctre b. prescribe loads c. prescribe spports. Perform calclations

More information

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled.

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled. Jnction elements in network models. Classify by nmber of ports and examine the possible strctres that reslt. Using only one-port elements, no more than two elements can be assembled. Combining two two-ports

More information

Network Coding for Multiple Unicasts: An Approach based on Linear Optimization

Network Coding for Multiple Unicasts: An Approach based on Linear Optimization Network Coding for Mltiple Unicasts: An Approach based on Linear Optimization Danail Traskov, Niranjan Ratnakar, Desmond S. Ln, Ralf Koetter, and Mriel Médard Abstract In this paper we consider the application

More information

An Investigation into Estimating Type B Degrees of Freedom

An Investigation into Estimating Type B Degrees of Freedom An Investigation into Estimating Type B Degrees of H. Castrp President, Integrated Sciences Grop Jne, 00 Backgrond The degrees of freedom associated with an ncertainty estimate qantifies the amont of information

More information

Performance analysis of the MAP equalizer within an iterative receiver including a channel estimator

Performance analysis of the MAP equalizer within an iterative receiver including a channel estimator Performance analysis of the MAP eqalizer within an iterative receiver inclding a channel estimator Nora Sellami ISECS Rote Menzel Chaer m 0.5 B.P 868, 308 Sfax, Tnisia Aline Romy IRISA-INRIA Camps de Bealie

More information

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 BIJU PATNAIK UNIVERSITY OF TECHNOLOGY, ODISHA Lectre Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 Prepared by, Dr. Sbhend Kmar Rath, BPUT, Odisha. Tring Machine- Miscellany UNIT 2 TURING MACHINE

More information

UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL

UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL 8th International DAAAM Baltic Conference "INDUSTRIAL ENGINEERING - 19-1 April 01, Tallinn, Estonia UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL Põdra, P. & Laaneots, R. Abstract: Strength analysis is a

More information

Discussion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli

Discussion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli 1 Introdction Discssion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli Søren Johansen Department of Economics, University of Copenhagen and CREATES,

More information

EE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes

EE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes EE229B - Final Project Capacity-Approaching Low-Density Parity-Check Codes Pierre Garrigues EECS department, UC Berkeley garrigue@eecs.berkeley.edu May 13, 2005 Abstract The class of low-density parity-check

More information

On Generalized EXIT Charts of LDPC Code Ensembles over Binary-Input Output-Symmetric Memoryless Channels

On Generalized EXIT Charts of LDPC Code Ensembles over Binary-Input Output-Symmetric Memoryless Channels 2012 IEEE International Symposium on Information Theory Proceedings On Generalied EXIT Charts of LDPC Code Ensembles over Binary-Input Output-Symmetric Memoryless Channels H Mamani 1, H Saeedi 1, A Eslami

More information

An Introduction to Low-Density Parity-Check Codes

An Introduction to Low-Density Parity-Check Codes An Introduction to Low-Density Parity-Check Codes Paul H. Siegel Electrical and Computer Engineering University of California, San Diego 5/ 3/ 7 Copyright 27 by Paul H. Siegel Outline Shannon s Channel

More information

Lecture 8: September 26

Lecture 8: September 26 10-704: Information Processing and Learning Fall 2016 Lectrer: Aarti Singh Lectre 8: September 26 Note: These notes are based on scribed notes from Spring15 offering of this corse. LaTeX template cortesy

More information

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance Optimal Control of a Heterogeneos Two Server System with Consideration for Power and Performance by Jiazheng Li A thesis presented to the University of Waterloo in flfilment of the thesis reqirement for

More information

Discussion Papers Department of Economics University of Copenhagen

Discussion Papers Department of Economics University of Copenhagen Discssion Papers Department of Economics University of Copenhagen No. 10-06 Discssion of The Forward Search: Theory and Data Analysis, by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli Søren Johansen,

More information

L 1 -smoothing for the Ornstein-Uhlenbeck semigroup

L 1 -smoothing for the Ornstein-Uhlenbeck semigroup L -smoothing for the Ornstein-Uhlenbeck semigrop K. Ball, F. Barthe, W. Bednorz, K. Oleszkiewicz and P. Wolff September, 00 Abstract Given a probability density, we estimate the rate of decay of the measre

