Phase Transitions for Mutual Information
|
|
- Constance Nash
- 6 years ago
- Views:
Transcription
1 Phase Transitions for Mtal Information K. Raj Kmar*, Payam Pakzad t, Amir Hesam Salavati* and Amin Shokrollahi* *Laboratoire d' algorithmiqe Ecole Poly techniqe Federale de Lasanne, 05 Lasanne, Switzerland tqalcomm, Inc., 395 Kifer Road, Santa Clara, CA 9505, USA Abstract-We consider ensembles of binary linear error correcting codes, obtained by sampling each colmn of the generator matrix G or parity check matrix H independently from the set of all binary vectors of weight d (of appropriate dimension). We investigate the circmstances nder which the mtal information between a randomly chosen codeword and the vector obtained after its transmission over a binary inpt memoryless symmetric channel (BIMSC) e is exactly n times the capacity of e, where n is the length of the code. For several channels sch as the binary symmetric channel (BSC) and the binary-inpt additive white Gassian noise (AWGN) channel, we prove that the probability of this event has a threshold behavior, depending on whether n/k is smaller than a certain qantity (that depends on the particlar channel e and d), where k is the nmber of sorce bits. To show this, we prove a generalization of the following wellknown theorem: the expectation of the size of the right kernel of G has a phase transition from to infinity, depending on whether or not n/k is smaller than a certain qantity depending on the chosen ensemble. I. INTRODUCTION The development of the theory of modern codes over the past two decades has reslted in the constrction of practical error correcting codes that operate extremely close to the performance limits dictated by information theory. These modern codes admit low complexity decoding techniqes based on the idea of belief propagation. It has been shown that the ensemble of low density parity check (LDPC) codes and Raptor codes are capacity achieving over the binary erasre channel (BEC). Roghly speaking, the BEC is an idealized channel in which information symbols (bits) are either "lost", or recovered with no error, which may be sed to model for example a packetized commnication system with perfect error detection. However, most practical channels also involve errors, casing information symbols to be confsed with one another. When one moves away from the framework of the BEC to more general memoryless symmetric channels, very few analytical reslts exist regarding the performance of modern coding ensembles. The goal of this paper is to investigate sch reslts from an information theoretic point of view. We consider the transmission of a vector X E lf over a general binary inpt memoryless symmetric channel (BIMSC) e. The vector X is transformed by a linear encoder into a vector Y E lf throgh the mapping Y = XG, with the "generator matrix" G E lf xn (note that we are not assming that n :: k, so G is not a generator matrix in traditional sense). The vector Y is then transmitted over the channel e, to obtain Z. We will consider the case that the encoder G corresponds to a family of "LTlRaptor-like" or "LDPC-like" codes. In order to make this notion more precise, we define Cd(, m) to be the ensemble of all x m matrices whose colmns are sampled independently from the set of vectors v E lf of weight d. For brevity, we will se the notation Cd for the ensemble Cd(, m), the dimensions will be clear from context. Frther, we will call an ensemble of codes to be d-niform if either the generator matrix of the code or the parity check matrix of the code is drawn from Cd. We will be interested in evalating the performance of sch d-niform ensembles of codes. For this setting, the primary qestion that we wold like to answer is the following: nder the assmption of long blocklengths, what is the probability that the mtal information I (X; Z) is close to n times the capacity of the channel e? For a particlar d-niform ensemble of codes, we define the probability IId,e = Pr{I(X; Z) < ncap(e)}. For reasons of analytical tractability, we also define the following probability ITd,e = Pr{I(X; Z) < ncap(e) - o(n)}. We conjectre that the mtal information exhibits the following phase transition. Conjectre : For any BIMSC e and any integer d, there exists a positive real nmber B( d, e) sch that if n / k converges to a vale ] as n -+ 00, { then A 0 if ] < B( d, e) IId,e -+. if ] > B( d, e) In the crrent work, we attempt to prove this conjectre for a few important and practical classes of channels, inclding the binary symmetric channel (BSC) and the additive white Gassian noise (AWGN) channel. In certain cases, we will prove a weaker version of Conjectre, by showing that IId,e converges to 0 if n/k is below a certain threshold. In the most general case of an arbitrary BIMSC, the proof of Conjectre remains an open problem. It is very informative to look first at the case where the channel e = J is the trivial (error-free) channel, sch that Z = Y. In this case, it is easy to see that the mtal information I(X; Z) = rk( G), where rk( G) denotes the rank of the matrix /0/$6.00 0O IEEE 37
2 d Q(d,:!) B(d,:!) TABLE I VALUES OF Q(d,:!) AND B(d,:!) FOR VARIOUS d G. Hence in this case, we have that IId,:/ = Pr{rk(G) < n}. Using the nion bond, one can show that Pr{rk(G) < n} :::; le[llker(g)i] -l, () where lker( G) denotes the left kernel of the matrix G. We have the following well-known reslt on the phase transition behavior of the size of the left-kernel, see [3, Theorem 3.5.]. Theorem : Let the generator matrix G be drawn from the ensemble Cd, with d 3. Frther, let a( d,:) be defined as the first component of the vector (a, x,..\) that is the niqe soltion of the system of eqations e - x cosh(..\) ( ad )a ad _ x ( ad: xr/ d..\ tanh(..