Energy-efficient Nonstationary Spectrum Sharing

Size: px
Start display at page:

Download "Energy-efficient Nonstationary Spectrum Sharing"

Transcription

1 1 Energy-effcent Nonstatonary Spectrum Sharng Yuanzhang Xao and Mhaela van der Schaar, Fellow, IEEE Abstract We develop a novel desgn framework for energyeffcent spectrum sharng among autonomous users who am to mnmze ther energy consumptons subject to mnmum throughput requrements. Most exstng works proposed statonary spectrum sharng polces, n whch users transmt at fxed power levels. Snce users transmt smultaneously under statonary polces, to fulfll mnmum throughput requrements, they need to transmt at hgh power levels to overcome nterference. To mprove energy effcency, we construct nonstatonary spectrum sharng polces, n whch the users transmt at tme-varyng power levels. Specfcally, we focus on TDMA (tme-dvson multple access polces n whch one user transmts at each tme (but not n a round-robn fashon. The proposed polcy can be mplemented by each user runnng a low-complexty algorthm n a decentralzed manner. It acheves hgh energy effcency even when the users have erroneous and bnary feedback about ther nterference levels. Moreover, t can adapt to the dynamc entry and ext of users. The proposed polcy s also devaton-proof, namely autonomous users wll fnd t n ther self-nterests to follow t. Compared to exstng polces, the proposed polcy can acheve an energy savng of up to 90% when the number of users s hgh. I. INTRODUCTION A key challenge n wreless networks s determnng effcent solutons for the autonomous users to share the spectrum. In cogntve rado networks where the users are dfferentated as prmary users (PUs and secondary users (SUs, we also requre SUs to access the spectrum wthout degradng PUs qualty of servce (QoS [1][34] [36]. To be more general, we consder cogntve rado networks n ths work, and desgn spectrum sharng polces that acheve effcent spectrum usage and protect PUs QoS. Our work can be easly appled to a wreless network n whch users are not dfferentated as PUs and SUs (whch can be consdered as a specal cogntve rado network wth no PUs. Spectrum sharng polces, whch specfy the PUs and SUs transmsson schedules and transmt power levels, are essental to acheve spectrum and energy effcency []. Research on desgnng spectrum sharng polces can be roughly dvded n two man categores. The research n the frst category formulates the spectrum sharng problem as a utlty maxmzaton problem subject to the users maxmum transmt power constrants [3] [1][] [5][3]. Many works n ths category [3] [9][] [5][3] defne the utlty functon as an ncreasng functon of the sgnal-to-nterference-and-nose-rato (SINR, whle neglectng to consder the energy consumpton of the Manuscrpt receved March 19, 013; revsed November 30, 013; accepted January 6, 014. Ths work was supported by NSF Grant No Y. Xao and M. van der Schaar are wth the Electrcal Engneerng Department, Unversty of Calforna, Los Angeles, CA USA (e-mal: yxao@seas.ucla.edu; mhaela@ee.ucla.edu. resultng spectrum sharng polces. Some other works n ths category [10] [1] defne the utlty functon as the rato of throughput to transmt power, n order to maxmze the spectrum effcency per energy consumpton. Research n the second category [13] [1] formulates the spectrum sharng problem as an energy consumpton mnmzaton problem subject to the users mnmum throughput requrements. In ths formulaton, the users throughput requrements can be explctly specfed. Hence, the spectrum effcency s guaranteed wth the mnmal energy consumpton. The work n ths paper pertans to ths second category of research works. One major lmtaton of exstng works n the second category [13] [1] s that they restrct attenton to a smple class of spectrum sharng polces that requre the users to transmt at fxed power levels as long as the envronment (e.g. the number of users, the channel gans does not change 1. We call ths class of spectrum sharng polces statonary. The statonary polces are not energy effcent, because due to mult-user nterference, the users need to transmt at hgh power levels to fulfll the mnmum throughput constrants. To mprove energy effcency, we study nonstatonary spectrum sharng polces. Specfcally, we focus on TDMA (tmedvson multple access spectrum sharng polces, a class of nonstatonary polces n whch the users transmt n a TDMA fashon. TDMA polces can acheve hgh spectrum effcency that s not achevable under statonary polces, and greatly mprove the energy effcency of the statonary polces, because of the followng two reasons. Frst, there s no multuser nterference n TDMA polces. Second, TDMA polces allow users to adaptvely swtch between transmsson and dormancy, dependng on the average throughput they have acheved, for the purpose of energy savng. Note that n the optmal TDMA polces we propose, users usually do not transmt n the smple round-robn fashon, because of the heterogenety n ther mnmum throughput requrements and channel condtons (see Secton IV for a motvatng example that shows the sub-optmalty of round-robn TDMA polces. Another lmtaton of exstng works n the second category [13] [1] s the assumpton that each user s recever can perfectly estmate the local nterference temperature (.e. the nterference and nose power level, and can accurately feed t back to ts transmtter. However, n practce, users cannot perfectly estmate the nterference temperature, and can only 1 Although some spectrum sharng polces [13] [1] go through a transent perod of adjustng the power levels before convergng to the optmal power levels, the users mantan the fxed power levels after the convergence. We use nonstatonary, nstead of dynamc, to descrbe the proposed polcy, because dynamc spectrum sharng has been extensvely used to descrbe general spectrum sharng polces n cogntve rado, where SUs access the channel opportunstcally. In ths sense, our polcy s dynamc. However, our nonstatonary polcy s dfferent from other dynamc spectrum sharng polces, n that the power levels are tme-varyng.

2 send lmted (quantzed feedback. In ths paper, we provde a novel desgn framework to construct nonstatonary spectrum sharng polces that acheve PUs and SUs mnmum throughput requrements wth mnmal energy consumptons, even when the users have erroneous and very lmted (only bnary feedback about ther local nterference temperatures. We frst prove a key property of the optmal TDMA spectrum sharng polcy: each user should choose the same power level whenever t transmts. Ths property enables us to solve the polcy desgn problem n two tractable steps: frst determne the optmal power levels before run-tme, and then determne the transmsson schedule at run-tme. We then propose a low-complexty dstrbuted nstantaneous throughput selecton (ITS algorthm for the users to determne ther optmal power levels before run-tme, and a low-complexty dstrbuted longest-dstance-frst (LDF schedulng algorthm to determne the transmsson schedule at run-tme. We prove that both algorthms converge lnearly ndependent of the number of users (.e. the dstance from the optmal soluton decreases exponentally, resultng n a logarthmc convergence tme. The proposed polcy can also adapt to the dynamc entry and ext of users wthout affectng the convergence of exstng users. Moreover, t s devatonproof, meanng that a user cannot mprove ts energy effcency over the proposed polcy whle stll fulfllng the throughput requrement. In ths way, autonomous users wll fnd t n ther self-nterest to adopt the polcy. The rest of the paper s organzed as follows. We gve detaled comparsons aganst exstng works n Secton II. Secton III descrbes the system model for spectrum sharng. Secton IV gves a motvatng example to show the performance gan acheved by nonstatonary polces and the necessty of devaton-proof polces. We formulate and solve the polcy desgn problem n Secton V and Secton VI, respectvely. Smulaton results are presented n Secton VII. Fnally, Secton VIII concludes the paper. II. RELATED WORKS In ths secton, we provde a comprehensve comparson between the proposed scheme and exstng works. The reader could skp ths secton and go drectly to the system model, f not nterested n the detaled comparsons. Although only some works [13] [1] use the same problem formulaton as ours, we compare aganst a wde range of related works [3] [3] to hghlght the techncal novelty of our work, and to llustrate that the works [3] [1][] [3] proposed under dfferent problem formulatons cannot be adapted to our settng. A. Statonary Spectrum Sharng Polces Table I categorzes exstng statonary spectrum sharng polces based on four crtera: whether the polcy consders energy effcency, whether the polcy s devaton-proof, what are the feedback requrements and the correspondng overhead, and whether they can accommodate a varyng number of users. Throughout ths secton, the feedback s the nformaton on nterference and nose power levels sent from a user s recever to ts transmtter. TABLE I. COMPARISONS AGAINST STATIONARY POLICIES. Energy Feedback User Devaton -effcent (Overhead number -proof [3] [7] No Error-free, unquantzed Fxed No [8][9] No Error-free, unquantzed (Large Fxed Yes [10] [19] Yes Error-free, unquantzed (Large Fxed Yes [0][1] Yes Error-free, unquantzed (Large Varyng Yes [] [4] No Error-free, unquantzed (Large Fxed Yes Proposed Yes Erroneous, bnary (One-bt Varyng Yes TABLE II. COMPARISONS AGAINST NONSTATIONARY POLICIES. [5] [6] [7] [9] Proposed Energy -effcent No No No Yes Power control Yes No No Yes Users Heterogenous Homogenous Homogenous Heterogenous Feedback Error-free Erroneous Error-free Erroneous (Overhead unquantzed bnary bnary bnary (Large (One-bt (One-bt (One-bt User number Fxed Fxed Fxed Varyng Devatonproof Yes No No Yes B. Nonstatonary Spectrum Sharng Polces There have been some works that develop nonstatonary polces usng repeated games [5], Markov decson processes (MDPs [6], and mult-art bandt [7] [9]. We summarze the major dfferences between the exstng nonstatonary polces and our proposed polcy n Table II. C. Comparson Wth Our Prevous Work Most related to ths work s our prevous work [3]. However, the desgn frameworks proposed n [3] and n ths work are sgnfcantly dfferent because the desgn objectves are dfferent. In [3], we amed to desgn TDMA spectrum sharng polces that maxmze the users total throughput wthout consderng energy effcency. Under ths desgn objectve, each user wll transmt at the maxmum power level n ts slot, as long as the nterference temperature constrant s not volated. Hence, what we optmzed was only the transmsson schedule of the users. In ths work, snce we am to mnmze the energy consumpton subject to the mnmum throughput requrements, we need to optmze both the transmsson schedule and the users transmt power levels, whch makes the desgn problem more challengng. Moreover, ths work consders the scenaro n whch users enter and leave the network, whch s not consdered n [3]. D. Comparson Wth Theoretcal Frameworks Our results on nonstatonary polces buld on the concept of self-generatng sets proposed n the game theory lterature [30]. Self-generatng sets are used to analyze repeated games TABLE III. RELATED THEORETICAL FRAMEWORKS. Constructve Feedback User number [30] No N/A Fxed [31] No Erroneous, hgh-granularty Fxed Proposed Yes Erroneous, bnary Varyng

