Interference Alignment and the Generalized Degrees of Freedom of the X Channel

Size: px
Start display at page:

Download "Interference Alignment and the Generalized Degrees of Freedom of the X Channel"

Transcription

1 Iterferece Aligmet ad the Geeralized Degrees of Freedom of the X Chael Chiachi Huag, Viveck R. Cadambe, Syed A. Jafar Electrical Egieerig ad Computer Sciece Uiversity of Califoria Irvie Irvie, Califoria, USA {chiachih, vcadambe, syed}@uci.edu Abstract We study the sum capacity of the X chael geeralizatio of the symmetric -user iterferece chael. I this X chael, there are idepedet messages, oe from each trasmitter to each receiver. We characterize the sum capacity of a determiistic versio of this chael, ad obtai the geeralized degrees of freedom characterizatio for the Gaussia versio. The regime where the X chael outperforms the uderlyig iterferece chael is explicitly idetified, ad a iterestig iterferece aligmet scheme based o a cyclic decompositio of the sigal space is show to be optimal i this regime. I. INTRODUCTION The X chael is a geeralizatio of the -user iterferece chael with idepedet messages, oe from each trasmitter to each receiver. It holds special sigificace for a umber of reasos: ) Iterferece Aligmet: It is the smallest (i terms of the umber of odes) etwork where the ewly discovered cocept of iterferece aligmet [], [] becomes relevat. ) Structured Codes: The X chael is related to the double dirty multiple access chael [] where liear codes have bee show to outperform radom codes. This is because, like the double dirty multiple access chael, each trasmitter i a X chael has side-iformatio about its ow potetially iterferig trasmissios to the other receiver. I this paper, we explore the capacity of the X chael as a steppig stoe to a improved uderstadig of the role of iterferece aligmet ad structured codig i wireless etworks. For simplicity of expositio, we choose as a baselie the symmetric iterferece chael model ad study its X chael extesio. We idetify the regime where iterferece aligmet is helpful so that the X chael has a higher capacity tha the uderlyig symmetric iterferece chael. The iterferece aligmet is accomplished usig a liear codig scheme based o a cyclic decompositio of the sigal space which is of iterest i ad of itself. Etki, Tse, ad Wag [] itroduced the otio of geeralized degrees of freedom (GDOF) to study the performace of various iterferece maagemet schemes. As its ame suggests, the idea of GDOF is a geeralizatio of the cocept of degrees of freedom. Ulike the covetioal degrees of freedom perspective where all sigals are approximately equally strog i the db scale, the GDOF perspective provides a richer characterizatio by allowig the full rage of relative sigal stregths i the db scale. A useful techique i the characterizatio of the GDOF of a wireless etwork is the determiistic approach [5]. The determiistic approach essetially maps a Gaussia etwork to a determiistic chael, i.e, a chael whose outputs are determiistic fuctios of its iputs. The determiistic chael captures the essetial structure of the Gaussia chael, but is sigificatly simpler to aalyze. Referece [6] showed that the determiistic approach leads to a GDOF characterizatio of the -user iterferece etwork, which leads to a costat bit approximatio of its capacity. I this paper, usig a determiistic approach, we characterize the sum capacity of a determiistic X chael, ad obtai the GDOF characterizatio for the Gaussia versio. Although the models are simplified to symmetric settig, our results provide a iterestig view of the structural differece betwee the X chael ad the iterferece chael. I terms of GDOF, both chaels perform equally well whe iterferece aligmet is ot applicable. But whe iterferece aligmet is applicable, the X chael has larger GDOF ad, therefore, higher capacity tha the iterferece chael. The rest of the paper is orgaized as follows. Sectio II describes the models. Sectio III summarizes our mai results. I Sectio IV, we explore the sum capacity of the determiistic X chael. Sectio V provides the GDOF characterizatio of the symmetric Gaussia X chael. II. SYSTEM MODEL A. The Symmetric Determiistic X Chael The symmetric determiistic X chael is described by the iput-output equatios Y (t) S q X (t)+s q c X (t) () Y (t) S q c X (t)+s q X (t) () where, c Z +,q max(, c ), X i (t), Y i (t) F q for i,, ad S is a q q shift matrix. The determiistic X chael is physically the same chael as the determiistic iterferece chael itroduced i [6], except that the X chael has idepedet messages. Please refer to [6] for the illustratio of the determiistic chael. The message set

