Turbo Coding and MAP decoding - Part 1
|
|
- Dorothy Pearson
- 7 years ago
- Views:
Transcription
1 Intitive Gide to Principles of Commnications Trbo Coding and MAP decoding - Part Baye s Theorem of conditional probabilities Let s first state the theorem of conditional probability, also called the Baye s theorem. P( A and B P( A P( B givena Which we can write in more formal terminology as P( A, B P( A P( B A A where P(B A is referred to as the probability of event B given that A has already occrred. If event A always occrs with event B, then we can write the following expression for the absolte probability of event A. P( A P( A, B B B If events A and B are independent from each other then (A degenerates to P( A, B P( A P ( A, B P( A P( B C The relationship C is very important and we will se it heavily in the explanation of Trbo decoding in this chapter.
2 If there are three independent events A, B and C, then the Baye s rle becomes P( A, B C P( A C P( B A, C D A-priori and a-posteriori probabilities Here is Bayes theorem again. P( A, B P( AB P( B Pr obability of a posteriori a priori both A and B probability of probability of event A event B P( B A P( A a posteriori a priori probability of probability of event B event A E The probability of event A conditioned on event B, is given by the probability of A given B times the probability of event a. The probability of A, or P(A is the base probability of even A and is called the a-priori probability. The term P(A,B the conditional probability is called the a-posteriori probability or APP. One is independent probability, the other depends on some event occrring. We will be sing the acronym APP a lot, so mae sre yo remember that is the same a-posteriori probability. In other words, the APP of an event is a fnction of an another event also occrring at the same time. We can write (E as P( A, B P( AB APP P( B A P( A PB ( F This says that we can determine the APP of an event by taing the conditional probability of that event divided by it s a-priori probability. What these mean is best explained by the following two qotes. In epistemological terms A priori and a posteriori refer primarily to how, or on what basis, a proposition might be nown. In general terms, a proposition is nowable a priori if it is nowable independently of experience, while a proposition nowable a posteriori is nowable on the basis of experience. The distinction between a priori and a posteriori nowledge ths broadly corresponds to the distinction between empirical and nonempirical nowledge. [] Bt how do we decide when we have gathered enogh data to jstify modifying or prediction of the probabilities? That is one of the essential problems of decision theory. How do we mae the transition from a priori statistics to a posteriori probability? [3]
3 3 The MAP algorithm helps s mae the transition from a-priori nowledge to nowledge based on received data. Strctre of a Trbo Code According to Shannon, the ltimate code wold be one where a message is sent infinite times, each time shffled randomly. The receiver has an infinite versions of the message albeit corrpted randomly. From these copies, the decoder wold be able to decode with near error-free probability the message sent. This is the theory of an ltimate code, the one that can correct all errors for a virtally signal. Trbo code is a step in that direction. Bt it trns ot that for an acceptable performance we do not really need to send the information infinite nmber of times, jst two or three times provides pretty decent reslts for or earthly channels. In Trbo codes, particlarly the parallel strctre, Recrsive systematic convoltional (RSC codes woring in parallel are sed to create the random versions of the message. The parallel strctre ses two or more RSC codes, each with a different interleaver. The prpose of the interleaver is to offer each encoder an ncorrelated or a random version of the information, reslting in parity bits from each RSC that are independent. How independent these parity bits are, is essentially a fnction of the type and length/depth of the interleaver. The design of interleaver in itself is a science. In a typical Viterbi code, the messages are decoded in blocs of only abot bits or so, where as in Trbo coding the blocs are on the order of 6K bits long. The reason for this length is to effectively randomize the seqence going to the second encoder. The longer the bloc length, the better is its correlation with the message from the first encoder, i.e. the correlation is low. On the receiving side, there are same nmber of decoders as on the encoder side, each woring on the same information and an independent set of parity bit. This type of strctre is called Parallel Concatenated Convoltional Code or PCCC. The convoltional codes sed in trbo codes sally have small constraint length. Where a longer constraint length is an advantage in stand-alone convoltional codes, it does not lead to better performance in TC and increases comptation complexity and delay. The codes in PCCC mst be RSC. The RSC property allows the se of systematic bit as a standard to which the independent parity bits from the different coders are sed to assess its reliability. The decoding most often applied is an iterative form of decoding. When we have two sch codes, the signal prodced is rate /3. If there are three encoders, then the rate is ¼ and so on. Usally two encoders are enogh as increasing the nmber of encoders redces bandwidth efficiency and does not by proportionate increase in performance.
4 4 EC p y, s y, n EC ECn p y, n p y, Figre A rate /(n+ Parallel Concatenated Convoltional Code (PCC Trbo Code Trbo codes also come as Serial Concatenated Convoltional Code or SCCC. The SCCC codes appear to have better performance at higher SRs. Where the PCCC codes reqire both constitent codes to be RSC, in SCCC, only the inner code mst be RSC. PCCC codes also seem to have a flattening of performance arond -6 which is less evident in SCCC. The SCCC constitent code rates can also be different as shown below. The oter code can even be a bloc code. In general the PCCC is a special form of SCCC. We can even thin of concatenation of RS/Convoltional codes, sed in line-of-sight lins as a form of SCCC. A Trbo SCCC may loo lie the figre below with different rate constitent codes. EC EC Rate / Rate /3 Figre Serially concatenated constitent coding (SCCC Then there are also hybrid versions that se both PCCC and SCCC sch as shown in figre below. EC EC EC3 Figre 3 Hybrid Trbo Codes There is an another form called Trbo Prodct Code or TPC. This form has a very different strctre from the PCCC or SCCC. TPC se bloc codes instead of convoltional codes. Two different bloc codes (sally Hamming codes are concatenated serially withot an
5 5 interleaver in between. Since the two codes are independent and operate in rows and colmns, this alone offers enogh randomization that no interleaver is reqired. TPC codes, lie PCCC also perform well in low SR and can be formed by concatenating any type of bloc codes. Typical coding method is to array the coded data in rows and then the second code ses the colmns of the new data for its coding. The following shows a TPC code created from a (7x5 and a (8x4 Hamming code. The 8x4 code first codes the 4 info bits into 8, by adding 4 p party bits. These are arrayed in five rows. Then the 7x5 code wors on these in colmns and creates (in this case, both codes are systematic new parity bits p for each colmn. The net code rate is 5/4 ~.33. The decoding is done along rows and then colmns. Hamming (5x8 (8x5 Hamming (7x8 (8x4 (7x5 i i i i p p p p i i i i p p p p i i i i p p p p i i i i p p p p i i i i p p p p p p p p p p p p p p p p p p p p Figre 4 Trbo Prodct codes What maes all these codes Trbo is not their strctre bt a form of feedbac iterative decoding. If the strctre of a SCCC does not se the iterative coding then it wold be jst a plain old concatenated code, not a trbo code. Maximm a-posteriori Probability (MAP decoding algorithm Trbo codes are decoded sing a method called the Maximm Lielihood Detection or MLD. Filtered signal is fed to the decoders, and the decoders wor on the signal amplitde to otpt a soft decision The a priori probabilities of the inpt symbols is sed, and a soft otpt indicating the reliability of the decision (amonting to a sggestion by decoder to decoder is calclated which is then iterated between the two decoders. The form of MLD decoding sed by trbo codes is called the Maximm a-posteriori Probability or MAP. In commnications, this algorithm was first identified in BCJR. And that is how it is nown for Trbo applications. The MAP algorithm is related to many other algorithms, sch as Hidden Marov Model, HMM which is sed in voice recognition, genomics and msic processing. Other similar algorithms are Bam-Welch algorithm, Expectation maximization, Forward-Bacward algorithm, and more. MAP is a complex algorithm, hard to nderstand and hard to explain.