3 3 wth mperfect montorng. For example, the Folk Theorem n repeated games wth mperfect montorng n [31] bulds on the concept of self-generatng sets. However, we cannot apply ths concept straghtforwardly or n a way smlar as n [31] for the followng reasons. The self-generatng set s defned as a fxed pont of a set-valued mappng. The work [30] defned the set-valued mappng, and proved an mportant property of the fxed pont of ths set-valued mappng (.e. the self-generatng set: every payoff vector n the self-generatng set can be acheved at an equlbrum. However, although [30] dscovered ths mportant property, t dd not show how to construct a self-generatng set. Wthout constructng the selfgeneratng set, we do not know what payoff vectors can be acheved at the equlbra or how to acheve them. The concept of self-generatng sets s appled n [31] to prove the Folk theorem n repeated games wth mperfect montorng. However, our work s fundamentally dfferent from [31] n two aspects. Frst, the results n [31] are not constructve: they focus on what payoff vectors can be acheved, but not how to acheve them. In contrast, gven a target payoff vector, we explctly construct the polcy to acheve t. Second, the results n [31] requre a hgh-granularty feedback sgnal, namely the cardnalty of feedback sgnals should be proportonal to the number of power levels a user can choose. In contrast, by explotng the structure of the spectrum sharng problem, we prove that bnary feedback s suffcent to acheve optmalty n the consdered scenaros. In Table III, we summarze the key dfferences between our work and [30][31]. III. SYSTEM MODEL A. Model For Spectrum Sharng n Cogntve Rado Networks We consder a cogntve rado network that conssts of M prmary users and N secondary users transmttng n a sngle frequency channel. The set of PUs and that of SUs are denoted by M {1,,..., M} and N {M + 1, M +,..., M + N}, respectvely. A wreless network n whch users are not dfferentated as PUs and SUs s a specal case of our model wth M = 0. Each user 3 has a transmtter and a recever. The channel gan from user s transmtter to user j s recever s g j. Each user chooses ts power level p from a compact set P R +. We assume that 0 P, namely user can choose not to transmt. The set of jont power profles s denoted by P = M+N =1 P, and the jont power profle of all the users s denoted by p = (p 1,..., p M+N P. Let p be the power profle of all the users other than user. Each user s throughput s a functon of the jont power profle, namely r : P R +. Snce the users cannot jontly decode ther sgnals, each user treats the nterference from the other users as nose, and obtans the followng throughput at the power profle p [] [4]: p g r (p = log (1 + j M N,j p jg j + σ, 3 We refer to a prmary user or a secondary user as a user n general, and wll specfy the type of users only when necessary. where σ s the nose power at user s recever. We defne user s local nterference temperature I (p as the nterference and nose power level at ts recever, namely I (p j p jg j + σ. Each user s recever measures the nterference temperature wth errors and feedback the quantzed measurement to ts transmtter. We assume that each user uses a unbased estmator wth an addtve estmaton error to obtan the estmate Î I + ε, where ε s the estmaton error wth zero mean, whose probablty dstrbuton functon f ε s known to user. We also assume that each user uses the followng smple two-level quantzer Q : { Ī, f Q (Î(p = Î(p > θ, (1 I, otherwse where θ s user s quantzaton threshold, and Ī and I are two reconstructon values. We assume that the quantzer preserves the mean value of Î(p when there s no multuser nterference. In other words, when p = 0 (.e. when I (p = σ, the quantzer should satsfy E ε {Q (Î(p p =0} = E ε {Î(p p =0} = σ. Ths property can be easly satsfed by settng Ī = x σ supp(fε, x f x θ ε (x σ dx I = x σ supp(fε, x f x<θ ε (x σ, ( dx where supp(f ε s the support of the dstrbuton functon f ε. In practce, t s easy to mplement an unbased estmator and a smple two-level quantzer as n (1 and (. As we wll show later, such an estmator and a quantzer are suffcent to acheve the optmal performance. Remark 1: Here s an ntuton why an unbased estmator and the two-level quantzer n (1 and ( are good enough for us. For user to acheve a mnmum throughput r, gven the feedback Q (Î, ts transmt power level ˆp should be ˆp = ( r 1 Q (Î/g. In a TDMA polcy, there s no mult-user nterference (.e. p = 0 when user transmts. Hence, usng an unbased estmator and the quantzer n (1 and (, user s expected transmt power level s { } E ε {ˆp } = E ε ( r 1 Q(Î/g = ( r 1E ε {Q(Î}/g = ( r 1σ /g, whch s exactly the transmt power level when user perfectly knows the nterference temperature σ. In contrast, under a non-tdma polcy, there s mult-user nterference. In ths case, one user s erroneous and quantzed feedback affects ts own transmt power level, whch n turn affects the others transmt power levels through the nterference. Hence, an unbased estmator and a smple two-level quantzer n (1 and ( may result n performance loss under non-tdma polces. Snce each user adopts a two-level quantzer, ts feedback from the recever to the transmtter s bnary. Then we can further reduce the feedback overhead as follows. Each user s recever nforms ts transmtter of the two reconstructon values Ī and I only once, at the begnnng, after whch the recever sends a sgnal, probably n the form of a smple probe,

