State Amplification and State Masking for the Binary Energy Harvesting Channel
|
|
- Suzan Veronica Wilson
- 5 years ago
- Views:
Transcription
1 State Amplfcaton and State Maskng for the Bnary Energy Harvestng Channel Kaya Tutuncuoglu, Omur Ozel 2, Ayln Yener, and Sennur Ulukus 2 Department of Electrcal Engneerng, The Pennsylvana State Unversty, Unversty Park, PA Department of Electrcal and Computer Engneerng, Unversty of Maryland, College Park, MD Abstract In ths paper, we consder a bnary energy harvestng transmtter that wshes to control the amount of sde nformaton the recever can obtan about ts energy harvests. Specfcally, we study state amplfcaton and state maskng, whch defne the maxmum and mnmum amount of state nformaton conveyed to the recever for a gven message rate, respectvely. For an ndependent and dentcally dstrbuted energy harvestng process, we frst fnd the amplfcaton and maskng regons for a transmtter wthout a battery and a transmtter wth an nfnte battery. Next, we fnd nner bounds for these regons for a unt-szed battery at the transmtter usng two dfferent encodng schemes, usng nstantaneous Shannon strateges and usng a scheme based on the equvalent tmng channel ntroduced n our prevous work. We observe that the former provdes better state amplfcaton, whle the latter provdes better state maskng. I. INTRODUCTION In the energy harvestng channel, the harvested energy s a random process that s revealed to the transmtter causally throughout the transmsson. Snce the transmtted symbols are constraned by the energy avalable at the encoder, the decoder obtans some nformaton about the energy harvestng process n addton to the ntended message. Dependng on the applcaton, t may be desrable to maxmze or mnmze ths sde nformaton about the harvested energy, e.g., t may facltate smart schedulng based on energy harvestng rates, but may also reveal the poston or energy source of a wreless node. These scenaros result n the problems of state amplfcaton [], [2] and state maskng [3], respectvely. The capacty of an energy harvestng channel s determned n prevous work for two extreme cases for the AWGN channel. When the battery-sze s unlmted, [4] shows that the capacty s equal to the capacty of the same system wth an average power constrant equal to the average recharge rate. At the other extreme, when the battery sze s zero, the system becomes a stochastc ampltude-constraned channel and the capacty n ths case s acheved [5] by usng Shannon strateges [6]. The capacty for the case of a fnte-szed battery s open n general. In the specal case of a noseless bnary channel and a unt-szed battery, [7] shows that the channel s equvalent to an addtve geometrc-nose tmng channel, for whch upper bounds and achevable rates usng tmng channel based encodng schemes are proposed. Concurrently, n [8], encodng schemes that utlze Shannon strateges are studed Ths work was supported by NSF Grants CNS /CNS , and CCF /CCF n a more general settng, and the correspondng achevable rates are found, where only the nstantaneous battery states are used to determne channel nput at each channel use. For the channel model n [7], [9] ntroduces a tghter upper bound and a better encodng scheme, outperformng..d. and frst order Markov Shannon strateges that utlze current battery state only. Reference [0] extends the model of [9] to a nosy channel wth arbtrary battery sze, and obtans upper bounds by provdng battery state nformaton to the recever. The fnte-szed battery model s also of nterest n an AWGN channel. In [], an approxmate capacty for ths channel model s found wth a constant gap usng ampltude constraned codebooks. For determnstc energy harvestng n an AWGN channel, [2] evaluates a lower bound on the capacty va the volume of the feasble nput set. The state amplfcaton problem,.e., sendng nformaton about system state along wth the message, s frst studed n []. Ths reference quantfes the sde nformaton revealed to the recever as the mutual nformaton between the output sequence and the state sequence. Ths problem s later consdered n terms of the dstorton n channel state estmaton n [2]. The state maskng counterpart,.e., concealng channel state as much as possble whle sendng a message, s ntroduced n [3] for both causal and non-causal state nformaton at the encoder. In an energy harvestng settng, the state amplfcaton problem s frst studed n [3] for an AWGN channel wth nfnte and no battery at the encoder. In ths paper, we evaluate state amplfcaton and state maskng regons, whch outlne the set of achevable message rates and state revealng rates for a bnary energy harvestng channel. Our goal s to nvestgate the trade-off between the energy arrval nformaton that the recever can extract from the communcaton and the message transmsson rate. We consder bnary energy arrvals as the state of the channel, where each energy unt corresponds to the energy requred to send a through the bnary channel once. We consder the no battery case and the nfnte battery case, for whch the channel capactes are known, and the unt battery case, for whch we derve nner bounds usng the achevable rates n [7], [8]. II. CHANNEL MODEL AND PROBLEM FORMULATION We consder a bnary symmetrc channel (BSC) wth an energy harvestng transmtter, as shown n Fg.. The crossover probablty of the bnary symmetrc channel s denoted by