6 6 In addition to MAP algorithm, another algorithm called SOVA, based on Viterbi decoding is also sed. SOVA ses Viterbi decoding method bt with soft otpts instead of hard. SOVA maximizes the probability of the seqence, whereas MAP maximizes the bit probabilities at each time, even if that maes the seqence not-legal. MAP prodces near optimal decoding. In trbo codes, the MAP algorithm is sed iteratively to improve performance. It is lie the qestions game, where each previos gess helps to improve yor nowledge of the hidden information. The nmber of iteration is often preset as in qestions. More iteration are done when the SR is low, when SR is high, lesser nmber of iterations are reqired since the reslts converge qicly. Doing iteration maybe a waste if signal qality is good. Instead of maing a decision ad-hoc, the algorithm is often pre-set with nmber of iterations. On the average, seven iterations give adeqate reslts and no more are ever reqired. These nmbers have relationship to the Central Limit Theorem. DEC DEC Figre 5 Iterative decoding in MAP algorithm Althogh sed together, the terms MAP and iterative decoding are separate concepts. MAP algorithm refers to specific math. The iterative process on the other hand can be applied to any type of coding inclding bloc coding which is not trellis based and may not se MAP algorithm. I am going to concentrate only on PCCC decoding sing iterative MAP algorithm In part, we will go throgh a step-by-step example. In this part, we will cover the theory of MAP algorithm. We are going to describe MAP decoding sing a Trbo code in shown Figre 5 with two RSC encoders. Each RSC has two memory registers so the trellis has for states with constraint length eqal to 3.
7 7, s c, p c,s c Transmitted symbol i t x ( x n i r Recevied symbol y y y,s, p,s,s y, p y DEC +,s, p y y DEC + +, p c Figre 6 A rate /3 PCCC Trbo code in a 8PSK channel The rate /3 code shown here has two identical RSC convoltional codes. The coding trellis for each is given by the figre 7. The ble lines show transitions in response to a and red lines in response to a. The notation /, the first is the inpt bit, the next are code bits. Of these, the first is what we called the systematic bit, and as yo can see it is the same as the inpt bit. The second bit is the parity bit. Each code ses the same trellis for encoding. The labels along the branches can be read as / c c. Since this a RSC, the first code bit is same as the information bit or c. The info bits are called. The coded bits are referred to by the vector c. Then the coded bits are transformed to an analog symbol x and transmitted. On the receive side, a noisy version of x is received. By looing at how far the received symbol is from the decision regions, a metric of confidence is added to each of the three bits in the symbol. Often Gray coding is sed, which means that not all bits in the symbol have same level of confidence for decoding prposes. There are special algorithms for mapping the symbols (one received voltage vale, to M soft-decisions, with M being the M in M-PSK. Let s assme that after the mapping and creating of soft-metrics, the vector y is received. One pair of these decoded soft-bits are sent to the first decoder and another set, sing a de-interleaved version of the systematic bit and the second parity bit are sent to the second decoder. Each decoder wors only on these bits of information and pass their confidence scores to each other ntil both agree within a certain threshold. Then the process restarts with next symbol in a seqence or bloc consisting of symbols (or bits. Definitions is the frame size of transmitted symbols. So for a M-PSK, there wold be 3 bits transmitted per frame, of these /3 will be the information bit. In a typical Trbo code, there may be as many as, smbols in a frame.
8 8 The seqence of information bits is given by. The first encoder gets = (,, 3, and the second encoder gets a preset reordering of this same seqence. For example, we may pic this mapping fnction.,, 3, 4, 5, 6, , 4,,, 5, 6, 7..., s, p The encoder mapping is be given by the vector c. The c ( c, c are two bits prodced, s, p by the first encoder, and c ( c, c are the two bits prodced by the second encoder. The information bit to code bits mapping is done a trellis sch as the one described in Table I. Table I Mapping of information bits to code bits s s s s s3 s3 s4 s4 Figre 7 the trellis diagram of the rate / code RSC code The symbol described by vector x (3 bits per vector is sent for each time i. Let s call this vector x i. There wold of these symbols transmitted. x,, x,,
9 9 y y y y are the soft mapped bits. The goal is to tae these and mae a gess,,, ( s, p, p abot the transmitted x vector and hence code bits which intrn decode, the information bit. Of this three soft bits, each decoder gets jst two of these vales. The first decoder, s, p, s, p gets y ( y, y and the second decoder gets y ( y, y which are its respective received data. Each decoder wors with jst two vales. The second decoder however gets a reordered version of the systematic bit, so it is getting only one bit of independent information. Log-lielihood Ratio (LLR Let s tae the information bit, a binary variable,, where is its vale at time. Its Loglielihood Ratio (LLR is defined as the natral log of its base probabilities. P ( L( ln P( (. If has two vales, + and - volts representing and bit and since these are eqally liely, as they are in most commnication system, then this ratio is eqal to zero. This metric is sed in most error correction coding and is called the log lielihood ratio or LLR. This is a sensitive metric, qite a bit better than a linear metric. Logs mae it easy to deal with very small and very large nmbers, as yo well now. ow note what happens to this metric, if the the binary variable is not eqally liely, as happens in trellis decoding. From elementary probability theory, we now that sm of all probabilities of an event add to. So we can write that the probability of = + as mins the probability of = -. P( P( ow sing eqation (., rewrite the expression of LLR from (. as. L( P ( ln P ( (. is plotted in Figre 8 as a fnction of the probability of one of the events. Let s say we are given L( =.. Then the probability that = + is eqal to.73
10 LLR Trbo Coding and MAP Decoding Probability, = + Figre 8 The range of LLR is from to + and is a direct indication of the bit. As we can see, if LLR, a non-dimensional metric, is positive, it is a pretty good indicator of the sign of the bit. This is an even better indicator than the Eclidean distance since its range is so large. LLR a very sefl parameter and we will see how it is sed in Trbo decoding. In (. formlate the LLR of a decoded bit, at time, conditioned on the received signal, a seqence of bits. The lower index of y means it starts at time and the pper index means the ending point at. P( y L ( ln P ( y (. We can reformlate the nmerator and denominator sing Baye s rle C. P( y, / P( y P( y, L ( ln ln P( y, / P( y P( y, (.3 This formlation of the LLR incldes joint probabilities between the received bits and the information bit, the nmerator of which can be written as (.4. For RSC trellis, each path is niqely specified by any pair of these:. the start state s,. the ending state s, 3. The inpt bit. If we now any two of these pieces of information, we can identify the correct path withot error. In this eqation, we only now the whole seqence y, we do not now, nor do we have any other of the piece of information. Bt what we do now is that saying a = is same as saying that the correct path is one of the for possible paths shown in Fig. 8. So the joint probability of ( y, (having received the bit seqence, the probability of at time = is the same as replacing the information bit with ending and starting states. These formlations are eqivalent.