More information

Section 7.4: Integration of Rational Functions by Partial Fractions

Section 7.4: Integration of Rational Functions by Partial Fractions Section 7.4: Integration of Rational Fnctions by Partial Fractions This is abot as complicated as it gets. The Method of Partial Fractions Ecept for a few very special cases, crrently we have no way to

More information

Introduction to Low-Density Parity Check Codes. Brian Kurkoski

Introduction to Low-Density Parity Check Codes. Brian Kurkoski Introduction to Low-Density Parity Check Codes Brian Kurkoski kurkoski@ice.uec.ac.jp Outline: Low Density Parity Check Codes Review block codes History Low Density Parity Check Codes Gallager s LDPC code

More information

Move Blocking Strategies in Receding Horizon Control

Move Blocking Strategies in Receding Horizon Control Move Blocking Strategies in Receding Horizon Control Raphael Cagienard, Pascal Grieder, Eric C. Kerrigan and Manfred Morari Abstract In order to deal with the comptational brden of optimal control, it

More information

CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy

CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK Wassim Joini and Christophe Moy SUPELEC, IETR, SCEE, Avene de la Bolaie, CS 47601, 5576 Cesson Sévigné, France. INSERM U96 - IFR140-

More information

A Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem

A Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem A Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem Palo Feofiloff Cristina G. Fernandes Carlos E. Ferreira José Coelho de Pina September 04 Abstract The primal-dal

More information

The Coset Distribution of Triple-Error-Correcting Binary Primitive BCH Codes

The Coset Distribution of Triple-Error-Correcting Binary Primitive BCH Codes IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., APRIL 00 177 The Coset Distribtion of iple-error-correcting Binary Primitive BCH Codes Pascale Charpin, Member, IEEE, TorHelleseth, Fellow, IEEE, VictorA.

More information

A Characterization of Interventional Distributions in Semi-Markovian Causal Models

A Characterization of Interventional Distributions in Semi-Markovian Causal Models A Characterization of Interventional Distribtions in Semi-Markovian Casal Models Jin Tian and Changsng Kang Department of Compter Science Iowa State University Ames, IA 50011 {jtian, cskang}@cs.iastate.ed

More information

Lecture Notes: Finite Element Analysis, J.E. Akin, Rice University

Lecture Notes: Finite Element Analysis, J.E. Akin, Rice University 9. TRUSS ANALYSIS... 1 9.1 PLANAR TRUSS... 1 9. SPACE TRUSS... 11 9.3 SUMMARY... 1 9.4 EXERCISES... 15 9. Trss analysis 9.1 Planar trss: The differential eqation for the eqilibrim of an elastic bar (above)

More information

Characterizations of probability distributions via bivariate regression of record values

Characterizations of probability distributions via bivariate regression of record values Metrika (2008) 68:51 64 DOI 10.1007/s00184-007-0142-7 Characterizations of probability distribtions via bivariate regression of record vales George P. Yanev M. Ahsanllah M. I. Beg Received: 4 October 2006

More information

Fountain Uncorrectable Sets and Finite-Length Analysis

Fountain Uncorrectable Sets and Finite-Length Analysis Fountain Uncorrectable Sets and Finite-Length Analysis Wen Ji 1, Bo-Wei Chen 2, and Yiqiang Chen 1 1 Beijing Key Laboratory of Mobile Computing and Pervasive Device Institute of Computing Technology, Chinese

More information

Discontinuous Fluctuation Distribution for Time-Dependent Problems

Discontinuous Fluctuation Distribution for Time-Dependent Problems Discontinos Flctation Distribtion for Time-Dependent Problems Matthew Hbbard School of Compting, University of Leeds, Leeds, LS2 9JT, UK meh@comp.leeds.ac.k Introdction For some years now, the flctation