4 4 only when the estmated nterference temperature Î exceeds the quantzaton threshold θ. The event of recevng or not recevng the probng sgnal, whch s sent only when Î > θ, s enough to ndcate user s transmtter whch one of the two reconstructon values t should choose. Snce the probng sgnal ndcates hgh nterference temperature, we call t the dstress sgnal as n [14],[1]. Wth some abuse of defnton, we denote user s dstress sgnal as y Y = {0, 1} wth y = 1 representng the event that user s dstress sgnal s sent (.e. Î > θ. We wrte ρ (y p as the condtonal probablty dstrbuton of user s dstress sgnal y gven power profle p, whch s calculated as ρ (y = 1 p = f ε (xdx. B. Spectrum Sharng Polces x>θ I (p The system s tme slotted at t = 0, 1,,.... At the begnnng of tme slot t, each user chooses ts transmt power p t, and acheves the throughput r (p t. At the end of tme slot t, each user j who transmts (p t j > 0 sends ts dstress sgnal yj t = 1 f the estmate Îj exceeds the threshold θ j. We defne y Y as the system dstress sgnal, ndcatng whether there exsts a user who has sent ts dstress sgnal, namely y = 1 f there exsts j such that p j > 0 and y j = 1, and y = 0 otherwse. The condtonal dstrbuton s denoted ρ(y p, whch s calculated as ρ(y = 0 p = Π j:pj>0ρ j (y j = 0 p. Note that the system dstress sgnal s not a physcal sgnal sent n the system, but rather a logcal sgnal summarzng the status of the system. From now on, we refer to the system dstress sgnal smply as the dstress sgnal. Each user determnes the transmt power level p t based on the hstory of dstress sgnals. The hstory of dstress sgnals s h t = {y 0 ;... ; y t 1 } Y t for t 1, and h 0 = for t = 0. Then each user s strategy π s a mappng from the set of all the possble hstores to ts acton set, namely π : t=0y t P. The spectrum sharng polcy, denoted by π = (π 1,..., π M+N, s the jont strategy profle of all the users. Hence, user s transmt power level at tme slot t s determned by p t = π (h t, and the users jont power profle s determned by p t = π(h t. We classfy all the spectrum sharng polces nto two categores, statonary and nonstatonary polces. As n [39, pp. ] and [40, Sec. 5.5.], statonary polces always choose the same acton under the same state, whle nonstatonary polces may choose dfferent actons under the same state. In our model, the state can be consdered as the system parameters (e.g. the number of users, the channel condtons, etc.. Hence, a spectrum sharng polcy π s statonary f and only f for all N, for all t 0, and for all h t Y t, we have π (h t = p stat, where p stat P s a constant. A spectrum sharng polcy s nonstatonary f t s not statonary. In ths paper, we restrct our attenton to a specal class of nonstatonary polces, namely TDMA polces (wth fxed transmt power levels. A spectrum sharng polcy π s a TDMA polcy f at most one user transmts n each tme slot. TDMA polces are optmal when the nterference among the users s strong [37], whch s often the case when the number of users s large. We wll llustrate how TDMA polces outperform statonary polces through a smple example n Secton IV and through extensve smulatons n Secton VII. Remark : In the formal defnton of a nonstatonary polcy, t seems that each user needs to keep track of the hstory of all the past dstress sgnals at each tme slot. However, as we wll see from the longest-dstance-frst schedulng algorthm that mplements the proposed polcy, each user only needs a fnte memory. C. Defnton of Spectrum and Energy Effcency We characterze the spectrum and energy effcency of a spectrum sharng polcy by the users dscounted average throughput and dscounted average energy consumpton, respectvely. Each user dscounts ts future throughput and energy consumpton because of ts delay-senstve applcaton (e.g. vdeo streamng [] [5][3]. A user runnng a more delay-senstve applcaton dscounts more (wth a lower dscount factor. Assumng as n [] [5][3] that all the users have the same dscount factor δ [0, 1, user s average throughput s { } U (π = E h 0,h 1,... (1 δ δ t u (π(h t. t=0 Smlarly, user s average energy consumpton s the expected dscounted average transmt power per tme slot, wrtten as { } P (π = E h0,h 1,... (1 δ δ t π (h t. t=0 Each user ams to mnmze ts average energy consumpton P (π whle fulfllng a mnmum throughput requrement R mn. From one user s perspectve, t has the ncentve to devate from a gven spectrum sharng polcy, f by dong so t can fulfll the mnmum throughput requrement wth a lower average energy consumpton. Hence, we can defne devatonproof polces as follows. Defnton 1: A spectrum sharng polcy π s devatonproof f for all M N, we have π = arg mn P (π, π, subject to R (π, π R mn π, where π s the strategy profle of all the users except. IV. MOTIVATION FOR OPTIMAL NONSTATIONARY TDMA POLICIES Before formally descrbng the desgn framework, we provde a motvatng example to show the advantage of the proposed optmal nonstatonary TDMA polcy, compared to the statonary polcy and round-robn polces, n terms of both the energy effcency and the computatonal complexty. Consder a smple network wth three symmetrc SUs. They have the same drect channel gan of g = 1, the same cross channel gan of g j = 0.5, the same nose power σ = 5 mw, the same mnmum throughput requrement of R mn = 1.5 bts/s/hz, and the same dscount factor of δ = 0.6.

5 5 TABLE IV. Polces Optmal statonary [13] [1] Optmal round-robn (cycle length L = 3 Optmal round-robn (cycle length L = 4 Optmal nonstatonary (proposed A. Energy Effcency ILLUSTRATION AND PERFORMANCE OF POLICIES. Power levels Transmsson schedule Average (mw (frst 1 tme slots energy (186,186,186 smultaneous transmsson 186 mw (33,144, mw (43,1, mw (108,108, mw We llustrate the polces and ther performances n Table IV. The power levels are the transmt power levels of the 3 users whenever they transmt. In the optmal constant polcy, users 1,,3 all transmt all the tme, at the same power level of 186 mw. In TDMA polces, whether round-robn or the proposed optmal polcy, users do not all transmt all the tme. For round-robn polces, we compute the optmal polcy gven the cycle length by determnng the optmal (n terms of average long-term energy consumpton across users order of transmsson n a cycle and the correspondng power levels. In the optmal round-robn polcy wth cycle of length 3, user 1 transmts frst at a low power level (33 mw, user transmts after user 1 at a hgher power level (133 mw to compensate for havng to wat for transmsson and user 3 transmts last at a stll hgher power level (143 mw to compensate for havng to wat stll longer. In the cycle of length 4, agan user 1 transmts at the lowest power level, user transmts at a mddle power level, and user 3 transmts at the hghest power level, but the last two power levels are closer together (than n the cycle of length 3 because user 3 transmts more often. In the optmal nonstatonary polcy, the users all transmt at the same constant power level (108 mw whenever they transmt; ths works because the order n whch they transmt s constantly changng. In the last column of Table 1, the dscounted average energy per user per tme slot s calculated. Notce that the cycle of length 3 s slghtly more effcent than the constant polcy, the cycle of length 4 s much more effcent, but the optmal nonstatonary polcy s more effcent stll. Indeed, the optmal polcy acheves 80%, 67% and 5% energy savngs compared to the optmal constant polcy, the optmal round-robn polcy wth cycle of 3 and wth cycle of 4, respectvely. Importantly, the energy savngs are even more sgnfcant when the number of users s large (see Sec. VII. B. Computatonal Complexty Remarkably, not only s the proposed optmal nonstatonary polcy much more effcent than round-robn polces, t s much easer to compute. To get a hnt of why ths s so, note that n a round-robn polcy, the user s performance s determned not only by the number of slots n a cycle but also by the postons of the slots snce users are dscountng ther future throughput (due to delay senstvty. For a gven number of users M + N and a gven cycle length L, the number of nontrval round-robn schedules (the ones n whch each user gets at least one slot s greater than (M + N L (M+N. So searchng among these schedules wll be totally mpractcal even f L s moderately larger than M + N - but n order to acheve effcency close to the optmal non-statonary polcy, the cycle length L must be much larger than M + N. For nstance, for the 3-user case above, achevng energy effcency wthn 10% of the optmal nonstatonary polcy requres that the cycle length L be at least 8, and so requres searchng among the thousands (5796 of dfferent nontrval schedules of cycle length 8 and fndng power levels for each user. Even ths small problem s computatonally ntensve. For a moderate number of users - say 10 - and a cycle length of 0 - ths means searchng more than ten bllon (.e schedules and fndng power levels for each user - a completely ntractable problem. However, we wll propose a smple algorthm to compute the optmal nonstatonary polcy - both the schedule and the power levels - whose complexty grows only lnearly wth the number of users. V. THE DESIGN PROBLEM FORMULATION Our goal s to construct a devaton-proof TDMA polcy that fulflls all the users mnmum throughput requrements and optmzes a certan energy effcency crteron. The energy effcency crteron can be represented by a functon defned on all the users average energy consumptons, E(P 1 (π,..., P M+N (π. Note, mportantly, that the energy effcency crteron can also reflect the prorty of the PUs over the SUs. For example, the energy effcency crteron can be the weghted sum of all the users energy consumptons,.e. E(P 1 (π,..., P M+N (π = M N w P (π wth w 0 and M N w = 1. Each user s weght w ndcates the mportance of ths user. We can set hgher weghts for PUs and lower weghts for SUs. Gven each user s mnmum throughput requrement R mn, we can formally defne the polcy desgn problem as mn π s.t. E(P 1 (π,..., P M+N (π (3 π s a devaton proof TDMA polcy, R (π R mn, M N. In the above problem formulaton, the usual constrants on the nterferences caused by SUs to PUs are satsfed by restrctng to TDMA polces, n whch there s no mult-user nterference. VI. A DESIGN FRAMEWORK FOR SPECTRUM AND ENERGY EFFICIENT POLICIES We frst outlne the procedure to solve the polcy desgn problem (3. Then we show n detal how to solve the desgn problem, and dscuss mplementaton ssues. Fnally, we adapt the proposed polcy to the dynamc entry and ext of users. A. Outlne of The Desgn Framework The protocol desgn problem (3 s dffcult to solve drectly, because the decson varable π s the spectrum sharng polcy, whch s a mappng from the set of all hstores to the set of actons. We frst unravel an mportant property of the optmal TDMA polcy, namely each user should adopt the

