Delay Analysis of Spatio-Temporal Channel Access for Cognitive Networks

Size: px
Start display at page:

Download "Delay Analysis of Spatio-Temporal Channel Access for Cognitive Networks"

Transcription

1 Dela Analsis o Spatio-Temporal Channel Access or Cognitive Networks Chia-han Lee chiahan@citi.sinica.edu.tw Research Center or IT Innovation Academia Sinica Taipei, Taiwan Martin Haenggi mhaenggi@nd.edu Department o Electrical Engineering Universit o Notre Dame Notre Dame, IN, USA Abstract Most channel access schemes or cognitive radio onl consider using the idle periods o the primar users. Such schemes are not using the spectrum eicientl, since opportunities also arise when a primar transmitter is active but its corresponding primar receiver is ar awa rom the cognitive user. B detecting the signal power o the acknowledgments, a cognitive user is able to estimate the distance and channel condition between the primar receiver and itsel. Then i the primar receiver is ar awa, the cognitive user can transmit simultaneousl with the primar transmitter without aecting the primar link. Based on this idea, the spatio-temporal channel access scheme, utilizing both idle periods and spatial reuse, can be applied. This paper provides undamental analsis o the channel access delas and shows the advantage o using the spatio-temporal access scheme in the carrier sense multiple access (CSMA)-based network with bi-directional links. I. INTRODUCTION Channel access or cognitive radio networks is an active research area due to the increasing demand or spectrum resources. Traditional cognitive radio channel access schemes use the idle periods o the primar users. In wireless networks, opportunities arise not onl in time and requenc but also in space [: As long as the transmitter is ar enough rom other receivers, spatial reuse is possible. This idea can be applied to the cognitive radio channel access in which the cognitive user transmits simultaneousl with the primar transmitter when the primar receiver is ar awa (this is a orm o the intererence temperature model schemes [). In practical applications, the distances can be estimated b detecting the acknowledgments (ACK) rom the primar receiver. In this paper, the spatio-temporal (ST) channel access scheme, which utilizes both the idle duration and the idea o spatial reuse, is analzed. The cognitive users are considered to be emploed in a carrier sense multiple access (CSMA)-based primar network with bi-directional links, and our analsis is ocused on the channel access dela (CAD). The cognitive user channel access dela (CAD) is deined as the duration between the time that the cognitive is requested and the time that the next opportunit appears. The primar user channel access dela (PUCAD) discussed here is the dela due to the intererence rom cognitive s. The channel access dela inherent in the CSMA-based primar network (without the cognitive users) is well studied and not considered here. The primar user channel access dela is thus deined as the duration between the time the primar user would transmit i the network onl has primar users and the time that the channel is ree o intererence rom the cognitive users. Man papers had considered the cognitive radio channel access problem, but most o them assumed time-slotted sstems (see [ and the surve [4) and ver ew o them had considered using the ACKs or improved spatial reuse. The paper b Lapiccirella et al. [5 uses the ACK inormation, but their model is dierent rom ours in man was: this paper considers bi-directional links (the assume one-directional) and the CSMA-based network (theirs is a time-slotted sstem). This CSMA model with bi-directional links is better suited to model toda s wireless networks, and the one-directional link model is included as a special case. To our best knowledge, this is the irst paper to consider the cognitive radio channel access in CSMA-based networks with bi-directional links. II. SYSTEM MODEL Let us consider a cognitive network consisting o two primar users (PU) (one primar user pair), one is close to the cognitive user (denoted with the subscript n) and the other is ar awa (denoted with the subscript ); see Fig.. The primar user link is assumed bi-directional and works as ollows. It starts with an idle duration and then either the near or the ar primar user transmits. Let (resp. p ) denote the probabilit that the near (resp. ar) primar user transmits given that one o the primar users transmits. The is ollowed immediatel b a phsical laer ACK with the short interrame spacing (SIFS) in between. Right ater the ACK is another idle duration, so the primar user s are alwas separated b ACKs and idle durations. Let the random variables τ n (with support [τ n,min, τ n,max and mean τ n ) and τ (with support [τ,min, τ,max and mean τ ) denote the length o the near and the ar primar users. Deine the distributions F n (x) = P(τ n x) and F (x) = P(τ x), and let n (x) and (x) be the corresponding densities (PDFs). In order to simpli the notation, let the total length o the SIFS and the ACK signal be τ a, which is a ixed value. The random variable τ i (with support [τ i,min, τ i,max and mean ) is used to denote

2 intererence C W Far PU Near data Near ACK Near data Strong Far ACK Small Far data Far ACK intererence intererence Near data SIFS Far data Idle duration τ i τ a length τ n length τ Figure. The relative locations o the primar users and the cognitive user under consideration. Near TRAN Far ACK Far TRAN Near tran. SIFS Far tran. Idle duration τ i τ a Near data Near ACK Near data Figure. length τ n length τ Near ACK Near TRAN Far ACK Far ACK Far data Far ACK An example showing the s o primar users. Near data SIFS Far data Idle duration τ I τ A the length idleτ N duration. Deine length the distribution τ F F i (x) = P(τ i x) and let i (x) be the corresponding densit. For an time t, the cognitive user observes the primar users to be in one o the states s {IDLE, NEAR_TRAN, FAR_TRAN, ACK}, which represents idle, the rom the near PU, the rom the ar PU, and the ACK, respectivel. The ACK state is a combination o the SIFS and the ACK signal since an SIFS alwas precedes the ACK. Also, the SIFS+ACK duration is assumed to be too short or cognitive user. The states NEAR_ACK and FAR_ACK (ACKs rom the near and the ar user) are combined into one single state ACK since or the purpose o analzing the channel access schemes, there is no need to distinguish which primar user the ACK signal is rom. The probabilities that the primar users are in each state are p i,,t, p,t, and p a, respectivel. Let = + τ n + p τ + τ a, then p i = τi pn τn,,t =, p,t = p τ, and p a = τa. Note that = pn,t p,t+p,t and p =,t,t+p,t. Suppose the above statistics are collected b the cognitive users during the sensing phase, and assume the statistics (PDFs) and the locations o the primar users do not change over time. Let us also assume the cognitive users perorm perect spectrum sensing beore taking actions, so the primar user state is known to the cognitive users. In addition, assume the cognitive request is equall likel to happen at an time instance t, and let the cognitive user length (including the length o ACK) be a random variable with support [,min,,max. Although onl the case τ n,min,min <,max τ n,max is considered in this paper, other scenarios ollow similar steps. Deine the distribution F c (x) = P( x) and let c (x) be the corresponding densit (PDF). III. ANALYSIS OF CHANNEL ACCESS SCHEMES Consider the example in Fig.. It is obvious that two dierent channel access opportunities are available to a cognitive user: utilizing the idle duration or transmitting along with the near primar user. The white space channel access opportunit, using the idle duration o the primar s, is the cognitive radio channel access scheme that previous work request τ N τ N D G D G C W request C G τ i τ n P G Figure. An example showing the channel access dela Near orpu the cognitive user and Near thepu primar users whenp using G the white re space and the gra space. Note that onl the case with non-zero cognitive user channel access dela is shown. τ n P W re PU ACK corrupted PU ACK corrupted request considered. The gra space opportunit, which is based on the undamental act that when studing the eect o intererence, it is the receiver C G that matters, not the transmitter. This exposed terminal problem tells us that transmitting simultaneousl with the primar users causes no harm as long as the receiver is ar awa. In order to use the gra space, the distance to the ar primar user needs to be estimated. B detecting the signal power o the phsical laer ACK signal rom the ar PU, the distance inormation is available. The spatio-temporal channel access scheme is to take advantage o both the idle duration and the spatial reuse, i.e., in this scheme, the cognitive user uses the next available opportunit, no matter whether it is white or gra space. In this section, we will derive the channel access delas or the spatio-temporal channel access scheme. The cognitive user channel access dela is the time the cognitive user must wait beore the channel is available. Since the idle duration and the length o the primar and cognitive s are random, it is unavoidable that the cognitive s cause intererence to the primar users, resulting in backo or even re. The primar user channel access dela thus relects the primar user s waiting or re time. A. White space channel access opportunit The white space scheme is to utilize the next available idle duration or cognitive s. The cognitive user channel access dela, the time to wait or the next white space opportunit to show up, can be calculated as the ollowing. I the current state is IDLE, the cognitive user can transmit immediatel (the channel access dela is zero); i the current state is NEAR_TRAN or FAR_TRAN, the cognitive user needs to wait until the end o the primar and the ACK signal; i the current state is ACK, the cognitive user needs to wait until the ACK signal is over. The expected