\) Sppose that k, n sch that njk -+ a. Then, if a < a( d, :), then E[llker( G) I] -+, and if a > a( d, :), then E[llker(G)I] Notice that this immediately yields that IId,:/ -+ 0 if a < a( d, :), bt only yields a trivial bond on IId,:/ if a > a( d, :). The following theorem from [5] proves Conjectre for the case e =:. Theorem : Let In(d 'Y d - := d(l _ (d) d -l ' where (d is the smallest root of z ( - In z) - ;:t In z - = o for z E [0,]. Then Conjectre is tre for e = : and O(d,:) := 'Y d. In other words, if n, k sch that njk -+ a and a < O( d, :), then ITd,:/ -+ 0, whereas ITd,:/ -+ if a> O(d,:). Table I gives vales of O(d,:) and a(d,:) for varios d. Finally, we wold like to comment on literatre related to the topic of this paper. The reslts that are closest to the spirit of those in this paper are the ones in []-[3], [5]; one can think of these reslts as special cases of or reslts when the channel e is error-free. There is a whole set of other papers that discss nder which conditions I (X; Z) = k, so that ML-decoding is sccessfl'. The most general among sch reslts (bt with a limited range i For G to achieve capacity, we need to have that lex; Z) = k; however, we are interested in this paper in the case when I (X; Z) = ncap( e). These two qantities are eqal only if k = ncap( e), so that the rate of the code is eqal to the capacity.,, x. of applicability) are those of MacMllan and Collins [6] which analyze the inherent gap of certain families of binary linear codes sch as the Hamming and Golay codes to the capacity of the BSC. For ensembles of sparse matrices the qestion of achievability of capacity is not new, of corse. Already in his thesis, Gallager [7, pp ] showed that the rate of a right (or check-) reglar LDPC code that achieves reliable commnication over a BSC sing ML decoding is bonded away from the capacity of the channel by a fnction depending on the right degree of the nderlying graph. In particlar, the right degree has to go to infinity if the code is to approach capacity. Richardson et al. [8] proved that the same conclsion holds for the maximm right degree, if the graph is not rightreglar; this implies that the reslt also applies when taking the average right degree, instead. Brshtein et al. [9] generalized these reslts to general BIMSC. These reslts were themselves generalized and optimized by Sason and Urbanke [0] who gave rather close gaps to capacity for LDPC codes with given average right degree. Thogh it may seem to a reader that this paper is investigating a similar problem as those of the above papers, this is not entirely the case. In all the above cases, either k - I (X; Z) is calclated directly (e.g., in [6]), or an pper bond is obtained on the entropy H (Z) to show that I (X; Z) is bonded away from k (as is the case in [7]-[0]). For s a direct calclation of k - I(X; Z) is very difficlt, so that the reslts of [6] are not directly applicable. Moreover, we are interested in lower bonds for H(Z) (or rather, its expectation), rather than pper bonds, so the mentioned reslts are not applicable either. II. THE CASE e = BSC(p) In this section, we stdy the case of a BSC with crossover probability p, denoted by e = BSC(p). The main theorem of this section is the following. Theorem 3: Let Bw denote the nmber of words of weight w in the right kernel of the matrix G. Then Pr[I(X; Z) < ncap(e)] :::; 0g (t, le[bw](l - P) W). Note that if we assme e = :, so that p = 0, then I(X; Z) is the rank of the matrix G, and Lw Bw is the size of the right kernel of G. Hence, the statement of the theorem says that Pr[rk(G) < n] :::; 0g(lE[llker(G)J) :::; le[llker(g)i] -, and we have retrieved (). To prove Theorem 3, we need an axiliary reslt, which may be interesting in its own right. Theorem 4: Let D be a distribtion on F, with entropy H(D), and let P := PrD[x = ]. For v E F let qv := L, (lv) = l P, where ( v) is the scalar prodct of and v (over F ). Then we have n - H(D) :::; 0g (L ( - Qv) ). vef' 38
3 that Proof" We will first remark some general facts. First, note -qv = -qv-qv = L P- L P = L( -) ( v) p, (lv)=o (lv)=l so that the vector (-qv I v E lf ) is the Hadamard transform of the vector (P I E lf ). Let H be the n x n-hadamard matrix. Since HI y'ri is a nitary matrix, we have ",, P = n ( - qv ). () EIF' v Note that by the concavity of the logarithm fnction, we have for all Xl,..., Xm 0 and all ai,..., am 0 with Li ai = : Specializing to m = k, and a = X = P, we see that L..J - JF ' p > II..,p = -H(D) so that which is the statement of the theorem. We omit the proof of the following corollary for lack of space. Corollary : Sppose that C is an [n, k]-code, and that Y = (Yb..., Yn) is a vector chosen from C niformly at random. Moreover, sppose that for i =,..., n the random variables ei are independent binary Bernolli random variables with Pr[ei = ] = Pi, and sppose that Y, eb.., en are independent. Let Z = (Zl'...' zn) be the vector with Zi = Yi + ei. Then we have Since log(x) is a concave fnction, we have for any random variable U over the positive real nmbers: IE [log (U)] :::; log(ie[u]), hence it sffices to prove that Pr[I(X; Z) < ncap(e)] :::; n - E [H(Z)]. Let be a random variable taking vales in the set {O,,..., t}, and let Pi denote the probability that the vale of is i. Then Pr[ < t] = Po Pt-l = - Pt :::; Pt-l + pt tpo = t - E []. We apply this reslt to = I(X; Z) and t = ncap(e) to obtain that the probability in qestion is pper bonded by ncap(e) -E[I(X; Z)]. Noting that I(X; Z) = H(Z) -H(ZIX) = H(Z) -n h(p), and that Cap(e) = - h(p), the reslt follows. The ineqality of Theorem 4 cannot be improved since it is tight for flat distribtions. In other words, if D is a niform distribtion over a k-dimensional sbspace of lf, where :::; k :::; n, then eqality is achieved. Using the above reslts, we obtain the following theorem whose proof is omitted for lack of space. Theorem 5: Let d 3 be fixed and e = BSC(p). Define f(>..) := ed cosh(>..)d/>..tanh(>..) (tanh(>..)) d (-p), >..tanh(>..) (tanh(>..)) >" tanh( >" ) ( d ) <> g(>.., ) := cosh(>") e d ->..tanh(>..) and ( ) - _ { _ (d ->..tanh(>..) ) >" tanh( >" )/d. >.. tanh(>..) e ( - p), ( <f>d) i)} + e - HI-. where H (z) is the entropy of the probability distribtion of the random variable z. In particlar, if all the Pi are eqal to p, then n -H(z) :::; log (t. Bw(l - P) W), where Bw is the nmber of words of weight w in the right kernel of G. The proof of Theorem 3 follows from the previos corollary. For lack of space, we confine orselves to providing a sketch only. Proof" (Of Theorem 3 - Sketch) Let C be the code generated by the rows of the matrix G. Then, by the previos corollary, we have n - E [H(Z)] :::; IE [IOg (t. Bw(l - P) W) ]. Let /00 be the maximm of f(>..) in the interval (0, (0), and let Ol be the largest positive vale of sch that g( >.., ) :::; for all >.. with >.. tanh( >..) :::; d. Also, let O be the maximm vale of 0 sch that ( ) < p. Set o:(d, e) := min (max(oo, Ol), (). Sppose that n, k go to infinity sch that nlk --+ 0:. Then IId,e if 0: < o:(d, e). The case d = is more involved. In fact, we cannot show that 0:(, BSC(p)) exists. However, it was proved in [4] that in this case the analogos threshold for fi,bsc(p)' viz., 0(, BSC(p)) exists and 0(, BSC(p)) = ( _ p ) Moreover, when d =, one can show that the largest vale of and happens when> O. fnction f(>..)! is eqal to ( p) Table II gives the vale of Cap(BSC(p) )o:( d, BSC(p)) = (-h(p))o:( d, BSC(p)) for varios d and p. One wold expect these vales to converge to as d grows. While this is seen to happen for p «: (see also Table I that corresponds to the limiting case of p = 0), the vales converge to arond / 39
