Distributed Detection Systems. Hamidreza Ahmadi

Size: px
Start display at page:

Download "Distributed Detection Systems. Hamidreza Ahmadi"

Transcription

1 Channel Estimation Error in Distributed Detection Systems Hamidreza Ahmadi

2 Outline Detection Theory Neyman-Pearson Method Classical l Distributed ib t Detection ti Fusion and local sensor rules Channel Aware Distributed Detection Perfect and Estimated CSI in the FC Conclusion

3 Detection Theory y( (NP Method) Binary Hypotheses Testing Px ( H1) P ( x H 0) H0: x = n H1 :x= A + n Decision Rule: 2 n N(0, σ ) H1 x >τ γ (x) = H0 x <τ False Alarm Probability: P FA = Pr( γ(x) = H1 H0) = Pr(x > τ x = n) P( H0 H1) = 1 PD PH ( 1 H0) = PFA Detection Probability: P D = Pr( γ(x) = H1 H1) = Pr(x > τ x = S+ n)

4 Detection Theory y( (NP Method) Neyman-Pearson Method: Generally Detection probability and False alarm are changing by changing threshold. Max P D PFA α Likelihood Ratio Test (LRT) : L(x) H1 P(x H1) > = τ P(x H0) < H0 Algorithm: P = P( Λ>τ H 0) =α τ P ( τ) FA D

5 Classical Distributed Detection Parallel Topology Each Sensor based on its observation,independently, makes its own decision about the Hypotheses and sends it to the fusion center. u =γ (y ) i i i u =γ (u,u,...,u ) N Applicable to Power and Bandwidth limited Networks Performance loss because of accessing to only partial information in the center as compared with centralized Globally y Optimal Sensor and fusion rules

6 Classical Distributed Detection NP Method in DD: For Fixed global false alarm, what are the Optimum local and fusion rules to Maximize global detection probability. Max P D0 ( γ, γ,..., γ ) 0 1 N Subject to PF0 α Optimal FC Rule: LRT H1 1 N P(U H 1) P(u i H 1) > Λ (U) = = τ P(U H 0) i= 1 P(u H 0) < i H0 Optimal Local Sensor rules: More complicated because of distributed nature. With Conditional independence of sensor observation: LRT H1 P(y i H 1) > Λ (y i) = τ P(y H 0) < i H0 i

7 Classical Distributed Detection Person by person optimization (PBPO) LRT thresholds at the sensors are coupled with each others and Fusion Center s. Each sensor threshold is optimized assuming fixed decision rules at all other sensors and the FC. This is iteratively done until we reach optima value. It gives a necessary but not sufficient condition for optimality, so several Initialization are necessary. Error Exponents: PBPO is intractable in networks with large number of sensors, So in asymptotic regime, threshold is selected such that gives the best error exponent.( identical thresholds)

8 Channel Aware Distributed Detection. Sources of uncertainty:noise, fading, Shadowing, interference in Observation and Transmission channel Separation Approach for DD with uncertainty: Communication schemes between sensors and center are separated from the SP algorithms in decision rules.

9 Channel Aware Distributed Detection Channel Aware Fusion rule: (1) The ultimate goal is not recovering Ui. (2) θ I( θ ; y,...,y ) I( θ ;u ˆ,...,u ˆ ) 1 k 1 k Optimal detector should consider Channel Conditions in the Fusion Rule. (LRT is optimum rule).

10 Channel Aware Distributed Detection Channel Aware local sensor rules: For globally optimal detection, transmission channel is considered in the local sensors. (Energy efficient) The sensor thresholds are different for different channels. ( Using channel statistics instead of instant CSI)

11 Channel Aware Distributed Detection Perfect CSI at the fusion center: Example: Independent transmission & observation channels, BPSK (ui= -1 or 1), coherent reception.

12 Channel Aware Distributed Detection Suboptimal Fusion Rules: High SNR (Chair-Varshney): Low SNR (MRC and EGC): Also can be used when detection indexes of sensors are not known in the FC.

13 Channel Aware Distributed Detection BPSK with perfect CSI in the FC, using optimal and suboptimal rules

14 Channel Aware Distributed Detection Estimated CSI in the Fusion center T sensor decisions are packed and sent with a training bit. Assume there is a block fading with coherence time less than the packet length. yk,1 = uthk + nk,1 (u = 1) LMMSE complex channel estimation: E ĥh = E(h y ) =α y, σ = (1 + ) σ 2 b 1 k k k1 k,1 k1 k,1 error 2 n σ = E σ +σ w b error n t Λ BPSK K * Λ = Re(y h ) Λ 1 ˆ BPSK EGC = Re(y k,tφk ), φk = e K = K k = 1 K 1 ˆ * BPSK MRC k,t k K k 1 jϕ k