3 C G = p i = k= p k [E [ τ i + (k ) ( + τ + τ a ) +k ( + τ a ) + (k ) τ } + p a ( p ) + { k= } + p,t k= p k [k + (k ) τ + p k [E [ τ ( k ) } τ a () p i ( p ) E [ τ i + p,t ( p ) E [ τ + (p i p + p,t + p a ) + (p i p + p,t p + p a p ) τ [ p i p + p,t + p a ( + p ) τ a }. () channel access dela C W or the cognitive user using the white space alone is then given b C W =,t (E [ τ n + τ a ) + p,t (E [ τ + τ a ) + p a τ a, () where the random variables τ n and τ are the residual time o the near and the ar primar users given that the cognitive request happens during the state NEAR_TRAN and FAR_TRAN, respectivel. Consider the event E n ={The cognitive request happens during the state NEAR_TRAN}, and then deine the distribution F n (x) = P(τ n x E n ) and let n (x) be the corresponding densit (PDF). It is ound that ˆ τn,max x E [ τ n = dx n () d, (4) τ n,min where n () instead o n () is used since the longer the is, the more likel it is that the cognitive request happens during this primar. Thus n () = τ n,max τ n,min and we get E [ τ n = τ n,max τn,min ( ). (5) τn,max τn,min E [ τ can be obtained in a similar wa. When using the white space, i the cognitive user is longer than the current idle duration, it will cause dela to the next primar user since CSMA is applied (see Fig. ). PW, the expected channel access dela o the primar users (due to the presence o cognitive users), is given b P W =,min τ i,min ( x) i (x) dx c () d. (6) I is uniorml distributed and τ i is exponentiall distributed with mean /λ, then τ i,min =, i (x) = λe λx, and c () =,max,min. A simple calculation leads to [ τ P W =,max,min e λτc,max e λτc,min λ,max,min λ. (7) B. Gra space channel access opportunit For the gra space scheme, the cognitive user transmits along with the next o the near primar user. The ACK signals are too short or practical use so onl periods are utilized. Now let us calculate the expected channel access dela C G or the cognitive user. I the current state is NEAR_TRAN, the cognitive can start immediatel (the channel access dela is zero); i the current state is IDLE, the next state could be either NEAR_TRAN or FAR_TRAN; i the current state is FAR_TRAN, the next state must be IDLE, but ater that, the state could be NEAR_TRAN or FAR_TRAN. It is obvious that a cognitive user might observe several FAR_TRAN and IDLE states beore eventuall observing the NEAR_TRAN state. Thereore, C G is given b (), where the random variable τ i is the residual idle duration given the cognitive request happens during the idle state. The calculation o E [ τ i is similar to the derivation o E [ τ n. I > τ n, the ACK signal rom the ar primar user will be corrupted, causing re. Due to CSMA, the re can onl happen ater the cognitive is inished (see Fig. ), so the intererence not onl causes dela but also wastes energ or re. On the other hand, i < τ n, the intererence level is determined b the distance to the ar primar user and the channel condition, which is a unction o the detected ACK signal power o the ar primar user, assuming the channel condition is smmetric. First let us calculate the expected channel access dela or the primar users P G due to the intererence rom the cognitive user. PG consists o two parts: when the current state is NEAR_TRAN, the cognitive starts immediatel rom the middle o the near primar ; otherwise, the cognitive starts rom the beginning o the next near primar. Thereore, P G,begin is given b P G,begin = P G = (,t ) P G,begin +,t PG,mid. (),min τ n,min n (x) dx c () d. () The cognitive user signal is weakl detected b the ar primar user, so, based on the CSMA rule, the ar primar user assumes it is sae to send ACK.

4 P G,mid = {ˆ τn,max,min P G,mid = τn,max τn,min z z ˆ x + z z dx n () d + τ n,min {( ) τ n,max τn,min (τc,max +,min ) } x + z dx n () d c (z) dz. (8) + τ ( n,max τ c,max +,max,min + τc,min) ( ) τ c,max + τc,min (τc,max +,min ) 6 τ n,min } 4. (9) Let τ o be the oset o the starting time o the cognitive to the starting time o the near primar. I < τ n, the intererence can happen onl when τ n < τ o < τ n ; i > τ n, the intererence happens no matter what τ o is (but note that < τ o < τ n ). Thereore, P G,mid is given b (8). I both the length o the primar and the cognitive users are uniorml distributed, P G,begin = ( ( ) τc,max τc,min) τn,min τ, 6 (,max,min ) (τ n,max τ n,min ) and P G,mid is given b (9). Ī G, the expected intererence superimposed on the primar when no re is caused, is a unction o the cognitive user power η c and the actor h that describes the channel condition (including the large scale and the small scale path loss). h can be estimated b observing the signal power o the ACK rom the ar primar user. Thus, [ˆ τn,max Ī G = η c h n (x) dx c () d. (),min When both the length o the primar and the cognitive s are uniorml distributed, it is eas to obtain Ī G = η c h τ ( ) ( n,max τ τ ). 6 (τ n,max τ n,min ) (,max,min ) () Finall, the expected re length R G is simpl τ n. C. Spatio-temporal channel access scheme The spatio-temporal access scheme utilizes both the white space and the gra space opportunities, i.e., whenever an idle duration or a near primar appears, the cognitive user can transmit. I the current state is either IDLE or NEAR_TRAN, the cognitive user channel access dela is zero; i the current state is FAR_TRAN, the cognitive user will wait until the next available opportunit, which is the white space, so the dela is E [ τ + τ a ; i the current state is ACK, the average channel access dela is τa. The expected channel access dela or the cognitive user using the spatio-temporal scheme is thus given b C ST = p,t (E [ τ + τ a ) + p a τ a. (4) Since onl when the current state is NEAR_TRAN would the gra space be used, the expected re length R ST is simpl,t RG and the expected intererence ĪST is,t Ī G. The expected channel access dela or the primar users P ST is given b P ST =,t PG,mid + (,t ) P W, (5) where P G,mid instead o PG is used because i the gra space is utilized in the spatio-temporal scheme, it must start somewhere in the middle o the near primar. IV. NUMERICAL EXAMPLES Now let us evaluate the perormance o the spatio-temporal channel access scheme b showing some numerical examples. I η c h is small due to the distant ar primar user, the large path loss, or the small cognitive power, then Ī G is negligible. Fig. 4 compares the channel access delas or the cognitive user and or the primar user. Schemes utilizing white space alone, gra space alone, and spatiotemporal channel access are compared under dierent mean idle durations, using the equations derived in the previous section. The idle duration is assumed exponentiall distributed. Assume the length o the near primar s is uniorml distributed with τ n,min = and τ n,max =, the length o the cognitive s is uniorml distributed with,min = and,max =, and τ a =. The cognitive requests are assumed to occur equall likel at an time t. For the bi-directional links, assume 7% o the s are rom the near primar user, i.e., =.7 and p =.. Fig. 4 shows that when becomes larger, the cognitive user channel access dela using the gra space opportunit increases whereas the cognitive user channel access dela using the other two schemes decreases. This is intuitive since increasing will increase p i and decrease,t, making the interval between consecutive near primar s larger. Notice that the average cognitive user channel access dela using the spatio-temporal scheme is the smallest, and as expected the average cognitive user dela when using the gra space alone is the largest due to the uncertaint o the link direction o the next primar. However, when is smaller than, the average CAD using the gra space is smaller than using the white space. This is eas to understand since the primar users have higher probabilit to be in the NEAR_TRAN state when is smaller. The smaller average CAD o the spatio-temporal scheme is obtained at