6 6 Pareto optmal throughput achevable by statonary polces User 's Step 1: Characterze the set throughput of feasble nstantaneous throughput vectors Step : Select the optmal nstantaneous throughput vector (ITS algorthm Step 3: Construct the optmal TDMA polcy (LDF schedulng User 1's throughput Before run-tme At run-tme Feasble nstantaneous throughput vector Optmal nstantaneous throughput vector Mnmum throughput requrements between the average throughput and the average energy consumpton: P (π R (π = = (1 δ t=0 δt 1 {π(t>0}p tdma (1 δ ( t=0 δt 1 {π(t>0} log 1 + gptdma p tdma ( = σ log 1 + gptdma σ r tdma 1 g r tdma σ, (4 Fg. 1. The desgn framework to solve the polcy desgn problem. same power level whenever t transmts (see Lemma 1. Ths greatly reduces the dmenson of the decson varable; now we only need to fnd the sngle transmt power level (or equvalently, the nstantaneous throughput of each user and the transmsson schedule. We propose a three-step desgn framework, llustrated n Fg. 1, to solve the desgn problem. Frst, we characterzaton of the set of feasble nstantaneous throughput vectors under whch the users can fulfll ther throughput requrements (see Theorem 1. Based on ths, we then reformulate the orgnal problem (3 nto a problem of fndng the optmal nstantaneous throughput vector, and propose a dstrbuted nstantaneous throughput selecton (ITS algorthm to solve the reformulated problem (see Theorem. Fnally, gven the optmal nstantaneous throughput vector, we propose a longest-dstance-frst (LDF schedulng algorthm to determne the transmsson schedule, whch results n the optmal TDMA polcy that solves the desgn problem (3 (see Theorem 3. We llustrate the desgn framework n Fg. 1. B. Solvng The Polcy Desgn Problem We frst prove a key property of the optmal energy-effcent TDMA protocol: each user should choose the same power level whenever t transmts. Lemma 1: The optmal soluton π to the desgn problem (3 must satsfy that each user chooses the same power level whenever t transmts, namely π (t 1 = π (t for all t 1 and t such that π (t 1 > 0 and π (t > 0. Proof: See Appendx A. Lemma 1 greatly smplfes the desgn problem: now we only need to fnd a sngle optmal power level p for each user to choose whenever t transmts, nstead of solvng for ts optmal power levels n all ts transmssons. In the followng, we frst fnd the optmal power levels {p } M N durng the users transmssons (whch s equvalent to fndng ( each user s optmal nstantaneous throughput, r log 1 + gp. σ Then gven {p } M N (or {r } M N, we fnd the transmsson schedule that acheves the mnmum throughput requrements. 1 Step 1 Characterzng feasble nstantaneous throughput vectors: Now we formulate the problem of fndng the users optmal nstantaneous throughput {r } M N. Frst, the structure of the optmal TDMA protocol dscovered n Lemma 1 enables us to establsh the followng relatonshp where 1 { } s the ndcator functon, p tdma s user s power level when t transmts n the TDMA protocol, and r tdma s the correspondng nstantaneous throughput. We can see from (4 that gven r tdma, the average energy consumpton P (π s proportonal to the average throughput R (π. Hence, to mnmze the energy consumpton, we should let R (π = R mn for all. Then based on (4, we can rewrte the objectve functon E(P 1 (π 1,..., P M+N (π M+N of the desgn problem (3 as a functon of the nstantaneous throughput {r tdma } M N : ({ } σ r tdma 1 E R mn. g r tdma M N An nstantaneous throughput vector {r tdma } M N s feasble, f there exsts a TDMA protocol π that has the nstantaneous throughput {r tdma } M N and can acheve the mnmum average throughput {R mn } M N. Before characterzng the feasble nstantaneous throughput vectors, we wrte p = (p tdma (r tdma, p = 0 as the jont power profle when user transmts n a TDMA polcy. Now we state Theorem 1. Theorem 1: An nstantaneous throughput vector {r tdma } M N s feasble for the mnmum throughput requrements {R mn } M N, f the followng condtons are satsfed: Condton ( 1: the dscount factor δ satsfes δ 1 M N δ 1/ 1 + µ, M+N 1+ M N where b j = sup pj P j,p j p j 1 ρ(y=1 p and µ max j b j. /r tdma ( ρ(y=1 j p /b j ρ(y=1 p ρ(y=1 p j, p j r j(p j,, p j / rj Condton : M N Rmn R mn /µ. = 1, and r tdma Proof: See Appendx B. The problem of fndng the optmal nstantaneous throughput {r } M N can then be formulated as {r tdma mn } M N E s.t. ({ σ M N 0 < r tdma tdma r 1 g r tdma R mn } M N R mn r tdma = 1, (5 r R mn /µ, M N. Step Select the optmal nstantaneous throughput vector: We solve the above optmzaton problem (5 for the optmal nstantaneous throughput vector {r } M N usng

7 7 the dstrbuted ITS algorthm, whch s proved to converge n logarthmc tme n Theorem. The ITS algorthm essentally solves the followng equaton (derved from the KKT condton n a dstrbuted fashon: E P P σ = Rmn g r 1 r ( r 1 r r ln σ g = λ, (6 where λ s the Lagrangan multpler for the constrant R mn = 1 n (5, and should be chosen such that r tdma R mn r n (6 s the dervatve of the energy effcency crteron E( wth respect to user s average energy consumpton. If the energy effcency crteron s the weghted sum of all the users energy con- = 1. The term E P sumptons, we have E P P σ = Rmn r 1 = w, r. If the g r energy effcency crteron s the weghted proportonal farness M N w log(p, we have E P P σ = Rmn r 1 = g r g w r E. Each user selects the term P n the σ Rmn r 1 ITS algorthm based on the energy effcency crteron chosen by the protocol desgner. Algorthm 1 Instantaneous Throughput Selecton (ITS algorthm run by user. Requre: Mnmum throughput requrement R mn, precson e 1: Set λ = 0, λ = 1, λ = λ. : Solve (6 for r, set r mn{r, r } 3: Broadcast R mn /r, and receve Rmn j /rj for all j 4: whle j M N Rmn j /rj > 1 do 5: λ λ, λ λ 6: Solve (6 for r, set r mn{r, r } 7: Broadcast R mn /r, and receve Rmn j /rj for all j 8: end whle 9: whle j M N Rmn /rj 1 > e do 10: λ λ+ λ 11: Solve (6 for r, set r mn{r, r } 1: Broadcast R mn j /r 13: f j M N Rmn j 14: λ λ 15: else 16: λ λ 17: end f 18: end whle, and receve Rmn j /rj < 1 then 19: Normalze r r / ( j M N Rmn j /r j /r j for all j Theorem : The problem (5 of fndng the optmal nstantaneous throughput vector can be converted nto a convex optmzaton problem, whose soluton {r } M N can be found by each user runnng the dstrbuted ITS algorthm. The algorthm converges lnearly 4 at rate 1. Proof: See Appendx C. Algorthm The Longest-Dstance-Frst (LDF schedulng run by user. Requre: {Rj mn /rj } j M N, r Intalzaton: Set t = 0, r j (0 = Rmn j /rj for all j M N repeat Calculates the dstance from the optmal operatng pont d j (t = r j (t µ j 1 r j (t ρ(y = 1 pj, j Fnd the user wth the largest dstance arg max j M N d j (t f = then Transmt at power level p tdma (r end f Updates r j (t + 1 for all j M N as follows: f No Dstress Sgnal Receved At Tme Slot t then r (t+1 = 1 δ r (t ( 1 δ 1 (1+ ρ(y=1 p j b j r j (t + 1 = 1 δ r j (t + ( 1 δ 1 ρ(y=1 p b j, j else r (t+1 = 1 δ r (t ( 1 δ 1 (1 ρ(y=0 p j b j r j (t + 1 = 1 δ r j (t ( 1 δ 1 ρ(y=0 p b j, j end f t t + 1 untl 3 Step 3 Construct the optmal devaton-proof polcy: Gven the optmal nstantaneous throughput vector, each user runs the longest-dstance-frst schedulng algorthm n a decentralzed manner. On one hand, the transmsson schedule can be vewed as a smple largest-dstance-frst schedulng, namely the user farthest away from ts throughput requrement transmts. On the other hand, t s nontrval to defne the dstance from ts throughput requrement. As we wll prove later, user j s dstance from ts throughput requrement can be r j defned as d j (t = (t µ j 1 r j (t+, where ( ρ(y=1 k j pj /b jk r j (t s the future throughput to acheve startng from tme slot t normalzed by rj. The normalzed future throughput r j (t can be also nterpreted the future transmsson opportunty. If user j transmtted all the tme n the future, t would have an average throughput rj. If t transmts n a fracton r j (t of tme after tme t, t has an average future throughput of r j (t r j. Theorem 3 proves the desrable propertes of the LDF schedulng algorthm. Theorem 3: If each user M N runs the LDF schedulng algorthm, then we have each user can acheve ts mnmum throughput requrement R mn wth an energy consumpton P that mnmzes the energy effcency crteron E(P 1,..., P M+N ; 4 Followng [38, Sec ], we defne lnear convergence as follows. Suppose that the sequence {x k } converges to x. We say that ths sequence converges lnearly at rate c, f we have lm k x k+1 x x k x = c.

