Artificial Noise Revisited: When Eve Has more Antennas than Alice

Size: px
Start display at page:

Download "Artificial Noise Revisited: When Eve Has more Antennas than Alice"

Transcription

1 Artificial Noise Reisited: When e Has more Antennas than Alice Shiyin Li Yi Hong and manele Viterbo CS Department Monash Uniersity Melborne VIC 3800 Astralia mail: shiyin.li yi.hong emanele.iterbo@monash.ed Abstract We consider secre commnications oer MIMO wiretap channels in the presence of a passie eaesdropper with an nlimited nmber of antennas. In this scenario we characterize the performance of the artificial noise scheme proposed by Goel et al. and show that non-zero secrecy capacity is aailable een when the eaesdropper has more antennas than the transmitter. Or reslts are deried based on the fraction of the transmission power sed for artificial noise and the ratio of the channel noise ariances of the eaesdropper and the intended receier. Finally we inestigate the attack option for the eaesdropper to drie the secrecy rate to zero by increasing the nmber of antennas. I. INTRODUCTION The isses of establishing a priate and secre link at the physical layer hae known a growing interest in the past few years. Physical layer secrity lays its fondation on the wiretap channel [1] where the pre-exchanged secret key in Shannon s model [2] is replaced by the channel noise to proide randomness. For this model the notion of secrecy capacity is frther deeloped to characterize the maximm transmission rate at which the eaesdropper (e) is nable to obtain any information [3]. For qasi-static fading channel the aerage secrecy rate is deried in [4]. For the ergodic fading channel [5] proides a detailed analysis of secrecy capacity. In the literatre the achieable aerage secrecy rate has been adopted as a metric of secrity [4 6]. The artificial noise (AN) recently emerged as a promising method to increase secrecy rate [6] where the transmitter (Alice) aligns a jamming signal named artificial noise within the nll space between itself and the legitimate receier (Bob) ths AN only degrades e s channel. In [6] assming that both signal and AN follow a mltiariate Gassian distribtion non-zero aerage secrecy rate is obsered in simlation when the nmber of e s antennas N is strictly smaller than the nmber of Alice s antennas N A i.e. N < N A. Seeral channel models hae been considered to generalize the idea of AN. When the nmber of Bob s antennas = 1 [7] proides an asymptotic analysis of the secrecy capacity. When all channel matrices (inclding e) are fixed and known to all the terminals [8] proides a detailed characterization in terms of the secrecy capacity. More recently the notion of practical This work is spported by ARC nder Grant Discoery Project No. DP This research is also spported by the 2013 Monash Faclty of ngineering Seed Fnding Scheme. secrecy is proposed for the AN-based systems that make se of a finite alphabet (e.g. M-QAM) [9]. Instead of increasing secrecy rate e s error probability is maximized by the randomly distribted AN (e.g. not necessarily Gassian). In this work we inestigate the comprehensie relationship between secrecy capacity mltiple antennas and signal-tonoise ratio (SNR) within the framework of the original Gassian distribted AN scheme [6]. The contribtions of the paper are as follows. We show that the aerage secrecy capacity is achieed with Gassian inpt alphabets when N N A. We proide pper and lower bonds on both aerage and instantaneos secrecy rates with Gassian inpt alphabets that acconts for arbitrary e s SNR and N. From Bob s perspectie gien N we derie the ales of N A and to ensre positie aerage secrecy rate. From e s perspectie gien N A and we derie the ale of N to nll the instantaneos secrecy rate. The paper is organized as follows: Section II presents the system model followed by the analysis of secrecy capacity in Section III. Section IV discsses the attack to drie the secrecy rate to zero. Conclsions are drawn in Section V. Proofs of the theorems are gien in Appendix. Notation: Matrices and colmn ectors are denoted by pper and lowercase boldface letters and the Hermitian transpose inerse psedoinerse of a matrix B by B H B 1 and B respectiely. B denotes the determinant of B. Let {X n X} be defined on the same probability space. We write X n X if X n conerges to X almost srely or with probability one. The identity matrix of size n is denoted by I n. An m n nll matrix is denoted by 0 m n. We write for eqality in definition. A circlarly symmetric complex Gassian random ariable x with ariance σ 2 is defined as x N C (0 σ 2 ). The real complex integer and complex integer nmbers are denoted by R C Z and Z [i] respectiely. I(x; y) represents the mtal information of two random ariables x and y. We se the standard asymptotic notation f (x) = O (g (x)) when lim sp f(x)/g(x) <. x ronds to the closest integer. x II. SYSTM MODL We consider a MIMO wiretap system inclding a transmitter (Alice) an intended receier (Bob) and a passie eaesdropper (e) with N A and N antennas respectiely /14/$ I

2 We assme that the matrices H C NB NA and G C N NA represent the channels from Alice to Bob and Alice to e. H and G are assmed to be independent (i.e. all terminals are not co-located) and hae i.i.d. entries N C (0 1). Assming < N A H then has a non-triial nll space Z = nll(h) i.e. HZ = 0 NB (N A ). Let H = UΛV H be the singlar ale decomposition (SVD) of H. The relationship between matrices Z and V is gien by V = [V 1 Z] (1) where V 1 represents the matrix with the first colmns of V. Using the AN scheme [6] Alice transmits x = V 1 + Z = V (2) where is the secret data ector and is the artificial noise. Gassian inpt alphabets are assmed i.e. both C NB 1 and C (NA NB) 1 are mtally independent Gassian ector with i.i.d. entries N C (0 σ 2 ) and N C (0 σ 2 ) respectiely. The signals receied by Bob and e are gien by z = HV 1 + HZ + n B = HV 1 + n B (3) y = GV 1 + GZ + n. (4) where n B and n are additie white Gassian noise ectors at Bob and e respectiely with i.i.d. entries N C (0 σ 2 B ) and N C (0 σ 2 ). From qations (3) and (4) we see that only increases eaesdropper s ncertainty abot the secret message bt does not affect Bob. Since V is nitary the total transmission power x 2 is x 2 = H V H V = (5) We set the aerage transmit power constraints P and P : P = 2 = σ 2 P = 2 = σ 2 (N A ). (6) We define Bob s and e s SNRs as SNR B σ 2 /σ 2 B SNR σ 2 /σ 2. (7) Throghot the paper we assme the worst-case scenario for Alice and Bob described in [6]: Alice only knows H. e knows H G Z and V 1. Different from [6] we assme no pper bond on N. To simplify or analysis we define three system parameters: α σ 2 /σ 2 (SNR ) β σ 2 /σ 2 (AN power fraction) γ σ 2 /σ2 B (e-to-bob noise-power ratio) If γ > 1 we say e has a degraded channel. Note that SNR B = αγ. For conenience we fix σ 2 B = 1 ths P = αγ. To ealate the asymptotic secrecy rate we assme N A /N β 1 N A / β 2 /N β 3 III. NON-ZRO SCRCY CAPACITY In this section we reisit the problem of garanteeing non-zero instantaneos and aerage secrecy capacities sing artificial noise. To present or reslt we first define some sefl fnctions. A. Definitions We recall the definition of instantaneos secrecy capacity: C S max {I(û; z) I(û; y)} (8) which is a special case of the definition in [10]. The maximm is taken oer all possible inpt distribtions p (û). Note that C S is a random ariable depending on Gassian random matrices H and G which are embedded in z and y. We frther define aerage secrecy capacity as in [6] C S max {I(û; z H) I(û; y H G)}. (9) where I (X; Y Z) Z [I (X; Y ) Z] [11]. Since closed form expressions for C S and C S are not always aailable (except for Theorem 1) we often resort to lower bonds gien by C S I(; z) I(; y) R S (10) C S I(; z H) I(; y H G) R S (11) assming Gassian inpt alphabets i.e. and are mtally independent Gassian ector with i.i.d. entries N C (0 σ 2 ) and N C (0 σ 2 ) respectiely. We then define the following fnction as in [12] m 1 1/x Θ(m n x) e 2(k l) k l where a b k 2l k=0 l=0 i=0 2(l + n m) 2l i ( 1) i (2l)!(n m + i)! 2 2k i l!i!(n m + l)! n m+i j=0 x j Γ( j 1/x) (12) = a!/((a b)!b!) is the binomial coefficient n m are positie integers and Γ( ) is the incomplete Gamma fnction. Finally we define N max = max {N N A } N min = min {N N A }. (13) B. Non-zero Aerage Secrecy Capacity We proide some analytical insights relating R S and C S to N A N α β and γ. We first derie an pper bond on I(; y H G). Lemma 1: I(; y H G) N log(1 + α ) Θ(N min N max αβ) +Θ(N min N max αβ/(1 + α )) 1 = (N N min ) log α + O α Proof: See Appendix A. + O 1. β

