State Amplification and State Masking for the Binary Energy Harvesting Channel

Size: px
Start display at page:

Download "State Amplification and State Masking for the Binary Energy Harvesting Channel"

Transcription

1 State Amplfcaton and State Maskng for the Bnary Energy Harvestng Channel Kaya Tutuncuoglu, Omur Ozel 2, Ayln Yener, and Sennur Ulukus 2 Department of Electrcal Engneerng, The Pennsylvana State Unversty, Unversty Park, PA Department of Electrcal and Computer Engneerng, Unversty of Maryland, College Park, MD Abstract In ths paper, we consder a bnary energy harvestng transmtter that wshes to control the amount of sde nformaton the recever can obtan about ts energy harvests. Specfcally, we study state amplfcaton and state maskng, whch defne the maxmum and mnmum amount of state nformaton conveyed to the recever for a gven message rate, respectvely. For an ndependent and dentcally dstrbuted energy harvestng process, we frst fnd the amplfcaton and maskng regons for a transmtter wthout a battery and a transmtter wth an nfnte battery. Next, we fnd nner bounds for these regons for a unt-szed battery at the transmtter usng two dfferent encodng schemes, usng nstantaneous Shannon strateges and usng a scheme based on the equvalent tmng channel ntroduced n our prevous work. We observe that the former provdes better state amplfcaton, whle the latter provdes better state maskng. I. INTRODUCTION In the energy harvestng channel, the harvested energy s a random process that s revealed to the transmtter causally throughout the transmsson. Snce the transmtted symbols are constraned by the energy avalable at the encoder, the decoder obtans some nformaton about the energy harvestng process n addton to the ntended message. Dependng on the applcaton, t may be desrable to maxmze or mnmze ths sde nformaton about the harvested energy, e.g., t may facltate smart schedulng based on energy harvestng rates, but may also reveal the poston or energy source of a wreless node. These scenaros result n the problems of state amplfcaton [], [2] and state maskng [3], respectvely. The capacty of an energy harvestng channel s determned n prevous work for two extreme cases for the AWGN channel. When the battery-sze s unlmted, [4] shows that the capacty s equal to the capacty of the same system wth an average power constrant equal to the average recharge rate. At the other extreme, when the battery sze s zero, the system becomes a stochastc ampltude-constraned channel and the capacty n ths case s acheved [5] by usng Shannon strateges [6]. The capacty for the case of a fnte-szed battery s open n general. In the specal case of a noseless bnary channel and a unt-szed battery, [7] shows that the channel s equvalent to an addtve geometrc-nose tmng channel, for whch upper bounds and achevable rates usng tmng channel based encodng schemes are proposed. Concurrently, n [8], encodng schemes that utlze Shannon strateges are studed Ths work was supported by NSF Grants CNS /CNS , and CCF /CCF n a more general settng, and the correspondng achevable rates are found, where only the nstantaneous battery states are used to determne channel nput at each channel use. For the channel model n [7], [9] ntroduces a tghter upper bound and a better encodng scheme, outperformng..d. and frst order Markov Shannon strateges that utlze current battery state only. Reference [0] extends the model of [9] to a nosy channel wth arbtrary battery sze, and obtans upper bounds by provdng battery state nformaton to the recever. The fnte-szed battery model s also of nterest n an AWGN channel. In [], an approxmate capacty for ths channel model s found wth a constant gap usng ampltude constraned codebooks. For determnstc energy harvestng n an AWGN channel, [2] evaluates a lower bound on the capacty va the volume of the feasble nput set. The state amplfcaton problem,.e., sendng nformaton about system state along wth the message, s frst studed n []. Ths reference quantfes the sde nformaton revealed to the recever as the mutual nformaton between the output sequence and the state sequence. Ths problem s later consdered n terms of the dstorton n channel state estmaton n [2]. The state maskng counterpart,.e., concealng channel state as much as possble whle sendng a message, s ntroduced n [3] for both causal and non-causal state nformaton at the encoder. In an energy harvestng settng, the state amplfcaton problem s frst studed n [3] for an AWGN channel wth nfnte and no battery at the encoder. In ths paper, we evaluate state amplfcaton and state maskng regons, whch outlne the set of achevable message rates and state revealng rates for a bnary energy harvestng channel. Our goal s to nvestgate the trade-off between the energy arrval nformaton that the recever can extract from the communcaton and the message transmsson rate. We consder bnary energy arrvals as the state of the channel, where each energy unt corresponds to the energy requred to send a through the bnary channel once. We consder the no battery case and the nfnte battery case, for whch the channel capactes are known, and the unt battery case, for whch we derve nner bounds usng the achevable rates n [7], [8]. II. CHANNEL MODEL AND PROBLEM FORMULATION We consder a bnary symmetrc channel (BSC) wth an energy harvestng transmtter, as shown n Fg.. The crossover probablty of the bnary symmetrc channel s denoted by