2 ad stadard defiitios ad otatios of the achievable rates are similar to those i the Gaussia settig give i the ext subsectio. To avoid cofusio, sometimes we add the subscript det to distiguish the otatios of the determiistic chael from those for the Gaussia chael. W,W X " Z Y W, W B. The Symmetric Gaussia X Chael The symmetric -user Gaussia X chael is described by the iput-output equatios Y (t) H d X (t)+h c X (t)+z (t) () Y (t) H c X (t)+h d X (t)+z (t) () where at symbol idex t, Y j (t) ad Z j (t) are the chael output symbol ad additive white Gaussia oise (AWGN) respectively at receiver j. H c ad H d are the chael gai coefficiets, ad X i (t) is the chael iput symbol at trasmitter i. All symbols are real ad the chael coefficiets do ot vary with time. I the remaider of this paper, we suppress time idex t if o cofusio would be caused. The AWGN is ormalized to have zero mea ad uit variace ad the iput power costrait is give by E [ Xi ], i,. (5) There are idepedet messages i the X chael: W,W,W,W where W ji represets the message from trasmitter i to receiver j. We idicate the size of the message by W ji. For codewords spaig T symbols, rates log Wji R ji T are achievable if the probability of error for all messages ca be simultaeously made arbitrarily small by choosig a appropriate large T. The capacity regio C of the X chael is the set of all achievable rate tuples R (R,R,R,R ). We idicate the sum rate ad the sum capacity of the X chael by R Σ ad C Σ respectively. ) Geeralized Degrees of Freedom (GDOF): The same problem formulatio has bee give i [7], ad we iclude it for the sake of completeess. To motivate our problem formulatio, we briefly revisit the framework for the GDOF characterizatio of the symmetric iterferece chael. The iterferece chael is defied as: Y (t) SNRX (t)+ INRX (t)+z (t) (6) Y (t) INRX (t)+ SNRX (t)+z (t) (7) ad with the parameter α defied as follows α log(inr) log(snr) the GDOF metric is defied as [], (8) C Σ (SNR,α) d(α) lim sup SNR log(snr) (9) where C Σ (SNR,α) is the sum capacity of the iterferece chael. Sice our goal is to compare GDOF of the X chael with the iterferece chael, we use the same symmetric iterferece chael model described above as the physical W,W X Fig.. " Z -user Gaussia X chael. Y W, W chael model for the X chael. There is however, oe otatioal differece. Sice the termiology SNR, INR is ot as appropriate for the X chael, we istead use the parameter ρ to substitute for these otios, resultig i the followig system model for the X chael GDOF characterizatio: Y (t) ρx (t)+ ρ α X (t)+z (t) (0) Y (t) ρ α X (t)+ ρx (t)+z (t) () I other words, we have set H d ρ, H c ρ α. Note that (0), () represet the same physical chael as (6), (7). However, as metioed earlier, ulike the iterferece chael the X chael has idepedet messages: oe from each trasmitter to each receiver. The GDOF characterizatio for the X chael is defied as: d(α) lim sup ρ C Σ (ρ, α) log(ρ) () where C Σ (ρ, α) is the sum capacity of the X chael. Note that we use lim sup to esure that d(α) always exits. The half i the deomiator is because all sigals ad chael gais are real. III. MAIN RESULTS The first mai result of the paper is the characterizatio of the sum capacity of the symmetric determiistic X chael. The result is give i the followig theorem. Theorem : The sum capacity C Σ ( c, ) of the symmetric determiistic X chael is give as follows. c, 0 c < / c, / c < / ( c), / c < C Σ ( c, ), c () ( c ), < c /, / < c c, c > The key features of the sum-capacity-achievig scheme for the regimes of / c < ad < c / are show i Fig.. It ca be easily see that all iterferece is aliged ad that all iteded messages ca be recovered after cacelig both the decoded messages ad the decoded sums of the aliged iterferece.

3 d ( ) GDOF of X chael GDOF of iterferece chael obtaied by W W " GDOF of iterferece chael obtaied by W W " 5 Fig.. Geeralized degrees of freedom of the -user Gaussia X chael. Fig.. Sum-capacity-achievig scheme for the symmetric determiistic X chael with ( c, ) (, 5) The secod mai result of the paper builds upo the result of Theorem to fid the GDOF characterizatio of the Gaussia X chael. Theorem : The geeralized degrees of freedom d(α) of the symmetric Gaussia X chael is show i Fig. ad give as follows. α, 0 α< / α, / α< / α, / α< d(α), α () α, <α /, / <α α, α > It ca be easily see that the X chael outperforms the uderlyig iterferece chael i the regimes of / α< ad <α /. IV. SUM CAPACITY OF THE SYMMETRIC DETERMINISTIC CHANNEL The goal of this sectio is to prove Theorem. We start from the followig lemma, which follows trivially from the symmetry i the X chael. Lemma : C Σ ( c, )C Σ (, c ). A. Upperboud The followig lemma provides a set of outer bouds for all achievable rate tuples R of the symmetric determiistic X chael. Theorem : All achievable rate tuples (R,R,R,R ) satisfy R + R + R max(, c )+( c ) + (5) R + R + R max( c, )+( c ) + (6) R + R + R max(, c )+( c ) + (7) R + R + R max( c, )+( c ) + (8) R Σ max( c, ( c ) + ) (9) R Σ max(, ( c ) + ) (0) Proof: Iequality (5) to (8) are the upperbouds of the sum capacity for the four Z chaels cotaied i the X chael respectively. Iequality (9) ad (0) ca be see as the X chael extesios of the boud give i (9.c) of [8]. Please see the full paper [9] for the detailed proof i a more geeral asymmetric settig. It is easy to verify that (9) ad (0) lead to the tight upperbouds of the sum capacity i the regimes of 0 c < / ad c > / respectively. Addig (5) to (8) ad dividig both sides by, we have R Σ max ( c, )+ ( c ) + + ( c ) +. () The tight upperboud of the sum capacity for c follows from () ad the multiple access boud that if c, we have R Σ. B. Achievable Scheme The achievable scheme for c < c ad > follows trivially from [6]. We provide a outlie of the achievability proof for c. We start from the followig lemma. Lemma 5: Let ( c, ) Z + such that c <. The ) If c is divisible by, the there exists a V F c such that rak ([ V S c V S c V V ull ]) d where V ull is a ( c ) matrix whose colum vectors form a basis for the ullspace of S c ) There exists a V F c such that where rak ([ V H V H V V ull ]) d H S c 0 d 0 d 0 d S c 0 d 0 d 0 d S c