8 8 f a user does not follow the algorthm, t wll ether fal to acheve the mnmum throughput requrement, or acheve t wth a hgher energy consumpton; the dstance between each user s average throughput at tme t and ts throughput requrement decreases exponentally wth tme, namely (1 δ t τ=0 δ τ r τ R mn r δ t+1. (7 Proof: See Appendx D. Theorems and 3 establsh the convergence results of our proposed scheme. Theorem proves that the process of fndng the optmal nstantaneous throughput vector converges n logarthmc tme, and Theorem 3 proves that the LDF schedulng acheves the mnmum throughput requrements n logarthmc tme. Hence, the overall convergence speed s fast. Note that our convergence results are very dfferent from the convergence results n some recent works on power control n cogntve rado [6] and wreless networks [7]. These works [6][7] belong to the statonary spectrum sharng polces, namely they am to fnd the optmal fxed power levels of the users that maxmze the network utlty. The convergence results n [6][7] dffer from our results n two mportant ways. Frst, snce our work studes nonstatonary spectrum sharng wth tme-varyng power levels, we need to determne not only the optmal power levels of the users, but also the transmsson schedule of the users. We prove that the average throughput obtaned by adoptng the proposed LDF schedulng converges lnearly. Such a result does not appear n [6][7]. Second, the technques used n provng the convergence to the optmal power levels are dfferent. In [6][7], the algorthms are akn to the celebrated dstrbuted power control algorthm [13], and hence the proofs use and extend the standard nterference functon argument. Such an argument s not used n our work snce there s no nterference among the users under the proposed TDMA spectrum sharng polcy. C. Implementaton We dscuss the total overhead of nformaton exchange and feedback and the computatonal complexty of the proposed scheme. 1 Overhead of ntal nformaton exchange and feedback: In Table V, we compare the overhead of nformaton exchange and feedback of the proposed framework wth the energy effcent spectrum sharng polces proposed n [13] [0] and [1] for wreless networks and cogntve rado networks, respectvely. Before run-tme, the nformaton exchange n the proposed framework comes from the ITS algorthm ((M + N O(log (1/e wth e beng the performance loss tolerance and the exchange of b j for the LDF schedulng. The exchange of b j s for devaton-proofness. However, n the run tme, the feedback overhead of the proposed polcy s sgnfcantly lower than that of [13] [1]. Specfcally, n [13] [1], each user s recever needs to feedback the nterference temperature I n each tme slot. Hence, the total amount of feedback n [13] [1] grows lnearly wth tme. In concluson, ITS 0 1 LDF ITS t 1 ENTER sgnal receved, because users enter at t1 LDF ITS t EXIT sgnal receved, because users leave at t epoch 0 epoch 1 epoch Fg.. The proposed protocol mplemented by user when t receves ENTER sgnal at t 1 and EXIT sgnal at t. our proposed framework has a much lower total overhead than [13] [1]. Computatonal complexty: The mplementaton of the proposed polcy ncludes the ITS algorthm before run-tme and the LDF schedulng at run-tme. Frst, both the ITS algorthm and the LDF schedulng converge fast n logarthmc tme as proved n Theorems and 3. Second, each teraton n the ITS algorthm nvolves solvng the equaton (6, whch can be done effcently usng the Newton method. Each teraton n the LDF schedulng nvolves computng M + N ndces {d j (t} j M N and M +N normalzed values {r j (t} j M N, all of whch are determned by analytcal expressons. Fnally, although the orgnal defnton of the polcy requres each user to memorze the entre hstory of dstress sgnals, n the LDF schedulng, each user only needs to know the current dstress sgnal y t and memorze M + N normalzed values {r j (t} j M N. In concluson, the overall computatonal complexty of each user n mplementng the proposed polcy s small. D. Users Enterng and Leavng the Network We adapt the protocol to the scenaro where users enter and leave the network. We dvde tme nto epochs, where a new epoch begns when users enter or leave. The system starts at epoch 0, and we denote the optmal nstantaneous throughput n epoch 0 by r (0. When new users enter or exstng users leave at t 1, each of them broadcasts a ENTER or EXIT sgnal, respectvely. Upon recevng such a sgnal, the users run the ITS algorthm agan to determne the optmal nstantaneous throughput n epoch 1, r (1. Note that for each exstng user, the nput to the ITS algorthm s the contnuaton throughput at t 1, namely γ (t 1 ; whle for each new user j, the nput should be ts mnmum throughput Rj mn. Then they run the LDF schedulng wth the new nstantaneous throughput, untl a new epoch begns when the ENTER or EXIT sgnals are broadcast by some users at t. We llustrate how to adapt the protocol n Fg.. One nce property of the proposed protocol s that, the convergence of the LDF schedulng s not affected by users comng or leavng. Theorem 4: In the proposed spectrum sharng protocol, each user s average throughput converges to the mnmum throughput requrement n logarthmc tme, even wth users enterng and leavng the network. Proof: See Appendx E. LDF t

9 9 TABLE V. COMPARISON OF THE TOTAL OVERHEAD OF INITIAL INFORMATION EXCHANGE AND FEEDBACK. Informaton exchange before run-tme Feedback at run-tme [13] [0] N/A Each user : I each tme slot Amount: M + N reals per tme slot [1] Spectrum coordnator to each user: degradaton of ts mnmum throughput requrement Each user : I each tme slot, dstress sgnal f necessary Amount: M + N reals Amount: M + N reals per tme slot, dstress sgnal f necessary Each user broadcasts to other users: ρ(y = 1 p Proposed and {b j} j once, and R mn /r dstress sgnal f necessary at each teraton of the ITS algorthm; Each user s recever to ts transmtter: Ī, I Amount: (M + N + (M + N O(log (1/e reals Amount: dstress sgnal f necessary Note that we can also deal wth the changes of system parameters (e.g. the channel gans n the same way as we deal wth the dynamc entry and ext of users. Specfcally, whenever a user observes a change n the system parameters, t can broadcast a sgnal that trggers the users to run the ITS algorthm and the LDF schedulng agan. The convergence result n Theorem 4 also apples to ths case. In some works [0] for energy effcent power control n wreless networks, the locally stable asymptotc convergence of the proposed algorthm s proved. The locally stable asymptotc convergence guarantees that slght perturbaton from the equlbrum (nduced by, for example, an ncomng user wll not make the algorthm dverge. However, the convergence result n Theorem 4 are dfferent from that n [0]. Specfcally, we study the convergence of not only the transmt power levels, but also the transmsson schedule, whch s not studed n [0]. More mportantly, the nfluence of dynamc entry and ext of users on the convergence and stablty s qute dfferent n our work as compared to [0]. Snce our proposed polcy s TDMA, there s no nterference among the users. Hence, an ncomng user wll not nterfere wth the exstng users when they transmt. In other words, the nfluence of ncomng users s not through the nterference as n [0], but through acqurng the transmsson opportuntes of the exstng users. We show that under such perturbaton (n terms of transmsson opportuntes, the proposed LDF schedulng stll converges to the target throughput at the same rate. VII. PERFORMANCE EVALUATION In ths secton, we demonstrate the performance gan of our spectrum sharng polcy over exstng polces, and valdate our theoretcal analyss through numercal results. Throughout ths secton, we use the followng system parameters by default unless we change some of them explctly. The nose powers at all the users recevers are 0.05 W. For smplcty, we assume that the drect channel gans have the same dstrbuton g CN (0, 1,, and the cross channel gans have the same dstrbuton g j CN (0, 0.5, j. The users have the same mnmum throughput requrement of 1 bts/s/hz. The dscount factor s The nterference temperature threshold s θ = 1 W. The measurement error ε s Gaussan dstrbuted wth zeros mean and varance 0.1. The energy effcency crteron s the average energy consumpton across users. A. Comparsons Aganst Exstng Polces Frst, assumng that the populaton s fxed, we compare the proposed polcy aganst the optmal statonary polcy n [13] [1], and the optmal round-robn polcy wth cycle length Avg. energy consumpton (mw Statonary Round robn Proposed Statonary: nfeasble beyond 4 users 50% energy savng Number of users (a Small numbers of users. Avg. energy consumpton (mw Round robn Proposed 90% energy savng Number of users (b Large numbers of users. Fg. 3. Energy effcency of the statonary, round-robn, and proposed polces under dfferent numbers of users. L = M + N (.e. each user gets one slot n a cycle. We compare the energy effcency of the polces as the number of users ncrease n Fg. 3. Each data pont plotted s the average of 1000 channel realzatons. Frst, we can see that the statonary polcy becomes nfeasble when the number of users s more than 4. In contrast, the round-robn and proposed polces reman feasble when the number of users ncreases. Second, the proposed polcy acheves sgnfcant energy savng compared to the round-robn polcy, especally when the number of users s large. Specfcally, t acheves 50% and 90% energy savng compared to the round-robn polcy when the number of users s 11 and 15, respectvely. These are exactly the deployment scenaros where mprovements n spectrum and energy effcency are much needed. B. Adaptng to Users Enterng and Leavng the Network We demonstrate how the proposed polcy can seamlessly adapt to the entry and ext of PUs/SUs. We consder a network wth 10 PUs and SUs ntally. The PUs mnmum throughput requrements range from 0. bts/s/hz to 0.38 bts/s/hz wth 0.0 bts/s/hz ncrements, namely PU n has a mnmum throughput requrement of 0. + (n bts/s/hz. The SUs have the same mnmum throughput requrement of 0.1 bts/s/hz. We show the dynamcs of average energy consumptons and throughput of several PUs and all the SUs n Fg. 4. In the frst 100 tme slots, we can see that all the users quckly acheve the mnmum throughput requrements at around t = 50. PUs have dfferent energy consumptons because of ther dfferent mnmum throughput requrements. The two SUs converge to the same average energy consumpton and average throughput. There are SUs leavng (t = 100 and enterng (t = 150, 50, and a PU enterng (t = 00. We can see that durng the entre process, the PUs/SUs that are ntally n the system mantan the same