2 W Fg.. E Encoder X Channel Y Decoder The energy harvestng channel wth battery sze. p e 2. In the th channel use, the encoder harvests an energy of E 0, },.e., harvests a unt of energy or not, and sends a bnary symbol X 0, } through the channel. The energy cost of sendng a s unt, whle sendng a zero does not requre any energy. The energy arrvals E are ndependent and dentcally dstrbuted (..d.) wth the probablty of arrval P r[e = ] = q. E values are revealed to the encoder causally, whle not avalable to the decoder. We consder two cases for the energy storage and consumpton model. If the encoder has no battery, denoted by = 0, then the channel nput s constraned by the energy harvested wthn the same channel use,.e., X E. For > 0, we consder a transmt-frst model. Denotng the state of the battery at the begnnng of the th channel use as B, the encoder frst transmts X B, and then stores the harvested energy E n the battery, provded that the battery capacty permts storage. Hence, the battery state evolves as B + = mnb X + E, }. () In ths work, we are nterested n how much the decoder can learn about the energy arrval process E n. From the decoder s perspectve, there are 2 H(En) possble energy arrval sequences, snce 2 H(En) s the sze of the typcal set for E n. Upon recevng Y n, the decoder can reduce the sze of ths lst to those that are possble gven Y n, whch has a sze of 2 H(En Y n). Hence, the reducton n the entropy of E n for the decoder can be expressed as = n (H(En ) H(E n Y n )) = n I(En ; Y n ). (2) Note that the value of s related strongly to the encodng scheme adopted by the encoder. For example, the encoder can choose to send X = 0 for all, thus achevng no message rate, but obtanng = 0. On the other extreme, the encoder can choose X = E, once agan achevng no message rate, but obtanng = H(E n ). For a non-zero rate, dfferent encodng schemes achevng the same rate may yeld dfferent values for. A. State Amplfcaton Problem In the state amplfcaton problem, the encoder wshes the decoder to obtan as much nformaton as possble about the energy harvestng process E n,.e., maxmze, whle relably conveyng a message wth some rate R. Ths problem s frst consdered n [], where the achevable message rates and state Ŵ amplfcaton rates are shown to satsfy R I(U; Y ), (3) H(S), (4) R + I(X, S; Y ), (5) for a memoryless channel wth state S known causally at the transmtter. Here, U s an auxlary random varable yeldng the jont dstrbuton p(s)p(u)p(x u, s)p(y x, s). B. State Maskng Problem The state maskng problem, studed frst n [3], fnds a lower bound on for any gven message rate R. Hence, t ndcates the mnmum amount of nformaton that must be revealed to the decoder about the state n order to acheve some rate R. The achevable (R, ) regons are obtaned by the unon of the regons R I(U; Y ), (6) I(S; Y U), (7) for causally avalable state at the encoder [3]. Note that (3) and (6) are dentcal, and (7) provdes a lower bound on whle (4) and (5) provde upper bounds. In the remander of ths paper, we consder the state amplfcaton and state maskng problems ndvdually for the cases = 0, =, and =. III. NO BATTERY CASE: = 0 For = 0, the energy avalable at channel use s E, whch s..d., and therefore the state of the channel s memoryless. Hence, the results of [] extend drectly to ths case. Gven the two states, E 0, }, the two nputs X 0, }, and the restrcton X E, there are two feasble mappngs from E to X. We refer to these mappngs as strateges, and denote them as U = (X, X), where X s the channel nput when E = 0 and X s the channel nput when E =. The two feasble strateges are (0, 0) and (0, ), correspondng to always transmttng a zero and attemptng to send a, respectvely. For an encodng strategy wth P r[u = (0, )] = p, the exact (R, ) regon for state amplfcaton s obtaned as R H(pq p e ) ph(q p e ) ( p)h(p e ), (8) H(q), (9) R + H(pq p e ) H(p e ), (0) where H(a) denotes the bnary entropy functon, and p q = p( q) + ( p)q. Next, we utlze the results of [3], and characterze the exact (R, ) regon for state maskng as (8) and ph(q p e ) ph(p e ). () We remark that for a noseless bnary channel,.e., p e = 0, the bounds for n (8)-(0) and () match only at R = H(pq) ph(q), = ph(q). (2)