4 d\p ;j A simple maniplation yields TABLE II THE VALUES OF (- h(p))a(d, BSC(p)) FOR VARIOUS VALUES OF d AND p. when p converges to /. This sggests that there is room for improvement in the bonds of Theorem 5. It can be shown that the reslts for the BSC also extend to reslts for the convex combination of BSCs. Details are omitted for brevity. III. THE AWGN CHANNEL We now trn or attention to the case when e = AWGN(p) is a binary inpt (real) AWGN channel, whose otpt Z E IRn may be written as Z=Y+W, where W rv i.i.d. N (0, i I). We assme standard binary phase shift keying (BP K) modlation for transmission over the AWGN channel, i.e., we map component-wise the binary codeword Y t-+ (-) Y prior to transmission over the channel. With a slight abse of notation, we refer to both the binary codeword and the modlated symbols with the same notation Y; the one being referred to will be clear from the context. Hence p denotes the signal to noise ratio (SNR) of the AWGN channel. As before, we first develop a lower bond on the mtal information between the inpt and otpt. I(X; Z) H(Z) -H(ZIX) = H(Z) -! log (7re) n. (3) p n Using Jensen's ineqality, we lower bond the entropy as H(Z) -log [/ p (Z) dz], (4) where p( Z) denotes the pdf of the otpt Z. Define the code Cy = { Y = XG I X E F } { Yb Y,,Yk} (note that if G is not fll-rank, then not all Yi are distinct). Then, we may write k p p (Z) = n/ _ '"' e- IZ-YiI. k ( )n We may hence evalate From (3), (4) and (5), we obtain Since BPSK modlation is sed, IYj -Yi l = 4dH (Yj, Yi), where dh(a, B) denotes the Hamming distance between A and B. Since we employ a linear code, we may frther simplify the above ineqality to obtain I(X; Z) -log " [ ( e) n/ k k exp { - p WH(Yi n, where WH(X) denotes the Hamming weight of X. If we define Cw to be the nmber of codewords with Hamming weight w, we may rewrite the above as: [( e ) n / n ] I(X;Z) -log " k C we- w p. (6) In order to examine Conjectre for e = AWGN(p), we evalate Pr { I(X; Z) < n(cap(e) - n :::; Pr { -log [ G) n / k t Cwe- w p] < n(cap(e) - )} = Pr { ( cap(e)-r ) n t. Cwe- w p > n }, (7) bn b where is a constant independent of n, k. An analysis of the term S n C e-p w L...w=l w, where = IKCap(e)-R Y' is a constant that is independent of n leads to the following theorem. Theorem 6: Let d 3 be a fixed constant, and e = AWGN(p). Define f().., 0) = In [b9 ( edo ) A ta:;h A]_ p).. tanh)" (0 - ).. tanh)" d + In cosh)" + ).. tanh )''In (ta:h).. ) (8) 40
5 and (A ()) d [( tanh I A) A tanh A b g, A tanh A n (()d)b (d76 -AtanhA) -b cosh A] (() - ) 6 (A tanha) e. -po Let ()l «()) denote the maximm vale of () for which the fnction f(a, ()) (respectively, g(a, ()) is less than zero for all non-negative A sch that A tanh A 9 ' Set ()(d, e) = min {, max{()l, ()}}. If n, k sch that n/k --+ 0:, then ITd,e if 0: < ()(d, e). Proof" (Sketch) In order to analyze Cw, we consider two scenarios. When n ;::: k, we se a good channel code to transmit information across the channel. On the other hand, when n < k, we need to compress (qantize) the information to be sent over the channel. We first examine the case when n;::: k. ) Channel coding when n ;::: k: We define or channel coding ensemble in the following manner. Choose the parity check matrix H E lf n-k) x n from the ensemble ed. The qantity Cw is eqal to the nmber of vectors with weight w in the right kernel of H, or in the left kernel of H T. Along the lines of the proof of Theorem 3.5. in Sec. 3.6 of [3], we analyze S by splitting the sm into three regions, Sl = bn L::ow<o Cwe-P w, S = bn n LO n ::ow«l - o ) n Cw e-p w and S3 = (9) bn L ( - o ) n ::ow::o n Cw e-p w, where O. We otline the analysis of these terms in the seqel, omitting details for lack of space. a) Analysis of Sl: From the proof of Lemma 3.5. in [3], we can show that Sl E ', for some 8 > 0, where E ' > 0 is an arbitrary constant. b) Analysis of S: Define () = n/k. Along the lines of the analysis in [3], it can be shown that S vanishes if for all non-negative A sch that A tanh A 9 ' either f(a, ()) < 0 or g(a, ()) < 0, where the fnctions f and g are as defined in (8), (9). c) Analysis of S3: Along the lines of the proof of Lemma 3.5. in [3], we can show that S when we set E ;::: log (JI) bits. ) Compression (Qantization) for n < k: We fix G to be any k x n binary matrix that is of rank n. Hence, as X varies over all k-tples, Y varies over all n-tples, with each n-tple appearing k-n times in the qantizer codebook. This reslts in Cw = k-n ( :). Consider We may now evalate (7) as bnk-n t. (: ) e-p w bnk-n ( + e-pt. Pr{I(X; Z) < n( Cap( C)- E)} Pr {b*- ( + e-p) > }. d\ P(dH) TABLE III THE VALUES OF CAP( AWGN(p» 8(d, AWGN(p» FOR VARIOUS VALUES ofdand p. It can be show that if one sets E ;::: log (JI), the right-hand side converges to zero. Shown in Table III are the vales of Cap(AWGN(p))()(d,AWGN(p)) for several vales of p and d. Notice that the bonds for the case of the A WGN are very tight in terms of the threshold vales for the rate being almost at capacity for even moderate vales of d. However, or main theorem for the AWGN, Theorem 6 is in some sense weaker than the corresponding reslt for the BSC in Theorem 5, since the former proves a statement abot ITd,e involving a linear back-off from capacity, while the latter shows a reslt relating to IId,e with no back-off from capacity. IV. ACKNOWLEDGEMENTS This work was spported by Grant 80-ECCSciEng of the Eropean Research Concil. The athors wold like to thank Mahdi Cheraghchi, Venkat Grswami, Shlomo Shamai, Emre Telatar, and David Tse for helpfl discssions and comments dring the research on this paper. REFERENCES [] J. Blomer, R Karp, and E. Welzl, "The rank of sparse random matrices over finite fields;' Random Strctres and Algorithms, vol. 0, no. 4, pp , 997. [] N. Calkin, "Dependent sets of constant weight binary vectors;' Combinatorics, Probability, and Compting, vol. 6, pp , 003. [3] V.F. Kolchin, Random Graphs, Nmber 53 in Encyclopedia of Mathematics and its Applications, Cambridge University Press, 999. [4] O. Etesami and A. Shokrollahi, "Raptor