More information

STEP Support Programme. STEP III Hyperbolic Functions: Solutions

STEP Support Programme. STEP III Hyperbolic Functions: Solutions STEP Spport Programme STEP III Hyperbolic Fnctions: Soltions Start by sing the sbstittion t cosh x. This gives: sinh x cosh a cosh x cosh a sinh x t sinh x dt t dt t + ln t ln t + ln cosh a ln ln cosh

More information

LOS Component-Based Equal Gain Combining for Ricean Links in Uplink Massive MIMO

LOS Component-Based Equal Gain Combining for Ricean Links in Uplink Massive MIMO 016 Sixth International Conference on Instrmentation & Measrement Compter Commnication and Control LOS Component-Based Eqal Gain Combining for Ricean Lins in plin Massive MIMO Dian-W Ye College of Information

More information

Sources of Non Stationarity in the Semivariogram

Sources of Non Stationarity in the Semivariogram Sorces of Non Stationarity in the Semivariogram Migel A. Cba and Oy Leangthong Traditional ncertainty characterization techniqes sch as Simple Kriging or Seqential Gassian Simlation rely on stationary

More information

Imprecise Continuous-Time Markov Chains

Imprecise Continuous-Time Markov Chains Imprecise Continos-Time Markov Chains Thomas Krak *, Jasper De Bock, and Arno Siebes t.e.krak@.nl, a.p.j.m.siebes@.nl Utrecht University, Department of Information and Compting Sciences, Princetonplein

More information

BLIND IMAGE WATERMARKING BASED ON SAMPLE ROTATION WITH OPTIMAL DETECTOR

BLIND IMAGE WATERMARKING BASED ON SAMPLE ROTATION WITH OPTIMAL DETECTOR 7th Eropean Signal Processing Conference (EUSIPCO 009 Glasgow, Scotland, Agst -8, 009 BLIND IMAGE WATERMARKING BASED ON SAMPLE ROTATION WITH OPTIMAL DETECTOR S.M.E. Sahraeian, M.A. Akhaee, and F. Marvasti

More information

RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths

RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths Kasra Vakilinia, Dariush Divsalar*, and Richard D. Wesel Department of Electrical Engineering, University

More information

The Heat Equation and the Li-Yau Harnack Inequality

The Heat Equation and the Li-Yau Harnack Inequality The Heat Eqation and the Li-Ya Harnack Ineqality Blake Hartley VIGRE Research Paper Abstract In this paper, we develop the necessary mathematics for nderstanding the Li-Ya Harnack ineqality. We begin with

More information

Setting The K Value And Polarization Mode Of The Delta Undulator

Setting The K Value And Polarization Mode Of The Delta Undulator LCLS-TN-4- Setting The Vale And Polarization Mode Of The Delta Undlator Zachary Wolf, Heinz-Dieter Nhn SLAC September 4, 04 Abstract This note provides the details for setting the longitdinal positions

More information

An Introduction to Low Density Parity Check (LDPC) Codes

An Introduction to Low Density Parity Check (LDPC) Codes An Introduction to Low Density Parity Check (LDPC) Codes Jian Sun jian@csee.wvu.edu Wireless Communication Research Laboratory Lane Dept. of Comp. Sci. and Elec. Engr. West Virginia University June 3,

More information

Prediction of Transmission Distortion for Wireless Video Communication: Analysis

Prediction of Transmission Distortion for Wireless Video Communication: Analysis Prediction of Transmission Distortion for Wireless Video Commnication: Analysis Zhifeng Chen and Dapeng W Department of Electrical and Compter Engineering, University of Florida, Gainesville, Florida 326

More information

i=1 y i 1fd i = dg= P N i=1 1fd i = dg.

i=1 y i 1fd i = dg= P N i=1 1fd i = dg. ECOOMETRICS II (ECO 240S) University of Toronto. Department of Economics. Winter 208 Instrctor: Victor Agirregabiria SOLUTIO TO FIAL EXAM Tesday, April 0, 208. From 9:00am-2:00pm (3 hors) ISTRUCTIOS: -