3 Lemma 1 reeals the following relation between C S and R S. Theorem 1: If N N A as α β then C S = R S. (14) Proof: See Appendix B. In Theorem 1 we demonstrated the achieability of the aerage secrecy capacity of the AN scheme sing Gassian inpt alphabets nder the aboe condition. This reslt was not gien in [6] where only R S > 0 was obsered by simlation. The assmption that N is bonded can be n-natral in practice. In the following theorem we derie a lower bond on the achieable rate R S withot any limitation on N. Theorem 2: R S Θ( N A αγ) + Θ(N min N max αβ) N log(1 + α ) Θ(N min N max αβ/(1 + α )) R LB (15) Proof: See Appendix C. To gain frther intition we proide the following corollary giing a sfficient condition for positie aerage secrecy rate as. Corollary 1: If β 2 1 lim R S / > 0 when N < N A + (log γ 1 + Υ(P )) (16) log P log γ where 1 + 4P 1 Υ(P ) = + 2 tanh 1 1. (17) 2P 1 + 4P Proof: See Appendix D. Corollary 1 gies an example of application of Theorem 2 and shows that positie secrecy capacity is in fact achieable for any N ths remoes the restriction N < N A in [6] since the second term in (16) can be increased by γ. xample 1: Fig. 1 compares the ales of R S and R LB in (15) as fnctions of N with α = β = 3 db γ = 6 db = 3 and N A = 4. In this case (16) redces to N < 6. We obsere that R LB > 0 when N < 6. This example shows the sability of Corollary 1 for finite nmbers of antennas. Althogh the gap between R S and R LB increases with increasing N the cre of R LB can still confirm the fact that positie aerage secrecy rate is aailable een when N N A. C. Non-zero Instantaneos Secrecy Capacity We now analyze the instantaneos secrecy rate R S as a random ariable depending on the random matrices G and H. An interesting case that leads to a closed form bond can be fond when β = 1 (or 0 db). Theorem 3: If β = 1 as N A and N with fixed β 1 β 2 and β 3 R S Φ(P β N 2 ) Φ(P/() β 1 ) + Φ(P/() β 1 β 3 ) B β 3 β 3 where Φ (x y) y log 1 + x 14 F (x y) F (x y) 4x + log 1 + xy 14 F (x y) (18) nat N Fig. 1. RS and R LB s. N with α = β = 3 db γ = 6 db = 3 and N A = 4. Fig. 2. γ = 3. RS (nat) F (x y) 5 0 N =20 N =40 R S R LB RS s. and N with N A = 20 α = 10 db β = 0 db and x (1 + y) x (1 2 y) (19) Proof: Using [13 q. 1.14] the proof is straightforward. Corollary 2: Under the same assmptions of Theorem 3 if N N A (i.e. β 1 1) as P the maximm R S is achieed when = min max N A N 1 N A 1. (20) 1 + γ Proof: Aailable in the jornal ersion. Corollary 2 reeals the relationship between the maximm R S and γ for gien N A and N : the larger the channel degradation γ is the smaller the nll space size N A is reqired. xample 2: Fig. 2 shows the ariation of R S by simlation as a fnction of and N with N A = 20 α = 10 db β = 0 db and γ = 3. We obsere that for N = 20 and 40 RS is maximized when = N A 1+γ N = 15 and 10. Once exceeds the optimm ale RS starts to decrease. Ths Corollary 2 is ery accrate een for a finite system model. The reslts for general β and β 1 will be reported in the jornal ersion. IV. ATTACK ON AN In the preios section we took the side of Alice and Bob and we established the conditions that ensre non-zero secrecy rate for gien α and N. This proided a design strategy of

4 defence against eaesdropping. In this section we play the part of e. We want to estimate how many antennas e needs to drie the instantaneos secrecy rate R S to zero assming the worst case scenario that N A α β and γ are known to e. We define e s actiity as the attack on the AN scheme. In smmary attack and defence are related to pper and lower bonds on the secrecy rate respectiely. Let ŷ be a processed form of y. Thanks to the data processing ineqality we hae I(; y) I(; ŷ). (21) Let ˆR S I(; z) I(; ŷ). From (10) and (21) we obtain R S ˆR S. (22) In other words data processing cannot decrease R S bt may be sed to obtain an easily comptable pper bond. We se zero-forcing (ZF) processing since it can remoe the artificial noise and hence the dependency on parameter β. In particlar if N N A G has a left inerse denoted by G then the interference term GZ can be remoed by mltiplying y by W = HG i.e. Wy =HV 1 + Wn ŷ ZF. (23) Note that if N < N A ZF processing is not applicable. Theorem 4: Let ˆR S ZF I(; z) I(; ŷ ZF ). As N A and N with fixed β 1 β 2 and β 3 ˆR S ZF < Φ (P β N 2 ) log P(1 (24) B almost srely where Φ (x y) is gien in Theorem 3. Proof: See Appendix. From (22) for large scale system models we hae R S / < ˆR S ZF /. By setting ˆR S ZF / eqal to zero R S / is forced to be zero as stated in the following corollary. Corollary 3: Under the same assmptions of Theorem 4 R S / 0 if N = exp {Φ (P β 2 )} + 2 N A. (25) α Proof: The proof is straightforward. Corollary 3 proides e an analytical expression for choosing N to attack the AN scheme. V. CONCLUSIONS This paper characterizes the trade-off between the mltiple antennas and the secrecy rate achieed by the artificial noise scheme. By taking all the system parameters into accont we deeloped explicit lower and pper bonds on the secrecy rate with Gassian inpt alphabets. We hae shown that the lower bond tells Alice how many antennas she needs to ensre non-zero secrecy rate while the pper bond proides the minimm nmber of antennas for e to drie the secrecy rate to zero. Based on or analysis we describe the antenna nmber race between Alice and e as a defence erss attack battle oer physical layer secrity. APPNDIX A. Proof of Lemma 1 Since all entries in H and G are mtally independent I(; y) can be expressed as a fnction of these independent random entries. This allows s to take two steps to compte the expected ale of I(; y): we first compte I(; y G) gien H then compte H [I(; y G) H]. The adantage is that for gien H V = [V 1 Z] is a fixed nitary matrix. Then sing [14 Th. 1] GV 1 and GZ are mtally independent complex Gassian random matrices with i.i.d. entries N C (0 1). Let G 1 = GV 1 G 2 = GZ W 1 = G 1 G H 1 and W 2 = G 2 G H 2. According to [11] we hae I(; y G) I N σ 2 = G1G 2 + σ2 W 1 +σ 2 W 2 I N σ 2 +σ2 W 2 a I N σ 2 G2 + σ2 G1 (W 1 ) +σ 2 W 2 I N σ 2 +σ2 W 2 σ I N + 2 W σ = G NBσ2 I N + σ2 + N log σ2 + σ 2 W σ 2 2 σ 2 (26) where (a) holds de to the concaity of log-determinant fnction (Jensen s Ineqality). Note that I + G 2 G H 2 = I + G H 2 G 2 and define G 2 G H 2 W = G H 2 G 2 if N N A if N > N A Then W is a Wishart matrix W Nmin (N max I Nmin ) where N min and N max are gien in (13). Recalling the definitions of α and β in Sec.II. Based on aboe analysis and [12 Th. 1] the first term of (26) can be written as I Nmin + αβ 1+α W G2 I Nmin + αβw = Θ(N min N max αβ/(1 + α )) Θ(N min N max αβ) (27) where Θ(x y z) is gien in (12). From (26) and (27) we hae I(; y H G) = H [I(; y G) H] N log(1 + α ) Θ(N min N max αβ) +Θ(N min N max αβ/(1 + α )) 1 1 = (N N min ) log α + O + O. α β B. Proof of Theorem 1 If N N A from Lemma 1 and (10) as α and β R S = I(; z H). (28)