codes on binary memoryless symmetric channels," IEEE Trans. Inform. Theory, vol. 5, no. 5, pp , 006. [5] P. Pakzad and A. Shokrollahi, "EXIT fnctions for LT and raptor codes, and asymptotic ranks of random matrices," in Proc. of the IEEE International Symposim on Information Theory (ISIT), pp. 4-45, Jne 007. [6] SJ. MacMllan and O.M. Collins, "The capacity of binary channels that se linear codes and decoders;' IEEE Trans. I'!form. Theory, vol. 44, pp. 97-4, 998. [7] RG. Gallager, Low Density Parity-Check Codes, MIT Press, Cambridge, MA,963. [8] T. Richardson, A. Shokrollahi, and R Urbanke, "Finite-length analysis of varios low-density parity-check ensembles for the binary erasre channel;' in Proc. of the IEEE International Symposim on Information Theory (ISIT), pp. I, 00. [9] D. Brshtein, M. Krivelevich, S. Litsyn, and G. Miller, "Upper bonds on the rate of LDPC codes;' IEEE Trans. Inform. Theory, vol. 48, no. 9, pp , 00. [0] I. Sason and R Urbanke, "Parity-check density verss performance of binary linear block codes over memoryless symmetric channels;' IEEE Trans. I'!form. Theory, vol. 49, pp ,003. 4
Joint Transfer of Energy and Information in a Two-hop Relay Channel
Joint Transfer of Energy and Information in a Two-hop Relay Channel Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, and Mohammad Reza Aref Information Systems and Secrity Lab (ISSL Department of Electrical
More informationFOUNTAIN codes [3], [4] provide an efficient solution
Inactivation Decoding of LT and Raptor Codes: Analysis and Code Design Francisco Lázaro, Stdent Member, IEEE, Gianligi Liva, Senior Member, IEEE, Gerhard Bach, Fellow, IEEE arxiv:176.5814v1 [cs.it 19 Jn
More informationLower Bounds on the Graphical Complexity of Finite-Length LDPC Codes
Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 32000, Israel 2009 IEEE International
More informationDecoder Error Probability of MRD Codes
Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehighed Zhiyan Yan Department of Electrical
More informationECEN 655: Advanced Channel Coding
ECEN 655: Advanced Channel Coding Course Introduction Henry D. Pfister Department of Electrical and Computer Engineering Texas A&M University ECEN 655: Advanced Channel Coding 1 / 19 Outline 1 History
More informationDecoder Error Probability of MRD Codes
Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehigh.ed Zhiyan Yan Department of Electrical
More informationPerformance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels
Performance Analysis and Code Optimization of Low Density Parity-Check Codes on Rayleigh Fading Channels Jilei Hou, Paul H. Siegel and Laurence B. Milstein Department of Electrical and Computer Engineering
More informationFEA Solution Procedure
EA Soltion Procedre (demonstrated with a -D bar element problem) EA Procedre for Static Analysis. Prepare the E model a. discretize (mesh) the strctre b. prescribe loads c. prescribe spports. Perform calclations
More informationClassify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled.
Jnction elements in network models. Classify by nmber of ports and examine the possible strctres that reslt. Using only one-port elements, no more than two elements can be assembled. Combining two two-ports
More informationNetwork Coding for Multiple Unicasts: An Approach based on Linear Optimization
Network Coding for Mltiple Unicasts: An Approach based on Linear Optimization Danail Traskov, Niranjan Ratnakar, Desmond S. Ln, Ralf Koetter, and Mriel Médard Abstract In this paper we consider the application
More informationAn Investigation into Estimating Type B Degrees of Freedom
An Investigation into Estimating Type B Degrees of H. Castrp President, Integrated Sciences Grop Jne, 00 Backgrond The degrees of freedom associated with an ncertainty estimate qantifies the amont of information
More informationPerformance analysis of the MAP equalizer within an iterative receiver including a channel estimator
Performance analysis of the MAP eqalizer within an iterative receiver inclding a channel estimator Nora Sellami ISECS Rote Menzel Chaer m 0.5 B.P 868, 308 Sfax, Tnisia Aline Romy IRISA-INRIA Camps de Bealie
More informationLecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2
BIJU PATNAIK UNIVERSITY OF TECHNOLOGY, ODISHA Lectre Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 Prepared by, Dr. Sbhend Kmar Rath, BPUT, Odisha. Tring Machine- Miscellany UNIT 2 TURING MACHINE
More informationUNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL
8th International DAAAM Baltic Conference "INDUSTRIAL ENGINEERING - 19-1 April 01, Tallinn, Estonia UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL Põdra, P. & Laaneots, R. Abstract: Strength analysis is a
More informationDiscussion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli
1 Introdction Discssion of The Forward Search: Theory and Data Analysis by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli Søren Johansen Department of Economics, University of Copenhagen and CREATES,
More informationEE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes
EE229B - Final Project Capacity-Approaching Low-Density Parity-Check Codes Pierre Garrigues EECS department, UC Berkeley garrigue@eecs.berkeley.edu May 13, 2005 Abstract The class of low-density parity-check
More informationOn Generalized EXIT Charts of LDPC Code Ensembles over Binary-Input Output-Symmetric Memoryless Channels
2012 IEEE International Symposium on Information Theory Proceedings On Generalied EXIT Charts of LDPC Code Ensembles over Binary-Input Output-Symmetric Memoryless Channels H Mamani 1, H Saeedi 1, A Eslami
More informationAn Introduction to Low-Density Parity-Check Codes
An Introduction to Low-Density Parity-Check Codes Paul H. Siegel Electrical and Computer Engineering University of California, San Diego 5/ 3/ 7 Copyright 27 by Paul H. Siegel Outline Shannon s Channel
More informationLecture 8: September 26
10-704: Information Processing and Learning Fall 2016 Lectrer: Aarti Singh Lectre 8: September 26 Note: These notes are based on scribed notes from Spring15 offering of this corse. LaTeX template cortesy
More informationOptimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance
Optimal Control of a Heterogeneos Two Server System with Consideration for Power and Performance by Jiazheng Li A thesis presented to the University of Waterloo in flfilment of the thesis reqirement for
More informationDiscussion Papers Department of Economics University of Copenhagen