11 P(, y P( s, s, y (.4 s s s s s3 s3 s4 s4 Figre 9 Trellis transition possible at any time in response to a + and -. We have changed the left hand side of the eqation by replacing = + with two states s and s. The s is the starting state and s is the ending state for all allowable transitions for which the = +. There are for valid transitions related to decoding a +. Assme that there is a probability associated with each of these for transitions. This says that the probability of maing a decoding decision in favor of a + is the sm of the probability of all for of these possible paths. ow plg Error! Reference sorce not fond. into (.3 to get the log lielihood ratio of as P s s y P( y, P y P s s y (,, L ( ln (, (,, (.5 ow we need to mae one more conceptal leap. The probability of deciding which road, i.e. the + road or the - road taen is a fnction of where the path started and where it will end which are sally given as bondary conditions. If we split the whole received seqence into manageable parts, it may help s identify the starting or ending states. We incorporate these ideas into (.5 to get, y y, y, y y, y, y p f We tae the bit seqence and separate it into three pieces, from to -, then the th point, and then from + to. We adopt a slightly easier terminology in (.6. P( s, s, y P( s, s, y, y, y (.6 p f
12 y p y y f The past seqence, the part that came before the crrent data point. The crrent data point The seqence points that come after the crrent point. Rewrite sing (.6 sing Baye s rle of joint probabilities (D. P s, s, y P s s y ( (,, yp,, yf P s s ( yf,, yp, y P( s, s, yp, y (.7 This loos complicated bt we are jst applying Bayes rle to simplify (.6 and to breadown the terms in terms of past, present and ftre parts of the seqence. So that whenever we are maing a decision abot a bit + or a -, a cmlative metric will tae into accont the starting and the ending point of the seqence. The starting and ending points of a convoltional seqence are nown and we se this information to winnow ot the lielier seqences. The term yf is the ftre seqence and we mae an assmption that it is independent of the past and only depends on the present state s. We can remove these dependencies to simplify (.7. P s, s, y P s s y P s s y ( ( y f,, yp, (,, yp, P s P s y ( y f (, s, y p, (.8 ow apply Baye s rle to the last term in (.8, to get P s s y y P s y s y P s y (,, p, (,, p (, P s, s, y P y s P s y s y P s y (.9 ( ( f (,, p (, p ow define a few new terms.
13 3 ( s Ps (, yp ( s P( y s (. f ( s, s P( s, yc s, yp The terms,, on the right are the metrics we will compte in MAP decoding. ow the nmerator term of (.5 becomes. P( s, s, y ( s ( s ( s, s (. We can plg this into (.5 to get the LLR eqation for MAP algorithm. L( ( s ( s ( s, s ( s ( s ( s, s (. ( s This first term in (. is called the Forward metric. ( s is called the Bacward metric. ( s, s is called Transition metric. The MAP algorithm allows s to compte these metrics. Decision is made at each time, abot the transmitted bit. Unlie Viterbi decoding where decision is made in favor if the lieliest seqence by carrying forward the sm of metrics, here the decision is made for the lieliest bit. The MAP algorithm is also nown as Forward-Bacward Algorithm becase we are assessing probabilities in both forward and bacward time. How to calclate the Forward metrics We will start with the forward metric at time. ( s Ps (, s, y p, y All states Which is also eqal to the probabilities at the previos state s times the transition probability to the crrent state s.
14 4 ( s P( s, s, yp, y ( s, s. ( s (.3 All states All s The initial condition is that since we always start at state, ( s if s otherwise Example: (. ( ( ( ( (.63 s s s3 ( ( - + s4 Figre - Compting Forward metrics The left most vale at the top is the starting point, so it has a vale of (, the starting vale of is = at all the remaining three states. The ending forward metric at t = is ( s ( s, s. ( s All s ( ( otice that these nmbers are larger than, which means, they are not probabilities bt are called Metrics. It also means that since a typical Trbo code frame is thosands of trellis sections long that mltiplication of these nmbers may reslt in nmerical overflow. For that reason, both and are normalized. Bacward Metric ( s
15 5 Same as the initial vales of (, we assme that since trellis always ends at state, all probabilities at this point are eqal to or. ( and zero elsewhere. This probability is eqal to the prodct of all transition probabilities times the probability at the last state woring bacwards. s s (.4 ( ( ( s, s All s Compare this with forward metric eqation. ( s. ( s ( s, s Alls s.855 ( (. s.5 (.9 s3 s ( ( ( (3 (4 Figre - Compting Bacward metrics ( s ( s ( s, s Alls ( ( Yo can see these vales at time + for state and. These are then normalized.