5 Moreoer we hae C S max {I(û; z H)} = I(; z H). (29) The last eqation holds since the inpt is a circlarly symmetric complex Gassian random ector [11 Th. 1]. Based on (28) and (29) as α and β we hae C. Proof of Theorem 2 R S = C S. Since (HV 1 ) (HV 1 ) H = HH H sing [11 Th. 2] and [12 Th. 1] we hae I(; z H) = H log I NB + αγhh H = Θ( N A αγ). (30) where Θ(x y z) is gien in (12). From Lemma 1 and (30) we obtain R S Θ( N A αγ) + Θ(N min N max αβ) N log(1 + α ) Θ(N min N max αβ/(1 + α )) (31) where N min and N max are gien in (13). D. Proof of Corollary 1 If β 2 1 according to [11] we hae I(; z H) lim = log P 1 + Υ(P ) (32) where Υ(P ) is gien in (17). From Lemma 1 we hae I(; y H G) N lim lim N min log P γ. (33) Moreoer if β 2 1 we hae N min = N A. (34) Based on (32) (33) and (34) lim R S / > 0 if N < N A + (log γ 1 + Υ(P )). log P log γ (35). Proof of Theorem 4 We recall that ˆR S ZF = I(; z) I(; ŷ ZF ) (36) According to [13 q. 1.14] we hae I(; z) lim Φ (P β N 2 ) (37) B where Φ(x y) is gien in (18). Moreoer since W = HG we hae I(; ŷ ZF ) σ 2 (HV 1 ) (HV 1 ) H + σ 2 WWH = log σ 2 WWH 1 I σ 2 + σ 2 VH 1 G G H V1 = log σ 2 VH 1 G H G 1 V1 NB = log (1 + α/λ i ) (38) where λ i 1 i represent the eigenales of 1 V1 H G G H V1. From (38) we hae NB I(; ŷ ZF ) > log α/λ i. (39) Let δ min be the smallest eigenale of 1 N G H G. Then 1/δ min is the largest eigenale of 1 N G H G 1. According to [15 Th. 8 pp. 69] we hae Based on (39) and (40) we hae λ i N < δ NB min. (40) I(; ŷ ZF ) > log αn δ min. (41) As N A and N according to Marčenko-Pastr law δ min (1 β 1 ) 2 [13 q. 1.10] (41) redces to I(; ŷ ZF ) > log P(1 (42) almost srely. By sbstitting (37) and (42) into (36) as N A and N with fixed β 1 β 2 and β 3 ˆR S ZF < Φ (P β 2 ) log P(1 almost srely. RFRNCS [1] A. D. Wyner The wire-tap channel Bell Syst. Tech. J. ol. 54 no. 8 pp Oct [2] C.. Shannon Commnication theory of secrecy systems Confidential report [3] S. K. Leng-Yan-Cheong and M.. Hellman The Gassian wire-tap channel I Trans. Inf. Theory ol. 24 no. 4 pp Jl [4] M. Bloch J. Barros M. Rodriges and S. W. McLaghlin Wireless information-theoretic secrity I Trans. Inf. Theory ol. 54 no. 6 pp Jn [5] Y. Liang H. V. Poor and S. Shamai Secre commnication oer fading channels I Trans. Inf. Theory ol. 54 no. 6 pp Jn [6] S. Goel and R. Negi Garanteeing secrecy sing artificial noise I Trans. Wireless Commn. ol. 7 pp Jn [7] A. Khisti and G. W. Wornell Secre transmission with mltiple antennas I: The MISOM wiretap channel I Trans. Inf. Theory ol. 56 no. 7 pp [8] Secre transmission with mltiple antennas Part II: The MI- MOM wiretap channel I Trans. Inf. Theory ol. 56 no. 11 pp [9] S. Li Y. Hong and. Viterbo Practical secrecy sing artificial noise I Commnications Letters ol. 17 no. 7 pp [10] I. Csiszár and J. Körner Broadcast channels with confidential messages I Trans. Inf. Theory ol. 24 no. 3 pp May [11]. Telatar Capacity of mlti-antenna Gassian channels ropean Transactions on Telecommnications ol. 10 no. 6 pp [12] H. Shin and J. H. Lee Closed-form formlas for ergodic capacity of MIMO Rayleigh fading channels in Proc. I Int. Conf. Commn. (ICC 03) Anchorage US May 2003 pp [13] A. M. Tlino and S. Verdú Random Matrix Theory and Wireless Commnications. North America: Now Pblishers Inc [14]. Lkacs and. P. King A property of the normal distribtion Ann. Math. Statist. ol. 25 no. 2 pp [15] H. Lütkepohl Handbook of matrices. John Wiley and Sons 1996.