4 Rx Rx e e e He He He d c x [] x [] H e H e H e d c x [] x [] x [] x [] H e H e H e H e ker # H$ d c c d x [] x [] x [] x [] spa e, H e, " spa e,h e, " spa e, H e, " Fig. 5. Sigal levels at receivers for c <. Fig.. A pictorial represetatio of the cyclic decompositio of F with ( c, ) (0, ). H S c ad V ull represets the ( c ) matrix whose colum vectors form a basis for the ullspace of H. Proof: To prove the lemma, we make use of cyclic decompositio, the idea of decomposig F ito several disjoit ivariat subspaces. Fig. gives a illustratio of the cyclic decompositio. Pleas see [9] for the detailed proof. By Lemma, we oly eed to cosider the achievable scheme for c. The achievable scheme is split ito three differet regimes viz. c <, c <, ad c. Achievability for c is trivial, sice a optimal achievable scheme sets W W W φ ad uses all the levels for W at trasmitter. We will treat the other cases below. Case : c < The achievable scheme for this regime is illustrated i Fig. 5. Case : c < We first cosider the case where c is a multiple of. ) Trasmit Scheme: We use liear precodig at the trasmitters. Let V ull F ( c) satisfy S c V ull 0 d ( c). At trasmitter i, we use, as precodig vectors for W ii, colum vectors of the matrix [V V ull ] where V F c. We will shortly explai how V is chose, but here we metio that the colums of V are liearly idepedet of V ull. Note that this implies that S c V has a full rak of c /. For W ji, we use S c V as the precodig matrix so that the trasmitted codeword X i ca be represeted as X i V ˆX ii () + V ull ˆX ii () + S c V ˆX ji () for (i, j) {(, ), (, )}, where ˆX ii () F c ad ˆX ii () F c are colum vectors represetig the bits ecodig W ii. ˆX ji F c is the colum vector of the bits ecodig W ji. ) Receive Scheme: Cosider receiver. The received sigal Y ca be expressed as follows. ( ) V ˆX () + V ull ˆX () + S c V ˆX + ˆX () +S c V ˆX () Now, receiver wishes to decode ˆX (), ˆX (), ˆX usig liear decodig. Notice that the iterferece from ˆX, ˆX () aligs alog S c V. Suppose we choose V such that the colums of the matrix G [ V S c V S c V V ull ] are liearly idepedet, the clearly receiver caecode W,W usig liear decodig. Therefore, i order to show achievability, we eed to show that there exists V so that the matrix G has a full rak of. This is show i Lemma 5. Similar aalysis applies to receiver. Now, we cosider the case where c / is ot a iteger. I this case, we use a symbol extesio of the chael represeted below Y i(t) Y i (t + ) Y i (t + ) } {{ } Ȳ i F X i(t) X i (t + ) } X i (t + ) {{ } X i F + H X j(t) X j (t + ) } X j (t + ) {{ } X j F Like the case where c was a multiple of, a liear precodig ad decodig techique is applicable over this exteded chael. The oly differece i this case is that, we eed to show that there exists a c matrix V such that the matrix Ḡ [ V H V H V V ull ] has a full rak of, where V ull represets the ( c ) basis elemets of the ull space of H. This is show i Lemma 5 as well. This completes the proof of the achievability. Remark: I the regime of c <, the sum-capacityachievig scheme eeds to satisfy the challegig coditio of achievig (5) to (8) simultaeously. Ad the scheme solves the problem by efficietly aligig the iterferece: for the c levels that receiver j ca see the sigals from both trasmitters, c of them are used for W jj, c of them are used for W ji, ad c of them are used for aligig W ii ad W ij, i j. V. GENERALIZED DEGREES OF FREEDOM OF THE SYMMETRIC GAUSSIAN X CHANNEL To prove Theorem, we start from the followig lemma. Lemma 6: d(α) αd( α ). Proof: The lemma is proved usig the symmetry of the X chael. Please see [9] for the details.