16 6 merical isses In order to prevent data overflow that can happen in the very large trellis of a Trbo codes,, (s and ( s need to be normalized. For forward metrics, we normalized them by their sm. ( s ( s ( s s (.5 The reverse metric is similalry normalized by the same qantity as above. It s formlation loos different bt it is the same thing as the term that normalized the forward metric. (Change index to instead of -. ( s s s ( s ( s ( s, s. (.6 How to calclate transition probabilities Compting transition metrics trns ot to be the hardest part. To restate the definition of the transition metric from (. ( s, s P( s, yc s, yp The transition itself does not depend on the past, so we can remove the dependency on the past and then apply the Baye s theorem. ( s, s P( s, y s, yp P( s, y s P y s s P s s (,. ( (.7 (, (,. ( s s P y s s P (.8 There are two terms in this final definition of the transition metric. Let s tae the last one first. Here P( is a-priori probability of the inpt bit. Let s tae its log lielihood. P( P( L ( log log P( P( Or by taing this expression to power of e, we get
17 7 L ( P ( e P ( From here, some clever algebra gives s P e P L ( ( ( ( e e e e e L ( L ( L ( L ( / L ( e L ( / ow we get the general expression for both, + and -. P e L( / L( / e (.9 L( ( e The term nderlined is a common factor and designated by A e e L ( / L ( The a-priori probability is now given by L ( / (. P( A e ow for the second term in transition metric expression of (.8, P( y s, s can be written as n (, ( ( l l l P y s s P y c P y c For rate ½, we can write this simply as, P( y x y c y c, s, p This is jst a correlation of the inpt signal vales with the trellis vales, c. The received signal vales y are assmed to be corrpted by an AWG process. The probability P( y c is given in a Gassian channel by l l
18 8 P( yl cl exp ( y l c l (. Apply (. to (.8, to get,,,, i p i p y s c s y c ( / q P y EXP i n n Expanding this we get, i p pi, y c, s q,, s, s, s i, p i, p ( y ( c y c q y c EXP EXP i i n n n n The sqare of the two c (always eqal to or - vales is eqal to, since sqare of + and - is the same. This gives the following eqation, s, s q i, p i, p y c y c B EXP (. n i n Where B EXP ip, y, s q ( y n i n. ow we can write the fll eqation for transition metric by combining (. and (.9.
19 9 (, (,. ( s s P y s s P.,, i, p i, p y s c s q y c Lc ( / B exp A e i n n (.3 A and B are constants and are not important becase when we pt this expression in the LLR form, they will cancel ot. The index q = for rate ½ code we are sing for example. ow we define, E p c n coderate Eb / Eb / (.4 Where p is inverse of code rate, i.e. eqal to for code rate = / E b Ec rate. (.5 where E b code rate E b. is ratio of the n-coded bit energy to noise PSD, Ec is coded bit energy, and Ec= p Sbstitte for n E / b into (.3 we have, s, q i p i 4 E / b y c y c A B exp L( c c p i
20 A B 4 E / y c y c L c c,, exp q b s i p i ( p i 4 E / 4 E /,, exp ( exp q b s b i p i A B L c c y c y x p i p With 4 E / p b Lc 4. Es / A B L c c Lc y c Lc y c (.6,, exp ( exp q s i p i i where we define a new partial transition metric, the nderlined part of (.6. e, (, exp q i p i s s Lc y c. i In smmary the LLR of the information bit at time is, L( log ~ ~ ~ ( s ( s, s ( s ~ ( s ( s, s ( s (.7 ~ ( s ( s, s ~ ( s ~, ( s ( s, s s s s ~ if s ( s (.8 otherwise
21 ~ ( s ( s, s ~ s ( s ~, ( s ( s, s s s ~ if s ( s (.9 otherwise,, (, exp ( exp q e s i p i s s L c c Lc y c Lc y c (.3 i Sbstitte (.3 into (.7, to get log (.3 ~ ~ ~ e ( s ( s exp L ( c ~ e ( s ( s exp L ( c c c Lc y Lc y, s, s c c exp exp q i q i Lc Lc y y i, p i, p c i c i If q =, the eqation become log ( s ( s exp L ( c c Lc y c exp Lc y c ( s ( s exp L ( c c Lc y c exp Lc y c e, s, p e, s, p L( and Lc y, s The factor ½ and can be plled ot becase both nmerator and denominator are constant. c cancel. We get, ( s ( s ( s, s e (, s ( log e L L c Lc y Where ( s ( s ( s, s
22 q e i, p i ( s, s exp Lc y c i This eqation can be broen into three distinct nmbers. They are L _ apriori L _ channel L _ extrinsic (.3 Lc is the a-priori information abot, ( Lc is the channel vale calclated from the nowledge of the SR and the received signal. The third term is called the a-posteriori term, also called the extrinsic L vale. L _ extrinsic log ~ ~ ~ e ( s ( s ( s, s ~ e ( s ( s ( s, s, s y (.33 Dring each iteration the decoder prodces the extrinsic vale sing the first two nmbers as inpt. The extrinsic vale it prodces becomes the inpt to the next decoder. L ( c, s e e Lc y L ( c L ( c, And eventally a decision is made abot the bit in qestion by looing at the sign of the L vale. ~ sign{l ( c }, The process can contine ntil the extrinsic vales stop changing with a preset threshold. Or the algorithm can allow jst a fixed nmber of iterations., p y, p y,s y DEC Extrinsic L vale from to,s y DEC Extrinsic L vale from to Figre Iterative natre of Trbo decoding.
