Geometry-Based Stochastic Channel Models for 5G: Extending Key Features for Massive MIMO

Size: px
Start display at page:

Download "Geometry-Based Stochastic Channel Models for 5G: Extending Key Features for Massive MIMO"

Transcription

1 Geometry-Bsed Stochstic Chnnel Models for 5G: Extending Key Fetures for Mssive MIMO Àlex Olivers Mrtínez, Ptrick Eggers, Eliseth De Crvlho Fculty of Engineering nd Science, Dept. of Electronic Systems, APNet section Alorg University, Alorg, Denmrk Emil: rxiv: v1 [cs.it] 19 Sep 2016 Astrct This pper introduces three key fetures in geometry-sed stochstic chnnel models in order to include mssive MIMO chnnels. Those key fetures consists of multiuser (MU) consistency, non-sttionrities cross the se sttion rry nd inclusion of sphericl wve modelling. To ensure MU consistency, we introduce the concept of user ur, which is circle round the user with rdius defined ccording to the sttionrity intervl. The overlp etween urs determines the shre of common clusters mong users. To model nonsttionrities cross mssive rry, su-rrys re defined for which clusters re independently generted. At lst, we descrie procedure to incorporte sphericl wve modelling, where cluster focl point is defined to ccount for distnce etween user nd cluster. I. INTRODUCTION In mssive MIMO (Multiple-Input Multiple-Output) system, the se sttion is equipped with very lrge numer of ntenn elements nd serves multiple users in the sme timefrequency resource [1]. Under certin fvorle propgtion conditions (e.g. [2]), fst fding nd uncorrelted noise t the receiver vnish, ringing huge gins in throughput, reliility nd energy efficiency [3]. Mssive MIMO is considered key technology for the development of 5G [4]. The chrcteristics of the mssive MIMO chnnel ring some chllenges for inclusion in the existing geometry-sed stochstic chnnel models (GSCM). The existing GSCM cn e divided into two groups. We nme them Winner-type nd COST-type. The first ones re the min focus of this work nd exmples re the 3GPP sptil chnnel model (SCM), extended SCM (SCME) [5], Winner (WIM1), Winner II (WIM2) [6], Winner+ (WIM+) nd QuDRiG [7]. Their min chrcteristic consists of the definition of the sctterers sed on the ngles of deprture nd ngles of rrivl, i.e. terminl perspective. On the other hnd COST-type GSCM [8] defines the physicl position of the sctterers in the simultion re. Existing work proposes n extension of COST-type GSCM for mssive MIMO [9]. The COST-type GSCM chnnel models defines the physicl position of the sctterers, not directly ngles of deprture or rrivl s seen from terminl. Consequently, it is difficult to extrct prmeters for the COST model using mesurements (contrry to the cse of the Winner type GSCM chnnel model). Those resons explin why Winnertype GSCM is currently more widespred nd is the preferred cndidte for 5G chnnel modelling in stndrdiztion efforts. One mjor drwck of Winner-type GSCM is tht it does not support multi-user (MU) consistency. MU consistency refers to the genertion of chnnels for ech users tht re consistent with the distnce etween users in terms of oserved clusters nd their correltion. Winner-type GSCM fils to represent scenrios where the users re in close proximity, s the chnnels re generted independently for ech user, regrdless of the distnce etween users. As the performnce of mssive MIMO is relted to the user chnnel vectors orthogonlity [2], Winner-type GSCM models results in overoptimistic performnce. With the increse in the numer of ntenns, the size of the rrys lso increses. Although compct rry designs re desirle for opertors, some ppers rgue tht the rel dvntges of mssive MIMO pper when the size of the rry ecome lrge [10]. Non-sttionrities hve een oserved in mesurements [10], [11] for lrge ut lso compct rrys [10], so tht it would pper tht even for compct rrys, it ecomes importnt to model non-sttionrities. The non-sttionrities re of different nture: the power cn vry, the directions of deprture/rrivl vries, different prts of the rry see different clusters, etc. Winner-type GSCM define the clusters y their ngles of deprture nd ngles of rrivl nd rely on plnr wve pproximtion. When the rry ecomes lrger or the clusters re t close proximity to the users, the plnr wve pproximtion ecomes inexct clling for sphericl wve modelling nd modifiction of Winner-type GSCM models. The present study proposes solutions to extend Winner-type GSCM to include MU consistency, non-sttionrities cross the se sttion rry nd sphericl wve modelling. We introduce the concept of ur ssocited to ech user, which is circle centered on the user with rdius defined y the sttionrity intervl. When users re t close proximity, their urs overlp nd the overlpping surfce defines the common clusters shred mong users. An exmple is presented in Fig. 1. We propose n lgorithm to compute the numer of clusters to e shred mong pirs of users, then groups of multiple users. As pre-step, n lgorithm to divide the users into connected groups is used to increse the speed of the process. The lrge scle prmeters (LSP) of one of the users shring the cluster re used to compute the prmeters of the cluster. Finlly the cluster prmeters re shred with the other users shring the cluster. Then the prmeters or the position of the

