Hybrid Algorithm for Indoor Positioning Using Wireless LAN

Size: px
Start display at page:

Download "Hybrid Algorithm for Indoor Positioning Using Wireless LAN"

Transcription

1 Hybrid Algorithm for Indoor Positioning Using Wireless LAN Jaimyoung Kwon Institute of Transportation Studies University of California, Berkeley and Department of Statistics California State University Hayward, CA Baris Dundar and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California Berkeley, CA, Abstract Locating an indoor mobile station based on wireless communication infrastructure, has practical applications. The most widely employed methods today use a RF propagation loss (PL) model or location fingerprinting (LF). The PL method is known to perform poorly compared to LF. But LF requires an extensive training dataset and cannot adapt well to configuration changes or receiver breakdown. In the current paper, we develop a hybrid method that combines the strength of these two methods. It first formulates the RF propagation loss in a nonlinear, censored regression model and adjusts the regression function to the observed signal strength in the fingerprint dataset. In the absence of a training dataset, the hybrid method coincides with the PL method and as the spatial granularity of training dataset increases, the result of the algorithm approaches the result of the LF method. It balances flexibility and accuracy of the two traditional methods, makes intelligent use of missing values, produces error bounds, and can be made dynamic. We evaluate the performance of the algorithm by applying it to a real site and observe satisfactory positioning accuracy. I. INTRODUCTION Positioning the location of a mobile station has various practical applications. It can be achieved either by special infrastructure like the Global Positioning System (GPS), but it is also desirable to use existing infrastructures. Such infrastructures include cell phone antennas for locating mobile phone users and access points (APs) for locating wireless LAN users. The current paper studies indoor positioning based on IEEE 802.b wireless communication infrastructure. The problem can be summarized as follows. We have a transmitter (mobile user) with unknown coordinate A R 2 and receivers (access points) with known coordinates B j, where j =,...,M indexes receivers. Both A and B resides either in R 2 (more common) or in R 3. At some time, the receivers report the strength of the wireless signal they receive from the transmitter. Call Y j the received signal strength (RSS) reported from receiver j. The problem is to estimate the location A from the data {Y j,b j }. Currently two approaches are commonly employed: RF propagation loss model method and location fingerprinting. See [2], [3], [] and [5], among others, for a brief survey of the field and alternative approaches. A. RF propagation Loss Model Method From the RSS vector Y = (Y,...,Y N ), the scheme searches for the location A that is likely to generate the observed vector assuming the observed RSS follows a radio frequency (RF) propagation loss model. For example, one could model the RSS at receiver j at B j when the transmitter with power P 0 is at A by Y j g j (Θ,A) () = P 0 0 δ log 0 d(a, B j ) wallloss, where P 0 is the power of transmitter, δ (so called the clutter density ) is a number (default 3) which represents the clutter, d(a, B j ) is the Euclidean distance between A and B j, and wallloss is the sum of the losses introduced by each wall on the line segment drawn between A and B j. The regression function g j (Θ,A) is specific to the receiver j, and Θ is the general site characteristic parameter vector. In the simplest setting, we estimate d(a, B j ) for at least three j and use triangulation to find the coordinate A. B. Location fingerprinting Location fingerprinting method requires a training dataset, which is the collection of data {(Y i,c i ),i =,...,N}, for N locations in the site, where C i is the known location of the i th measurement and Y i =(Y i,...,y in ) is the RSS vector when the transmitter is at C i. The vector Y i is the fingerprint of the location C i. Based on this training dataset, when a new fingerprint Y is observed from a transmitter with unknown location A, one searches for the fingerprint Y i that is closest to Y in say L p distance for certain p (typically p= or 2) and estimate A with the corresponding C i. C. Comparison of the two methods Due to the difficulty of correctly modeling multipath environment in indoor areas, RF propagation loss model based methods perform poorly compared with location fingerprinting. On the other hand, to perform well, location fingerprinting requires a large training dataset covering locations on very fine

2 grids (large N). This requires an extensive initial deployment effort. Also, if the configuration changes, the training dataset needs to be constructed again. Finally, fingerprinting is not very robust aginst the breakdown of some receivers. We develop a new method with these characteristics: ) It is a hybrid method that combines the strengths of the RF propagation loss model and fingerprinting methods. The idea is to achieve accuracy comparable with fingerprinting, but requiring a much smaller data collection effort. 2) The method produces an error bound of the location estimate. In many applications, the user can benefit by having a measure of accuracy. 3) The method makes intelligent use of missing values to increase positioning accuracy. Ambiguity in positioning can arise when fewer than three receivers hear the transmitter, and one can resolve the resulting ambiguity in many cases from the knowledge that certain receivers do not hear the transmitter. ) The method can be easily extended to dynamic positioning via Kalman filtering to estimate the trajectory of a moving transmitter. Details of the algorithm are presented in Section 2. In Section 3, we apply the algorithm to a test site and investigate its performance. Section concludes the paper. II. METHODS We first formulate the RF propagation loss in the following probabilistic model: Y j = g j (Θ,A)+e j,j =,..., M, (2) where the error terms e j are assumed to be independent and follow the common normal distribution N(0,σ 2 ). Also, if the signal strength is weaker than some threshold Y 0, the receiver j does not hear the transmitter, resulting in a missing value. Such observation is said to be censored in statistics literature. A. Nonlinear Censored Regression Model and Maximum Likelihood Estimation Considering A as the unknown parameter, the likelihood and the log-likelihood functions of this model are M L(A) = Φ(Y 0 g j (Θ,A)) (Yj<Y0) (3) l(a) = φ(y j g j (Θ,A)) (Yj Y0), and M (Y j <Y 0 ) log Φ(Y 0 g j (Θ,A)) () +(Y j Y 0 ) log φ(y j g j (Θ,A)), respectively. Here Φ and φ denote the cumulative distribution and probability density function of the normal distribution N(0,σ 2 ), respectively. In effect, we formulate the positioning based on RF propagation loss model as a nonlinear censored regression model [7]. Once the model is represented in this way, we can apply standard likelihood theory to this model to obtain the maximum likelihood estimate (MLE) Â of A and the error bound with certain confidence level. See [] for details on the properties of MLEs. B. Hybrid Algorithm To improve positioning accuracy, we combine the method with fingerprinting in the following way. As in fingerprinting, we obtain a training dataset (Y i,c i ) at several locations C i,i =,...,N. With this information, we adjust the regression function g j (Θ,A) in (2) as h j (Θ,A)=g j (Θ,A)+ g j (Θ,A), j =,..., M, (5) where g j (Θ, ) is the surface over the domain R 2 or R 3 that is estimated from the residuals Y ij g j (Θ,C j ),i=,..., N viewed as a marked point process on the domain. Various methods exist for estimating such a surface, from simple interpolation to more complicated spatial statistics techniques. In this paper, we use the trend surface ([6] and [8]) with degree 2 polynomial surface. Given the corrected regression function h j (Θ, ), the rest of the positioning algorithm is identical to the censored nonlinear regression method given above. If there is no training dataset, the hybrid method coincides with RF propagation loss model method. As the spatial granularity of training dataset increases, the regression function h j approaches the one (implicitly) used by fingerprinting and the result of the algorithm become close to that of the fingerprinting method. But even in this case, unlike in fingerprinting, the hybrid method retains characteristics 2-, i.e., it makes intelligent use of missing values, produces an error bound, and can be made dynamic. C. Computation of the Error Bound From the MLE theory, for MLE Â of A, M( Â A) N(0,I (A)) (6) approximately for large M, where the Fisher information matrix I(A) is given by [ ] I(A) =E A 2 log f(x, A). (7) A2 Here f(x, A) is the probability density function of X with parameter A, whose log appears as the summand in (). We approximate I(A) by replacing A with Â, the expectation with the average, and differentiation with the finite difference. This can be done without much cost especially when one maximizes l(a) directly over grid in R 2. To summarize, 2 Î(Â) = l(â)/m, (8) A2 where / A denotes the finite difference operator.

