Optimized Capacity Bounds for the Half-Duplex Gaussian MIMO Relay Channel

Size: px
Start display at page:

Download "Optimized Capacity Bounds for the Half-Duplex Gaussian MIMO Relay Channel"

Transcription

1 Optimize Capacity Bouns for the Half-Duplex Gaussian MIMO elay Channel Lennart Geres an Wolfgang Utschick International ITG Workshop on mart Antennas (WA) February 211 c 211 IEEE. Personal use of this material is permitte. However, permission to reprint/republish this material for avertising or promotional purposes or for creating new collective works for resale or reistribution to servers or lists, or to reuse any copyrighte component of this work in other works must be obtaine from the IEEE. Technische Universität München Associate Institute for ignal Processing

2 Optimize Capacity Bouns for the Half-Duplex Gaussian MIMO elay Channel Lennart Geres, Wolfgang Utschick Associate Institute for ignal Processing Technische Universität München, 829 München, Germany {geres, Abstract In this paper, the optimization of the cut-set boun (CB) an the achievable ecoe-an-forwar (DF) rate for the half-uplex Gaussian multiple-input multiple-output (MIMO) relay channel is consiere. In particular, it is shown that evaluating the cut-set boun an the maximal achievable DF rate is equivalent to solving convex optimization problems if perfect channel state information (CI) is available at all noes. Our work therefore extens results for the full-uplex relay channel, which we also revisit here, an it emonstrates that it is possible to efficiently etermine (generally loose) bouns on the capacity of the half-uplex MIMO relay channel. Inex Terms elay channel, MIMO, half-uplex, cut-set boun, ecoe-an-forwar, convex optimization. I. INTODUCTION elaying has attracte a lot of interest in recent years ue to the ability to provie increase throughput an extene coverage to a growing number of mobile users. cenarios in which relaying may be employe inclue for example multihop wireless networks an sensor networks where noes have limite transmit power. In this work, we consier the simplest relay channel where one source transmits information to one estination with the help of a single relay. It is assume that this relay has no own information to transmit so that its only purpose is to assist the communication between the source an the terminal. A moel for this particular relay channel was first stuie by van er Meulen as early as 1971 [1], but its general capacity is still unknown. However, substantial avances towars the information theoretic unerstaning of the relay channel were mae by Cover an El Gamal. In [2], they erive upper an lower bouns on the capacity of the full-uplex relay channel base on a then new cut-set boun (CB) as well as two funamental coing schemes that are now referre to as ecoe-an-forwar (DF) an compress-an-forwar (CF), respectively. The DF strategy requires the relay to ecoe the whole source message, which is then re-encoe an sent to the estination. When the relay uses CF, it reliably forwars an estimate, a compresse version of its receive signal, to the estination. In [3], these two basic strategies were generalize to various relay channel moels that inclue multiple sources, relays, or estinations. Another relaying strategy of lower complexity than both DF an CF is calle amplify-an-forwar (AF), which is consiere in [4] for example. When the relay uses AF, it is restricte to perform linear operations on its receive signal. All information theoretic results that have been erive for the relay channel hol whether the noes are equippe with one or multiple antennas. However, multi-antenna noes may employ precoing, which evices having a single antenna are not capable of. The aitional egrees of freeom in the multiple-input multiple-output (MIMO) relay channel are of course reflecte in the corresponing optimization problems. Assuming Gaussian channel inputs, maximizing the achievable DF rate for the MIMO relay channel requires to solve an optimization problem with respect to the source covariance matrix, the relay covariance matrix, an their cross covariance matrix, for example. If all noes have a single antenna, on the other han, the same objective is maximize with respect to a scalar correlation coefficient ρ [, 1]. urprisingly, there are only few contributions that have focusse on optimizing bouns on the capacity of the MIMO relay channel. In [5], it is prove that Gaussian input istributions maximize the CB an the achievable DF rate for the full-uplex relay channel. Furthermore, the authors provie an upper boun on the CB that is loose in general. uboptimal lower bouns are also given base on point-topoint transmission (source to estination) an the cascae relay channel (source to relay, relay to estination). Two partial ecoe-an-forwar (PDF) strategies, where the relay only ecoes part of the source message, using superposition or irty-paper coing [6] at the source are presente in [7]. While the achievable rates are shown to improve on the lower bouns of [5], the authors only formulate but o not solve the corresponing rate maximization problems for the general case. We were able to show that, for the full-uplex case, the cut-set boun as well as the maximal achievable DF rate are obtaine as the solutions of convex optimization problems [8]. In this paper, we exten these results to the half-uplex relay channel, where a practical half-uplex constraint is impose on all noes. imilar work (for both the full-uplex an the halfuplex case) is presente in [9]. However, it can be verifie that the expressions resulting from those erivations are only upper bouns to the optimal solutions. The remainer of this paper is organize as follows. The system moels for the full-uplex an the half-uplex MIMO relay channel are introuce in ection II. ection III revisits the optimization of the CB for the full-uplex case an shows how these results can be extene to the half-uplex

3 elay elay H H D H (1) ource Figure 1. H D Full-uplex MIMO relay channel. Destination ource H D (a) elay receive phase. Destination elay case. The maximization of the achievable DF rate for both the full-uplex an the half-uplex relay channel is aresse in ection IV. Numerical results an a iscussion of these results are presente in ection V before we conclue in ection VI. II. YTEM MODEL In the full-uplex relay channel, which is illustrate in Figure 1, the signals receive at the relay an the estination can be expresse as y = H x + n, y D = H D x + H D x + n D, where H C N N, H D C ND N, H D C ND N represent the channel gain matrices assume to be perfectly known at all noes, an n N C (, I N ), n D N C (, I ND ) enote complex white Gaussian noise of unit variance. Let an enote the covariance matrices of the zero-mean source an relay inputs, then the source an the relay are subject to transmit power constraints given by tr( ) P an tr( ) P, respectively. Furthermore, the joint transmit covariance matrix of the source an relay inputs is etermine by [ [x ] [ ] ] H [ ] x = E = x x H. (2) Note that, by efining the two selection matrices D = [ I N N N ], D = [ N N I N ], (3) both the source an the relay transmit covariance matrices can be expresse as linear functions of : (1) = D D H, = D D H. (4) Let us now consier the more practical case where a halfuplex constraint is impose on all noes. In the half-uplex relay channel, which is epicte in Figure 2, a relay receive phase is followe by a relay transmit phase. These two phases are specifie by an y (1) = H x (1) + n (1), y (1) D = H Dx (1) + n (1) D, (5) y (2) D = H Dx (2) + H D x (2) + n(2) D, (6) where the noise n (1) N C(, I N ), n (1) D N C(, I ND ), an n (2) D N C (, I ND ) is inepenent of n (1) D. Note that the ource Figure 2. (2) H D (b) elay transmit phase. H D Half-uplex MIMO relay channel. Destination source transmits an the estination listens uring both phases, which means that the half-uplex constraint basically affects only the relay. Furthermore, without loss of generality H D is assume to be the same for both phases, an all channels are assume to be perfectly known at all noes again. ince only the source transmits in the first phase, we have [ (1) = E x (1) x(1),h ] = (1). (7) The joint transmit covariance matrix of the source an relay inputs for the relay transmit phase is given by [ ][ ] H [ ] (2) = E x (2) x (2) x (2) (2) x (2) = (2) (2),H (2). (8) Moreover, we have (2) = D (2) D H, (2) = D (2) D H. (9) Like in the full-uplex case, the source an the relay are subject to power constraints of the form tr( (1) ) P (1), tr( (2) ) P (2), an tr( (2) ) P (2), respectively. III. CUT-ET BOUND First, let us revisit the optimization of the cut-set boun for the full-uplex case. Cover an El Gamal [2] prove that the capacity of the full-uplex relay channel is upper boune by C FD CB = maxmin{ I(X ; Y Y D X ), I(X X ; Y D ) }, (1) where the maximization is with respect to the joint istribution of the source an relay signals. Furthermore, it is known that the source an relay inputs that optimize the CB are Gaussian [5]. With x N C (, ) an x N C (, ), it follows that I(X ; Y Y D X ) = log et ( I + H 1 H1 H ), (11) I(X X ; Y D ) = log et ( I + H 2 H2 H ), (12)