The Real Stabilizability Radius of the Multi-Link Inverted Pendulum

The Real Stabilizability Radius of the Multi-Link Inverted Pendulum Proceedings of the 26 American Control Conference Minneapolis, Minnesota, USA, Jne 14-16, 26 WeC123 The Real Stabilizability Radis of the Mlti-Link Inerted Pendlm Simon Lam and Edward J Daison Abstract

More information

We automate the bivariate change-of-variables technique for bivariate continuous random variables with

We automate the bivariate change-of-variables technique for bivariate continuous random variables with INFORMS Jornal on Compting Vol. 4, No., Winter 0, pp. 9 ISSN 09-9856 (print) ISSN 56-558 (online) http://dx.doi.org/0.87/ijoc.046 0 INFORMS Atomating Biariate Transformations Jeff X. Yang, John H. Drew,

More information

1 The space of linear transformations from R n to R m :

1 The space of linear transformations from R n to R m : Math 540 Spring 20 Notes #4 Higher deriaties, Taylor s theorem The space of linear transformations from R n to R m We hae discssed linear transformations mapping R n to R m We can add sch linear transformations

More information

Graphs and Networks Lecture 5. PageRank. Lecturer: Daniel A. Spielman September 20, 2007

Graphs and Networks Lecture 5. PageRank. Lecturer: Daniel A. Spielman September 20, 2007 Graphs and Networks Lectre 5 PageRank Lectrer: Daniel A. Spielman September 20, 2007 5.1 Intro to PageRank PageRank, the algorithm reportedly sed by Google, assigns a nmerical rank to eery web page. More

More information

LOS Component-Based Equal Gain Combining for Ricean Links in Uplink Massive MIMO

LOS Component-Based Equal Gain Combining for Ricean Links in Uplink Massive MIMO 016 Sixth International Conference on Instrmentation & Measrement Compter Commnication and Control LOS Component-Based Eqal Gain Combining for Ricean Lins in plin Massive MIMO Dian-W Ye College of Information

More information

Notes on Linear Minimum Mean Square Error Estimators

Notes on Linear Minimum Mean Square Error Estimators Notes on Linear Minimum Mean Square Error Estimators Ça gatay Candan January, 0 Abstract Some connections between linear minimum mean square error estimators, maximum output SNR filters and the least square

More information

THE DIFFERENTIAL GEOMETRY OF REGULAR CURVES ON A REGULAR TIME-LIKE SURFACE

THE DIFFERENTIAL GEOMETRY OF REGULAR CURVES ON A REGULAR TIME-LIKE SURFACE Dynamic Systems and Applications 24 2015 349-360 TH DIFFRNTIAL OMTRY OF RULAR CURVS ON A RULAR TIM-LIK SURFAC MIN OZYILMAZ AND YUSUF YAYLI Department of Mathematics ge Uniersity Bornoa Izmir 35100 Trkey

More information

ON THE PERFORMANCE OF LOW

ON THE PERFORMANCE OF LOW Monografías Matemáticas García de Galdeano, 77 86 (6) ON THE PERFORMANCE OF LOW STORAGE ADDITIVE RUNGE-KUTTA METHODS Inmaclada Higeras and Teo Roldán Abstract. Gien a differential system that inoles terms

More information

Eigenvalue Ratio Detection Based On Exact Moments of Smallest and Largest Eigenvalues

Eigenvalue Ratio Detection Based On Exact Moments of Smallest and Largest Eigenvalues Eigenale Ratio Detection Based On Exact Moments of mallest and Largest Eigenales Mhammad Zeeshan hakir, Wchen Tang, Anlei Rao, Mhammad Ali Imran, Mohamed-lim Aloini Diision of Physical ciences and Engineering,

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

Xihe Li, Ligong Wang and Shangyuan Zhang

Xihe Li, Ligong Wang and Shangyuan Zhang Indian J. Pre Appl. Math., 49(1): 113-127, March 2018 c Indian National Science Academy DOI: 10.1007/s13226-018-0257-8 THE SIGNLESS LAPLACIAN SPECTRAL RADIUS OF SOME STRONGLY CONNECTED DIGRAPHS 1 Xihe

More information

Online Stochastic Matching: New Algorithms and Bounds

Online Stochastic Matching: New Algorithms and Bounds Online Stochastic Matching: New Algorithms and Bonds Brian Brbach, Karthik A. Sankararaman, Araind Sriniasan, and Pan X Department of Compter Science, Uniersity of Maryland, College Park, MD 20742, USA

More information

MATH2715: Statistical Methods

MATH2715: Statistical Methods MATH275: Statistical Methods Exercises III (based on lectres 5-6, work week 4, hand in lectre Mon 23 Oct) ALL qestions cont towards the continos assessment for this modle. Q. If X has a niform distribtion

More information

Minimum-Latency Beaconing Schedule in Multihop Wireless Networks

Minimum-Latency Beaconing Schedule in Multihop Wireless Networks This fll text paper was peer reiewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 009 proceedings Minimm-Latency Beaconing Schedle in Mltihop

More information

On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise

On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise Ya-Lan Liang, Yung-Shun Wang, Tsung-Hui Chang, Y.-W. Peter Hong, and Chong-Yung Chi Institute of Communications

More information

On the Secrecy Capacity of Fading Channels

On the Secrecy Capacity of Fading Channels On the Secrecy Capacity of Fading Channels arxiv:cs/63v [cs.it] 7 Oct 26 Praveen Kumar Gopala, Lifeng Lai and Hesham El Gamal Department of Electrical and Computer Engineering The Ohio State University

More information

Asymptotic Gauss Jacobi quadrature error estimation for Schwarz Christoffel integrals

Asymptotic Gauss Jacobi quadrature error estimation for Schwarz Christoffel integrals Jornal of Approximation Theory 146 2007) 157 173 www.elseier.com/locate/jat Asymptotic Gass Jacobi qadratre error estimation for Schwarz Christoffel integrals Daid M. Hogh EC-Maths, Coentry Uniersity,

More information

EE2 Mathematics : Functions of Multiple Variables

EE2 Mathematics : Functions of Multiple Variables EE2 Mathematics : Fnctions of Mltiple Variables http://www2.imperial.ac.k/ nsjones These notes are not identical word-for-word with m lectres which will be gien on the blackboard. Some of these notes ma

More information

Vectors in Rn un. This definition of norm is an extension of the Pythagorean Theorem. Consider the vector u = (5, 8) in R 2

Vectors in Rn un. This definition of norm is an extension of the Pythagorean Theorem. Consider the vector u = (5, 8) in R 2 MATH 307 Vectors in Rn Dr. Neal, WKU Matrices of dimension 1 n can be thoght of as coordinates, or ectors, in n- dimensional space R n. We can perform special calclations on these ectors. In particlar,

More information

New Regularized Algorithms for Transductive Learning

New Regularized Algorithms for Transductive Learning New Reglarized Algorithms for Transdctie Learning Partha Pratim Talkdar and Koby Crammer Compter & Information Science Department Uniersity of Pennsylania Philadelphia, PA 19104 {partha,crammer}@cis.penn.ed

More information

Derivation of 2D Power-Law Velocity Distribution Using Entropy Theory

Derivation of 2D Power-Law Velocity Distribution Using Entropy Theory Entrop 3, 5, -3; doi:.339/e54 Article OPEN ACCESS entrop ISSN 99-43 www.mdpi.com/jornal/entrop Deriation of D Power-Law Velocit Distribtion Using Entrop Theor Vija P. Singh,, *, stao Marini 3 and Nicola

More information

Exercise 4. An optional time which is not a stopping time

Exercise 4. An optional time which is not a stopping time M5MF6, EXERCICE SET 1 We shall here consider a gien filtered probability space Ω, F, P, spporting a standard rownian motion W t t, with natral filtration F t t. Exercise 1 Proe Proposition 1.1.3, Theorem

More information

Towards Green Distributed Storage Systems

Towards Green Distributed Storage Systems Towards Green Distributed Storage Systems Abdelrahman M. Ibrahim, Ahmed A. Zewail, and Aylin Yener Wireless Communications and Networking Laboratory (WCAN) Electrical Engineering Department The Pennsylania