2 W Fg.. E Encoder X Channel Y Decoder The energy harvestng channel wth battery sze. p e 2. In the th channel use, the encoder harvests an energy of E 0, },.e., harvests a unt of energy or not, and sends a bnary symbol X 0, } through the channel. The energy cost of sendng a s unt, whle sendng a zero does not requre any energy. The energy arrvals E are ndependent and dentcally dstrbuted (..d.) wth the probablty of arrval P r[e = ] = q. E values are revealed to the encoder causally, whle not avalable to the decoder. We consder two cases for the energy storage and consumpton model. If the encoder has no battery, denoted by = 0, then the channel nput s constraned by the energy harvested wthn the same channel use,.e., X E. For > 0, we consder a transmt-frst model. Denotng the state of the battery at the begnnng of the th channel use as B, the encoder frst transmts X B, and then stores the harvested energy E n the battery, provded that the battery capacty permts storage. Hence, the battery state evolves as B + = mnb X + E, }. () In ths work, we are nterested n how much the decoder can learn about the energy arrval process E n. From the decoder s perspectve, there are 2 H(En) possble energy arrval sequences, snce 2 H(En) s the sze of the typcal set for E n. Upon recevng Y n, the decoder can reduce the sze of ths lst to those that are possble gven Y n, whch has a sze of 2 H(En Y n). Hence, the reducton n the entropy of E n for the decoder can be expressed as = n (H(En ) H(E n Y n )) = n I(En ; Y n ). (2) Note that the value of s related strongly to the encodng scheme adopted by the encoder. For example, the encoder can choose to send X = 0 for all, thus achevng no message rate, but obtanng = 0. On the other extreme, the encoder can choose X = E, once agan achevng no message rate, but obtanng = H(E n ). For a non-zero rate, dfferent encodng schemes achevng the same rate may yeld dfferent values for. A. State Amplfcaton Problem In the state amplfcaton problem, the encoder wshes the decoder to obtan as much nformaton as possble about the energy harvestng process E n,.e., maxmze, whle relably conveyng a message wth some rate R. Ths problem s frst consdered n [], where the achevable message rates and state Ŵ amplfcaton rates are shown to satsfy R I(U; Y ), (3) H(S), (4) R + I(X, S; Y ), (5) for a memoryless channel wth state S known causally at the transmtter. Here, U s an auxlary random varable yeldng the jont dstrbuton p(s)p(u)p(x u, s)p(y x, s). B. State Maskng Problem The state maskng problem, studed frst n [3], fnds a lower bound on for any gven message rate R. Hence, t ndcates the mnmum amount of nformaton that must be revealed to the decoder about the state n order to acheve some rate R. The achevable (R, ) regons are obtaned by the unon of the regons R I(U; Y ), (6) I(S; Y U), (7) for causally avalable state at the encoder [3]. Note that (3) and (6) are dentcal, and (7) provdes a lower bound on whle (4) and (5) provde upper bounds. In the remander of ths paper, we consder the state amplfcaton and state maskng problems ndvdually for the cases = 0, =, and =. III. NO BATTERY CASE: = 0 For = 0, the energy avalable at channel use s E, whch s..d., and therefore the state of the channel s memoryless. Hence, the results of [] extend drectly to ths case. Gven the two states, E 0, }, the two nputs X 0, }, and the restrcton X E, there are two feasble mappngs from E to X. We refer to these mappngs as strateges, and denote them as U = (X, X), where X s the channel nput when E = 0 and X s the channel nput when E =. The two feasble strateges are (0, 0) and (0, ), correspondng to always transmttng a zero and attemptng to send a, respectvely. For an encodng strategy wth P r[u = (0, )] = p, the exact (R, ) regon for state amplfcaton s obtaned as R H(pq p e ) ph(q p e ) ( p)h(p e ), (8) H(q), (9) R + H(pq p e ) H(p e ), (0) where H(a) denotes the bnary entropy functon, and p q = p( q) + ( p)q. Next, we utlze the results of [3], and characterze the exact (R, ) regon for state maskng as (8) and ph(q p e ) ph(p e ). () We remark that for a noseless bnary channel,.e., p e = 0, the bounds for n (8)-(0) and () match only at R = H(pq) ph(q), = ph(q). (2)
3 IV. INFINITE BATTERY CASE: = We next consder the nfnte battery case,.e., =. Wth an nfnte battery, [4] showed that a save-and-transmt scheme acheves the AWGN capacty wth average transmt power. Ths scheme frst saves energy for a neglgble duraton of the transmsson, and then encodes as f constraned by an average power constrant only. The save-and-transmt scheme can be extended to the bnary channel, yeldng the capacty H(q p e ) H(p e ), q C BSC = 2, H(p e ), q > 2, (3) wth the channel nput dstrbuton P r[x = ] = mn ( q, 2). Note that ths s also the capacty of a BSC wth an nput constrant E[X] q, as s the case n [3] for the AWGN channel. Wth ths observaton, we present the state amplfcaton regon for ths channel n the followng lemma. Lemma The exact (R, ) regon for the bnary EH channel wth an nfnte-szed battery at the transmtter satsfes R + C BSC, 0 H(q). (4) Proof: We frst show the achevablty of these (R, ) pars. Clearly, the rate R = C BSC s achevable wth the saveand-transmt scheme, whch we assume to yeld = 0. Furthermore, by compressng the E n sequence and sendng t as a part of the message, the encoder can trade any porton of the message rate R wth, provded that ths porton does not exceed H(q) for q 0.5 and for q > 0.5. Due to the causal avalablty of E, ths s performed n a block Markov fashon. For the converse, we wrte I(X n ;Y n ) = I(X n, E n, W ; Y n ) (5) I(E n, W ; Y n ) (6) = I(E n ; Y n ) + H(W ) H(W Y n, E n ) (7) I(E n ; Y n ) + H(W ) H(ɛ) ɛ log(nr) (8) = n + nr H(ɛ) ɛ log(nr) (9) where W s the