23 3 So that s abot it. I hope it was helpfl. The next ttorial goes throgh the MAP algorithm in a step-by-step example. Please contact me if yo find errors. Charan Langton Copyright, 6, 7 Charan Langton All Rights reserved
24 4 References [] Trbo code in IS- Division Mltiple-Access Commnications Under Fading By Jian Qi. Masters Thesis, Wichita State University, Fall 999. Comment: Available on the Internet. I sed Ms. Qi s terminology and heavily relied on this wor. Its an excellent reference. [] "A Priori and A Posteriori" - an article by Jason Baehr in the Internet Encyclopedia of Philosophy. [3] [4] ot complete
Chapter 3. 2. Consider an economy described by the following equations: Y = 5,000 G = 1,000
Chapter C evel Qestions. Imagine that the prodction of fishing lres is governed by the prodction fnction: y.7 where y represents the nmber of lres created per hor and represents the nmber of workers employed
More informationCorporate performance: What do investors want to know? Innovate your way to clearer financial reporting
www.pwc.com Corporate performance: What do investors want to know? Innovate yor way to clearer financial reporting October 2014 PwC I Innovate yor way to clearer financial reporting t 1 Contents Introdction
More informationFINANCIAL FITNESS SELECTING A CREDIT CARD. Fact Sheet
FINANCIAL FITNESS Fact Sheet Janary 1998 FL/FF-02 SELECTING A CREDIT CARD Liz Gorham, Ph.D., AFC Assistant Professor and Family Resorce Management Specialist, Utah State University Marsha A. Goetting,
More informationEvery manufacturer is confronted with the problem
HOW MANY PARTS TO MAKE AT ONCE FORD W. HARRIS Prodction Engineer Reprinted from Factory, The Magazine of Management, Volme 10, Nmber 2, Febrary 1913, pp. 135-136, 152 Interest on capital tied p in wages,
More informationIntroduction to HBase Schema Design
Introdction to HBase Schema Design Amandeep Khrana Amandeep Khrana is a Soltions Architect at Clodera and works on bilding soltions sing the Hadoop stack. He is also a co-athor of HBase in Action. Prior
More informationGUIDELINE. Guideline for the Selection of Engineering Services
GUIDELINE Gideline for the Selection of Engineering Services 1998 Mission Statement: To govern the engineering profession while enhancing engineering practice and enhancing engineering cltre Pblished by
More informationHigh Availability for Internet Information Server Using Double-Take 4.x
High Availability for Internet Information Server Using Doble-Take 4.x High Availability for Internet Information Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks
More informationUsing GPU to Compute Options and Derivatives
Introdction Algorithmic Trading has created an increasing demand for high performance compting soltions within financial organizations. The actors of portfolio management and ris assessment have the obligation
More informationHigh Availability for Microsoft SQL Server Using Double-Take 4.x
High Availability for Microsoft SQL Server Using Doble-Take 4.x High Availability for Microsoft SQL Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks of Network
More informationCHAPTER ONE VECTOR GEOMETRY
CHAPTER ONE VECTOR GEOMETRY. INTRODUCTION In this chapter ectors are first introdced as geometric objects, namely as directed line segments, or arrows. The operations of addition, sbtraction, and mltiplication
More informationWHITE PAPER. Filter Bandwidth Definition of the WaveShaper S-series Programmable Optical Processor
WHITE PAPER Filter andwidth Definition of the WaveShaper S-series 1 Introdction The WaveShaper family of s allow creation of ser-cstomized filter profiles over the C- or L- band, providing a flexible tool
More information10 Evaluating the Help Desk
10 Evalating the Help Desk The tre measre of any society is not what it knows bt what it does with what it knows. Warren Bennis Key Findings Help desk metrics having to do with demand and with problem
More informationPhone Banking Terms Corporate Accounts
Phone Banking Terms Corporate Acconts If there is any inconsistency between the terms and conditions applying to an Accont and these Phone Banking Terms, these Phone Banking Terms prevail in respect of
More informationPurposefully Engineered High-Performing Income Protection
The Intelligent Choice for Disability Income Insrance Prposeflly Engineered High-Performing Income Protection Keeping Income strong We engineer or disability income prodcts with featres that deliver benefits
More informationModeling Roughness Effects in Open Channel Flows D.T. Souders and C.W. Hirt Flow Science, Inc.
FSI-2-TN6 Modeling Roghness Effects in Open Channel Flows D.T. Soders and C.W. Hirt Flow Science, Inc. Overview Flows along rivers, throgh pipes and irrigation channels enconter resistance that is proportional
More informationCompensation Approaches for Far-field Speaker Identification
Compensation Approaches for Far-field Speaer Identification Qin Jin, Kshitiz Kmar, Tanja Schltz, and Richard Stern Carnegie Mellon University, USA {qjin,shitiz,tanja,rms}@cs.cm.ed Abstract While speaer
More informationKEYS TO BEING AN EFFECTIVE WORKPLACE PERSONAL ASSISTANT
5 KEYS TO BEING AN EFFECTIVE WORKPLACE PERSONAL ASSISTANT by: John Barrett Personal assistants (PAs) and their ability to effectively provide essential spports at the workplace are extremely important
More informationDeploying Network Load Balancing
C H A P T E R 9 Deploying Network Load Balancing After completing the design for the applications and services in yor Network Load Balancing clster, yo are ready to deploy the clster rnning the Microsoft
More informationCandidate: Suzanne Maxwell. Date: 09/19/2012
Medical Coder / Billing Clerk Assessment Report Szanne Maxwell 09/19/2012 www.resorceassociates.com Szanne Maxwell 09/19/2012 Prepared For: NAME Prepared by: John Lonsbry, Ph.D. & Lcy Gibson, Ph.D., Licensed
More informationOptimal Trust Network Analysis with Subjective Logic
The Second International Conference on Emerging Secrity Information, Systems and Technologies Optimal Trst Network Analysis with Sbjective Logic Adn Jøsang UNIK Gradate Center, University of Oslo Norway
More informationASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks
ASAND: Asynchronos Slot Assignment and Neighbor Discovery Protocol for Wireless Networks Fikret Sivrikaya, Costas Bsch, Malik Magdon-Ismail, Bülent Yener Compter Science Department, Rensselaer Polytechnic
More informationStability of Linear Control System
Stabilit of Linear Control Sstem Concept of Stabilit Closed-loop feedback sstem is either stable or nstable. This tpe of characterization is referred to as absolte stabilit. Given that the sstem is stable,
More informationDocument management and records (based in part upon materials by Frank Upward and Robert Hartland)
Today s lectre IMS1603 Lectre 21 What does docment management entail? Docment management and records (based in part pon materials by Frank Upward and Robert Hartland) www.monash.ed. a Thinking more abot
More informationThe Intelligent Choice for Disability Income Protection
The Intelligent Choice for Disability Income Protection provider Pls Keeping Income strong We prposeflly engineer or disability income prodct with featres that deliver benefits sooner and contine paying
More informationCandidate: Shawn Mullane. Date: 04/02/2012
Shipping and Receiving Specialist / Inventory Control Assessment Report Shawn Mllane 04/02/2012 www.resorceassociates.com To Improve Prodctivity Throgh People. Shawn Mllane 04/02/2012 Prepared For: NAME
More informationThe Intelligent Choice for Basic Disability Income Protection
The Intelligent Choice for Basic Disability Income Protection provider Pls Limited Keeping Income strong We prposeflly engineer or basic disability income prodct to provide benefit-rich featres delivering
More informationPlanning an Active Directory Deployment Project
C H A P T E R 1 Planning an Active Directory Deployment Project When yo deploy the Microsoft Windows Server 2003 Active Directory directory service in yor environment, yo can take advantage of the centralized,
More informationSpectrum Balancing for DSL with Restrictions on Maximum Transmit PSD
Spectrm Balancing for DSL with Restrictions on Maximm Transmit PSD Driton Statovci, Tomas Nordström, and Rickard Nilsson Telecommnications Research Center Vienna (ftw.), Dona-City-Straße 1, A-1220 Vienna,
More informationCRM Customer Relationship Management. Customer Relationship Management
CRM Cstomer Relationship Management Farley Beaton Virginia Department of Taxation Discssion Areas TAX/AMS Partnership Project Backgrond Cstomer Relationship Management Secre Messaging Lessons Learned 2
More informationCandidate: Charles Parker. Date: 01/29/2015
Software Developer / Programmer Assessment Report 01/29/2015 www.resorceassociates.com To Improve Prodctivity Throgh People. Janary 29, 2015 01/29/2015 The following pages represent a report based on the
More informationPlanning a Smart Card Deployment
C H A P T E R 1 7 Planning a Smart Card Deployment Smart card spport in Microsoft Windows Server 2003 enables yo to enhance the secrity of many critical fnctions, inclding client athentication, interactive
More informationDesigning and Deploying File Servers
C H A P T E R 2 Designing and Deploying File Servers File servers rnning the Microsoft Windows Server 2003 operating system are ideal for providing access to files for sers in medim and large organizations.