3 IV. INFINITE BATTERY CASE: = We next consder the nfnte battery case,.e., =. Wth an nfnte battery, [4] showed that a save-and-transmt scheme acheves the AWGN capacty wth average transmt power. Ths scheme frst saves energy for a neglgble duraton of the transmsson, and then encodes as f constraned by an average power constrant only. The save-and-transmt scheme can be extended to the bnary channel, yeldng the capacty H(q p e ) H(p e ), q C BSC = 2, H(p e ), q > 2, (3) wth the channel nput dstrbuton P r[x = ] = mn ( q, 2). Note that ths s also the capacty of a BSC wth an nput constrant E[X] q, as s the case n [3] for the AWGN channel. Wth ths observaton, we present the state amplfcaton regon for ths channel n the followng lemma. Lemma The exact (R, ) regon for the bnary EH channel wth an nfnte-szed battery at the transmtter satsfes R + C BSC, 0 H(q). (4) Proof: We frst show the achevablty of these (R, ) pars. Clearly, the rate R = C BSC s achevable wth the saveand-transmt scheme, whch we assume to yeld = 0. Furthermore, by compressng the E n sequence and sendng t as a part of the message, the encoder can trade any porton of the message rate R wth, provded that ths porton does not exceed H(q) for q 0.5 and for q > 0.5. Due to the causal avalablty of E, ths s performed n a block Markov fashon. For the converse, we wrte I(X n ;Y n ) = I(X n, E n, W ; Y n ) (5) I(E n, W ; Y n ) (6) = I(E n ; Y n ) + H(W ) H(W Y n, E n ) (7) I(E n ; Y n ) + H(W ) H(ɛ) ɛ log(nr) (8) = n + nr H(ɛ) ɛ log(nr) (9) where W s the message and ɛ s the decodng error probablty. Here, (5) follows from the Markov chan (W, E n ) X n Y n, (7) s due to the ndependence of W and E n, and (8) follows from Fano s nequalty. Hence, whenever the decodng error probablty ɛ goes to zero as n, we have + R lm n I(Xn ; Y n ) C BSC, (20) whch concludes the converse. For the maskng problem, as emphaszed n [3], snce (R, ) = (C BSC, 0) s achevable, perfect maskng of the state E n s possble usng the save-and-transmt scheme. Hence, we have 0 as the maskng lower bound. V. UNIT BATTERY CASE: = In precedng sectons, we consdered cases for whch the channel capacty s known. Snce ths s not the case for =, we are not able to determne the entre (R, ) regon. In ths secton, we utlze two encodng schemes, proposed by [8] and [7], to fnd nner bounds on the (R, ) regon for the bnary noseless channel wth p e = 0. Although the channel s noseless, ths s a non-trval model due to ts memory and the state s dependence on the channel nput, for whch the capacty s an open problem. A. Instantaneous Shannon Strateges In [8], the Shannon strateges of [6], whch are capacty achevng for a memoryless channel, are used to fnd achevable rates for the energy harvestng channel. These strateges are mappngs from the current battery state B to the channel nput X. Gven two battery states, B 0, }, two nput symbols X 0, }, and the restrcton X S n each channel use, there are two feasble mappngs from B to X. As n Secton III, we denote these strateges as U (0, 0), (0, )}, where the former gves X = 0 for all B and the latter gves X = 0 for B = 0 and X = for B =. We consder a codebook consstng of strategy codewords U n, generated..d. wth P r[u = (0, )] = p. Upon selectng the codeword correspondng to the message, the encoder chooses X based on U and B n the th channel use. The acheved message rate for ths encodng scheme s gven by R IID = lm n I(U n ; Y n ). (2) To fnd the correspondng for ths encodng scheme, we frst defne the random varable ψ j = 0, E k = 0, k < j, (22), otherwse, whch s an ndcator of whether a unt of energy has arrved or not between the th and jth channel uses. We then defne the set Ψ(u n ) = ψ 2, ψ 3 2,... } as the collecton of mutually exclusve ndcators ψ k+ k, where =, and k, k = 2, 3,... are the channel ndces that satsfy u k = (0, ). In other words, Ψ(u n ) s the set of ndcators that show whether energy s avalable or not for each attempt of sendng a gven the strategy sequence u n. We then wrte H(E n Y n ) H(E n Y n, U n ) = I(E n ; U n Y n ) (23) H(U n Y n ) (24) H(W Y n ) (25) H(ɛ) ɛ log(nr) (26) where ɛ s the probablty of decodng error. Here, (25) s due to u n beng a functon of message w, and (26) s due to Fano s nequalty. Hence, whenever the error probablty ɛ goes to zero as n, we have lm n H(En Y n ) = lm Wth ths observaton, we wrte as lm n H(En Y n, U n ). (27) n I(En ; Y n ) = lm n (H(En ) H(E n Y n, U n )) (28)

4 = lm n (H(En ) H(E n Y n, U n, Ψ(U n ))) (29) = lm = lm n (H(En ) H(E n Ψ(U n ), U n )) (30) n H(Ψ(U n ) U n ) (3) Here, (28) follows from (27), and (29) holds as Ψ(U n ) can be obtaned from Y n and U n. Smlarly, (30) follows snce Y n can be obtaned from U n and Ψ(U n ). Fnally, (3) holds snce H(Ψ(U n ) U n, E n ) = 0, and U n s ndependent of E n. What the seres of equaltes n (28)-(3) mply s that, observng Y n, the decoder learns the ndcators Ψ(U n ) about E n, and nothng more. Note that the ntervals ( k, k+ ) are dsjont, and therefore the elements of the set Ψ(u n ) are ndependent. Snce P r[ψ j = 0] = ( q) j and u are generated..d. wth probablty P r[u = (0, )] = p, (3) can be further smplfed as = lm n ( p(u n ) u n k H ( ( q) δ k) ) (32) where δ k = k+ k denotes the number of channel uses between the kth and k+st u = (0, ) n u n, and s dstrbuted..d. geometrc wth parameter p. As n, due to the law of large numbers, the set Ψ(u n ) has np elements, yeldng = lm n I(En ; Y n ) = p 2 ( p) δ H ( ( q) δ). δ= (33) Lemma 2 For the..d. encodng scheme wth Shannon strateges, the decrease n entropy of E n upon observng Y n,.e.,, s equal to (33) for the noseless channel. B. Tmng-Based Encodng For the bnary noseless channel, [7] ntroduced an alternatve scheme where encodng s performed on an equvalent tmng channel. In the tmng channel, the number of channel uses spent watng for an energy are denoted by Z, and the number of channel uses between the energy arrval and the departure of a are denoted by V. The decoder observes the number of channel uses between consecutve s, gven by T = V + Z. (34) The tmng representaton s depcted n Fg. 2. Note that one use of the tmng channel corresponds to T uses of the bnary channel. Snce energy arrvals are..d., Z values are..d. and geometrc dstrbuted. The encodng scheme of [7] for frame length N uses Shannon strateges U 0,,..., N } to generate an..d. codebook. For codeword U m and causally revealed Z m, the encoder nserts V = (U Z mod N) + (35) to the tmng channel. Recevng T, the decoder can obtan U = T mod N wthout error. Hence, the rate acheved Z T V Z 2 V 2 V 3 T 2 T 3 Fg. 2. Graphcal representaton of the varables n the equvalent tmng channel T n, V n and Z n. Here, crcles represent energy arrvals and trangles represent transmsson of a symbol. wth ths scheme per use of the bnary channel s R (N) A = max p(u) H(U) E[T ]... bts/ch. use, (36) where E[T ] s the average length of each use of the tmng channel. For ths encodng scheme, we next calculate as a functon of the strategy dstrbuton p(u). For a gven output sequence T m = t m, we defne a = j= t j. Then, the th use of the tmng channel les on the a + st to a + t th uses of the bnary channel. For ths nterval, the decoder can nfer the followng: For t N, we have z t from (34). Usng the defnton n (22), ths mples ψa a+t =. Otherwse, for t > N, we have z t N snce v N by defnton. Ths mples that ψa a+t N = 0 and ψ a+t a +t N =. Based on these two cases, we defne the sets Ψ 0 (t m ) = ψa a+t N, (37) t >N Ψ (t m ) = and wrte t N ψ a+t a ( t >N ψ a+t a +t N ), (38) H(E n T m ) = t m p(t m )H(E n T m = t m ) (39) = t m p(t m )H(E n T m = t m, U m = u m, Ψ 0 (t m ) = 0, Ψ (t m ) = ) (40) = t m p(t m )H(E n Ψ 0 (t m ) = 0, Ψ (t m ) = ) (4) where Ψ 0 (t m ) = 0 denotes element-wse equalty for all elements of the set Ψ0 (t m ). Here, (40) holds snce u m can be obtaned from t m, whch also reveals that Ψ 0 (t m ) = 0 and Ψ (t m ) =. Note that (4) s the entropy of E n gven that parts of E n are zero and parts nclude at least one non-zero arrval. Calculatng and averagng over t m, we get n I(En ; Y n ) = H(q) E[T ] E [ δh(q) H(( q) δ ) ( q) δ ], (42) where δ s a random varable denotng the length of ψ terms n Ψ (t m ), and s dstrbuted as k, k < N, w.p. p U (k ) ( ( q) k), δ = N N, w.p. u=0 p U (u)( q) u+. (43)