5 By Lemma 6, we oly eed to fid d(α) for α. Sice d(α) for α has bee established i Theorem of [7], we oly cosider the remaiig case of <α. The upperbouds are derived usig the isights obtaied from the determiistic settig. Please see [9] for the detailed derivatio ad the coectio betwee the determiistic ad Gaussia cases. The achievable scheme is similar to those used i [0], [], ad we iclude a outlie of the proof for the sake of the completeess. For a give α [, ], we ca fid a (, c ) Z + ad a very small oegative value ɛ such that α ( c + ɛ( c )). () Note that whe α is a ratioal umber, ɛ is chose to be zero. But whe α is ot ratioal, ɛ( c )/ is used to compesate the differece betwee α ad a ratioal umber c that is very close to α. We choose ( c, ) such that () ca be achieved without symbol extesio for the symmetric determiistic chael with parameter ( c, ). Cosider the sequece of chaels, i.e. ρ idexed by N, such that ρ Q N ɛ (5) where Q is a very large but fixed positive iteger ad N is a positive iteger whose value grows to ifiity. Note that ρ grows to ifiity as N grows to ifiity. ) Trasmit Scheme: We impose the followig structure o the Q-ary represetatio of the trasmit sigal X i at trasmitter i for i {, }. X i N d x i,k Q k (6) ρ k0 The values of x i,k are restricted to the set {,..., Q } to esure that the additio of iterferece does ot produce carry over. It s easy to see that the power costrait is satisfied. Sice the sigal desig process developed i the Sectio IV-B also works i F N Q, we ca use it to fid the trasmit sigals X, X F N for the symmetric Q determiistic chael with parameter (N c, N ) ad the obtai the correspodig X,X R + by X i ρ [ Q N Q N Q Q ] X i. ) Receive Scheme : Each receiver takes the magitude of the received sigal, reduces to modulo Q N, discards the value below the decimal poit, ad expresses the result i Q- ary represetatio as Y i Y i mod Q N (7) N k0 y i,k Q k, y i,k {0,,..., Q } (8) Substitutig () ad (5) ito (0) ad (), we ca rewrite the iput output equatio as Y i X i + Q N(c ) X j + Z i, (i, j) {(, ), (, )} where X i ρxi Note that multiplicatio by Q N(c d) shifts the decimal poit i the Q-ary represetatio of X j by N( c ) places to the left. Thus, i the absece of oise, the N digits of X, X, Y, ad Y behave exactly like the symmetric determiistic chael with parameter (N c, N ). Followig the similar argumets i [0], [], we have R Σ R Σ,det (N c, N ) log Q ( Q )+o(n) (9) NR Σ,det ( c, ) log Q ( Q )+o(n) (0) Combiig (5), (0), ad (9), we ca show that d(α) is ot less tha NR Σ,det ( ( α ɛ lim sup N ɛ ), ) log Q ( Q )+o(n) N ɛ ɛ R Σ,det ( ( α ɛ ɛ ), ) log Q ( Q ) d Carryig out the substitutio of R Σ,det (, ), choosig Q ad ɛ to be arbitrarily large ad small respectively, ad comparig with the outerboud, we fiish the proof of Theorem. ACKNOWLEDGMENT This work was supported by NSF uder Grat CCF ad by ONR YIP uder Grat N REFERENCES [] S. Jafar ad S. Shamai, Degrees of freedom regio for the MIMO X chael, IEEE Tras. Iform. Theory, vol. 5, pp. 5 70, Ja [] M. Maddah-Ali, A. Motahari, ad A. Khadai, Commuicatio over MIMO X chaels: iterferece aligmet, decompositio, ad performace aalysis, IEEE Tras. Iform. Theory, vol. 5, pp , Aug [] T. Philosof ad R. Zamir, The rate loss of sigle-letter characterizatio: the dirty multiple access chael, arxiv:080.0v [cs.it], Mar [] R. Etki, D. Tse, ad H. Wag, Gaussia iterferece chael capacity to withi oe bit, IEEE Tras. Iform. Theory, vol. 5, pp , Dec [5] A. Avestimehr, S. Diggavi, ad D. Tse, A determiistic approach to wireless relay etworks, arxiv: [cs.it], Oct [6] G. Bresler ad D. Tse, The two-user Gaussia iterferece chael: a determiistic view, Europea Tras. i Telecommuicatios, vol. 9, pp. 5, Jue 008. [7] C. Huag, V. Cadambe, ad S. Jafar, Geeralized degrees of freedom of the (oisy) X chael, i Proc. Asilomar Coferece o Sigals, Systems, ad Cotrol, Oct [8] A. E. Gamal ad M. Costa, The capacity regio of a class of determiistic iterferece chaels, IEEE Tras. Iform. Theory, vol., pp. 6, March 98. [9] C. Huag, V. Cadambe, ad S. Jafar, O the capacity ad the geeralized degrees of freedom of the X chael, arxiv:080.7 [cs.it], Oct [0] S. Jafar ad S. Vishwaath, Geeralized degrees of freedom of the symmetric Gaussia k user iterferece chael. arxiv: [cs.it], Apr [] V. Cadambe, S. Jafar, ad S. Shamai, Iterferece aligmet o the determiistic chael ad applicatio to gaussia etworks, IEEE Tras. Iform. Theory, vol. 55, pp. 69 7, Ja. 009.

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly

More information

Properties of MLE: consistency, asymptotic normality. Fisher information.

Properties of MLE: consistency, asymptotic normality. Fisher information. Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout

More information

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5 Sectio 13 Kolmogorov-Smirov test. Suppose that we have a i.i.d. sample X 1,..., X with some ukow distributio P ad we would like to test the hypothesis that P is equal to a particular distributio P 0, i.e.

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

Asymptotic Growth of Functions

Asymptotic Growth of Functions CMPS Itroductio to Aalysis of Algorithms Fall 3 Asymptotic Growth of Fuctios We itroduce several types of asymptotic otatio which are used to compare the performace ad efficiecy of algorithms As we ll

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

1 The Gaussian channel

1 The Gaussian channel ECE 77 Lecture 0 The Gaussia chael Objective: I this lecture we will lear about commuicatio over a chael of practical iterest, i which the trasmitted sigal is subjected to additive white Gaussia oise.

More information

Lecture 4: Cheeger s Inequality

Lecture 4: Cheeger s Inequality Spectral Graph Theory ad Applicatios WS 0/0 Lecture 4: Cheeger s Iequality Lecturer: Thomas Sauerwald & He Su Statemet of Cheeger s Iequality I this lecture we assume for simplicity that G is a d-regular

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

1. MATHEMATICAL INDUCTION

1. MATHEMATICAL INDUCTION 1. MATHEMATICAL INDUCTION EXAMPLE 1: Prove that for ay iteger 1. Proof: 1 + 2 + 3 +... + ( + 1 2 (1.1 STEP 1: For 1 (1.1 is true, sice 1 1(1 + 1. 2 STEP 2: Suppose (1.1 is true for some k 1, that is 1

More information

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here).

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here). BEGINNING ALGEBRA Roots ad Radicals (revised summer, 00 Olso) Packet to Supplemet the Curret Textbook - Part Review of Square Roots & Irratioals (This portio ca be ay time before Part ad should mostly

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

THE HEIGHT OF q-binary SEARCH TREES

THE HEIGHT OF q-binary SEARCH TREES THE HEIGHT OF q-binary SEARCH TREES MICHAEL DRMOTA AND HELMUT PRODINGER Abstract. q biary search trees are obtaied from words, equipped with the geometric distributio istead of permutatios. The average

More information

Sequences and Series

Sequences and Series CHAPTER 9 Sequeces ad Series 9.. Covergece: Defiitio ad Examples Sequeces The purpose of this chapter is to itroduce a particular way of geeratig algorithms for fidig the values of fuctios defied by their