More informationCloser Look at ACOs. Making the Most of Accountable Care Organizations (ACOs): What Advocates Need to Know
Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Updated
More informationCandidate: Kyle Jarnigan. Date: 04/02/2012
Cstomer Service Manager Assessment Report 04/02/2012 www.resorceassociates.com To Improve Prodctivity Throgh People. Cstomer Service Manager Assessment Report 04/02/2012 Prepared For: NAME Prepared by:
More informationCandidate: Cassandra Emery. Date: 04/02/2012
Market Analyst Assessment Report 04/02/2012 www.resorceassociates.com To Improve Prodctivity Throgh People. 04/02/2012 Prepared For: Resorce Associates Prepared by: John Lonsbry, Ph.D. & Lcy Gibson, Ph.D.,
More informationOn the urbanization of poverty
On the rbanization of poverty Martin Ravallion 1 Development Research Grop, World Bank 1818 H Street NW, Washington DC, USA Febrary 001; revised Jly 001 Abstract: Conditions are identified nder which the
More informationEquilibrium of Forces Acting at a Point
Eqilibrim of orces Acting at a Point Eqilibrim of orces Acting at a Point Pre-lab Qestions 1. What is the definition of eqilibrim? Can an object be moving and still be in eqilibrim? Explain.. or this lab,
More informationIn this chapter we introduce the idea that force times distance. Work and Kinetic Energy. Big Ideas 1 2 3. is force times distance.
Big Ideas 1 Work 2 Kinetic 3 Power is force times distance. energy is one-half mass times velocity sqared. is the rate at which work is done. 7 Work and Kinetic Energy The work done by this cyclist can
More informationPHY2061 Enriched Physics 2 Lecture Notes Relativity 4. Relativity 4
PHY6 Enriched Physics Lectre Notes Relativity 4 Relativity 4 Disclaimer: These lectre notes are not meant to replace the corse textbook. The content may be incomplete. Some topics may be nclear. These
More informationBonds with Embedded Options and Options on Bonds
FIXED-INCOME SECURITIES Chapter 14 Bonds with Embedded Options and Options on Bonds Callable and Ptable Bonds Instittional Aspects Valation Convertible Bonds Instittional Aspects Valation Options on Bonds
More informationSample Pages. Edgar Dietrich, Alfred Schulze. Measurement Process Qualification
Sample Pages Edgar Dietrich, Alfred Schlze Measrement Process Qalification Gage Acceptance and Measrement Uncertainty According to Crrent Standards ISBN: 978-3-446-4407-4 For frther information and order
More informationExecutive Coaching to Activate the Renegade Leader Within. Renegades Do What Others Won t To Get the Results that Others Don t
Exective Coaching to Activate the Renegade Leader Within Renegades Do What Others Won t To Get the Reslts that Others Don t Introdction Renegade Leaders are a niqe breed of leaders. The Renegade Leader
More informationResearch on Pricing Policy of E-business Supply Chain Based on Bertrand and Stackelberg Game
International Jornal of Grid and Distribted Compting Vol. 9, No. 5 (06), pp.-0 http://dx.doi.org/0.457/ijgdc.06.9.5.8 Research on Pricing Policy of E-bsiness Spply Chain Based on Bertrand and Stackelberg
More information5 Using Your Verbatim Autodialer
5 Using Yor Verbatim Atodialer 5.1 Placing Inqiry Calls to the Verbatim Atodialer ( Yo may call the Verbatim atodialer at any time from any phone. The nit will wait the programmed nmber of rings before
More informationResource Pricing and Provisioning Strategies in Cloud Systems: A Stackelberg Game Approach
Resorce Pricing and Provisioning Strategies in Clod Systems: A Stackelberg Game Approach Valeria Cardellini, Valerio di Valerio and Francesco Lo Presti Talk Otline Backgrond and Motivation Provisioning
More informationBorrowing for College. Table of contents. A guide to federal loans for higher education
Borrowing for College A gide to federal loans for higher edcation Table of contents Edcation loan basics 2 Applying for edcation loans 3 Repaying edcation loans 3 Controlling edcation loan debt 5 Glossary
More information6 Funding and Staffing the Central IT Help Desk
6 Fnding and Staffing the Central IT Help Desk Money may kindle, bt it cannot itself, or for very long, brn. Igor Stravinsky Key Findings At most instittions the central IT bdget is a major sorce of help
More informationCloser Look at ACOs. Designing Consumer-Friendly Beneficiary Assignment and Notification Processes for Accountable Care Organizations
Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Janary 2012
More information7 Help Desk Tools. Key Findings. The Automated Help Desk
7 Help Desk Tools Or Age of Anxiety is, in great part, the reslt of trying to do today s jobs with yesterday s tools. Marshall McLhan Key Findings Help desk atomation featres are common and are sally part
More informationproperty insurance claim report
property insrance claim report CGU Insrance Limited ABN 27 004 478 371 Please retain this page for yor information Abot yor claim Most policies allow for replacement of property with the nearest eqivalent
More informationUNIT 62: STRENGTHS OF MATERIALS Unit code: K/601/1409 QCF level: 5 Credit value: 15 OUTCOME 2 - TUTORIAL 3
UNIT 6: STRNGTHS O MTRIS Unit code: K/601/1409 QC level: 5 Credit vale: 15 OUTCOM - TUTORI 3 INTRMDIT ND SHORT COMPRSSION MMBRS Be able to determine the behavioral characteristics of loaded beams, colmns
More informationHSBC Internet Banking. Combined Product Disclosure Statement and Supplementary Product Disclosure Statement
HSBC Internet Banking Combined Prodct Disclosre Statement and Spplementary Prodct Disclosre Statement AN IMPORTANT MESSAGE FOR HSBC CUSTOMERS NOTICE OF CHANGE For HSBC Internet Banking Combined Prodct
More informationEvolutionary Path Planning for Robot Assisted Part Handling in Sheet Metal Bending
Evoltionary Path Planning for Robot Assisted Part Handling in Sheet Metal Bending Abstract Xiaoyn Liao G. Gary Wang * Dept. of Mechanical & Indstrial Engineering, The University of Manitoba Winnipeg, MB,
More informationIsilon OneFS. Version 7.1. Backup and recovery guide
Isilon OneFS Version 7.1 Backp and recovery gide Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished March, 2014 EMC believes the information in this pblication is accrate
More informationContents Welcome to FOXTEL iq2...5 For your safety...6 Getting Started...7 Playlist... 51 Active...53 Setup...54 FOXTEL Guide...18 ON DEMAND...
