The Radix-4 and the Class of Radix-2 s FFTs

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "The Radix-4 and the Class of Radix-2 s FFTs"

Transcription

1 Chapter 11 The Radix- and the Cass of Radix- s FFTs The divide-and-conuer paradigm introduced in Chapter 3 is not restricted to dividing a probem into two subprobems. In fact, as expained in Section. and Appendix B, the recurrence euation αt α b if α T { k > 1, γ if 1, represents the arithmetic cost of an agorithm which soves the origina probem of size by combining the resuts from recursivey soving α probems of size /α. In this chapter, the cases for α as we as α s are considered The Radix- DIT FFTs The DFT of a time series consisting of n discrete sampes is considered in this section. Since n n, any version of the radix- FFTs introduced in Sections 3.1 and 3. can certainy be used to compute the transform. The reason it is worthwhie to deveop a radix- impementation instead of simpy using the radix- FFTs is that the arithmetic cost can be further reduced, and this advantage is carried over to the design of parae FFTs. In fact, both radix- and radix- FFTs are specia cases in the cass of radix- s FFTs. The radix- DIT FFT [5, 70, 8] is derived from euation 3.1, which defines the discrete Fourier transform of a compex time series. With the hep of the identities ω j and ω ω, euation 3.1 can be rewritten in terms of four partia sums; 000 by CRC Press LLC

2 that is, 11.1 X r x ω r, r 0, 1,..., 1 0 k0 k0 x k ω rk k0 x k ω rk ω r x k1 ω rk1 k0 k0 x k1 ω rk ω r x k ω rk k0 k0 x k ω rk ω 3r x k3 ω rk3 k0 x k3 ω rk. By decimating the time series into four sets, namey the set {y k y k x k, 0 k / 1}, the set {z k z k x k1, 0 k / 1}, the set {g k g k x k, 0 k / 1}, and the set {h k h k x k3, 0 k / 1}, the four subprobems with period of / can be defined after the appropriate twidde factor ω ω is identified. The four subprobems are 11. Y r 11.3 Z r 11. G r 11.5 H r k0 k0 k0 k0 x k ω rk k0 x k1 ω rk x k ω rk h k3 ω rk x k ω k0 k0 k0 rk x k1 ω x k ω x k3 ω k0 rk y k ω rk, r 0, 1,...,/ 1. k0 rk k0 rk k0 z k ω rk, r 0, 1,...,/ 1. g k ω rk, r 0, 1,...,/ 1. h k ω rk, r 0, 1,...,/ 1. The size of each subprobem is thus /, which is eua to the number of input data points or the number of computed output data points in one period. After these four subprobems are each recursivey soved, the soution to the origina probem of size can be obtained according to 11.1 for r 0, 1,..., 1. Since the series Y r has Y r Y r 3, and the same appies to the series a period of /, Y r Y r Z r, G r, and H r. The output X r may be expressed in terms of Y r, Z r, G r, and H r for 000 by CRC Press LLC

3 r 0, 1,...,/ 1 as shown beow X r X r X r 3 X r Y r ω r Z r ω r G r ω 3r H r. Y r ω r Z r ω r G r ω 3r H r. Y r ω r Z r ω r G r ω 3r H r. Y r ω r 3 Z r ω 3 r 3 3r G r ω H r. By noting that the twidde factors ω ω e j π j, ω ω 3 j 3 j, the four euations above can be simpified to j, and X r X r X r 3 X r Y r ω r Z r ω r G r ω 3r Y r jω r Z r ω r G r jω 3r Y r ω r Z r ω r G r ω 3r Y r jω r Z r ω r G r jω 3r where r 0, 1,...,/ 1. If the radix- agorithm is impemented based on euations 11.10, 11.11, 11.1, and 11.13, one step of the radix- agorithm wi reuire more arithmetic operations than two steps of the radix- agorithm, because some partia resuts were computed more than once. However, if such partia resuts can be identified and computed ony once, one step of the radix- agorithm can reuire fewer arithmetic operations than two steps of the radix- agorithm, and the tota cost of the radix- agorithm can be ower than the radix- agorithm. The four recurrent partia resuts are shown beow inside each pair of parentheses. X r Y r ω r G r ω r Z r ω 3r 11.1 X r Y r ω r G r j ω r Z r ω 3r Xr ωz r r ω 3r H r Yr ω r G r, Xr 3 j ωz r r ω 3r H r Yr ω r G r, where r 0, 1,..., / 1. The computation represented by 11.1, 11.15, 11.16, and can now be represented by the two stages of butterfy computation in Figure Anayzing the arithmetic cost To determine the arithmetic cost of the radix- FFT agorithm, observe that ω r G r, ωz r r and ω 3r H r need to be computed before the four partia sums can be obtained. Since the size of each subprobem is /, 3/ compex mutipications and compex additions are performed during the first stage of butterfy computation. The second stage of butterfy computation invoves no mutipication by the twidde factors, so ony compex additions are needed. Thus, 3/ compex mutipications and compex additions are reuired to impement the butterfy computation in Figure by CRC Press LLC