5 5 Cognitive user channel access dela 5 5 White space onl Gra space onl Spatio Temporal CST / CW =.7 =.5 = Primar user channel access dela 5 5 White space onl Gra space onl Spatio Temporal Figure 4. Channel access dela or the cognitive user and the primar user using the white space, the gra space, and the spatio-temporal access when =.7. PST / PW =.7 =.5 = Figure 5. The ratio o the channel access dela using the spatio-temporal access scheme to the dela using onl the white space or the cognitive user and the primar user. the cost o causing larger average PUCAD compared to using the white space alone, as shown in Fig. 4. In order to understand the eect o, Fig. 5 shows the ratio o the average CAD using the spatio-temporal access scheme to the average CAD using onl the white space and Fig. 5 shows the ratio o the average PUCAD using the spatio-temporal access scheme to the average PUCAD using onl the white space under dierent. The average CAD using the spatio-temporal scheme is onl about 7%, 5%, and % o the average CAD using the white space when =., =.5, and =.7, respectivel. When becomes larger, the spatio-temporal scheme is more eicient compared to using the white space alone, and this improvement does not change with dierent settings. However, the PUCAD becomes larger with the increase in, and the dierence becomes more signiicant with larger mean idle duration. V. CONCLUSION The opportunities or the cognitive user arise not onl in time but also in space. This paper analzed the channel access delas o the spatio-temporal channel access scheme which utilizes both the white space and the gra space. Compared to using the white space alone, we have shown that the spatiotemporal scheme has much shorter cognitive user channel access dela with slightl larger primar user channel access dela. When more s are rom the near primar user, the spatio-temporal scheme is signiicantl more eicient than using the white space alone. Our uture work includes: () extension to the scenario with multiple cognitive users; () perormance analsis when the primar user signals cannot be perectl detected due to, or example, ading or shadowing; () sstem analsis with other metrics, such as throughput and scalabilit, and comparison with the results rom network simulators. ACKNOWLEDGMENTS The partial support o NSF (grants CNS , CCF 7876) and the DARPA/IPTO IT-MANET program (grant W9NF-7--8) is grateull acknowledged. REFERENCES [ B. Alawieh, Y. Zhang, C. Assi, and H. Moutah, Improving spatial reuse in multihop wireless networks- a surve, IEEE Communications Surves & Tutorials, vol., no., pp. 7-9, Third Quarter 9. [ S. Hakin, Cognitive radio: brain-empowered wireless communications, IEEE Journal on Selected Areas in Communications, vol., no., pp. -, Feb. 5. [ S. Geirhoer, L. Tong, and B. M. Sadler, Cognitive medium access: constraining intererence based on experimental models, IEEE Journal on Selected Areas in Comm., vol. 6, no., pp. 95-5, Jan. 8. [4 Q. Zhao and B. M. Sadler, A surve o dnamic spectrum access, IEEE Signal Processing Magazine, vol. 4, no., pp , Ma 7. [5 F. E. Lapiccirella, Z. Ding, and X. Liu, Cognitive spectrum access control based on intrinsic primar ARQ inormation, ICC.

Comments on Problems. 3.1 This problem offers some practice in deriving utility functions from indifference curve specifications.

Comments on Problems. 3.1 This problem offers some practice in deriving utility functions from indifference curve specifications. CHAPTER 3 PREFERENCES AND UTILITY These problems provide some practice in eamining utilit unctions b looking at indierence curve maps and at a ew unctional orms. The primar ocus is on illustrating the

More information

( x) f = where P and Q are polynomials.

( x) f = where P and Q are polynomials. 9.8 Graphing Rational Functions Lets begin with a deinition. Deinition: Rational Function A rational unction is a unction o the orm ( ) ( ) ( ) P where P and Q are polynomials. Q An eample o a simple rational

More information

RATIONAL FUNCTIONS. Finding Asymptotes..347 The Domain Finding Intercepts Graphing Rational Functions

RATIONAL FUNCTIONS. Finding Asymptotes..347 The Domain Finding Intercepts Graphing Rational Functions RATIONAL FUNCTIONS Finding Asymptotes..347 The Domain....350 Finding Intercepts.....35 Graphing Rational Functions... 35 345 Objectives The ollowing is a list o objectives or this section o the workbook.

More information

9.3 Graphing Functions by Plotting Points, The Domain and Range of Functions

9.3 Graphing Functions by Plotting Points, The Domain and Range of Functions 9. Graphing Functions by Plotting Points, The Domain and Range o Functions Now that we have a basic idea o what unctions are and how to deal with them, we would like to start talking about the graph o

More information

Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Radio Networks Considering Self-Interference

Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Radio Networks Considering Self-Interference Received November 8, 015, accepted December 10, 015, date o publication December 17, 015, date o current version December 8, 015. Digital Object Identiier 10.1109/ACCE.015.509449 Design and Optimal Coniguration

More information

THE use of radio frequency channels assigned to primary. Traffic-Aware Channel Sensing Order in Dynamic Spectrum Access Networks

THE use of radio frequency channels assigned to primary. Traffic-Aware Channel Sensing Order in Dynamic Spectrum Access Networks EEE JOURNAL ON SELECTED AREAS N COMMUNCATONS, VOL. X, NO. X, X 01X 1 Traic-Aware Channel Sensing Order in Dynamic Spectrum Access Networks Chun-Hao Liu, Jason A. Tran, Student Member, EEE, Przemysław Pawełczak,

More information

9.1 The Square Root Function

9.1 The Square Root Function Section 9.1 The Square Root Function 869 9.1 The Square Root Function In this section we turn our attention to the square root unction, the unction deined b the equation () =. (1) We begin the section

More information

Caching Policy Optimization for Video on Demand

Caching Policy Optimization for Video on Demand Caching Policy Optimization or Video on Demand Hao Wang, Shengqian Han, and Chenyang Yang School o Electronics and Inormation Engineering, Beihang University, China, 100191 Email: {wang.hao, sqhan, cyyang}@buaa.edu.cn

More information

3. Several Random Variables

3. Several Random Variables . Several Random Variables. Two Random Variables. Conditional Probabilit--Revisited. Statistical Independence.4 Correlation between Random Variables. Densit unction o the Sum o Two Random Variables. Probabilit

More information

Quadratic Functions. The graph of the function shifts right 3. The graph of the function shifts left 3.