Contents Welcome to FOXTEL iq2...5 The FOXTEL iq2...5 Updates to FOXTEL iq2...5 Getting in toch with FOXTEL...5 For yor safety...6 Getting Started...7 Switching the FOXTEL iq2 on and off...7 Changing channel...7
More informationNAZIA KANWAL VECTOR TRACKING LOOP DESIGN FOR DEGRADED SIGNAL ENVIRONMENT. Master of Science Thesis
NAZIA KANWAL VECTOR TRACKING LOOP DESIGN FOR DEGRADED SIGNAL ENVIRONMENT Master of Science Thesis Examiners: Professor Jari Nrmi, Adjnct Professor Simona Lohan and Dr. Heikki Hrskainen Examiner and topic
More informationDesigning a TCP/IP Network
C H A P T E R 1 Designing a TCP/IP Network The TCP/IP protocol site defines indstry standard networking protocols for data networks, inclding the Internet. Determining the best design and implementation
More informationDESTINATION ASSURED CONTACT US. Products for Life
DESTINATION ASSURED CONTACT US For more information abot any of the services in this brochre, call 1-800-748-4302, visit or website at www.mac.com or stop by the branch nearest yo. LR-2011 Federally insred
More informationOpening the Door to Your New Home
Opening the Door to Yor New Home A Gide to Bying and Financing. Contents Navigating Yor Way to Home Ownership...1 Getting Started...3 Finding Yor Home...9 Finalizing Yor Financing...12 Final Closing...13
More informationKentucky Deferred Compensation (KDC) Program Summary
Kentcky Deferred Compensation (KDC) Program Smmary Smmary and Highlights of the Kentcky Deferred Compensation (KDC) Program Simple. Smart. For yo. For life. 457 Plan 401(k) Plan Roth 401(k) Deemed Roth
More informationLIMITS IN CATEGORY THEORY
LIMITS IN CATEGORY THEORY SCOTT MESSICK Abstract. I will start assming no knowledge o category theory and introdce all concepts necessary to embark on a discssion o limits. I will conclde with two big
More informationTrustSVD: Collaborative Filtering with Both the Explicit and Implicit Influence of User Trust and of Item Ratings
TrstSVD: Collaborative Filtering with Both the Explicit and Implicit Inflence of User Trst and of Item Ratings Gibing Go Jie Zhang Neil Yorke-Smith School of Compter Engineering Nanyang Technological University
More informationRoth 401(k) and Roth 403(b) Accounts: Pay Me Now or Pay Me Later Why a Roth Election Should Be Part of Your Plan Now
Reprinted with permission from the Society of FSP. Reprodction prohibited withot pblisher's written permission. Roth 401(k) and Roth 403(b) Acconts: Why a Roth Election Shold Be Part of Yor Plan Now by
More informationPreparing your heavy vehicle for brake test
GUIDE Preparing yor heavy vehicle for brake test A best practice gide Saving lives, safer roads, ctting crime, protecting the environment Breaking the braking myth Some people believe that a locked wheel
More informationNewton s three laws of motion, the foundation of classical. Applications of Newton s Laws. Chapter 5. 5.1 Equilibrium of a Particle
Chapter 5 Applications of Newton s Laws The soles of hiking shoes are designed to stick, not slip, on rocky srfaces. In this chapter we ll learn abot the interactions that give good traction. By the end
More informationChapter 1 Introduction
Chapter 1 Introduction 1. Shannon s Information Theory 2. Source Coding theorem 3. Channel Coding Theory 4. Information Capacity Theorem 5. Introduction to Error Control Coding Appendix A : Historical
More informationPgrading To Windows XP 4.0 Domain Controllers and Services
C H A P T E R 8 Upgrading Windows NT 4.0 Domains to Windows Server 2003 Active Directory Upgrading yor domains from Microsoft Windows NT 4.0 to Windows Server 2003 Active Directory directory service enables
More informationPosition paper smart city. economics. a multi-sided approach to financing the smart city. Your business technologists.