4 where H 1 = [ H H HD] H H, H2 = [ ] H D H D, an = H is the conitional covariance matrix of X given X. Here enotes the Moore-Penrose pseuoinverse of. emark 1: Note that is equal to the covariance matrix of the ranom vector X ˆX (X ) in this case, where ˆX (X ) = X is the linear minimum mean square error (MME) estimator of X given X. However, this is only because we have Gaussian inputs an the linear MME estimator is equal to the MME estimator for Gaussian ranom vectors. For general inputs, it oes not hol that the conitional covariance matrix of X given X is equal to H. We see that computing the cut-set boun for the fulluplex MIMO relay channel requires to solve the nonconvex optimization problem s.t. max CFD CB CB log et ( I + H 1 H1 H ), CCB FD log et ( I + H 2 H2 H ), tr(d D H ) P, tr(d D) H P, C FD (13) where D an D enote the selection matrices efine in (3). Observe that the nonconvexity is cause only by the conitional covariance matrix in the first inequality constraint. However, by means of introucing a slack variable Q an applying the chur complement conition for positive semi-efinite matrices [1, A.5.5], it is shown in [8] that the following is an equivalent optimization problem: CCB FD = max min{ log et ( I + H 1 QH H ) 1, Q, log et ( I + H 2 H2 H )} (14) s.t. tr(d D H ) P, tr(d D H ) P, Q, D H QD. Note that the last two constraints imply. As the objective function is the pointwise minimum of two concave functions (in Q, ), it is also concave [1]. Furthermore, all constraints are affine so that this optimization problem, which etermines the cut-set boun, is convex. Now, consier the optimization of the cut-set boun for the half-uplex case. In [11], it was shown that the CB for the half-uplex relay channel reas as CCB HD = maxmin{ τ 1 I(X (1) ; Y (1) Y (1) D ) + τ 2I(X (2) ; Y (2) D X(2) ), τ 1 I(X (1) ; Y (1) D ) + τ 2I(X (2) X(2) ; Y (2) D )}, (15) where τ 1 an τ 2 enote the urations of the relay receive an the relay transmit phase, respectively. The same arguments as in the full-uplex case may be put forwar to show that is also maximize by Gaussian source an relay inputs. Assuming x (1) N C (, (1) ), x(2) N C (, (2) ), an x (2) N C (, (2) ), the optimize cut-set boun is hence CB given by max C (1), (2) CB HD, τ 1,τ 2,τ 1+τ 2 1 s.t. CB τ 1 log I + H 1 (1) H1 + τ 2 log I + H D (2) H D, CB τ 1 log I + H D (1) HD + τ 2 log I + H 2 (2) H2, tr( (1) ) P (1), tr( (2) ) P (2), tr( (2) ) P (2). (16) This is again a nonconvex optimization problem, where the nonconvexity is cause by the conitional covariance matrix (2) = (2) (2) (2), (2),H in the first constraint on CCB HD. However, after reformulating this problem using the slack variable Q an the properties of the generalize chur complement, we obtain the following equivalent optimization problem: max CCB HD s.t. (1), (2),Q,τ 1,τ 2 CB τ 1 log I + H 1 (1) H1 + τ 2 log I + HD QHD, CB τ 1 log I + H D (1) HD + τ 2 log I + H 2 (2) H2, Q, (1), (2) D H QD, tr( (1) ) P (1), tr( (2) ) P (2), tr( (2) ) P (2), τ 1, τ 2, τ 1 + τ 2 1. (17) ince the nonnegative weighte sum of concave functions is concave [1], we can follow the same arguments as for the full-uplex case an conclue that this problem is convex (in Q, (1), (2), where the latter is implie by Q an (2) D HQD ) for fixe τ 1, τ 2. However, joint convexity in Q, (1), (2), τ 1, an τ 2 cannot be claime in this formulation. Nevertheless, letting τ 1 = τ an τ 2 = 1 τ, the optimal solution can be foun by sampling over one scalar parameter τ [, 1] an convex programming. Beyon that, it is also possible to formulate an equivalent optimization problem that is jointly convex in all parameters. To this en, we introuce the new variables C (1) = τ 1 (1), C (2) = τ 2 (2), Q = τ 2 Q. (18) The resulting optimization problem hence reas as max C C (1),C (2) CB HD s.t.,q,τ 1,τ 2 CB τ 1 log I + H C (1) 1 H1 H τ 1 + τ 2 log I + H Q D HD H τ 2, CB τ 1 log I + H C (1) D HD H τ 1 + τ 2 log I + H C (2) 2 H2 H τ 2, Q, C (1), C (2) D H Q D, tr(c (1) ) τ 1P (1), tr(c (2) ) τ 2P (2), tr(c (2) ) τ 2P (2), τ 1, τ 2, τ 1 + τ 2 1. (19) Note that g : (C (1) C, τ 1 ) τ 1 log I +H (1) 1 τ 1 H1 H efine on omg = {(C (1), τ 1 ) : C (1), τ 1 > } is the perspective of the function f : C (1) log I + H 1 C (1) H1 H efine on