Quadratic Functions. The graph of the function shifts right 3. The graph of the function shifts left 3. Quadratic Functions The translation o a unction is simpl the shiting o a unction. In this section, or the most part, we will be graphing various unctions b means o shiting the parent unction. We will go

More information

Department of Physics and Astronomy 2 nd Year Laboratory. L2 Light Scattering

Department of Physics and Astronomy 2 nd Year Laboratory. L2 Light Scattering nd ear laborator script L Light Scattering Department o Phsics and Astronom nd Year Laborator L Light Scattering Scientiic aims and objectives To determine the densit o nano-spheres o polstrene suspended

More information

Estimation of the Vehicle Sideslip Angle by Means of the State Dependent Riccati Equation Technique

Estimation of the Vehicle Sideslip Angle by Means of the State Dependent Riccati Equation Technique Proceedings o the World Congress on Engineering 7 Vol II WCE 7, Jul 5-7, 7, London, U.K. Estimation o the Vehicle Sideslip Angle b Means o the State Dependent Riccati Equation Technique S. Strano, M. Terzo

More information

The Deutsch-Jozsa Problem: De-quantization and entanglement

The Deutsch-Jozsa Problem: De-quantization and entanglement The Deutsch-Jozsa Problem: De-quantization and entanglement Alastair A. Abbott Department o Computer Science University o Auckland, New Zealand May 31, 009 Abstract The Deustch-Jozsa problem is one o the

More information

8.4 Inverse Functions

8.4 Inverse Functions Section 8. Inverse Functions 803 8. Inverse Functions As we saw in the last section, in order to solve application problems involving eponential unctions, we will need to be able to solve eponential equations

More information

Curve Sketching. The process of curve sketching can be performed in the following steps:

Curve Sketching. The process of curve sketching can be performed in the following steps: Curve Sketching So ar you have learned how to ind st and nd derivatives o unctions and use these derivatives to determine where a unction is:. Increasing/decreasing. Relative extrema 3. Concavity 4. Points

More information

Spectrum Management Methodology for WCDMA Systems Encompassing Uplink and Downlink

Spectrum Management Methodology for WCDMA Systems Encompassing Uplink and Downlink Spectrum Management Methodology or WCMA Systems Encompassing plink and ownlink J. asreddine, J. Pérez-Romero, O. Sallent, R. Agustí ept. o Signal Theory and Communications, niversitat Politècnica de Catalunya

More information

TLT-5200/5206 COMMUNICATION THEORY, Exercise 3, Fall TLT-5200/5206 COMMUNICATION THEORY, Exercise 3, Fall Problem 1.

TLT-5200/5206 COMMUNICATION THEORY, Exercise 3, Fall TLT-5200/5206 COMMUNICATION THEORY, Exercise 3, Fall Problem 1. TLT-5/56 COMMUNICATION THEORY, Exercise 3, Fall Problem. The "random walk" was modelled as a random sequence [ n] where W[i] are binary i.i.d. random variables with P[W[i] = s] = p (orward step with probability

More information

Definition: Let f(x) be a function of one variable with continuous derivatives of all orders at a the point x 0, then the series.

Definition: Let f(x) be a function of one variable with continuous derivatives of all orders at a the point x 0, then the series. 2.4 Local properties o unctions o several variables In this section we will learn how to address three kinds o problems which are o great importance in the ield o applied mathematics: how to obtain the

More information

Least-Squares Spectral Analysis Theory Summary

Least-Squares Spectral Analysis Theory Summary Least-Squares Spectral Analysis Theory Summary Reerence: Mtamakaya, J. D. (2012). Assessment o Atmospheric Pressure Loading on the International GNSS REPRO1 Solutions Periodic Signatures. Ph.D. dissertation,

More information

Time Series Analysis for Quality Improvement: a Soft Computing Approach

Time Series Analysis for Quality Improvement: a Soft Computing Approach ESANN'4 proceedings - European Smposium on Artiicial Neural Networks Bruges (Belgium), 8-3 April 4, d-side publi., ISBN -9337-4-8, pp. 19-114 ime Series Analsis or Qualit Improvement: a Sot Computing Approach

More information

Measurements & Error Analysis

Measurements & Error Analysis It is better to be roughl right than precisel wrong. Alan Greenspan The Uncertaint o Measurements Some numerical statements are eact: Mar has 3 brothers, and + 4. However, all measurements have some degree

More information

Widely Linear Cooperative Spectrum Sensing for Cognitive Radio Networks

Widely Linear Cooperative Spectrum Sensing for Cognitive Radio Networks Widely Linear Cooperative Spectrum Sensing or Cognitive Radio Networks Angela Sara Cacciapuoti, Marcello Calei and Luigi Paura Department o Biomedical, Electronics and Telecommunications Engineering University

More information

Clicker questions. Clicker question 2. Clicker Question 1. Clicker question 2. Clicker question 1. the answers are in the lower right corner

Clicker questions. Clicker question 2. Clicker Question 1. Clicker question 2. Clicker question 1. the answers are in the lower right corner licker questions the answers are in the lower right corner question wave on a string goes rom a thin string to a thick string. What picture best represents the wave some time ater hitting the boundary?

More information

Delay-Based Connectivity of Wireless Networks

Delay-Based Connectivity of Wireless Networks Delay-Based Connectivity of Wireless Networks Martin Haenggi Abstract Interference in wireless networks causes intricate dependencies between the formation of links. In current graph models of wireless

More information

y,z the subscript y, z indicating that the variables y and z are kept constant. The second partial differential with respect to x is written x 2 y,z

y,z the subscript y, z indicating that the variables y and z are kept constant. The second partial differential with respect to x is written x 2 y,z 8 Partial dierentials I a unction depends on more than one variable, its rate o change with respect to one o the variables can be determined keeping the others ied The dierential is then a partial dierential

More information

Figure 1: Bayesian network for problem 1. P (A = t) = 0.3 (1) P (C = t) = 0.6 (2) Table 1: CPTs for problem 1. (c) P (E B) C P (D = t) f 0.9 t 0.

Figure 1: Bayesian network for problem 1. P (A = t) = 0.3 (1) P (C = t) = 0.6 (2) Table 1: CPTs for problem 1. (c) P (E B) C P (D = t) f 0.9 t 0. Probabilistic Artiicial Intelligence Problem Set 3 Oct 27, 2017 1. Variable elimination In this exercise you will use variable elimination to perorm inerence on a bayesian network. Consider the network

More information

Chapter 3: Image Enhancement in the. Office room : 841

Chapter 3: Image Enhancement in the.   Office room : 841 Chapter 3: Image Enhancement in the Spatial Domain Lecturer: Jianbing Shen Email : shenjianbing@bit.edu.cn Oice room : 841 http://cs.bit.edu.cn/shenjianbing cn/shenjianbing Principle Objective o Enhancement

More information

X-ray Diffraction. Interaction of Waves Reciprocal Lattice and Diffraction X-ray Scattering by Atoms The Integrated Intensity

X-ray Diffraction. Interaction of Waves Reciprocal Lattice and Diffraction X-ray Scattering by Atoms The Integrated Intensity X-ray Diraction Interaction o Waves Reciprocal Lattice and Diraction X-ray Scattering by Atoms The Integrated Intensity Basic Principles o Interaction o Waves Periodic waves characteristic: Frequency :