15 Channel Aware Distributed Detection Different Modulation with perfect and imperfect CSI using LRT

16 Channel Aware Distributed Detection BPSK with optimal and suboptimal fusion rules

17 Channel Aware Distributed Detection OOK modulation and the impact of Number of sensors on p Pd.

18 Channel Aware Distributed Detection BFSK, Sensors with different Pds

19 Conclusion Neyman-Pearson as a detection criterion for maximizing detection probability with the constraint on false alarm rate. Decentralized Detection,, a power and bandwidth efficient detection which uses LRT as an optimal rule in the sensors and FC. Transmission channel aware sensor and fusion rules can improve the detection performance of DD systems in fading channels. In high SNR rules using estimated CSI perform like the ones with In high SNR, rules using estimated CSI perform like the ones with perfect CSI.

20 Channel Estimation in DD Systems Thank You.

α α λ α = = λ λ α ψ = = α α α λ λ ψ α = + β = > θ θ β > β β θ θ θ β θ β γ θ β = γ θ > β > γ θ β γ = θ β = θ β = θ β = β θ = β β θ = = = β β θ = + α α α α α = = λ λ λ λ λ λ λ = λ λ α α α α λ ψ + α =

More information

Capacity Limits of MIMO Channels

Capacity Limits of MIMO Channels Tutorial and 4G Systems Capacity Limits of MIMO Channels Markku Juntti Contents 1. Introduction. Review of information theory 3. Fixed MIMO channels 4. Fading MIMO channels 5. Summary and Conclusions References

More information

Message-passing sequential detection of multiple change points in networks

Message-passing sequential detection of multiple change points in networks Message-passing sequential detection of multiple change points in networks Long Nguyen, Arash Amini Ram Rajagopal University of Michigan Stanford University ISIT, Boston, July 2012 Nguyen/Amini/Rajagopal

More information

Signal Detection. Outline. Detection Theory. Example Applications of Detection Theory

Signal Detection. Outline. Detection Theory. Example Applications of Detection Theory Outline Signal Detection M. Sami Fadali Professor of lectrical ngineering University of Nevada, Reno Hypothesis testing. Neyman-Pearson (NP) detector for a known signal in white Gaussian noise (WGN). Matched

More information

Introduction to Detection Theory

Introduction to Detection Theory Introduction to Detection Theory Reading: Ch. 3 in Kay-II. Notes by Prof. Don Johnson on detection theory, see http://www.ece.rice.edu/~dhj/courses/elec531/notes5.pdf. Ch. 10 in Wasserman. EE 527, Detection

More information

PHASE ESTIMATION ALGORITHM FOR FREQUENCY HOPPED BINARY PSK AND DPSK WAVEFORMS WITH SMALL NUMBER OF REFERENCE SYMBOLS

PHASE ESTIMATION ALGORITHM FOR FREQUENCY HOPPED BINARY PSK AND DPSK WAVEFORMS WITH SMALL NUMBER OF REFERENCE SYMBOLS PHASE ESTIMATION ALGORITHM FOR FREQUENCY HOPPED BINARY PSK AND DPSK WAVEFORMS WITH SMALL NUM OF REFERENCE SYMBOLS Benjamin R. Wiederholt The MITRE Corporation Bedford, MA and Mario A. Blanco The MITRE

More information

Time-frequency segmentation : statistical and local phase analysis

Time-frequency segmentation : statistical and local phase analysis Time-frequency segmentation : statistical and local phase analysis Florian DADOUCHI 1, Cornel IOANA 1, Julien HUILLERY 2, Cédric GERVAISE 1,3, Jérôme I. MARS 1 1 GIPSA-Lab, University of Grenoble 2 Ampère

More information

DSL Spectrum Management

DSL Spectrum Management DSL Spectrum Management Dr. Jianwei Huang Department of Electrical Engineering Princeton University Guest Lecture of ELE539A March 2007 Jianwei Huang (Princeton) DSL Spectrum Management March 2007 1 /

More information

Digital Modulation. David Tipper. Department of Information Science and Telecommunications University of Pittsburgh. Typical Communication System

Digital Modulation. David Tipper. Department of Information Science and Telecommunications University of Pittsburgh. Typical Communication System Digital Modulation David Tipper Associate Professor Department of Information Science and Telecommunications University of Pittsburgh http://www.tele.pitt.edu/tipper.html Typical Communication System Source

More information

MIMO detector algorithms and their implementations for LTE/LTE-A

MIMO detector algorithms and their implementations for LTE/LTE-A GIGA seminar 11.01.2010 MIMO detector algorithms and their implementations for LTE/LTE-A Markus Myllylä and Johanna Ketonen 11.01.2010 2 Outline Introduction System model Detection in a MIMO-OFDM system