2 Fig. 1. Left: Existing GSCM with independent clusters for users closely locted. Right: Proposed extension with multiuser consistency where closely locted users hve common clusters clusters (depending on the distnce etween user nd cluster) is reclculted ccording to the position of the new user. To ccount for non-sttionrity effects, the se sttion is divided into su-rrys with size defined y the sttionrity distnce (i.e. correltion or coherence distnce with regrd to visile clusters). Different reliztions of the LSP t ech surry re used to generte the clusters. Sphericl wve modeling, (similrly to QuDRiG s drifting procedure [7]) supports ner field clusters t the se sttion side, y fixing focl points derived from the delys nd ngles of the clusters. This work uses QuDRiG, Winner-type GSCM, s reference model on top of which to uild the proposed extensions. However the ides in the pper cn lso e pplied to other Winner-type GSCM. A. Segments II. DEFINITION OF BASIC CONCEPTS From WIM1 onwrds the trjectory of the users is divided into smller segments. These segments re defined such s the LSP of the chnnel remin constnt (i.e. the segment length equls the sttionrity intervl). Therefore the numer of clusters tht ech user hs nd the correspondent prmeters cn only chnge segment wise. This pper proposes n lgorithm tht checks the reltive position of the users t the eginning of ech segment nd defines the numer of common cluster for the rest of the segment. The proposed extension of the GSCM cn only e pplied if the user segment trnsitions re synchronized. B. Clusters In GSCM, physicl ojects re modeled s sctterers where the trnsmitted wves re reflected. These sctterers re divided into groups ccording to their dely nd ngle of deprture or rrivl, forming clusters. Ech cluster is composed y 20 sctterers. The ngles of the sctterers re smples of Lplcin function, s shown in Fig. 2. The prmeters of the clusters of ech user define the chnnel properties of tht user. The proposed extension proposes to shre some of the clusters etween users tht re ner to ech other to chieve the desired multiuser consistency. The numer of shred clusters is relted to the distnce etween users, ut which clusters re shred cn vry ccording to the implementtion. Fig. 2. Angulr representtion of the clusters in Winner-type GSCM. The AoA defines the men ngle of the cluster nd the ngles of the sctters hve deterministic offset from this ngle. All the sctterers in the cluster hve the sme dely (Not represented in this figure) Users Common Cluster Common Cluster Angles [deg] Fig. 3. Common cluster oserved etween user 1 nd 3 in n indoor NLoS scenrio. Red dots mrk the ngle of mximum power The common clusters etween users hve een oserved in mssive MIMO chnnel mesurement descried in [10]. Due to lck of spce the mesurement cmpign is not descried here (for detil see [10]). In the mesurement cmpign the se sttion rry hs 64 elements divided in sets of 8 elements. There re 8 users holding hndset with 2 elements clled nd. The ngle of rrivl is estimted using steeringvector emforming t ech set of 8 elements. The 8 element set hs 13 3 db emwidth nd mx. sideloe level of 14.7 db. We focus on the mximum power cluster to void misinterprettion of the side loes. This cluster is mrked with red dot. In Fig. 3 the power ngulr spectrum for the 8 users in non-line-of-sight scenrio (clled S-NLoS in [10]) is presented. Fig. 3 shows tht user 1 nd user 3 seprted 2.2 m hve cluster t 104 nd 110 respectively. Due to the 13 resolution of the emforming this cn e considered common cluster. C. User ur Where COST-type GSCM provide nturl cluster shring s it is cluster centric, the Winner-type GSCM re user centric. Despite QuDRiG mde mpping of the prmeters to db

3 Computtion of common clusters Genertion of prmeters Computtion of focl points Reclcultion of prmeters Shring the clusters Fig. 4. Trck of two users divided into segments. sux is the first position of user U in segment numer X Fig. 6. Modifiction of the QuDRiG step 3 into 5 su-steps Fig. 5. Division of the se sttion rry into su-rrys ccording to the sttionrity intervl geometric positions to provide time evolution of the chnnel, it is still locl to ech user. To fcilitte possile shring of clusters etween users, we introduce the concept of n ur. The user ur is defined s the circle surrounding the users with rdius equl to the sttionrity intervl. When two users re seprted more thn the sttionrity intervl they hve independent chnnel vectors nd their urs re disjoint. If two users re close to ech other their urs overlp. The mount of overlpping re is proportionl to the distnce etween the users. This proportion is used to define the mount of clusters tht need to e shred etween users. The overlpping of the urs is computed in the first position of ech segment nd the numer of common clusters is kept constnt long the segment. Fig. 4 shows n exmple users lyout. D. Aur t the se sttion To generte non-sttionries from the se sttion perspective, the rry is divided into su-rrys in the sme wy the user trjectory is divided into segments. In the sme wy ech user hs defined n ur, the su-rrys in the se sttion hve lso defined n ur of rdius equl to the sttionrity intervl. The su-rrys hve the length of the sttionrity intervl, nd the ur is centered t the center of the su-rry. Notice tht the sttionrity intervl long the se sttion rry might differ from the user perspective. To generte the nonsttionrities over the rry, the exposed extension proposes to chose different prmeters of the cluster t the trnsmitter for ech su-rry. See n exmple in Fig. 5. The urs of djcent su-rrys cn e overlpped to produce grdul shre of the clusters. However, in this work it is not implemented. E. Drifting One contriution of QuDRiG is the time evolution chnnel consistency. It mens tht in ech snpshot the chnnel is consistent with the previous nd the following snpshot. At the initil position of the segment the prmeters of the clusters re clculted. These prmeters re updted ccording to the movement of the user in the susequent snpshots of the chnnel. To chieve this time evolution the position of the sctterers hs to e defined nd kept constnt through the segment. Then, the reltive position etween the user nd the sctter cn e computed, nd the new prmeters of the sctter cn e updted. The proposed extension uses this concept to define the position of the sctters oth t the receive nd the trnsmit side nd therefore the sphericl wves cn e used. A. Simultion flow III. EXTENSION OF GSCM Winner-type GSCM chnnel model follows nine steps to generte the chnnel coefficients [7]: 1) Define the prmeters of the simultion (Positions of the users nd se sttions, Antenn rrys, Trcks of the users, Segments, Scenrios) 2) Genertion of the correltion mps using the scenrios configurtion files 3) Genertion of clusters for ech segment 4) Genertion of the sctterers inside the clusters nd clcultion of the vector for ech sctterer nd ech position of the user 5) Clculte ntenn response for ech ngle 6) Clculte the phses using the position of the clusters nd the ntenns 7) Sum of the coefficients of the 20 sctterers. The chnnel mtrix for ech cluster is creted 8) Merge the djcent segments (irth/deth process) 9) Formtting of chnnel coefficients nd delys To otin the multi-user consistency, non-sttionrities cross the rry nd the sphericl wves propgtion, Alorg University (AAU) modifies step 3 of the nine steps. B. Description of extensions The modified step 3 hs 5 su-steps. These su-steps re presented in Fig. 6: 1) Clculte proportion of common clusters 2) Genertion of initil prmeters 3) Computtion of the focl points of the clusters 4) Shring the clusters 5) Reclculting prmeters