More information

Low-emittance tuning of storage rings using normal mode beam position monitor calibration

Low-emittance tuning of storage rings using normal mode beam position monitor calibration PHYSIAL REVIEW SPEIAL TOPIS - AELERATORS AND BEAMS 4, 784 () Low-emittance tning of storage rings sing normal mode beam position monitor calibration A. Wolski* Uniersity of Lierpool, Lierpool, United Kingdom

More information

The Open Civil Engineering Journal

The Open Civil Engineering Journal Send Orders for Reprints to reprints@benthamscience.ae 564 The Open Ciil Engineering Jornal, 16, 1, 564-57 The Open Ciil Engineering Jornal Content list aailable at: www.benthamopen.com/tociej/ DOI: 1.174/187414951611564

More information

Full Duplex in Massive MIMO Systems: Analysis and Feasibility

Full Duplex in Massive MIMO Systems: Analysis and Feasibility Fll Dplex in Massive MIMO Systems: Analysis and Feasibility Radwa Sltan Lingyang Song Karim G. Seddik andzhan Electrical and Compter Engineering Department University of oston TX USA School of Electrical

More information

The Brauer Manin obstruction

The Brauer Manin obstruction The Braer Manin obstrction Martin Bright 17 April 2008 1 Definitions Let X be a smooth, geometrically irredcible ariety oer a field k. Recall that the defining property of an Azmaya algebra A is that,

More information

Optimized Concatenated LDPC Codes for Joint Source-Channel Coding

Optimized Concatenated LDPC Codes for Joint Source-Channel Coding Optimized Concatenated LDPC Codes for Joint Source-Channel Coding Maria Fresia, Fernando Pérez-Cruz, H. Vincent Poor Department of Electrical Engineering, Princeton Uniersity, Princeton, New Jersey 08544

More information

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehighed Zhiyan Yan Department of Electrical

More information

ON TRANSIENT DYNAMICS, OFF-EQUILIBRIUM BEHAVIOUR AND IDENTIFICATION IN BLENDED MULTIPLE MODEL STRUCTURES

ON TRANSIENT DYNAMICS, OFF-EQUILIBRIUM BEHAVIOUR AND IDENTIFICATION IN BLENDED MULTIPLE MODEL STRUCTURES ON TRANSIENT DYNAMICS, OFF-EQUILIBRIUM BEHAVIOUR AND IDENTIFICATION IN BLENDED MULTIPLE MODEL STRUCTURES Roderick Mrray-Smith Dept. of Compting Science, Glasgow Uniersity, Glasgow, Scotland. rod@dcs.gla.ac.k

More information

Fading Wiretap Channel with No CSI Anywhere

Fading Wiretap Channel with No CSI Anywhere Fading Wiretap Channel with No CSI Anywhere Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 7 pritamm@umd.edu ulukus@umd.edu Abstract

More information

Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel

Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Shahid Mehraj Shah and Vinod Sharma Department of Electrical Communication Engineering, Indian Institute of

More information

An Efficient QR-based Selection Criterion for Selecting an Optimal Precoding Matrix Employed in a Simplistic MIMO Detection

An Efficient QR-based Selection Criterion for Selecting an Optimal Precoding Matrix Employed in a Simplistic MIMO Detection Chien-Hng Pan An Efficient QR-based Selection Criterion for Selecting an Optimal Precoding Matrix Employed in a Simplistic MIMO Detection Chien-Hng Pan Department of Commnication Engineering National Chiao

More information

Distributed Weighted Vertex Cover via Maximal Matchings

Distributed Weighted Vertex Cover via Maximal Matchings Distribted Weighted Vertex Coer ia Maximal Matchings FABRIZIO GRANDONI Uniersità di Roma Tor Vergata JOCHEN KÖNEMANN Uniersity of Waterloo and ALESSANDRO PANCONESI Sapienza Uniersità di Roma In this paper

More information

Non-coherent Rayleigh fading MIMO channels: Capacity and optimal input

Non-coherent Rayleigh fading MIMO channels: Capacity and optimal input Non-coherent Rayleigh fading MIMO channels: Capacity and optimal inpt Rasika R. Perera, Tony S. Pollock*, and Thshara D. Abhayapala* Department of Information Engineering Research School of Information

More information

Joint Transfer of Energy and Information in a Two-hop Relay Channel

Joint Transfer of Energy and Information in a Two-hop Relay Channel Joint Transfer of Energy and Information in a Two-hop Relay Channel Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, and Mohammad Reza Aref Information Systems and Secrity Lab (ISSL Department of Electrical

More information

Chords in Graphs. Department of Mathematics Texas State University-San Marcos San Marcos, TX Haidong Wu

Chords in Graphs. Department of Mathematics Texas State University-San Marcos San Marcos, TX Haidong Wu AUSTRALASIAN JOURNAL OF COMBINATORICS Volme 32 (2005), Pages 117 124 Chords in Graphs Weizhen G Xingde Jia Department of Mathematics Texas State Uniersity-San Marcos San Marcos, TX 78666 Haidong W Department

More information

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehigh.ed Zhiyan Yan Department of Electrical

More information

Spectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy

Spectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy Spectrum Leasing via Cooperation for Enhanced 1 Physical-Layer Secrecy Keonkook Lee, Member, IEEE, Chan-Byoung Chae, Senior Member, IEEE, Joonhyuk Kang, Member, IEEE arxiv:1205.0085v1 [cs.it] 1 May 2012

More information

Direct linearization method for nonlinear PDE s and the related kernel RBFs

Direct linearization method for nonlinear PDE s and the related kernel RBFs Direct linearization method for nonlinear PDE s and the related kernel BFs W. Chen Department of Informatics, Uniersity of Oslo, P.O.Box 1080, Blindern, 0316 Oslo, Norway Email: wenc@ifi.io.no Abstract

More information

NUCLEATION AND SPINODAL DECOMPOSITION IN TERNARY-COMPONENT ALLOYS

NUCLEATION AND SPINODAL DECOMPOSITION IN TERNARY-COMPONENT ALLOYS NUCLEATION AND SPINODAL DECOMPOSITION IN TERNARY-COMPONENT ALLOYS COLLEEN ACKERMANN AND WILL HARDESTY Abstract. The Cahn-Morral System has often been sed to model the dynamics of phase separation in mlti-component

More information

Evolution Analysis of Iterative LMMSE-APP Detection for Coded Linear System with Cyclic Prefixes

Evolution Analysis of Iterative LMMSE-APP Detection for Coded Linear System with Cyclic Prefixes Eolution Analysis of Iteratie LMMSE-APP Detection for Coded Linear System with Cyclic Prefixes Xiaoun Yuan Qinghua Guo and Li Ping Member IEEE Department of Electronic Engineering City Uniersity of Hong

More information

CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy

CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK Wassim Joini and Christophe Moy SUPELEC, IETR, SCEE, Avene de la Bolaie, CS 47601, 5576 Cesson Sévigné, France. INSERM U96 - IFR140-

More information

Prediction of Transmission Distortion for Wireless Video Communication: Analysis

Prediction of Transmission Distortion for Wireless Video Communication: Analysis Prediction of Transmission Distortion for Wireless Video Commnication: Analysis Zhifeng Chen and Dapeng W Department of Electrical and Compter Engineering, University of Florida, Gainesville, Florida 326