More information

QUANTILE ESTIMATION IN SUCCESSIVE SAMPLING

QUANTILE ESTIMATION IN SUCCESSIVE SAMPLING Jornal of the Korean Statistical Society 2007, 36: 4, pp 543 556 QUANTILE ESTIMATION IN SUCCESSIVE SAMPLING Hosila P. Singh 1, Ritesh Tailor 2, Sarjinder Singh 3 and Jong-Min Kim 4 Abstract In sccessive

More information

Cubic graphs have bounded slope parameter

Cubic graphs have bounded slope parameter Cbic graphs have bonded slope parameter B. Keszegh, J. Pach, D. Pálvölgyi, and G. Tóth Agst 25, 2009 Abstract We show that every finite connected graph G with maximm degree three and with at least one

More information

A Single Species in One Spatial Dimension

A Single Species in One Spatial Dimension Lectre 6 A Single Species in One Spatial Dimension Reading: Material similar to that in this section of the corse appears in Sections 1. and 13.5 of James D. Mrray (), Mathematical Biology I: An introction,

More information

ON THE SHAPES OF BILATERAL GAMMA DENSITIES

ON THE SHAPES OF BILATERAL GAMMA DENSITIES ON THE SHAPES OF BILATERAL GAMMA DENSITIES UWE KÜCHLER, STEFAN TAPPE Abstract. We investigate the for parameter family of bilateral Gamma distribtions. The goal of this paper is to provide a thorogh treatment

More information

Upper Bounds on the Spanning Ratio of Constrained Theta-Graphs

Upper Bounds on the Spanning Ratio of Constrained Theta-Graphs Upper Bonds on the Spanning Ratio of Constrained Theta-Graphs Prosenjit Bose and André van Renssen School of Compter Science, Carleton University, Ottaa, Canada. jit@scs.carleton.ca, andre@cg.scs.carleton.ca

More information

ON THE MINIMUM DISTANCE OF NON-BINARY LDPC CODES. Advisor: Iryna Andriyanova Professor: R.. udiger Urbanke

ON THE MINIMUM DISTANCE OF NON-BINARY LDPC CODES. Advisor: Iryna Andriyanova Professor: R.. udiger Urbanke ON THE MINIMUM DISTANCE OF NON-BINARY LDPC CODES RETHNAKARAN PULIKKOONATTU ABSTRACT. Minimum distance is an important parameter of a linear error correcting code. For improved performance of binary Low

More information

LDPC Codes. Slides originally from I. Land p.1

LDPC Codes. Slides originally from I. Land p.1 Slides originally from I. Land p.1 LDPC Codes Definition of LDPC Codes Factor Graphs to use in decoding Decoding for binary erasure channels EXIT charts Soft-Output Decoding Turbo principle applied to

More information

CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES. George P. Yanev

CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES. George P. Yanev Pliska Std. Math. Blgar. 2 (211), 233 242 STUDIA MATHEMATICA BULGARICA CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES George P. Yanev We prove that the exponential

More information

Bounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel

Bounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel Bounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel Ohad Barak, David Burshtein and Meir Feder School of Electrical Engineering Tel-Aviv University Tel-Aviv 69978, Israel Abstract

More information

PhysicsAndMathsTutor.com

PhysicsAndMathsTutor.com C Integration - By sbstittion PhysicsAndMathsTtor.com. Using the sbstittion cos +, or otherwise, show that e cos + sin d e(e ) (Total marks). (a) Using the sbstittion cos, or otherwise, find the eact vale

More information

MEASUREMENT OF TURBULENCE STATISTICS USING HOT WIRE ANEMOMETRY

MEASUREMENT OF TURBULENCE STATISTICS USING HOT WIRE ANEMOMETRY MEASUREMENT OF TURBULENCE STATISTICS USING HOT WIRE ANEMOMETRY Mrgan Thangadrai +, Atl Kmar Son *, Mritynjay Singh +, Sbhendra *, Vinoth Kmar ++, Ram Pyare Singh +, Pradip K Chatterjee + + Thermal Engineering,