3 Fig.. Test Site at the 3rd Floor of Cory Hall, UC Berkeley Fig. 2. Measurement (White Circle) and AP Locations (Black Dots) D. Dynamic Positioning Using one of the above strategies, one can estimate A t by Ât with the accompanying error estimate ˆΣ t over time t =, 2,... We present extension of the algorihm to a dynamic positioning algorithm by the Kalman filtering formulation [9]. We assume the linear stochastic difference equation with the measurement x t = Dx t + w t z t = Hx t + v t. One obvious way of embedding our static scheme to this dynamic setup is by letting D = H = I (identity), so the mobile user moves as a random walk (the distribution of w t needs to be supplied) and setting x t = A t = true location of the mobile user at time t z t = Ât = estimated location of the mobile user at time t Naturally, v t N(0, Σ t ) (9) with Σ t estimated by Î(Ât) above. Then the usual Kalman filter algorithm can be applied to produce dynamic tracking of the location. See [9]. III. EXPERIMENT We evaluate the performance of the algorithm by applying it to a real site with 802.b wireless LAN infrastructure. The data are collected from the 3rd Floor of Cory Hall of UC Berkeley. Figure shows the floor plan of the 7 58 meter site. For the study, we divide the site into 7 58 grid points, each grid corresponding to one square meter. We took RSS measurements at 23 locations in the site (shown in Figure 2) using our site survey software. At each measurement location, four active scans were performed and at each scan, the APs that are heard, identified by their MAC addresses, and corresponding RSS (in dbm), are recorded. A Fig. 3. AP Deployment Level (Circle = 23; Triangle = 0; and Cross = 5) total of 38 APs are heard in at least one scan, but no AP is heard at all locations. Each location hears 7.9 APs on the average, with the number of APs heard at any location ranging from 9 to 2. Thus there is a lot of censoring due to weak RSS. Wireless signal gets unstable when RSS reaches -75 to -80 dbm and wireless devices typically cannot hear signal weaker then -0 db or -96 dbm. For the current dataset, the RSS ranges between -9 and - dbm with the mean and median of and -78, respectively. We use -9 dbm as the censoring point Y 0, below which wireless device can t hear. Note that we can compute standard deviation (SD) of RSSI from the same AP from the multiple scans. For those APs that are heard in all four scans at each location, we compute the SD; the mean of all SDs is.37 (dbm). We set this to be the parameter σ in the Gaussian error distribution. Among the 38 APs heard in the training data, we consider only the APs that are located on the same floor, i.e., we restrict ourselves to 2-dimensional, not 3-dimensional, positioning. The true location of those APs are also shown in the Figure 2. Heuristically, there are high chances of getting