4 Figure 11.1 The radix- DIT FFT butterfies. Reca again that the arithmetic cost of computer agorithms is measured by the number of rea arithmetic operations, and that one compex addition incurs two rea additions according to.1, and one compex mutipication with pre-computed intermediate resuts invoving the rea and imaginary parts of a twidde factor incurs three rea mutipications and three rea additions according to.. Accordingy, 9/ rea mutipications and 5/ rea additions are reuired per step of radix- DIT FFT. Thus, one step of the radix- DIT FFT agorithm reuires 17/ fops in tota. Since the objective of deveoping the radix- agorithm is to minimize the essentia rea operations, a carefu anaysis of the cost shoud excude the trivia mutipication by ω 0 1 and ω j ±1 or±j, since they wi certainy not be done in an efficient impementation. Furthermore, note that the cost of mutipication by a twidde factor which is an odd power of ω 8 1 j/ is ess than the cost of a compex mutipication because j 1 j ω8 1 ω ω 8 j ± 1j or ±. These specia factors are identified from the computation of ω r G r, ω r Z r, and ω 3r H r for r 0, 1,..., 1 beow. Tabe 11.1 Specia cases of twidde-factor mutipication in the radix- agorithm. WG P- 1 x G,. Gr wdgr -jgr W-L w;g WLZP 1 x zp ZP W8Zr - W3rH r 1 x H, H, Wi, - - Thus, there are eight specia cases: the four cases invoving mutipication by 1 and j are trivia, and the other four cases invoving the mutipication by an odd power of ω 8 are to be treated speciay. The tota nontrivia compex mutipications thus is reduced to 3 8. Since ony fops are needed to compute each of ω 8G r, ω 3 8G r, 000 by CRC Press LLC

5 ω 8 Z r, ω 3 8 the tota fop count becomes Because these specia factors aso occur in every subseuent step, the savings can be incorporated in setting up the recurrence euation. For competeness, assuming that the probem size is n, these specia factors are identified for r0,1,...,/ i1 inthe i th step for i0, 1,...,n in Tabe 11.. Tabe 11. The recurrent specia twidde-factor mutipications in the radix- agorithm. o<r<&-1 ro r f -& 1 r a -g L r g -&.A Ir.G w/ 1 x G, G, wgr -jg, wagr w%g w;;,i, x&, W8.G W$,i H, 1 x HP H, &f, To set up the recurrence euation, the boundary condition for is needed. Reca that when, the twidde factors are the four primitive roots of unity, namey 1,, j and j, so the first stage of butterfy computation invoves no nontrivia compex mutipications. Therefore, when, ony 8 compex additions or 16 rea arithmetic operations are reuired. The cost of the radix- FFT agorithm can now be represented by the foowing recurrence: 11.0 T 17 T { 3 if n >, 16 if. Soving 11.0 see Appendix B, one obtains 11.1 T 1 og The derivation above confirms simiar resuts given in [70, 1981] and [6, 1996]. Therefore, compared to the arithmetic cost of T 5 og of the radix- agorithm in 3.10, the saving by the radix- agorithm is 15 percent. It wi be shown in Chapter 1 that the spit-radix agorithm can further reduce the arithmetic cost to T og Θ, which represents a saving of 5 percent compared to the radix- agorithm. 11. The Radix- DIF FFTs A radix- DIF FFT agorithm can be derived from recursivey decimating the freuency series into four subsets, i.e., the set denoted by Y k X k for 0 k / 1, the set denoted by Z k X k1 for 0 k / 1, the set denoted by G k X k for 000 by CRC Press LLC

6 0 k / 1, and the set denoted by H k X k3 for 0 k / 1 as shown beow. The derivation again begins with the DFT definition from X r x ω r, r 0, 1,..., 1, x ω r x ω r 0 x ω r ω r x x x ω r 3 x ω r x ω r 0 x ω r ω r ω r x ω r 0 0 x 3 3 x ω r x ω r x ω r ω 3r ω 3r ω r. 0 0 x 3 ω r 3 x 3 ω r The four subprobems can thus be constructed by substituting r k, r k 1, r k, and r k 3 into the euation above Z k X k1 Y k X k x x x x ω k x x x x x x x ω k x 3 x 3 ω k x 3 y ω k, k 0, 1,...,/ 1. x x ω k1 x j x ω k1 x 3 x 3 z ω k, k 0, 1,...,/ 1. ω k ωω k ω 3 k ω k ω 3k1 ω k1 000 by CRC Press LLC

7 11.5 G k X k x x 11.6 H k X k x x ω k x x ω k x 3 x 3 g ω k, k 0, 1,...,/ 1. x x x x ω k3 x j x ω k3 ω k ω x 3 x 3 h ω k, k 0, 1,...,/ 1. ω 3 k ω ω 3k ω k ω 3k3 ω k3 To form these four subprobems using two stages of butterfy computation, the partia sums identified above are first rearranged to faciitate the butterfy computation as shown beow y z g h j x x x x x x j x 3 x 3 x x x 3 x 3 x x x x, 0 1. ω, 0 1. ω, 0 1. ω 3, 0 1. The computation represented by 11.7, 11.8, 11.9, and can now be represented by the two stages of butterfy computation in Figure 11.. Figure 11. The radix- DIF FFT butterfies. 000 by CRC Press LLC

8 11.3 The Cass of Radix- s DIT and DIF FFTs The techniues used to deveop the radix- and the radix- FFT agorithms can be generaized to deveop the entire cass of radix- s FFTs. Setting s, a radix- DIT FFT agorithm may be deveoped from decomposing 3.1 into partia sums: X r x ω r, r 0, 1,..., 1, 0 u0 k0 ω ur u0 k0 ur ω u0 k0 ω ur u0 x ku ω rku k0 x ku ω rk x ku ω rk x ku ω rk. Observe that 3.3 and 11.1 are specia cases of the euation above when and. According to 11.31, the time series can be decimated into s sets so that each of the partia sums represented by k0 x kuω rk for u 0, 1,..., 1, can be recursivey computed independent of each other. Each partia sum represents the DFT of a subprobem of size /. The output freuencies are computed as separate segments, and each segment denoted by X λ has / consecutive eements indexed by, where 0 / and 0 λ 1. By substituting r λ in 11.31, one obtains the euation for computing the output freuencies in each of the segments. The euation for the λ th segment is shown beow, where 0 λ X λ u0 ω u ω ω u ω uλ u0 uλ x ku ω kλ k0 x ku ω k, 0, 1,...,/ 1. k0 Of course, to minimize the arithmetic cost, the computation of the freuency segments shoud be reorganized to avoid redundant computation as demonstrated earier in the derivation of the radix- DIT FFT agorithm. Observe aso that by substituting, λ 0, 1 in 11.3, one obtains 3.7 and 3.8 for computing the two freuency segments in the radix- DIT FFT agorithm; on the other hand, by substituting, λ 0, 1,, 3 in 11.3, one obtains the four euations 11.6, 11.7, 11.8, and 11.9 for computing the four freuency segments in the radix- DIT FFT agorithm. To deveop a radix- DIF FFT agorithm, one woud simpy decimate the freuency series X r into sets with each set containing {Y k u Y k u X ku, 0 k / 1} 000 by CRC Press LLC