5 =(/n)i(e n ;Y n ) (State entropy reducton rate) E = max =0 E = wth d Shannon enc. max = wth tmng enc. =(/n)i(e n ;Y n ) (State entropy reducton rate) E = max =0 E = wth d Shannon enc. max = wth tmng enc R (Message rate) R (Message rate) Fg. 3. The maxmum values wth respect to message rate R,.e., state amplfcaton boundares, for q = 0.5 and p e = 0. Fg. 4. The mnmum values wth respect to message rate R,.e., state maskng boundares, for q = 0.5 and p e = 0. Lemma 3 For the encodng scheme n [7], the decrease n entropy of E n upon observng Y n,.e.,, for a specfc auxlary dstrbuton p U (u) s equal to (42). Fnally, we obtan (R, ) pars for ths encodng scheme by exhaustvely searchng p U (u) and usng (36) and (42). VI. NUMERICAL RESULTS For comparson, we evaluate the state amplfcaton and state maskng regons for the = 0 and = cases, and the maxmum and mnmum achevable values of wth respect to some message rate R for the = case, n a noseless channel wth q = 0.5. The state amplfcaton results are plotted n Fg. 3, and the state maskng results are plotted n Fg. 4. In Fg. 3, we observe that the nstantaneous Shannon encodng strategy n Secton V-A performs state amplfcaton almost as good as the deal case of Secton IV for low message rates. As message rate approaches the best achevable rate, state amplfcaton s sacrfced. Moreover, we note that for the most part, nstantaneous Shannon encodng provdes more state nformaton than the tmng channel based encodng strategy n Secton V-B. For the state maskng problem n Fg. 4, we observe that for low rates, = provdes sgnfcantly better state maskng compared to the = 0 case. Smlar to the state amplfcaton case, tmng-based encodng delvers less state nformaton than nstantaneous Shannon encodng, although ths s desrable for the state maskng case. Hence, we conclude that tmng-based encodng outperforms nstantaneous Shannon encodng n state maskng, whle the reverse s true n state amplfcaton. VII. CONCLUSION In ths paper, we consdered the problems of state amplfcaton and state maskng n an energy harvestng bnary symmetrc channel. We focused on the no battery, nfnte battery, and unt battery cases. For the no battery case, we obtaned the regons b prevous results. For the nfnte battery case, we found that perfect state amplfcaton and perfect state maskng are possble, n the sense that message and state nformaton rates add up to the capacty of the channel n the case of state amplfcaton. For the unt battery case, we compared the nstantaneous Shannon strategy encodng scheme and the tmng channel based encodng scheme n the noseless case, and observed that the former provdes better state amplfcaton whle the latter provdes better state maskng. REFERENCES [] Y. H. Km, A. Sutvong, and T. M. Cover. State amplfcaton. IEEE Trans. on Inform. Theory, 54(5): , May [2] C. Choudhur, Y. H. Km, and U. Mtra. Causal state amplfcaton. In IEEE ISIT, pages 20 24, August 20. [3] N. Merhav and S. Shama. Informaton rates subject to state maskng. IEEE Trans. on Inform. Theory, 53(6): , June [4] O. Ozel and S. Ulukus. Achevng AWGN capacty under stochastc energy harvestng. IEEE Trans. on Informaton Theory, 58(0): , October 202. [5] O. Ozel and S. Ulukus. AWGN channel under tme-varyng ampltude constrants wth causal nformaton at the transmtter. In Aslomar Conference, November 20. [6] C. E. Shannon. Channels wth sde nformaton at the transmtter. IBM Jour. of Research and Development, 2(4): , 958. [7] K. Tutuncuoglu, O. Ozel, A. Yener, and S. Ulukus. Bnary energy harvestng channel wth fnte energy storage. In IEEE ISIT, July 203. [8] W. Mao and B. Hassb. On the capacty of a communcaton system wth energy harvestng and a lmted battery. In IEEE ISIT, July 203. [9] K. Tutuncuoglu, O. Ozel, A. Yener, and S. Ulukus. Improved capacty bounds for the bnary energy harvestng channel. In IEEE ISIT, June 204. [0] O. Ozel, K. Tutuncuoglu, S. Ulukus, and A. Yener. Capacty of the dscrete memoryless energy harvestng channel wth sde nformaton. In IEEE ISIT, June 204. [] Y. Dong and A. Özgür. Approxmate capacty of energy harvestng communcaton wth fnte battery. In IEEE ISIT, June 204. [2] V. Jog and V. Anantharam. An energy harvestng AWGN channel wth a fnte battery. In IEEE ISIT, June 204. [3] O. Ozel and S. Ulukus. Energy state amplfcaton n an energy harvestng communcaton system. In IEEE ISIT, July 202.