5 the cone of positive semi-efinite matrices. Furthermore, f is concave in C (1). The convexity preserving property of the perspective operation [1, ec ], which was use in [9] to convexify a very similar problem, thus implies that g is jointly convex in C (1) an τ 1 on its entire omain. Analogous results hol for the other log-et functions. In aition, observe that all other constraints are affine. Therefore, we have obtaine an optimization problem that is jointly convex in all parameters Q, C (1), C (2), τ 1, τ 2. emark 2: The perspective function is efine only for positive real numbers. However, if we assume the convention that log x = for all x, which is commonly use in information theory base on continuity arguments [12, p. 19], then it is not necessary to exclue the cases τ 1 = an τ 2 = as the problematic terms vanish. IV. ACHIEVABLE DECODE-AND-FOWAD (DF) ATE A lower boun on the capacity of the relay channel is given by the rate that can be achieve with the ecoe-anforwar protocol erive by Cover an El Gamal [2]. Before we aress the half-uplex case, let us first revisit the fulluplex relay channel again. If the relay uses DF, all achievable rates in the full-uplex case satisfy FD DF maxmin { I(X ; Y X ), I(X X ; Y D ) }, (2) where the maximization is again with respect to the joint istribution of the source an relay signals. Observe that DF FD iffers from CCB FD only in the first mutual information term, whereas the secon one is the same. Beyon that, it has also been prove that Gaussian input istributions optimize the achievable DF rate [5]. Therefore, letting x N C (, ) an x N C (, ), it follows that I(X ; Y X ) = log et ( I + H H H ), (21) ] HD H H where the only ifference to (11) is that H 1 = [ H H is replace by H. Using the same arguments as for the calculation of the cut-set boun, it is thus shown in [8] that DF FD max min{ log et ( I + H QH H ), Q, log et ( I + H 2 H2 H )} (22) s.t. tr(d D H ) P, tr(d D H ) P, Q, D H QD. Consequently, the maximal achievable DF rate for the fulluplex MIMO relay channel is also obtaine as the solution of a convex optimization problem. A rather straightforwar application of the ecoe-anforwar scheme to the half-uplex relay channel yiels that the best DF rate is given by DF HD = maxmin { τ 1 I(X (1) ; Y (1) ) + τ 2I(X (2) ; Y (2) D X(2) ), τ 1 I(X (1) ; Y (1) D ) + τ 2I(X (2) X(2) ; Y (2) D )}, (23) where τ 1 an τ 2 again enote the lengths of the time slots allocate to the relay receive an the relay transmit phase, respectively. emark 3: This assumes that the source may transmit new information to the estination in the relay transmit phase. As the relay oes not receive (an thus ecoe) all the information the source communicates ue to the impose half-uplex constraint, this strategy is sometimes terme a partial DF scheme in the literature, incluing [9] for example. We agree with [11], however, an consier this as a DF strategy since the relay ecoes everything it can receive. an HD DF iffer only in one term. For Gaussian source an relay inputs x (1) N C (, (1) ), x(2) N C (, (2) ), an x(2) N C (, (2) ), the achievable DF rate is hence maximize by Like in the full-uplex case, CB max (1), (2) DF HD s.t.,q,τ 1,τ 2 DF τ 1 log I + H (1) H + τ 2 log I + HD QHD, DF τ 1 log I + H D (1) HD + τ 2 log I + H 2 (2) H2, HD HD Q, (1), (2) D H QD, tr( (1) ) P (1), tr( (2) ) P (2), tr( (2) ) P (2), τ 1, τ 2, τ 1 + τ 2 1, (24) where we have alreay introuce the slack variable Q an reformulate the problem. This optimization problem is basically obtaine by replacing H 1 in (17) by H, an like problem (17), it is convex in (1), (2), an Q for fixe time allocation parameters τ 1 an τ 2. If we further introuce the variables C (1), C (2), an Q as efine in (18), then, not surprisingly, it is also possible to express the maximal achievable DF rate for the halfuplex MIMO relay channel as the solution of an optimization problem that is jointly convex in all parameters. We state it here for reasons of completeness: max C (1),C (2),Q DF HD s.t.,τ 1,τ 2 DF τ 1 log I + H C (1) H H τ 1 + τ 2 log I + H Q D HD H τ 2, DF τ 1 log I + H C (1) D HD H τ 1 + τ 2 log I + H C (2) 2 H2 H τ 2, HD HD Q, C (1), C (2) D H Q D, tr(c (1) ) τ 1P (1), tr(c (2) ) τ 2P (2), tr(c (2) ) τ 2P (2), τ 1, τ 2, τ 1 + τ 2 1. (25) V. NUMEICAL EULT AND DICUION In this section, we provie numerical results for the cut-set boun an the best achievable DF rate for both the full-uplex an the half-uplex case an several antenna configurations. Consiering the full-uplex relay channel, we compare the CB to the upper boun that was erive in [5], an we iscuss conitions uner which this generally loose upper boun is equal to the cut-set boun. For the half-uplex relay channel, we compare our results to those presente in [9]. Finally, we comment on why it is not possible to irectly apply stanar

6 Figure Line Network. semi-efinite program (DP) solvers like DPT3 or eumi to the half-uplex optimization problems. The example scenario we consier here is the line network epicte in Figure 3. This is a commonly use geometry where D = 1 is fixe an the relay is positione on the line connecting the source an the estination such that = an D = 1. The entries of the channel gain matrices H, H D, an H D are assume to be inepenent an ientically istribute complex Gaussian ranom variables with zero mean an variance α, α D, an α D, respectively, where the pass loss exponent is chosen as α = 2. Note that all numerical results are average over a number of inepenent channel realizations, where perfect CI at all noes is assume for every realization. The upper boun for the full-uplex MIMO relay channel presente in [5] is given by C FD UB = max,,ρ min{ log et ( I + (1 ρ 2 )H 1 H H 1 inf log et( I + (1 + ρ2 a> a )H D HD H + (1 + a)h D HD H )} s.t. tr( ) P, tr( ) P,,, ρ 1. (26) In orer to arrive at this result, the authors introuce the scalar parameter ρ [, 1] to capture the cross correlation between the source an relay inputs (instea of the matrix ) an subsequently mae smart use of matrix inequalities. Although the erivation is very elegant, the boun suffers from several restrictions that are pointe out in [9]. Most importantly, this boun is loose in general. Moreover, it is only vali for antenna configurations that satisfy N N, which will most likely be violate if the source is a base station an the relay is some evice of lower complexity for example. However, in orer to compare our results to this upper boun, we restrict our scenarios to those which satisfy this conition. For the simplest case of single antenna noes, i.e., when all channels are scalars, the cross covariance matrix boils own to a scalar. As a consequence, C FD UB D ), is equal to CFD CB in this case [5]. Figure 4 thus compares only the cut-set boun with the achievable DF rate given that N = N = N D = 1. We can observe the well known result that the DF scheme achieves the CB when the relay is very close to the source, i.e., when the probability that the source-relay link is the bottleneck goes to zero. The value of ρ that maximizes CUB FD (an thus CCB FD ) is close to 1 in this case, which means that source an relay can realize multi-antenna transmission C CB DF ρ Figure 4. Comparison of cut-set boun an maximal achievable DF rate for full-uplex relay channel, N = N = N D = 1 an P = P = 1 (average over 5 realizations) C CB DF ρ Figure 5. Comparison of cut-set boun, upper boun (from [5]), an maximal achievable DF rate for full-uplex relay channel, N = N = N D = 2 an P = P = 1 (average over 1 realizations) C CB DF ρ Figure 6. Comparison of cut-set boun, upper boun (from [5]), an maximal achievable DF rate for full-uplex relay channel, N = N = 2, N D = 3, an P = P = 1 (average over 1 realizations).