9 for u 0, 1,..., 1. Each of the subprobems is thus of size /, and is defined by substituting r k u in as shown for and in deveoping the radix- and radix- DIF FFT agorithms in Sections 3. and 11.. For competeness, a brief derivation, which iuminates the generaization from the radix- and radix- agorithms, is provided beow. X r x ω r, r 0, 1,..., 1, λ0 0 0 λ0 0 λ0 0 λ0 0 λ0 { x λ ω rλ x λ ω rλ x λ ω rλ ω r x λ ω λr ω r. The subprobems can thus be constructed by substituting r k u in for u 0, 1,..., 1. Y u k X ku x λ ω λku ω ku λ0 x λ ω λku ω u } ω k y u ω k, k 0, 1,...,/ 1. 0 ote that the / input data points to each subprobems are abeed by y u for u 0, 1,..., 1. To show that the radix- and radix- DIF FFT are specia cases when and, the generaized formuae for forming each of the s subprobems are expicity identified from 11.3 and it is dispayed once again beow. Observe that when,y in 3.13 and z in 3.15 correspond to y 0 and y 1 in the generaized formua; when,y, z, g and h in euations 11.3 to 11.6 correspond to y 0, y 1, y and y 3 in this generaized formua y u x λ ω λku ω u, 0, 1,...,/ 1. λ0 Since it is known that a radix- FFT for s > is ess efficient than the probaby optima spit-radix agorithm which recursivey appies both radix- and radix- agorithms to sove each subprobem [86], further detais on higher radix agorithms are omitted here, and readers are referred to [5, 8] for detais about the popuar radix-8 and radix-16 FFT agorithms., 000 by CRC Press LLC

Sorting, Merge Sort and the Divide-and-Conquer Technique

Sorting, Merge Sort and the Divide-and-Conquer Technique Inf2B gorithms and Data Structures Note 7 Sorting, Merge Sort and the Divide-and-Conquer Technique This and a subsequent next ecture wi mainy be concerned with sorting agorithms. Sorting is an extremey

More information

Math: Fundamentals 100

Math: Fundamentals 100 Math: Fundamentas 100 Wecome to the Tooing University. This course is designed to be used in conjunction with the onine version of this cass. The onine version can be found at http://www.tooingu.com. We

More information

MATH 124B Solution Key HW 01

MATH 124B Solution Key HW 01 5.1 THE COEFFICIENTS MATH 14B Soution Key HW 1 5.1 THE COEFFICIENTS 1. In the expansion 1 = n odd (4/nπ) sin nx, vaid for < x < π, put x = π/4 to cacuate the sum 1 15 + 19 113 + 1 + 1 + 1 + = 1 + 1 1 1

More information

25.4. Solution Using Fourier Series. Introduction. Prerequisites. Learning Outcomes

25.4. Solution Using Fourier Series. Introduction. Prerequisites. Learning Outcomes Soution Using Fourier Series 25.4 Introduction In this Section we continue to use the separation of variabes method for soving PDEs but you wi find that, to be abe to fit certain boundary conditions, Fourier

More information

Divide and Conquer Approach

Divide and Conquer Approach Divide and Conquer Approac Deiverabes Divide and Conquer Paradigm nteger Mutipication Strassen Matrix Mutipication Cosest Pair of points nfinite Wa Probem 6/7/01 8:58 PM Copyrigt @ gdeepak.com Divide and

More information

An Idiot s guide to Support vector machines (SVMs)

An Idiot s guide to Support vector machines (SVMs) An Idiot s guide to Support vector machines (SVMs) R. Berwick, Viage Idiot SVMs: A New Generation of Learning Agorithms Pre 1980: Amost a earning methods earned inear decision surfaces. Linear earning

More information

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

Math 447/547 Partial Differential Equations Prof. Carlson Homework 7 Text section 4.2 1. Solve the diffusion problem. u(t,0) = 0 = u x (t,l).

Math 447/547 Partial Differential Equations Prof. Carlson Homework 7 Text section 4.2 1. Solve the diffusion problem. u(t,0) = 0 = u x (t,l). Math 447/547 Partia Differentia Equations Prof. Carson Homework 7 Text section 4.2 1. Sove the diffusion probem with the mixed boundary conditions u t = ku xx, < x

More information

Teamwork. Abstract. 2.1 Overview

Teamwork. Abstract. 2.1 Overview 2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and

More information

nπt a n cos y(x) satisfies d 2 y dx 2 + P EI y = 0 If the column is constrained at both ends then we can apply the boundary conditions

nπt a n cos y(x) satisfies d 2 y dx 2 + P EI y = 0 If the column is constrained at both ends then we can apply the boundary conditions Chapter 6: Page 6- Fourier Series 6. INTRODUCTION Fourier Anaysis breaks down functions into their frequency components. In particuar, a function can be written as a series invoving trigonometric functions.