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006)

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006) ECE 534: Elements of Informaton Theory Solutons to Mdterm Eam (Sprng 6) Problem [ pts.] A dscrete memoryless source has an alphabet of three letters,, =,, 3, wth probabltes.4,.4, and., respectvely. (a)

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem.

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem. Lecture 14 (03/27/18). Channels. Decodng. Prevew of the Capacty Theorem. A. Barg The concept of a communcaton channel n nformaton theory s an abstracton for transmttng dgtal (and analog) nformaton from

More information

Two-Way and Multiple-Access Energy Harvesting Systems with Energy Cooperation

Two-Way and Multiple-Access Energy Harvesting Systems with Energy Cooperation Two-Way and Multple-Access Energy Harvestng Systems wth Energy Cooperaton Berk Gurakan, Omur Ozel, Jng Yang 2, and Sennur Ulukus Department of Electrcal and Computer Engneerng, Unversty of Maryland, College

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Chapter 7 Channel Capacty and Codng Contents 7. Channel models and channel capacty 7.. Channel models Bnary symmetrc channel Dscrete memoryless channels Dscrete-nput, contnuous-output channel Waveform

More information

Error Probability for M Signals

Error Probability for M Signals Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Wreless Informaton Transmsson System Lab. Chapter 7 Channel Capacty and Codng Insttute of Communcatons Engneerng atonal Sun Yat-sen Unversty Contents 7. Channel models and channel capacty 7.. Channel models

More information

EGR 544 Communication Theory

EGR 544 Communication Theory EGR 544 Communcaton Theory. Informaton Sources Z. Alyazcoglu Electrcal and Computer Engneerng Department Cal Poly Pomona Introducton Informaton Source x n Informaton sources Analog sources Dscrete sources

More information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information

Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information 204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener

More information

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or Sgnal Compresson Sgnal Compresson Entropy Codng Entropy codng s also known as zero-error codng, data compresson or lossless compresson. Entropy codng s wdely used n vrtually all popular nternatonal multmeda

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

Rate-Memory Trade-off for the Two-User Broadcast Caching Network with Correlated Sources

Rate-Memory Trade-off for the Two-User Broadcast Caching Network with Correlated Sources Rate-Memory Trade-off for the Two-User Broadcast Cachng Network wth Correlated Sources Parsa Hassanzadeh, Antona M. Tulno, Jame Llorca, Elza Erkp arxv:705.0466v [cs.it] May 07 Abstract Ths paper studes

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Analysis of Discrete Time Queues (Section 4.6)

Analysis of Discrete Time Queues (Section 4.6) Analyss of Dscrete Tme Queues (Secton 4.6) Copyrght 2002, Sanjay K. Bose Tme axs dvded nto slots slot slot boundares Arrvals can only occur at slot boundares Servce to a job can only start at a slot boundary

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

REAL ANALYSIS I HOMEWORK 1

REAL ANALYSIS I HOMEWORK 1 REAL ANALYSIS I HOMEWORK CİHAN BAHRAN The questons are from Tao s text. Exercse 0.0.. If (x α ) α A s a collecton of numbers x α [0, + ] such that x α

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

Lecture 4: November 17, Part 1 Single Buffer Management

Lecture 4: November 17, Part 1 Single Buffer Management Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 4s Luca Trevsan September 5, 07 Summary of Lecture 4 In whch we ntroduce semdefnte programmng and apply t to Max Cut. Semdefnte Programmng Recall that

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

Approximately achieving Gaussian relay network capacity with lattice codes

Approximately achieving Gaussian relay network capacity with lattice codes Approxmately achevng Gaussan relay network capacty wth lattce codes Ayfer Özgür EFL, Lausanne, Swtzerland ayfer.ozgur@epfl.ch Suhas Dggav UCLA, USA and EFL, Swtzerland suhas@ee.ucla.edu Abstract Recently,

More information

On the Correlation between Boolean Functions of Sequences of Random Variables

On the Correlation between Boolean Functions of Sequences of Random Variables On the Correlaton between Boolean Functons of Sequences of Random Varables Farhad Shran Chaharsoogh Electrcal Engneerng and Computer Scence Unversty of Mchgan Ann Arbor, Mchgan, 48105 Emal: fshran@umch.edu

More information

Bounds on the Effective-length of Optimal Codes for Interference Channel with Feedback

Bounds on the Effective-length of Optimal Codes for Interference Channel with Feedback Bounds on the Effectve-length of Optmal Codes for Interference Channel wth Feedback Mohsen Hedar EECS Department Unversty of Mchgan Ann Arbor,USA Emal: mohsenhd@umch.edu Farhad Shran ECE Department New

More information

Applied Stochastic Processes

Applied Stochastic Processes STAT455/855 Fall 23 Appled Stochastc Processes Fnal Exam, Bref Solutons 1. (15 marks) (a) (7 marks) The dstrbuton of Y s gven by ( ) ( ) y 2 1 5 P (Y y) for y 2, 3,... The above follows because each of