10 10 throughput and energy consumpton. The new PU (PU 11 has a hgher energy consumpton, because of ts hgher mnmum throughput requrement (0.4 bts/s/hz, and because of the lmted transmsson opportuntes left for t. SU 3, however, does not need a hgher energy consumpton because t occupes the tme slots orgnally assgned to SU, who left the network at t = 100. But SU 4 does need a hgher energy consumpton, because there are more SUs and less transmsson opportuntes n the network after t = 50. VIII. CONCLUSION In ths paper, we proposed nonstatonary spectrum sharng polces that allow the PUs and SUs to transmt n a TDMA fashon. The proposed polcy can acheve hgh spectrum effcency that s not achevable by exstng polces, and s more energy effcent than exstng polces under the same mnmum throughput requrements. The proposed polcy can acheve hgh spectrum and energy effcency even when the users have erroneous and bnary feedback of the nterference temperature. We extend the polcy to the case wth users enterng and leavng the network, whle stll mantanng the spectrum and energy effcency of the exstng users. The proposed polcy s amenable to decentralzed mplementaton and s devaton-proof. Smulaton results demonstrate the sgnfcant performance gans over state-of-the-art polces. Interestng future research drectons nclude how to desgn the optmal polcy when the feedback s fner than bnary and when the users have dfferent delay senstvtes (.e. dfferent dscount factors. APPENDIX A PROOF OF LEMMA 1 Suppose that n the optmal TDMA protocol π, there exsts a user and two tme slots t 1 t, such that 0 < π (t 1 < π (t (note that we do not assume t 1 < t or t 1 > t. We wll fnd another protocol π that fulflls the same mnmum throughput requrements wth lower energy consumptons, whch contradcts the fact that π s optmal. We construct the protocol π as follows. The transmsson strateges of the users other than user reman the same, namely π = π. For user, the transmsson remans the same for the tme slots other than t 1 and t, namely π (t = π (t, t t 1, t. Then we ncrease user s power level at t 1 by ɛ 1 > 0,.e. π (t 1 = π (t 1 + ɛ 1, and decrease ts power level at t by ɛ > 0,.e. π (t = π (t ɛ. To mantan user s average throughput, ɛ 1 and ɛ should satsfy ( ( δ t1 log 1 + gp (t1 + δ σ t log [ [ = δ t1 log 1+ g(p ]+δ (t1+ɛ1 t log σ 1 + gp (t σ 1+ g(p (t ɛ σ Gven ɛ 1, we can calculate ɛ as ɛ (ɛ 1 = ( σ +gp (t σ δ g [1 +gp (t1 t 1 t ] σ +g(p (t1+ɛ1. Then the decrease n average energy consumpton by swtchng to ]. protocol π can be calculated as (ɛ 1 = δ t1 ɛ 1 + δ t ɛ (ɛ 1. Takng the dervatve of (ɛ 1 wth respect to ɛ 1, we have [ ɛ 1 = δ t1 σ +gp (t +gp (t1 t 1 t 1]. ( σ δ σ +g(p (t1+ɛ1 σ +g(p (t1+ɛ1 Snce p (t > p (t 1, we have ɛ 1 > 0 when ɛ 1 = 0. Snce ɛ 1 s contnuous n ɛ 1 when ɛ 1 0, we can fnd a small enough ζ > 0, such that ɛ 1 > 0 for all ɛ 1 [0, ζ]. Hence, the decrease (ɛ 1 n user s average energy consumpton by swtchng to π s postve for any ɛ 1 [0, ζ]. Ths contradcts wth the fact that π s optmal, whch proves the lemma. APPENDIX B PROOF OF THEOREM 1 Due to space lmtaton, we present the proof of a smplfed verson of Theorem 1 n the specal case when the users are not self-nterested. Ths proof wll llustrate the man dea of the complete proof. Please refer to [33, Appendx B] for the complete proof of Theorem 1. Specfcally, we prove the followng lemma on the feasble nstantaneous throughput when the users are obedent. The lemma s a specal case of Theorem 1 by settng b + j = for all, j. Lemma : When the users are obedent, an nstantaneous throughput vector {r tdma } M N s feasble for the mnmum throughput requrements {R mn } M N, f the dscount factor δ satsfes δ 1 1 M+N, M N Rmn /r tdma = 1. Proof: As n dynamc programmng, we can decompose each user s dscounted average throughput nto the current throughput and the contnuaton throughput as follows: R (π = (1 δ δ t (1 {π(t>0} r tdma t=0 ( = (1 δ 1{π(0>0} r tdma }{{} the current throughput at t=0 [ ] + δ (1 δ δ t 1 (1 {π(t>0} r tdma. t=1 }{{} the contnuaton throughput startng from t=1 We can see that the contnuaton throughput startng from t = 1 s the dscounted average throughput as f the system starts from t = 1. In general, we can defne user s contnuaton throughput startng from t as γ (t (1 δ τ=t δτ t (1 {π(τ>0} r tdma. Then the decomposton at tme t can be wrtten as γ (t = (1 δ (1 {π(t>0} r tdma + δ γ (t + 1. Wrte the contnuaton throughput vector as γ = (γ 1,..., γ N. Defnton (Self-generatng set: A set of throughput vectors R s a self-generatng set, f for any throughput vector γ R, there exsts a N and a contnuaton throughput vector γ R such that for all N, γ = (1 δ (1 {= } r tdma + δ γ. (8

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

Assortment Optimization under MNL

Assortment Optimization under MNL Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.

More information

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1]

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1] DYNAMIC SHORTEST PATH SEARCH AND SYNCHRONIZED TASK SWITCHING Jay Wagenpfel, Adran Trachte 2 Outlne Shortest Communcaton Path Searchng Bellmann Ford algorthm Algorthm for dynamc case Modfcatons to our algorthm

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

Parametric fractional imputation for missing data analysis. Jae Kwang Kim Survey Working Group Seminar March 29, 2010

Parametric fractional imputation for missing data analysis. Jae Kwang Kim Survey Working Group Seminar March 29, 2010 Parametrc fractonal mputaton for mssng data analyss Jae Kwang Km Survey Workng Group Semnar March 29, 2010 1 Outlne Introducton Proposed method Fractonal mputaton Approxmaton Varance estmaton Multple mputaton

More information

Composite Hypotheses testing

Composite Hypotheses testing Composte ypotheses testng In many hypothess testng problems there are many possble dstrbutons that can occur under each of the hypotheses. The output of the source s a set of parameters (ponts n a parameter

More information

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng

More information

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,

More information

Lecture 4: November 17, Part 1 Single Buffer Management

Lecture 4: November 17, Part 1 Single Buffer Management Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input

More information

Lossy Compression. Compromise accuracy of reconstruction for increased compression.

Lossy Compression. Compromise accuracy of reconstruction for increased compression. Lossy Compresson Compromse accuracy of reconstructon for ncreased compresson. The reconstructon s usually vsbly ndstngushable from the orgnal mage. Typcally, one can get up to 0:1 compresson wth almost

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve

More information

COS 521: Advanced Algorithms Game Theory and Linear Programming

COS 521: Advanced Algorithms Game Theory and Linear Programming COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

Winter 2008 CS567 Stochastic Linear/Integer Programming Guest Lecturer: Xu, Huan

Winter 2008 CS567 Stochastic Linear/Integer Programming Guest Lecturer: Xu, Huan Wnter 2008 CS567 Stochastc Lnear/Integer Programmng Guest Lecturer: Xu, Huan Class 2: More Modelng Examples 1 Capacty Expanson Capacty expanson models optmal choces of the tmng and levels of nvestments

More information

EEE 241: Linear Systems

EEE 241: Linear Systems EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they

More information

An Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control

An Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control An Upper Bound on SINR Threshold for Call Admsson Control n Multple-Class CDMA Systems wth Imperfect ower-control Mahmoud El-Sayes MacDonald, Dettwler and Assocates td. (MDA) Toronto, Canada melsayes@hotmal.com

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Tracking with Kalman Filter

Tracking with Kalman Filter Trackng wth Kalman Flter Scott T. Acton Vrgna Image and Vdeo Analyss (VIVA), Charles L. Brown Department of Electrcal and Computer Engneerng Department of Bomedcal Engneerng Unversty of Vrgna, Charlottesvlle,

More information

Chapter - 2. Distribution System Power Flow Analysis

Chapter - 2. Distribution System Power Flow Analysis Chapter - 2 Dstrbuton System Power Flow Analyss CHAPTER - 2 Radal Dstrbuton System Load Flow 2.1 Introducton Load flow s an mportant tool [66] for analyzng electrcal power system network performance. Load

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

Feature Selection: Part 1

Feature Selection: Part 1 CSE 546: Machne Learnng Lecture 5 Feature Selecton: Part 1 Instructor: Sham Kakade 1 Regresson n the hgh dmensonal settng How do we learn when the number of features d s greater than the sample sze n?