4 Fig. 7. Simultion lyout with six users converted into grph nd n edges description C. Clculte proportion of common clusters The proposed solution uses simple preprocessing lgorithm nd n lgorithm designed y AAU to compute the numer of common cluster etween users depending on their proximity. These lgorithms re simple to implement. We wnt to remrk tht n lgorithm for computing the overlpping of circles with exct precision lredy exist in [12]. The implementtion of such lgorithm cn e complex nd the processing time long. The ccurcy provided y such lgorithm is not necessry. Therefore we develop simplified method. First there is preprocessing of the lyout to cluster the users in connectivity groups. This lgorithm mkes groups of users whose urs re overlpping [13]. This step is necessry to increse the efficiency of the lgorithm to compute the numer of common clusters. This lgorithm uses grph theory to find connected components. Ech user is represented s vertex of the grph. If the distnce etween two users is smller thn the sum of its rdius their urs re overlpping nd there is n edge etween the two vertices representing the two users. An exmple cn e seen in Fig. 7. The lgorithm performs deep serch on ech connected component. Ech new vertex reched is mrked. When no more vertices cn e reched long edges from mrked vertices, connected component hs een found. An unmrked vertex is then selected, nd the process is repeted until the entire grph is explored. This lgorithm requires memory spce liner with mx(v, E), nd time liner with mx(v, E). Where V is the numer of vertices (i.e. users in the lyout) nd E is the numer of edges of the grph (i.e. overlpping urs in the lyout). The lgorithm to compute the common clusters is designed y AAU nd it is sed on finding the men distnce of the groups of users to the centroid of the groups. Then using liner reltionship (or nother reltionship) this distnce gives proportion of clusters to e shred mong the group of users. This procedure is repeted for groups of two, three, four, etc. users until the mximum is reched. This lgorithm is presented in Algorithm 1 nd Fig. 8 shows n exmple. In the previous lgorithm the centroid of the group of users (i.e. m) is computed s, m = (x 1, y 1, z 1 ) + + (x N, y N, z N ) (1) N where (x n, y n, z n ) is the position of user n in Crtesin coordintes (lets cll it P os n ). forech group of N users (N {1,..., mx(users)}) do if N = 1 then proportion of clusters for the individul users = 1; else find centroid of the group of users: m; if (ll distnces to m)<r then find men distnce to m: md; proportion of clusters = md + 1: p; p N 1 sutrct from the groups contining N 1 users; else the users with (distnce to m)>r re too fr wy nd no clusters re shred in this group; end end end Algorithm 1: Compute the numer of common clusters Pos 1 =(x 1,y 1,z 1 ) m Pos 2 =(x 2,y 2,z 2 ) Pos 1 m R m Pos 2 Pos 3 Pos 3 Fig. 8. Exmple of the clustering lgorithm for groups of 2 users (N = 2). User 1 in green, user 2 in red nd user 3 in lue Compute the distnces from the users to the centroid nd find if the urs re overlpping using: m P os n < R (2) To compute the men distnce of the group of users to the centroid use: md = m P os m P os N N The proportion of clusters to shre corresponds to liner reltionship with the men distnce to the centroid (proportion of clusters p = md R +1). This liner function hs een chosen for its simplicity. However, empiriclly derived cluster shring functions cn esily e sustituted here. After the explined lgorithm, ech user hs proportion of individul clusters nd ech intersection of urs hs proportion of common clusters. Knowing the proportion of clusters to shre nd the totl numer of clusters, ech user nd group of users is ssigned with numer of clusters s seen in Fig. 9. Notice tht the prmeters defining ech cluster (i.e. ngles, dely, position) hve not een computed yet. The clusters re only defined y its numer, nd the prmeters re computed in the following su-step. (3)

5 we explin how to dpt their procedure to the trnsmit side. Fig. 10 shows the prmeters used. First the totl length (from trnsmitter, to cluster, to receiver) is otined from the dely, d c = τ c c 0 + r 0,,k (4) = U 1 = U 2 = U 3 U x nd U y = C z U 1 = C 1, C 2, C 3, C 4 U 2 = C 5, C 6, C 7 U 3 = C 8, C 9, C 10 U 1 nd U 2 = C 11 U 1 nd U 3 = C 12 U 2 nd U 3 = C 13, C 14 U 1, U 2 nd U 3 = C 15 Fig. 9. Exmple of the clustering lgorithm with 7 clusters (C) per user(u). First compute the proportion of common clusters for ech group, then compute the numer of clusters nd finlly ssign set of cluster nmes where r 0,,k is the distnce etween su-rry nd user k (i.e. AP os P os k,s, where AP os is the centrl position of the su-rry nd P os k,s is the first position of the user k in the segment s), τ c is the excess dely nd c 0 is the speed of light. Then the deprture ngles of the cluster re converted into Crtesin coordintes. ê c,,s is the vector defining the direction of the cluster c of su-rry t segment s. f c,,s defines the vector from the user to the cluster. Considering the tringle with vertices t the center of the su-rry, t the user position, nd t the focl point of the cluster, nd using the cosine theorem we cn compute the distnce from the su-rry to the cluster. D. Genertion of initil prmeters The initil delys, powers nd ngles (i.e. zimuth of deprture nd rrivl, elevtion of deprture nd rrivl) re generted for ech cluster (Cx) in ech segment following QuDRiG s procedure explined in [7]. To crete nonsttionrities cross the rry, we modify this procedure to hve one zimuth ngle nd one elevtion ngle of deprture for ech su-rry. There re 4 + 2A prmeters for ech cluster (eing A the numer of su-rrys). This procedure uses user (U x) specific prmeters (drwn from the lrge scle prmeter mps) to generte the cluster prmeters. If the cluster elongs only to one user (e.g. C 3 in Fig. 9) the prmeters of tht user re used to generte the cluster. On the other hnd if the cluster elongs to more thn one user (e.g. C 11 in Fig. 9) one of the users is picked to use its prmeters to generte the cluster. We propose to pick the users rndomly with uniform distriution, ut other methods re possile. The vlues of the deprture ngles re drwn independently for ech su-rry. E. Computtion of the focl points of user side clusters QuDRiG s drifting procedure determines the position of the Lst Bounce Sctterer (LBS) nd keeps it fixed during the whole segment, [7], glol step 4. In this su-step only the first prt of the QuDRiG s drifting procedure is used to find the focl point of the LBS nd dd it to the tle of prmeters for ech cluster. Even if the cluster elongs to more thn one user (e.g. C 11 in Fig. 9) the focl point is referenced to the user used to generte the prmeters of the cluster. Then it is necessry to find the focl point t the trnsmitter side. We cll the focl point t the trnsmit side First Bounce Sctterer (FBS) nlogous to the QuDRiG nomenclture. We propose to use the sme procedure used y QuDRiG to find the focl point of the clusters t the trnsmit side. Next f 2 c,,s = r 0,,k 2 + e c,,s 2 2 r 0,,k e c,,s cos(β c,,s ) (5) (d c e c,,s ) 2 = r 0,,k 2 + e c,,s 2 +2 e c,,s r T 0,,kê c,,s (6) e c,,s = d2 c r 0,,k 2 2(d c r T 0,,kêc,,s) The vector from the trnsmitter position to the focl point of the cluster t the trnsmit side is, (7) e c,,s = e c,,s ê c,,s (8) And using this vector nd the position of the trnsmit rry we cn find the position of the focl point of the cluster t the trnsmit side (FBS) s BCP os c,,s = e c,,s + AP os (9) After dding the focl points, the clusters hve 5+3A prmeters in their tles (i.e. power, dely, zimuth of rrivl, elevtion of rrivl, focl point t receiver nd for ech surry: zimuth of deprture, elevtion of deprture nd focl point t trnsmitter). F. Shring the clusters In su-step III-C we showed tht ech cluster could hve more thn one owner, ut in su-step III-D the prmeters of only one user hve een used to generte the cluster. In this su-step the clusters re shred with the other users tht they elong to, ccording to the results of III-C. In other words, the clusters nd their generted prmeters re duplicted to the prmeter tles of the corresponding users. See n exmple in Fig. 11.