message and ɛ s the decodng error probablty. Here, (5) follows from the Markov chan (W, E n ) X n Y n, (7) s due to the ndependence of W and E n, and (8) follows from Fano s nequalty. Hence, whenever the decodng error probablty ɛ goes to zero as n, we have + R lm n I(Xn ; Y n ) C BSC, (20) whch concludes the converse. For the maskng problem, as emphaszed n [3], snce (R, ) = (C BSC, 0) s achevable, perfect maskng of the state E n s possble usng the save-and-transmt scheme. Hence, we have 0 as the maskng lower bound. V. UNIT BATTERY CASE: = In precedng sectons, we consdered cases for whch the channel capacty s known. Snce ths s not the case for =, we are not able to determne the entre (R, ) regon. In ths secton, we utlze two encodng schemes, proposed by [8] and [7], to fnd nner bounds on the (R, ) regon for the bnary noseless channel wth p e = 0. Although the channel s noseless, ths s a non-trval model due to ts memory and the state s dependence on the channel nput, for whch the capacty s an open problem. A. Instantaneous Shannon Strateges In [8], the Shannon strateges of [6], whch are capacty achevng for a memoryless channel, are used to fnd achevable rates for the energy harvestng channel. These strateges are mappngs from the current battery state B to the channel nput X. Gven two battery states, B 0, }, two nput symbols X 0, }, and the restrcton X S n each channel use, there are two feasble mappngs from B to X. As n Secton III, we denote these strateges as U (0, 0), (0, )}, where the former gves X = 0 for all B and the latter gves X = 0 for B = 0 and X = for B =. We consder a codebook consstng of strategy codewords U n, generated..d. wth P r[u = (0, )] = p. Upon selectng the codeword correspondng to the message, the encoder chooses X based on U and B n the th channel use. The acheved message rate for ths encodng scheme s gven by R IID = lm n I(U n ; Y n ). (2) To fnd the correspondng for ths encodng scheme, we frst defne the random varable ψ j = 0, E k = 0, k < j, (22), otherwse, whch s an ndcator of whether a unt of energy has arrved or not between the th and jth channel uses. We then defne the set Ψ(u n ) = ψ 2, ψ 3 2,... } as the collecton of mutually exclusve ndcators ψ k+ k, where =, and k, k = 2, 3,... are the channel ndces that satsfy u k = (0, ). In other words, Ψ(u n ) s the set of ndcators that show whether energy s avalable or not for each attempt of sendng a gven the strategy sequence u n. We then wrte H(E n Y n ) H(E n Y n, U n ) = I(E n ; U n Y n ) (23) H(U n Y n ) (24) H(W Y n ) (25) H(ɛ) ɛ log(nr) (26) where ɛ s the probablty of decodng error. Here, (25) s due to u n beng a functon of message w, and (26) s due to Fano s nequalty. Hence, whenever the error probablty ɛ goes to zero as n, we have lm n H(En Y n ) = lm Wth ths observaton, we wrte as lm n H(En Y n, U n ). (27) n I(En ; Y n ) = lm n (H(En ) H(E n Y n, U n )) (28)
4 = lm n (H(En ) H(E n Y n, U n, Ψ(U n ))) (29) = lm = lm n (H(En ) H(E n Ψ(U n ), U n )) (30) n H(Ψ(U n ) U n ) (3) Here, (28) follows from (27), and (29) holds as Ψ(U n ) can be obtaned from Y n and U n. Smlarly, (30) follows snce Y n can be obtaned from U n and Ψ(U n ). Fnally, (3) holds snce H(Ψ(U n ) U n, E n ) = 0, and U n s ndependent of E n. What the seres of equaltes n (28)-(3) mply s that, observng Y n, the decoder learns the ndcators Ψ(U n ) about E n, and nothng more. Note that the ntervals ( k, k+ ) are dsjont, and therefore the elements of the set Ψ(u n ) are ndependent. Snce P r[ψ j = 0] = ( q) j and u are generated..d. wth probablty P r[u = (0, )] = p, (3) can be further smplfed as = lm n ( p(u n ) u n k H ( ( q) δ k) ) (32) where δ k = k+ k denotes the number of channel uses between the kth and k+st u = (0, ) n u n, and s dstrbuted..d. geometrc wth parameter p. As n, due to the law of large numbers, the set Ψ(u n ) has np elements, yeldng = lm n I(En ; Y n ) = p 2 ( p) δ H ( ( q) δ). δ= (33) Lemma 2 For the..d. encodng scheme wth Shannon strateges, the decrease n entropy of E n upon observng Y n,.e.,, s equal to (33) for the noseless channel. B. Tmng-Based Encodng For the bnary noseless channel, [7] ntroduced an alternatve scheme where encodng s performed on an equvalent tmng channel. In the tmng channel, the number of channel uses spent watng for an energy are denoted by Z, and the number of channel uses between the energy arrval and the departure of a are denoted by V. The decoder observes the number of channel uses between consecutve s, gven by T = V + Z. (34) The tmng representaton s depcted n Fg. 2. Note that one use of the tmng channel corresponds to T uses of the bnary channel. Snce energy arrvals are..d., Z values are..d. and geometrc dstrbuted. The encodng scheme of [7] for frame length N uses Shannon strateges U 0,,..., N } to generate an..d. codebook. For codeword U m and causally revealed Z m, the encoder nserts V = (U Z mod N) + (35) to the tmng channel. Recevng T, the decoder can obtan U = T mod N wthout error. Hence, the rate acheved Z T V Z 2 V 2 V 3 T 2 T 3 Fg. 2. Graphcal representaton of the varables n the equvalent tmng channel T n, V n and Z n. Here, crcles represent energy arrvals and trangles represent transmsson of a symbol. wth ths scheme per use of the bnary channel s R (N) A = max p(u) H(U) E[T ]... bts/ch. use, (36) where E[T ] s the average length of each use of the tmng channel. For ths encodng scheme, we next calculate as a functon of the strategy dstrbuton p(u). For a gven output sequence T m = t m, we defne a = j= t j. Then, the th use of