More information

1 Undiscounted Problem (Deterministic)

1 Undiscounted Problem (Deterministic) Lectre 9: Linear Qadratic Control Problems 1 Undisconted Problem (Deterministic) Choose ( t ) 0 to Minimize (x trx t + tq t ) t=0 sbject to x t+1 = Ax t + B t, x 0 given. x t is an n-vector state, t a

More information

Technical Note. ODiSI-B Sensor Strain Gage Factor Uncertainty

Technical Note. ODiSI-B Sensor Strain Gage Factor Uncertainty Technical Note EN-FY160 Revision November 30, 016 ODiSI-B Sensor Strain Gage Factor Uncertainty Abstract Lna has pdated or strain sensor calibration tool to spport NIST-traceable measrements, to compte

More information

Non-coherent Rayleigh fading MIMO channels: Capacity and optimal input

Non-coherent Rayleigh fading MIMO channels: Capacity and optimal input Non-coherent Rayleigh fading MIMO channels: Capacity and optimal inpt Rasika R. Perera, Tony S. Pollock*, and Thshara D. Abhayapala* Department of Information Engineering Research School of Information

More information

CONCERNING A CONJECTURE OF MARSHALL HALL

CONCERNING A CONJECTURE OF MARSHALL HALL CONCERNING A CONJECTURE OF MARSHALL HALL RICHARD SINKHORN Introdction. An «X«matrix A is said to be dobly stochastic if Oij; = and if ï i aik = jj_i akj = 1 for all i and j. The set of «X«dobly stochastic

More information

4.2 First-Order Logic

4.2 First-Order Logic 64 First-Order Logic and Type Theory The problem can be seen in the two qestionable rles In the existential introdction, the term a has not yet been introdced into the derivation and its se can therefore

More information

Konyalioglu, Serpil. Konyalioglu, A.Cihan. Ipek, A.Sabri. Isik, Ahmet

Konyalioglu, Serpil. Konyalioglu, A.Cihan. Ipek, A.Sabri. Isik, Ahmet The Role of Visalization Approach on Stdent s Conceptal Learning Konyaliogl, Serpil Department of Secondary Science and Mathematics Edcation, K.K. Edcation Faclty, Atatürk University, 25240- Erzrm-Trkey;

More information

Channel Polarization and Blackwell Measures

Channel Polarization and Blackwell Measures Channel Polarization Blackwell Measures Maxim Raginsky Abstract The Blackwell measure of a binary-input channel (BIC is the distribution of the posterior probability of 0 under the uniform input distribution

More information

On the tree cover number of a graph

On the tree cover number of a graph On the tree cover nmber of a graph Chassidy Bozeman Minerva Catral Brendan Cook Oscar E. González Carolyn Reinhart Abstract Given a graph G, the tree cover nmber of the graph, denoted T (G), is the minimm

More information

Reflections on a mismatched transmission line Reflections.doc (4/1/00) Introduction The transmission line equations are given by

Reflections on a mismatched transmission line Reflections.doc (4/1/00) Introduction The transmission line equations are given by Reflections on a mismatched transmission line Reflections.doc (4/1/00) Introdction The transmission line eqations are given by, I z, t V z t l z t I z, t V z, t c z t (1) (2) Where, c is the per-nit-length

More information

Iterative Encoding of Low-Density Parity-Check Codes

Iterative Encoding of Low-Density Parity-Check Codes Iterative Encoding of Low-Density Parity-Check Codes David Haley, Alex Grant and John Buetefuer Institute for Telecommunications Research University of South Australia Mawson Lakes Blvd Mawson Lakes SA

More information

Universal Scheme for Optimal Search and Stop

Universal Scheme for Optimal Search and Stop Universal Scheme for Optimal Search and Stop Sirin Nitinawarat Qalcomm Technologies, Inc. 5775 Morehose Drive San Diego, CA 92121, USA Email: sirin.nitinawarat@gmail.com Vengopal V. Veeravalli Coordinated

More information

Assignment Fall 2014

Assignment Fall 2014 Assignment 5.086 Fall 04 De: Wednesday, 0 December at 5 PM. Upload yor soltion to corse website as a zip file YOURNAME_ASSIGNMENT_5 which incldes the script for each qestion as well as all Matlab fnctions