6 APos BCPos c,,s r 0 Pos k,s Fig. 10. Computtion of the focl point of the cluster t the trnsmitter side Group{U 1 } = C 1, C 2, C 3, C 4 Group{U 2 } = C 5, C 6, C 7 Group{U 3 } = C 8, C 9, C 10 Group{U 1, U 2 } = C 11 Group{U 1, U 3 } = C 12 Group{U 2, U 3 } = C 13, C 14 Group{U 1, U 2, U 3 } = C 15 U 1 = C 1, C 2, C 3, C 4, C 11, C 12, C 15 U 2 = C 5, C 6, C 7, C 11, C 13, C 14, C 15 U 3 = C 8, C 9, C 10, C 12, C 13, C 14, C 15 Fig. 11. Exmple of the cluster shring Fig. 12. If the cluster is ner to the users to shre the prmeters cn result in very different clusters (right). It is etter to shre the focl point (left) G. Reclculting prmeters As some clusters hve een generted using the prmeters of one user, ut fter su-step III-F they hve een shred with nother user, it is necessry to reclculte the prmeters for the new user. The reson is ecuse the focl point of the cluster hs een clculted using the ngles nd positions of one user, ut the position of the other user cn e different. There re two options to reclculte the prmeters, oth shown in Fig. 12. The first option is to keep the sme prmeters generted in su-step 3 nd reclculte the two focl points of the cluster for the new user. The second option is to keep the sme focl point nd reclculte the other prmeters (including the ngles of deprture). If the clusters re fr wy from the users it is possile to keep the sme prmeters nd void reclculting the focl point ecuse the reltive position does not chnge very much. However, if the cluster is ner the users, we hve to reclculte the focl point, else it would result in effectively different clusters for the users. We propose tht if the clusters re less thn 3 segment lengths wy the focl point is kept nd the other prmeters re reclculted. Otherwise, the opposite hppens. IV. CONCLUSION This pper extends the frmework of the existing Winnertype GSCM towrds the evolution of 5G chnnel models for mssive MIMO. Winner-type GSCM re hevily employed y the industry, so modifiction is necessry to continue uild on existing knowledge se. The pper focuses on the three min limittions of the existing models tht prevents the proper simultion of mssive MIMO systems. First of ll the lck of method to model the multiuser consistency. Then, the impossiility to generte non-sttionrities over the se sttion rry. Finlly the limittion of using the plnr wve pproximtion. Using QuDRiG s reference model, severl modifictions re proposed to overcome these limittions. ACKNOWLEDGMENT The reserch presented in this pper ws prtly supported y the Dnish Council for Independent Reserch (Det Frie Forskningsråd) DFF This work ws supported y Huwei Technologies Co. Ltd. (Huwei Sweden) in the frmework of the coopertion project No REFERENCES [1] T. L. Mrzett, Noncoopertive Cellulr Wireless with Unlimited Numers of Bse Sttion Antenns, Wireless Communictions, IEEE Trnsctions on, vol. 9, no. 11, pp , Nov [2] H. Q. Ngo, E. G. Lrsson, nd T. L. Mrzett, Aspects of fvorle propgtion in Mssive MIMO, in Signl Processing Conference (EU- SIPCO), 2014 Proceedings of the 22nd Europen. IEEE, 2014, pp [3] E. Lrsson, O. Edfors, F. Tufvesson, nd T. Mrzett, Mssive MIMO for next genertion wireless systems, Communictions Mgzine, IEEE, vol. 52, no. 2, pp , Fe [4] F. Boccrdi, R. W. Heth, A. Lozno, T. L. Mrzett, nd P. Popovski, Five disruptive technology directions for 5G, Communictions Mgzine, IEEE, vol. 52, no. 2, pp , Fe [5] D. S. Bum, J. Hnsen, G. D. Gldo, nd M. Milojevic, An Interim Chnnel Model for Beyond-3G Systems, IEEE 61st Vehiculr Technology Conference, vol. 5, pp , [6] P. Kyösti, J. Meinilä, L. Hentilä, X. Zho, T. Jämsä, C. Schneider, nd M. Nrndzic, WINNER II Chnnel Models, D1.1.2 V1.1, [7] S. Jeckel, L. Rschkowski, K. Borner, nd L. Thiele, QuDRiG: A 3-D multi-cell chnnel model with time evolution for enling virtul field trils, IEEE Trnsctions on Antenns nd Propgtion, vol. 62, no. 6, pp , [8] L. Liu, C. Oestges, J. Poutnen, K. Hned, P. Vinikinen, F. Quitin, F. Tufvesson, nd P. Doncker, The COST 2100 MIMO chnnel model, IEEE Wireless Communictions, vol. 19, no. 6, pp , [9] X. Go, J. Flordelis, G. Dhmn, F. Tufvesson, nd O. Edfors, Mssive mimo chnnel modeling-extension of the cost 2100 model, in Joint NEWCOM/COST Workshop on Wireless Communictions (JNCW), [10] A. O. Mrtinez, E. de Crvlho, nd J. O. Nielsen, Towrds very lrge perture mssive MIMO: A mesurement sed study, in Gloecom Workshops (GC Wkshps), IEEE, Dec. 2014, pp [11] X. Go, F. Tufvesson, O. Edfors, nd F. Rusek, Mesured propgtion chrcteristics for very-lrge MIMO t 2.6 GHz, 2012 Conference Record of the Forty Sixth Asilomr Conference on Signls, Systems nd Computers (ASILOMAR), pp , [12] F. Lirino, M. Levorto, nd M. Zorzi, An lgorithmic solution for computing circle intersection res nd its pplictions to wireless communictions, in Modeling nd Optimiztion in Moile, Ad Hoc, nd Wireless Networks, WiOPT th Interntionl Symposium on, June 2009, pp [13] J. E. Hopcroft nd R. E. Trjn, Efficient lgorithms for grph mnipultion, Stnford, CA, USA, Tech. Rep., 1971.

