Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels

Size: px
Start display at page:

Download "Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels"

Transcription

1 This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings Ipact of Iperfect Channel State Inforation on ARQ Schees over Rayleigh Fading Channels Le Cao, Pooi Yuen Ka and Meixia Tao, Dept. of Electrical & Coputer Engineering, National University of Singapore, Singapore 7576 Dept. of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China 4 Eails: caole@nus.edu.sg; elekapy@nus.edu.sg; xtao@ieee.org Abstract With iperfect channel state inforation (CSI) acquired by channel estiation at the receiver, the perforances of autoatic-repeat-request (ARQ) systes are evaluated as a function of the accuracy of channel estiation. A link between network-layer perforances and physical-layer paraeters is therefore established. We study in particular the goodput and the accepted packet error rate as a function of the channel estiation ean square error (MSE) and the factors which affect the MSE. The results enable us to analyze the optiu allocation of energy for data transission and energy for pilot channel estiation so as to axiize the goodput. I. INTRODUCTION Forward error correction (FEC) together with autoaticrepeat-request (ARQ) for retransission is coonly used to ensure the integrity of data transission. This is especially iportant for wireless counication where a deep fade in the channel can cause a oentary burst of errors in reception. Thus, uch work has been done on the perforance of FEC- ARQ schees over fading channels [] [9]. However, all these works, by and large, assue an AWGN channel [], [] or a fading channel with perfect channel state inforation (CSI) at the receiver [3] [9]. In practice, the CSI available at the receiver is acquired via channel estiation. The accuracy of channel estiation is liited by the aount of signal energy devoted to channel estiation, the channel noise and the teporal variations in the channel fading process. This eans that in practice the receiver CSI is usually iperfect, and it is iportant to be able to assess the ipact of the channel estiation error on the perforance of an FEC-ARQ schee. In this paper, we will deonstrate that the accuracy of the receiver CSI plays a crucial role in deterining the perforance of an FEC-ARQ syste. The perforance etrics we consider here are throughput/goodput and accepted packet error rate (APER). The accuracy of the receiver CSI is easured by the ean square error (MSE) of the channel estiates. The precise dependence of goodput and APER on the MSE is quantified. The results enable us to show in particular that when the MSE of channel estiation is above a certain critical value, the goodput drops very rapidly while the APER increases very fast. Below this critical value, the goodput increases very slowly and the APER also decreases ore gently. These results underscore the iportance of the The support of Singapore MoE AcRF Tier Grant T6B is acknowledged. MSs a perforance paraeter, and leads to the following very iportant syste perforance optiization proble. We assue that each packet is transitted with a certain fixed aount of total energy. Using a pilot-sybol-assisted channel estiation schee, part of this total energy is assigned to pilot sybols for channel estiation while the reainder is used for data transission. The question then is: what is the optiu fraction of the total energy that should be devoted to the pilot sybols for channel estiation? In this paper, we focus on establishing a link between network-layer perforances and physical-layer paraeters rather than analyzing the perforances of different ARQ schees. For the sake of siplicity, the selective repeat (SR)-ARQ syste is considered over block Rayleigh fading channels. The iperfect CSI is acquired via iniu ean square error (MMSE) channel estiation by aking use of pilot sybols. Two syste paraeters: APER P nd goodput η g [3] respectively are investigated. An upper bound on P E and a lower bound on η g are obtained in closed-for which is a function of the MSE of channel estiation. Furtherore, the aount of total power used for channel estiation is obtained, which can axiize the goodput of the syste. II. SYSTEM DESCRIPTION When inforation is transitted using an ARQ schee, each inforation strea with bits is sent to an error detection encoder. After passing through a binary (n, ) systeatic block encoder and being prefixed by N H pilot bits, a packet of bits is produced. Each packet coprises data bits for inforation transission, (n ) parity-check bits for error detection and N H pilot bits for channel estiation. All the bits of each packet are assued to be transitted by binary phase shift keying (BPSK) odulation. If buffering at both the transitter and the receiver is allowed, an SR-ARQ protocol can be ipleented. The transitter sends a continuous strea of packets. For each received packet, the channel gain is estiated using the pilot sybols. The received signals are then deodulated with the estiated channel gain and checked by the error detection code. When the receiver detects an error in a received packet, a retransission request for that packet is sent back to the transitter. The feedback channel is assued to be error-free. In this case the transitter, after a round-trip delay, responds to a retransission request by resending the requested packet /9/$5. 9 IEEE