7 When some noes are equippe with multiple antennas, on the other han, then CUB FD is not tight for all channel conitions. This is illustrate in Figures 5 an 6 for N = N = N D = 2 as well as N = N = 2, N D = 3, respectively. We see that CUB FD = CFD CB only if ρ =. In fact, it can be shown that the upper boun is equal to the cut-set boun if the optimal solution requires that the source an relay inputs are inepenent, i.e., if ρ = an = are optimizers of the respective optimization problems. This is because the structure of the optimal correlation is completely capture by the scalar ρ = in this case. In general, this oes not hol, which explains why the upper boun is not always tight. For the half-uplex MIMO relay channel, no such upper boun that relies on the introuction of a scalar correlation parameter an utilizes matrix inequalities has been erive. However, a ifferent upper boun is presente in [9], which reas as max C (1), (2) UB HD, τ 1,τ 2,τ 1+τ 2 1 s.t. UB τ 1 log I + H 1 (1) H1 + τ 2 log I + H D (2) H D, UB τ 1 log I + H D (1) HD + τ 2 log I + H 2 (2) H2, tr( (1) ) P (1), tr( (2) ) P (2), tr( (2) ) P (2). (27) emark 4: Note that a boun of the same structure was also presente for the full-uplex case in [9]. However, as the ifferences to our results are of the same kin, we iscuss all properties on the basis of the half-uplex relay channel. Observe that the conitional covariance matrix (2) in (16) must be replace by (2) to obtain (27), which is the only ifference between these two optimization problems. Because log et(i +HH H ) is an increasing function in the transmit covariance matrix given the channel gain matrix H, an since (2) = (2) (2) (2), (2),H (2), it follows that CCB HD CHD UB. Therefore, CHD UB is loose in general, an CCB HD = CHD UB only if the optimal solution of (16) requires that (2) =, i.e., if the optimal source an relay inputs are inepenent. Note that this conition for the tightness of the upper boun is the same as for the boun erive in [5] for the full-uplex case, although the reasons for the bouns not being tight in general are completely ifferent. Irrespective of these properties, (16) poses a much more complicate optimization problem than (27). In particular, (27) is alreay convex in the transmit covariance matrices for fixe τ 1 an τ 2. It is hence not necessary to introuce a slack variable an to apply the chur complement conition. ather, only the convexity preserving property of the perspective function is neee to reformulate (27) as a convex optimization problem. Figures 7 9 compare CCB HD, CHD UB, an HD DF for ifferent antenna configurations, which are actually the same as for the full-uplex case. First, observe that there is no antenna configuration for which CUB HD = CHD CB in general, not even the single antenna case. In fact, the relative gap between CCB HD C CB DF Figure 7. Comparison of cut-set boun, upper boun (from [9]), an maximal achievable DF rate for half-uplex relay channel, N = N = N D = 1 an P (1) = P (2) = P (2) = 1 (average over 5 realizations) C CB DF Figure 8. Comparison of cut-set boun, upper boun (from [9]), an maximal achievable DF rate for half-uplex relay channel, N = N = N D = 2 an P (1) = P (2) = P (2) = 1 (average over 2 realizations) C CB DF Figure 9. Comparison of cut-set boun, upper boun (from [9]), an maximal achievable DF rate for half-uplex relay channel, N = N = 2, N D = 3, an P (1) = P (2) = P (2) = 1 (average over 2 realizations).

8 an UB among the three configurations consiere here is largest for N = N = N D = 1. Furthermore, it can be seen that the gap between the cut-set boun an the upper boun ecreases with. From this, we can conclue that the better the relay-estination link is compare to the source-estination link, the less correlate the optimal source an relay inputs must be. Moreover, the simulation results shown in Figures 8 an 9 suggest that the gap between CB an CHD UB ecreases faster with for larger N D if the number of source an relay antennas is not change, which means that more egrees of freeom at the estination also favor less correlate source an relay input istributions. Comparing the full-uplex to the half-uplex results, it stans out that the relative gap between increases less than that between CCB FD CB an HD DF an FD DF when the relay is move closer to the estination, especially for the single antenna case. This may be explaine by the fact that in the half-uplex case the optimization is with respect to the source an relay inputs an the time-sharing between the relay receive an the relay transmit phase. The optimal time allocation for the achievable DF rate nee not be the same as for the cut-set boun. ince the source transmits uring both phases an the source-estination channel oes not change, a weak source-relay channel can thus partly be compensate for by prolonging the relay receive phase. In the full-uplex case, this is not possible as both the source an the relay transmit the whole time. Across-the-boar, all simulation results show that the rates achieve using the DF scheme approach the CB when the relay is close to the source. Furthermore, it can be seen that substantial rate gains can be achieve when multiple antennas are use at each noe without increasing the power at the source or the relay. These results are certainly not surprising as they are in accorance with previous knowlege about ecoean-forwar relaying an MIMO channels. Before we conclue this section, a few comments about problems (19) an (25) are in orer. Note that these two convex optimization problems o not satisfy the ruleset of iscipline convex programming (DCP) [13]. Problems that ahere to this ruleset can automatically be verifie as convex an converte to solvable form, which allows to irectly use stanar DP solvers. This oes not apply to problems that violate the ruleset, even if they are convex. That is not to say that there oes not exist a suitable reformulation of such problems. However, if no applicable reformulation can be foun, other solution methos nee to be consiere. VI. CONCLUION In this paper, we exten previous results for the full-uplex MIMO relay channel an show that the cut-set boun an the achievable DF rate can also be obtaine as the solutions of convex optimization problems in the half-uplex case. It is therefore possible to efficiently etermine these (generally loose) upper an lower bouns on the capacity of the MIMO relay channel, which may serve as benchmarks for achievable rates of various relay strategies for example. Aitionally, we iscuss how our results for the cut-set boun compare to the upper bouns presente in [5] an [9]. In particular, we point out why these upper bouns are not tight in general, an we ientify cases in which they are equal to the CB. Finally, simulation results for various antenna configurations emonstrate the importance of our work as they reveal nonnegligible gaps between the CB an the aresse upper bouns. EFEENCE [1] E. C. van er Meulen, Three-Terminal Communication Channels, Avances in Applie Probability, vol. 3, no. 1, pp , [2] T. M. Cover an A. El Gamal, Capacity Theorems for the elay Channel, IEEE Trans. Inf. Theory, vol. 25, no. 5, pp , ep [3] G. Kramer, M. Gastpar, an P. Gupta, Cooperative trategies an Capacity Theorems for elay Networks, IEEE Trans. Inf. Theory, vol. 51, no. 9, pp , ep. 25. [4] J. N. Laneman, D. N. C. Tse, an G. W. Wornell, Cooperative Diversity in Wireless Networks: Efficient Protocols an Outage Behavior, IEEE Trans. Inf. Theory, vol. 5, no. 12, pp , Dec. 24. [5] B. Wang, J. Zhang, an A. Høst-Masen, On the Capacity of MIMO elay Channels, IEEE Trans. Inf. Theory, vol. 51, no. 1, pp , Jan. 25. [6] M. H. M. Costa, Writing on Dirty Paper, IEEE Trans. Inf. Theory, vol. 29, no. 3, pp , May [7] C. K. Lo an. W. Heath, Jr., ate Bouns for MIMO elay Channels, Journal of Communications an Networks, vol. 1, no. 2, pp , Jun. 28. [8] L. Geres an W. Utschick, Optimize Capacity Bouns for the MIMO elay Channel, accepte for publication at IEEE International Conference on Acoustics, peech an ignal Processing (ICAP) 211. [9]. imoens, O. Muñoz-Meina, J. Vial, an A. el Coso, On the Gaussian MIMO elay Channel With Full Channel tate Information, IEEE Trans. ignal Process., vol. 57, no. 9, pp , ep. 29. [1]. Boy an L. Vanenberghe, Convex Optimization. Cambrige University Press, 24. [11] A. Høst-Masen an J. Zhang, Capacity Bouns an Power Allocation for Wireless elay Channels, IEEE Trans. Inf. Theory, vol. 51, no. 6, pp , Jun. 25. [12] T. M. Cover an J. A. Thomas, Elements of Information Theory, 2n e. John Wiley & ons, 26. [13] M. Grant,. Boy, an Y. Ye, Discipline Convex Programming, in Global Optimization, ser. Nonconvex Optimization an Its Applications, P. Paralos, L. Liberti, an N. Maculan, Es. pringer U, 26, vol. 84, pp