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.

More information

Class-XI Mathematics Conic Sections Chapter-11 Chapter Notes Key Concepts

Class-XI Mathematics Conic Sections Chapter-11 Chapter Notes Key Concepts Clss-XI Mthemtics Conic Sections Chpter-11 Chpter Notes Key Concepts 1. Let be fixed verticl line nd m be nother line intersecting it t fixed point V nd inclined to it t nd ngle On rotting the line m round

More information

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES GENEATING OTHOIMAGES FO CLOSE-ANGE OBJECTS BY AUTOMATICALLY DETECTING BEAKLINES Efstrtios Stylinidis 1, Lzros Sechidis 1, Petros Ptis 1, Spiros Sptls 2 Aristotle University of Thessloniki 1 Deprtment of

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

Mobile IP route optimization method for a carrier-scale IP network

Mobile IP route optimization method for a carrier-scale IP network Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

LECT-10, S-1 FP2P08, Javed I.

LECT-10, S-1 FP2P08, Javed I. A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08

More information

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig CS311H: Discrete Mthemtics Grph Theory IV Instructor: Işıl Dillig Instructor: Işıl Dillig, CS311H: Discrete Mthemtics Grph Theory IV 1/25 A Non-plnr Grph Regions of Plnr Grph The plnr representtion of

More information

6.3 Volumes. Just as area is always positive, so is volume and our attitudes towards finding it.

6.3 Volumes. Just as area is always positive, so is volume and our attitudes towards finding it. 6.3 Volumes Just s re is lwys positive, so is volume nd our ttitudes towrds finding it. Let s review how to find the volume of regulr geometric prism, tht is, 3-dimensionl oject with two regulr fces seprted

More information

Here is an example where angles with a common arm and vertex overlap. Name all the obtuse angles adjacent to

Here is an example where angles with a common arm and vertex overlap. Name all the obtuse angles adjacent to djcent tht do not overlp shre n rm from the sme vertex point re clled djcent ngles. me the djcent cute ngles in this digrm rm is shred y + + me vertex point for + + + is djcent to + djcent simply mens

More information

Stained Glass Design. Teaching Goals:

Stained Glass Design. Teaching Goals: Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to

More information

Agilent Mass Hunter Software

Agilent Mass Hunter Software Agilent Mss Hunter Softwre Quick Strt Guide Use this guide to get strted with the Mss Hunter softwre. Wht is Mss Hunter Softwre? Mss Hunter is n integrl prt of Agilent TOF softwre (version A.02.00). Mss

More information

Efficient Rerouting Algorithms for Congestion Mitigation

Efficient Rerouting Algorithms for Congestion Mitigation 2009 IEEE Computer Society Annul Symposium on VLSI Efficient Rerouting Algorithms for Congestion Mitigtion M. A. R. Chudhry*, Z. Asd, A. Sprintson, nd J. Hu Deprtment of Electricl nd Computer Engineering

More information

Grade 7/8 Math Circles Geometric Arithmetic October 31, 2012

Grade 7/8 Math Circles Geometric Arithmetic October 31, 2012 Fculty of Mthemtics Wterloo, Ontrio N2L 3G1 Grde 7/8 Mth Circles Geometric Arithmetic Octoer 31, 2012 Centre for Eduction in Mthemtics nd Computing Ancient Greece hs given irth to some of the most importnt

More information

ZZ - Advanced Math Review 2017

ZZ - Advanced Math Review 2017 ZZ - Advnced Mth Review Mtrix Multipliction Given! nd! find the sum of the elements of the product BA First, rewrite the mtrices in the correct order to multiply The product is BA hs order x since B is

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE

CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE CHAPTER III IMAGE DEWARPING (CALIBRATION) PROCEDURE 3.1 Scheimpflug Configurtion nd Perspective Distortion Scheimpflug criterion were found out to be the best lyout configurtion for Stereoscopic PIV, becuse

More information

Answer Key Lesson 6: Workshop: Angles and Lines

Answer Key Lesson 6: Workshop: Angles and Lines nswer Key esson 6: tudent Guide ngles nd ines Questions 1 3 (G p. 406) 1. 120 ; 360 2. hey re the sme. 3. 360 Here re four different ptterns tht re used to mke quilts. Work with your group. se your Power

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

Planning with Reachable Distances: Fast Enforcement of Closure Constraints

Planning with Reachable Distances: Fast Enforcement of Closure Constraints Plnning with Rechle Distnces: Fst Enforcement of Closure Constrints Xinyu Tng, Shwn Thoms, nd Nncy M. Amto Astrct Motion plnning for closed-chin systems is prticulrly difficult due to dditionl closure