More information

PERFORMANCE ANALYSIS OF THRESHOLD BASED RELAY SELECTION TECHNIQUE IN COOPERATIVE WIRELESS NETWORKS

PERFORMANCE ANALYSIS OF THRESHOLD BASED RELAY SELECTION TECHNIQUE IN COOPERATIVE WIRELESS NETWORKS International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 7, Issue 1, Jan-Feb 2016, pp. 115-124, Article ID: IJECET_07_01_012 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=1

More information

Multisensor Data Fusion and Applications

Multisensor Data Fusion and Applications Multisensor Data Fusion and Applications Pramod K. Varshney Department of Electrical Engineering and Computer Science Syracuse University 121 Link Hall Syracuse, New York 13244 USA E-mail: varshney@syr.edu

More information

Statistical Machine Learning

Statistical Machine Learning Statistical Machine Learning UoC Stats 37700, Winter quarter Lecture 4: classical linear and quadratic discriminants. 1 / 25 Linear separation For two classes in R d : simple idea: separate the classes

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

Radar Systems Engineering Lecture 6 Detection of Signals in Noise

Radar Systems Engineering Lecture 6 Detection of Signals in Noise Radar Systems Engineering Lecture 6 Detection of Signals in Noise Dr. Robert M. O Donnell Guest Lecturer Radar Systems Course 1 Detection 1/1/010 Block Diagram of Radar System Target Radar Cross Section

More information

A Practical Scheme for Wireless Network Operation

A Practical Scheme for Wireless Network Operation A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving

More information

Coding and decoding with convolutional codes. The Viterbi Algor

Coding and decoding with convolutional codes. The Viterbi Algor Coding and decoding with convolutional codes. The Viterbi Algorithm. 8 Block codes: main ideas Principles st point of view: infinite length block code nd point of view: convolutions Some examples Repetition

More information

MIMO CHANNEL CAPACITY

MIMO CHANNEL CAPACITY MIMO CHANNEL CAPACITY Ochi Laboratory Nguyen Dang Khoa (D1) 1 Contents Introduction Review of information theory Fixed MIMO channel Fading MIMO channel Summary and Conclusions 2 1. Introduction The use

More information

Optimal Performance for Detection Systems in Wireless Passive Sensor Networks

Optimal Performance for Detection Systems in Wireless Passive Sensor Networks Optimal Performance for Detection Systems in Wireless Passive Sensor Networks Ashraf Tantawy, Xenofon Koutsoukos, and Gautam Biswas Institute for Software Integrated Systems (ISIS) Department of Electrical

More information

Principled Reasoning and Practical Applications of Alert Fusion in Intrusion Detection Systems

Principled Reasoning and Practical Applications of Alert Fusion in Intrusion Detection Systems Principled Reasoning and Practical Applications of Alert Fusion in Intrusion Detection Systems Guofei Gu College of Computing Georgia Institute of Technology Atlanta, GA 3332, USA guofei@cc.gatech.edu

More information

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 341

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 341 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 341 Multinode Cooperative Communications in Wireless Networks Ahmed K. Sadek, Student Member, IEEE, Weifeng Su, Member, IEEE, and K.

More information

Likelihood Approaches for Trial Designs in Early Phase Oncology

Likelihood Approaches for Trial Designs in Early Phase Oncology Likelihood Approaches for Trial Designs in Early Phase Oncology Clinical Trials Elizabeth Garrett-Mayer, PhD Cody Chiuzan, PhD Hollings Cancer Center Department of Public Health Sciences Medical University

More information

The Advantages and Disadvantages of Network Computing Nodes

The Advantages and Disadvantages of Network Computing Nodes Big Data & Scripting storage networks and distributed file systems 1, 2, in the remainder we use networks of computing nodes to enable computations on even larger datasets for a computation, each node

More information

ALOHA Performs Delay-Optimum Power Control

ALOHA Performs Delay-Optimum Power Control ALOHA Performs Delay-Optimum Power Control Xinchen Zhang and Martin Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556, USA {xzhang7,mhaenggi}@nd.edu Abstract As

More information

2. Illustration of the Nikkei 225 option data

2. Illustration of the Nikkei 225 option data 1. Introduction 2. Illustration of the Nikkei 225 option data 2.1 A brief outline of the Nikkei 225 options market τ 2.2 Estimation of the theoretical price τ = + ε ε = = + ε + = + + + = + ε + ε + ε =

More information

Cyber-Security Analysis of State Estimators in Power Systems

Cyber-Security Analysis of State Estimators in Power Systems Cyber-Security Analysis of State Estimators in Electric Power Systems André Teixeira 1, Saurabh Amin 2, Henrik Sandberg 1, Karl H. Johansson 1, and Shankar Sastry 2 ACCESS Linnaeus Centre, KTH-Royal Institute

More information

National Technical University of Athens School of Electrical and Computer Engineering

National Technical University of Athens School of Electrical and Computer Engineering the simulation and analysis of OFDMA subcarrier allocation techniques in multicellular environments. the performance evaluation of simple algorithms compared to a more sophisticated and computationally