More information

Stability of Model Predictive Control using Markov Chain Monte Carlo Optimisation

Stability of Model Predictive Control using Markov Chain Monte Carlo Optimisation Stability of Model Predictive Control sing Markov Chain Monte Carlo Optimisation Elilini Siva, Pal Golart, Jan Maciejowski and Nikolas Kantas Abstract We apply stochastic Lyapnov theory to perform stability

More information

Reduction of over-determined systems of differential equations

Reduction of over-determined systems of differential equations Redction of oer-determined systems of differential eqations Maim Zaytse 1) 1, ) and Vyachesla Akkerman 1) Nclear Safety Institte, Rssian Academy of Sciences, Moscow, 115191 Rssia ) Department of Mechanical

More information

The Minimal Estrada Index of Trees with Two Maximum Degree Vertices

The Minimal Estrada Index of Trees with Two Maximum Degree Vertices MATCH Commnications in Mathematical and in Compter Chemistry MATCH Commn. Math. Compt. Chem. 64 (2010) 799-810 ISSN 0340-6253 The Minimal Estrada Index of Trees with Two Maximm Degree Vertices Jing Li

More information

Stair Matrix and its Applications to Massive MIMO Uplink Data Detection

Stair Matrix and its Applications to Massive MIMO Uplink Data Detection 1 Stair Matrix and its Applications to Massive MIMO Uplink Data Detection Fan Jiang, Stdent Member, IEEE, Cheng Li, Senior Member, IEEE, Zijn Gong, Senior Member, IEEE, and Roy S, Stdent Member, IEEE Abstract

More information

Optimal Joint Detection and Estimation in Linear Models

Optimal Joint Detection and Estimation in Linear Models Optimal Joint Detection and Estimation in Linear Models Jianshu Chen, Yue Zhao, Andrea Goldsmith, and H. Vincent Poor Abstract The problem of optimal joint detection and estimation in linear models with

More information

AN INTRODUCTION TO SECRECY CAPACITY. 1. Overview

AN INTRODUCTION TO SECRECY CAPACITY. 1. Overview AN INTRODUCTION TO SECRECY CAPACITY BRIAN DUNN. Overview This paper introduces the reader to several information theoretic aspects of covert communications. In particular, it discusses fundamental limits

More information

Assignment 4 (Solutions) NPTEL MOOC (Bayesian/ MMSE Estimation for MIMO/OFDM Wireless Communications)

Assignment 4 (Solutions) NPTEL MOOC (Bayesian/ MMSE Estimation for MIMO/OFDM Wireless Communications) Assignment 4 Solutions NPTEL MOOC Bayesian/ MMSE Estimation for MIMO/OFDM Wireless Communications The system model can be written as, y hx + The MSE of the MMSE estimate ĥ of the aboe mentioned system

More information

Decomposing the MIMO Wiretap Channel

Decomposing the MIMO Wiretap Channel Decomposing the MIMO Wiretap Channel Anatoly Khina, Tel Aviv University Joint work with: Yuval Kochman, Hebrew University Ashish Khisti, University of Toronto ISIT 2014 Honolulu, Hawai i, USA June 30,

More information

SUPPLEMENT TO STRATEGIC TRADING IN INFORMATIONALLY COMPLEX ENVIRONMENTS (Econometrica, Vol. 86, No. 4, July 2018, )

SUPPLEMENT TO STRATEGIC TRADING IN INFORMATIONALLY COMPLEX ENVIRONMENTS (Econometrica, Vol. 86, No. 4, July 2018, ) Econometrica Spplementary aterial SUPPEENT TO STRATEGIC TRAING IN INFORATIONAY COPEX ENVIRONENTS Econometrica, Vol. 86, No. 4, Jly 208, 9 57 NICOAS S. ABERT Gradate School of Bsiness, Stanford Uniersity

More information

Ergodic and Outage Capacity of Narrowband MIMO Gaussian Channels

Ergodic and Outage Capacity of Narrowband MIMO Gaussian Channels Ergodic and Outage Capacity of Narrowband MIMO Gaussian Channels Yang Wen Liang Department of Electrical and Computer Engineering The University of British Columbia April 19th, 005 Outline of Presentation

More information

Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining

Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining Secrecy Outage erformance of Cooperative Relay Network With Diversity Combining Khyati Chopra Dept. of lectrical ngineering Indian Institute of Technology, Delhi New Delhi-110016, India mail: eez148071@ee.iitd.ac.in

More information

Analysis of Enthalpy Approximation for Compressed Liquid Water

Analysis of Enthalpy Approximation for Compressed Liquid Water Analysis of Entalpy Approximation for Compressed Liqid Water Milioje M. Kostic e-mail: kostic@ni.ed Nortern Illinois Uniersity, DeKalb, IL 60115-2854 It is cstom to approximate solid and liqid termodynamic

More information

Multiple Antennas in Wireless Communications

Multiple Antennas in Wireless Communications Multiple Antennas in Wireless Communications Luca Sanguinetti Department of Information Engineering Pisa University luca.sanguinetti@iet.unipi.it April, 2009 Luca Sanguinetti (IET) MIMO April, 2009 1 /

More information

Numerical Model for Studying Cloud Formation Processes in the Tropics

Numerical Model for Studying Cloud Formation Processes in the Tropics Astralian Jornal of Basic and Applied Sciences, 5(2): 189-193, 211 ISSN 1991-8178 Nmerical Model for Stdying Clod Formation Processes in the Tropics Chantawan Noisri, Dsadee Skawat Department of Mathematics

More information

Quantum Key Distribution Using Decoy State Protocol

Quantum Key Distribution Using Decoy State Protocol American J. of Engineering and Applied Sciences 2 (4): 694-698, 2009 ISSN 94-7020 2009 Science Pblications Qantm Key Distribtion sing Decoy State Protocol,2 Sellami Ali, 2 Shhairi Sahardin and,2 M.R.B.

More information

2 Faculty of Mechanics and Mathematics, Moscow State University.

2 Faculty of Mechanics and Mathematics, Moscow State University. th World IMACS / MODSIM Congress, Cairns, Astralia 3-7 Jl 9 http://mssanz.org.a/modsim9 Nmerical eamination of competitie and predator behaior for the Lotka-Volterra eqations with diffsion based on the

More information

A New Method for Calculating of Electric Fields Around or Inside Any Arbitrary Shape Electrode Configuration

A New Method for Calculating of Electric Fields Around or Inside Any Arbitrary Shape Electrode Configuration Proceedings of the 5th WSEAS Int. Conf. on Power Systems and Electromagnetic Compatibility, Corf, Greece, Agst 3-5, 005 (pp43-48) A New Method for Calclating of Electric Fields Arond or Inside Any Arbitrary

More information

The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks

The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks The Cryptanalysis of a New Pblic-Key Cryptosystem based on Modlar Knapsacks Yeow Meng Chee Antoine Jox National Compter Systems DMI-GRECC Center for Information Technology 45 re d Ulm 73 Science Park Drive,

More information

Estimations of the Influence of the Non-Linearity of the Aerodynamic Coefficients on the Skewness of the Loading. Vincent Denoël *, 1), Hervé Degée 1)

Estimations of the Influence of the Non-Linearity of the Aerodynamic Coefficients on the Skewness of the Loading. Vincent Denoël *, 1), Hervé Degée 1) Estimations of the Inflence of the Non-Linearity of the Aerodynamic oefficients on the Skewness of the Loading Vincent enoël *, 1), Heré egée 1) 1) epartment of Material mechanics and Strctres, Uniersity