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS Contents 1. Moment generating functions 2. Sum of a ranom number of ranom variables 3. Transforms

More information

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the

More information

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sewoong Oh an Anrea Montanari Electrical Engineering an Statistics Department Stanfor University, Stanfor,

More information

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions A Generalization of Sauer s Lemma to Classes of Large-Margin Functions Joel Ratsaby University College Lonon Gower Street, Lonon WC1E 6BT, Unite Kingom J.Ratsaby@cs.ucl.ac.uk, WWW home page: http://www.cs.ucl.ac.uk/staff/j.ratsaby/

More information

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,

More information

Coalitional Game Theoretic Approach for Cooperative Transmission in Vehicular Networks

Coalitional Game Theoretic Approach for Cooperative Transmission in Vehicular Networks Coalitional Game Theoretic Approach for Cooperative Transmission in Vehicular Networks arxiv:.795v [cs.gt] 8 Feb Tian Zhang, Wei Chen, Zhu Han, an Zhigang Cao State Key Laboratory on Microwave an Digital

More information

10.2 Systems of Linear Equations: Matrices

10.2 Systems of Linear Equations: Matrices SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5 Binomial Moel Hull, Chapter 11 + ections 17.1 an 17.2 Aitional reference: John Cox an Mark Rubinstein, Options Markets, Chapter 5 1. One-Perio Binomial Moel Creating synthetic options (replicating options)

More information

Data Center Power System Reliability Beyond the 9 s: A Practical Approach

Data Center Power System Reliability Beyond the 9 s: A Practical Approach Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical

More information

Math 230.01, Fall 2012: HW 1 Solutions

Math 230.01, Fall 2012: HW 1 Solutions Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The

More information

NETWORK CODING OVERHEAD

NETWORK CODING OVERHEAD NETWORK CODING OVERHEAD Yalin Saguyu y-saguyu@northwestern.eu Department of Electrical Engineering an Computer Science Northwestern University Joint work with M. Rimensberger, M. L. Honig, an W. Utschick

More information

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments 2012 IEEE Wireless Communications an Networking Conference: Services, Applications, an Business Game Theoretic Moeling of Cooperation among Service Proviers in Mobile Clou Computing Environments Dusit

More information

Lecture L25-3D Rigid Body Kinematics

Lecture L25-3D Rigid Body Kinematics J. Peraire, S. Winall 16.07 Dynamics Fall 2008 Version 2.0 Lecture L25-3D Rigi Boy Kinematics In this lecture, we consier the motion of a 3D rigi boy. We shall see that in the general three-imensional

More information

Factoring Dickson polynomials over finite fields

Factoring Dickson polynomials over finite fields Factoring Dickson polynomials over finite fiels Manjul Bhargava Department of Mathematics, Princeton University. Princeton NJ 08544 manjul@math.princeton.eu Michael Zieve Department of Mathematics, University

More information

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market RATIO MATHEMATICA 25 (2013), 29 46 ISSN:1592-7415 Optimal Control Policy of a Prouction an Inventory System for multi-prouct in Segmente Market Kuleep Chauhary, Yogener Singh, P. C. Jha Department of Operational

More information

Calibration of the broad band UV Radiometer

Calibration of the broad band UV Radiometer Calibration of the broa ban UV Raiometer Marian Morys an Daniel Berger Solar Light Co., Philaelphia, PA 19126 ABSTRACT Mounting concern about the ozone layer epletion an the potential ultraviolet exposure

More information

Capacity Limits of MIMO Channels

Capacity Limits of MIMO Channels Tutorial and 4G Systems Capacity Limits of MIMO Channels Markku Juntti Contents 1. Introduction. Review of information theory 3. Fixed MIMO channels 4. Fading MIMO channels 5. Summary and Conclusions References

More information

Web Appendices to Selling to Overcon dent Consumers

Web Appendices to Selling to Overcon dent Consumers Web Appenices to Selling to Overcon ent Consumers Michael D. Grubb MIT Sloan School of Management Cambrige, MA 02142 mgrubbmit.eu www.mit.eu/~mgrubb May 2, 2008 B Option Pricing Intuition This appenix

More information

Risk Management for Derivatives

Risk Management for Derivatives Risk Management or Derivatives he Greeks are coming the Greeks are coming! Managing risk is important to a large number o iniviuals an institutions he most unamental aspect o business is a process where

More information

Sensitivity Analysis of Non-linear Performance with Probability Distortion

Sensitivity Analysis of Non-linear Performance with Probability Distortion Preprints of the 19th Worl Congress The International Feeration of Automatic Control Cape Town, South Africa. August 24-29, 214 Sensitivity Analysis of Non-linear Performance with Probability Distortion

More information

Notes on tangents to parabolas

Notes on tangents to parabolas Notes on tangents to parabolas (These are notes for a talk I gave on 2007 March 30.) The point of this talk is not to publicize new results. The most recent material in it is the concept of Bézier curves,

More information

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations This page may be remove to conceal the ientities of the authors An intertemporal moel of the real exchange rate, stock market, an international ebt ynamics: policy simulations Saziye Gazioglu an W. Davi

More information

On Adaboost and Optimal Betting Strategies

On Adaboost and Optimal Betting Strategies On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore

More information

Ch 10. Arithmetic Average Options and Asian Opitons

Ch 10. Arithmetic Average Options and Asian Opitons Ch 10. Arithmetic Average Options an Asian Opitons I. Asian Option an the Analytic Pricing Formula II. Binomial Tree Moel to Price Average Options III. Combination of Arithmetic Average an Reset Options

More information

Web Appendices of Selling to Overcon dent Consumers

Web Appendices of Selling to Overcon dent Consumers Web Appenices of Selling to Overcon ent Consumers Michael D. Grubb A Option Pricing Intuition This appenix provies aitional intuition base on option pricing for the result in Proposition 2. Consier the

More information

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks Low-Complexity an Distribute Energy inimization in ulti-hop Wireless Networks Longbi Lin, Xiaojun Lin, an Ness B. Shroff Center for Wireless Systems an Applications (CWSA) School of Electrical an Computer

More information

A New Evaluation Measure for Information Retrieval Systems

A New Evaluation Measure for Information Retrieval Systems A New Evaluation Measure for Information Retrieval Systems Martin Mehlitz martin.mehlitz@ai-labor.e Christian Bauckhage Deutsche Telekom Laboratories christian.bauckhage@telekom.e Jérôme Kunegis jerome.kunegis@ai-labor.e