More information

THE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n

THE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n We will cosider the liear regressio model i matrix form. For simple liear regressio, meaig oe predictor, the model is i = + x i + ε i for i =,,,, This model icludes the assumptio that the ε i s are a sample

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Lecture 4: Cauchy sequences, Bolzano-Weierstrass, and the Squeeze theorem

Lecture 4: Cauchy sequences, Bolzano-Weierstrass, and the Squeeze theorem Lecture 4: Cauchy sequeces, Bolzao-Weierstrass, ad the Squeeze theorem The purpose of this lecture is more modest tha the previous oes. It is to state certai coditios uder which we are guarateed that limits

More information

Case Study. Normal and t Distributions. Density Plot. Normal Distributions

Case Study. Normal and t Distributions. Density Plot. Normal Distributions Case Study Normal ad t Distributios Bret Halo ad Bret Larget Departmet of Statistics Uiversity of Wiscosi Madiso October 11 13, 2011 Case Study Body temperature varies withi idividuals over time (it ca

More information

On the Capacity of Hybrid Wireless Networks

On the Capacity of Hybrid Wireless Networks O the Capacity of Hybrid ireless Networks Beyua Liu,ZheLiu +,DoTowsley Departmet of Computer Sciece Uiversity of Massachusetts Amherst, MA 0002 + IBM T.J. atso Research Ceter P.O. Box 704 Yorktow Heights,

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring No-life isurace mathematics Nils F. Haavardsso, Uiversity of Oslo ad DNB Skadeforsikrig Mai issues so far Why does isurace work? How is risk premium defied ad why is it importat? How ca claim frequecy

More information

Systems Design Project: Indoor Location of Wireless Devices

Systems Design Project: Indoor Location of Wireless Devices Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: bcm1@cec.wustl.edu Supervised

More information

Lesson 15 ANOVA (analysis of variance)

Lesson 15 ANOVA (analysis of variance) Outlie Variability -betwee group variability -withi group variability -total variability -F-ratio Computatio -sums of squares (betwee/withi/total -degrees of freedom (betwee/withi/total -mea square (betwee/withi

More information

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

Chapter 7: Confidence Interval and Sample Size

Chapter 7: Confidence Interval and Sample Size Chapter 7: Cofidece Iterval ad Sample Size Learig Objectives Upo successful completio of Chapter 7, you will be able to: Fid the cofidece iterval for the mea, proportio, ad variace. Determie the miimum

More information

5 Boolean Decision Trees (February 11)

5 Boolean Decision Trees (February 11) 5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected

More information

Now here is the important step

Now here is the important step LINEST i Excel The Excel spreadsheet fuctio "liest" is a complete liear least squares curve fittig routie that produces ucertaity estimates for the fit values. There are two ways to access the "liest"

More information

Section 11.3: The Integral Test

Section 11.3: The Integral Test Sectio.3: The Itegral Test Most of the series we have looked at have either diverged or have coverged ad we have bee able to fid what they coverge to. I geeral however, the problem is much more difficult

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

Overview of some probability distributions.

Overview of some probability distributions. Lecture Overview of some probability distributios. I this lecture we will review several commo distributios that will be used ofte throughtout the class. Each distributio is usually described by its probability

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. This documet was writte ad copyrighted by Paul Dawkis. Use of this documet ad its olie versio is govered by the Terms ad Coditios of Use located at http://tutorial.math.lamar.edu/terms.asp. The olie versio

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

Basic Elements of Arithmetic Sequences and Series

Basic Elements of Arithmetic Sequences and Series MA40S PRE-CALCULUS UNIT G GEOMETRIC SEQUENCES CLASS NOTES (COMPLETED NO NEED TO COPY NOTES FROM OVERHEAD) Basic Elemets of Arithmetic Sequeces ad Series Objective: To establish basic elemets of arithmetic

More information

Notes on exponential generating functions and structures.

Notes on exponential generating functions and structures. Notes o expoetial geeratig fuctios ad structures. 1. The cocept of a structure. Cosider the followig coutig problems: (1) to fid for each the umber of partitios of a -elemet set, (2) to fid for each the

More information

Convexity, Inequalities, and Norms

Convexity, Inequalities, and Norms Covexity, Iequalities, ad Norms Covex Fuctios You are probably familiar with the otio of cocavity of fuctios. Give a twicedifferetiable fuctio ϕ: R R, We say that ϕ is covex (or cocave up) if ϕ (x) 0 for

More information

1 Correlation and Regression Analysis

1 Correlation and Regression Analysis 1 Correlatio ad Regressio Aalysis I this sectio we will be ivestigatig the relatioship betwee two cotiuous variable, such as height ad weight, the cocetratio of a ijected drug ad heart rate, or the cosumptio

More information

3. Greatest Common Divisor - Least Common Multiple

3. Greatest Common Divisor - Least Common Multiple 3 Greatest Commo Divisor - Least Commo Multiple Defiitio 31: The greatest commo divisor of two atural umbers a ad b is the largest atural umber c which divides both a ad b We deote the greatest commo gcd

More information

Escola Federal de Engenharia de Itajubá

Escola Federal de Engenharia de Itajubá Escola Federal de Egeharia de Itajubá Departameto de Egeharia Mecâica Pós-Graduação em Egeharia Mecâica MPF04 ANÁLISE DE SINAIS E AQUISÇÃO DE DADOS SINAIS E SISTEMAS Trabalho 02 (MATLAB) Prof. Dr. José

More information

Class Meeting # 16: The Fourier Transform on R n

Class Meeting # 16: The Fourier Transform on R n MATH 18.152 COUSE NOTES - CLASS MEETING # 16 18.152 Itroductio to PDEs, Fall 2011 Professor: Jared Speck Class Meetig # 16: The Fourier Trasform o 1. Itroductio to the Fourier Trasform Earlier i the course,