2 This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings It then returns to the point at which it previously stopped and resues transission of new packets. The round-trip delay is assued to be larger than the coherence tie of the channel. Hence, the block fading gain experienced by the retransitted packet is independent of the gains experienced in previous transission(s) of the sae packet, and they are identically distributed. The block fading channel is assued to be constant over the duration of a packet. The channel gain h is a coplex Gaussian rando variable where R{h} and I{h} are independently and identically distributed (i.i.d) real Gaussian rando variables with eans zero and variances σ /. The received signal over the kth bit interval, is r p [k] = E p p [k]h + N[k], k =,,N H, () r s [k] = E s s [k]h + N[k], k = N H +,,N H + n, where E p and E s are the energy per pilot sybol and the energy per data sybol, respectively, p [k] and s [k] are the transitted pilot and data sybols, respectively. Ter N[k] is the zero-ean coplex AWGN with power spectral density N.TheN H pilot sybols in each packet are used in a Wiener filter for generating the MMSE estiate ĥ of h. Since the channel is coplex Gaussian, the MMSE estiate ĥ is given by [, eq.(.)] ĥ = N H i= w[i]r p [i], () where w[i] = σ E p (N H σ E p + N ) is the ith filter coefficient and is the sae for all i, since the channel gain h is constant. The channel estiation MSE is [, eq.(.49)] [ E h ĥ ] = V σ =. (3) σ +N E p H N The estiate ĥ is a coplex Gaussian rando variable with ean zero and variance σ V [, eq.(.8)]. III. ACCEPTED PACKET ERROR RATE AND GOODPUT ANALYSIS There are two basic paraeters fro which we can evaluate the perforance of an ARQ protocol: reliability and throughput. The throughput follows fro [, eq.(5-8)] [5, eq.(7)] as η = ( P d ), (4) where P d is the probability of detected error or the probability of retransission. The rate of the error detecting code is R = /n. The effective rate of each packet is defined as R e = /( ) which takes account of the redundancy introduced by the error detecting code and the pilot sybols used for channel estiation. The probability P d can be obtained by [, (Exaple5-)]. P d = P e P ue, (5) where P e is the probability that a received packet contains one or ore bit errors, and P ue represents the probability of the received packet containing an undetectable error pattern. The probability P e depends on the channel error statistics whereas the probabilities P d and P ue depend on both the channel error statistics and the choice of the (n, ) error detecting code. We first evaluate the probability P e. Based on the optial channel estiation receiver structure obtained in [, eq.(7)], the conditional bit error probability conditioned on the MMSE estiate of channel gain ĥ, is given by [, Appendix III] p = erfc E s ĥ E s V. (6) + N The energy per inforation bit at the input of the error detection encoder is Eb B = E s /R. Conditioned on knowing the estiated channel gain ĥ, the channel is eoryless since the AWGN is independent fro sybol to sybol. Hence, the conditional probability that a received packet contains at least one error bit, can be written as P e = ( p) n. (7) By averaging (7) over the Gaussian rando variable ĥ, the packet error probability P e can be obtained as P e = ( ( p) n ) l= σ V e ĥ /(σ V ) d ĥ. (8) In Appendix I, we use the Chernoff bound to show that P e is tightly upper-bounded by P e (b +(j +)c), (9) j= where, b = σ V, c = E s E s V. () + N Next, we evaluate the probability of undetectable error P ue. For (n, ) linear codes, except for soe short linear codes, the weight distributions for any linear codes are still unknown. Consequently, it is considerably difficult to copute their P ue, but it is fairly easy to derive an upper bound for the enseble of all (n, ) linear codes. Conditioned on knowing the estiated channel gain ĥ, the upper bound on the undetectable error probability can be evaluated by [, eq.(3.4)] P ue (n ) [ ( p) n ]. () Taking the ean of () over ĥ, the undetectable error probability is upper-bounded as P ue (n ) [ ( p) n ] σ V e ĥ /(σ V ) d ĥ. () The last integral can be evaluated like that in (8), giving P ue (n ). (b +(j +)c) l= j= (3)

3 This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings The ratio between P ue and P e can then be upper bounded by the ratio of () to (8): P ue P e (n ). (4) We thus have P ue << P e, and therefore P d P e fro (5) when the nuber of parity-check bits n is larger than. The throughput is then lower bounded by η η L = ( P e ). (5) One can only evaluate a lower bound to right-hand side of (5) by using the upper bound on P e in (9). Another useful syste paraeter, the APER, which shows the reliability of the ARQ syste, is given by [, eq.(5-)] P E = P ue. (6) P d Using P d P e and substituting (3) and (9) into (6), P E is upper-bounded by P E (n ) ( Z), (7) Z where, (b +(j +)c). (8) l= j= The throughput is eaningful only when considered in conjunction with the reliability. Therefore, the goodput η g is defined as the ratio of the expected nuber of inforation bits correctly received per unit of tie to the total nuber of bits that can be transitted per unit of tie [3]. The goodput, which shows the proportion of the throughput consisting of correct packets, can be expressed as η g =( P E )η. (9) By substituting (6) and (4) into (9), the goodput can be obtained as η g = ( P e ). () The goodput can be considered as a lower bound on the throughput, since the η g in () is the sae as the η L in (5). Substituting (9) into (), we obtain the lower bound on η g as η g (b +(j +)c). () l= j= IV. POWER ALLOCATION BETWEEN PILOT AND DATA BITS Each packet is sent with a fixed total energy E T. When ore energy is devoted to channel estiation, the estiates of channel gains are ore accurate, leading to a saller error probability. However, this reduces the energy available for data transission and leads to a higher error probability. For this reason, there ust exist an optiu fraction ε of the total energy E T that should be devoted to channel estiation so as to axiize the lower bound on the goodput η g in (). All signalling essages are assued to be significantly shorter than the user data packets, and therefore transitted with negligible overall energy consuption. For a given total packet energy E T, the aount of total energy assigned to pilot sybols is εe T = N H E p while the reainder of total energy devoted to data transission equals ( ε)e T = ne s.we assue N H to be fixed for each packet. Thus an optiu ε will lead to an optiu E p and siilarly an optiu E s. Since N H is fixed, () shows that axiizing the goodput η g aounts to iniizing the packet error rate P e.usingthe lower bound (), the axiization proble now coes to ( c ) ε = arg ax ε f = b l= j= where b and c given in () can be rewritten as and c = b = σ Nσ N +εe T σ = +εγ εσ γ (b +(j +)c), () (3) ( + εγ)( ε)e T ( ε)e T σ + n(n + εe T σ ). (4) Here, γ = E T σ /N is defined as the total transit signal-tonoise ratio (SNR). The objective function f ( c b) is a onotonically increasing function of the variable c/b. Therefore, the optiization proble can be reduced to { c } { ε ε( ε)γ } = arg ax = arg ax. ε b ε γ( ε)+n( + εγ) (5) Setting the derivative of c/b with respective to ε equal to zero, and solving the resulting quadratic equation, we obtain the optial ε as ε = n + γ n + nγ + γ n + γn. (6) γ nγ The optial ε, which is in the range [, ], satisfies an equality shown in the following proposition. The proof is given in Appendix II. Proposition 4.: For a given n, the optial value of ε satisfies the following inequality for any γ. n n ε.5 (7) This proposition indicates that the optiu aount of energy devoted to channel estiation is always less than half of the total energy. On the other hand, at least a fraction of total energy (i.e. n n E T ) is necessary to be devoted to channel estiation. A sall aount of energy is assigned to channel estiation when a long code (i.e. large n )isused.thisis because the left-hand side of (7) can be reduced to / n when n is large.