4 very weak signals due to the adverse direction of the receiver, passing obstacles, interference, etc., while the chances of getting a very strong signal is small. Reflecting this heuristics as well as to speed up computation, for each measurement location and AP pair, we use the largest RSS as the observed Y j. The original problem is positioning a mobile user/transmitter with unknown location from RSS received at multiple receiver/aps with known locations. Since the relationship between a transmitter and a receiver is symmetric under the reasonable assumption that all transmitters (APs in this case) have same output power P 0, we apply the algorithm to locate APs with RSS received at various measurement locations. The reason for this is to evaluate the effect of decreasing number of APs in the positioning accuracy more easily. (There are more measurement locations than APs in our data.) Thus, from now on, we refer to the original APs and receiver as (mobile user) location and APs. So M = 23 and we have unknown mobile locations to estimate in our data. Note that 23 AP locations in 7 58 meter site is unusually dense in practice. To simulate more realistic AP deployment situations, we reduce these to 0 and 5 AP locations. They are selected to be distributed in a balanced and nested manner. Figure 3 shows the original and reduced AP deployment levels. At each level of deployment, we apply the following methods to position the receiver: ) Closest AP method: Estimate A by the location Bj with the strongest RSS j = max,...,m Y j. 2) Naive MLE: Estimate A by maximizing the observed Y j -only log-likelihood l (A) l (A) = M (Y j Y 0 ) log φ(y j g j (Θ,A)), (0) instead of (). 3) Proper MLE: Estimate A by maximizing the loglikelihood l(a). ) Corrected MLE: Proper MLE with corrected regression function (5). Table I and Figure show the median positioning error of each method at each deployment level. As expected, the closest AP method performs increasingly poorly as the number of APs decreases. The naive MLE performs better than the closes AP method except at M = 5. The proper MLE improves upon both the closest AP method and the naive MLE. The improvement is negligible at very dense deployment M =23 but the benefit is visible at both M =0and 5. Still, at M = 5, the method performs nearly as poorly as the closest AP method. The corrected MLE, on the other hand, improves over all other competitors at all deployment levels, exhibiting 2%, 2% and % reduction in median positioning error compared to the next best method, the proper MLE. Quite interestingly, it doesn t suffer much from the sparse deployment of APs. As one moves from 23 APs to 0 APs and then to 5 APs, the median positioning error increases at the moderate rate of % (meter) Median Positioning Error Deployment Level Fig.. Median Positioning Error of the Four Methods at Various Deployment Levels (=Closest AP; 2=Naive MLE; 3=Proper MLE; and =Corrected MLE) TABLE I MEDIAN POSITIONING ERROR OF THE ALGORITHMS (IN METERS) Deployment Level M Closest AP Naive MLE Proper MLE Corrected MLE and 27%. Even when only 5 APs are deployed, the median positioning error is less than 7 meters, which is acceptable. Figure 5 illustrate the behavior of the Naive MLE, Proper MLE and Corrected MLE algorithms. Note that the pure white area in the contour plots signifies the lowest likelihood value. It is clear from the likelihood contour of the proper MLE that as one starts to handle missing values correctly, the high likelihood region reduces to the area around the true location, excluding a lot more area as highly unlikely (white area) compared to the likelihood contour for the naive MLE. As one starts to use the corrected regression function (the third contour plot), the white patch expands even further and the likelihood zooms in to the true value and the proper MLE estimates the true location with a very small error. Figure 6 illustrate the error bound estimated by the normal approximation (6) for the corrected MLE for the same example. Such error bound provides the helpful information to the end user by providing a quantitative measure of how reliable the positioning is. Also, regarded as Σ t of (9) at the current time, it can be used for dynamic positioning by Kalman filtering as presented above. IV. CONCLUSION We presented a hybrid algorithm for indoor positioning using wireless LAN that aims to combine the benefits of the RF propagation loss model and fingerprinting method. It relies on the probabilistic formulation of the wireless positioning 2 3

5 60 70 Naive MLE Corrected MLE Proper MLE Fig , 95, 99% Confidence Ellipses (From the Smallest to the Largest) for Corrected MLE In an application to a real site, the proposed algorithm exhibits 20 to 0% improvement in positioning accuracy compared to competing methods at all deployment levels. Also, it maintains reasonable positioning accuracy of about 5 to 7 meter even for a very sparse deployment of APs. Corrected MLE Fig. 5. Likelihood Contour for Naive, Proper and Corrected MLE Methods with the MLE Estimate (White Circle) and the True Location (Black Square) for a Location with M =0 problem as a nonlinear censored regression problem and nonparametric correction of the RF propagation loss model function using empirical RSS. It handles missing values in a correct manner and produces a likelihood-theory based error bound, which is useful as a reliability measure as well as an input for the dynamic extension of the algorithm based on Kalman filtering. The algorihtm requires less initial deployment effort than LF method and is robust against the breakdown of some receivers. The algorithm is also substantially more accurate than unmodified RF propagation loss model. ACKNOWLEDGMENT Research supported by California Department of Transportation. REFERENCES [] P. J. Bickel and K. A. Doksum, Mathematical Statistics:Basic Ideas and Selected Topics, Vol I, 3nd ed. Prentice Hall, [2] T. Kitasuka, T. Nakanishi, and A. Fukuda, Wireless LAN based Indoor Positioning System WiPS and Its Simulation. Proc IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM 03), pp , August, [3] Kotanen, A., Hannikainen, M., Leppakoski, H., and T. D. Hamalainen, Positioning with IEEE 802.b wireless LAN, th IEEE Proceedings on Personal, Indoor and Mobile Radio Communications, 2003., Vol. 3, (September 2003): [] Ladd, A. M., Bekris, K. E., Rudys, A., Kavraki, L. E., and D. S. Wallach, On the Feasibility of Using Wireless Ethernet for Indoor Localization. IEEE Transactions on Robotics and Automation, 20(3):In Press, June 200. [5] T. Liu, P. Bahl and I. Chlamtac, Mobility Modeling, Location Tracking, and Trajectory Prediction in Cellular Networks. IEEE Journal on Special Areas in Communications, Special Issue on Wireless Access Broadband Networks, Vol. 6, No. 6, (August 998): [6] Ripley, B. D., Spatial Statistics. Wiley, 98. [7] Stute, W., Nonlinear censored regression. Statistica Sinica, Vol. 9, (999): [8] Venables, W. N. and Ripley, B. D., Modern Applied Statistics with S. Fourth edition. Springer, [9] Welch, G. and Bishop, G., An Introduction to the Kalman Filter. TR 95-0, Department of Computer Science, University of North Carolina at Chapel Hill. April 5, 200.