More information

APPENDIX 1 ERROR ESTIMATION

APPENDIX 1 ERROR ESTIMATION 1 APPENDIX 1 ERROR ESTIMATION Measurements are always subject to some uncertainties no matter how modern and expensive equipment is used or how careully the measurements are perormed These uncertainties

More information

The achievable limits of operational modal analysis. * Siu-Kui Au 1)

The achievable limits of operational modal analysis. * Siu-Kui Au 1) The achievable limits o operational modal analysis * Siu-Kui Au 1) 1) Center or Engineering Dynamics and Institute or Risk and Uncertainty, University o Liverpool, Liverpool L69 3GH, United Kingdom 1)

More information

Objectives. By the time the student is finished with this section of the workbook, he/she should be able

Objectives. By the time the student is finished with this section of the workbook, he/she should be able FUNCTIONS Quadratic Functions......8 Absolute Value Functions.....48 Translations o Functions..57 Radical Functions...61 Eponential Functions...7 Logarithmic Functions......8 Cubic Functions......91 Piece-Wise

More information

Cooperative Spectrum Sensing with Secondary. User Selection for Cognitive Radio Networks

Cooperative Spectrum Sensing with Secondary. User Selection for Cognitive Radio Networks Cooperative Spectrum Sensing with Secondary 1 User Selection or Cognitive Radio Networks over Nakagami-m Fading Channels Quoc-Tuan Vien, Huan X. Nguyen, and Arumugam Nallanathan Abstract This paper investigates

More information

Chapter 6: Securing neighbor discovery

Chapter 6: Securing neighbor discovery Securit and Cooperation in Wireless Networks http://secowinet.epfl.ch/ the wormhole attack; centralized and decentralized wormhole detection mechanisms; 007 Levente Buttán and Jean-Pierre Hubau Introduction

More information

In the index (pages ), reduce all page numbers by 2.

In the index (pages ), reduce all page numbers by 2. Errata or Nilpotence and periodicity in stable homotopy theory (Annals O Mathematics Study No. 28, Princeton University Press, 992) by Douglas C. Ravenel, July 2, 997, edition. Most o these were ound by

More information

Lesson 7: M/G/1 Queuing Systems Analysis

Lesson 7: M/G/1 Queuing Systems Analysis Slide supporting material Lesson 7: M/G/ Queuing Sstems Analsis Giovanni Giambene Queuing Theor and Telecommunications: Networks and Applications nd edition, Springer All rights reserved Motivations for

More information

Diversity-Fidelity Tradeoff in Transmission of Analog Sources over MIMO Fading Channels

Diversity-Fidelity Tradeoff in Transmission of Analog Sources over MIMO Fading Channels Diversity-Fidelity Tradeo in Transmission o Analog Sources over MIMO Fading Channels Mahmoud Taherzadeh, Kamyar Moshksar and Amir K. Khandani Coding & Signal Transmission Laboratory www.cst.uwaterloo.ca

More information

Dakai Zhu, Rami Melhem and Daniel Mossé Computer Science Department University of Pittsburgh Pittsburgh, PA zdk, melhem,

Dakai Zhu, Rami Melhem and Daniel Mossé Computer Science Department University of Pittsburgh Pittsburgh, PA zdk, melhem, To appear in the International Conerence on Computer Aided Design (ICCAD), Nov. 2004 The Eects o Energ Management on Reliabilit in Real-Time Embedded Sstems Dakai hu, Rami Melhem and Daniel Mossé Computer

More information

CHAPTER-III CONVECTION IN A POROUS MEDIUM WITH EFFECT OF MAGNETIC FIELD, VARIABLE FLUID PROPERTIES AND VARYING WALL TEMPERATURE

CHAPTER-III CONVECTION IN A POROUS MEDIUM WITH EFFECT OF MAGNETIC FIELD, VARIABLE FLUID PROPERTIES AND VARYING WALL TEMPERATURE CHAPER-III CONVECION IN A POROUS MEDIUM WIH EFFEC OF MAGNEIC FIELD, VARIABLE FLUID PROPERIES AND VARYING WALL EMPERAURE 3.1. INRODUCION Heat transer studies in porous media ind applications in several

More information

Feedback Optimal Control for Inverted Pendulum Problem by Using the Generating Function Technique

Feedback Optimal Control for Inverted Pendulum Problem by Using the Generating Function Technique (IJACSA) International Journal o Advanced Computer Science Applications Vol. 5 No. 11 14 Feedback Optimal Control or Inverted Pendulum Problem b Using the Generating Function echnique Han R. Dwidar Astronom

More information

A NOVEL METHOD OF INTERPOLATION AND EXTRAPOLATION OF FUNCTIONS BY A LINEAR INITIAL VALUE PROBLEM

A NOVEL METHOD OF INTERPOLATION AND EXTRAPOLATION OF FUNCTIONS BY A LINEAR INITIAL VALUE PROBLEM A OVEL METHOD OF ITERPOLATIO AD EXTRAPOLATIO OF FUCTIOS BY A LIEAR IITIAL VALUE PROBLEM Michael Shatalov Sensor Science and Technolog o CSIR Manuacturing and Materials, P.O.Bo 395, Pretoria, CSIR and Department

More information

Intrinsic Small-Signal Equivalent Circuit of GaAs MESFET s

Intrinsic Small-Signal Equivalent Circuit of GaAs MESFET s Intrinsic Small-Signal Equivalent Circuit o GaAs MESFET s M KAMECHE *, M FEHAM M MELIANI, N BENAHMED, S DALI * National Centre o Space Techniques, Algeria Telecom Laboratory, University o Tlemcen, Algeria

More information

New method for two-point nonuniformity correction of microbolometer detectors

New method for two-point nonuniformity correction of microbolometer detectors 10 th International Conerence on Quantitative InraRed Thermography July 27-30, 2010, Québec (Canada) New method or two-point nonuniormity correction o microbolometer detectors by R. Olbrycht*, B. Wiecek*,

More information

GIMC-based Fault Detection and Its Application to Magnetic Suspension System

GIMC-based Fault Detection and Its Application to Magnetic Suspension System Proceedings o the 7th World Congress The International Federation o Automatic Control Seoul, Korea, Jul 6-, 28 GIC-based Fault Detection and Its Application to agnetic Suspension Sstem Yujiro Nakaso Toru

More information

Lecture Outline. Basics of Spatial Filtering Smoothing Spatial Filters. Sharpening Spatial Filters

Lecture Outline. Basics of Spatial Filtering Smoothing Spatial Filters. Sharpening Spatial Filters 1 Lecture Outline Basics o Spatial Filtering Smoothing Spatial Filters Averaging ilters Order-Statistics ilters Sharpening Spatial Filters Laplacian ilters High-boost ilters Gradient Masks Combining Spatial

More information

On the Girth of (3,L) Quasi-Cyclic LDPC Codes based on Complete Protographs

On the Girth of (3,L) Quasi-Cyclic LDPC Codes based on Complete Protographs On the Girth o (3,L) Quasi-Cyclic LDPC Codes based on Complete Protographs Sudarsan V S Ranganathan, Dariush Divsalar and Richard D Wesel Department o Electrical Engineering, University o Caliornia, Los

More information

Analysis of friction-induced vibration leading to EEK noise in a dry friction clutch