4 This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings 5 R=.9 R=.88 R=.84 5 R=.9 R=.88 R=.84 Lower Bound on Goodput η g R=.9 R=.88 R=.84 Lower Bound on Goodput η g /N =3 db /N =5 db R=.9 R=.88 R=.84 /N =5 db Noralized MSE (V /σ ) 5 3 Average SNR per Bit /N 4 Noralized MSE (V /σ ) Fig.. The APER versus the noralized MSnd /N. Fig.. The goodput versus the noralized MSnd the APER. V. NUMERICAL RESULTS Since the bounds on goodput and APER only depend on the values of n and and they are not influenced by specific code structures, different values of n and are chosen to deonstrate the perforances. The fixed total energy E T for each packet is ( + N H ), where represents the average energy per bit. The noralized channel estiation MSE V /σ depends on the energy ε E T devoted to pilot sybols rather than the value of N H. Without loss of generality, the nuber of pilot sybols is assued to be N H =5. In Fig. and Fig., the perforance bounds are plotted with the nuber of inforation bits = and with an equal power allocation E p = E B b = (i.e. ε = N H /(n + N H )). Fig. indicates that there exists a critical value for both V /σ and average SNR per bit /N that separates two different trends in the APER curves. In particular, when V /σ is above a critical value of around,theaper deteriorates very fast. Below this critical value, the APER decreases ore gently. The corresponding critical value of SNR /N is around db. Additionally, it can be seen that in order to achieve a certain APER requireent, greater channel estiation accuracy or higher /N is needed for a code with fewer parity-check bits. Fig. shows how the paraeter V /σ and the APER affect the goodput perforance. The values of noralized MSbove a critical value of around degrade the goodput perforance very rapidly. The goodput can be iproved by ore accurate channel estiation. However, decreasing the noralized MSE below a value of about 3 leads to diinishing increents in the goodput. Furtherore, in order to achieve a certain goodput requireent, greater channel estiation accuracy is needed for a code with ore parity-check bits. This is because using ore accurate channel estiation copensates for the higher packet error rate induced by a longer packet. The goodput versus the APER in Fig. shows that, for a lower-rate code, a saller APER is required to achieve desired goodput perforance. For afixedsnr /N, higher goodput is obtained by using a higher-rate code but at the expense of worse APER. The above discussion of channel estiation accuracy leads to the consideration of optiu power allocation between channel estiation and data transission to achieve the axiu goodput. The power allocation and the goodput iproveent achieved are shown in Fig. 3 and Fig. 4, respectively. The curves in Fig. 3 indicate that ε is a decreasing function of the total transit SNR γ but it converges to n n and.5 in the high and low SNR regions, respectively. For different codes, an iproveent of about.5 db to db can be observed in Fig. 4 for a given goodput. Less iproveent is achieved when a longer code is used. For a code with = and R =.84, a.5 db iproveent is obtained. VI. CONCLUSION With iperfect CSI, we have studied the effect of channel estiation error on the perforance of an SR-ARQ syste over block Rayleigh fading channels. Closed-for bounds on APER and goodput have quantified the perforance iproveent due to ore accurate CSI. A power allocation between pilot bits and inforation bits has been obtained for achieving axiu goodput. The percentage ε of total power assigned to pilot bits is a decreasing function of total transit SNR γ, but converges to.5 and n n in the low and high SNR regions, respectively. For the sake of siplicity, only the SR- ARQ schee without channel coding is considered as an exaple to deonstrate the effects of iperfect CSI. In our future work, ore advanced channel coding and ARQ schees will be considered to study the effects of iperfect CSI. APPENDIX I By using the Chernoff bound: erfc(x) <e x, an upper bound can be obtained as ( P e ) n e c ĥ e b ĥ d(b ĥ )= Z.