More information

Global Sensitivity. Tuesday 20 th February, 2018

Global Sensitivity. Tuesday 20 th February, 2018 Global Senstvty Tuesday 2 th February, 28 ) Local Senstvty Most senstvty analyses [] are based on local estmates of senstvty, typcally by expandng the response n a Taylor seres about some specfc values

More information

The Geometry of Logit and Probit

The Geometry of Logit and Probit The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.

More information

Generalized Linear Methods

Generalized Linear Methods Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Online Appendix. t=1 (p t w)q t. Then the first order condition shows that

Online Appendix. t=1 (p t w)q t. Then the first order condition shows that Artcle forthcomng to ; manuscrpt no (Please, provde the manuscrpt number!) 1 Onlne Appendx Appendx E: Proofs Proof of Proposton 1 Frst we derve the equlbrum when the manufacturer does not vertcally ntegrate

More information

CS286r Assign One. Answer Key

CS286r Assign One. Answer Key CS286r Assgn One Answer Key 1 Game theory 1.1 1.1.1 Let off-equlbrum strateges also be that people contnue to play n Nash equlbrum. Devatng from any Nash equlbrum s a weakly domnated strategy. That s,

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information

Welfare Properties of General Equilibrium. What can be said about optimality properties of resource allocation implied by general equilibrium?

Welfare Properties of General Equilibrium. What can be said about optimality properties of resource allocation implied by general equilibrium? APPLIED WELFARE ECONOMICS AND POLICY ANALYSIS Welfare Propertes of General Equlbrum What can be sad about optmalty propertes of resource allocaton mpled by general equlbrum? Any crteron used to compare

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

Externalities in wireless communication: A public goods solution approach to power allocation. by Shrutivandana Sharma

Externalities in wireless communication: A public goods solution approach to power allocation. by Shrutivandana Sharma Externaltes n wreless communcaton: A publc goods soluton approach to power allocaton by Shrutvandana Sharma SI 786 Tuesday, Feb 2, 2006 Outlne Externaltes: Introducton Plannng wth externaltes Power allocaton:

More information

Numerical Heat and Mass Transfer

Numerical Heat and Mass Transfer Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

Chapter Newton s Method

Chapter Newton s Method Chapter 9. Newton s Method After readng ths chapter, you should be able to:. Understand how Newton s method s dfferent from the Golden Secton Search method. Understand how Newton s method works 3. Solve

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

Estimation: Part 2. Chapter GREG estimation

Estimation: Part 2. Chapter GREG estimation Chapter 9 Estmaton: Part 2 9. GREG estmaton In Chapter 8, we have seen that the regresson estmator s an effcent estmator when there s a lnear relatonshp between y and x. In ths chapter, we generalzed the

More information

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011 Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected

More information

On the Multicriteria Integer Network Flow Problem

On the Multicriteria Integer Network Flow Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of

More information

Computing Correlated Equilibria in Multi-Player Games

Computing Correlated Equilibria in Multi-Player Games Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,

More information

Lecture 4. Instructor: Haipeng Luo

Lecture 4. Instructor: Haipeng Luo Lecture 4 Instructor: Hapeng Luo In the followng lectures, we focus on the expert problem and study more adaptve algorthms. Although Hedge s proven to be worst-case optmal, one may wonder how well t would

More information

18.1 Introduction and Recap

18.1 Introduction and Recap CS787: Advanced Algorthms Scrbe: Pryananda Shenoy and Shjn Kong Lecturer: Shuch Chawla Topc: Streamng Algorthmscontnued) Date: 0/26/2007 We contnue talng about streamng algorthms n ths lecture, ncludng

More information

Temperature. Chapter Heat Engine

Temperature. Chapter Heat Engine Chapter 3 Temperature In prevous chapters of these notes we ntroduced the Prncple of Maxmum ntropy as a technque for estmatng probablty dstrbutons consstent wth constrants. In Chapter 9 we dscussed the

More information

Markov Chain Monte Carlo Lecture 6

Markov Chain Monte Carlo Lecture 6 where (x 1,..., x N ) X N, N s called the populaton sze, f(x) f (x) for at least one {1, 2,..., N}, and those dfferent from f(x) are called the tral dstrbutons n terms of mportance samplng. Dfferent ways

More information

Lecture 14: Bandits with Budget Constraints

Lecture 14: Bandits with Budget Constraints IEOR 8100-001: Learnng and Optmzaton for Sequental Decson Makng 03/07/16 Lecture 14: andts wth udget Constrants Instructor: Shpra Agrawal Scrbed by: Zhpeng Lu 1 Problem defnton In the regular Mult-armed

More information

The Second Anti-Mathima on Game Theory

The Second Anti-Mathima on Game Theory The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

Convergence of random processes

Convergence of random processes DS-GA 12 Lecture notes 6 Fall 216 Convergence of random processes 1 Introducton In these notes we study convergence of dscrete random processes. Ths allows to characterze phenomena such as the law of large

More information

Hidden Markov Models

Hidden Markov Models Hdden Markov Models Namrata Vaswan, Iowa State Unversty Aprl 24, 204 Hdden Markov Model Defntons and Examples Defntons:. A hdden Markov model (HMM) refers to a set of hdden states X 0, X,..., X t,...,

More information

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U) Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of

More information

CS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016

CS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016 CS 29-128: Algorthms and Uncertanty Lecture 17 Date: October 26, 2016 Instructor: Nkhl Bansal Scrbe: Mchael Denns 1 Introducton In ths lecture we wll be lookng nto the secretary problem, and an nterestng

More information

The Feynman path integral

The Feynman path integral The Feynman path ntegral Aprl 3, 205 Hesenberg and Schrödnger pctures The Schrödnger wave functon places the tme dependence of a physcal system n the state, ψ, t, where the state s a vector n Hlbert space

More information

Joint Scheduling and Power-Allocation for Interference Management in Wireless Networks

Joint Scheduling and Power-Allocation for Interference Management in Wireless Networks Jont Schedulng and Power-Allocaton for Interference Management n Wreless Networks Xn Lu *, Edwn K. P. Chong, and Ness B. Shroff * * School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette,

More information

Week3, Chapter 4. Position and Displacement. Motion in Two Dimensions. Instantaneous Velocity. Average Velocity

Week3, Chapter 4. Position and Displacement. Motion in Two Dimensions. Instantaneous Velocity. Average Velocity Week3, Chapter 4 Moton n Two Dmensons Lecture Quz A partcle confned to moton along the x axs moves wth constant acceleraton from x =.0 m to x = 8.0 m durng a 1-s tme nterval. The velocty of the partcle

More information

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA 4 Analyss of Varance (ANOVA) 5 ANOVA 51 Introducton ANOVA ANOVA s a way to estmate and test the means of multple populatons We wll start wth one-way ANOVA If the populatons ncluded n the study are selected

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

Foresighted Demand Side Management

Foresighted Demand Side Management Foresghted Demand Sde Management 1 Yuanzhang Xao and Mhaela van der Schaar, Fellow, IEEE Department of Electrcal Engneerng, UCLA. {yxao,mhaela}@ee.ucla.edu. Abstract arxv:1401.2185v1 [cs.ma] 9 Jan 2014

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

Supplement: Proofs and Technical Details for The Solution Path of the Generalized Lasso

Supplement: Proofs and Technical Details for The Solution Path of the Generalized Lasso Supplement: Proofs and Techncal Detals for The Soluton Path of the Generalzed Lasso Ryan J. Tbshran Jonathan Taylor In ths document we gve supplementary detals to the paper The Soluton Path of the Generalzed

More information

Economics 101. Lecture 4 - Equilibrium and Efficiency

Economics 101. Lecture 4 - Equilibrium and Efficiency Economcs 0 Lecture 4 - Equlbrum and Effcency Intro As dscussed n the prevous lecture, we wll now move from an envronment where we looed at consumers mang decsons n solaton to analyzng economes full of

More information

On balancing multiple video streams with distributed QoS control in mobile communications