Analysis of friction-induced vibration leading to EEK noise in a dry friction clutch Analsis o riction-induced vibration leading to EEK noise in a dr riction clutch Pierre Wicramarachi a), Rajendra Singh a), and George aile b) (Received 24 March 29; revised 25 Ma 9; accepted 25 August

More information

Radiation quality of cosmic ray nuclei studied with Geant4-based simulations

Radiation quality of cosmic ray nuclei studied with Geant4-based simulations FAIRNESS 0: FAIR NExt generation o ScientistS 0 Journal o Phsics: Conerence Series 50 (0) 00 doi:.88/-6596/50//00 Radiation qualit o cosmic ra nuclei studied with Geant-based simulations Lucas N. Burigo,,

More information

Original citation: Gao, Yan, Chen, Yunei and Bekkali, Abdelmoula. (06) Perormance o passie UHF RFID in cascaded correlated generalized Rician ading. IEEE Communications Letters. doi : 0.09/LCOMM.06.549

More information

Micro-canonical ensemble model of particles obeying Bose-Einstein and Fermi-Dirac statistics

Micro-canonical ensemble model of particles obeying Bose-Einstein and Fermi-Dirac statistics Indian Journal o Pure & Applied Physics Vol. 4, October 004, pp. 749-757 Micro-canonical ensemble model o particles obeying Bose-Einstein and Fermi-Dirac statistics Y K Ayodo, K M Khanna & T W Sakwa Department

More information

1036: Probability & Statistics

1036: Probability & Statistics 1036: Probabilit & Statistics Lecture 4 Mathematical pectation Prob. & Stat. Lecture04 - mathematical epectation cwliu@twins.ee.nctu.edu.tw 4-1 Mean o a Random Variable Let be a random variable with probabilit

More information

Maximum Flow. Reading: CLRS Chapter 26. CSE 6331 Algorithms Steve Lai

Maximum Flow. Reading: CLRS Chapter 26. CSE 6331 Algorithms Steve Lai Maximum Flow Reading: CLRS Chapter 26. CSE 6331 Algorithms Steve Lai Flow Network A low network G ( V, E) is a directed graph with a source node sv, a sink node tv, a capacity unction c. Each edge ( u,

More information

Scattering Properties of Gas Molecules on a Water Adsorbed Surface

Scattering Properties of Gas Molecules on a Water Adsorbed Surface Scattering Properties of Gas Molecules on a Water Adsorbed Surface Hideki Takeuchi a, Koji Yamamoto b, and Toru Hakutake c a Department of Mechanical Engineering, Kochi National College of Technolog, Nankoku

More information

ME 328 Machine Design Vibration handout (vibrations is not covered in text)

ME 328 Machine Design Vibration handout (vibrations is not covered in text) ME 38 Machine Design Vibration handout (vibrations is not covered in text) The ollowing are two good textbooks or vibrations (any edition). There are numerous other texts o equal quality. M. L. James,

More information

ECE 546 Lecture 03 Waveguides

ECE 546 Lecture 03 Waveguides ECE 546 Lecture 03 Waveguides Spring 018 Jose E. Schutt-Aine Electrical & Computer Engineering Universit o Illinois jesa@illinois.edu ECE 546 Jose Schutt Aine 1 Parallel-Plate Waveguide Maxwell s Equations

More information

Coupling and attachment of single mode fiber into laser diode transmitter

Coupling and attachment of single mode fiber into laser diode transmitter OPTOEECTONICS AND ADVANCED MATEIAS APID COMMUNICATIONS Vol., No., April 008, p. 83-88 Coupling and attachment o single mode iber into laser diode transmitter MOHAMED FADHAI *, SAKTIOTO, JASMAN ZAINA, YUSOF

More information

Supplementary Information Reconstructing propagation networks with temporal similarity

Supplementary Information Reconstructing propagation networks with temporal similarity Supplementary Inormation Reconstructing propagation networks with temporal similarity Hao Liao and An Zeng I. SI NOTES A. Special range. The special range is actually due to two reasons: the similarity

More information

Paper-II Chapter- TS-equation, Maxwell s equation. z = z(x, y) dz = dx + dz = Mdx + Ndy. dy Now. = 2 z

Paper-II Chapter- TS-equation, Maxwell s equation. z = z(x, y) dz = dx + dz = Mdx + Ndy. dy Now. = 2 z aper-ii Chapter- S-equation, Maxwell s equation Let heorem: Condition o exact dierential: Where M Hence, z x dz dx and N Q. Derive Maxwell s equations z x z zx, z dx + dz Mdx + Nd z d Now 2 z x M N x x

More information

Network Upgrade Game. Qiuhui Li, Qiao Zhao

Network Upgrade Game. Qiuhui Li, Qiao Zhao Network Upgrade Game Qiuhui Li, Qiao Zhao Outline Two ISPs N-ISPs Declining Upgrade Cost Model Motivation Network ater one upgrade Network ater both upgrade Contribution Formulate this upgrade decision

More information

Aerodynamic Admittance Function of Tall Buildings

Aerodynamic Admittance Function of Tall Buildings Aerodynamic Admittance Function o Tall Buildings in hou a Ahsan Kareem b a alou Engineering Int l, Inc., 75 W. Campbell Rd, Richardson, T, USA b Nataz odeling Laboratory, Uniersity o Notre Dame, Notre

More information

Philadelphia University Faculty of Engineering Communication and Electronics Engineering

Philadelphia University Faculty of Engineering Communication and Electronics Engineering Module: Electronics II Module Number: 6503 Philadelphia University Faculty o Engineering Communication and Electronics Engineering Ampliier Circuits-II BJT and FET Frequency Response Characteristics: -

More information

Estimation and detection of a periodic signal

Estimation and detection of a periodic signal Estimation and detection o a periodic signal Daniel Aronsson, Erik Björnemo, Mathias Johansson Signals and Systems Group, Uppsala University, Sweden, e-mail: Daniel.Aronsson,Erik.Bjornemo,Mathias.Johansson}@Angstrom.uu.se

More information

Throughput-Lifetime Tradeoffs in Multihop Wireless Networks under an SINR-based Interference Model

Throughput-Lifetime Tradeoffs in Multihop Wireless Networks under an SINR-based Interference Model 1 Throughput-Lietime Tradeos in Multihop Wireless Networks under an SINR-based Intererence Model Jun Luo, Aravind Iyer and Catherine Rosenberg Abstract High throughput and lietime are both crucial design

More information

AH 2700A. Attenuator Pair Ratio for C vs Frequency. Option-E 50 Hz-20 khz Ultra-precision Capacitance/Loss Bridge

AH 2700A. Attenuator Pair Ratio for C vs Frequency. Option-E 50 Hz-20 khz Ultra-precision Capacitance/Loss Bridge 0 E ttenuator Pair Ratio or vs requency NEEN-ERLN 700 Option-E 0-0 k Ultra-precision apacitance/loss ridge ttenuator Ratio Pair Uncertainty o in ppm or ll Usable Pairs o Taps 0 0 0. 0. 0. 07/08/0 E E E

More information

3D NON-LINEAR FINITE ELEMENT MODELLING OF TRADITIONAL TIMBER CONNECTIONS

3D NON-LINEAR FINITE ELEMENT MODELLING OF TRADITIONAL TIMBER CONNECTIONS 3D NON-LINEAR FINITE ELEMENT MODELLING OF TRADITIONAL TIMBER CONNECTIONS Bo-Han Xu 1, Abdelhamid Bouchaïr 1, Mustapha Taaount 1 ABSTRACT: In this paper, 3D non-linear inite element models are developed

More information

Review D: Potential Energy and the Conservation of Mechanical Energy

Review D: Potential Energy and the Conservation of Mechanical Energy MSSCHUSETTS INSTITUTE OF TECHNOLOGY Department o Physics 8. Spring 4 Review D: Potential Energy and the Conservation o Mechanical Energy D.1 Conservative and Non-conservative Force... D.1.1 Introduction...