the tmng channel les on the a + st to a + t th uses of the bnary channel. For ths nterval, the decoder can nfer the followng: For t N, we have z t from (34). Usng the defnton n (22), ths mples ψa a+t =. Otherwse, for t > N, we have z t N snce v N by defnton. Ths mples that ψa a+t N = 0 and ψ a+t a +t N =. Based on these two cases, we defne the sets Ψ 0 (t m ) = ψa a+t N, (37) t >N Ψ (t m ) = and wrte t N ψ a+t a ( t >N ψ a+t a +t N ), (38) H(E n T m ) = t m p(t m )H(E n T m = t m ) (39) = t m p(t m )H(E n T m = t m, U m = u m, Ψ 0 (t m ) = 0, Ψ (t m ) = ) (40) = t m p(t m )H(E n Ψ 0 (t m ) = 0, Ψ (t m ) = ) (4) where Ψ 0 (t m ) = 0 denotes element-wse equalty for all elements of the set Ψ0 (t m ). Here, (40) holds snce u m can be obtaned from t m, whch also reveals that Ψ 0 (t m ) = 0 and Ψ (t m ) =. Note that (4) s the entropy of E n gven that parts of E n are zero and parts nclude at least one non-zero arrval. Calculatng and averagng over t m, we get n I(En ; Y n ) = H(q) E[T ] E [ δh(q) H(( q) δ ) ( q) δ ], (42) where δ s a random varable denotng the length of ψ terms n Ψ (t m ), and s dstrbuted as k, k < N, w.p. p U (k ) ( ( q) k), δ = N N, w.p. u=0 p U (u)( q) u+. (43)
5 =(/n)i(e n ;Y n ) (State entropy reducton rate) E = max =0 E = wth d Shannon enc. max = wth tmng enc. =(/n)i(e n ;Y n ) (State entropy reducton rate) E = max =0 E = wth d Shannon enc. max = wth tmng enc R (Message rate) R (Message rate) Fg. 3. The maxmum values wth respect to message rate R,.e., state amplfcaton boundares, for q = 0.5 and p e = 0. Fg. 4. The mnmum values wth respect to message rate R,.e., state maskng boundares, for q = 0.5 and p e = 0. Lemma 3 For the encodng scheme n [7], the decrease n entropy of E n upon observng Y n,.e.,, for a specfc auxlary dstrbuton p U (u) s equal to (42). Fnally, we obtan (R, ) pars for ths encodng scheme by exhaustvely searchng p U (u) and usng (36) and (42). VI. NUMERICAL RESULTS For comparson, we evaluate the state amplfcaton and state maskng regons for the = 0 and = cases, and the maxmum and mnmum achevable values of wth respect to some message rate R for the = case, n a noseless channel wth q = 0.5. The state amplfcaton results are plotted n Fg. 3, and the state maskng results are plotted n Fg. 4. In Fg. 3, we observe that the nstantaneous Shannon encodng strategy n Secton V-A performs state amplfcaton almost as good as the deal case of Secton IV for low message rates. As message rate approaches the best achevable rate, state amplfcaton s sacrfced. Moreover, we note that for the most part, nstantaneous Shannon encodng provdes more state nformaton than the tmng channel based encodng strategy n Secton V-B. For the state maskng problem n Fg. 4, we observe that for low rates, = provdes sgnfcantly better state maskng compared to the = 0 case. Smlar to the state amplfcaton case, tmng-based encodng delvers less state nformaton than nstantaneous Shannon encodng, although ths s desrable for the state maskng case. Hence, we conclude that tmng-based encodng outperforms nstantaneous Shannon encodng n state maskng, whle the reverse s true n state amplfcaton. VII. CONCLUSION In ths paper, we consdered the problems of state amplfcaton and state maskng n an energy harvestng bnary symmetrc channel. We focused on the no battery, nfnte battery, and unt battery cases. For the no battery case, we obtaned the regons b prevous results. For the nfnte battery case, we found that perfect state amplfcaton and perfect state maskng are possble, n the sense that message and state nformaton rates add up to the capacty of the channel n the case of state amplfcaton. For the unt battery case, we compared the nstantaneous Shannon strategy encodng scheme and the tmng channel based encodng scheme n the noseless case, and observed that the former provdes better state amplfcaton whle the latter provdes better state maskng. REFERENCES [] Y. H. Km, A. Sutvong, and T. M. Cover. State amplfcaton. IEEE Trans. on Inform. Theory, 54(5): , May [2] C. Choudhur, Y. H. Km, and U. Mtra. Causal state amplfcaton. In IEEE ISIT, pages 20 24, August 20. [3] N. Merhav and S. Shama. Informaton rates subject to state maskng. IEEE Trans. on Inform. Theory, 53(6): , June [4] O. Ozel and S. Ulukus. Achevng AWGN capacty under stochastc energy harvestng. IEEE Trans. on Informaton Theory, 58(0): , October 202. [5] O. Ozel and S. Ulukus. AWGN channel under tme-varyng ampltude constrants wth causal nformaton at the transmtter. In Aslomar Conference, November 20. [6] C. E. Shannon. Channels wth sde nformaton at the transmtter. IBM Jour. of Research and Development, 2(4): , 958. [7] K. Tutuncuoglu, O. Ozel, A. Yener, and S. Ulukus. Bnary energy harvestng channel wth fnte energy storage. In IEEE ISIT, July 203. [8] W. Mao and B. Hassb. On the capacty of a communcaton system wth energy harvestng and a lmted battery. In IEEE ISIT, July 203. [9] K. Tutuncuoglu, O. Ozel, A. Yener, and S. Ulukus. Improved capacty bounds for the bnary energy harvestng channel. In IEEE ISIT, June 204. [0] O. Ozel, K. Tutuncuoglu, S. Ulukus, and A. Yener. Capacty of the dscrete memoryless energy harvestng channel wth sde nformaton. In IEEE ISIT, June 204. [] Y. Dong and A. Özgür. Approxmate capacty of energy harvestng communcaton wth fnte battery. In IEEE ISIT, June 204. [2] V. Jog and V. Anantharam. An energy harvestng AWGN channel wth a fnte battery. In IEEE ISIT, June 204. [3] O. Ozel and S. Ulukus. Energy state amplfcaton n an energy harvestng communcaton system. In IEEE ISIT, July 202.
ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006)
ECE 534: Elements of Informaton Theory Solutons to Mdterm Eam (Sprng 6) Problem [ pts.] A dscrete memoryless source has an alphabet of three letters,, =,, 3, wth probabltes.4,.4, and., respectvely. (a)
More informationLecture 3: Shannon s Theorem
CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts
More informationLecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem.
Lecture 14 (03/27/18). Channels. Decodng. Prevew of the Capacty Theorem. A. Barg The concept of a communcaton channel n nformaton theory s an abstracton for transmttng dgtal (and analog) nformaton from
More informationTwo-Way and Multiple-Access Energy Harvesting Systems with Energy Cooperation
Two-Way and Multple-Access Energy Harvestng Systems wth Energy Cooperaton Berk Gurakan, Omur Ozel, Jng Yang 2, and Sennur Ulukus Department of Electrcal and Computer Engneerng, Unversty of Maryland, College
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationChapter 7 Channel Capacity and Coding
Chapter 7 Channel Capacty and Codng Contents 7. Channel models and channel capacty 7.. Channel models Bnary symmetrc channel Dscrete memoryless channels Dscrete-nput, contnuous-output channel Waveform
More informationError Probability for M Signals
Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal
More informationChapter 7 Channel Capacity and Coding
Wreless Informaton Transmsson System Lab. Chapter 7 Channel Capacty and Codng Insttute of Communcatons Engneerng atonal Sun Yat-sen Unversty Contents 7. Channel models and channel capacty 7.. Channel models
More informationEGR 544 Communication Theory
EGR 544 Communcaton Theory. Informaton Sources Z. Alyazcoglu Electrcal and Computer Engneerng Department Cal Poly Pomona Introducton Informaton Source x n Informaton sources Analog sources Dscrete sources
More informationCapacity of the Discrete Memoryless Energy Harvesting Channel with Side Information
204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener
More informationEntropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or
Sgnal Compresson Sgnal Compresson Entropy Codng Entropy codng s also known as zero-error codng, data compresson or lossless compresson. Entropy codng s wdely used n vrtually all popular nternatonal multmeda
More informationResource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud
Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal
More informationFoundations of Arithmetic
Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an
More informationRate-Memory Trade-off for the Two-User Broadcast Caching Network with Correlated Sources
Rate-Memory Trade-off for the Two-User Broadcast Cachng Network wth Correlated Sources Parsa Hassanzadeh, Antona M. Tulno, Jame Llorca, Elza Erkp arxv:705.0466v [cs.it] May 07 Abstract Ths paper studes
More informationECE559VV Project Report
ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate
More informationAnalysis of Discrete Time Queues (Section 4.6)
Analyss of Dscrete Tme Queues (Secton 4.6) Copyrght 2002, Sanjay K. Bose Tme axs dvded nto slots slot slot boundares Arrvals can only occur at slot boundares Servce to a job can only start at a slot boundary
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More informationApplication of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations
Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work
More informationNP-Completeness : Proofs
NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem
More informationVQ widely used in coding speech, image, and video
at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng
More informationREAL ANALYSIS I HOMEWORK 1
REAL ANALYSIS I HOMEWORK CİHAN BAHRAN The questons are from Tao s text. Exercse 0.0.. If (x α ) α A s a collecton of numbers x α [0, + ] such that x α
More informationMore metrics on cartesian products
More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of
More informationLecture 4: November 17, Part 1 Single Buffer Management
Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input
More informationU.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017
U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 4s Luca Trevsan September 5, 07 Summary of Lecture 4 In whch we ntroduce semdefnte programmng and apply t to Max Cut. Semdefnte Programmng Recall that
More informationProblem Set 9 Solutions
Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem
More informationApproximately achieving Gaussian relay network capacity with lattice codes
Approxmately achevng Gaussan relay network capacty wth lattce codes Ayfer Özgür EFL, Lausanne, Swtzerland ayfer.ozgur@epfl.ch Suhas Dggav UCLA, USA and EFL, Swtzerland suhas@ee.ucla.edu Abstract Recently,
More informationOn the Correlation between Boolean Functions of Sequences of Random Variables
On the Correlaton between Boolean Functons of Sequences of Random Varables Farhad Shran Chaharsoogh Electrcal Engneerng and Computer Scence Unversty of Mchgan Ann Arbor, Mchgan, 48105 Emal: fshran@umch.edu
More informationBounds on the Effective-length of Optimal Codes for Interference Channel with Feedback