More information

Australian Bureau of Statistics Management of Business Providers

Australian Bureau of Statistics Management of Business Providers Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad

More information

Computing the depth of an arrangement of axis-aligned rectangles in parallel

Computing the depth of an arrangement of axis-aligned rectangles in parallel Computing the depth of an arrangement of axis-aigned rectanges in parae Hemut At Ludmia Scharf Abstract We consider the probem of computing the depth of the arrangement of n axis-aigned rectanges in the

More information

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS John N.. Var arvatsouakis atsouakis DURING the present time,

More information

Face Hallucination and Recognition

Face Hallucination and Recognition Face Haucination and Recognition Xiaogang Wang and Xiaoou Tang Department of Information Engineering, The Chinese University of Hong Kong {xgwang1, xtang}@ie.cuhk.edu.hk http://mmab.ie.cuhk.edu.hk Abstract.

More information

Artificial neural networks and deep learning

Artificial neural networks and deep learning February 20, 2015 1 Introduction Artificia Neura Networks (ANNs) are a set of statistica modeing toos originay inspired by studies of bioogica neura networks in animas, for exampe the brain and the centra

More information

Lecture 5: Solution Method for Beam Deflections

Lecture 5: Solution Method for Beam Deflections Structura Mechanics.080 Lecture 5 Semester Yr Lecture 5: Soution Method for Beam Defections 5.1 Governing Equations So far we have estabished three groups of equations fuy characterizing the response of

More information

Constrained Optimization: Step by Step. Maximizing Subject to a set of constraints:

Constrained Optimization: Step by Step. Maximizing Subject to a set of constraints: Constrained Optimization: Step by Step Most (if not a) economic decisions are the resut of an optimization probem subject to one or a series of constraints: Consumers make decisions on what to buy constrained

More information

Pricing Internet Services With Multiple Providers

Pricing Internet Services With Multiple Providers Pricing Internet Services With Mutipe Providers Linhai He and Jean Warand Dept. of Eectrica Engineering and Computer Science University of Caifornia at Berkeey Berkeey, CA 94709 inhai, wr@eecs.berkeey.edu

More information

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies ISM 602 Dr. Hamid Nemati Objectives The idea Dependencies Attributes and Design Understand concepts normaization (Higher-Leve Norma Forms) Learn how to normaize tabes Understand normaization and database

More information

Online Supplement for The Robust Network Loading Problem under Hose Demand Uncertainty: Formulation, Polyhedral Analysis, and Computations

Online Supplement for The Robust Network Loading Problem under Hose Demand Uncertainty: Formulation, Polyhedral Analysis, and Computations Onine Suppement for The Robust Network Loading Probem under Hose Demand Uncertaint: Formuation, Pohedra Anasis, and Computations Aşegü Atın Department of Industria Engineering, TOBB Universit of Economics

More information

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing. Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services

More information

Maintenance activities planning and grouping for complex structure systems

Maintenance activities planning and grouping for complex structure systems Maintenance activities panning and grouping for compex structure systems Hai Canh u, Phuc Do an, Anne Barros, Christophe Berenguer To cite this version: Hai Canh u, Phuc Do an, Anne Barros, Christophe

More information

Traffic classification-based spam filter

Traffic classification-based spam filter Traffic cassification-based spam fiter Ni Zhang 1,2, Yu Jiang 3, Binxing Fang 1, Xueqi Cheng 1, Li Guo 1 1 Software Division, Institute of Computing Technoogy, Chinese Academy of Sciences, 100080, Beijing,

More information

Teaching fractions in elementary school: A manual for teachers

Teaching fractions in elementary school: A manual for teachers Teaching fractions in eementary schoo: A manua for teachers H. Wu Apri 0, 998 [Added December, 200] I have decided to resurrect this fie of 998 because, as a reativey short summary of the basic eements

More information

α α λ α = = λ λ α ψ = = α α α λ λ ψ α = + β = > θ θ β > β β θ θ θ β θ β γ θ β = γ θ > β > γ θ β γ = θ β = θ β = θ β = β θ = β β θ = = = β β θ = + α α α α α = = λ λ λ λ λ λ λ = λ λ α α α α λ ψ + α =

More information

A Branch-and-Price Algorithm for Parallel Machine Scheduling with Time Windows and Job Priorities

A Branch-and-Price Algorithm for Parallel Machine Scheduling with Time Windows and Job Priorities A Branch-and-Price Agorithm for Parae Machine Scheduing with Time Windows and Job Priorities Jonathan F. Bard, 1 Siwate Rojanasoonthon 2 1 Graduate Program in Operations Research and Industria Engineering,

More information

Betting Strategies, Market Selection, and the Wisdom of Crowds

Betting Strategies, Market Selection, and the Wisdom of Crowds Betting Strategies, Market Seection, and the Wisdom of Crowds Wiemien Kets Northwestern University w-kets@keogg.northwestern.edu David M. Pennock Microsoft Research New York City dpennock@microsoft.com

More information

AUSTRALIA S GAMBLING INDUSTRIES - INQUIRY

AUSTRALIA S GAMBLING INDUSTRIES - INQUIRY Mr Gary Banks Chairman Productivity Commission PO Box 80 BELCONNEN ACT 2616 Dear Mr Banks AUSTRALIA S GAMBLING INDUSTRIES - INQUIRY I refer to the Issues Paper issued September 1998 seeking submissions

More information

WEBSITE ACCOUNT USER GUIDE SECURITY, PASSWORD & CONTACTS

WEBSITE ACCOUNT USER GUIDE SECURITY, PASSWORD & CONTACTS WEBSITE ACCOUNT USER GUIDE SECURITY, PASSWORD & CONTACTS Password Reset Process Navigate to the og in screen Seect the Forgot Password ink You wi be asked to enter the emai address you registered with

More information

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY Course Offered By: Indian Environmenta Society INTRODUCTION The Indian Environmenta Society (IES) a dynamic and fexibe organization with a goba vision

More information

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441

More information

Human Capital & Human Resources Certificate Programs

Human Capital & Human Resources Certificate Programs MANAGEMENT CONCEPTS Human Capita & Human Resources Certificate Programs Programs to deveop functiona and strategic skis in: Human Capita // Human Resources ENROLL TODAY! Contract Hoder Contract GS-02F-0010J

More information

Vision Helpdesk Client Portal User Guide

Vision Helpdesk Client Portal User Guide Hepdesk Hepdesk Vision Hepdesk Cient Porta User Guide VISION HELPDESK v3 User Guide (for Cient) CLIENT PORTAL DETAILS VISION HELPDESK v3 User Guide (for Cient) Hepdesk Index Cient Porta.....................................................