More information

On Decentralized Detection with Partial Information Sharing among Sensors

On Decentralized Detection with Partial Information Sharing among Sensors On Decentralized Detection with Partial Information Sharing among Sensors The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation

More information

Signal Detection C H A P T E R 14 14.1 SIGNAL DETECTION AS HYPOTHESIS TESTING

Signal Detection C H A P T E R 14 14.1 SIGNAL DETECTION AS HYPOTHESIS TESTING C H A P T E R 4 Signal Detection 4. SIGNAL DETECTION AS HYPOTHESIS TESTING In Chapter 3 we considered hypothesis testing in the context of random variables. The detector resulting in the minimum probability

More information

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING Development of a Software Tool for Performance Evaluation of MIMO OFDM Alamouti using a didactical Approach as a Educational and Research support in Wireless Communications JOSE CORDOVA, REBECA ESTRADA

More information

Radio Resource Allocation Algorithm for Relay aided Cellular OFDMA System

Radio Resource Allocation Algorithm for Relay aided Cellular OFDMA System Radio Resource Allocation Algorithm for Relay aided Cellular OFDMA System Megumi Kaneo # and Petar Popovsi Center for TeleInFrastructure (CTIF), Aalborg University Niels Jernes Vej 1, DK-90 Aalborg, Denmar

More information

Bi-directional Signalling Strategies for Dynamic TDD Networks

Bi-directional Signalling Strategies for Dynamic TDD Networks 12 October, 2015 Bi-directional Signalling Strategies for Dynamic TDD Networks 1 Bi-directional Signalling Strategies for Dynamic TDD Networks Antti Tölli Praneeth Jayasinghe, Jarkko Kaleva University

More information

L4: Bayesian Decision Theory

L4: Bayesian Decision Theory L4: Bayesian Decision Theory Likelihood ratio test Probability of error Bayes risk Bayes, MAP and ML criteria Multi-class problems Discriminant functions CSCE 666 Pattern Analysis Ricardo Gutierrez-Osuna

More information

Stochastic Models for Inventory Management at Service Facilities

Stochastic Models for Inventory Management at Service Facilities Stochastic Models for Inventory Management at Service Facilities O. Berman, E. Kim Presented by F. Zoghalchi University of Toronto Rotman School of Management Dec, 2012 Agenda 1 Problem description Deterministic

More information

A Framework for the Evaluation of Intrusion Detection Systems

A Framework for the Evaluation of Intrusion Detection Systems A Framework for the Evaluation of Intrusion Detection Systems Alvaro A. Cárdenas John S. Baras Karl Seamon Department of Electrical and Computer Engineering and The Institute of Systems Research University

More information

IN RECENT years, there have been significant efforts to develop

IN RECENT years, there have been significant efforts to develop IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO. 3, MARCH 2006 525 Effective Bandwidth of Multimedia Traffic in Packet Wireless CDMA Networks with LMMSE Receivers: A Cross-Layer Perspective Fei

More information

Randomization Approaches for Network Revenue Management with Customer Choice Behavior

Randomization Approaches for Network Revenue Management with Customer Choice Behavior Randomization Approaches for Network Revenue Management with Customer Choice Behavior Sumit Kunnumkal Indian School of Business, Gachibowli, Hyderabad, 500032, India sumit kunnumkal@isb.edu March 9, 2011

More information

Logistic Regression. Jia Li. Department of Statistics The Pennsylvania State University. Logistic Regression

Logistic Regression. Jia Li. Department of Statistics The Pennsylvania State University. Logistic Regression Logistic Regression Department of Statistics The Pennsylvania State University Email: jiali@stat.psu.edu Logistic Regression Preserve linear classification boundaries. By the Bayes rule: Ĝ(x) = arg max

More information

Probabilistic Models for Big Data. Alex Davies and Roger Frigola University of Cambridge 13th February 2014

Probabilistic Models for Big Data. Alex Davies and Roger Frigola University of Cambridge 13th February 2014 Probabilistic Models for Big Data Alex Davies and Roger Frigola University of Cambridge 13th February 2014 The State of Big Data Why probabilistic models for Big Data? 1. If you don t have to worry about

More information

Integer Programming: Algorithms - 3

Integer Programming: Algorithms - 3 Week 9 Integer Programming: Algorithms - 3 OPR 992 Applied Mathematical Programming OPR 992 - Applied Mathematical Programming - p. 1/12 Dantzig-Wolfe Reformulation Example Strength of the Linear Programming

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Path Loss Radio Wave Propagation The wireless radio channel puts fundamental limitations to the performance of wireless communications systems Radio channels are extremely random, and are not easily analyzed

More information

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem

More information

Online Appendix Feedback Effects, Asymmetric Trading, and the Limits to Arbitrage