More information

Asymptotic Normality of an Entropy Estimator with Exponentially Decaying Bias

Asymptotic Normality of an Entropy Estimator with Exponentially Decaying Bias Asymptotic Normality of an Entropy Estimator with Exponentially Decaying Bias Zhiyi Zhang Department of Mathematics and Statistics Uniersity of North Carolina at Charlotte Charlotte, NC 28223 Abstract

More information

Predicting Popularity of Twitter Accounts through the Discovery of Link-Propagating Early Adopters

Predicting Popularity of Twitter Accounts through the Discovery of Link-Propagating Early Adopters Predicting Poplarity of Titter Acconts throgh the Discoery of Link-Propagating Early Adopters Daichi Imamori Gradate School of Informatics, Kyoto Uniersity Sakyo, Kyoto 606-850 Japan imamori@dl.soc.i.kyoto-.ac.jp

More information

Minimizing Intra-Edge Crossings in Wiring Diagrams and Public Transportation Maps

Minimizing Intra-Edge Crossings in Wiring Diagrams and Public Transportation Maps Minimizing Intra-Edge Crossings in Wiring Diagrams and Pblic Transportation Maps Marc Benkert 1, Martin Nöllenbrg 1, Takeaki Uno 2, and Alexander Wolff 1 1 Department of Compter Science, Karlsrhe Uniersity,

More information

Remarks on strongly convex stochastic processes

Remarks on strongly convex stochastic processes Aeqat. Math. 86 (01), 91 98 c The Athor(s) 01. This article is pblished with open access at Springerlink.com 0001-9054/1/010091-8 pblished online November 7, 01 DOI 10.1007/s00010-01-016-9 Aeqationes Mathematicae

More information

Tight Lower Bounds on the Ergodic Capacity of Rayleigh Fading MIMO Channels

Tight Lower Bounds on the Ergodic Capacity of Rayleigh Fading MIMO Channels Tight Lower Bounds on the Ergodic Capacity of Rayleigh Fading MIMO Channels Özgür Oyman ), Rohit U. Nabar ), Helmut Bölcskei 2), and Arogyaswami J. Paulraj ) ) Information Systems Laboratory, Stanford

More information

FEA Solution Procedure

FEA Solution Procedure EA Soltion Procedre (demonstrated with a -D bar element problem) EA Procedre for Static Analysis. Prepare the E model a. discretize (mesh) the strctre b. prescribe loads c. prescribe spports. Perform calclations

More information

A Distributed Approach for Hidden Wormhole Detection with Neighborhood Information

A Distributed Approach for Hidden Wormhole Detection with Neighborhood Information 2010 Fifth IEEE International Conference on Networking, Architectre, and Storage A Distribted Approach for Hidden Wormhole Detection with Neighborhood Information Yn Wang Zhongke Zhang School of Compter

More information

Instability of Relevance-Ranked Results Using Latent Semantic Indexing for Web Search

Instability of Relevance-Ranked Results Using Latent Semantic Indexing for Web Search Instability of Releance-Ranked Reslts Using Latent Semantic Indexing for Web Search Hossain Kettani ECECS Department Polytechnic Uniersity of Perto Rico San Jan, PR 0099 hkettani@ppr.ed Gregory B. Newby

More information

ANOVA INTERPRETING. It might be tempting to just look at the data and wing it

ANOVA INTERPRETING. It might be tempting to just look at the data and wing it Introdction to Statistics in Psychology PSY 2 Professor Greg Francis Lectre 33 ANalysis Of VAriance Something erss which thing? ANOVA Test statistic: F = MS B MS W Estimated ariability from noise and mean

More information

FOUNTAIN codes [3], [4] provide an efficient solution

FOUNTAIN codes [3], [4] provide an efficient solution Inactivation Decoding of LT and Raptor Codes: Analysis and Code Design Francisco Lázaro, Stdent Member, IEEE, Gianligi Liva, Senior Member, IEEE, Gerhard Bach, Fellow, IEEE arxiv:176.5814v1 [cs.it 19 Jn

More information

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance Optimal Control of a Heterogeneos Two Server System with Consideration for Power and Performance by Jiazheng Li A thesis presented to the University of Waterloo in flfilment of the thesis reqirement for

More information

Complexity of the Cover Polynomial

Complexity of the Cover Polynomial Complexity of the Coer Polynomial Marks Bläser and Holger Dell Comptational Complexity Grop Saarland Uniersity, Germany {mblaeser,hdell}@cs.ni-sb.de Abstract. The coer polynomial introdced by Chng and

More information

On the High Dimensional Power of a Linear-Time Two Sample Test under Mean-shift Alternatives

On the High Dimensional Power of a Linear-Time Two Sample Test under Mean-shift Alternatives On the High Dimensional Power of a Linear-Time Two Sample Test nder Mean-shift Alternaties Barnabás Póczos bapoczos@cs.cm.ed Sashank J. Reddi sjakkamr@cs.cm.ed Aarti Singh aarti@cs.cm.ed Aaditya Ramdas

More information

Spanning Trees with Many Leaves in Graphs without Diamonds and Blossoms

Spanning Trees with Many Leaves in Graphs without Diamonds and Blossoms Spanning Trees ith Many Leaes in Graphs ithot Diamonds and Blossoms Pal Bonsma Florian Zickfeld Technische Uniersität Berlin, Fachbereich Mathematik Str. des 7. Jni 36, 0623 Berlin, Germany {bonsma,zickfeld}@math.t-berlin.de

More information

Complex Tire-Ground Interaction Simulation: Recent Developments Of An Advanced Shell Theory Based Tire Model

Complex Tire-Ground Interaction Simulation: Recent Developments Of An Advanced Shell Theory Based Tire Model . ozdog and W. W. Olson Complex Tire-Grond Interaction Simlation: ecent eelopments Of n danced Shell Theory ased Tire odel EFEECE: ozdog. and Olson W. W. Complex Tire-Grond Interaction Simlation: ecent

More information

Restricted cycle factors and arc-decompositions of digraphs. J. Bang-Jensen and C. J. Casselgren

Restricted cycle factors and arc-decompositions of digraphs. J. Bang-Jensen and C. J. Casselgren Restricted cycle factors and arc-decompositions of digraphs J. Bang-Jensen and C. J. Casselgren REPORT No. 0, 0/04, spring ISSN 0-467X ISRN IML-R- -0-/4- -SE+spring Restricted cycle factors and arc-decompositions

More information

Existence of HCMU metrics on higher genus Riemann surfaces

Existence of HCMU metrics on higher genus Riemann surfaces Existence of HCMU metrics on higher gens Riemann srfaces October 4, 0 bstract We will generalize the reslt in [CCW05] and roe the existence of HCMU metrics on higher gens K-srfaces, i.e. Riemann srfaces

More information

Change of Variables. (f T) JT. f = U

Change of Variables. (f T) JT. f = U Change of Variables 4-5-8 The change of ariables formla for mltiple integrals is like -sbstittion for single-ariable integrals. I ll gie the general change of ariables formla first, and consider specific

More information

Introdction In the three papers [NS97], [SG96], [SGN97], the combined setp or both eedback and alt detection lter design problem has been considered.