More information

Study on the impulsive pressure of tank oscillating by force towards multiple degrees of freedom

Study on the impulsive pressure of tank oscillating by force towards multiple degrees of freedom EPJ Web of Conferences 80, 0034 (08) EFM 07 Stdy on the implsive pressre of tank oscillating by force towards mltiple degrees of freedom Shigeyki Hibi,* The ational Defense Academy, Department of Mechanical

More information

Bayes and Naïve Bayes Classifiers CS434

Bayes and Naïve Bayes Classifiers CS434 Bayes and Naïve Bayes Classifiers CS434 In this lectre 1. Review some basic probability concepts 2. Introdce a sefl probabilistic rle - Bayes rle 3. Introdce the learning algorithm based on Bayes rle (ths

More information

Lecture 4: Proof of Shannon s theorem and an explicit code

Lecture 4: Proof of Shannon s theorem and an explicit code CSE 533: Error-Correcting Codes (Autumn 006 Lecture 4: Proof of Shannon s theorem and an explicit code October 11, 006 Lecturer: Venkatesan Guruswami Scribe: Atri Rudra 1 Overview Last lecture we stated

More information

Lecture 4 Noisy Channel Coding

Lecture 4 Noisy Channel Coding Lecture 4 Noisy Channel Coding I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw October 9, 2015 1 / 56 I-Hsiang Wang IT Lecture 4 The Channel Coding Problem

More information

Single-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes

Single-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes Single-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes Brian M. Kurkoski, Kazuhiko Yamaguchi and Kingo Kobayashi kurkoski@ice.uec.ac.jp Dept. of Information and Communications Engineering

More information

Practical Polar Code Construction Using Generalised Generator Matrices

Practical Polar Code Construction Using Generalised Generator Matrices Practical Polar Code Construction Using Generalised Generator Matrices Berksan Serbetci and Ali E. Pusane Department of Electrical and Electronics Engineering Bogazici University Istanbul, Turkey E-mail:

More information

Lecture 8: Shannon s Noise Models

Lecture 8: Shannon s Noise Models Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecture 8: Shannon s Noise Models September 14, 2007 Lecturer: Atri Rudra Scribe: Sandipan Kundu& Atri Rudra Till now we have

More information

The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks

The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks The Cryptanalysis of a New Pblic-Key Cryptosystem based on Modlar Knapsacks Yeow Meng Chee Antoine Jox National Compter Systems DMI-GRECC Center for Information Technology 45 re d Ulm 73 Science Park Drive,

More information

On Achievable Rates and Complexity of LDPC Codes over Parallel Channels: Bounds and Applications

On Achievable Rates and Complexity of LDPC Codes over Parallel Channels: Bounds and Applications On Achievable Rates and Complexity of LDPC Codes over Parallel Channels: Bounds and Applications Igal Sason, Member and Gil Wiechman, Graduate Student Member Abstract A variety of communication scenarios

More information

Outline. Model Predictive Control: Current Status and Future Challenges. Separation of the control problem. Separation of the control problem

Outline. Model Predictive Control: Current Status and Future Challenges. Separation of the control problem. Separation of the control problem Otline Model Predictive Control: Crrent Stats and Ftre Challenges James B. Rawlings Department of Chemical and Biological Engineering University of Wisconsin Madison UCLA Control Symposim May, 6 Overview

More information

DEFINITION OF A NEW UO 2 F 2 DENSITY LAW FOR LOW- MODERATED SOLUTIONS (H/U < 20) AND CONSEQUENCES ON CRITICALITY SAFETY

DEFINITION OF A NEW UO 2 F 2 DENSITY LAW FOR LOW- MODERATED SOLUTIONS (H/U < 20) AND CONSEQUENCES ON CRITICALITY SAFETY DEFINITION OF A NEW UO 2 F 2 DENSITY LAW FOR LOW- MODERATED SOLUTIONS ( < 20) AND CONSEQUENCES ON CRITICALITY SAFETY N. Leclaire, S. Evo, I.R.S.N., France Introdction In criticality stdies, the blk density