Online Appendix Feedback Effects, Asymmetric Trading, and the Limits to Arbitrage Online Appendix Feedback Effects, Asymmetric Trading, and the Limits to Arbitrage Alex Edmans LBS, NBER, CEPR, and ECGI Itay Goldstein Wharton Wei Jiang Columbia May 8, 05 A Proofs of Propositions and

More information

CCNY. BME I5100: Biomedical Signal Processing. Linear Discrimination. Lucas C. Parra Biomedical Engineering Department City College of New York

CCNY. BME I5100: Biomedical Signal Processing. Linear Discrimination. Lucas C. Parra Biomedical Engineering Department City College of New York BME I5100: Biomedical Signal Processing Linear Discrimination Lucas C. Parra Biomedical Engineering Department CCNY 1 Schedule Week 1: Introduction Linear, stationary, normal - the stuff biology is not

More information

Adaptive Training for Correlated Fading Channels with Feedback

Adaptive Training for Correlated Fading Channels with Feedback 1 Adaptive Training for Correlated Fading Channels with Feedback Manish Agarwal, Michael Honig, and Baris Ata Northwestern University arxiv:98.164v1 [cs.it] 1 Aug 9 {m-agarwal,mh,b-ata}@northwestern.edu

More information

The QOOL Algorithm for fast Online Optimization of Multiple Degree of Freedom Robot Locomotion

The QOOL Algorithm for fast Online Optimization of Multiple Degree of Freedom Robot Locomotion The QOOL Algorithm for fast Online Optimization of Multiple Degree of Freedom Robot Locomotion Daniel Marbach January 31th, 2005 Swiss Federal Institute of Technology at Lausanne Daniel.Marbach@epfl.ch

More information

Dynamic Control of Interference Limited Underlay D2D Network

Dynamic Control of Interference Limited Underlay D2D Network Dynamic Control of Interference Limited Underlay D2D etwork Yunus Sarikaya, Hazer Inaltekin, Tansu Alpcan and Jamie Evans arxiv:606.00534v cs.i 2 Jun 206 Abstract Device-to-Device (D2D) communication appears

More information

Linear Classification. Volker Tresp Summer 2015

Linear Classification. Volker Tresp Summer 2015 Linear Classification Volker Tresp Summer 2015 1 Classification Classification is the central task of pattern recognition Sensors supply information about an object: to which class do the object belong

More information

VI. Introduction to Logistic Regression

VI. Introduction to Logistic Regression VI. Introduction to Logistic Regression We turn our attention now to the topic of modeling a categorical outcome as a function of (possibly) several factors. The framework of generalized linear models

More information

Distributed Cooperative Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios

Distributed Cooperative Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios Distributed Cooperative Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios F. Richard Yu, Helen Tang, Minyi Huang, Peter Mason, and Zhiqiang Li In cognitive radio mobile ad hoc networks (CR-MANETs),

More information

Introduction to Support Vector Machines. Colin Campbell, Bristol University

Introduction to Support Vector Machines. Colin Campbell, Bristol University Introduction to Support Vector Machines Colin Campbell, Bristol University 1 Outline of talk. Part 1. An Introduction to SVMs 1.1. SVMs for binary classification. 1.2. Soft margins and multi-class classification.

More information

Statistical Machine Learning from Data

Statistical Machine Learning from Data Samy Bengio Statistical Machine Learning from Data 1 Statistical Machine Learning from Data Gaussian Mixture Models Samy Bengio IDIAP Research Institute, Martigny, Switzerland, and Ecole Polytechnique

More information

INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena *1, K. Upendra Chowdary 2

INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena *1, K. Upendra Chowdary 2 ISSN 2277-2685 IJESR/June 2014/ Vol-4/Issue-6/333-337 Y. Naveena et al./ International Journal of Engineering & Science Research INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena

More information

A New Interpretation of Information Rate

A New Interpretation of Information Rate A New Interpretation of Information Rate reproduced with permission of AT&T By J. L. Kelly, jr. (Manuscript received March 2, 956) If the input symbols to a communication channel represent the outcomes

More information

5 Capacity of wireless channels

5 Capacity of wireless channels CHAPTER 5 Capacity of wireless channels In the previous two chapters, we studied specific techniques for communication over wireless channels. In particular, Chapter 3 is centered on the point-to-point

More information

Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control

Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control Optimization of Communication Systems Lecture 6: Internet TCP Congestion Control Professor M. Chiang Electrical Engineering Department, Princeton University ELE539A February 21, 2007 Lecture Outline TCP

More information

Deriving Demand Functions - Examples 1

Deriving Demand Functions - Examples 1 Deriving Demand Functions - Examples 1 What follows are some examples of different preference relations and their respective demand functions. In all the following examples, assume we have two goods x

More information

The CUSUM algorithm a small review. Pierre Granjon

The CUSUM algorithm a small review. Pierre Granjon The CUSUM algorithm a small review Pierre Granjon June, 1 Contents 1 The CUSUM algorithm 1.1 Algorithm............................... 1.1.1 The problem......................... 1.1. The different steps......................