5 This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings R=.83, = R=.9, = R=.5, =5. R=.84, = Average SNR per Bit /N Average SNR per Bit /N ε * ε * Lower Bound on Goodput Fig. 3. The value of ε versus average SNR per bit /N.9 ε=n.8 H /(n+n H ) ε=ε *.7 R=.9, =.6 R=.84, =.5.4 R=.83, =5.3 R=.5, =5.. Note that when l =,ter l j= APPENDIX II (n j)c (b+(j+)c) is defined to be. The optial value ε is a onotonically decreasing function of γ, which can be shown as follows. By changing to the variable x = γ n, (6) becoes ε = +x +x + nx + nx. (3) x nx By taking the first derivative of ε with respective to x and siplifying, the derivative can be arranged to be dε dx ( (n ) +x + nx + nx (nx + x +) ) = +x + nx + nx (x nx). By applying the inequality of arithetic and geoetric eans, the inequality dε /dx is true because of the relationship +x + nx + nx = ( + x)(nx +) +nx + x. Using the onotonically decreasing property of ε, the upper and lower liits of ε can be seen to be li x ε (x) ε li ε (x). (3) x The lower liit can be shown to be +x x li + x + nx + n = n x n n. By applying L Hospital rule, the upper liit is obtained as.5( + n +nx)( + nx + nx + x) li x n =.5 Fig Average SNR per Bit /N The lower bound on the goodput achieved by different values of ε Using integration by parts with u =( ) n and dv = e c ĥ de b ĥ, [uv vdu] can be expressed as ( ) n + nc ( e c ĥ ) n e ĥ (b+c) d ĥ (8) Continuing the integration by parts with u =( e c ĥ ) n and dv = e ĥ (b+c) d ĥ, and perforing the siilar process till the last integral, ter Z coes to ) n + nc ( ) n nc(n )c + ( + Hence, we can get ( ) n (b + c) (b + c)(b +c) nc(n )c c (b + c)(b +c) (b + nc). (9) l= j= (b +(j +)c). (3) REFERENCES [] S. B. Wicker, Error Control Syste for Digital Counication and Storage, st ed. Upper Saddle River,New Jersey: Prentice-Hall, 995. [] S. Lin and D. J. Costello, Error control coding. Englewood Cliffs, NJ: Prentice-Hall, 4. [3] D. Qiao, S. Choi, and K. G. Shin, Goodput Analysis and Link Adaptation for IEEE 8.a Wireless LANs, IEEE Tansaction on Mobile Coputing, vol.,. [4] J. Yun and M. Kavehrad, Markov Error structure for Throughput Analysis of Adaptive Modulation Systes Cobined with ARQ over Correlated Fading Channels, IEEE Transaction on Vehicular Technology, vol. 54, 5. [5] Y. Zhou and J. Wang, Optiu subpacket transission for hybrid ARQ systes, IEEE Transaction on Counications, May 6. [6] J.-F. T. Cheng, Coding Perforance of Hybrid ARQ Schees, IEEE Transactions on Counications, vol. 54, no. 6, 6. [7] H.-C. Yang and S. Sasankan, Analysis of Channel-Adaptive Packet Transission Over Fading Channels With Transit Buffer Manageent, IEEE Transactions on Vehicular Technology, vol. 57, no., 8. [8] A. Steiner and S. S. (Shitz), Multi-Layer Broadcasting Hybrid-ARQ Strategies for Block Fading Channels, IEEE Transactions on Wireless Counications, vol. 7, no. 7, 8. [9] C. Pientel and R. L. Siqueira, Analysis of the Go-Back-N Protocol on Finite-State Markov Rician Fading Channels, IEEE Transactions on Wireless Counications, vol. 57, no. 4, 8. [] S. Haykin, Adaptive Filter Theory, 4th ed. Upper Saddle River,New Jersey: Prentice-Hall,. [] P. Y. Ka, Optial Detection of Digital Data Over the Nonselective Rayleigh Fading Channel with Diversity Reception, IEEE Transactions on Counications, vol. 39, no., pp. 4 9, Feb 99.

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

Rateless Codes for MIMO Channels

Rateless Codes for MIMO Channels Rateless Codes for MIMO Channels Marya Modir Shanechi Dept EECS, MIT Cabridge, MA Eail: shanechi@itedu Uri Erez Tel Aviv University Raat Aviv, Israel Eail: uri@engtauacil Gregory W Wornell Dept EECS, MIT

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

Secret-Key Sharing Based on Layered Broadcast Coding over Fading Channels

Secret-Key Sharing Based on Layered Broadcast Coding over Fading Channels Secret-Key Sharing Based on Layered Broadcast Coding over Fading Channels Xiaojun Tang WINLAB, Rutgers University Ruoheng Liu Princeton University Predrag Spasojević WINLAB, Rutgers University H. Vincent

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks 1 Optial Resource Allocation in Multicast Device-to-Device Counications Underlaying LTE Networks Hadi Meshgi 1, Dongei Zhao 1 and Rong Zheng 2 1 Departent of Electrical and Coputer Engineering, McMaster

More information

Error Exponents in Asynchronous Communication

Error Exponents in Asynchronous Communication IEEE International Syposiu on Inforation Theory Proceedings Error Exponents in Asynchronous Counication Da Wang EECS Dept., MIT Cabridge, MA, USA Eail: dawang@it.edu Venkat Chandar Lincoln Laboratory,

More information

Energy Efficient Predictive Resource Allocation for VoD and Real-time Services

Energy Efficient Predictive Resource Allocation for VoD and Real-time Services Energy Efficient Predictive Resource Allocation for VoD and Real-tie Services Changyang She and Chenyang Yang 1 arxiv:1707.01673v1 [cs.it] 6 Jul 2017 Abstract This paper studies how to exploit the predicted