More information

Measures of distance between samples: Euclidean

Measures of distance between samples: Euclidean 4- Chapter 4 Measures of istance between samples: Eucliean We will be talking a lot about istances in this book. The concept of istance between two samples or between two variables is funamental in multivariate

More information

The one-year non-life insurance risk

The one-year non-life insurance risk The one-year non-life insurance risk Ohlsson, Esbjörn & Lauzeningks, Jan Abstract With few exceptions, the literature on non-life insurance reserve risk has been evote to the ultimo risk, the risk in the

More information

Source Transmission over Relay Channel with Correlated Relay Side Information

Source Transmission over Relay Channel with Correlated Relay Side Information Source Transmission over Relay Channel with Correlated Relay Side Information Deniz Gündüz, Chris T. K. Ng, Elza Erkip and Andrea J. Goldsmith Dept. of Electrical and Computer Engineering, Polytechnic

More information

Search Advertising Based Promotion Strategies for Online Retailers

Search Advertising Based Promotion Strategies for Online Retailers Search Avertising Base Promotion Strategies for Online Retailers Amit Mehra The Inian School of Business yeraba, Inia Amit Mehra@isb.eu ABSTRACT Web site aresses of small on line retailers are often unknown

More information

2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by,

2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by, Theorem Simple Containers Theorem) Let G be a simple, r-graph of average egree an of orer n Let 0 < δ < If is large enough, then there exists a collection of sets C PV G)) satisfying: i) for every inepenent

More information

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems *

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems * GPRS performance estimation in GSM circuit switche serices an GPRS share resource systems * Shaoji i an Sen-Gusta Häggman Helsinki Uniersity of Technology, Institute of Raio ommunications, ommunications

More information

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification 2.0 page 1 Recital The acceptance an introuction of serial communication to more an more applications

More information

Multiuser Communications in Wireless Networks

Multiuser Communications in Wireless Networks Multiuser Communications in Wireless Networks Instructor Antti Tölli Centre for Wireless Communications (CWC), University of Oulu Contact e-mail: antti.tolli@ee.oulu.fi, tel. +358445000180 Course period

More information

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 341

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 341 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 341 Multinode Cooperative Communications in Wireless Networks Ahmed K. Sadek, Student Member, IEEE, Weifeng Su, Member, IEEE, and K.

More information

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law Detecting Possibly Frauulent or Error-Prone Survey Data Using Benfor s Law Davi Swanson, Moon Jung Cho, John Eltinge U.S. Bureau of Labor Statistics 2 Massachusetts Ave., NE, Room 3650, Washington, DC

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

Digital barrier option contract with exponential random time

Digital barrier option contract with exponential random time IMA Journal of Applie Mathematics Avance Access publishe June 9, IMA Journal of Applie Mathematics ) Page of 9 oi:.93/imamat/hxs3 Digital barrier option contract with exponential ranom time Doobae Jun

More information

The most common model to support workforce management of telephone call centers is

The most common model to support workforce management of telephone call centers is Designing a Call Center with Impatient Customers O. Garnett A. Manelbaum M. Reiman Davison Faculty of Inustrial Engineering an Management, Technion, Haifa 32000, Israel Davison Faculty of Inustrial Engineering

More information

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan mario.cagal@epfl.ch Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan

More information

Optimal Energy Commitments with Storage and Intermittent Supply

Optimal Energy Commitments with Storage and Intermittent Supply Submitte to Operations Research manuscript OPRE-2009-09-406 Optimal Energy Commitments with Storage an Intermittent Supply Jae Ho Kim Department of Electrical Engineering, Princeton University, Princeton,

More information

How To Understand The Structure Of A Can (Can)

How To Understand The Structure Of A Can (Can) Thi t t ith F M k 4 0 4 BOSCH CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 50, D-7000 Stuttgart 1 The ocument as a whole may be copie an istribute without restrictions. However, the

More information

Cross-Over Analysis Using T-Tests

Cross-Over Analysis Using T-Tests Chapter 35 Cross-Over Analysis Using -ests Introuction his proceure analyzes ata from a two-treatment, two-perio (x) cross-over esign. he response is assume to be a continuous ranom variable that follows

More information

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines EUROGRAPHICS 2000 / M. Gross an F.R.A. Hopgoo Volume 19, (2000), Number 3 (Guest Eitors) Unsteay Flow Visualization by Animating Evenly-Space Bruno Jobar an Wilfri Lefer Université u Littoral Côte Opale,

More information

Modelling and Resolving Software Dependencies

Modelling and Resolving Software Dependencies June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software

More information

The Quick Calculus Tutorial

The Quick Calculus Tutorial The Quick Calculus Tutorial This text is a quick introuction into Calculus ieas an techniques. It is esigne to help you if you take the Calculus base course Physics 211 at the same time with Calculus I,

More information

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND art I. robobabilystic Moels Computer Moelling an New echnologies 27 Vol. No. 2-3 ransport an elecommunication Institute omonosova iga V-9 atvia MOEING OF WO AEGIE IN INVENOY CONO YEM WIH ANOM EA IME AN

More information

Exponential Functions: Differentiation and Integration. The Natural Exponential Function

Exponential Functions: Differentiation and Integration. The Natural Exponential Function 46_54.q //4 :59 PM Page 5 5 CHAPTER 5 Logarithmic, Eponential, an Other Transcenental Functions Section 5.4 f () = e f() = ln The inverse function of the natural logarithmic function is the natural eponential

More information

A New Pricing Model for Competitive Telecommunications Services Using Congestion Discounts

A New Pricing Model for Competitive Telecommunications Services Using Congestion Discounts A New Pricing Moel for Competitive Telecommunications Services Using Congestion Discounts N. Keon an G. Ananalingam Department of Systems Engineering University of Pennsylvania Philaelphia, PA 19104-6315

More information

A Comparison of Performance Measures for Online Algorithms

A Comparison of Performance Measures for Online Algorithms A Comparison of Performance Measures for Online Algorithms Joan Boyar 1, Sany Irani 2, an Kim S. Larsen 1 1 Department of Mathematics an Computer Science, University of Southern Denmark, Campusvej 55,

More information

Enhancing Wireless Security with Physical Layer Network Cooperation

Enhancing Wireless Security with Physical Layer Network Cooperation Enhancing Wireless Security with Physical Layer Network Cooperation Amitav Mukherjee, Ali Fakoorian, A. Lee Swindlehurst University of California Irvine The Physical Layer Outline Background Game Theory

More information

Product Differentiation for Software-as-a-Service Providers

Product Differentiation for Software-as-a-Service Providers University of Augsburg Prof. Dr. Hans Ulrich Buhl Research Center Finance & Information Management Department of Information Systems Engineering & Financial Management Discussion Paper WI-99 Prouct Differentiation

More information

MIMO CHANNEL CAPACITY

MIMO CHANNEL CAPACITY MIMO CHANNEL CAPACITY Ochi Laboratory Nguyen Dang Khoa (D1) 1 Contents Introduction Review of information theory Fixed MIMO channel Fading MIMO channel Summary and Conclusions 2 1. Introduction The use