More information

II. THE ALGORITHM. A. Depth Map Processing

II. THE ALGORITHM. A. Depth Map Processing Lerning Plnr Geometric Scene Context Using Stereo Vision Pul G. Bumstrck, Bryn D. Brudevold, nd Pul D. Reynolds {pbumstrck,brynb,pulr2}@stnford.edu CS229 Finl Project Report December 15, 2006 Abstrct A

More information

INTRODUCTION TO SIMPLICIAL COMPLEXES

INTRODUCTION TO SIMPLICIAL COMPLEXES INTRODUCTION TO SIMPLICIAL COMPLEXES CASEY KELLEHER AND ALESSANDRA PANTANO 0.1. Introduction. In this ctivity set we re going to introduce notion from Algebric Topology clled simplicil homology. The min

More information

Section 10.4 Hyperbolas

Section 10.4 Hyperbolas 66 Section 10.4 Hyperbols Objective : Definition of hyperbol & hyperbols centered t (0, 0). The third type of conic we will study is the hyperbol. It is defined in the sme mnner tht we defined the prbol

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION Supplementry Figure y (m) x (m) prllel perpendiculr Distnce (m) Bird Stndrd devition for distnce (m) c 6 prllel perpendiculr 4 doi:.8/nture99 SUPPLEMENTARY FIGURE Confirmtion tht movement within the flock

More information

documents 1. Introduction

documents 1. Introduction www.ijcsi.org 4 Efficient structurl similrity computtion etween XML documents Ali Aïtelhdj Computer Science Deprtment, Fculty of Electricl Engineering nd Computer Science Mouloud Mmmeri University of Tizi-Ouzou

More information

Lily Yen and Mogens Hansen

Lily Yen and Mogens Hansen SKOLID / SKOLID No. 8 Lily Yen nd Mogens Hnsen Skolid hs joined Mthemticl Myhem which is eing reformtted s stnd-lone mthemtics journl for high school students. Solutions to prolems tht ppered in the lst

More information

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1. Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution

More information

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes

More information

The Greedy Method. The Greedy Method

The Greedy Method. The Greedy Method Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm

More information

MTH 146 Conics Supplement

MTH 146 Conics Supplement 105- Review of Conics MTH 146 Conics Supplement In this section we review conics If ou ne more detils thn re present in the notes, r through section 105 of the ook Definition: A prol is the set of points

More information

Efficient K-NN Search in Polyphonic Music Databases Using a Lower Bounding Mechanism

Efficient K-NN Search in Polyphonic Music Databases Using a Lower Bounding Mechanism Efficient K-NN Serch in Polyphonic Music Dtses Using Lower Bounding Mechnism Ning-Hn Liu Deprtment of Computer Science Ntionl Tsing Hu University Hsinchu,Tiwn 300, R.O.C 886-3-575679 nhliou@yhoo.com.tw

More information

3.5.1 Single slit diffraction

3.5.1 Single slit diffraction 3..1 Single slit diffrction ves pssing through single slit will lso diffrct nd produce n interference pttern. The reson for this is to do with the finite width of the slit. e will consider this lter. Tke

More information

A dual of the rectangle-segmentation problem for binary matrices

A dual of the rectangle-segmentation problem for binary matrices A dul of the rectngle-segmenttion prolem for inry mtrices Thoms Klinowski Astrct We consider the prolem to decompose inry mtrix into smll numer of inry mtrices whose -entries form rectngle. We show tht

More information

a < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1

a < a+ x < a+2 x < < a+n x = b, n A i n f(x i ) x. i=1 i=1 Mth 33 Volume Stewrt 5.2 Geometry of integrls. In this section, we will lern how to compute volumes using integrls defined by slice nlysis. First, we recll from Clculus I how to compute res. Given the

More information

3.5.1 Single slit diffraction

3.5.1 Single slit diffraction 3.5.1 Single slit diffrction Wves pssing through single slit will lso diffrct nd produce n interference pttern. The reson for this is to do with the finite width of the slit. We will consider this lter.

More information

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction

More information

Naming 3D objects. 1 Name the 3D objects labelled in these models. Use the word bank to help you.

Naming 3D objects. 1 Name the 3D objects labelled in these models. Use the word bank to help you. Nming 3D ojects 1 Nme the 3D ojects lelled in these models. Use the word nk to help you. Word nk cue prism sphere cone cylinder pyrmid D A C F A B C D cone cylinder cue cylinder E B E prism F cue G G pyrmid

More information

Chapter44. Polygons and solids. Contents: A Polygons B Triangles C Quadrilaterals D Solids E Constructing solids

Chapter44. Polygons and solids. Contents: A Polygons B Triangles C Quadrilaterals D Solids E Constructing solids Chpter44 Polygons nd solids Contents: A Polygons B Tringles C Qudrilterls D Solids E Constructing solids 74 POLYGONS AND SOLIDS (Chpter 4) Opening prolem Things to think out: c Wht different shpes cn you

More information

3 4. Answers may vary. Sample: Reteaching Vertical s are.

3 4. Answers may vary. Sample: Reteaching Vertical s are. Chpter 7 Answers Alterntive Activities 7-2 1 2. Check students work. 3. The imge hs length tht is 2 3 tht of the originl segment nd is prllel to the originl segment. 4. The segments pss through the endpoints

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016 Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

LR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table

LR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table TDDD55 Compilers nd Interpreters TDDB44 Compiler Construction LR Prsing, Prt 2 Constructing Prse Tles Prse tle construction Grmmr conflict hndling Ctegories of LR Grmmrs nd Prsers Peter Fritzson, Christoph

More information

TOWARDS GRADIENT BASED AERODYNAMIC OPTIMIZATION OF WIND TURBINE BLADES USING OVERSET GRIDS

TOWARDS GRADIENT BASED AERODYNAMIC OPTIMIZATION OF WIND TURBINE BLADES USING OVERSET GRIDS TOWARDS GRADIENT BASED AERODYNAMIC OPTIMIZATION OF WIND TURBINE BLADES USING OVERSET GRIDS S. H. Jongsm E. T. A. vn de Weide H. W. M. Hoeijmkers Overset symposium 10-18-2012 Deprtment of mechnicl engineering