More information

Multi-Robot Task Scheduling

Multi-Robot Task Scheduling Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in

More information

Risk Margin for a Non-Life Insurance Run-Off

Risk Margin for a Non-Life Insurance Run-Off Risk Margin for a Non-Life Insurance Run-Off Mario V. Wüthrich, Pau Embrechts, Andreas Tsanakas February 2, 2011 Abstract For sovency purposes insurance companies need to cacuate so-caed best-estimate

More information

Fourier Series. The Main Fourier Series Expansions.

Fourier Series. The Main Fourier Series Expansions. Fourier Series Roughy speaking, a Fourier series expansion for a function is a representation of the function as sum of s and coes. Expresg a musica tone as a sum of a fundamenta tone and various harmonics

More information

Chapter 3: e-business Integration Patterns

Chapter 3: e-business Integration Patterns Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?

More information

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server

More information

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH Ufuk Cebeci Department of Industria Engineering, Istanbu Technica University, Macka, Istanbu, Turkey - ufuk_cebeci@yahoo.com Abstract An Enterprise

More information

Cooperative Content Distribution and Traffic Engineering in an ISP Network

Cooperative Content Distribution and Traffic Engineering in an ISP Network Cooperative Content Distribution and Traffic Engineering in an ISP Network Wenjie Jiang, Rui Zhang-Shen, Jennifer Rexford, Mung Chiang Department of Computer Science, and Department of Eectrica Engineering

More information

Federal Financial Management Certificate Program

Federal Financial Management Certificate Program MANAGEMENT CONCEPTS Federa Financia Management Certificate Program Training to hep you achieve the highest eve performance in: Accounting // Auditing // Budgeting // Financia Management ENROLL TODAY! Contract

More information

Bringing risk assessments to life by integrating with process maps

Bringing risk assessments to life by integrating with process maps Bringing risk assessments to ife by integrating with process maps Gordon Seers 1, Aan Webb 2 and Chris Thornton 3 1 Safety Management Consutant, 34 Westbury Road, Northwood HA6 3B, UK. E-mai: gordon.seers@ds.pipex.com

More information

Determining the User Intent of Chinese-English Mixed Language Queries Based On Search Logs

Determining the User Intent of Chinese-English Mixed Language Queries Based On Search Logs Determining the User Intent of Chinese-Engish Mixed Language Queries Based On Search Logs Hengyi Fu, Forida State University, City University of New York Abstract With the increasing number of mutiingua

More information

REAL TIME IMPLEMANTATION OF LMS BEAMFORMER FOR cdma2000 3G SYSTEM USING TI TMS320C6701 DSP

REAL TIME IMPLEMANTATION OF LMS BEAMFORMER FOR cdma2000 3G SYSTEM USING TI TMS320C6701 DSP REAL TIME IMPLEMANTATION OF LMS BEAMFORMER FOR cdma2000 3G SYSTEM USING TI TMS320C6701 DSP Kerem Küçük, Mustafa Karakoç, and Adnan Kavak + Kocaei University + Kocaei University Eectronics and Computer

More information

Minimum Support Size of the Defender s Strong Stackelberg Equilibrium Strategies in Security Games

Minimum Support Size of the Defender s Strong Stackelberg Equilibrium Strategies in Security Games Minimum Support Size o the Deender s Strong Stackeberg Equiibrium Strategies in Security Games Jiarui Gan University o Chinese Academy o Sciences The Key Lab o Inteigent Inormation Processing, ICT, CAS

More information

3.3 SOFTWARE RISK MANAGEMENT (SRM)

3.3 SOFTWARE RISK MANAGEMENT (SRM) 93 3.3 SOFTWARE RISK MANAGEMENT (SRM) Fig. 3.2 SRM is a process buit in five steps. The steps are: Identify Anayse Pan Track Resove The process is continuous in nature and handed dynamicay throughout ifecyce

More information

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation

More information

Risk Margin for a Non-Life Insurance Run-Off

Risk Margin for a Non-Life Insurance Run-Off Risk Margin for a Non-Life Insurance Run-Off Mario V. Wüthrich, Pau Embrechts, Andreas Tsanakas August 15, 2011 Abstract For sovency purposes insurance companies need to cacuate so-caed best-estimate reserves

More information

Early access to FAS payments for members in poor health

Early access to FAS payments for members in poor health Financia Assistance Scheme Eary access to FAS payments for members in poor heath Pension Protection Fund Protecting Peope s Futures The Financia Assistance Scheme is administered by the Pension Protection

More information

Fixed income managers: evolution or revolution

Fixed income managers: evolution or revolution Fixed income managers: evoution or revoution Traditiona approaches to managing fixed interest funds rey on benchmarks that may not represent optima risk and return outcomes. New techniques based on separate

More information

HYBRID FUZZY LOGIC PID CONTROLLER. Abstract

HYBRID FUZZY LOGIC PID CONTROLLER. Abstract HYBRID FUZZY LOGIC PID CONTROLLER Thomas Brehm and Kudip S. Rattan Department of Eectrica Engineering Wright State University Dayton, OH 45435 Abstract This paper investigates two fuzzy ogic PID controers