More information

CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8

CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8 CME 30: NUMERICAL LINEAR ALGEBRA FALL 005/06 LECTURE 8 GENE H GOLUB 1 Positive Defiite Matrices A matrix A is positive defiite if x Ax > 0 for all ozero x A positive defiite matrix has real ad positive

More information

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009)

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009) 18.409 A Algorithmist s Toolkit October 27, 2009 Lecture 13 Lecturer: Joatha Keler Scribe: Joatha Pies (2009) 1 Outlie Last time, we proved the Bru-Mikowski iequality for boxes. Today we ll go over the

More information

Factors of sums of powers of binomial coefficients

Factors of sums of powers of binomial coefficients ACTA ARITHMETICA LXXXVI.1 (1998) Factors of sums of powers of biomial coefficiets by Neil J. Cali (Clemso, S.C.) Dedicated to the memory of Paul Erdős 1. Itroductio. It is well ow that if ( ) a f,a = the

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13 EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may

More information

Cooley-Tukey. Tukey FFT Algorithms. FFT Algorithms. Cooley

Cooley-Tukey. Tukey FFT Algorithms. FFT Algorithms. Cooley Cooley Cooley-Tuey Tuey FFT Algorithms FFT Algorithms Cosider a legth- sequece x[ with a -poit DFT X[ where Represet the idices ad as +, +, Cooley Cooley-Tuey Tuey FFT Algorithms FFT Algorithms Usig these

More information

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu

More information

Irreducible polynomials with consecutive zero coefficients

Irreducible polynomials with consecutive zero coefficients Irreducible polyomials with cosecutive zero coefficiets Theodoulos Garefalakis Departmet of Mathematics, Uiversity of Crete, 71409 Heraklio, Greece Abstract Let q be a prime power. We cosider the problem

More information

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL.

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL. Auities Uder Radom Rates of Iterest II By Abraham Zas Techio I.I.T. Haifa ISRAEL ad Haifa Uiversity Haifa ISRAEL Departmet of Mathematics, Techio - Israel Istitute of Techology, 3000, Haifa, Israel I memory

More information

THE ARITHMETIC OF INTEGERS. - multiplication, exponentiation, division, addition, and subtraction

THE ARITHMETIC OF INTEGERS. - multiplication, exponentiation, division, addition, and subtraction THE ARITHMETIC OF INTEGERS - multiplicatio, expoetiatio, divisio, additio, ad subtractio What to do ad what ot to do. THE INTEGERS Recall that a iteger is oe of the whole umbers, which may be either positive,

More information

Infinite Sequences and Series

Infinite Sequences and Series CHAPTER 4 Ifiite Sequeces ad Series 4.1. Sequeces A sequece is a ifiite ordered list of umbers, for example the sequece of odd positive itegers: 1, 3, 5, 7, 9, 11, 13, 15, 17, 19, 21, 23, 25, 27, 29...

More information

Capacity of Wireless Networks with Heterogeneous Traffic

Capacity of Wireless Networks with Heterogeneous Traffic Capacity of Wireless Networks with Heterogeeous Traffic Migyue Ji, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity of Califoria, Sata

More information

Measures of Spread and Boxplots Discrete Math, Section 9.4

Measures of Spread and Boxplots Discrete Math, Section 9.4 Measures of Spread ad Boxplots Discrete Math, Sectio 9.4 We start with a example: Example 1: Comparig Mea ad Media Compute the mea ad media of each data set: S 1 = {4, 6, 8, 10, 1, 14, 16} S = {4, 7, 9,

More information

Trigonometric Form of a Complex Number. The Complex Plane. axis. ( 2, 1) or 2 i FIGURE 6.44. The absolute value of the complex number z a bi is

Trigonometric Form of a Complex Number. The Complex Plane. axis. ( 2, 1) or 2 i FIGURE 6.44. The absolute value of the complex number z a bi is 0_0605.qxd /5/05 0:45 AM Page 470 470 Chapter 6 Additioal Topics i Trigoometry 6.5 Trigoometric Form of a Complex Number What you should lear Plot complex umbers i the complex plae ad fid absolute values

More information

7.1 Finding Rational Solutions of Polynomial Equations

7.1 Finding Rational Solutions of Polynomial Equations 4 Locker LESSON 7. Fidig Ratioal Solutios of Polyomial Equatios Name Class Date 7. Fidig Ratioal Solutios of Polyomial Equatios Essetial Questio: How do you fid the ratioal roots of a polyomial equatio?

More information

How To Solve The Homewor Problem Beautifully

How To Solve The Homewor Problem Beautifully Egieerig 33 eautiful Homewor et 3 of 7 Kuszmar roblem.5.5 large departmet store sells sport shirts i three sizes small, medium, ad large, three patters plaid, prit, ad stripe, ad two sleeve legths log

More information

Universal coding for classes of sources

Universal coding for classes of sources Coexios module: m46228 Uiversal codig for classes of sources Dever Greee This work is produced by The Coexios Project ad licesed uder the Creative Commos Attributio Licese We have discussed several parametric

More information

Lecture 3. denote the orthogonal complement of S k. Then. 1 x S k. n. 2 x T Ax = ( ) λ x. with x = 1, we have. i = λ k x 2 = λ k.