Estimation of Position and Orientation of Mobile Systems in a Wireless LAN

Estimation of Position and Orientation of Mobile Systems in a Wireless LAN Proceedings of the 46th IEEE Conference on Decision and Control New Orleans, LA, USA, Dec. 12-14, 2007 Estimation of Position and Orientation of Mobile Systems in a Wireless LAN Christof Röhrig and Frank

More information

Raitoharju, Matti; Dashti, Marzieh; Ali-Löytty, Simo; Piché, Robert

Raitoharju, Matti; Dashti, Marzieh; Ali-Löytty, Simo; Piché, Robert Tampere University of Technology Author(s) Title Citation Raitoharju, Matti; Dashti, Marzieh; Ali-Löytty, Simo; Piché, Robert Positioning with multilevel coverage area models Raitoharju, Matti; Dashti,

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

Modeling of Indoor Positioning Systems Based on Location Fingerprinting

Modeling of Indoor Positioning Systems Based on Location Fingerprinting Modeling of Indoor Positioning Systems Based on Location Fingerprinting Kamol Kaemarungsi and Prashant Krishnamurthy Telecommunications Program School of Information Science, University of Pittsburgh 35

More information

RF Coverage Validation and Prediction with GPS Technology

RF Coverage Validation and Prediction with GPS Technology RF Coverage Validation and Prediction with GPS Technology By: Jin Yu Berkeley Varitronics Systems, Inc. 255 Liberty Street Metuchen, NJ 08840 It has taken many years for wireless engineers to tame wireless

More information

Fairfield Public Schools

Fairfield Public Schools Mathematics Fairfield Public Schools AP Statistics AP Statistics BOE Approved 04/08/2014 1 AP STATISTICS Critical Areas of Focus AP Statistics is a rigorous course that offers advanced students an opportunity

More information

Overview of Violations of the Basic Assumptions in the Classical Normal Linear Regression Model

Overview of Violations of the Basic Assumptions in the Classical Normal Linear Regression Model Overview of Violations of the Basic Assumptions in the Classical Normal Linear Regression Model 1 September 004 A. Introduction and assumptions The classical normal linear regression model can be written

More information

Location of Mobile Terminals Using Time Measurements and Survey Points

Location of Mobile Terminals Using Time Measurements and Survey Points IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 52, NO. 4, JULY 2003 999 Location of Mobile Terminals Using Time Measurements and Survey Points Michael McGuire, Member, IEEE, Konstantinos N. Plataniotis,

More information

PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION

PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION Introduction In the previous chapter, we explored a class of regression models having particularly simple analytical

More information

Π8: Indoor Positioning System using WLAN Received Signal Strength Measurements Preface

Π8: Indoor Positioning System using WLAN Received Signal Strength Measurements Preface Π8: Indoor Positioning System using WLAN Received Signal Strength Measurements Preface In this deliverable we provide the details of building an indoor positioning system using WLAN Received Signal Strength

More information

Gamma Distribution Fitting

Gamma Distribution Fitting Chapter 552 Gamma Distribution Fitting Introduction This module fits the gamma probability distributions to a complete or censored set of individual or grouped data values. It outputs various statistics

More information

Hyperbolic Location Fingerprinting: A Calibration-Free Solution for Handling Differences in Signal Strength

Hyperbolic Location Fingerprinting: A Calibration-Free Solution for Handling Differences in Signal Strength Hyperbolic Location Fingerprinting: A Calibration-Free Solution for Handling Differences in Signal Strength Mikkel Baun Kjærgaard and Carsten Valdemar Munk University of Aarhus, Department of Computer

More information

A Multi-Model Filter for Mobile Terminal Location Tracking

A Multi-Model Filter for Mobile Terminal Location Tracking A Multi-Model Filter for Mobile Terminal Location Tracking M. McGuire, K.N. Plataniotis The Edward S. Rogers Sr. Department of Electrical and Computer Engineering, University of Toronto, 1 King s College

More information

Linear Threshold Units

Linear Threshold Units Linear Threshold Units w x hx (... w n x n w We assume that each feature x j and each weight w j is a real number (we will relax this later) We will study three different algorithms for learning linear

More information

Least-Squares Intersection of Lines

Least-Squares Intersection of Lines Least-Squares Intersection of Lines Johannes Traa - UIUC 2013 This write-up derives the least-squares solution for the intersection of lines. In the general case, a set of lines will not intersect at a

More information

Antenna Deployment Technical Brief

Antenna Deployment Technical Brief ProCurve Networking Antenna Deployment Technical Brief Introduction... 2 Antenna types... 2 Omni directional antennas... 2 Directional antennas... 2 Diversity antennas... 3 High gain directional antennas...

More information

Multivariate Normal Distribution

Multivariate Normal Distribution Multivariate Normal Distribution Lecture 4 July 21, 2011 Advanced Multivariate Statistical Methods ICPSR Summer Session #2 Lecture #4-7/21/2011 Slide 1 of 41 Last Time Matrices and vectors Eigenvalues

More information

STATISTICA Formula Guide: Logistic Regression. Table of Contents

STATISTICA Formula Guide: Logistic Regression. Table of Contents : Table of Contents... 1 Overview of Model... 1 Dispersion... 2 Parameterization... 3 Sigma-Restricted Model... 3 Overparameterized Model... 4 Reference Coding... 4 Model Summary (Summary Tab)... 5 Summary

More information

VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS

VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS Aswin C Sankaranayanan, Qinfen Zheng, Rama Chellappa University of Maryland College Park, MD - 277 {aswch, qinfen, rama}@cfar.umd.edu Volkan Cevher, James

More information

System Design in Wireless Communication. Ali Khawaja

System Design in Wireless Communication. Ali Khawaja System Design in Wireless Communication Ali Khawaja University of Texas at Dallas December 6, 1999 1 Abstract This paper deals with the micro and macro aspects of a wireless system design. With the growing

More information

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN

Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical

More information

Predict the Popularity of YouTube Videos Using Early View Data

Predict the Popularity of YouTube Videos Using Early View Data 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

Capacity Limits of MIMO Channels

Capacity Limits of MIMO Channels Tutorial and 4G Systems Capacity Limits of MIMO Channels Markku Juntti Contents 1. Introduction. Review of information theory 3. Fixed MIMO channels 4. Fading MIMO channels 5. Summary and Conclusions References

More information

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology

More information

Radio Access Networks Design and Optimization Technology

Radio Access Networks Design and Optimization Technology Radio Access Networks Design and Optimization Technology UMEMOTO Kenichi, IMAMURA Tomoyasu, TAKAHASHI Gen Abstract The rapid advances in recent years of the broadband implementation of wireless networks,

More information

Imputing Missing Data using SAS

Imputing Missing Data using SAS ABSTRACT Paper 3295-2015 Imputing Missing Data using SAS Christopher Yim, California Polytechnic State University, San Luis Obispo Missing data is an unfortunate reality of statistics. However, there are