More information

An Alternative Poincaré Section for Steady-State Responses and Bifurcations of a Duffing-Van der Pol Oscillator

An Alternative Poincaré Section for Steady-State Responses and Bifurcations of a Duffing-Van der Pol Oscillator An Alternative Poincaré Section or Steady-State Responses and Biurcations o a Duing-Van der Pol Oscillator Jang-Der Jeng, Yuan Kang *, Yeon-Pun Chang Department o Mechanical Engineering, National United

More information

Performance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel

Performance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel Performance Analysis of the IEEE 802.11e Block ACK Scheme in a Noisy Channel Tianji Li, Qiang Ni, Hamilton Institute, NUIM, Ireland. Thierry Turletti, Planete Group, INRIA, France. Yang Xiao, University

More information

Finger Search in the Implicit Model

Finger Search in the Implicit Model Finger Search in the Implicit Model Gerth Stølting Brodal, Jesper Sindahl Nielsen, Jakob Truelsen MADALGO, Department o Computer Science, Aarhus University, Denmark. {gerth,jasn,jakobt}@madalgo.au.dk Abstract.

More information

Cognitive Spectrum Access Control Based on Intrinsic Primary ARQ Information

Cognitive Spectrum Access Control Based on Intrinsic Primary ARQ Information Cognitive Spectrum Access Control Based on Intrinsic Primary ARQ Information Fabio E. Lapiccirella, Zhi Ding and Xin Liu Electrical and Computer Engineering University of California, Davis, California

More information

OPTIMAL PLACEMENT AND UTILIZATION OF PHASOR MEASUREMENTS FOR STATE ESTIMATION

OPTIMAL PLACEMENT AND UTILIZATION OF PHASOR MEASUREMENTS FOR STATE ESTIMATION OPTIMAL PLACEMENT AND UTILIZATION OF PHASOR MEASUREMENTS FOR STATE ESTIMATION Xu Bei, Yeo Jun Yoon and Ali Abur Teas A&M University College Station, Teas, U.S.A. abur@ee.tamu.edu Abstract This paper presents

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop

More information

Roberto s Notes on Differential Calculus Chapter 8: Graphical analysis Section 1. Extreme points

Roberto s Notes on Differential Calculus Chapter 8: Graphical analysis Section 1. Extreme points Roberto s Notes on Dierential Calculus Chapter 8: Graphical analysis Section 1 Extreme points What you need to know already: How to solve basic algebraic and trigonometric equations. All basic techniques

More information

Delay Efficient Scheduling via Redundant Constraints in Multihop Networks

Delay Efficient Scheduling via Redundant Constraints in Multihop Networks Delay Eicient Scheduling via Redundant Constraints in Multihop Networks Longbo Huang, Michael J. Neely Abstract We consider the problem o delay-eicient scheduling in general multihop networks. While the

More information

TIME DOMAIN FREQUENCY STABILITY ESTIMATION BASED ON FFT MEASUREMENTS

TIME DOMAIN FREQUENCY STABILITY ESTIMATION BASED ON FFT MEASUREMENTS 35 t Annual Precise Time and Time Interval (PTTI) Meeting TIME DOMAIN FREQUENCY STABILITY ESTIMATION BASED ON FFT MEASUREMENTS P. C. Cang, H. M. Peng, and S. Y. Lin National Standard Time & Frequenc Lab.,

More information

2. ETA EVALUATIONS USING WEBER FUNCTIONS. Introduction

2. ETA EVALUATIONS USING WEBER FUNCTIONS. Introduction . ETA EVALUATIONS USING WEBER FUNCTIONS Introduction So ar we have seen some o the methods or providing eta evaluations that appear in the literature and we have seen some o the interesting properties

More information

Max-Weight Scheduling in Queueing Networks with. Heavy-Tailed Traffic

Max-Weight Scheduling in Queueing Networks with. Heavy-Tailed Traffic Max-Weight Scheduling in Queueing Networks with Heavy-Tailed Traic arxiv:1108.0370v1 [cs.ni] 1 Aug 011 Mihalis G. Markakis, Eytan H. Modiano, and John N. Tsitsiklis Abstract We consider the problem o packet

More information

RESEARCH ON PIEZOELECTRIC QUARTZ UNDER MULTIDIMENSIONAL FORCES

RESEARCH ON PIEZOELECTRIC QUARTZ UNDER MULTIDIMENSIONAL FORCES aterials Phsics and echanics (015) 94-100 eceived: October 31, 014 ESEACH ON PIEZOELECTIC QUATZ UNDE ULTIDIENSIONAL OCES ei Wang *, uji Wang, Zongjin en, Zhenuan Jia, Liqi Zhao, Dong Li Ke Laborator for

More information

ENSC327 Communications Systems 2: Fourier Representations. School of Engineering Science Simon Fraser University

ENSC327 Communications Systems 2: Fourier Representations. School of Engineering Science Simon Fraser University ENSC37 Communications Systems : Fourier Representations School o Engineering Science Simon Fraser University Outline Chap..5: Signal Classiications Fourier Transorm Dirac Delta Function Unit Impulse Fourier

More information

A PROBABILISTIC POWER DOMAIN ALGORITHM FOR FRACTAL IMAGE DECODING

A PROBABILISTIC POWER DOMAIN ALGORITHM FOR FRACTAL IMAGE DECODING Stochastics and Dynamics, Vol. 2, o. 2 (2002) 6 73 c World Scientiic Publishing Company A PROBABILISTIC POWER DOMAI ALGORITHM FOR FRACTAL IMAGE DECODIG V. DRAKOPOULOS Department o Inormatics and Telecommunications,

More information

ALOHA Performs Optimal Power Control in Poisson Networks

ALOHA Performs Optimal Power Control in Poisson Networks ALOHA erforms Optimal ower Control in oisson Networks Xinchen Zhang and Martin Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556, USA {xzhang7,mhaenggi}@nd.edu

More information

Numerical Study and Analysis of Inertance-Type Pulse Tube Refrigerator

Numerical Study and Analysis of Inertance-Type Pulse Tube Refrigerator Numerical Stud and Analsis o Inertance-Tpe Pulse Tube Rerigerator SACHINDRA KUMAR ROUT, BALAJI KUMAR CHOUDHURY, RANJIT KUMAR. SAHOO, SUNIL KUMAR.SARANGI Department o Mechanical Engineering National Institute

More information

Physics 107 TUTORIAL ASSIGNMENT #7

Physics 107 TUTORIAL ASSIGNMENT #7 Physics 07 TUTORIL SSIGNMENT #7 Cutnell & Johnson, 7 th edition Chapter 6: Problems 5, 65, 79, 93 Chapter 7: Problems 7,, 9, 37, 48 Chapter 6 5 Suppose that sound is emitted uniormly in all directions

More information

An Ensemble Kalman Smoother for Nonlinear Dynamics

An Ensemble Kalman Smoother for Nonlinear Dynamics 1852 MONTHLY WEATHER REVIEW VOLUME 128 An Ensemble Kalman Smoother or Nonlinear Dynamics GEIR EVENSEN Nansen Environmental and Remote Sensing Center, Bergen, Norway PETER JAN VAN LEEUWEN Institute or Marine