Bounds on the Effectve-length of Optmal Codes for Interference Channel wth Feedback Mohsen Hedar EECS Department Unversty of Mchgan Ann Arbor,USA Emal: mohsenhd@umch.edu Farhad Shran ECE Department New
More informationApplied Stochastic Processes
STAT455/855 Fall 23 Appled Stochastc Processes Fnal Exam, Bref Solutons 1. (15 marks) (a) (7 marks) The dstrbuton of Y s gven by ( ) ( ) y 2 1 5 P (Y y) for y 2, 3,... The above follows because each of
More informationOn Network Coding of Independent and Dependent Sources in Line Networks
On Network Codng of Independent and Dependent Sources n Lne Networks Mayank Baksh, Mchelle Effros, WeHsn Gu, Ralf Koetter Department of Electrcal Engneerng Department of Electrcal Engneerng Calforna Insttute
More informationEdge Isoperimetric Inequalities
November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary
More informationCollege of Computer & Information Science Fall 2009 Northeastern University 20 October 2009
College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:
More informationIntroduction to Information Theory, Data Compression,
Introducton to Informaton Theory, Data Compresson, Codng Mehd Ibm Brahm, Laura Mnkova Aprl 5, 208 Ths s the augmented transcrpt of a lecture gven by Luc Devroye on the 3th of March 208 for a Data Structures
More informationStructure and Drive Paul A. Jensen Copyright July 20, 2003
Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.
More informationSignal space Review on vector space Linear independence Metric space and norm Inner product
Sgnal space.... Revew on vector space.... Lnear ndependence... 3.3 Metrc space and norm... 4.4 Inner product... 5.5 Orthonormal bass... 7.6 Waveform communcaton system... 9.7 Some examples... 6 Sgnal space
More informationConnecting Multiple-unicast and Network Error Correction: Reduction and Unachievability
Connectng Multple-uncast and Network Error Correcton: Reducton and Unachevablty Wentao Huang Calforna Insttute of Technology Mchael Langberg Unversty at Buffalo, SUNY Joerg Klewer New Jersey Insttute of
More informationConsider the following passband digital communication system model. c t. modulator. t r a n s m i t t e r. signal decoder.
PASSBAND DIGITAL MODULATION TECHNIQUES Consder the followng passband dgtal communcaton system model. cos( ω + φ ) c t message source m sgnal encoder s modulator s () t communcaton xt () channel t r a n
More informationCHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE
CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng
More informationDC-Free Turbo Coding Scheme Using MAP/SOVA Algorithms
Proceedngs of the 5th WSEAS Internatonal Conference on Telecommuncatons and Informatcs, Istanbul, Turkey, May 27-29, 26 (pp192-197 DC-Free Turbo Codng Scheme Usng MAP/SOVA Algorthms Prof. Dr. M. Amr Mokhtar
More informationCSCE 790S Background Results
CSCE 790S Background Results Stephen A. Fenner September 8, 011 Abstract These results are background to the course CSCE 790S/CSCE 790B, Quantum Computaton and Informaton (Sprng 007 and Fall 011). Each
More informationTHE ARIMOTO-BLAHUT ALGORITHM FOR COMPUTATION OF CHANNEL CAPACITY. William A. Pearlman. References: S. Arimoto - IEEE Trans. Inform. Thy., Jan.
THE ARIMOTO-BLAHUT ALGORITHM FOR COMPUTATION OF CHANNEL CAPACITY Wllam A. Pearlman 2002 References: S. Armoto - IEEE Trans. Inform. Thy., Jan. 1972 R. Blahut - IEEE Trans. Inform. Thy., July 1972 Recall
More informationExplicit and Implicit Temperature Constraints in Energy Harvesting Communications
Explct and Implct Temperature Constrants n Energy Harvestng Communcatons Abdulrahman Baknna, Omur Ozel 2, and Sennur Ulukus Department of Electrcal and Computer Engneerng, Unversty of Maryland, College
More informationprinceton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg
prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there
More informationIN THE paradigm of network coding, a set of source nodes
4496 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 6, JUNE 2018 Sngle-Uncast Secure Network Codng and Network Error Correcton are as Hard as Multple-Uncast Network Codng Wentao Huang, Tracey Ho,
More information3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X
Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number
More informationMASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.65/15.070J Fall 013 Lecture 1 10/1/013 Martngale Concentraton Inequaltes and Applcatons Content. 1. Exponental concentraton for martngales wth bounded ncrements.
More informationThe Two-User Gaussian Fading Broadcast Channel
The Two-User Gaussan Fadng Broadcast Channel Amn Jafaran Lab of Informatcs, Networks & Communcatons LINC Department of Electrcal & Computer Engneerng Unversty of Texas at Austn Austn, TX 787, USA Emal:
More informationAPPENDIX A Some Linear Algebra
APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,
More informationPower law and dimension of the maximum value for belief distribution with the max Deng entropy
Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng
More informationChannel Encoder. Channel. Figure 7.1: Communication system
Chapter 7 Processes The model of a communcaton system that we have been developng s shown n Fgure 7.. Ths model s also useful for some computaton systems. The source s assumed to emt a stream of symbols.
More informationSimultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals
Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,
More informationLecture 20: Lift and Project, SDP Duality. Today we will study the Lift and Project method. Then we will prove the SDP duality theorem.
prnceton u. sp 02 cos 598B: algorthms and complexty Lecture 20: Lft and Project, SDP Dualty Lecturer: Sanjeev Arora Scrbe:Yury Makarychev Today we wll study the Lft and Project method. Then we wll prove
More information4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA
4 Analyss of Varance (ANOVA) 5 ANOVA 51 Introducton ANOVA ANOVA s a way to estmate and test the means of multple populatons We wll start wth one-way ANOVA If the populatons ncluded n the study are selected
More informationTracking with Kalman Filter
Trackng wth Kalman Flter Scott T. Acton Vrgna Image and Vdeo Analyss (VIVA), Charles L. Brown Department of Electrcal and Computer Engneerng Department of Bomedcal Engneerng Unversty of Vrgna, Charlottesvlle,
More informationNotes on Frequency Estimation in Data Streams
Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to
More informationExercises of Chapter 2
Exercses of Chapter Chuang-Cheh Ln Department of Computer Scence and Informaton Engneerng, Natonal Chung Cheng Unversty, Mng-Hsung, Chay 61, Tawan. Exercse.6. Suppose that we ndependently roll two standard
More informationLectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix
Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could
More informationRefined Coding Bounds for Network Error Correction
Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department
More informationprinceton univ. F 13 cos 521: Advanced Algorithm Design Lecture 3: Large deviations bounds and applications Lecturer: Sanjeev Arora
prnceton unv. F 13 cos 521: Advanced Algorthm Desgn Lecture 3: Large devatons bounds and applcatons Lecturer: Sanjeev Arora Scrbe: Today s topc s devaton bounds: what s the probablty that a random varable
More informationCOMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
More information= z 20 z n. (k 20) + 4 z k = 4
Problem Set #7 solutons 7.2.. (a Fnd the coeffcent of z k n (z + z 5 + z 6 + z 7 + 5, k 20. We use the known seres expanson ( n+l ( z l l z n below: (z + z 5 + z 6 + z 7 + 5 (z 5 ( + z + z 2 + z + 5 5
More informationn α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0
MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector
More information2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification
E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton
More informationA new construction of 3-separable matrices via an improved decoding of Macula s construction
Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula
More informationA Note on Bound for Jensen-Shannon Divergence by Jeffreys
OPEN ACCESS Conference Proceedngs Paper Entropy www.scforum.net/conference/ecea- A Note on Bound for Jensen-Shannon Dvergence by Jeffreys Takuya Yamano, * Department of Mathematcs and Physcs, Faculty of
More informationGames of Threats. Elon Kohlberg Abraham Neyman. Working Paper
Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017
More informationEcon107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)
I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes
More informationThe Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction
ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also
More information4884 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 12, DECEMBER Energy Cooperation in Energy Harvesting Communications
4884 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 6, NO., DECEMBER 3 Energy Cooperaton n Energy Harvestng Communcatons Ber Guraan, Student Member, IEEE, Omur Ozel, Student Member, IEEE, Jng Yang, Member,
More informationOn Information Theoretic Games for Interference Networks
On Informaton Theoretc Games for Interference Networks Suvarup Saha and Randall A. Berry Dept. of EECS Northwestern Unversty e-mal: suvarups@u.northwestern.edu rberry@eecs.northwestern.edu Abstract The
More informationMath 426: Probability MWF 1pm, Gasson 310 Homework 4 Selected Solutions
Exercses from Ross, 3, : Math 26: Probablty MWF pm, Gasson 30 Homework Selected Solutons 3, p. 05 Problems 76, 86 3, p. 06 Theoretcal exercses 3, 6, p. 63 Problems 5, 0, 20, p. 69 Theoretcal exercses 2,
More informationSupporting Information
Supportng Informaton The neural network f n Eq. 1 s gven by: f x l = ReLU W atom x l + b atom, 2 where ReLU s the element-wse rectfed lnear unt, 21.e., ReLUx = max0, x, W atom R d d s the weght matrx to
More informationVapnik-Chervonenkis theory
Vapnk-Chervonenks theory Rs Kondor June 13, 2008 For the purposes of ths lecture, we restrct ourselves to the bnary supervsed batch learnng settng. We assume that we have an nput space X, and an unknown
More informationYong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 )
Kangweon-Kyungk Math. Jour. 4 1996), No. 1, pp. 7 16 AN ITERATIVE ROW-ACTION METHOD FOR MULTICOMMODITY TRANSPORTATION PROBLEMS Yong Joon Ryang Abstract. The optmzaton problems wth quadratc constrants often
More informationMAXIMUM A POSTERIORI TRANSDUCTION
MAXIMUM A POSTERIORI TRANSDUCTION LI-WEI WANG, JU-FU FENG School of Mathematcal Scences, Peng Unversty, Bejng, 0087, Chna Center for Informaton Scences, Peng Unversty, Bejng, 0087, Chna E-MIAL: {wanglw,