More information

On Network Coding of Independent and Dependent Sources in Line Networks

On Network Coding of Independent and Dependent Sources in Line Networks On Network Codng of Independent and Dependent Sources n Lne Networks Mayank Baksh, Mchelle Effros, WeHsn Gu, Ralf Koetter Department of Electrcal Engneerng Department of Electrcal Engneerng Calforna Insttute

More information

Edge Isoperimetric Inequalities

Edge Isoperimetric Inequalities November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

Introduction to Information Theory, Data Compression,

Introduction to Information Theory, Data Compression, Introducton to Informaton Theory, Data Compresson, Codng Mehd Ibm Brahm, Laura Mnkova Aprl 5, 208 Ths s the augmented transcrpt of a lecture gven by Luc Devroye on the 3th of March 208 for a Data Structures

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Signal space Review on vector space Linear independence Metric space and norm Inner product

Signal space Review on vector space Linear independence Metric space and norm Inner product Sgnal space.... Revew on vector space.... Lnear ndependence... 3.3 Metrc space and norm... 4.4 Inner product... 5.5 Orthonormal bass... 7.6 Waveform communcaton system... 9.7 Some examples... 6 Sgnal space

More information

Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability

Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability Connectng Multple-uncast and Network Error Correcton: Reducton and Unachevablty Wentao Huang Calforna Insttute of Technology Mchael Langberg Unversty at Buffalo, SUNY Joerg Klewer New Jersey Insttute of

More information

Consider the following passband digital communication system model. c t. modulator. t r a n s m i t t e r. signal decoder.

Consider the following passband digital communication system model. c t. modulator. t r a n s m i t t e r. signal decoder. PASSBAND DIGITAL MODULATION TECHNIQUES Consder the followng passband dgtal communcaton system model. cos( ω + φ ) c t message source m sgnal encoder s modulator s () t communcaton xt () channel t r a n

More information

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng

More information

DC-Free Turbo Coding Scheme Using MAP/SOVA Algorithms

DC-Free Turbo Coding Scheme Using MAP/SOVA Algorithms Proceedngs of the 5th WSEAS Internatonal Conference on Telecommuncatons and Informatcs, Istanbul, Turkey, May 27-29, 26 (pp192-197 DC-Free Turbo Codng Scheme Usng MAP/SOVA Algorthms Prof. Dr. M. Amr Mokhtar

More information

CSCE 790S Background Results

CSCE 790S Background Results CSCE 790S Background Results Stephen A. Fenner September 8, 011 Abstract These results are background to the course CSCE 790S/CSCE 790B, Quantum Computaton and Informaton (Sprng 007 and Fall 011). Each

More information

THE ARIMOTO-BLAHUT ALGORITHM FOR COMPUTATION OF CHANNEL CAPACITY. William A. Pearlman. References: S. Arimoto - IEEE Trans. Inform. Thy., Jan.

THE ARIMOTO-BLAHUT ALGORITHM FOR COMPUTATION OF CHANNEL CAPACITY. William A. Pearlman. References: S. Arimoto - IEEE Trans. Inform. Thy., Jan. THE ARIMOTO-BLAHUT ALGORITHM FOR COMPUTATION OF CHANNEL CAPACITY Wllam A. Pearlman 2002 References: S. Armoto - IEEE Trans. Inform. Thy., Jan. 1972 R. Blahut - IEEE Trans. Inform. Thy., July 1972 Recall

More information

Explicit and Implicit Temperature Constraints in Energy Harvesting Communications

Explicit and Implicit Temperature Constraints in Energy Harvesting Communications Explct and Implct Temperature Constrants n Energy Harvestng Communcatons Abdulrahman Baknna, Omur Ozel 2, and Sennur Ulukus Department of Electrcal and Computer Engneerng, Unversty of Maryland, College

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

IN THE paradigm of network coding, a set of source nodes

IN THE paradigm of network coding, a set of source nodes 4496 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 6, JUNE 2018 Sngle-Uncast Secure Network Codng and Network Error Correcton are as Hard as Multple-Uncast Network Codng Wentao Huang, Tracey Ho,

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.65/15.070J Fall 013 Lecture 1 10/1/013 Martngale Concentraton Inequaltes and Applcatons Content. 1. Exponental concentraton for martngales wth bounded ncrements.

More information

The Two-User Gaussian Fading Broadcast Channel

The Two-User Gaussian Fading Broadcast Channel The Two-User Gaussan Fadng Broadcast Channel Amn Jafaran Lab of Informatcs, Networks & Communcatons LINC Department of Electrcal & Computer Engneerng Unversty of Texas at Austn Austn, TX 787, USA Emal:

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

Channel Encoder. Channel. Figure 7.1: Communication system

Channel Encoder. Channel. Figure 7.1: Communication system Chapter 7 Processes The model of a communcaton system that we have been developng s shown n Fgure 7.. Ths model s also useful for some computaton systems. The source s assumed to emt a stream of symbols.

More information

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,

More information

Lecture 20: Lift and Project, SDP Duality. Today we will study the Lift and Project method. Then we will prove the SDP duality theorem.