More information

Decision support system for the batching problems of steelmaking and continuous-casting production

Decision support system for the batching problems of steelmaking and continuous-casting production Omega 36 (2008 976 991 www.esevier.com/ocate/omega Decision support system for the batching probems of steemaking and continuous-casting production Lixin Tang, Gongshu Wang The Logistics Institute, Northeastern

More information

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,

More information

The Computation of the Inverse of a Square Polynomial Matrix

The Computation of the Inverse of a Square Polynomial Matrix The Computation of the Inverse of a Square Poynomia Matrix Ky M. Vu, PhD. AuLac Technoogies Inc. c 2008 Emai: kymvu@auactechnoogies.com Abstract An approach to cacuate the inverse of a square poynomia

More information

Response Time versus Utilization in Scheduler Overhead Accounting

Response Time versus Utilization in Scheduler Overhead Accounting Response Time versus Utiization in Scheduer Overhead Accounting Siviu S. Craciunas Christoph M. Kirsch Ana Sokoova Department of Computer Sciences University of Sazburg, Austria Emai: firstname.astname@cs.uni-sazburg.at

More information

The eg Suite Enabing Rea-Time Monitoring and Proactive Infrastructure Triage White Paper Restricted Rights Legend The information contained in this document is confidentia and subject to change without

More information

5. Introduction to Robot Geometry and Kinematics

5. Introduction to Robot Geometry and Kinematics V. Kumar 5. Introduction to Robot Geometry and Kinematics The goa of this chapter is to introduce the basic terminoogy and notation used in robot geometry and kinematics, and to discuss the methods used

More information

The Computation of American Option Price Sensitivities using a Monotone Multigrid Method for Higher Order B Spline Discretizations

The Computation of American Option Price Sensitivities using a Monotone Multigrid Method for Higher Order B Spline Discretizations The Computation of American Option Price Sensitivities using a Monotone Mutigrid Method for Higher Order B Spine Discretizations Markus Hotz October 26, 2004 Abstract In this paper a fast sover for discrete

More information

LADDER SAFETY Table of Contents

LADDER SAFETY Table of Contents Tabe of Contents SECTION 1. TRAINING PROGRAM INTRODUCTION..................3 Training Objectives...........................................3 Rationae for Training.........................................3

More information

This paper considers an inventory system with an assembly structure. In addition to uncertain customer

This paper considers an inventory system with an assembly structure. In addition to uncertain customer MANAGEMENT SCIENCE Vo. 51, No. 8, August 2005, pp. 1250 1265 issn 0025-1909 eissn 1526-5501 05 5108 1250 informs doi 10.1287/mnsc.1050.0394 2005 INFORMS Inventory Management for an Assemby System wh Product

More information

GREEN: An Active Queue Management Algorithm for a Self Managed Internet

GREEN: An Active Queue Management Algorithm for a Self Managed Internet : An Active Queue Management Agorithm for a Sef Managed Internet Bartek Wydrowski and Moshe Zukerman ARC Specia Research Centre for Utra-Broadband Information Networks, EEE Department, The University of

More information

Estimation of Tail Development Factors in the Paid-Incurred Chain Reserving Method

Estimation of Tail Development Factors in the Paid-Incurred Chain Reserving Method Estimation of Tai Deveopment Factors in the aid-incurred Chain Reserving Method by Michae Merz and Mario V Wüthrich AbSTRACT In many appied caims reserving probems in &C insurance the caims settement process

More information

An Integrated Data Management Framework of Wireless Sensor Network

An Integrated Data Management Framework of Wireless Sensor Network An Integrated Data Management Framework of Wireess Sensor Network for Agricutura Appications 1,2 Zhao Liang, 2 He Liyuan, 1 Zheng Fang, 1 Jin Xing 1 Coege of Science, Huazhong Agricutura University, Wuhan

More information

Bite-Size Steps to ITIL Success

Bite-Size Steps to ITIL Success 7 Bite-Size Steps to ITIL Success Pus making a Business Case for ITIL! Do you want to impement ITIL but don t know where to start? 7 Bite-Size Steps to ITIL Success can hep you to decide whether ITIL can

More information

History and Definition of CNC 100

History and Definition of CNC 100 History and Definition of CNC 100 Wecome to the Tooing University. This course is designed to be used in conjunction with the onine version of this cass. The onine version can be found at http://www.tooingu.com.

More information

SOLVING THE NONLINEAR POISSON EQUATION ON THE UNIT DISK

SOLVING THE NONLINEAR POISSON EQUATION ON THE UNIT DISK JOURNAL OF INTEGRAL EQUATIONS AND APPLICATIONS Voume 7, Number 3, Fa 2005 SOLVING THE NONLINEAR POISSON EQUATION ON THE UNIT DISK KENDALL ATKINSON AND OLAF HANSEN ABSTRACT We propose and anayze a numerica

More information

3.5 Pendulum period. 2009-02-10 19:40:05 UTC / rev 4d4a39156f1e. g = 4π2 l T 2. g = 4π2 x1 m 4 s 2 = π 2 m s 2. 3.5 Pendulum period 68

3.5 Pendulum period. 2009-02-10 19:40:05 UTC / rev 4d4a39156f1e. g = 4π2 l T 2. g = 4π2 x1 m 4 s 2 = π 2 m s 2. 3.5 Pendulum period 68 68 68 3.5 Penduum period 68 3.5 Penduum period Is it coincidence that g, in units of meters per second squared, is 9.8, very cose to 2 9.87? Their proximity suggests a connection. Indeed, they are connected