On balancing multiple video streams with distributed QoS control in mobile communications On balancng multple vdeo streams wth dstrbuted QoS control n moble communcatons Arjen van der Schaaf, José Angel Lso Arellano, and R. (Inald) L. Lagendjk TU Delft, Mekelweg 4, 68 CD Delft, The Netherlands

More information

Portfolios with Trading Constraints and Payout Restrictions

Portfolios with Trading Constraints and Payout Restrictions Portfolos wth Tradng Constrants and Payout Restrctons John R. Brge Northwestern Unversty (ont wor wth Chrs Donohue Xaodong Xu and Gongyun Zhao) 1 General Problem (Very) long-term nvestor (eample: unversty

More information

EEL 6266 Power System Operation and Control. Chapter 3 Economic Dispatch Using Dynamic Programming

EEL 6266 Power System Operation and Control. Chapter 3 Economic Dispatch Using Dynamic Programming EEL 6266 Power System Operaton and Control Chapter 3 Economc Dspatch Usng Dynamc Programmng Pecewse Lnear Cost Functons Common practce many utltes prefer to represent ther generator cost functons as sngle-

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

Lecture 10 Support Vector Machines II

Lecture 10 Support Vector Machines II Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed

More information

10-701/ Machine Learning, Fall 2005 Homework 3

10-701/ Machine Learning, Fall 2005 Homework 3 10-701/15-781 Machne Learnng, Fall 2005 Homework 3 Out: 10/20/05 Due: begnnng of the class 11/01/05 Instructons Contact questons-10701@autonlaborg for queston Problem 1 Regresson and Cross-valdaton [40

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

Error Probability for M Signals

Error Probability for M Signals Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal

More information

Multigradient for Neural Networks for Equalizers 1

Multigradient for Neural Networks for Equalizers 1 Multgradent for Neural Netorks for Equalzers 1 Chulhee ee, Jnook Go and Heeyoung Km Department of Electrcal and Electronc Engneerng Yonse Unversty 134 Shnchon-Dong, Seodaemun-Ku, Seoul 1-749, Korea ABSTRACT

More information

Additional Codes using Finite Difference Method. 1 HJB Equation for Consumption-Saving Problem Without Uncertainty

Additional Codes using Finite Difference Method. 1 HJB Equation for Consumption-Saving Problem Without Uncertainty Addtonal Codes usng Fnte Dfference Method Benamn Moll 1 HJB Equaton for Consumpton-Savng Problem Wthout Uncertanty Before consderng the case wth stochastc ncome n http://www.prnceton.edu/~moll/ HACTproect/HACT_Numercal_Appendx.pdf,

More information

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003 Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel

More information

Curve Fitting with the Least Square Method

Curve Fitting with the Least Square Method WIKI Document Number 5 Interpolaton wth Least Squares Curve Fttng wth the Least Square Method Mattheu Bultelle Department of Bo-Engneerng Imperal College, London Context We wsh to model the postve feedback

More information

Note 10. Modeling and Simulation of Dynamic Systems

Note 10. Modeling and Simulation of Dynamic Systems Lecture Notes of ME 475: Introducton to Mechatroncs Note 0 Modelng and Smulaton of Dynamc Systems Department of Mechancal Engneerng, Unversty Of Saskatchewan, 57 Campus Drve, Saskatoon, SK S7N 5A9, Canada

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

On a direct solver for linear least squares problems

On a direct solver for linear least squares problems ISSN 2066-6594 Ann. Acad. Rom. Sc. Ser. Math. Appl. Vol. 8, No. 2/2016 On a drect solver for lnear least squares problems Constantn Popa Abstract The Null Space (NS) algorthm s a drect solver for lnear

More information

DUE: WEDS FEB 21ST 2018

DUE: WEDS FEB 21ST 2018 HOMEWORK # 1: FINITE DIFFERENCES IN ONE DIMENSION DUE: WEDS FEB 21ST 2018 1. Theory Beam bendng s a classcal engneerng analyss. The tradtonal soluton technque makes smplfyng assumptons such as a constant

More information

Cognitive Access Algorithms For Multiple Access Channels

Cognitive Access Algorithms For Multiple Access Channels 203 IEEE 4th Workshop on Sgnal Processng Advances n Wreless Communcatons SPAWC) Cogntve Access Algorthms For Multple Access Channels Ychuan Hu and Alejandro Rbero, Department of Electrcal and Systems Engneerng,

More information

k t+1 + c t A t k t, t=0

k t+1 + c t A t k t, t=0 Macro II (UC3M, MA/PhD Econ) Professor: Matthas Kredler Fnal Exam 6 May 208 You have 50 mnutes to complete the exam There are 80 ponts n total The exam has 4 pages If somethng n the queston s unclear,

More information

Arizona State University

Arizona State University SCHEDULING AND POWER ALLOCATION TO OPTIMIZE SERVICE AND QUEUE-WAITING TIMES IN COGNITIVE RADIO UPLINKS By arxv:1601.00608v1 [cs.it] 4 Jan 2016 Ahmed Emad Ewasha Commttee: Dr. Chan Tepedelenloğlu, Char

More information

Low Complexity Soft-Input Soft-Output Hamming Decoder

Low Complexity Soft-Input Soft-Output Hamming Decoder Low Complexty Soft-Input Soft-Output Hammng Der Benjamn Müller, Martn Holters, Udo Zölzer Helmut Schmdt Unversty Unversty of the Federal Armed Forces Department of Sgnal Processng and Communcatons Holstenhofweg

More information

(1 ) (1 ) 0 (1 ) (1 ) 0

(1 ) (1 ) 0 (1 ) (1 ) 0 Appendx A Appendx A contans proofs for resubmsson "Contractng Informaton Securty n the Presence of Double oral Hazard" Proof of Lemma 1: Assume that, to the contrary, BS efforts are achevable under a blateral

More information

Explicit and Implicit Temperature Constraints in Energy Harvesting Communications

Explicit and Implicit Temperature Constraints in Energy Harvesting Communications Explct and Implct Temperature Constrants n Energy Harvestng Communcatons Abdulrahman Baknna, Omur Ozel 2, and Sennur Ulukus Department of Electrcal and Computer Engneerng, Unversty of Maryland, College

More information

Appendix B: Resampling Algorithms

Appendix B: Resampling Algorithms 407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles

More information

10.34 Numerical Methods Applied to Chemical Engineering Fall Homework #3: Systems of Nonlinear Equations and Optimization

10.34 Numerical Methods Applied to Chemical Engineering Fall Homework #3: Systems of Nonlinear Equations and Optimization 10.34 Numercal Methods Appled to Chemcal Engneerng Fall 2015 Homework #3: Systems of Nonlnear Equatons and Optmzaton Problem 1 (30 ponts). A (homogeneous) azeotrope s a composton of a multcomponent mxture

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

4DVAR, according to the name, is a four-dimensional variational method.

4DVAR, according to the name, is a four-dimensional variational method. 4D-Varatonal Data Assmlaton (4D-Var) 4DVAR, accordng to the name, s a four-dmensonal varatonal method. 4D-Var s actually a drect generalzaton of 3D-Var to handle observatons that are dstrbuted n tme. The

More information

Support Vector Machines CS434

Support Vector Machines CS434 Support Vector Machnes CS434 Lnear Separators Many lnear separators exst that perfectly classfy all tranng examples Whch of the lnear separators s the best? + + + + + + + + + Intuton of Margn Consder ponts

More information

PHYS 705: Classical Mechanics. Calculus of Variations II

PHYS 705: Classical Mechanics. Calculus of Variations II 1 PHYS 705: Classcal Mechancs Calculus of Varatons II 2 Calculus of Varatons: Generalzaton (no constrant yet) Suppose now that F depends on several dependent varables : We need to fnd such that has a statonary

More information

Canonical transformations

Canonical transformations Canoncal transformatons November 23, 2014 Recall that we have defned a symplectc transformaton to be any lnear transformaton M A B leavng the symplectc form nvarant, Ω AB M A CM B DΩ CD Coordnate transformatons,

More information

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin Proceedngs of the 007 Wnter Smulaton Conference S G Henderson, B Bller, M-H Hseh, J Shortle, J D Tew, and R R Barton, eds LOW BIAS INTEGRATED PATH ESTIMATORS James M Calvn Department of Computer Scence

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

Computing MLE Bias Empirically

Computing MLE Bias Empirically Computng MLE Bas Emprcally Kar Wa Lm Australan atonal Unversty January 3, 27 Abstract Ths note studes the bas arses from the MLE estmate of the rate parameter and the mean parameter of an exponental dstrbuton.

More information

Estimating the Fundamental Matrix by Transforming Image Points in Projective Space 1

Estimating the Fundamental Matrix by Transforming Image Points in Projective Space 1 Estmatng the Fundamental Matrx by Transformng Image Ponts n Projectve Space 1 Zhengyou Zhang and Charles Loop Mcrosoft Research, One Mcrosoft Way, Redmond, WA 98052, USA E-mal: fzhang,cloopg@mcrosoft.com

More information