More information

Cost Efficient Datacenter Selection for Cloud Services

Cost Efficient Datacenter Selection for Cloud Services Cost Efficient Datacenter Selection for Clou Services Hong u, Baochun Li henryxu, bli@eecg.toronto.eu Department of Electrical an Computer Engineering University of Toronto Abstract Many clou services

More information

On Secure Network Coding with Unequal Link Capacities and Restricted Wiretapping Sets

On Secure Network Coding with Unequal Link Capacities and Restricted Wiretapping Sets On Secure Network Coing with Unequal Link Capacitie an Retricte Wiretapping Set Tao Cui an Tracey Ho Department of Electrical Engineering California Intitute of Technology Paaena, CA 9115, USA Email: {taocui,

More information

CURRENCY OPTION PRICING II

CURRENCY OPTION PRICING II Jones Grauate School Rice University Masa Watanabe INTERNATIONAL FINANCE MGMT 657 Calibrating the Binomial Tree to Volatility Black-Scholes Moel for Currency Options Properties of the BS Moel Option Sensitivity

More information

Introduction to Integration Part 1: Anti-Differentiation

Introduction to Integration Part 1: Anti-Differentiation Mathematics Learning Centre Introuction to Integration Part : Anti-Differentiation Mary Barnes c 999 University of Syney Contents For Reference. Table of erivatives......2 New notation.... 2 Introuction

More information

CALCULATION INSTRUCTIONS

CALCULATION INSTRUCTIONS Energy Saving Guarantee Contract ppenix 8 CLCULTION INSTRUCTIONS Calculation Instructions for the Determination of the Energy Costs aseline, the nnual mounts of Savings an the Remuneration 1 asics ll prices

More information

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014 Consumer Referrals Maria Arbatskaya an Hieo Konishi October 28, 2014 Abstract In many inustries, rms rewar their customers for making referrals. We analyze the optimal policy mix of price, avertising intensity,

More information

Which Networks Are Least Susceptible to Cascading Failures?

Which Networks Are Least Susceptible to Cascading Failures? Which Networks Are Least Susceptible to Cascaing Failures? Larry Blume Davi Easley Jon Kleinberg Robert Kleinberg Éva Taros July 011 Abstract. The resilience of networks to various types of failures is

More information

III. DIVERSITY-MULTIPLEXING TRADEOFF Theorem 3.1: The maximum achievable DMT for network described in Sec II is given by,

III. DIVERSITY-MULTIPLEXING TRADEOFF Theorem 3.1: The maximum achievable DMT for network described in Sec II is given by, iversity Gain d(r) 4 35 3 5 5 05 x MIMO MT bound Proximity gain 4 Proximity gain Proximity gain 8 Proximity gain 0 0 05 5 Multiplexing Gain (r) Fig d(r) or various values o proximity gain η III IVERITY-MULTIPLEXING

More information

Option Pricing for Inventory Management and Control

Option Pricing for Inventory Management and Control Option Pricing for Inventory Management an Control Bryant Angelos, McKay Heasley, an Jeffrey Humpherys Abstract We explore the use of option contracts as a means of managing an controlling inventories

More information

Isothermal quantum dynamics: Investigations for the harmonic oscillator

Isothermal quantum dynamics: Investigations for the harmonic oscillator Isothermal quantum ynamics: Investigations for the harmonic oscillator Dem Fachbereich Physik er Universität Osnabrück zur Erlangung es Graes eines Doktors er Naturwissenschaften vorgelegte Dissertation

More information

11 CHAPTER 11: FOOTINGS

11 CHAPTER 11: FOOTINGS CHAPTER ELEVEN FOOTINGS 1 11 CHAPTER 11: FOOTINGS 11.1 Introuction Footings are structural elements that transmit column or wall loas to the unerlying soil below the structure. Footings are esigne to transmit

More information

A Numerical Study on the Wiretap Network with a Simple Network Topology

A Numerical Study on the Wiretap Network with a Simple Network Topology A Numerical Study on the Wiretap Network with a Simple Network Topology Fan Cheng and Vincent Tan Department of Electrical and Computer Engineering National University of Singapore Mathematical Tools of

More information

An Introduction to Event-triggered and Self-triggered Control

An Introduction to Event-triggered and Self-triggered Control An Introuction to Event-triggere an Self-triggere Control W.P.M.H. Heemels K.H. Johansson P. Tabuaa Abstract Recent evelopments in computer an communication technologies have le to a new type of large-scale

More information

Online Learning for Global Cost Functions

Online Learning for Global Cost Functions Online Learning for Global Cost Functions Eyal Even-Dar Google Research evenar@googlecom Robert Kleinberg Cornell University rk@cscornelleu Shie Mannor echnion an McGill University shiemannor@gmailcom

More information

Professional Level Options Module, Paper P4(SGP)

Professional Level Options Module, Paper P4(SGP) Answers Professional Level Options Moule, Paper P4(SGP) Avance Financial Management (Singapore) December 2007 Answers Tutorial note: These moel answers are consierably longer an more etaile than woul be

More information

Differentiability of Exponential Functions

Differentiability of Exponential Functions Differentiability of Exponential Functions Philip M. Anselone an John W. Lee Philip Anselone (panselone@actionnet.net) receive his Ph.D. from Oregon State in 1957. After a few years at Johns Hopkins an

More information

Di usion on Social Networks. Current Version: June 6, 2006 Appeared in: Économie Publique, Numéro 16, pp 3-16, 2005/1.

Di usion on Social Networks. Current Version: June 6, 2006 Appeared in: Économie Publique, Numéro 16, pp 3-16, 2005/1. Di usion on Social Networks Matthew O. Jackson y Caltech Leeat Yariv z Caltech Current Version: June 6, 2006 Appeare in: Économie Publique, Numéro 16, pp 3-16, 2005/1. Abstract. We analyze a moel of i

More information

A Data Placement Strategy in Scientific Cloud Workflows

A Data Placement Strategy in Scientific Cloud Workflows A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,

More information

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters ThroughputScheuler: Learning to Scheule on Heterogeneous Haoop Clusters Shehar Gupta, Christian Fritz, Bob Price, Roger Hoover, an Johan e Kleer Palo Alto Research Center, Palo Alto, CA, USA {sgupta, cfritz,

More information

View Synthesis by Image Mapping and Interpolation

View Synthesis by Image Mapping and Interpolation View Synthesis by Image Mapping an Interpolation Farris J. Halim Jesse S. Jin, School of Computer Science & Engineering, University of New South Wales Syney, NSW 05, Australia Basser epartment of Computer

More information

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection Towars a Framework for Enterprise Frameworks Comparison an Selection Saber Aballah Faculty of Computers an Information, Cairo University Saber_aballah@hotmail.com Abstract A number of Enterprise Frameworks

More information

Forecasting and Staffing Call Centers with Multiple Interdependent Uncertain Arrival Streams

Forecasting and Staffing Call Centers with Multiple Interdependent Uncertain Arrival Streams Forecasting an Staffing Call Centers with Multiple Interepenent Uncertain Arrival Streams Han Ye Department of Statistics an Operations Research, University of North Carolina, Chapel Hill, NC 27599, hanye@email.unc.eu

More information

A Universal Sensor Control Architecture Considering Robot Dynamics

A Universal Sensor Control Architecture Considering Robot Dynamics International Conference on Multisensor Fusion an Integration for Intelligent Systems (MFI2001) Baen-Baen, Germany, August 2001 A Universal Sensor Control Architecture Consiering Robot Dynamics Frierich