More information

Delay bounds (Simon S. Lam) 1

Delay bounds (Simon S. Lam) 1 1 Pacet Scheduling: End-to-End E d Delay Bounds Delay bounds (Simon S. Lam) 1 2 Reerences Delay Guarantee o Virtual Cloc server Georey G. Xie and Simon S. Lam, Delay Guarantee o Virtual Cloc Server, IEEE/ACM

More information

Shai Avidan Tel Aviv University

Shai Avidan Tel Aviv University Image Editing in the Gradient Domain Shai Avidan Tel Aviv Universit Slide Credits (partial list) Rick Szeliski Steve Seitz Alosha Eros Yacov Hel-Or Marc Levo Bill Freeman Fredo Durand Slvain Paris Image

More information

EDGES AND CONTOURS(1)

EDGES AND CONTOURS(1) KOM31 Image Processing in Industrial Sstems Dr Muharrem Mercimek 1 EDGES AND CONTOURS1) KOM31 Image Processing in Industrial Sstems Some o the contents are adopted rom R. C. Gonzalez, R. E. Woods, Digital

More information

Numerical Methods - Lecture 2. Numerical Methods. Lecture 2. Analysis of errors in numerical methods

Numerical Methods - Lecture 2. Numerical Methods. Lecture 2. Analysis of errors in numerical methods Numerical Methods - Lecture 1 Numerical Methods Lecture. Analysis o errors in numerical methods Numerical Methods - Lecture Why represent numbers in loating point ormat? Eample 1. How a number 56.78 can

More information

ROBUST STABILITY AND PERFORMANCE ANALYSIS OF UNSTABLE PROCESS WITH DEAD TIME USING Mu SYNTHESIS

ROBUST STABILITY AND PERFORMANCE ANALYSIS OF UNSTABLE PROCESS WITH DEAD TIME USING Mu SYNTHESIS ROBUST STABILITY AND PERFORMANCE ANALYSIS OF UNSTABLE PROCESS WITH DEAD TIME USING Mu SYNTHESIS I. Thirunavukkarasu 1, V. I. George 1, G. Saravana Kumar 1 and A. Ramakalyan 2 1 Department o Instrumentation

More information

Power Spectral Analysis of Elementary Cellular Automata

Power Spectral Analysis of Elementary Cellular Automata Power Spectral Analysis o Elementary Cellular Automata Shigeru Ninagawa Division o Inormation and Computer Science, Kanazawa Institute o Technology, 7- Ohgigaoka, Nonoichi, Ishikawa 92-850, Japan Spectral

More information

SPOC: An Innovative Beamforming Method

SPOC: An Innovative Beamforming Method SPOC: An Innovative Beamorming Method Benjamin Shapo General Dynamics Ann Arbor, MI ben.shapo@gd-ais.com Roy Bethel The MITRE Corporation McLean, VA rbethel@mitre.org ABSTRACT The purpose o a radar or

More information

SIMULATION OF FLOW OF FIBRE SUSPENSIONS USING AN IRBF-BCF BASED MULTISCALE APPROACH

SIMULATION OF FLOW OF FIBRE SUSPENSIONS USING AN IRBF-BCF BASED MULTISCALE APPROACH Eleventh International Conerence on CFD in the Minerals and Process Industries CSIRO Melbourne Australia 7-9 December 25 SIMULATION OF FLOW OF FIBRE SUSPENSIONS USING AN IRBF-BCF BASED MULTISCALE APPROACH

More information

MODELLING PUBLIC TRANSPORT CORRIDORS WITH AGGREGATE AND DISAGGREGATE DEMAND

MODELLING PUBLIC TRANSPORT CORRIDORS WITH AGGREGATE AND DISAGGREGATE DEMAND MODELLIG PUBLIC TRASPORT CORRIDORS WITH AGGREGATE AD DISAGGREGATE DEMAD Sergio Jara-Díaz Alejandro Tirachini and Cristián Cortés Universidad de Chile ITRODUCTIO Traditional microeconomic modeling o public

More information

VEHICULAR ad-hoc networks (VANETs) have drawn. Cooperative Content Transmission for Vehicular Ad Hoc Networks using Robust Optimization

VEHICULAR ad-hoc networks (VANETs) have drawn. Cooperative Content Transmission for Vehicular Ad Hoc Networks using Robust Optimization Cooperative Content Transmission or Vehicular Ad Hoc Networks using Robust Optimization Daxin Tian, Jianshan Zhou, Min Chen, Zhengguo Sheng, Qiang Ni and Victor C.M. Leung School o Transportation Science

More information

FOR a continuous random variable X with density g(x), the differential entropy is defined as

FOR a continuous random variable X with density g(x), the differential entropy is defined as Higher Order Derivatives in Costa s Entrop Power Inequalit Fan Cheng, Member, IEEE and Yanlin Geng, Member, IEEE arxiv:09.v [cs.it] Aug 0 Abstract Let X be an arbitrar continuous random variable and Z

More information

. This is the Basic Chain Rule. x dt y dt z dt Chain Rule in this context.

. This is the Basic Chain Rule. x dt y dt z dt Chain Rule in this context. Math 18.0A Gradients, Chain Rule, Implicit Dierentiation, igher Order Derivatives These notes ocus on our things: (a) the application o gradients to ind normal vectors to curves suraces; (b) the generaliation

More information

Analysis of aircraft trajectory uncertainty using Ensemble Weather Forecasts

Analysis of aircraft trajectory uncertainty using Ensemble Weather Forecasts DOI: 10.13009/EUCASS017-59 7 TH EUROPEAN CONERENCE OR AERONAUTICS AND SPACE SCIENCES (EUCASS Analysis o aircrat traectory uncertainty using Ensemble Weather orecasts Damián Rivas, Antonio ranco, and Alonso

More information

Vector blood velocity estimation in medical ultrasound

Vector blood velocity estimation in medical ultrasound Vector blood velocity estimation in medical ultrasound Jørgen Arendt Jensen, Fredrik Gran Ørsted DTU, Building 348, Technical University o Denmark, DK-2800 Kgs. Lyngby, Denmark Jesper Udesen, Michael Bachmann

More information

BEAM-COLUMNS SUMMARY: OBJECTIVES: REFERENCES: CONTENTS:

BEAM-COLUMNS SUMMARY: OBJECTIVES: REFERENCES: CONTENTS: BEA-COLUS SUARY: Structural members subjected to axial compression and bending are nown as beam columns. The interaction o normal orce and bending ma be treated elasticall or plasticall using equilibrium

More information

3770 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 24, NO. 6, DECEMBER Muhammad Shahzad and Alex X. Liu

3770 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 24, NO. 6, DECEMBER Muhammad Shahzad and Alex X. Liu 3770 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 24, NO. 6, DECEMBER 2016 Fast and Reliable Detection and Identiication o Missing RFID Tags in the Wild Abstract Radio-requency identiication RFID) systems

More information

SIO 211B, Rudnick. We start with a definition of the Fourier transform! ĝ f of a time series! ( )

SIO 211B, Rudnick. We start with a definition of the Fourier transform! ĝ f of a time series! ( ) SIO B, Rudnick! XVIII.Wavelets The goal o a wavelet transorm is a description o a time series that is both requency and time selective. The wavelet transorm can be contrasted with the well-known and very

More information