More information

Network Coding for Distributed Storage

Network Coding for Distributed Storage Network Coding for Distributed Storage Alex Dimakis USC Overview Motivation Data centers Mobile distributed storage for D2D Specific storage problems Fundamental tradeoff between repair communication and

More information

WIRELESS communication channels have the characteristic

WIRELESS communication channels have the characteristic 512 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 54, NO. 3, MARCH 2009 Energy-Efficient Decentralized Cooperative Routing in Wireless Networks Ritesh Madan, Member, IEEE, Neelesh B. Mehta, Senior Member,

More information

Towards a Structuralist Interpretation of Saving, Investment and Current Account in Turkey

Towards a Structuralist Interpretation of Saving, Investment and Current Account in Turkey Towards a Structuralist Interpretation of Saving, Investment and Current Account in Turkey MURAT ÜNGÖR Central Bank of the Republic of Turkey http://www.muratungor.com/ April 2012 We live in the age of

More information

Decentralized Utility-based Sensor Network Design

Decentralized Utility-based Sensor Network Design Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu

More information

A Lightweight Rao-Cauchy Detector for Additive Watermarking in the DWT-Domain

A Lightweight Rao-Cauchy Detector for Additive Watermarking in the DWT-Domain A Lightweight Rao-Cauchy Detector for Additive Watermarking in the DWT-Domain Roland Kwitt, Peter Meerwald, Andreas Uhl Dept. of Computer Sciences, University of Salzburg, Austria E-Mail: {rkwitt, pmeerw,

More information

THE NEED for higher data rates is increasing as a result

THE NEED for higher data rates is increasing as a result 116 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 11, NO. 1, FIRST QUARTER 2009 A Survey of Spectrum Sensing Algorithms for Cognitive Radio Applications Tevfik Yücek and Hüseyin Arslan Abstract The spectrum

More information

Efficient Network Marketing Strategies For Secondary Users

Efficient Network Marketing Strategies For Secondary Users Determining the Transmission Strategy of Cognitive User in IEEE 82. based Networks Rukhsana Ruby, Victor C.M. Leung, John Sydor Department of Electrical and Computer Engineering, The University of British

More information

Teaching Convolutional Coding using MATLAB in Communication Systems Course. Abstract

Teaching Convolutional Coding using MATLAB in Communication Systems Course. Abstract Section T3C2 Teaching Convolutional Coding using MATLAB in Communication Systems Course Davoud Arasteh Department of Electronic Engineering Technology, LA 70813, USA Abstract Convolutional codes are channel

More information

Envelope Theorem. Kevin Wainwright. Mar 22, 2004

Envelope Theorem. Kevin Wainwright. Mar 22, 2004 Envelope Theorem Kevin Wainwright Mar 22, 2004 1 Maximum Value Functions A maximum (or minimum) value function is an objective function where the choice variables have been assigned their optimal values.

More information

Imprecise probabilities, bets and functional analytic methods in Łukasiewicz logic.

Imprecise probabilities, bets and functional analytic methods in Łukasiewicz logic. Imprecise probabilities, bets and functional analytic methods in Łukasiewicz logic. Martina Fedel joint work with K.Keimel,F.Montagna,W.Roth Martina Fedel (UNISI) 1 / 32 Goal The goal of this talk is to

More information

a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.

a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol. CHAPTER 12 PRACTICE SET Questions Q12-1. The answer is CSM/CD. a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol. Q12-3. The answer

More information

A Decentralized Bayesian Attack Detection Algorithm for Network Security

A Decentralized Bayesian Attack Detection Algorithm for Network Security A Decentralized Bayesian Attack Detection Algorithm for Network Security Kien C. Nguyen, Tansu Alpcan, and Tamer Başar Abstract Decentralized detection has been an active area of research since the late

More information

Capacity Limits of MIMO Systems

Capacity Limits of MIMO Systems 1 Capacity Limits of MIMO Systems Andrea Goldsmith, Syed Ali Jafar, Nihar Jindal, and Sriram Vishwanath 2 I. INTRODUCTION In this chapter we consider the Shannon capacity limits of single-user and multi-user

More information

Mapping an Application to a Control Architecture: Specification of the Problem

Mapping an Application to a Control Architecture: Specification of the Problem Mapping an Application to a Control Architecture: Specification of the Problem Mieczyslaw M. Kokar 1, Kevin M. Passino 2, Kenneth Baclawski 1, and Jeffrey E. Smith 3 1 Northeastern University, Boston,

More information

ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN)

ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN) ECE 555 Real-time Embedded System Real-time Communications in Wireless Sensor Network (WSN) Yao, Yanjun 1 Papers Real-time Power-Aware Routing in Sensor Networks Real-Time Traffic Management in Sensor

More information

MODULATION Systems (part 1)

MODULATION Systems (part 1) Technologies and Services on Digital Broadcasting (8) MODULATION Systems (part ) "Technologies and Services of Digital Broadcasting" (in Japanese, ISBN4-339-62-2) is published by CORONA publishing co.,

More information

Part II Redundant Dictionaries and Pursuit Algorithms

Part II Redundant Dictionaries and Pursuit Algorithms Aisenstadt Chair Course CRM September 2009 Part II Redundant Dictionaries and Pursuit Algorithms Stéphane Mallat Centre de Mathématiques Appliquées Ecole Polytechnique Sparsity in Redundant Dictionaries

More information

Decentralization and Private Information with Mutual Organizations

Decentralization and Private Information with Mutual Organizations Decentralization and Private Information with Mutual Organizations Edward C. Prescott and Adam Blandin Arizona State University 09 April 2014 1 Motivation Invisible hand works in standard environments

More information

Improved Algorithm for Throughput Maximization in MC-CDMA

Improved Algorithm for Throughput Maximization in MC-CDMA Improved Algorithm for Throughput Maximization in MC-CDMA Hema Kale 1, C.G. Dethe 2 and M.M. Mushrif 3 1 ETC Department, Jhulelal Institute of Technology Nagpur, India. Email: hema.kale72@gmail.com 2 ECE

More information

University Dortmund. Robotics Research Institute Information Technology. Job Scheduling. Uwe Schwiegelshohn. EPIT 2007, June 5 Ordonnancement

University Dortmund. Robotics Research Institute Information Technology. Job Scheduling. Uwe Schwiegelshohn. EPIT 2007, June 5 Ordonnancement University Dortmund Robotics Research Institute Information Technology Job Scheduling Uwe Schwiegelshohn EPIT 2007, June 5 Ordonnancement ontent of the Lecture What is ob scheduling? Single machine problems

More information

Resource Optimization of Spatial TDMA in Ad Hoc Radio Networks: A Column Generation Approach

Resource Optimization of Spatial TDMA in Ad Hoc Radio Networks: A Column Generation Approach Resource Optimization of Spatial TDMA in Ad Hoc Radio Networks: A Column Generation Approach Patrik Björklund, Peter Värbrand and Di Yuan Department of Science and Technology, Linköping University SE-601

More information

Privacy and Security in the Internet of Things: Theory and Practice. Bob Baxley; bob@bastille.io HitB; 28 May 2015

Privacy and Security in the Internet of Things: Theory and Practice. Bob Baxley; bob@bastille.io HitB; 28 May 2015 Privacy and Security in the Internet of Things: Theory and Practice Bob Baxley; bob@bastille.io HitB; 28 May 2015 Internet of Things (IoT) THE PROBLEM By 2020 50 BILLION DEVICES NO SECURITY! OSI Stack

More information

Foresighted Resource Scheduling in Software-Defined Radio Access Networks

Foresighted Resource Scheduling in Software-Defined Radio Access Networks Foresighted Resource Scheduling in Software-Defined Radio Access Networks Xianfu Chen, Zhu Han, Honggang Zhang, Mehdi Bennis, and Tao Chen VTT Technical Research Centre of Finland Ltd, Finland Department

More information

Final Mathematics 5010, Section 1, Fall 2004 Instructor: D.A. Levin

Final Mathematics 5010, Section 1, Fall 2004 Instructor: D.A. Levin Final Mathematics 51, Section 1, Fall 24 Instructor: D.A. Levin Name YOU MUST SHOW YOUR WORK TO RECEIVE CREDIT. A CORRECT ANSWER WITHOUT SHOWING YOUR REASONING WILL NOT RECEIVE CREDIT. Problem Points Possible

More information

CHAPTER 3 SECURITY CONSTRAINED OPTIMAL SHORT-TERM HYDROTHERMAL SCHEDULING

CHAPTER 3 SECURITY CONSTRAINED OPTIMAL SHORT-TERM HYDROTHERMAL SCHEDULING 60 CHAPTER 3 SECURITY CONSTRAINED OPTIMAL SHORT-TERM HYDROTHERMAL SCHEDULING 3.1 INTRODUCTION Optimal short-term hydrothermal scheduling of power systems aims at determining optimal hydro and thermal generations

More information

Three-Stage Phase II Clinical Trials

Three-Stage Phase II Clinical Trials Chapter 130 Three-Stage Phase II Clinical Trials Introduction Phase II clinical trials determine whether a drug or regimen has sufficient activity against disease to warrant more extensive study and development.