More information

SAT Math Must-Know Facts & Formulas

SAT Math Must-Know Facts & Formulas SAT Mat Must-Know Facts & Formuas Numbers, Sequences, Factors Integers:..., -3, -2, -1, 0, 1, 2, 3,... Rationas: fractions, tat is, anyting expressabe as a ratio of integers Reas: integers pus rationas

More information

Finance 360 Problem Set #6 Solutions

Finance 360 Problem Set #6 Solutions Finance 360 Probem Set #6 Soutions 1) Suppose that you are the manager of an opera house. You have a constant margina cost of production equa to $50 (i.e. each additiona person in the theatre raises your

More information

SAT Math Facts & Formulas

SAT Math Facts & Formulas Numbers, Sequences, Factors SAT Mat Facts & Formuas Integers:..., -3, -2, -1, 0, 1, 2, 3,... Reas: integers pus fractions, decimas, and irrationas ( 2, 3, π, etc.) Order Of Operations: Aritmetic Sequences:

More information

Implementation of the Neumann Formula for Calculating the Mutual Inductance between Planar PCB Inductors

Implementation of the Neumann Formula for Calculating the Mutual Inductance between Planar PCB Inductors Proceedings of the 2008 Internationa Conference on Eectrica Machines Paper ID 876 Impementation of the Neumann Formua for Cacuating the Mutua Inductance between Panar PCB Inductors C. L. W. Sonntag, E.

More information

Chapter 1 Structural Mechanics

Chapter 1 Structural Mechanics Chapter Structura echanics Introduction There are many different types of structures a around us. Each structure has a specific purpose or function. Some structures are simpe, whie others are compex; however

More information

ELEVATING YOUR GAME FROM TRADE SPEND TO TRADE INVESTMENT

ELEVATING YOUR GAME FROM TRADE SPEND TO TRADE INVESTMENT Initiatives Strategic Mapping Success in The Food System: Discover. Anayze. Strategize. Impement. Measure. ELEVATING YOUR GAME FROM TRADE SPEND TO TRADE INVESTMENT Foodservice manufacturers aocate, in

More information

Breakeven analysis and short-term decision making

Breakeven analysis and short-term decision making Chapter 20 Breakeven anaysis and short-term decision making REAL WORLD CASE This case study shows a typica situation in which management accounting can be hepfu. Read the case study now but ony attempt

More information

Network/Communicational Vulnerability

Network/Communicational Vulnerability Automated teer machines (ATMs) are a part of most of our ives. The major appea of these machines is convenience The ATM environment is changing and that change has serious ramifications for the security

More information

TERM INSURANCE CALCULATION ILLUSTRATED. This is the U.S. Social Security Life Table, based on year 2007.

TERM INSURANCE CALCULATION ILLUSTRATED. This is the U.S. Social Security Life Table, based on year 2007. This is the U.S. Socia Security Life Tabe, based on year 2007. This is avaiabe at http://www.ssa.gov/oact/stats/tabe4c6.htm. The ife eperiences of maes and femaes are different, and we usuay do separate

More information

Vendor Performance Measurement Using Fuzzy Logic Controller

Vendor Performance Measurement Using Fuzzy Logic Controller The Journa of Mathematics and Computer Science Avaiabe onine at http://www.tjmcs.com The Journa of Mathematics and Computer Science Vo.2 No.2 (2011) 311-318 Performance Measurement Using Fuzzy Logic Controer

More information

The Use of Cooling-Factor Curves for Coordinating Fuses and Reclosers

The Use of Cooling-Factor Curves for Coordinating Fuses and Reclosers he Use of ooing-factor urves for oordinating Fuses and Recosers arey J. ook Senior Member, IEEE S& Eectric ompany hicago, Iinois bstract his paper describes how to precisey coordinate distribution feeder

More information

Order-to-Cash Processes

Order-to-Cash Processes TMI170 ING info pat 2:Info pat.qxt 01/12/2008 09:25 Page 1 Section Two: Order-to-Cash Processes Gregory Cronie, Head Saes, Payments and Cash Management, ING O rder-to-cash and purchase-topay processes

More information

Packet Classification with Network Traffic Statistics

Packet Classification with Network Traffic Statistics Packet Cassification with Network Traffic Statistics Yaxuan Qi and Jun Li Research Institute of Information Technoogy (RIIT), Tsinghua Uniersity Beijing, China, 100084 Abstract-- Packet cassification on

More information

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0 IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 2005 Pubished by the IEEE Computer Society Vo. 6, No. 5; May 2005 Editor: Marcin Paprzycki, http://www.cs.okstate.edu/%7emarcin/ Book Reviews: Java Toos and Frameworks

More information

A Frame Synchronization Method with Robustness to the Effects of Initial SFO in DRM Systems

A Frame Synchronization Method with Robustness to the Effects of Initial SFO in DRM Systems Internationa Journa of Software Engineering and Its Appications Vo. 6, o. 3, Juy, 0 A Frame Synchronization Method with Robustness to the Effects of Initia SFO in DRM Systems Ki-Won Kwon, Seong-Jun Kim,Yong-Suk,

More information

NCH Software FlexiServer

NCH Software FlexiServer NCH Software FexiServer This user guide has been created for use with FexiServer Version 1.xx NCH Software Technica Support If you have difficuties using FexiServer pease read the appicabe topic before

More information

eg Enterprise vs. a Big 4 Monitoring Soution: Comparing Tota Cost of Ownership Restricted Rights Legend The information contained in this document is confidentia and subject to change without notice. No

More information

(David H T Lan) Secretary for Home Affairs

(David H T Lan) Secretary for Home Affairs Message We sha make every effort to strengthen the community buiding programme which serves to foster among the peope of Hong Kong a sense of beonging and mutua care. We wi continue to impement the District