More information

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Lost Sales

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Lost Sales IPA Derivatives for Make-to-Stock Prouction-Inventory Systems With Lost Sales Yao Zhao Benjamin Melame Rutgers University Rutgers Business School Newark an New Brunswick Department of MSIS 94 Rockafeller

More information

Inverse Trig Functions

Inverse Trig Functions Inverse Trig Functions c A Math Support Center Capsule February, 009 Introuction Just as trig functions arise in many applications, so o the inverse trig functions. What may be most surprising is that

More information

Optimal Control Of Production Inventory Systems With Deteriorating Items And Dynamic Costs

Optimal Control Of Production Inventory Systems With Deteriorating Items And Dynamic Costs Applie Mathematics E-Notes, 8(2008), 194-202 c ISSN 1607-2510 Available free at mirror sites of http://www.math.nthu.eu.tw/ amen/ Optimal Control Of Prouction Inventory Systems With Deteriorating Items

More information

THE problems of characterizing the fundamental limits

THE problems of characterizing the fundamental limits Beamforming and Aligned Interference Neutralization Achieve the Degrees of Freedom Region of the 2 2 2 MIMO Interference Network (Invited Paper) Chinmay S. Vaze and Mahesh K. Varanasi Abstract We study

More information

SCADA (Supervisory Control and Data Acquisition) systems

SCADA (Supervisory Control and Data Acquisition) systems Proceeings of the 2013 Feerate Conference on Computer Science an Information Systems pp. 1423 1428 Improving security in SCADA systems through firewall policy analysis Onrej Rysavy Jaroslav Rab Miroslav

More information

Section 3.3. Differentiation of Polynomials and Rational Functions. Difference Equations to Differential Equations

Section 3.3. Differentiation of Polynomials and Rational Functions. Difference Equations to Differential Equations Difference Equations to Differential Equations Section 3.3 Differentiation of Polynomials an Rational Functions In tis section we begin te task of iscovering rules for ifferentiating various classes of

More information

Achieving quality audio testing for mobile phones

Achieving quality audio testing for mobile phones Test & Measurement Achieving quality auio testing for mobile phones The auio capabilities of a cellular hanset provie the funamental interface between the user an the raio transceiver. Just as RF testing

More information

Dynamic Network Security Deployment Under Partial Information

Dynamic Network Security Deployment Under Partial Information Dynamic Network Security Deployment Uner Partial nformation nvite Paper) George Theoorakopoulos EPFL Lausanne, Switzerlan Email: george.theoorakopoulos @ epfl.ch John S. Baras University of Marylan College

More information

Definition of the spin current: The angular spin current and its physical consequences

Definition of the spin current: The angular spin current and its physical consequences Definition of the spin current: The angular spin current an its physical consequences Qing-feng Sun 1, * an X. C. Xie 2,3 1 Beijing National Lab for Conense Matter Physics an Institute of Physics, Chinese

More information

Net Neutrality, Network Capacity, and Innovation at the Edges

Net Neutrality, Network Capacity, and Innovation at the Edges Net Neutrality, Network Capacity, an Innovation at the Eges Jay Pil Choi Doh-Shin Jeon Byung-Cheol Kim May 22, 2015 Abstract We stuy how net neutrality regulations affect a high-banwith content provier(cp)

More information

Double Integrals in Polar Coordinates

Double Integrals in Polar Coordinates Double Integrals in Polar Coorinates Part : The Area Di erential in Polar Coorinates We can also aly the change of variable formula to the olar coorinate transformation x = r cos () ; y = r sin () However,

More information

Patch Complexity, Finite Pixel Correlations and Optimal Denoising

Patch Complexity, Finite Pixel Correlations and Optimal Denoising Patch Complexity, Finite Pixel Correlations an Optimal Denoising Anat Levin Boaz Naler Freo Duran William T. Freeman Weizmann Institute MIT CSAIL Abstract. Image restoration tasks are ill-pose problems,

More information

Mathematics Review for Economists

Mathematics Review for Economists Mathematics Review for Economists by John E. Floy University of Toronto May 9, 2013 This ocument presents a review of very basic mathematics for use by stuents who plan to stuy economics in grauate school

More information

arxiv:1309.1857v3 [gr-qc] 7 Mar 2014

arxiv:1309.1857v3 [gr-qc] 7 Mar 2014 Generalize holographic equipartition for Friemann-Robertson-Walker universes Wen-Yuan Ai, Hua Chen, Xian-Ru Hu, an Jian-Bo Deng Institute of Theoretical Physics, LanZhou University, Lanzhou 730000, P.

More information

Stock Market Value Prediction Using Neural Networks

Stock Market Value Prediction Using Neural Networks Stock Market Value Preiction Using Neural Networks Mahi Pakaman Naeini IT & Computer Engineering Department Islamic Aza University Paran Branch e-mail: m.pakaman@ece.ut.ac.ir Hamireza Taremian Engineering

More information

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition Mathematical Moels of Therapeutical Actions Relate to Tumour an Immune System Competition Elena De Angelis (1 an Pierre-Emmanuel Jabin (2 (1 Dipartimento i Matematica, Politecnico i Torino Corso Duca egli

More information

State of Louisiana Office of Information Technology. Change Management Plan

State of Louisiana Office of Information Technology. Change Management Plan State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change

More information

Unbalanced Power Flow Analysis in a Micro Grid

Unbalanced Power Flow Analysis in a Micro Grid International Journal of Emerging Technology an Avance Engineering Unbalance Power Flow Analysis in a Micro Gri Thai Hau Vo 1, Mingyu Liao 2, Tianhui Liu 3, Anushree 4, Jayashri Ravishankar 5, Toan Phung

More information

A Theory of Exchange Rates and the Term Structure of Interest Rates

A Theory of Exchange Rates and the Term Structure of Interest Rates Review of Development Economics, 17(1), 74 87, 013 DOI:10.1111/roe.1016 A Theory of Exchange Rates an the Term Structure of Interest Rates Hyoung-Seok Lim an Masao Ogaki* Abstract This paper efines the

More information

MIMO Antenna Systems in WinProp

MIMO Antenna Systems in WinProp MIMO Antenna Systems in WinProp AWE Communications GmbH Otto-Lilienthal-Str. 36 D-71034 Böblingen mail@awe-communications.com Issue Date Changes V1.0 Nov. 2010 First version of document V2.0 Feb. 2011

More information

Virtual MIMO Channels in Cooperative Multi-hop Wireless Sensor Networks

Virtual MIMO Channels in Cooperative Multi-hop Wireless Sensor Networks Virtual MIMO Channels in Cooperative Multi-hop Wireless Sensor Networks Aitor del Coso, Stefano Savazzi, Umberto Spagnolini and Christian Ibars Centre Tecnològic de Telecomunicacions de Catalunya CTTC)

More information

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany Parameterize Algorithms for -Hitting Set: the Weighte Case Henning Fernau Trierer Forschungsberichte; Trier: Technical Reports Informatik / Mathematik No. 08-6, July 2008 Univ. Trier, FB 4 Abteilung Informatik

More information