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with

More information

Finite-State Markov Modeling of Flat Fading Channels

Finite-State Markov Modeling of Flat Fading Channels International Telecounications Syposiu ITS, Natal, Brazil Finite-State Markov Modeling of Flat Fading Channels Cecilio Pientel, Tiago Falk and Luciano Lisbôa Counications Research Group - CODEC Departent

More information

Warning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network

Warning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network 565 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 07 Guest Editors: Zhuo Yang, Junie Ba, Jing Pan Copyright 07, AIDIC Servizi S.r.l. ISBN 978-88-95608-49-5; ISSN 83-96 The Italian Association

More information

Power-Controlled Feedback and Training for Two-way MIMO Channels

Power-Controlled Feedback and Training for Two-way MIMO Channels 1 Power-Controlled Feedback and Training for Two-way MIMO Channels Vaneet Aggarwal, and Ashutosh Sabharwal, Senior Meber, IEEE arxiv:0901188v3 [csit] 9 Jan 010 Abstract Most counication systes use soe

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information

Optimal Jamming Over Additive Noise: Vector Source-Channel Case

Optimal Jamming Over Additive Noise: Vector Source-Channel Case Fifty-first Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 2-3, 2013 Optial Jaing Over Additive Noise: Vector Source-Channel Case Erah Akyol and Kenneth Rose Abstract This paper

More information

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE Proceeding of the ASME 9 International Manufacturing Science and Engineering Conference MSEC9 October 4-7, 9, West Lafayette, Indiana, USA MSEC9-8466 MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL

More information

2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2 IEEE. Personal use of this aterial is peritted. Perission fro IEEE ust be obtained for all other uses, in any current or future edia, including reprinting/republishing this aterial for advertising or

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models 2014 IEEE International Syposiu on Inforation Theory Copression and Predictive Distributions for Large Alphabet i.i.d and Markov odels Xiao Yang Departent of Statistics Yale University New Haven, CT, 06511

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

On the Design of MIMO-NOMA Downlink and Uplink Transmission

On the Design of MIMO-NOMA Downlink and Uplink Transmission On the Design of MIMO-NOMA Downlink and Uplink Transission Zhiguo Ding, Meber, IEEE, Robert Schober, Fellow, IEEE, and H. Vincent Poor, Fellow, IEEE Abstract In this paper, a novel MIMO-NOMA fraework for

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

System Performance of Interference Alignment under TDD Mode with Limited Backhaul Capacity

System Performance of Interference Alignment under TDD Mode with Limited Backhaul Capacity Syste Perforance of Interference Alignent under TDD Mode with Liited Bachaul Capacity Matha Deghel, Mohaad Assaad and Mérouane Debbah Departent of Telecounications SUPELEC, Gif-sur-Yvette, France Matheatical

More information

Fundamentals of Image Compression

Fundamentals of Image Compression Fundaentals of Iage Copression Iage Copression reduce the size of iage data file while retaining necessary inforation Original uncopressed Iage Copression (encoding) 01101 Decopression (decoding) Copressed

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

Low-complexity, Low-memory EMS algorithm for non-binary LDPC codes

Low-complexity, Low-memory EMS algorithm for non-binary LDPC codes Low-coplexity, Low-eory EMS algorith for non-binary LDPC codes Adrian Voicila,David Declercq, François Verdier ETIS ENSEA/CP/CNRS MR-85 954 Cergy-Pontoise, (France) Marc Fossorier Dept. Electrical Engineering

More information

Sparse beamforming in peer-to-peer relay networks Yunshan Hou a, Zhijuan Qi b, Jianhua Chenc

Sparse beamforming in peer-to-peer relay networks Yunshan Hou a, Zhijuan Qi b, Jianhua Chenc 3rd International Conference on Machinery, Materials and Inforation echnology Applications (ICMMIA 015) Sparse beaforing in peer-to-peer relay networs Yunshan ou a, Zhijuan Qi b, Jianhua Chenc College

More information

4920 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 12, DECEMBER 2015

4920 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 12, DECEMBER 2015 4920 IEEE TRASACTIOS O COMMUICATIOS, VOL. 63, O. 12, DECEMBER 2015 Energy Efficient Coordinated Beaforing for Multicell Syste: Duality-Based Algorith Design and Massive MIMO Transition Shiwen He, Meber,

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

4196 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 10, OCTOBER 2016

4196 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 10, OCTOBER 2016 4196 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 64, NO. 10, OCTOBER 2016 Linear Precoding ain for Large MIMO Configurations With QAM and Reduced Coplexity Thoas Ketseoglou, Senior Meber, IEEE, and Ender

More information

Content Caching and Delivery in Wireless Radio Access Networks

Content Caching and Delivery in Wireless Radio Access Networks Content Caching and Delivery in Wireless Radio Access Networks Meixia Tao, Deniz Gündüz, Fan Xu, and Joan S. Pujol Roig Abstract arxiv:904.07599v [cs.it] 6 Apr 209 Today s obile data traffic is doinated

More information

When Short Runs Beat Long Runs

When Short Runs Beat Long Runs When Short Runs Beat Long Runs Sean Luke George Mason University http://www.cs.gu.edu/ sean/ Abstract What will yield the best results: doing one run n generations long or doing runs n/ generations long

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Device-to-Device Collaboration through Distributed Storage

Device-to-Device Collaboration through Distributed Storage Device-to-Device Collaboration through Distributed Storage Negin Golrezaei, Student Meber, IEEE, Alexandros G Diakis, Meber, IEEE, Andreas F Molisch, Fellow, IEEE Dept of Electrical Eng University of Southern