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

1 Quad-Edge Construction Operators

1 Quad-Edge Construction Operators CS48: Computer Grphics Hndout # Geometric Modeling Originl Hndout #5 Stnford University Tuesdy, 8 December 99 Originl Lecture #5: 9 November 99 Topics: Mnipultions with Qud-Edge Dt Structures Scribe: Mike

More information

A Fast Imaging Algorithm for Near Field SAR

A Fast Imaging Algorithm for Near Field SAR Journl of Computing nd Electronic Informtion Mngement ISSN: 2413-1660 A Fst Imging Algorithm for Ner Field SAR Guoping Chen, Lin Zhng, * College of Optoelectronic Engineering, Chongqing University of Posts

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl

More information

Geometric transformations

Geometric transformations Geometric trnsformtions Computer Grphics Some slides re bsed on Shy Shlom slides from TAU mn n n m m T A,,,,,, 2 1 2 22 12 1 21 11 Rows become columns nd columns become rows nm n n m m A,,,,,, 1 1 2 22

More information

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course

L. Yaroslavsky. Fundamentals of Digital Image Processing. Course L. Yroslvsky. Fundmentls of Digitl Imge Processing. Course 0555.330 Lecture. Imge enhncement.. Imge enhncement s n imge processing tsk. Clssifiction of imge enhncement methods Imge enhncement is processing

More information

Analysis of Computed Diffraction Pattern Diagram for Measuring Yarn Twist Angle

Analysis of Computed Diffraction Pattern Diagram for Measuring Yarn Twist Angle Textiles nd Light ndustril Science nd Technology (TLST) Volume 3, 2014 DO: 10.14355/tlist.2014.0301.01 http://www.tlist-journl.org Anlysis of Computed Diffrction Pttern Digrm for Mesuring Yrn Twist Angle

More information

1.5 Extrema and the Mean Value Theorem

1.5 Extrema and the Mean Value Theorem .5 Extrem nd the Men Vlue Theorem.5. Mximum nd Minimum Vlues Definition.5. (Glol Mximum). Let f : D! R e function with domin D. Then f hs n glol mximum vlue t point c, iff(c) f(x) for ll x D. The vlue

More information

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis

On the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es

More information

Algorithm Design (5) Text Search

Algorithm Design (5) Text Search Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:

More information

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers?

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers? 1.1 TEXAS ESSENTIAL KNOWLEDGE AND SKILLS Prepring for 2A.6.K, 2A.7.I Intervl Nottion nd Set Nottion Essentil Question When is it convenient to use set-uilder nottion to represent set of numers? A collection

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

Spectral Analysis of MCDF Operations in Image Processing

Spectral Analysis of MCDF Operations in Image Processing Spectrl Anlysis of MCDF Opertions in Imge Processing ZHIQIANG MA 1,2 WANWU GUO 3 1 School of Computer Science, Northest Norml University Chngchun, Jilin, Chin 2 Deprtment of Computer Science, JilinUniversity

More information

USING HOUGH TRANSFORM IN LINE EXTRACTION

USING HOUGH TRANSFORM IN LINE EXTRACTION Stylinidis, Efstrtios USING HOUGH TRANSFORM IN LINE EXTRACTION Efstrtios STYLIANIDIS, Petros PATIAS The Aristotle University of Thessloniki, Deprtment of Cdstre Photogrmmetry nd Crtogrphy Univ. Box 473,

More information

MATH 2530: WORKSHEET 7. x 2 y dz dy dx =

MATH 2530: WORKSHEET 7. x 2 y dz dy dx = MATH 253: WORKSHT 7 () Wrm-up: () Review: polr coordintes, integrls involving polr coordintes, triple Riemnn sums, triple integrls, the pplictions of triple integrls (especilly to volume), nd cylindricl

More information

COLOUR IMAGE MATCHING FOR DTM GENERATION AND HOUSE EXTRACTION

COLOUR IMAGE MATCHING FOR DTM GENERATION AND HOUSE EXTRACTION Hee Ju Prk OLOUR IMAGE MATHING FOR DTM GENERATION AND HOUSE EXTRATION Hee Ju PARK, Petr ZINMMERMANN * Swiss Federl Institute of Technology, Zuric Switzerlnd Institute for Geodesy nd Photogrmmetry heeju@ns.shingu-c.c.kr

More information

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits Systems I Logic Design I Topics Digitl logic Logic gtes Simple comintionl logic circuits Simple C sttement.. C = + ; Wht pieces of hrdwre do you think you might need? Storge - for vlues,, C Computtion

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

Reducing a DFA to a Minimal DFA

Reducing a DFA to a Minimal DFA Lexicl Anlysis - Prt 4 Reducing DFA to Miniml DFA Input: DFA IN Assume DFA IN never gets stuck (dd ded stte if necessry) Output: DFA MIN An equivlent DFA with the minimum numer of sttes. Hrry H. Porter,

More information

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture

More information

Lab 1 - Counter. Create a project. Add files to the project. Compile design files. Run simulation. Debug results

Lab 1 - Counter. Create a project. Add files to the project. Compile design files. Run simulation. Debug results 1 L 1 - Counter A project is collection mechnism for n HDL design under specifiction or test. Projects in ModelSim ese interction nd re useful for orgnizing files nd specifying simultion settings. The

More information

4-1 NAME DATE PERIOD. Study Guide. Parallel Lines and Planes P Q, O Q. Sample answers: A J, A F, and D E

4-1 NAME DATE PERIOD. Study Guide. Parallel Lines and Planes P Q, O Q. Sample answers: A J, A F, and D E 4-1 NAME DATE PERIOD Pges 142 147 Prllel Lines nd Plnes When plnes do not intersect, they re sid to e prllel. Also, when lines in the sme plne do not intersect, they re prllel. But when lines re not in

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Adm Sheffer. Office hour: Tuesdys 4pm. dmsh@cltech.edu TA: Victor Kstkin. Office hour: Tuesdys 7pm. 1:00 Mondy, Wednesdy, nd Fridy. http://www.mth.cltech.edu/~2014-15/2term/m006/