More information

Enhancements to RSS Based Indoor Tracking Systems Using Kalman Filters

Enhancements to RSS Based Indoor Tracking Systems Using Kalman Filters Enhancements to RSS Based Indoor Tracking Systems Using Kalman Filters I. Guvenc EECE Department, UNM (505) 2771165 ismail@eece.unm.edu C.T. Abdallah, R. Jordan EECE Department, UNM (505) 2770298 chaouki@eece.unm.edu

More information

Virtual Landmarks for the Internet

Virtual Landmarks for the Internet Virtual Landmarks for the Internet Liying Tang Mark Crovella Boston University Computer Science Internet Distance Matters! Useful for configuring Content delivery networks Peer to peer applications Multiuser

More information

Performance of TD-CDMA systems during crossed slots

Performance of TD-CDMA systems during crossed slots Performance of TD-CDMA systems during s Jad NASREDDINE and Xavier LAGRANGE Multimedia Networks and Services Department, GET / ENST de Bretagne 2 rue de la châtaigneraie, CS 1767, 35576 Cesson Sévigné Cedex,

More information

Statistical Models in R

Statistical Models in R Statistical Models in R Some Examples Steven Buechler Department of Mathematics 276B Hurley Hall; 1-6233 Fall, 2007 Outline Statistical Models Structure of models in R Model Assessment (Part IA) Anova

More information

Update of a projection software to represent a stock-recruitment relationship using flexible assumptions

Update of a projection software to represent a stock-recruitment relationship using flexible assumptions Update of a projection software to represent a stock-recruitment relationship using flexible assumptions Tetsuya Akita, Isana Tsuruoka, and Hiromu Fukuda National Research Institute of Far Seas Fisheries

More information

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2 On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com

More information

Potential Effects of Wind Turbine Generators on Pre-Existing RF Communication Networks SEAN YUN. June 2009. Software Solutions in Radiocommunications

Potential Effects of Wind Turbine Generators on Pre-Existing RF Communication Networks SEAN YUN. June 2009. Software Solutions in Radiocommunications Potential Effects of Wind Turbine Generators on Pre-Existing RF Communication Networks June 2009 SEAN YUN 2 2 Abstract In an effort to help preserve the ozone and the availability of diminishing natural

More information

CS 2750 Machine Learning. Lecture 1. Machine Learning. http://www.cs.pitt.edu/~milos/courses/cs2750/ CS 2750 Machine Learning.

CS 2750 Machine Learning. Lecture 1. Machine Learning. http://www.cs.pitt.edu/~milos/courses/cs2750/ CS 2750 Machine Learning. Lecture Machine Learning Milos Hauskrecht milos@cs.pitt.edu 539 Sennott Square, x5 http://www.cs.pitt.edu/~milos/courses/cs75/ Administration Instructor: Milos Hauskrecht milos@cs.pitt.edu 539 Sennott

More information

Statistical Machine Learning

Statistical Machine Learning Statistical Machine Learning UoC Stats 37700, Winter quarter Lecture 4: classical linear and quadratic discriminants. 1 / 25 Linear separation For two classes in R d : simple idea: separate the classes

More information

Maximum likelihood estimation of mean reverting processes

Maximum likelihood estimation of mean reverting processes Maximum likelihood estimation of mean reverting processes José Carlos García Franco Onward, Inc. jcpollo@onwardinc.com Abstract Mean reverting processes are frequently used models in real options. For

More information

Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm

Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm , pp. 99-108 http://dx.doi.org/10.1457/ijfgcn.015.8.1.11 Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm Wang DaWei and Wang Changliang Zhejiang Industry Polytechnic College

More information

Antenna Diversity in Wireless Local Area Network Devices

Antenna Diversity in Wireless Local Area Network Devices Antenna Diversity in Wireless Local Area Network Devices Frank M. Caimi, Ph.D. Kerry L. Greer Jason M. Hendler January 2002 Introduction Antenna diversity has been used in wireless communication systems

More information

Wireless Networking Trends Architectures, Protocols & optimizations for future networking scenarios

Wireless Networking Trends Architectures, Protocols & optimizations for future networking scenarios Wireless Networking Trends Architectures, Protocols & optimizations for future networking scenarios H. Fathi, J. Figueiras, F. Fitzek, T. Madsen, R. Olsen, P. Popovski, HP Schwefel Session 1 Network Evolution

More information

The Application of Land Use/ Land Cover (Clutter) Data to Wireless Communication System Design

The Application of Land Use/ Land Cover (Clutter) Data to Wireless Communication System Design Technology White Paper The Application of Land Use/ Land Cover (Clutter) Data to Wireless Communication System Design The Power of Planning 1 Harry Anderson, Ted Hicks, Jody Kirtner EDX Wireless, LLC Eugene,

More information

Understanding and Applying Kalman Filtering

Understanding and Applying Kalman Filtering Understanding and Applying Kalman Filtering Lindsay Kleeman Department of Electrical and Computer Systems Engineering Monash University, Clayton 1 Introduction Objectives: 1. Provide a basic understanding

More information

What is 802.11? Why are standards important?

What is 802.11? Why are standards important? What is 802.11? The 802.11 standards are a group of evolving specifications defined by the Institute of Electrical and Electronic Engineers (IEEE). Commonly referred to as Wi Fi the 802.11 standards define

More information

On the Performance of Wireless Indoor Localization Using Received Signal Strength

On the Performance of Wireless Indoor Localization Using Received Signal Strength Contents 12 On the Performance of Wireless Indoor Localization Using Received Signal Strength 1 12.1 Introduction................................... 1 12.2 RSS-based Localization Algorithms......................