More information

Outline. Digital Communications. Lecture 12 Performance over Fading Channels and Diversity Techniques. Flat-Flat Fading. Intuition

Outline. Digital Communications. Lecture 12 Performance over Fading Channels and Diversity Techniques. Flat-Flat Fading. Intuition Digital Counications Lecture 2 Perforance over Fading Channels and Diversity Techniques Pierluigi SALVO ROSSI Outline Noncoherent/Coherent Detection 2 Channel Estiation Departent of Industrial and Inforation

More information

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

Witsenhausen s counterexample as Assisted Interference Suppression

Witsenhausen s counterexample as Assisted Interference Suppression Witsenhausen s counterexaple as Assisted Interference Suppression Pulkit Grover and Anant Sahai Wireless Foundations, epartent of EECS University of California at Berkeley, CA-947, USA {pulkit, sahai}@eecs.berkeley.edu

More information

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat

More information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub

More information

Distributed Subgradient Methods for Multi-agent Optimization

Distributed Subgradient Methods for Multi-agent Optimization 1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions

More information

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lesson 1 4 October 2017 Outline Learning and Evaluation for Pattern Recognition Notation...2 1. The Pattern Recognition

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER

ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER IEPC 003-0034 ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER A. Bober, M. Guelan Asher Space Research Institute, Technion-Israel Institute of Technology, 3000 Haifa, Israel

More information

Estimation of ADC Nonlinearities from the Measurement in Input Voltage Intervals

Estimation of ADC Nonlinearities from the Measurement in Input Voltage Intervals Estiation of ADC Nonlinearities fro the Measureent in Input Voltage Intervals M. Godla, L. Michaeli, 3 J. Šaliga, 4 R. Palenčár,,3 Deptartent of Electronics and Multiedia Counications, FEI TU of Košice,

More information

Analyzing Simulation Results

Analyzing Simulation Results Analyzing Siulation Results Dr. John Mellor-Cruey Departent of Coputer Science Rice University johnc@cs.rice.edu COMP 528 Lecture 20 31 March 2005 Topics for Today Model verification Model validation Transient

More information

Uplink Transmission Design with Massive Machine Type Devices in Tactile Internet

Uplink Transmission Design with Massive Machine Type Devices in Tactile Internet Uplink Transission Design wi Massive Machine Type Devices in Tactile Internet Changyang She and Chenyang Yang School of Electronics and Inforation Engineering, Beihang University, Beijing, China Eail:

More information

On Conditions for Linearity of Optimal Estimation

On Conditions for Linearity of Optimal Estimation On Conditions for Linearity of Optial Estiation Erah Akyol, Kuar Viswanatha and Kenneth Rose {eakyol, kuar, rose}@ece.ucsb.edu Departent of Electrical and Coputer Engineering University of California at

More information

Detection and Estimation Theory

Detection and Estimation Theory ESE 54 Detection and Estiation Theory Joseph A. O Sullivan Sauel C. Sachs Professor Electronic Systes and Signals Research Laboratory Electrical and Systes Engineering Washington University 11 Urbauer

More information

On the Analysis of the Quantum-inspired Evolutionary Algorithm with a Single Individual

On the Analysis of the Quantum-inspired Evolutionary Algorithm with a Single Individual 6 IEEE Congress on Evolutionary Coputation Sheraton Vancouver Wall Centre Hotel, Vancouver, BC, Canada July 16-1, 6 On the Analysis of the Quantu-inspired Evolutionary Algorith with a Single Individual

More information

Multi-Scale/Multi-Resolution: Wavelet Transform

Multi-Scale/Multi-Resolution: Wavelet Transform Multi-Scale/Multi-Resolution: Wavelet Transfor Proble with Fourier Fourier analysis -- breaks down a signal into constituent sinusoids of different frequencies. A serious drawback in transforing to the

More information

Topic 5a Introduction to Curve Fitting & Linear Regression

Topic 5a Introduction to Curve Fitting & Linear Regression /7/08 Course Instructor Dr. Rayond C. Rup Oice: A 337 Phone: (95) 747 6958 E ail: rcrup@utep.edu opic 5a Introduction to Curve Fitting & Linear Regression EE 4386/530 Coputational ethods in EE Outline

More information

Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels

Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels ISIT7, Nice, France, June 4 June 9, 7 Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels Ahed A. Farid and Steve Hranilovic Dept. Electrical and Coputer Engineering McMaster

More information

Compressive Sensing Over Networks

Compressive Sensing Over Networks Forty-Eighth Annual Allerton Conference Allerton House, UIUC, Illinois, USA Septeber 29 - October, 200 Copressive Sensing Over Networks Soheil Feizi MIT Eail: sfeizi@it.edu Muriel Médard MIT Eail: edard@it.edu

More information

arxiv: v3 [cs.ds] 22 Mar 2016

arxiv: v3 [cs.ds] 22 Mar 2016 A Shifting Bloo Filter Fraewor for Set Queries arxiv:1510.03019v3 [cs.ds] Mar 01 ABSTRACT Tong Yang Peing University, China yangtongeail@gail.co Yuanun Zhong Nanjing University, China un@sail.nju.edu.cn

More information

Partition-Based Distribution Matching

Partition-Based Distribution Matching MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.erl.co Partition-Based Distribution Matching Fehenberger, T.; Millar, D.S.; Koike-Akino, T.; Kojia, K.; Parsons, K. TR2018-023 January 2018 Abstract