More information

Conditions for Approaching the Origin without Intersecting the x-axis in the Liénard Plane

Conditions for Approaching the Origin without Intersecting the x-axis in the Liénard Plane Filomat 3:2 (27), 376 377 https://doi.org/.2298/fil7276a Pblished by Faclty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Conditions for Approaching

More information

FEA Solution Procedure

FEA Solution Procedure EA Soltion Procedre (demonstrated with a -D bar element problem) MAE 5 - inite Element Analysis Several slides from this set are adapted from B.S. Altan, Michigan Technological University EA Procedre for

More information

RELIABILITY ASPECTS OF PROPORTIONAL MEAN RESIDUAL LIFE MODEL USING QUANTILE FUNC- TIONS

RELIABILITY ASPECTS OF PROPORTIONAL MEAN RESIDUAL LIFE MODEL USING QUANTILE FUNC- TIONS RELIABILITY ASPECTS OF PROPORTIONAL MEAN RESIDUAL LIFE MODEL USING QUANTILE FUNC- TIONS Athors: N.UNNIKRISHNAN NAIR Department of Statistics, Cochin University of Science Technology, Cochin, Kerala, INDIA

More information

Low-density parity-check codes

Low-density parity-check codes Low-density parity-check codes From principles to practice Dr. Steve Weller steven.weller@newcastle.edu.au School of Electrical Engineering and Computer Science The University of Newcastle, Callaghan,

More information

Convex Hypersurfaces of Constant Curvature in Hyperbolic Space

Convex Hypersurfaces of Constant Curvature in Hyperbolic Space Srvey in Geometric Analysis and Relativity ALM 0, pp. 41 57 c Higher Edcation Press and International Press Beijing-Boston Convex Hypersrfaces of Constant Crvatre in Hyperbolic Space Bo Gan and Joel Sprck

More information

Information Source Detection in the SIR Model: A Sample Path Based Approach

Information Source Detection in the SIR Model: A Sample Path Based Approach Information Sorce Detection in the SIR Model: A Sample Path Based Approach Kai Zh and Lei Ying School of Electrical, Compter and Energy Engineering Arizona State University Tempe, AZ, United States, 85287

More information

Introdction Finite elds play an increasingly important role in modern digital commnication systems. Typical areas of applications are cryptographic sc

Introdction Finite elds play an increasingly important role in modern digital commnication systems. Typical areas of applications are cryptographic sc A New Architectre for a Parallel Finite Field Mltiplier with Low Complexity Based on Composite Fields Christof Paar y IEEE Transactions on Compters, Jly 996, vol 45, no 7, pp 856-86 Abstract In this paper

More information

A Model-Free Adaptive Control of Pulsed GTAW

A Model-Free Adaptive Control of Pulsed GTAW A Model-Free Adaptive Control of Plsed GTAW F.L. Lv 1, S.B. Chen 1, and S.W. Dai 1 Institte of Welding Technology, Shanghai Jiao Tong University, Shanghai 00030, P.R. China Department of Atomatic Control,

More information

Lecture 2: CENTRAL LIMIT THEOREM

Lecture 2: CENTRAL LIMIT THEOREM A Theorist s Toolkit (CMU 8-859T, Fall 3) Lectre : CENTRAL LIMIT THEOREM September th, 3 Lectrer: Ryan O Donnell Scribe: Anonymos SUM OF RANDOM VARIABLES Let X, X, X 3,... be i.i.d. random variables (Here

More information

Time-invariant LDPC convolutional codes

Time-invariant LDPC convolutional codes Time-invariant LDPC convolutional codes Dimitris Achlioptas, Hamed Hassani, Wei Liu, and Rüdiger Urbanke Department of Computer Science, UC Santa Cruz, USA Email: achlioptas@csucscedu Department of Computer

More information

Department of Industrial Engineering Statistical Quality Control presented by Dr. Eng. Abed Schokry

Department of Industrial Engineering Statistical Quality Control presented by Dr. Eng. Abed Schokry Department of Indstrial Engineering Statistical Qality Control presented by Dr. Eng. Abed Schokry Department of Indstrial Engineering Statistical Qality Control C and U Chart presented by Dr. Eng. Abed