Lecture 3. denote the orthogonal complement of S k. Then. 1 x S k. n. 2 x T Ax = ( ) λ x. with x = 1, we have. i = λ k x 2 = λ k. 18.409 A Algorithmist s Toolkit September 17, 009 Lecture 3 Lecturer: Joatha Keler Scribe: Adre Wibisoo 1 Outlie Today s lecture covers three mai parts: Courat-Fischer formula ad Rayleigh quotiets The

More information

PSYCHOLOGICAL STATISTICS

PSYCHOLOGICAL STATISTICS UNIVERSITY OF CALICUT SCHOOL OF DISTANCE EDUCATION B Sc. Cousellig Psychology (0 Adm.) IV SEMESTER COMPLEMENTARY COURSE PSYCHOLOGICAL STATISTICS QUESTION BANK. Iferetial statistics is the brach of statistics

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

5: Introduction to Estimation

5: Introduction to Estimation 5: Itroductio to Estimatio Cotets Acroyms ad symbols... 1 Statistical iferece... Estimatig µ with cofidece... 3 Samplig distributio of the mea... 3 Cofidece Iterval for μ whe σ is kow before had... 4 Sample

More information

Review: Classification Outline

Review: Classification Outline Data Miig CS 341, Sprig 2007 Decisio Trees Neural etworks Review: Lecture 6: Classificatio issues, regressio, bayesia classificatio Pretice Hall 2 Data Miig Core Techiques Classificatio Clusterig Associatio

More information

THIN SEQUENCES AND THE GRAM MATRIX PAMELA GORKIN, JOHN E. MCCARTHY, SANDRA POTT, AND BRETT D. WICK

THIN SEQUENCES AND THE GRAM MATRIX PAMELA GORKIN, JOHN E. MCCARTHY, SANDRA POTT, AND BRETT D. WICK THIN SEQUENCES AND THE GRAM MATRIX PAMELA GORKIN, JOHN E MCCARTHY, SANDRA POTT, AND BRETT D WICK Abstract We provide a ew proof of Volberg s Theorem characterizig thi iterpolatig sequeces as those for

More information

Normal Distribution.

Normal Distribution. Normal Distributio www.icrf.l Normal distributio I probability theory, the ormal or Gaussia distributio, is a cotiuous probability distributio that is ofte used as a first approimatio to describe realvalued

More information

AMS 2000 subject classification. Primary 62G08, 62G20; secondary 62G99

AMS 2000 subject classification. Primary 62G08, 62G20; secondary 62G99 VARIABLE SELECTION IN NONPARAMETRIC ADDITIVE MODELS Jia Huag 1, Joel L. Horowitz 2 ad Fegrog Wei 3 1 Uiversity of Iowa, 2 Northwester Uiversity ad 3 Uiversity of West Georgia Abstract We cosider a oparametric

More information

Floating Codes for Joint Information Storage in Write Asymmetric Memories

Floating Codes for Joint Information Storage in Write Asymmetric Memories Floatig Codes for Joit Iformatio Storage i Write Asymmetric Memories Axiao (Adrew Jiag Computer Sciece Departmet Texas A&M Uiversity College Statio, TX 77843-311 ajiag@cs.tamu.edu Vaske Bohossia Electrical

More information

Lesson 17 Pearson s Correlation Coefficient

Lesson 17 Pearson s Correlation Coefficient Outlie Measures of Relatioships Pearso s Correlatio Coefficiet (r) -types of data -scatter plots -measure of directio -measure of stregth Computatio -covariatio of X ad Y -uique variatio i X ad Y -measurig

More information

CS103X: Discrete Structures Homework 4 Solutions

CS103X: Discrete Structures Homework 4 Solutions CS103X: Discrete Structures Homewor 4 Solutios Due February 22, 2008 Exercise 1 10 poits. Silico Valley questios: a How may possible six-figure salaries i whole dollar amouts are there that cotai at least

More information

A Mathematical Perspective on Gambling

A Mathematical Perspective on Gambling A Mathematical Perspective o Gamblig Molly Maxwell Abstract. This paper presets some basic topics i probability ad statistics, icludig sample spaces, probabilistic evets, expectatios, the biomial ad ormal

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

CHAPTER 3 DIGITAL CODING OF SIGNALS

CHAPTER 3 DIGITAL CODING OF SIGNALS CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity

More information

Ekkehart Schlicht: Economic Surplus and Derived Demand

Ekkehart Schlicht: Economic Surplus and Derived Demand Ekkehart Schlicht: Ecoomic Surplus ad Derived Demad Muich Discussio Paper No. 2006-17 Departmet of Ecoomics Uiversity of Muich Volkswirtschaftliche Fakultät Ludwig-Maximilias-Uiversität Müche Olie at http://epub.ub.ui-mueche.de/940/

More information

2 MATH 101B: ALGEBRA II, PART D: REPRESENTATIONS OF GROUPS

2 MATH 101B: ALGEBRA II, PART D: REPRESENTATIONS OF GROUPS 2 MATH 101B: ALGEBRA II, PART D: REPRESENTATIONS OF GROUPS 1. The group rig k[g] The mai idea is that represetatios of a group G over a field k are the same as modules over the group rig k[g]. First I

More information

SAMPLE QUESTIONS FOR FINAL EXAM. (1) (2) (3) (4) Find the following using the definition of the Riemann integral: (2x + 1)dx

SAMPLE QUESTIONS FOR FINAL EXAM. (1) (2) (3) (4) Find the following using the definition of the Riemann integral: (2x + 1)dx SAMPLE QUESTIONS FOR FINAL EXAM REAL ANALYSIS I FALL 006 3 4 Fid the followig usig the defiitio of the Riema itegral: a 0 x + dx 3 Cosider the partitio P x 0 3, x 3 +, x 3 +,......, x 3 3 + 3 of the iterval

More information

The Stable Marriage Problem

The Stable Marriage Problem The Stable Marriage Problem William Hut Lae Departmet of Computer Sciece ad Electrical Egieerig, West Virgiia Uiversity, Morgatow, WV William.Hut@mail.wvu.edu 1 Itroductio Imagie you are a matchmaker,