More information

Machine Learning Basics: Estimators, Bias and Variance

Machine Learning Basics: Estimators, Bias and Variance Machine Learning Basics: Estiators, Bias and Variance Sargur N. srihari@cedar.buffalo.edu This is part of lecture slides on Deep Learning: http://www.cedar.buffalo.edu/~srihari/cse676 1 Topics in Basics

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co

More information

MULTIAGENT Resource Allocation (MARA) is the

MULTIAGENT Resource Allocation (MARA) is the EDIC RESEARCH PROPOSAL 1 Designing Negotiation Protocols for Utility Maxiization in Multiagent Resource Allocation Tri Kurniawan Wijaya LSIR, I&C, EPFL Abstract Resource allocation is one of the ain concerns

More information

General Properties of Radiation Detectors Supplements

General Properties of Radiation Detectors Supplements Phys. 649: Nuclear Techniques Physics Departent Yarouk University Chapter 4: General Properties of Radiation Detectors Suppleents Dr. Nidal M. Ershaidat Overview Phys. 649: Nuclear Techniques Physics Departent

More information

Distributed Lossy Averaging

Distributed Lossy Averaging Distribute Lossy Averaging Han-I Su Departent of Electrical Engineering Stanfor University Stanfor, CA 94305, USA Eail: hanisu@stanforeu Abbas El Gaal Departent of Electrical Engineering Stanfor University

More information

Controlled Flooding Search with Delay Constraints

Controlled Flooding Search with Delay Constraints Controlled Flooding Search with Delay Constraints Nicholas B. Chang and Mingyan Liu Departent of Electrical Engineering and Coputer Science University of Michigan, Ann Arbor, MI 4809-222 Eail: {changn,ingyan}@eecs.uich.edu

More information

Adaptation to the Primary User CSI in Cognitive Radio Sensing and Access

Adaptation to the Primary User CSI in Cognitive Radio Sensing and Access Adaptation to e Priary User CSI in Cognitive Radio Sensing and Access Yuan Lu, Alexandra Duel-Hallen Departent of Electrical and Coputer Engineering Nor Carolina State University Raleigh, NC, 2766 {ylu8,

More information

PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE

PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE 1 Nicola Neretti, 1 Nathan Intrator and 1,2 Leon N Cooper 1 Institute for Brain and Neural Systes, Brown University, Providence RI 02912.

More information

Achievable Rates for Shaped Bit-Metric Decoding

Achievable Rates for Shaped Bit-Metric Decoding Achievable Rates for Shaped Bit-Metric Decoding Georg Böcherer, Meber, IEEE Abstract arxiv:40.8075v6 [cs.it] 8 May 06 A new achievable rate for bit-etric decoding (BMD) is derived using rando coding arguents.

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

Robust Scheduling and Resource Allocation in the Downlink of Spatially Correlated MIMO-OFDMA Wireless Systems With Imperfect CSIT

Robust Scheduling and Resource Allocation in the Downlink of Spatially Correlated MIMO-OFDMA Wireless Systems With Imperfect CSIT Edinburgh esearch Explorer obust Scheduling and esource Allocation in the Downlink of Spatially Correlated MIMO-OFDMA Wireless Systes With Iperfect CSIT Citation for published version: Feenias, G, iera-palou,

More information

ECS455: Chapter 5 OFDM

ECS455: Chapter 5 OFDM ECS455: Chapter 5 OFDM 5.4 Cyclic Prefix (CP) 1 Dr.Prapun Suksopong prapun.co/ecs455 Office Hours: BKD 3601-7 Tuesday 9:30-10:30 Friday 14:00-16:00 Three steps towards odern OFDM 1. Mitigate Multipath

More information

Distributed Inference with M-ary Quantized Data in the Presence of Byzantine Attacks

Distributed Inference with M-ary Quantized Data in the Presence of Byzantine Attacks Distributed Inference with -ary Quantized Data in the Presence of Byzantine Attacks V Srira Siddhardh Sid) Nadendla, Student eber, IEEE, Yunghsiang S Han, Fellow, IEEE, and Praod K Varshney, Fellow, IEEE

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

Antenna Saturation Effects on MIMO Capacity

Antenna Saturation Effects on MIMO Capacity Antenna Saturation Effects on MIMO Capacity T S Pollock, T D Abhayapala, and R A Kennedy National ICT Australia Research School of Inforation Sciences and Engineering The Australian National University,

More information

Finite Horizon Throughput Maximization and Sensing Optimization in Wireless Powered Devices over Fading Channels

Finite Horizon Throughput Maximization and Sensing Optimization in Wireless Powered Devices over Fading Channels Finite Horizon Throughput Maxiization and Sensing Optiization in Wireless Powered Devices over Fading Channels Mehdi Salehi Heydar Abad, Ozgur Ercetin arxiv:1804.01834v2 [cs.it] 9 Sep 2018 Abstract Wireless

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES S. E. Ahed, R. J. Tokins and A. I. Volodin Departent of Matheatics and Statistics University of Regina Regina,

More information

Optimal nonlinear Bayesian experimental design: an application to amplitude versus offset experiments

Optimal nonlinear Bayesian experimental design: an application to amplitude versus offset experiments Geophys. J. Int. (23) 155, 411 421 Optial nonlinear Bayesian experiental design: an application to aplitude versus offset experients Jojanneke van den Berg, 1, Andrew Curtis 2,3 and Jeannot Trapert 1 1

More information

Matrix Inversion-Less Signal Detection Using SOR Method for Uplink Large-Scale MIMO Systems

Matrix Inversion-Less Signal Detection Using SOR Method for Uplink Large-Scale MIMO Systems Matrix Inversion-Less Signal Detection Using SOR Method for Uplin Large-Scale MIMO Systes Xinyu Gao, Linglong Dai, Yuting Hu, Zhongxu Wang, and Zhaocheng Wang Tsinghua National Laboratory for Inforation

More information

The accelerated expansion of the universe is explained by quantum field theory.