Discssion Papers Department of Economics University of Copenhagen No. 10-06 Discssion of The Forward Search: Theory and Data Analysis, by Anthony C. Atkinson, Marco Riani, and Andrea Ceroli Søren Johansen,
More informationL 1 -smoothing for the Ornstein-Uhlenbeck semigroup
L -smoothing for the Ornstein-Uhlenbeck semigrop K. Ball, F. Barthe, W. Bednorz, K. Oleszkiewicz and P. Wolff September, 00 Abstract Given a probability density, we estimate the rate of decay of the measre
More informationSection 7.4: Integration of Rational Functions by Partial Fractions
Section 7.4: Integration of Rational Fnctions by Partial Fractions This is abot as complicated as it gets. The Method of Partial Fractions Ecept for a few very special cases, crrently we have no way to
More informationIntroduction to Low-Density Parity Check Codes. Brian Kurkoski
Introduction to Low-Density Parity Check Codes Brian Kurkoski kurkoski@ice.uec.ac.jp Outline: Low Density Parity Check Codes Review block codes History Low Density Parity Check Codes Gallager s LDPC code
More informationMove Blocking Strategies in Receding Horizon Control
Move Blocking Strategies in Receding Horizon Control Raphael Cagienard, Pascal Grieder, Eric C. Kerrigan and Manfred Morari Abstract In order to deal with the comptational brden of optimal control, it
More informationCHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy
CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK Wassim Joini and Christophe Moy SUPELEC, IETR, SCEE, Avene de la Bolaie, CS 47601, 5576 Cesson Sévigné, France. INSERM U96 - IFR140-
More informationA Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem
A Note on Johnson, Minkoff and Phillips Algorithm for the Prize-Collecting Steiner Tree Problem Palo Feofiloff Cristina G. Fernandes Carlos E. Ferreira José Coelho de Pina September 04 Abstract The primal-dal
More informationThe Coset Distribution of Triple-Error-Correcting Binary Primitive BCH Codes
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., APRIL 00 177 The Coset Distribtion of iple-error-correcting Binary Primitive BCH Codes Pascale Charpin, Member, IEEE, TorHelleseth, Fellow, IEEE, VictorA.
More informationA Characterization of Interventional Distributions in Semi-Markovian Causal Models
A Characterization of Interventional Distribtions in Semi-Markovian Casal Models Jin Tian and Changsng Kang Department of Compter Science Iowa State University Ames, IA 50011 {jtian, cskang}@cs.iastate.ed
More informationLecture Notes: Finite Element Analysis, J.E. Akin, Rice University
9. TRUSS ANALYSIS... 1 9.1 PLANAR TRUSS... 1 9. SPACE TRUSS... 11 9.3 SUMMARY... 1 9.4 EXERCISES... 15 9. Trss analysis 9.1 Planar trss: The differential eqation for the eqilibrim of an elastic bar (above)
More informationCharacterizations of probability distributions via bivariate regression of record values
Metrika (2008) 68:51 64 DOI 10.1007/s00184-007-0142-7 Characterizations of probability distribtions via bivariate regression of record vales George P. Yanev M. Ahsanllah M. I. Beg Received: 4 October 2006
More informationFountain Uncorrectable Sets and Finite-Length Analysis
Fountain Uncorrectable Sets and Finite-Length Analysis Wen Ji 1, Bo-Wei Chen 2, and Yiqiang Chen 1 1 Beijing Key Laboratory of Mobile Computing and Pervasive Device Institute of Computing Technology, Chinese
More informationDiscontinuous Fluctuation Distribution for Time-Dependent Problems
Discontinos Flctation Distribtion for Time-Dependent Problems Matthew Hbbard School of Compting, University of Leeds, Leeds, LS2 9JT, UK meh@comp.leeds.ac.k Introdction For some years now, the flctation
More informationSTEP Support Programme. STEP III Hyperbolic Functions: Solutions
STEP Spport Programme STEP III Hyperbolic Fnctions: Soltions Start by sing the sbstittion t cosh x. This gives: sinh x cosh a cosh x cosh a sinh x t sinh x dt t dt t + ln t ln t + ln cosh a ln ln cosh
More informationLOS Component-Based Equal Gain Combining for Ricean Links in Uplink Massive MIMO
016 Sixth International Conference on Instrmentation & Measrement Compter Commnication and Control LOS Component-Based Eqal Gain Combining for Ricean Lins in plin Massive MIMO Dian-W Ye College of Information
More informationSources of Non Stationarity in the Semivariogram
Sorces of Non Stationarity in the Semivariogram Migel A. Cba and Oy Leangthong Traditional ncertainty characterization techniqes sch as Simple Kriging or Seqential Gassian Simlation rely on stationary
More informationImprecise Continuous-Time Markov Chains
Imprecise Continos-Time Markov Chains Thomas Krak *, Jasper De Bock, and Arno Siebes t.e.krak@.nl, a.p.j.m.siebes@.nl Utrecht University, Department of Information and Compting Sciences, Princetonplein
More informationBLIND IMAGE WATERMARKING BASED ON SAMPLE ROTATION WITH OPTIMAL DETECTOR
7th Eropean Signal Processing Conference (EUSIPCO 009 Glasgow, Scotland, Agst -8, 009 BLIND IMAGE WATERMARKING BASED ON SAMPLE ROTATION WITH OPTIMAL DETECTOR S.M.E. Sahraeian, M.A. Akhaee, and F. Marvasti
More informationRCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths
RCA Analysis of the Polar Codes and the use of Feedback to aid Polarization at Short Blocklengths Kasra Vakilinia, Dariush Divsalar*, and Richard D. Wesel Department of Electrical Engineering, University
More informationThe Heat Equation and the Li-Yau Harnack Inequality
The Heat Eqation and the Li-Ya Harnack Ineqality Blake Hartley VIGRE Research Paper Abstract In this paper, we develop the necessary mathematics for nderstanding the Li-Ya Harnack ineqality. We begin with
More informationSetting The K Value And Polarization Mode Of The Delta Undulator
LCLS-TN-4- Setting The Vale And Polarization Mode Of The Delta Undlator Zachary Wolf, Heinz-Dieter Nhn SLAC September 4, 04 Abstract This note provides the details for setting the longitdinal positions
More informationAn Introduction to Low Density Parity Check (LDPC) Codes
An Introduction to Low Density Parity Check (LDPC) Codes Jian Sun jian@csee.wvu.edu Wireless Communication Research Laboratory Lane Dept. of Comp. Sci. and Elec. Engr. West Virginia University June 3,
More informationPrediction of Transmission Distortion for Wireless Video Communication: Analysis
Prediction of Transmission Distortion for Wireless Video Commnication: Analysis Zhifeng Chen and Dapeng W Department of Electrical and Compter Engineering, University of Florida, Gainesville, Florida 326
More informationi=1 y i 1fd i = dg= P N i=1 1fd i = dg.