More information

Capacity Provisioning for Schedulers with Tiny Buffers

Capacity Provisioning for Schedulers with Tiny Buffers Capacity Provisioning for Schedlers with Tiny Bffers Yashar Ghiassi-Farrokhfal and Jörg Liebeherr Department of Electrical and Compter Engineering University of Toronto Abstract Capacity and bffer sizes

More information

Study on the Mathematic Model of Product Modular System Orienting the Modular Design

Study on the Mathematic Model of Product Modular System Orienting the Modular Design Natre and Science, 2(, 2004, Zhong, et al, Stdy on the Mathematic Model Stdy on the Mathematic Model of Prodct Modlar Orienting the Modlar Design Shisheng Zhong 1, Jiang Li 1, Jin Li 2, Lin Lin 1 (1. College

More information

We automate the bivariate change-of-variables technique for bivariate continuous random variables with

We automate the bivariate change-of-variables technique for bivariate continuous random variables with INFORMS Jornal on Compting Vol. 4, No., Winter 0, pp. 9 ISSN 09-9856 (print) ISSN 56-558 (online) http://dx.doi.org/0.87/ijoc.046 0 INFORMS Atomating Biariate Transformations Jeff X. Yang, John H. Drew,

More information

Formal Methods for Deriving Element Equations

Formal Methods for Deriving Element Equations Formal Methods for Deriving Element Eqations And the importance of Shape Fnctions Formal Methods In previos lectres we obtained a bar element s stiffness eqations sing the Direct Method to obtain eact

More information

E ect Of Quadrant Bow On Delta Undulator Phase Errors

E ect Of Quadrant Bow On Delta Undulator Phase Errors LCLS-TN-15-1 E ect Of Qadrant Bow On Delta Undlator Phase Errors Zachary Wolf SLAC Febrary 18, 015 Abstract The Delta ndlator qadrants are tned individally and are then assembled to make the tned ndlator.

More information

FEA Solution Procedure

FEA Solution Procedure EA Soltion rocedre (demonstrated with a -D bar element problem) MAE - inite Element Analysis Many slides from this set are originally from B.S. Altan, Michigan Technological U. EA rocedre for Static Analysis.

More information

Modelling by Differential Equations from Properties of Phenomenon to its Investigation

Modelling by Differential Equations from Properties of Phenomenon to its Investigation Modelling by Differential Eqations from Properties of Phenomenon to its Investigation V. Kleiza and O. Prvinis Kanas University of Technology, Lithania Abstract The Panevezys camps of Kanas University

More information

Graph-based Codes for Quantize-Map-and-Forward Relaying

Graph-based Codes for Quantize-Map-and-Forward Relaying 20 IEEE Information Theory Workshop Graph-based Codes for Quantize-Map-and-Forward Relaying Ayan Sengupta, Siddhartha Brahma, Ayfer Özgür, Christina Fragouli and Suhas Diggavi EPFL, Switzerland, UCLA,

More information

FRTN10 Exercise 12. Synthesis by Convex Optimization

FRTN10 Exercise 12. Synthesis by Convex Optimization FRTN Exercise 2. 2. We want to design a controller C for the stable SISO process P as shown in Figre 2. sing the Yola parametrization and convex optimization. To do this, the control loop mst first be

More information

Optimal search: a practical interpretation of information-driven sensor management

Optimal search: a practical interpretation of information-driven sensor management Optimal search: a practical interpretation of information-driven sensor management Fotios Katsilieris, Yvo Boers and Hans Driessen Thales Nederland B.V. Hengelo, the Netherlands Email: {Fotios.Katsilieris,

More information

LOW-density parity-check (LDPC) codes were invented

LOW-density parity-check (LDPC) codes were invented IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 1, JANUARY 2008 51 Extremal Problems of Information Combining Yibo Jiang, Alexei Ashikhmin, Member, IEEE, Ralf Koetter, Senior Member, IEEE, and Andrew

More information