More information

page 11, Problem 1.14(a), line 1: Ψ(x, t) 2 Ψ(x, t) 2 ; line 2: h 2 2mk B page 13, Problem 1.18(b), line 2, first inequality: 3mk B

page 11, Problem 1.14(a), line 1: Ψ(x, t) 2 Ψ(x, t) 2 ; line 2: h 2 2mk B page 13, Problem 1.18(b), line 2, first inequality: 3mk B Corrections to the Instructor s Soution Manua Introduction to Quantum Mechanics, nd ed by David Griffiths Cumuative errata for the print version corrected in the current eectronic version I especiay thank

More information

History of Stars and Rain Education Institute for Autism (Stars and Rain)

History of Stars and Rain Education Institute for Autism (Stars and Rain) History of Education Institute for Autism () Estabished:: March 15. 1993 in Beijing Founder:: Ms. Tian Huiping (mother of a boy with autism) STARS AND RAIN was founded in 1993 by a parent and is China

More information

LESSON LEVERAGE ANALYSIS 21.0 AIMS AND OBJECTIVES 21.1 INTRODUCTION 21.2 OPERATING LEVERAGE CONTENTS

LESSON LEVERAGE ANALYSIS 21.0 AIMS AND OBJECTIVES 21.1 INTRODUCTION 21.2 OPERATING LEVERAGE CONTENTS LESSON 21 LEVERAGE ANALYSIS CONTENTS 21.0 Aims and Objectives 21.1 Introduction 21.2 Operating Leverage 21.3 Financia Leverage 21.4 EBIT-EPS Anaysis 21.5 Combined Leverage 21.6 Let us Sum up 21.7 Lesson-end

More information

Avaya Remote Feature Activation (RFA) User Guide

Avaya Remote Feature Activation (RFA) User Guide Avaya Remote Feature Activation (RFA) User Guide 03-300149 Issue 5.0 September 2007 2007 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document

More information

Life Contingencies Study Note for CAS Exam S. Tom Struppeck

Life Contingencies Study Note for CAS Exam S. Tom Struppeck Life Contingencies Study Note for CAS Eam S Tom Struppeck (Revised 9/19/2015) Introduction Life contingencies is a term used to describe surviva modes for human ives and resuting cash fows that start or

More information

Message. The Trade and Industry Bureau is committed to providing maximum support for Hong Kong s manufacturing and services industries.

Message. The Trade and Industry Bureau is committed to providing maximum support for Hong Kong s manufacturing and services industries. Message The Trade and Industry Bureau is committed to providing maximum support for Hong Kong s manufacturing and services industries. With the weight of our economy shifting towards knowedge-based and

More information

On Capacity Scaling in Arbitrary Wireless Networks

On Capacity Scaling in Arbitrary Wireless Networks On Capacity Scaing in Arbitrary Wireess Networks Urs Niesen, Piyush Gupta, and Devavrat Shah 1 Abstract arxiv:07112745v3 [csit] 3 Aug 2009 In recent work, Özgür, Lévêque, and Tse 2007) obtained a compete

More information

Leadership & Management Certificate Programs

Leadership & Management Certificate Programs MANAGEMENT CONCEPTS Leadership & Management Certificate Programs Programs to deveop expertise in: Anaytics // Leadership // Professiona Skis // Supervision ENROLL TODAY! Contract oder Contract GS-02F-0010J

More information

Efficient Data Partitioning Model for Heterogeneous Graphs in the Cloud

Efficient Data Partitioning Model for Heterogeneous Graphs in the Cloud Efficient Data Partitioning Mode for Heterogeneous Graphs in the Coud Kisung Lee Georgia Institute of Technoogy ksee@gatech.edu Ling Liu Georgia Institute of Technoogy ingiu@cc.gatech.edu ABSTRACT As the

More information

Design Considerations

Design Considerations Chapter 2: Basic Virtua Private Network Depoyment Page 1 of 12 Chapter 2: Basic Virtua Private Network Depoyment Before discussing the features of Windows 2000 tunneing technoogy, it is important to estabish

More information

How do we remember John Lennon?

How do we remember John Lennon? How do we remember? About this unit This unit centres on the ife and reputation of. Whie some factua knowedge about him forms an essentia component, the main focus is on contrasting a favourabe website

More information

Design and Analysis of a Hidden Peer-to-peer Backup Market

Design and Analysis of a Hidden Peer-to-peer Backup Market Design and Anaysis of a Hidden Peer-to-peer Backup Market Sven Seuken, Denis Chares, Max Chickering, Mary Czerwinski Kama Jain, David C. Parkes, Sidd Puri, and Desney Tan December, 2015 Abstract We present

More information

Certificateless Public Auditing for Data Integrity in the Cloud

Certificateless Public Auditing for Data Integrity in the Cloud Certificateess Pubic Auditing for Data Integrity in the Coud Boyang Wang,, Baochun Li, Hui Li and Fenghua Li, State Key Laboratory of Integrated Service Networks, Xidian University,Xi an,shaanxi,china

More information

CLOUD service providers manage an enterprise-class

CLOUD service providers manage an enterprise-class IEEE TRANSACTIONS ON XXXXXX, VOL X, NO X, XXXX 201X 1 Oruta: Privacy-Preserving Pubic Auditing for Shared Data in the Coud Boyang Wang, Baochun Li, Member, IEEE, and Hui Li, Member, IEEE Abstract With

More information

We investigate a two-stage serial supply chain with stationary stochastic demand and

We investigate a two-stage serial supply chain with stationary stochastic demand and Competitive and Cooperative Inventory Poicies in a Two-Stage Suppy Chain Gérard P Cachon Pau H Zipkin The Fuqua Schoo of Business Duke University Durham North Caroina 7708 gpc@maidukeedu zipkin@maidukeedu

More information