More information

Gaussian Processes for Signal Strength-Based Location Estimation

Gaussian Processes for Signal Strength-Based Location Estimation In Proc. of Robotics Science and Systems, 2006. Gaussian Processes for Signal Strength-Based Location Estimation Brian Ferris Dirk Hähnel Dieter Fox University of Washington, Department of Computer Science

More information

Exploiting A Constellation of Narrowband RF Sensors to Detect and Track Moving Targets

Exploiting A Constellation of Narrowband RF Sensors to Detect and Track Moving Targets Exploiting A Constellation of Narrowband RF Sensors to Detect and Track Moving Targets Chris Kreucher a, J. Webster Stayman b, Ben Shapo a, and Mark Stuff c a Integrity Applications Incorporated 900 Victors

More information

A Learning Based Method for Super-Resolution of Low Resolution Images

A Learning Based Method for Super-Resolution of Low Resolution Images A Learning Based Method for Super-Resolution of Low Resolution Images Emre Ugur June 1, 2004 emre.ugur@ceng.metu.edu.tr Abstract The main objective of this project is the study of a learning based method

More information

STA 4273H: Statistical Machine Learning

STA 4273H: Statistical Machine Learning STA 4273H: Statistical Machine Learning Russ Salakhutdinov Department of Statistics! rsalakhu@utstat.toronto.edu! http://www.cs.toronto.edu/~rsalakhu/ Lecture 6 Three Approaches to Classification Construct

More information

Component Ordering in Independent Component Analysis Based on Data Power

Component Ordering in Independent Component Analysis Based on Data Power Component Ordering in Independent Component Analysis Based on Data Power Anne Hendrikse Raymond Veldhuis University of Twente University of Twente Fac. EEMCS, Signals and Systems Group Fac. EEMCS, Signals

More information

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai

More information

REROUTING VOICE OVER IP CALLS BASED IN QOS

REROUTING VOICE OVER IP CALLS BASED IN QOS 1 REROUTING VOICE OVER IP CALLS BASED IN QOS DESCRIPTION BACKGROUND OF THE INVENTION 1.- Field of the invention The present invention relates to telecommunications field. More specifically, in the contextaware

More information

MIMO Antenna Systems in WinProp

MIMO Antenna Systems in WinProp MIMO Antenna Systems in WinProp AWE Communications GmbH Otto-Lilienthal-Str. 36 D-71034 Böblingen mail@awe-communications.com Issue Date Changes V1.0 Nov. 2010 First version of document V2.0 Feb. 2011

More information

Using GIS to Map the WiFi Signal Strength:

Using GIS to Map the WiFi Signal Strength: Using GIS to Map the WiFi Signal Strength: University of Nebraska Lincoln, City Campus Final Project Report Submitted by: Yanfu Zhou / Student Submitted to: Dr.Nam Date: Dec 10, 2012 Contents Abstract...

More information

Example: Credit card default, we may be more interested in predicting the probabilty of a default than classifying individuals as default or not.

Example: Credit card default, we may be more interested in predicting the probabilty of a default than classifying individuals as default or not. Statistical Learning: Chapter 4 Classification 4.1 Introduction Supervised learning with a categorical (Qualitative) response Notation: - Feature vector X, - qualitative response Y, taking values in C

More information

A Network Simulation Tool to Generate User Traffic and Analyze Quality of Experience for Hybrid Access Architecture

A Network Simulation Tool to Generate User Traffic and Analyze Quality of Experience for Hybrid Access Architecture A Network Simulation Tool to Generate User Traffic and Analyze Quality of Experience for Hybrid Access Architecture Oscar D. Ramos-Cantor, Technische Universität Darmstadt, oscar.ramos@nt.tu-darmstadt.de,

More information

Throughput Maximization in Wireless LAN with Load Balancing Approach and Cell Breathing

Throughput Maximization in Wireless LAN with Load Balancing Approach and Cell Breathing Throughput Maximization in Wireless LAN with Load Balancing Approach and Cell Breathing Prof.Devesh Sharma Prof.MamtaSood Subhash patil Santosh Durugkar TIT, Bhopal TIT, Bhopal TIT, Bhopal LGNSCOE,Nasik

More information

The Method of Least Squares

The Method of Least Squares The Method of Least Squares Steven J. Miller Mathematics Department Brown University Providence, RI 0292 Abstract The Method of Least Squares is a procedure to determine the best fit line to data; the

More information

GLM, insurance pricing & big data: paying attention to convergence issues.

GLM, insurance pricing & big data: paying attention to convergence issues. GLM, insurance pricing & big data: paying attention to convergence issues. Michaël NOACK - michael.noack@addactis.com Senior consultant & Manager of ADDACTIS Pricing Copyright 2014 ADDACTIS Worldwide.

More information

GEOENGINE MSc in Geomatics Engineering (Master Thesis) Anamelechi, Falasy Ebere

GEOENGINE MSc in Geomatics Engineering (Master Thesis) Anamelechi, Falasy Ebere Master s Thesis: ANAMELECHI, FALASY EBERE Analysis of a Raster DEM Creation for a Farm Management Information System based on GNSS and Total Station Coordinates Duration of the Thesis: 6 Months Completion

More information

Statistics in Retail Finance. Chapter 6: Behavioural models

Statistics in Retail Finance. Chapter 6: Behavioural models Statistics in Retail Finance 1 Overview > So far we have focussed mainly on application scorecards. In this chapter we shall look at behavioural models. We shall cover the following topics:- Behavioural

More information

Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2404-2408 (2015) ISSN: 0975-0290

Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2404-2408 (2015) ISSN: 0975-0290 2404 Nuzzer algorithm based Human Tracking and Security System for Device-Free Passive System in Smart Phones Environment R.Ranjani Assistant Professor, Department of Computer Science and Engineering,

More information

Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study

Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study 216 Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study Measuring the Optimal Transmission Power of GSM Cellular Network: A Case Study Dr Basil M Kasasbeh, Applied Science University,

More information

The cash flow dynamics of private infrastructure project debt

The cash flow dynamics of private infrastructure project debt The cash flow dynamics of private infrastructure project debt 1/36 The cash flow dynamics of private infrastructure project debt Empirical evidence and dynamic modeling Frédéric Blanc-Brude, PhD Director,

More information

Bootstrapping Big Data

Bootstrapping Big Data Bootstrapping Big Data Ariel Kleiner Ameet Talwalkar Purnamrita Sarkar Michael I. Jordan Computer Science Division University of California, Berkeley {akleiner, ameet, psarkar, jordan}@eecs.berkeley.edu