ECOOMETRICS II (ECO 240S) University of Toronto. Department of Economics. Winter 208 Instrctor: Victor Agirregabiria SOLUTIO TO FIAL EXAM Tesday, April 0, 208. From 9:00am-2:00pm (3 hors) ISTRUCTIOS: -
More informationQUANTILE ESTIMATION IN SUCCESSIVE SAMPLING
Jornal of the Korean Statistical Society 2007, 36: 4, pp 543 556 QUANTILE ESTIMATION IN SUCCESSIVE SAMPLING Hosila P. Singh 1, Ritesh Tailor 2, Sarjinder Singh 3 and Jong-Min Kim 4 Abstract In sccessive
More informationCubic graphs have bounded slope parameter
Cbic graphs have bonded slope parameter B. Keszegh, J. Pach, D. Pálvölgyi, and G. Tóth Agst 25, 2009 Abstract We show that every finite connected graph G with maximm degree three and with at least one
More informationA Single Species in One Spatial Dimension
Lectre 6 A Single Species in One Spatial Dimension Reading: Material similar to that in this section of the corse appears in Sections 1. and 13.5 of James D. Mrray (), Mathematical Biology I: An introction,
More informationON THE SHAPES OF BILATERAL GAMMA DENSITIES
ON THE SHAPES OF BILATERAL GAMMA DENSITIES UWE KÜCHLER, STEFAN TAPPE Abstract. We investigate the for parameter family of bilateral Gamma distribtions. The goal of this paper is to provide a thorogh treatment
More informationUpper Bounds on the Spanning Ratio of Constrained Theta-Graphs
Upper Bonds on the Spanning Ratio of Constrained Theta-Graphs Prosenjit Bose and André van Renssen School of Compter Science, Carleton University, Ottaa, Canada. jit@scs.carleton.ca, andre@cg.scs.carleton.ca
More informationON THE MINIMUM DISTANCE OF NON-BINARY LDPC CODES. Advisor: Iryna Andriyanova Professor: R.. udiger Urbanke
ON THE MINIMUM DISTANCE OF NON-BINARY LDPC CODES RETHNAKARAN PULIKKOONATTU ABSTRACT. Minimum distance is an important parameter of a linear error correcting code. For improved performance of binary Low
More informationLDPC Codes. Slides originally from I. Land p.1
Slides originally from I. Land p.1 LDPC Codes Definition of LDPC Codes Factor Graphs to use in decoding Decoding for binary erasure channels EXIT charts Soft-Output Decoding Turbo principle applied to
More informationCHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES. George P. Yanev
Pliska Std. Math. Blgar. 2 (211), 233 242 STUDIA MATHEMATICA BULGARICA CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES George P. Yanev We prove that the exponential
More informationBounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel
Bounds on Achievable Rates of LDPC Codes Used Over the Binary Erasure Channel Ohad Barak, David Burshtein and Meir Feder School of Electrical Engineering Tel-Aviv University Tel-Aviv 69978, Israel Abstract
More informationPhysicsAndMathsTutor.com
C Integration - By sbstittion PhysicsAndMathsTtor.com. Using the sbstittion cos +, or otherwise, show that e cos + sin d e(e ) (Total marks). (a) Using the sbstittion cos, or otherwise, find the eact vale
More informationMEASUREMENT OF TURBULENCE STATISTICS USING HOT WIRE ANEMOMETRY
MEASUREMENT OF TURBULENCE STATISTICS USING HOT WIRE ANEMOMETRY Mrgan Thangadrai +, Atl Kmar Son *, Mritynjay Singh +, Sbhendra *, Vinoth Kmar ++, Ram Pyare Singh +, Pradip K Chatterjee + + Thermal Engineering,
More information1 Undiscounted Problem (Deterministic)
Lectre 9: Linear Qadratic Control Problems 1 Undisconted Problem (Deterministic) Choose ( t ) 0 to Minimize (x trx t + tq t ) t=0 sbject to x t+1 = Ax t + B t, x 0 given. x t is an n-vector state, t a
More informationTechnical Note. ODiSI-B Sensor Strain Gage Factor Uncertainty
Technical Note EN-FY160 Revision November 30, 016 ODiSI-B Sensor Strain Gage Factor Uncertainty Abstract Lna has pdated or strain sensor calibration tool to spport NIST-traceable measrements, to compte
More informationNon-coherent Rayleigh fading MIMO channels: Capacity and optimal input
Non-coherent Rayleigh fading MIMO channels: Capacity and optimal inpt Rasika R. Perera, Tony S. Pollock*, and Thshara D. Abhayapala* Department of Information Engineering Research School of Information
More informationCONCERNING A CONJECTURE OF MARSHALL HALL
CONCERNING A CONJECTURE OF MARSHALL HALL RICHARD SINKHORN Introdction. An «X«matrix A is said to be dobly stochastic if Oij; = and if ï i aik = jj_i akj = 1 for all i and j. The set of «X«dobly stochastic
More information4.2 First-Order Logic
64 First-Order Logic and Type Theory The problem can be seen in the two qestionable rles In the existential introdction, the term a has not yet been introdced into the derivation and its se can therefore
More informationKonyalioglu, Serpil. Konyalioglu, A.Cihan. Ipek, A.Sabri. Isik, Ahmet
The Role of Visalization Approach on Stdent s Conceptal Learning Konyaliogl, Serpil Department of Secondary Science and Mathematics Edcation, K.K. Edcation Faclty, Atatürk University, 25240- Erzrm-Trkey;
More informationChannel Polarization and Blackwell Measures
Channel Polarization Blackwell Measures Maxim Raginsky Abstract The Blackwell measure of a binary-input channel (BIC is the distribution of the posterior probability of 0 under the uniform input distribution
More informationOn the tree cover number of a graph
On the tree cover nmber of a graph Chassidy Bozeman Minerva Catral Brendan Cook Oscar E. González Carolyn Reinhart Abstract Given a graph G, the tree cover nmber of the graph, denoted T (G), is the minimm