More informationU.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 6 Luca Trevisan September 12, 2017
U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 6 Luca Trevsan September, 07 Scrbed by Theo McKenze Lecture 6 In whch we study the spectrum of random graphs. Overvew When attemptng to fnd n polynomal
More informationChapter 8 SCALAR QUANTIZATION
Outlne Chapter 8 SCALAR QUANTIZATION Yeuan-Kuen Lee [ CU, CSIE ] 8.1 Overvew 8. Introducton 8.4 Unform Quantzer 8.5 Adaptve Quantzaton 8.6 Nonunform Quantzaton 8.7 Entropy-Coded Quantzaton Ch 8 Scalar
More informationHMMT February 2016 February 20, 2016
HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,
More informationExternalities in wireless communication: A public goods solution approach to power allocation. by Shrutivandana Sharma
Externaltes n wreless communcaton: A publc goods soluton approach to power allocaton by Shrutvandana Sharma SI 786 Tuesday, Feb 2, 2006 Outlne Externaltes: Introducton Plannng wth externaltes Power allocaton:
More informationS Advanced Digital Communication (4 cr) Targets today
S.72-3320 Advanced Dtal Communcaton (4 cr) Convolutonal Codes Tarets today Why to apply convolutonal codn? Defnn convolutonal codes Practcal encodn crcuts Defnn qualty of convolutonal codes Decodn prncples
More informationFinding Dense Subgraphs in G(n, 1/2)
Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng
More informationLecture 10 Support Vector Machines II
Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed
More informationStat260: Bayesian Modeling and Inference Lecture Date: February 22, Reference Priors
Stat60: Bayesan Modelng and Inference Lecture Date: February, 00 Reference Prors Lecturer: Mchael I. Jordan Scrbe: Steven Troxler and Wayne Lee In ths lecture, we assume that θ R; n hgher-dmensons, reference
More informationAn Interactive Optimisation Tool for Allocation Problems
An Interactve Optmsaton ool for Allocaton Problems Fredr Bonäs, Joam Westerlund and apo Westerlund Process Desgn Laboratory, Faculty of echnology, Åbo Aadem Unversty, uru 20500, Fnland hs paper presents
More informationErrors for Linear Systems
Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch
More informationk t+1 + c t A t k t, t=0
Macro II (UC3M, MA/PhD Econ) Professor: Matthas Kredler Fnal Exam 6 May 208 You have 50 mnutes to complete the exam There are 80 ponts n total The exam has 4 pages If somethng n the queston s unclear,
More informationLecture 14: Bandits with Budget Constraints
IEOR 8100-001: Learnng and Optmzaton for Sequental Decson Makng 03/07/16 Lecture 14: andts wth udget Constrants Instructor: Shpra Agrawal Scrbed by: Zhpeng Lu 1 Problem defnton In the regular Mult-armed
More informationPower Allocation for Distributed BLUE Estimation with Full and Limited Feedback of CSI
Power Allocaton for Dstrbuted BLUE Estmaton wth Full and Lmted Feedback of CSI Mohammad Fanae, Matthew C. Valent, and Natala A. Schmd Lane Department of Computer Scence and Electrcal Engneerng West Vrgna
More informationThe optimal delay of the second test is therefore approximately 210 hours earlier than =2.
THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple
More informationThe Minimum Universal Cost Flow in an Infeasible Flow Network
Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran
More informationEntropy of Markov Information Sources and Capacity of Discrete Input Constrained Channels (from Immink, Coding Techniques for Digital Recorders)
Entropy of Marov Informaton Sources and Capacty of Dscrete Input Constraned Channels (from Immn, Codng Technques for Dgtal Recorders). Entropy of Marov Chans We have already ntroduced the noton of entropy
More informationarxiv: v1 [math.co] 1 Mar 2014
Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest
More informationFirst day August 1, Problems and Solutions
FOURTH INTERNATIONAL COMPETITION FOR UNIVERSITY STUDENTS IN MATHEMATICS July 30 August 4, 997, Plovdv, BULGARIA Frst day August, 997 Problems and Solutons Problem. Let {ε n } n= be a sequence of postve
More informationAssuming that the transmission delay is negligible, we have
Baseband Transmsson of Bnary Sgnals Let g(t), =,, be a sgnal transmtted over an AWG channel. Consder the followng recever g (t) + + Σ x(t) LTI flter h(t) y(t) t = nt y(nt) threshold comparator Decson ˆ
More informationComplete subgraphs in multipartite graphs
Complete subgraphs n multpartte graphs FLORIAN PFENDER Unverstät Rostock, Insttut für Mathematk D-18057 Rostock, Germany Floran.Pfender@un-rostock.de Abstract Turán s Theorem states that every graph G
More informationThe Second Anti-Mathima on Game Theory
The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player
More informationGeneralized Linear Methods
Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set
More informationSolutions HW #2. minimize. Ax = b. Give the dual problem, and make the implicit equality constraints explicit. Solution.
Solutons HW #2 Dual of general LP. Fnd the dual functon of the LP mnmze subject to c T x Gx h Ax = b. Gve the dual problem, and make the mplct equalty constrants explct. Soluton. 1. The Lagrangan s L(x,
More informationGoogle PageRank with Stochastic Matrix
Google PageRank wth Stochastc Matrx Md. Sharq, Puranjt Sanyal, Samk Mtra (M.Sc. Applcatons of Mathematcs) Dscrete Tme Markov Chan Let S be a countable set (usually S s a subset of Z or Z d or R or R d
More information