More information

The Vertical Handoff Algorithm using Fuzzy Decisions in Cellular Phone Networks

The Vertical Handoff Algorithm using Fuzzy Decisions in Cellular Phone Networks International Journal of Electronics Engineering, 2(), 200, pp. 29-34 The Vertical Handoff Algorithm using Fuzzy Decisions in Cellular Phone Networks Chandrashekhar G.Patil & R.D.Kharadkar 2 Department

More information

8. Linear least-squares

8. Linear least-squares 8. Linear least-squares EE13 (Fall 211-12) definition examples and applications solution of a least-squares problem, normal equations 8-1 Definition overdetermined linear equations if b range(a), cannot

More information

Mobile Phone Tracking & Positioning Techniques

Mobile Phone Tracking & Positioning Techniques Mobile Phone Tracking & Positioning Techniques Laxmana Siridhara Arigela #1, Putta Aditya Veerendra *2, Simhadri Anvesh *2, Kolisetty Sandeep Satya Hanuman #3 1 Assistant Professor, Department of ECE,

More information

Analysis of a Device-free Passive Tracking System in Typical Wireless Environments

Analysis of a Device-free Passive Tracking System in Typical Wireless Environments Analysis of a Device-free Passive Tracking System in Typical Wireless Environments Ahmed E. Kosba, Ahmed Abdelkader Department of Computer Engineering Faculty of Engineering, Alexandria University, Egypt

More information

Static Environment Recognition Using Omni-camera from a Moving Vehicle

Static Environment Recognition Using Omni-camera from a Moving Vehicle Static Environment Recognition Using Omni-camera from a Moving Vehicle Teruko Yata, Chuck Thorpe Frank Dellaert The Robotics Institute Carnegie Mellon University Pittsburgh, PA 15213 USA College of Computing

More information

Machine Learning for Medical Image Analysis. A. Criminisi & the InnerEye team @ MSRC

Machine Learning for Medical Image Analysis. A. Criminisi & the InnerEye team @ MSRC Machine Learning for Medical Image Analysis A. Criminisi & the InnerEye team @ MSRC Medical image analysis the goal Automatic, semantic analysis and quantification of what observed in medical scans Brain

More information

How performance metrics depend on the traffic demand in large cellular networks

How performance metrics depend on the traffic demand in large cellular networks How performance metrics depend on the traffic demand in large cellular networks B. B laszczyszyn (Inria/ENS) and M. K. Karray (Orange) Based on joint works [1, 2, 3] with M. Jovanovic (Orange) Presented

More information

Current Standard: Mathematical Concepts and Applications Shape, Space, and Measurement- Primary

Current Standard: Mathematical Concepts and Applications Shape, Space, and Measurement- Primary Shape, Space, and Measurement- Primary A student shall apply concepts of shape, space, and measurement to solve problems involving two- and three-dimensional shapes by demonstrating an understanding of:

More information

Comparison of Programs for Fixed Kernel Home Range Analysis

Comparison of Programs for Fixed Kernel Home Range Analysis 1 of 7 5/13/2007 10:16 PM Comparison of Programs for Fixed Kernel Home Range Analysis By Brian R. Mitchell Adjunct Assistant Professor Rubenstein School of Environment and Natural Resources University

More information

INTRUSION PREVENTION AND EXPERT SYSTEMS

INTRUSION PREVENTION AND EXPERT SYSTEMS INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla avic@v-secure.com Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion

More information

Radio Frequency (RF) Survey

Radio Frequency (RF) Survey Municipal Wireless Broadband and the Digital Community Report Radio Frequency (RF) Survey for the City and County of San Francisco July 21, 2006 Preface This document describes Civitium s findings and

More information

Lecture 1. Introduction to Wireless Communications 1

Lecture 1. Introduction to Wireless Communications 1 896960 Introduction to Algorithmic Wireless Communications Lecture 1. Introduction to Wireless Communications 1 David Amzallag 2 May 25, 2008 Introduction to cellular telephone systems. How a cellular

More information

Planning to Fail - Reliability Needs to Be Considered a Priori in Multirobot Task Allocation

Planning to Fail - Reliability Needs to Be Considered a Priori in Multirobot Task Allocation Planning to Fail - Reliability Needs to Be Considered a Priori in Multirobot Task Allocation Stephen B. Stancliff, John Dolan The Robotics Institute Carnegie Mellon University Pittsburgh, PA, USA {sbs,jmd}@cmu.edu

More information

Enterprise A Closer Look at Wireless Intrusion Detection:

Enterprise A Closer Look at Wireless Intrusion Detection: White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become

More information

FOOTPRINT MODELING AND CONNECTIVITY ANALYSIS FOR WIRELESS SENSOR NETWORKS. A Thesis Presented. Changfei Chen. The University of Vermont.

FOOTPRINT MODELING AND CONNECTIVITY ANALYSIS FOR WIRELESS SENSOR NETWORKS. A Thesis Presented. Changfei Chen. The University of Vermont. FOOTPRINT MODELING AND CONNECTIVITY ANALYSIS FOR WIRELESS SENSOR NETWORKS A Thesis Presented by Changfei Chen to The Faculty of the Graduate College of The University of Vermont In Partial Fulfillment

More information

SPECIAL PERTURBATIONS UNCORRELATED TRACK PROCESSING

SPECIAL PERTURBATIONS UNCORRELATED TRACK PROCESSING AAS 07-228 SPECIAL PERTURBATIONS UNCORRELATED TRACK PROCESSING INTRODUCTION James G. Miller * Two historical uncorrelated track (UCT) processing approaches have been employed using general perturbations

More information

A New Quantitative Behavioral Model for Financial Prediction

A New Quantitative Behavioral Model for Financial Prediction 2011 3rd International Conference on Information and Financial Engineering IPEDR vol.12 (2011) (2011) IACSIT Press, Singapore A New Quantitative Behavioral Model for Financial Prediction Thimmaraya Ramesh