More informationReflections on a mismatched transmission line Reflections.doc (4/1/00) Introduction The transmission line equations are given by
Reflections on a mismatched transmission line Reflections.doc (4/1/00) Introdction The transmission line eqations are given by, I z, t V z t l z t I z, t V z, t c z t (1) (2) Where, c is the per-nit-length
More informationIterative Encoding of Low-Density Parity-Check Codes
Iterative Encoding of Low-Density Parity-Check Codes David Haley, Alex Grant and John Buetefuer Institute for Telecommunications Research University of South Australia Mawson Lakes Blvd Mawson Lakes SA
More informationUniversal Scheme for Optimal Search and Stop
Universal Scheme for Optimal Search and Stop Sirin Nitinawarat Qalcomm Technologies, Inc. 5775 Morehose Drive San Diego, CA 92121, USA Email: sirin.nitinawarat@gmail.com Vengopal V. Veeravalli Coordinated
More informationAssignment Fall 2014
Assignment 5.086 Fall 04 De: Wednesday, 0 December at 5 PM. Upload yor soltion to corse website as a zip file YOURNAME_ASSIGNMENT_5 which incldes the script for each qestion as well as all Matlab fnctions
More informationStudy on the impulsive pressure of tank oscillating by force towards multiple degrees of freedom
EPJ Web of Conferences 80, 0034 (08) EFM 07 Stdy on the implsive pressre of tank oscillating by force towards mltiple degrees of freedom Shigeyki Hibi,* The ational Defense Academy, Department of Mechanical
More informationBayes and Naïve Bayes Classifiers CS434
Bayes and Naïve Bayes Classifiers CS434 In this lectre 1. Review some basic probability concepts 2. Introdce a sefl probabilistic rle - Bayes rle 3. Introdce the learning algorithm based on Bayes rle (ths
More informationLecture 4: Proof of Shannon s theorem and an explicit code
CSE 533: Error-Correcting Codes (Autumn 006 Lecture 4: Proof of Shannon s theorem and an explicit code October 11, 006 Lecturer: Venkatesan Guruswami Scribe: Atri Rudra 1 Overview Last lecture we stated
More informationLecture 4 Noisy Channel Coding
Lecture 4 Noisy Channel Coding I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw October 9, 2015 1 / 56 I-Hsiang Wang IT Lecture 4 The Channel Coding Problem
More informationSingle-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes
Single-Gaussian Messages and Noise Thresholds for Low-Density Lattice Codes Brian M. Kurkoski, Kazuhiko Yamaguchi and Kingo Kobayashi kurkoski@ice.uec.ac.jp Dept. of Information and Communications Engineering
More informationPractical Polar Code Construction Using Generalised Generator Matrices
Practical Polar Code Construction Using Generalised Generator Matrices Berksan Serbetci and Ali E. Pusane Department of Electrical and Electronics Engineering Bogazici University Istanbul, Turkey E-mail:
More informationLecture 8: Shannon s Noise Models
Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecture 8: Shannon s Noise Models September 14, 2007 Lecturer: Atri Rudra Scribe: Sandipan Kundu& Atri Rudra Till now we have
More informationThe Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks
The Cryptanalysis of a New Pblic-Key Cryptosystem based on Modlar Knapsacks Yeow Meng Chee Antoine Jox National Compter Systems DMI-GRECC Center for Information Technology 45 re d Ulm 73 Science Park Drive,
More informationOn Achievable Rates and Complexity of LDPC Codes over Parallel Channels: Bounds and Applications
On Achievable Rates and Complexity of LDPC Codes over Parallel Channels: Bounds and Applications Igal Sason, Member and Gil Wiechman, Graduate Student Member Abstract A variety of communication scenarios
More informationOutline. Model Predictive Control: Current Status and Future Challenges. Separation of the control problem. Separation of the control problem
Otline Model Predictive Control: Crrent Stats and Ftre Challenges James B. Rawlings Department of Chemical and Biological Engineering University of Wisconsin Madison UCLA Control Symposim May, 6 Overview
More informationDEFINITION OF A NEW UO 2 F 2 DENSITY LAW FOR LOW- MODERATED SOLUTIONS (H/U < 20) AND CONSEQUENCES ON CRITICALITY SAFETY
DEFINITION OF A NEW UO 2 F 2 DENSITY LAW FOR LOW- MODERATED SOLUTIONS ( < 20) AND CONSEQUENCES ON CRITICALITY SAFETY N. Leclaire, S. Evo, I.R.S.N., France Introdction In criticality stdies, the blk density
More informationConditions for Approaching the Origin without Intersecting the x-axis in the Liénard Plane
Filomat 3:2 (27), 376 377 https://doi.org/.2298/fil7276a Pblished by Faclty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Conditions for Approaching
More informationFEA Solution Procedure
EA Soltion Procedre (demonstrated with a -D bar element problem) MAE 5 - inite Element Analysis Several slides from this set are adapted from B.S. Altan, Michigan Technological University EA Procedre for
More informationRELIABILITY ASPECTS OF PROPORTIONAL MEAN RESIDUAL LIFE MODEL USING QUANTILE FUNC- TIONS
RELIABILITY ASPECTS OF PROPORTIONAL MEAN RESIDUAL LIFE MODEL USING QUANTILE FUNC- TIONS Athors: N.UNNIKRISHNAN NAIR Department of Statistics, Cochin University of Science Technology, Cochin, Kerala, INDIA
More informationLow-density parity-check codes