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis Ruig Time ( 3.) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

Overview on S-Box Design Principles

Overview on S-Box Design Principles Overview o S-Box Desig Priciples Debdeep Mukhopadhyay Assistat Professor Departmet of Computer Sciece ad Egieerig Idia Istitute of Techology Kharagpur INDIA -721302 What is a S-Box? S-Boxes are Boolea

More information

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio

More information

Mathematical goals. Starting points. Materials required. Time needed

Mathematical goals. Starting points. Materials required. Time needed Level A1 of challege: C A1 Mathematical goals Startig poits Materials required Time eeded Iterpretig algebraic expressios To help learers to: traslate betwee words, symbols, tables, ad area represetatios

More information

Mann-Whitney U 2 Sample Test (a.k.a. Wilcoxon Rank Sum Test)

Mann-Whitney U 2 Sample Test (a.k.a. Wilcoxon Rank Sum Test) No-Parametric ivariate Statistics: Wilcoxo-Ma-Whitey 2 Sample Test 1 Ma-Whitey 2 Sample Test (a.k.a. Wilcoxo Rak Sum Test) The (Wilcoxo-) Ma-Whitey (WMW) test is the o-parametric equivalet of a pooled

More information

Chapter 5 O A Cojecture Of Erdíos Proceedigs NCUR VIII è1994è, Vol II, pp 794í798 Jeærey F Gold Departmet of Mathematics, Departmet of Physics Uiversity of Utah Do H Tucker Departmet of Mathematics Uiversity

More information

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat

More information

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length Joural o Satisfiability, Boolea Modelig ad Computatio 1 2005) 49-60 A Faster Clause-Shorteig Algorithm for SAT with No Restrictio o Clause Legth Evgey Datsi Alexader Wolpert Departmet of Computer Sciece

More information

WHEN IS THE (CO)SINE OF A RATIONAL ANGLE EQUAL TO A RATIONAL NUMBER?

WHEN IS THE (CO)SINE OF A RATIONAL ANGLE EQUAL TO A RATIONAL NUMBER? WHEN IS THE (CO)SINE OF A RATIONAL ANGLE EQUAL TO A RATIONAL NUMBER? JÖRG JAHNEL 1. My Motivatio Some Sort of a Itroductio Last term I tought Topological Groups at the Göttige Georg August Uiversity. This

More information

FIBONACCI NUMBERS: AN APPLICATION OF LINEAR ALGEBRA. 1. Powers of a matrix

FIBONACCI NUMBERS: AN APPLICATION OF LINEAR ALGEBRA. 1. Powers of a matrix FIBONACCI NUMBERS: AN APPLICATION OF LINEAR ALGEBRA. Powers of a matrix We begi with a propositio which illustrates the usefuless of the diagoalizatio. Recall that a square matrix A is diogaalizable if

More information

The Power of Free Branching in a General Model of Backtracking and Dynamic Programming Algorithms

The Power of Free Branching in a General Model of Backtracking and Dynamic Programming Algorithms The Power of Free Brachig i a Geeral Model of Backtrackig ad Dyamic Programmig Algorithms SASHKA DAVIS IDA/Ceter for Computig Scieces Bowie, MD sashka.davis@gmail.com RUSSELL IMPAGLIAZZO Dept. of Computer

More information

Theorems About Power Series

Theorems About Power Series Physics 6A Witer 20 Theorems About Power Series Cosider a power series, f(x) = a x, () where the a are real coefficiets ad x is a real variable. There exists a real o-egative umber R, called the radius

More information

Research Article Sign Data Derivative Recovery

Research Article Sign Data Derivative Recovery Iteratioal Scholarly Research Network ISRN Applied Mathematics Volume 0, Article ID 63070, 7 pages doi:0.540/0/63070 Research Article Sig Data Derivative Recovery L. M. Housto, G. A. Glass, ad A. D. Dymikov

More information

Chapter 5: Inner Product Spaces

Chapter 5: Inner Product Spaces Chapter 5: Ier Product Spaces Chapter 5: Ier Product Spaces SECION A Itroductio to Ier Product Spaces By the ed of this sectio you will be able to uderstad what is meat by a ier product space give examples

More information

Optimal Backpressure Routing for Wireless Networks with Multi-Receiver Diversity

Optimal Backpressure Routing for Wireless Networks with Multi-Receiver Diversity CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), INVITED PAPER ON OPTIMIZATION OF COMM. NETWORKS, MARCH 2006 1 Optimal Backpressure Routig for Wireless Networks with Multi-Receiver Diversity Michael

More information

On Wiretap Networks II

On Wiretap Networks II O Wiretap Networks II alim Y. El Rouayheb ECE Departmet Texas A&M Uiversity College tatio, TX 77843 salim@ece.tamu.edu Emia oljai Math. cieces Ceter Bell Labs, Alcatel-Lucet Murray ill, NJ 07974 emia@alcatel-lucet.com

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

Solutions to Selected Problems In: Pattern Classification by Duda, Hart, Stork

Solutions to Selected Problems In: Pattern Classification by Duda, Hart, Stork Solutios to Selected Problems I: Patter Classificatio by Duda, Hart, Stork Joh L. Weatherwax February 4, 008 Problem Solutios Chapter Bayesia Decisio Theory Problem radomized rules Part a: Let Rx be the

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 2, FEBRUARY 2009 117

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 2, FEBRUARY 2009 117 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 2, FEBRUARY 2009 7 Capacity ad Delay of Hybrid ireless Broadbad Access Networks Pa Li, Chi Zhag, Studet Member, IEEE, ad Yuguag Fag, Fellow,

More information