Introdction In the three papers [NS97], [SG96], [SGN97], the combined setp or both eedback and alt detection lter design problem has been considered. Robst Falt Detection in Open Loop s. losed Loop Henrik Niemann Jakob Stostrp z Version: Robst_FDI4.tex { Printed 5h 47m, Febrar 9, 998 Abstract The robstness aspects o alt detection and isolation (FDI)

More information

The New (2+1)-Dimensional Integrable Coupling of the KdV Equation: Auto-Bäcklund Transformation and Non-Travelling Wave Profiles

The New (2+1)-Dimensional Integrable Coupling of the KdV Equation: Auto-Bäcklund Transformation and Non-Travelling Wave Profiles MM Research Preprints, 36 3 MMRC, AMSS, Academia Sinica No. 3, December The New (+)-Dimensional Integrable Copling of the KdV Eqation: Ato-Bäcklnd Transformation and Non-Traelling Wae Profiles Zhena Yan

More information

On the Performance of. Golden Space-Time Trellis Coded Modulation over MIMO Block Fading Channels

On the Performance of. Golden Space-Time Trellis Coded Modulation over MIMO Block Fading Channels On the Performance of 1 Golden Space-Time Trellis Coded Modulation over MIMO Block Fading Channels arxiv:0711.1295v1 [cs.it] 8 Nov 2007 Emanuele Viterbo and Yi Hong Abstract The Golden space-time trellis

More information

University of Bristol

University of Bristol Uniersity of Bristol AEROGUST Workshop 27 th - 28 th April 2017, Uniersity of Lierpool Presented by Robbie Cook and Chris Wales Oeriew Theory Nonlinear strctral soler copled with nsteady aerodynamics Gst

More information

CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES. George P. Yanev

CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES. George P. Yanev Pliska Std. Math. Blgar. 2 (211), 233 242 STUDIA MATHEMATICA BULGARICA CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES George P. Yanev We prove that the exponential

More information

arxiv: v1 [math.co] 25 Sep 2016

arxiv: v1 [math.co] 25 Sep 2016 arxi:1609.077891 [math.co] 25 Sep 2016 Total domination polynomial of graphs from primary sbgraphs Saeid Alikhani and Nasrin Jafari September 27, 2016 Department of Mathematics, Yazd Uniersity, 89195-741,

More information

Effects of MHD Laminar Flow Between a Fixed Impermeable Disk and a Porous Rotating Disk

Effects of MHD Laminar Flow Between a Fixed Impermeable Disk and a Porous Rotating Disk Effects of MHD Laminar Flow Between a Fixed Impermeable Disk and a Poros otating Disk Hemant Poonia * * Asstt. Prof., Deptt. of Math, Stat & Physics, CCSHAU, Hisar-54.. C. Chadhary etd. Professor, Deptt.

More information

Probability Bounds for Two-Dimensional Algebraic Lattice Codes

Probability Bounds for Two-Dimensional Algebraic Lattice Codes Noname manuscript No. (will be inserted by the editor) Probability Bounds for Two-Dimensional Algebraic Lattice Codes David A. Karpuk, Member, IEEE Camilla Hollanti, Member, IEEE Emanuele Viterbo, Fellow,

More information

QUANTILE ESTIMATION IN SUCCESSIVE SAMPLING

QUANTILE ESTIMATION IN SUCCESSIVE SAMPLING Jornal of the Korean Statistical Society 2007, 36: 4, pp 543 556 QUANTILE ESTIMATION IN SUCCESSIVE SAMPLING Hosila P. Singh 1, Ritesh Tailor 2, Sarjinder Singh 3 and Jong-Min Kim 4 Abstract In sccessive

More information

Lecture Notes: Finite Element Analysis, J.E. Akin, Rice University

Lecture Notes: Finite Element Analysis, J.E. Akin, Rice University 9. TRUSS ANALYSIS... 1 9.1 PLANAR TRUSS... 1 9. SPACE TRUSS... 11 9.3 SUMMARY... 1 9.4 EXERCISES... 15 9. Trss analysis 9.1 Planar trss: The differential eqation for the eqilibrim of an elastic bar (above)

More information

PROBABILISTIC APPROACHES TO STABILITY AND DEFORMATION PROBLEMS IN BRACED EXCAVATION

PROBABILISTIC APPROACHES TO STABILITY AND DEFORMATION PROBLEMS IN BRACED EXCAVATION Clemson Uniersity TigerPrints All Dissertations Dissertations 12-2011 PROBABILISTIC APPROACHES TO STABILITY AND DEFORMATION PROBLEMS IN BRACED EXCAVATION Zhe Lo Clemson Uniersity, jerry8256@gmail.com Follow

More information

MIMO Multiple Access Channel with an Arbitrarily Varying Eavesdropper

MIMO Multiple Access Channel with an Arbitrarily Varying Eavesdropper MIMO Multiple Access Channel with an Arbitrarily Varying Eavesdropper Xiang He, Ashish Khisti, Aylin Yener Dept. of Electrical and Computer Engineering, University of Toronto, Toronto, ON, M5S 3G4, Canada

More information

Characterizations of probability distributions via bivariate regression of record values

Characterizations of probability distributions via bivariate regression of record values Metrika (2008) 68:51 64 DOI 10.1007/s00184-007-0142-7 Characterizations of probability distribtions via bivariate regression of record vales George P. Yanev M. Ahsanllah M. I. Beg Received: 4 October 2006

More information

Exploiting Partial Channel State Information for Secrecy over Wireless Channels

Exploiting Partial Channel State Information for Secrecy over Wireless Channels Exploiting Partial Channel State Information for Secrecy over Wireless Channels Matthieu R. Bloch and J. Nicholas Laneman Abstract In this paper, we investigate the effect of partial channel state information

More information

Section 7.4: Integration of Rational Functions by Partial Fractions

Section 7.4: Integration of Rational Functions by Partial Fractions Section 7.4: Integration of Rational Fnctions by Partial Fractions This is abot as complicated as it gets. The Method of Partial Fractions Ecept for a few very special cases, crrently we have no way to

More information

Performance analysis of the MAP equalizer within an iterative receiver including a channel estimator

Performance analysis of the MAP equalizer within an iterative receiver including a channel estimator Performance analysis of the MAP eqalizer within an iterative receiver inclding a channel estimator Nora Sellami ISECS Rote Menzel Chaer m 0.5 B.P 868, 308 Sfax, Tnisia Aline Romy IRISA-INRIA Camps de Bealie

More information

Turbulence and boundary layers

Turbulence and boundary layers Trblence and bondary layers Weather and trblence Big whorls hae little whorls which feed on the elocity; and little whorls hae lesser whorls and so on to iscosity Lewis Fry Richardson Momentm eqations

More information

arxiv: v1 [cs.it] 11 Apr 2017

arxiv: v1 [cs.it] 11 Apr 2017 Noname manuscript No. (will be inserted by the editor) Enhancement of Physical Layer Security Using Destination Artificial Noise Based on Outage Probability Ali Rahmanpour Vahid T. Vakili S. Mohammad Razavizadeh

More information

Conditions for Approaching the Origin without Intersecting the x-axis in the Liénard Plane

Conditions for Approaching the Origin without Intersecting the x-axis in the Liénard Plane Filomat 3:2 (27), 376 377 https://doi.org/.2298/fil7276a Pblished by Faclty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Conditions for Approaching

More information