Position paper smart city economics a mlti-sided approach to financing the smart city Yor bsiness technologists. Powering progress From idea to reality The hman race is becoming increasingly rbanised so
More informationSEGREGATED ACCOUNTS COMPANIES ACE CAPABILITIES: AN OVERVIEW
SEGREGATED ACCOUNTS COMPANIES CAPABILITIES: AN OVERVIEW SIMPLICITY OUT OF COMPLEXITY SEGREGATED ACCOUNTS CAPABILITIES Managing yor own risks jst got simpler. In recent years, increasing reglation has led
More informationSickness Absence in the UK: 1984-2002
Sickness Absence in the UK: 1984-2002 Tim Barmby (Universy of Drham) Marco Ecolani (Universy of Birmingham) John Treble (Universy of Wales Swansea) Paper prepared for presentation at The Economic Concil
More informationDesigning an Authentication Strategy
C H A P T E R 1 4 Designing an Athentication Strategy Most organizations need to spport seamless access to the network for mltiple types of sers, sch as workers in offices, employees who are traveling,
More informationPeriodized Training for the Strength/Power Athlete
Periodized Training for the /Power Athlete Jay R. Hoffman, PhD, FACSM, CSCS *D The se of periodized training has been reported to go back as far as the ancient Olympic games. Its basic premise is that
More informationIntroducing Revenue Cycle Optimization! STI Provides More Options Than Any Other Software Vendor. ChartMaker Clinical 3.7
Introdcing Revene Cycle Optimization! STI Provides More Options Than Any Other Software Vendor ChartMaker Clinical 3.7 2011 Amblatory EHR + Cardiovasclar Medicine + Child Health STI Provides More Choices
More informationAn unbiased crawling strategy for directed social networks
Abstract An nbiased crawling strategy for directed social networks Xeha Yang 1,2, HongbinLi 2* 1 School of Software, Shenyang Normal University, Shenyang 110034, Liaoning, China 2 Shenyang Institte of
More informationEMC Storage Analytics
EMC Storage Analytics Version 2.1 Installation and User Gide 300-014-858 09 Copyright 2013 EMC Corporation. All rights reserved. Pblished in USA. Pblished December, 2013 EMC believes the information in
More information9 Setting a Course: Goals for the Help Desk
IT Help Desk in Higher Edcation ECAR Research Stdy 8, 2007 9 Setting a Corse: Goals for the Help Desk First say to yorself what yo wold be; and then do what yo have to do. Epictets Key Findings Majorities
More information11 Success of the Help Desk: Assessing Outcomes
11 Sccess of the Help Desk: Assessing Otcomes I dread sccess... I like a state of continal becoming, with a goal in front and not behind. George Bernard Shaw Key Findings Respondents help desks tend to
More informationEMC VNX Series Setting Up a Unisphere Management Station
EMC VNX Series Setting Up a Unisphere Management Station P/N 300-015-123 REV. 02 April, 2014 This docment describes the different types of Unisphere management stations and tells how to install and configre
More informationDirect Loan Basics & Entrance Counseling Guide. For Graduate and Professional Student Direct PLUS Loan Borrowers
Direct Loan Basics & Entrance Conseling Gide For Gradate and Professional Stdent Direct PLUS Loan Borrowers DIRECT LOAN BASICS & ENTRANCE COUNSELING GUIDE For Gradate and Professional Stdent Direct PLUS
More informationA Spare Part Inventory Management Model for Better Maintenance of Intelligent Transportation Systems
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 A Spare Part Inventory Management Model for Better Maintenance of Intelligent
More informationSolutions to Assignment 10
Soltions to Assignment Math 27, Fall 22.4.8 Define T : R R by T (x) = Ax where A is a matrix with eigenvales and -2. Does there exist a basis B for R sch that the B-matrix for T is a diagonal matrix? We
More informationEnabling Advanced Windows Server 2003 Active Directory Features
C H A P T E R 5 Enabling Advanced Windows Server 2003 Active Directory Featres The Microsoft Windows Server 2003 Active Directory directory service enables yo to introdce advanced featres into yor environment
More informationLinear Programming. Non-Lecture J: Linear Programming
The greatest flood has the soonest ebb; the sorest tempest the most sdden calm; the hottest love the coldest end; and from the deepest desire oftentimes enses the deadliest hate. Socrates Th extremes of
More informationChapter 1. LAN Design
Chapter 1 LAN Design CCNA3-1 Chapter 1 Note for Instrctors These presentations are the reslt of a collaboration among the instrctors at St. Clair College in Windsor, Ontario. Thanks mst go ot to Rick Graziani
More informationCloser Look at ACOs. Putting the Accountability in Accountable Care Organizations: Payment and Quality Measurements. Introduction
Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Janary 2012
More informationRegular Specifications of Resource Requirements for Embedded Control Software
Reglar Specifications of Resorce Reqirements for Embedded Control Software Rajeev Alr and Gera Weiss University of Pennsylvania Abstract For embedded control systems a schedle for the allocation of resorces
More informationMarket Impact and Optimal Equity Trade Scheduling
Market Impact and Optimal Eqity Trade Schedling Dan dibartolomeo Northfield Information Services, Inc. Colmbia University Math Finance Seminar September 2007 Presentation Otline Brief review of the optimal
More informationPrimary Analysis of Effective Permeability of the Flame in Burning Natural Gas
Jornal of etals, aterials and inerals. Vol.7 No. pp.63-66. rimary Analysis of Effective ermeability of the Flame in Brning Natral Gas Rakoš JAROSAV * and Repasova AGDAENA * Department of Thermal Technology,
More informationTowers Watson Manager Research
Towers Watson Manager Research How we se fnd performance data Harald Eggerstedt 13. März 212 212 Towers Watson. All rights reserved. Manager selection at Towers Watson The goal is to find managers that
More informationMake the College Connection
Make the College Connection A college planning gide for stdents and their parents Table of contents The compelling case for college 2 Selecting a college 3 Paying for college 5 Tips for meeting college
More information2 2 Matrices. Scalar multiplication for matrices. A2 2matrix(pronounced 2-by-2matrix )isasquareblockof4numbers. For example,
2 2 Matrices A2 2matrix(prononced 2-by-2matrix )isasqareblockofnmbers. For example, is a 2 2matrix. It scalleda2 2 matrix becase it has 2 rows 2 colmns. The for nmbers in a 2 2matrixarecalledtheentries
More information3. DATES COVERED (From- To) Technical 4. TITLE AND SUBTITLE
REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-01-0188 l ne pblic reporting brden tor this collection of information is estimated to average 1 hor per response, inclding the time tor reviewing instrctions,
More information3 Distance in Graphs. Brief outline of this lecture
Distance in Graphs While the preios lectre stdied jst the connectiity properties of a graph, now we are going to inestigate how long (short, actally) a connection in a graph is. This natrally leads to
More information8 Service Level Agreements
8 Service Level Agreements Every organization of men, be it social or political, ltimately relies on man s capacity for making promises and keeping them. Hannah Arendt Key Findings Only abot 20 percent
More informationSTI Has All The Pieces Hardware Software Support
STI Has All The Pieces Hardware Software Spport STI has everything yo need for sccessfl practice management, now and in the ftre. The ChartMaker Medical Site Incldes: Practice Management/Electronic Billing,
More informationCentral Angles, Arc Length, and Sector Area
CHAPTER 5 A Central Angles, Arc Length, and Sector Area c GOAL Identify central angles and determine arc length and sector area formed by a central angle. Yo will need a calclator a compass a protractor
More informationEMC VNX Series. EMC Secure Remote Support for VNX. Version VNX1, VNX2 300-014-340 REV 03
EMC VNX Series Version VNX1, VNX2 EMC Secre Remote Spport for VNX 300-014-340 REV 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Jly, 2014 EMC believes the information
More informationChapter 14. Three-by-Three Matrices and Determinants. A 3 3 matrix looks like a 11 a 12 a 13 A = a 21 a 22 a 23
1 Chapter 14. Three-by-Three Matrices and Determinants A 3 3 matrix looks like a 11 a 12 a 13 A = a 21 a 22 a 23 = [a ij ] a 31 a 32 a 33 The nmber a ij is the entry in ro i and colmn j of A. Note that
More informationWelcome to UnitedHealthcare. Ideally, better health coverage should cost less. In reality, now it can.
Welcome to UnitedHealthcare Ideally, better health coverage shold cost less. In reality, now it can. The plan designed with both qality and affordability in mind. Consistent, qality care is vitally important.
More information