More information

2. Permanent Magnet (De-) Magnetization 2.1 Methodology

2. Permanent Magnet (De-) Magnetization 2.1 Methodology Permanent Magnet (De-) Magnetization and Soft Iron Hysteresis Effects: A comparison of FE analysis techniques A.M. Michaelides, J. Simkin, P. Kirby and C.P. Riley Cobham Technical Services Vector Fields

More information

A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System

A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System Young Sil Choi Email: choiys@mobile.snu.ac.kr Illsoo Sohn Email: sohnis@mobile.snu.ac.kr Kwang Bok Lee Email: klee@snu.ac.kr Abstract

More information

Chapter 1 Introduction. 1.1 Introduction

Chapter 1 Introduction. 1.1 Introduction Chapter 1 Introduction 1.1 Introduction 1 1.2 What Is a Monte Carlo Study? 2 1.2.1 Simulating the Rolling of Two Dice 2 1.3 Why Is Monte Carlo Simulation Often Necessary? 4 1.4 What Are Some Typical Situations

More information

Semi-Supervised Learning in Inferring Mobile Device Locations

Semi-Supervised Learning in Inferring Mobile Device Locations Semi-Supervised Learning in Inferring Mobile Device Locations Rong Duan, Olivia Hong, Guangqin Ma rduan,ohong,gma @research.att.com AT&T Labs 200 S Laurel Ave Middletown, NJ 07748 Abstract With the development

More information

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area

More information

AS MORE WIRELESS and sensor networks are deployed,

AS MORE WIRELESS and sensor networks are deployed, 2418 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 5, JUNE 2010 Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks Yingying Chen, Member, IEEE, Jie Yang, Student

More information

Technical Advisory Group

Technical Advisory Group 0 Technical Advisory Group 8th October 2015 1 Visitor information Wi-fi network Ofcom Media - Password COTDsaT2HN (case sensitive) Prompted to Sign in to Wi-Fi network Agree to Terms of Use Press Continue

More information

Two Topics in Parametric Integration Applied to Stochastic Simulation in Industrial Engineering

Two Topics in Parametric Integration Applied to Stochastic Simulation in Industrial Engineering Two Topics in Parametric Integration Applied to Stochastic Simulation in Industrial Engineering Department of Industrial Engineering and Management Sciences Northwestern University September 15th, 2014

More information

1 Teaching notes on GMM 1.

1 Teaching notes on GMM 1. Bent E. Sørensen January 23, 2007 1 Teaching notes on GMM 1. Generalized Method of Moment (GMM) estimation is one of two developments in econometrics in the 80ies that revolutionized empirical work in

More information

Efficient Curve Fitting Techniques

Efficient Curve Fitting Techniques 15/11/11 Life Conference and Exhibition 11 Stuart Carroll, Christopher Hursey Efficient Curve Fitting Techniques - November 1 The Actuarial Profession www.actuaries.org.uk Agenda Background Outline of

More information

Advanced analytics at your hands

Advanced analytics at your hands 2.3 Advanced analytics at your hands Neural Designer is the most powerful predictive analytics software. It uses innovative neural networks techniques to provide data scientists with results in a way previously

More information

SENSITIVITY ANALYSIS AND INFERENCE. Lecture 12

SENSITIVITY ANALYSIS AND INFERENCE. Lecture 12 This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike License. Your use of this material constitutes acceptance of that license and the conditions of use of materials on this

More information

Permutation Tests for Comparing Two Populations

Permutation Tests for Comparing Two Populations Permutation Tests for Comparing Two Populations Ferry Butar Butar, Ph.D. Jae-Wan Park Abstract Permutation tests for comparing two populations could be widely used in practice because of flexibility of

More information

Machine Learning and Data Mining. Regression Problem. (adapted from) Prof. Alexander Ihler

Machine Learning and Data Mining. Regression Problem. (adapted from) Prof. Alexander Ihler Machine Learning and Data Mining Regression Problem (adapted from) Prof. Alexander Ihler Overview Regression Problem Definition and define parameters ϴ. Prediction using ϴ as parameters Measure the error

More information

Analysis on the Balanced Class-E Power Amplifier for the Load Mismatch Condition

Analysis on the Balanced Class-E Power Amplifier for the Load Mismatch Condition Analysis on the Class-E Power Amplifier for the Load Mismatch Condition Inoh Jung 1,1, Mincheol Seo 1, Jeongbae Jeon 1, Hyungchul Kim 1, Minwoo Cho 1, Hwiseob Lee 1 and Youngoo Yang 1 Sungkyunkwan University,

More information

Motion Sensing without Sensors: Information. Harvesting from Signal Strength Measurements

Motion Sensing without Sensors: Information. Harvesting from Signal Strength Measurements Motion Sensing without Sensors: Information Harvesting from Signal Strength Measurements D. Puccinelli and M. Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana,

More information

Implementing Voice Over Wireless Networks: Realities and Challenges

Implementing Voice Over Wireless Networks: Realities and Challenges WHITE PAPER Implementing Voice Over Wireless Networks: Realities and Challenges August 2006 CONTENTS 1 Implementing Voice Over Wireless Networks 2 The Physical Environment and VoWi-Fi 2 Capacity and VoWi-Fi

More information

Algebra 2 Chapter 1 Vocabulary. identity - A statement that equates two equivalent expressions.

Algebra 2 Chapter 1 Vocabulary. identity - A statement that equates two equivalent expressions. Chapter 1 Vocabulary identity - A statement that equates two equivalent expressions. verbal model- A word equation that represents a real-life problem. algebraic expression - An expression with variables.

More information

Regression III: Advanced Methods

Regression III: Advanced Methods Lecture 16: Generalized Additive Models Regression III: Advanced Methods Bill Jacoby Michigan State University http://polisci.msu.edu/jacoby/icpsr/regress3 Goals of the Lecture Introduce Additive Models

More information

Least Squares Estimation

Least Squares Estimation Least Squares Estimation SARA A VAN DE GEER Volume 2, pp 1041 1045 in Encyclopedia of Statistics in Behavioral Science ISBN-13: 978-0-470-86080-9 ISBN-10: 0-470-86080-4 Editors Brian S Everitt & David

More information