Lecture 20: Lift and Project, SDP Duality. Today we will study the Lift and Project method. Then we will prove the SDP duality theorem. prnceton u. sp 02 cos 598B: algorthms and complexty Lecture 20: Lft and Project, SDP Dualty Lecturer: Sanjeev Arora Scrbe:Yury Makarychev Today we wll study the Lft and Project method. Then we wll prove

More information

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA 4 Analyss of Varance (ANOVA) 5 ANOVA 51 Introducton ANOVA ANOVA s a way to estmate and test the means of multple populatons We wll start wth one-way ANOVA If the populatons ncluded n the study are selected

More information

Tracking with Kalman Filter

Tracking with Kalman Filter Trackng wth Kalman Flter Scott T. Acton Vrgna Image and Vdeo Analyss (VIVA), Charles L. Brown Department of Electrcal and Computer Engneerng Department of Bomedcal Engneerng Unversty of Vrgna, Charlottesvlle,

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

Exercises of Chapter 2

Exercises of Chapter 2 Exercses of Chapter Chuang-Cheh Ln Department of Computer Scence and Informaton Engneerng, Natonal Chung Cheng Unversty, Mng-Hsung, Chay 61, Tawan. Exercse.6. Suppose that we ndependently roll two standard

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

Refined Coding Bounds for Network Error Correction

Refined Coding Bounds for Network Error Correction Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department

More information

princeton univ. F 13 cos 521: Advanced Algorithm Design Lecture 3: Large deviations bounds and applications Lecturer: Sanjeev Arora

princeton univ. F 13 cos 521: Advanced Algorithm Design Lecture 3: Large deviations bounds and applications Lecturer: Sanjeev Arora prnceton unv. F 13 cos 521: Advanced Algorthm Desgn Lecture 3: Large devatons bounds and applcatons Lecturer: Sanjeev Arora Scrbe: Today s topc s devaton bounds: what s the probablty that a random varable

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

= z 20 z n. (k 20) + 4 z k = 4

= z 20 z n. (k 20) + 4 z k = 4 Problem Set #7 solutons 7.2.. (a Fnd the coeffcent of z k n (z + z 5 + z 6 + z 7 + 5, k 20. We use the known seres expanson ( n+l ( z l l z n below: (z + z 5 + z 6 + z 7 + 5 (z 5 ( + z + z 2 + z + 5 5

More information

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0 MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

A new construction of 3-separable matrices via an improved decoding of Macula s construction

A new construction of 3-separable matrices via an improved decoding of Macula s construction Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula

More information

A Note on Bound for Jensen-Shannon Divergence by Jeffreys

A Note on Bound for Jensen-Shannon Divergence by Jeffreys OPEN ACCESS Conference Proceedngs Paper Entropy www.scforum.net/conference/ecea- A Note on Bound for Jensen-Shannon Dvergence by Jeffreys Takuya Yamano, * Department of Mathematcs and Physcs, Faculty of

More information

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

4884 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 12, DECEMBER Energy Cooperation in Energy Harvesting Communications

4884 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 12, DECEMBER Energy Cooperation in Energy Harvesting Communications 4884 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 6, NO., DECEMBER 3 Energy Cooperaton n Energy Harvestng Communcatons Ber Guraan, Student Member, IEEE, Omur Ozel, Student Member, IEEE, Jng Yang, Member,

More information

On Information Theoretic Games for Interference Networks

On Information Theoretic Games for Interference Networks On Informaton Theoretc Games for Interference Networks Suvarup Saha and Randall A. Berry Dept. of EECS Northwestern Unversty e-mal: suvarups@u.northwestern.edu rberry@eecs.northwestern.edu Abstract The

More information

Math 426: Probability MWF 1pm, Gasson 310 Homework 4 Selected Solutions

Math 426: Probability MWF 1pm, Gasson 310 Homework 4 Selected Solutions Exercses from Ross, 3, : Math 26: Probablty MWF pm, Gasson 30 Homework Selected Solutons 3, p. 05 Problems 76, 86 3, p. 06 Theoretcal exercses 3, 6, p. 63 Problems 5, 0, 20, p. 69 Theoretcal exercses 2,

More information

Supporting Information

Supporting Information Supportng Informaton The neural network f n Eq. 1 s gven by: f x l = ReLU W atom x l + b atom, 2 where ReLU s the element-wse rectfed lnear unt, 21.e., ReLUx = max0, x, W atom R d d s the weght matrx to

More information

Vapnik-Chervonenkis theory

Vapnik-Chervonenkis theory Vapnk-Chervonenks theory Rs Kondor June 13, 2008 For the purposes of ths lecture, we restrct ourselves to the bnary supervsed batch learnng settng. We assume that we have an nput space X, and an unknown

More information

Yong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 )

Yong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 ) Kangweon-Kyungk Math. Jour. 4 1996), No. 1, pp. 7 16 AN ITERATIVE ROW-ACTION METHOD FOR MULTICOMMODITY TRANSPORTATION PROBLEMS Yong Joon Ryang Abstract. The optmzaton problems wth quadratc constrants often

More information

MAXIMUM A POSTERIORI TRANSDUCTION

MAXIMUM A POSTERIORI TRANSDUCTION MAXIMUM A POSTERIORI TRANSDUCTION LI-WEI WANG, JU-FU FENG School of Mathematcal Scences, Peng Unversty, Bejng, 0087, Chna Center for Informaton Scences, Peng Unversty, Bejng, 0087, Chna E-MIAL: {wanglw,

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 6 Luca Trevisan September 12, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 6 Luca Trevisan September 12, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 6 Luca Trevsan September, 07 Scrbed by Theo McKenze Lecture 6 In whch we study the spectrum of random graphs. Overvew When attemptng to fnd n polynomal

More information

Chapter 8 SCALAR QUANTIZATION

Chapter 8 SCALAR QUANTIZATION Outlne Chapter 8 SCALAR QUANTIZATION Yeuan-Kuen Lee [ CU, CSIE ] 8.1 Overvew 8. Introducton 8.4 Unform Quantzer 8.5 Adaptve Quantzaton 8.6 Nonunform Quantzaton 8.7 Entropy-Coded Quantzaton Ch 8 Scalar

More information

HMMT February 2016 February 20, 2016

HMMT February 2016 February 20, 2016 HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,

More information

Externalities in wireless communication: A public goods solution approach to power allocation. by Shrutivandana Sharma