More information

Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks

Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks Mostafa Dehghan, Dennis L. Goeckel, Majid Ghaderi, and Zhiguo Ding Department of Electrical and Computer Engineering, University

More information

Tests for Two Survival Curves Using Cox s Proportional Hazards Model

Tests for Two Survival Curves Using Cox s Proportional Hazards Model Chapter 730 Tests for Two Survival Curves Using Cox s Proportional Hazards Model Introduction A clinical trial is often employed to test the equality of survival distributions of two treatment groups.

More information

University of Maryland Fraternity & Sorority Life Spring 2015 Academic Report

University of Maryland Fraternity & Sorority Life Spring 2015 Academic Report University of Maryland Fraternity & Sorority Life Academic Report Academic and Population Statistics Population: # of Students: # of New Members: Avg. Size: Avg. GPA: % of the Undergraduate Population

More information

Achievable Transmission Rates and Self-Interference Channel Estimation in Hybrid Full-Duplex/Half-Duplex MIMO Relaying

Achievable Transmission Rates and Self-Interference Channel Estimation in Hybrid Full-Duplex/Half-Duplex MIMO Relaying Achievable Transmission Rates and Self-Interference Channel Estimation in Hybrid Full-Duplex/Half-Duplex MIMO Relaying Dani Korpi 1, Taneli Riihonen 2,3, Katsuyuki Haneda 4, Koji Yamamoto 5, and Mikko

More information

Efficient Load Balancing by Adaptive Bypasses for the Migration on the Internet

Efficient Load Balancing by Adaptive Bypasses for the Migration on the Internet Efficient Load Balancing by Adaptive Bypasses for the Migration on the Internet Yukio Hayashi yhayashi@jaist.ac.jp Japan Advanced Institute of Science and Technology ICCS 03 Workshop on Grid Computing,

More information

Introduction to Optical Link Design

Introduction to Optical Link Design University of Cyprus Πανεπιστήµιο Κύπρου 1 Introduction to Optical Link Design Stavros Iezekiel Department of Electrical and Computer Engineering University of Cyprus HMY 445 Lecture 08 Fall Semester 2014

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

SIMULATING CANCELLATIONS AND OVERBOOKING IN YIELD MANAGEMENT

SIMULATING CANCELLATIONS AND OVERBOOKING IN YIELD MANAGEMENT CHAPTER 8 SIMULATING CANCELLATIONS AND OVERBOOKING IN YIELD MANAGEMENT In YM, one of the major problems in maximizing revenue is the number of cancellations. In industries implementing YM this is very

More information

Power Control is Not Required for Wireless Networks in the Linear Regime

Power Control is Not Required for Wireless Networks in the Linear Regime Power Control is Not Required for Wireless Networks in the Linear Regime Božidar Radunović, Jean-Yves Le Boudec School of Computer and Communication Sciences EPFL, Lausanne CH-1015, Switzerland Email:

More information

degrees of freedom and are able to adapt to the task they are supposed to do [Gupta].

degrees of freedom and are able to adapt to the task they are supposed to do [Gupta]. 1.3 Neural Networks 19 Neural Networks are large structured systems of equations. These systems have many degrees of freedom and are able to adapt to the task they are supposed to do [Gupta]. Two very

More information

Introduction to Money

Introduction to Money Introduction to Money (3f)-P.1 How does money fit into modern macro models? - Money M = = nominal units issued by the government. Price level p. Purchasing power 1/p. - Consider discrete periods: Household

More information

Robust Optimization for Unit Commitment and Dispatch in Energy Markets

Robust Optimization for Unit Commitment and Dispatch in Energy Markets 1/41 Robust Optimization for Unit Commitment and Dispatch in Energy Markets Marco Zugno, Juan Miguel Morales, Henrik Madsen (DTU Compute) and Antonio Conejo (Ohio State University) email: mazu@dtu.dk Modeling

More information

M-ary Symbol Error Outage Over Nakagami-m Fading Channels in Shadowing Environments

M-ary Symbol Error Outage Over Nakagami-m Fading Channels in Shadowing Environments 1 M-ary Symbol Error Outage Over Nakagami-m Fading Channels in Shadowing Environments Philippe Mary, Mischa Dohler, Jean-Marie Gorce, Guillaume Villemaud and Marylin Arndt P. Mary, M. Arndt are with France

More information

1. Then f has a relative maximum at x = c if f(c) f(x) for all values of x in some

1. Then f has a relative maximum at x = c if f(c) f(x) for all values of x in some Section 3.1: First Derivative Test Definition. Let f be a function with domain D. 1. Then f has a relative maximum at x = c if f(c) f(x) for all values of x in some open interval containing c. The number

More information

Least-Squares Intersection of Lines

Least-Squares Intersection of Lines Least-Squares Intersection of Lines Johannes Traa - UIUC 2013 This write-up derives the least-squares solution for the intersection of lines. In the general case, a set of lines will not intersect at a

More information