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

SERIES. Patterns and Algebra OUT. Name

SERIES. Patterns and Algebra OUT. Name D Techer Student Book IN OUT 8 Nme Series D Contents Topic Section Ptterns Answers nd (pp. functions ) identifying ptterns nd nd functions_ creting ptterns_ skip equtions counting nd equivlence completing

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl

More information

Languages. L((a (b)(c))*) = { ε,a,bc,aa,abc,bca,... } εw = wε = w. εabba = abbaε = abba. (a (b)(c)) *

Languages. L((a (b)(c))*) = { ε,a,bc,aa,abc,bca,... } εw = wε = w. εabba = abbaε = abba. (a (b)(c)) * Pln for Tody nd Beginning Next week Interpreter nd Compiler Structure, or Softwre Architecture Overview of Progrmming Assignments The MeggyJv compiler we will e uilding. Regulr Expressions Finite Stte

More information

A Sparse Grid Representation for Dynamic Three-Dimensional Worlds

A Sparse Grid Representation for Dynamic Three-Dimensional Worlds A Sprse Grid Representtion for Dynmic Three-Dimensionl Worlds Nthn R. Sturtevnt Deprtment of Computer Science University of Denver Denver, CO, 80208 sturtevnt@cs.du.edu Astrct Grid representtions offer

More information

8.2 Areas in the Plane

8.2 Areas in the Plane 39 Chpter 8 Applictions of Definite Integrls 8. Ares in the Plne Wht ou will lern out... Are Between Curves Are Enclosed Intersecting Curves Boundries with Chnging Functions Integrting with Respect to

More information

Stack Manipulation. Other Issues. How about larger constants? Frame Pointer. PowerPC. Alternative Architectures

Stack Manipulation. Other Issues. How about larger constants? Frame Pointer. PowerPC. Alternative Architectures Other Issues Stck Mnipultion support for procedures (Refer to section 3.6), stcks, frmes, recursion mnipulting strings nd pointers linkers, loders, memory lyout Interrupts, exceptions, system clls nd conventions

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl component

More information

Machine vision system for surface inspection on brushed industrial parts.

Machine vision system for surface inspection on brushed industrial parts. Mchine vision system for surfce inspection on rushed industril prts. Nicols Bonnot, Rlph Seulin, Frederic Merienne Lortoire Le2i, CNRS UMR 5158, University of Burgundy, Le Creusot, Frnce. ABSTRACT This

More information

Computer Vision and Image Understanding

Computer Vision and Image Understanding Computer Vision nd Imge Understnding 116 (2012) 25 37 Contents lists ville t SciVerse ScienceDirect Computer Vision nd Imge Understnding journl homepge: www.elsevier.com/locte/cviu A systemtic pproch for

More information

Intermediate Information Structures

Intermediate Information Structures CPSC 335 Intermedite Informtion Structures LECTURE 13 Suffix Trees Jon Rokne Computer Science University of Clgry Cnd Modified from CMSC 423 - Todd Trengen UMD upd Preprocessing Strings We will look t

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Instructor: Adm Sheffer. TA: Cosmin Pohot. 1pm Mondys, Wednesdys, nd Fridys. http://mth.cltech.edu/~2015-16/2term/m006/ Min ook: Introduction to Grph

More information

PARALLEL AND DISTRIBUTED COMPUTING

PARALLEL AND DISTRIBUTED COMPUTING PARALLEL AND DISTRIBUTED COMPUTING 2009/2010 1 st Semester Teste Jnury 9, 2010 Durtion: 2h00 - No extr mteril llowed. This includes notes, scrtch pper, clcultor, etc. - Give your nswers in the ville spce

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

9.1 apply the distance and midpoint formulas

9.1 apply the distance and midpoint formulas 9.1 pply the distnce nd midpoint formuls DISTANCE FORMULA MIDPOINT FORMULA To find the midpoint between two points x, y nd x y 1 1,, we Exmple 1: Find the distnce between the two points. Then, find the

More information

Performance enhancement of IEEE DCF using novel backoff algorithm

Performance enhancement of IEEE DCF using novel backoff algorithm Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 http://jis.eursipjournls.com/content/212/1/274 RESEARCH Open Access Performnce enhncement of IEEE 82.11 using novel ckoff lgorithm

More information

The notation y = f(x) gives a way to denote specific values of a function. The value of f at a can be written as f( a ), read f of a.

The notation y = f(x) gives a way to denote specific values of a function. The value of f at a can be written as f( a ), read f of a. Chpter Prerequisites for Clculus. Functions nd Grphs Wht ou will lern out... Functions Domins nd Rnges Viewing nd Interpreting Grphs Even Functions nd Odd Functions Smmetr Functions Defined in Pieces Asolute

More information

From Indexing Data Structures to de Bruijn Graphs

From Indexing Data Structures to de Bruijn Graphs From Indexing Dt Structures to de Bruijn Grphs Bstien Czux, Thierry Lecroq, Eric Rivls LIRMM & IBC, Montpellier - LITIS Rouen June 1, 201 Czux, Lecroq, Rivls (LIRMM) Generlized Suffix Tree & DBG June 1,

More information

Transparent neutral-element elimination in MPI reduction operations

Transparent neutral-element elimination in MPI reduction operations Trnsprent neutrl-element elimintion in MPI reduction opertions Jesper Lrsson Träff Deprtment of Scientific Computing University of Vienn Disclimer Exploiting repetition nd sprsity in input for reducing

More information

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation Representtion of Numbers Number Representtion Computer represent ll numbers, other thn integers nd some frctions with imprecision. Numbers re stored in some pproximtion which cn be represented by fixed

More information

An Algorithm for Enumerating All Maximal Tree Patterns Without Duplication Using Succinct Data Structure

An Algorithm for Enumerating All Maximal Tree Patterns Without Duplication Using Succinct Data Structure , Mrch 12-14, 2014, Hong Kong An Algorithm for Enumerting All Mximl Tree Ptterns Without Dupliction Using Succinct Dt Structure Yuko ITOKAWA, Tomoyuki UCHIDA nd Motoki SANO Astrct In order to extrct structured

More information