Externalities in wireless communication: A public goods solution approach to power allocation. by Shrutivandana Sharma Externaltes n wreless communcaton: A publc goods soluton approach to power allocaton by Shrutvandana Sharma SI 786 Tuesday, Feb 2, 2006 Outlne Externaltes: Introducton Plannng wth externaltes Power allocaton:

More information

S Advanced Digital Communication (4 cr) Targets today

S Advanced Digital Communication (4 cr) Targets today S.72-3320 Advanced Dtal Communcaton (4 cr) Convolutonal Codes Tarets today Why to apply convolutonal codn? Defnn convolutonal codes Practcal encodn crcuts Defnn qualty of convolutonal codes Decodn prncples

More information

Finding Dense Subgraphs in G(n, 1/2)

Finding Dense Subgraphs in G(n, 1/2) Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng

More information

Lecture 10 Support Vector Machines II

Lecture 10 Support Vector Machines II Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed

More information

Stat260: Bayesian Modeling and Inference Lecture Date: February 22, Reference Priors

Stat260: Bayesian Modeling and Inference Lecture Date: February 22, Reference Priors Stat60: Bayesan Modelng and Inference Lecture Date: February, 00 Reference Prors Lecturer: Mchael I. Jordan Scrbe: Steven Troxler and Wayne Lee In ths lecture, we assume that θ R; n hgher-dmensons, reference

More information

An Interactive Optimisation Tool for Allocation Problems

An Interactive Optimisation Tool for Allocation Problems An Interactve Optmsaton ool for Allocaton Problems Fredr Bonäs, Joam Westerlund and apo Westerlund Process Desgn Laboratory, Faculty of echnology, Åbo Aadem Unversty, uru 20500, Fnland hs paper presents

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

k t+1 + c t A t k t, t=0

k t+1 + c t A t k t, t=0 Macro II (UC3M, MA/PhD Econ) Professor: Matthas Kredler Fnal Exam 6 May 208 You have 50 mnutes to complete the exam There are 80 ponts n total The exam has 4 pages If somethng n the queston s unclear,

More information

Lecture 14: Bandits with Budget Constraints

Lecture 14: Bandits with Budget Constraints IEOR 8100-001: Learnng and Optmzaton for Sequental Decson Makng 03/07/16 Lecture 14: andts wth udget Constrants Instructor: Shpra Agrawal Scrbed by: Zhpeng Lu 1 Problem defnton In the regular Mult-armed

More information

Power Allocation for Distributed BLUE Estimation with Full and Limited Feedback of CSI

Power Allocation for Distributed BLUE Estimation with Full and Limited Feedback of CSI Power Allocaton for Dstrbuted BLUE Estmaton wth Full and Lmted Feedback of CSI Mohammad Fanae, Matthew C. Valent, and Natala A. Schmd Lane Department of Computer Scence and Electrcal Engneerng West Vrgna

More information

The optimal delay of the second test is therefore approximately 210 hours earlier than =2.

The optimal delay of the second test is therefore approximately 210 hours earlier than =2. THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

Entropy of Markov Information Sources and Capacity of Discrete Input Constrained Channels (from Immink, Coding Techniques for Digital Recorders)

Entropy of Markov Information Sources and Capacity of Discrete Input Constrained Channels (from Immink, Coding Techniques for Digital Recorders) Entropy of Marov Informaton Sources and Capacty of Dscrete Input Constraned Channels (from Immn, Codng Technques for Dgtal Recorders). Entropy of Marov Chans We have already ntroduced the noton of entropy

More information

arxiv: v1 [math.co] 1 Mar 2014

arxiv: v1 [math.co] 1 Mar 2014 Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest

More information

First day August 1, Problems and Solutions

First day August 1, Problems and Solutions FOURTH INTERNATIONAL COMPETITION FOR UNIVERSITY STUDENTS IN MATHEMATICS July 30 August 4, 997, Plovdv, BULGARIA Frst day August, 997 Problems and Solutons Problem. Let {ε n } n= be a sequence of postve

More information

Assuming that the transmission delay is negligible, we have

Assuming that the transmission delay is negligible, we have Baseband Transmsson of Bnary Sgnals Let g(t), =,, be a sgnal transmtted over an AWG channel. Consder the followng recever g (t) + + Σ x(t) LTI flter h(t) y(t) t = nt y(nt) threshold comparator Decson ˆ

More information

Complete subgraphs in multipartite graphs

Complete subgraphs in multipartite graphs Complete subgraphs n multpartte graphs FLORIAN PFENDER Unverstät Rostock, Insttut für Mathematk D-18057 Rostock, Germany Floran.Pfender@un-rostock.de Abstract Turán s Theorem states that every graph G

More information

The Second Anti-Mathima on Game Theory

The Second Anti-Mathima on Game Theory The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player

More information

Generalized Linear Methods

Generalized Linear Methods Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set

More information

Solutions HW #2. minimize. Ax = b. Give the dual problem, and make the implicit equality constraints explicit. Solution.

Solutions HW #2. minimize. Ax = b. Give the dual problem, and make the implicit equality constraints explicit. Solution. Solutons HW #2 Dual of general LP. Fnd the dual functon of the LP mnmze subject to c T x Gx h Ax = b. Gve the dual problem, and make the mplct equalty constrants explct. Soluton. 1. The Lagrangan s L(x,

More information

Google PageRank with Stochastic Matrix

Google PageRank with Stochastic Matrix Google PageRank wth Stochastc Matrx Md. Sharq, Puranjt Sanyal, Samk Mtra (M.Sc. Applcatons of Mathematcs) Dscrete Tme Markov Chan Let S be a countable set (usually S s a subset of Z or Z d or R or R d

More information