Low-density parity-check codes From principles to practice Dr. Steve Weller steven.weller@newcastle.edu.au School of Electrical Engineering and Computer Science The University of Newcastle, Callaghan,
More informationConvex Hypersurfaces of Constant Curvature in Hyperbolic Space
Srvey in Geometric Analysis and Relativity ALM 0, pp. 41 57 c Higher Edcation Press and International Press Beijing-Boston Convex Hypersrfaces of Constant Crvatre in Hyperbolic Space Bo Gan and Joel Sprck
More informationInformation Source Detection in the SIR Model: A Sample Path Based Approach
Information Sorce Detection in the SIR Model: A Sample Path Based Approach Kai Zh and Lei Ying School of Electrical, Compter and Energy Engineering Arizona State University Tempe, AZ, United States, 85287
More informationIntrodction Finite elds play an increasingly important role in modern digital commnication systems. Typical areas of applications are cryptographic sc
A New Architectre for a Parallel Finite Field Mltiplier with Low Complexity Based on Composite Fields Christof Paar y IEEE Transactions on Compters, Jly 996, vol 45, no 7, pp 856-86 Abstract In this paper
More informationA Model-Free Adaptive Control of Pulsed GTAW
A Model-Free Adaptive Control of Plsed GTAW F.L. Lv 1, S.B. Chen 1, and S.W. Dai 1 Institte of Welding Technology, Shanghai Jiao Tong University, Shanghai 00030, P.R. China Department of Atomatic Control,
More informationLecture 2: CENTRAL LIMIT THEOREM
A Theorist s Toolkit (CMU 8-859T, Fall 3) Lectre : CENTRAL LIMIT THEOREM September th, 3 Lectrer: Ryan O Donnell Scribe: Anonymos SUM OF RANDOM VARIABLES Let X, X, X 3,... be i.i.d. random variables (Here
More informationTime-invariant LDPC convolutional codes
Time-invariant LDPC convolutional codes Dimitris Achlioptas, Hamed Hassani, Wei Liu, and Rüdiger Urbanke Department of Computer Science, UC Santa Cruz, USA Email: achlioptas@csucscedu Department of Computer
More informationDepartment of Industrial Engineering Statistical Quality Control presented by Dr. Eng. Abed Schokry
Department of Indstrial Engineering Statistical Qality Control presented by Dr. Eng. Abed Schokry Department of Indstrial Engineering Statistical Qality Control C and U Chart presented by Dr. Eng. Abed
More informationCapacity Provisioning for Schedulers with Tiny Buffers
Capacity Provisioning for Schedlers with Tiny Bffers Yashar Ghiassi-Farrokhfal and Jörg Liebeherr Department of Electrical and Compter Engineering University of Toronto Abstract Capacity and bffer sizes
More informationStudy on the Mathematic Model of Product Modular System Orienting the Modular Design
Natre and Science, 2(, 2004, Zhong, et al, Stdy on the Mathematic Model Stdy on the Mathematic Model of Prodct Modlar Orienting the Modlar Design Shisheng Zhong 1, Jiang Li 1, Jin Li 2, Lin Lin 1 (1. College
More informationWe automate the bivariate change-of-variables technique for bivariate continuous random variables with
INFORMS Jornal on Compting Vol. 4, No., Winter 0, pp. 9 ISSN 09-9856 (print) ISSN 56-558 (online) http://dx.doi.org/0.87/ijoc.046 0 INFORMS Atomating Biariate Transformations Jeff X. Yang, John H. Drew,
More informationFormal Methods for Deriving Element Equations
Formal Methods for Deriving Element Eqations And the importance of Shape Fnctions Formal Methods In previos lectres we obtained a bar element s stiffness eqations sing the Direct Method to obtain eact
More informationE ect Of Quadrant Bow On Delta Undulator Phase Errors
LCLS-TN-15-1 E ect Of Qadrant Bow On Delta Undlator Phase Errors Zachary Wolf SLAC Febrary 18, 015 Abstract The Delta ndlator qadrants are tned individally and are then assembled to make the tned ndlator.
More informationFEA Solution Procedure
EA Soltion rocedre (demonstrated with a -D bar element problem) MAE - inite Element Analysis Many slides from this set are originally from B.S. Altan, Michigan Technological U. EA rocedre for Static Analysis.
More informationModelling by Differential Equations from Properties of Phenomenon to its Investigation
Modelling by Differential Eqations from Properties of Phenomenon to its Investigation V. Kleiza and O. Prvinis Kanas University of Technology, Lithania Abstract The Panevezys camps of Kanas University
More informationGraph-based Codes for Quantize-Map-and-Forward Relaying
20 IEEE Information Theory Workshop Graph-based Codes for Quantize-Map-and-Forward Relaying Ayan Sengupta, Siddhartha Brahma, Ayfer Özgür, Christina Fragouli and Suhas Diggavi EPFL, Switzerland, UCLA,
More informationFRTN10 Exercise 12. Synthesis by Convex Optimization
FRTN Exercise 2. 2. We want to design a controller C for the stable SISO process P as shown in Figre 2. sing the Yola parametrization and convex optimization. To do this, the control loop mst first be
More informationOptimal search: a practical interpretation of information-driven sensor management
Optimal search: a practical interpretation of information-driven sensor management Fotios Katsilieris, Yvo Boers and Hans Driessen Thales Nederland B.V. Hengelo, the Netherlands Email: {Fotios.Katsilieris,
More informationLOW-density parity-check (LDPC) codes were invented
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 1, JANUARY 2008 51 Extremal Problems of Information Combining Yibo Jiang, Alexei Ashikhmin, Member, IEEE, Ralf Koetter, Senior Member, IEEE, and Andrew
More information