The accelerated expansion of the universe is explained by quantum field theory. The accelerated expansion of the universe is explained by quantu field theory. Abstract. Forulas describing interactions, in fact, use the liiting speed of inforation transfer, and not the speed of light.

More information

ARTICLE IN PRESS. Murat Hüsnü Sazlı a,,canişık b. Syracuse, NY 13244, USA

ARTICLE IN PRESS. Murat Hüsnü Sazlı a,,canişık b. Syracuse, NY 13244, USA S1051-200406)00002-9/FLA AID:621 Vol ) [+odel] P1 1-7) YDSPR:3SC+ v 153 Prn:13/02/2006; 15:33 ydspr621 by:laurynas p 1 Digital Signal Processing ) wwwelsevierco/locate/dsp Neural network ipleentation of

More information

Randomized Accuracy-Aware Program Transformations For Efficient Approximate Computations

Randomized Accuracy-Aware Program Transformations For Efficient Approximate Computations Randoized Accuracy-Aware Progra Transforations For Efficient Approxiate Coputations Zeyuan Allen Zhu Sasa Misailovic Jonathan A. Kelner Martin Rinard MIT CSAIL zeyuan@csail.it.edu isailo@it.edu kelner@it.edu

More information

Minimum Rates Scheduling for MIMO OFDM Broadcast Channels

Minimum Rates Scheduling for MIMO OFDM Broadcast Channels IEEE Ninth International Syposiu on Spread Spectru Techniques and Applications Miniu Rates Scheduling for MIMO OFDM Broadcast Channels Gerhard Wunder and Thoas Michel Fraunhofer Geran-Sino Mobile Counications

More information

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China 6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith

More information

Distributed Power Control in Full Duplex Wireless Networks

Distributed Power Control in Full Duplex Wireless Networks Distributed Power Control in Full Duplex Wireless Networks Yu Wang and Shiwen Mao Departent of Electrical and Coputer Engineering, Auburn University, Auburn, AL 36849-5201 Eail: yzw0049@tigerail.auburn.edu,

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

2.9 Feedback and Feedforward Control

2.9 Feedback and Feedforward Control 2.9 Feedback and Feedforward Control M. F. HORDESKI (985) B. G. LIPTÁK (995) F. G. SHINSKEY (970, 2005) Feedback control is the action of oving a anipulated variable in response to a deviation or error

More information

Controlled Flooding Search with Delay Constraints

Controlled Flooding Search with Delay Constraints Controlled Flooding Search with Delay Constraints Nicholas B. Chang and Mingyan Liu Departent of Electrical Engineering and Coputer Science University of Michigan, Ann Arbor, MI 48109-2122 Eail: {changn,ingyan}@eecs.uich.edu

More information

Modified Systematic Sampling in the Presence of Linear Trend

Modified Systematic Sampling in the Presence of Linear Trend Modified Systeatic Sapling in the Presence of Linear Trend Zaheen Khan, and Javid Shabbir Keywords: Abstract A new systeatic sapling design called Modified Systeatic Sapling (MSS, proposed by ] is ore

More information

Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition

Upper bound on false alarm rate for landmine detection and classification using syntactic pattern recognition Upper bound on false alar rate for landine detection and classification using syntactic pattern recognition Ahed O. Nasif, Brian L. Mark, Kenneth J. Hintz, and Nathalia Peixoto Dept. of Electrical and

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks

The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks Mingyue Ji, Student Meber, IEEE, Giuseppe Caire, Fellow, IEEE, and Andreas F. Molisch, Fellow, IEEE arxiv:3.637v [cs.it] 8 Jul 05 The

More information

Construction of One-Bit Transmit-Signal Vectors for Downlink MU-MISO Systems with PSK Signaling

Construction of One-Bit Transmit-Signal Vectors for Downlink MU-MISO Systems with PSK Signaling 1 Construction of One-Bit Transit-Signal Vectors for Downlink MU-MISO Systes with PSK Signaling Gyu-Jeong Park and Song-Na Hong Ajou University, Suwon, Korea, eail: {net2616, snhong}@ajou.ac.kr and quantized

More information

Principles of Optimal Control Spring 2008

Principles of Optimal Control Spring 2008 MIT OpenCourseWare http://ocw.it.edu 16.323 Principles of Optial Control Spring 2008 For inforation about citing these aterials or our Ters of Use, visit: http://ocw.it.edu/ters. 16.323 Lecture 10 Singular

More information

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

An Extension to the Tactical Planning Model for a Job Shop: Continuous-Time Control

An Extension to the Tactical Planning Model for a Job Shop: Continuous-Time Control An Extension to the Tactical Planning Model for a Job Shop: Continuous-Tie Control Chee Chong. Teo, Rohit Bhatnagar, and Stephen C. Graves Singapore-MIT Alliance, Nanyang Technological Univ., and Massachusetts

More information