Performance Analysis of Cognitive Radio Spectrum Access with Prioritized Traffic

Size: px
Start display at page:

Download "Performance Analysis of Cognitive Radio Spectrum Access with Prioritized Traffic"

Transcription

1 Performance Analysis of Cognitive Radio Spectrum Access with Prioritized Traffic Vamsi Krishna Tumuluru, Ping Wang, and Dusit Niyato Center for Multimedia and Networ Technology (CeMNeT) School of Computer Engineering, Nanyang Technological University, Singapore. Abstract Dynamic spectrum access (DSA) is an important design aspect for the cognitive radio networs. Most of the existing DSA schemes are to govern the unlicensed user (i.e., secondary user) traffic in a licensed spectrum without compromising the transmissions of the licensed users, in which all the unlicensed users are typically treated equally. In this paper, prioritized unlicensed user traffic is considered. Specifically, we prioritize the unlicensed user traffic into two priority classes (i.e., high and low priority). Two different DSA policies are proposed to manage the handoff for prioritized unlicensed user traffic (i.e., reassigning new channels to the secondary users which paved way for licensed user). These two policies are different in which one allows to drop the ongoing low priority secondary users to accommodate more high priority secondary users being replaced by the presence of licensed user while the other does not allow that. We also study the impact of sub-channel reservation for the high priority secondary users in both DSA policies. Both DSA policies are analyzed using Marov chain. For performance measures, we derive the blocing probability, the probability of forced termination and the throughput for both high and low priority unlicensed users. The numerical results are verified using simulations. Keywords Cognitive radio, dynamic spectrum access, Marov chain analysis, priority. I. INTRODUCTION In recent years, several spectrum surveys have been conducted to understand the spectrum utilization in the licensed and unlicensed portions of the radio spectrum [], [2]. These surveys revealed that under the present spectrum regulatory policies, major portions of the licensed spectrum are underutilized for most of the time, while the unlicensed spectrum is heavily used and is often insufficient. Among the efforts to improve the overall spectrum utilization, the concept of cognitive radio is gaining much importance [3]. The cognitive radio networ (CRN) is composed of licensed users and unlicensed users sharing the licensed spectrum. In most cases, the licensed users (also called primary users) are oblivious of the existence of the unlicensed users (also called secondary users). In the CRN, the secondary users are allowed to dynamically access unused channels (i.e., frequency bands) in the primary user spectrum, thereby improving the overall spectrum utilization. Secondary user transmissions in the CRN can be effectively managed by a dynamic spectrum access (DSA) policy. Using the DSA policy, the secondary users are assigned unused channels in the primary user spectrum. In the event of a primary user s arrival, the secondary users transmissions on the corresponding channel are either reassigned to another unused licensed channel or terminated. Recently, some wors dealt with the performance evaluation of the CRN under different DSA policies, using continuous time Marov chain (CTMC) analysis [4]-[7]. According to the DSA policy in [4], the secondary users which experience unsuccessful handoff are queued till they find the transmission opportunities. In [5], DSA policy considered channel reservation for secondary user handoff. In [6], the secondary user arrivals wait in a queue when a channel 2 is not available. In [7], the DSA policy assigns variable bandwidth to the secondary users. In all these wors, the CRN was modeled as a call admission control system which receives calls from both primary users (PUs) and secondary users (SUs). During the spectrum access, the PU calls have a higher priority over the SU calls. Unlie the above wors, in this paper, we consider prioritization among the SUs while accessing the licensed spectrum. For example, the SUs with real-time traffic have higher priority than those with non real-time traffic. To date, only a few wors ([8] and [9]) have taen prioritized SU traffic into consideration. However, these wors have not addressed the issue of spectrum handoff under prioritized SU traffic. For the simplicity of presentation, we consider that the SU traffic is composed of two priority classes 3 (i.e., high and low priority). We propose two DSA policies to handle the spectrum access for the SUs in the licensed spectrum. The two DSA policies have different SU handoff mechanisms. Further, we also introduce sub-channel reservation for the high priority SU call arrivals in both the DSA policies. We develop analytical models for the CRN under both the DSA policies using CTMC models. The performance of the DSA policies is evaluated in terms of the blocing probability, the probability of forced termination, and the throughput for both high and low priority SUs. II. SYSTEM MODEL The licensed spectrum is divided into M channels, each of which is further divided into N sub-channels, as shown in Fig.. A PU call is assigned one channel whereas a SU call is assigned one sub-channel for data transmission. The licensed The process of reassigning a displaced secondary user transmission is referred to as handoff. 2 In this paper, the terms licensed channel and channel are used interchangeably. 3 Please note that the proposed analytical model is not restricted to the two priority class case and can be extended to the case of more than two priority classes.

2 spectrum is shared by the PUs and SUs. The PUs have the highest priority in accessing the channels. The secondary users are classified into two priority classes. The high priority SUs are denoted as SU while the low priority SUs are denoted as SU 2. Similar to [4], we assume that a central controller exists to implement the DSA policy. The objective of the DSA policy is to assign idle sub-channels to the incoming SU calls, and moderate their handoff. We consider two DSA policies for our system model. They are denoted as DSA-C and DSA-C2. sub-channel N channel Licensed spectrum Fig.. System model. N(M-)+ A. Sub-channel Reservation under DSA-C and DSA-C2 Under both the DSA policies, a number of sub-channels are reserved for high priority secondary user SU, i.e., when the total number of idle sub-channels is less than ζ which is the number of sub-channels reserved for SU, the new SU 2 call will be rejected. In this way, we provide higher priority for the SU calls over the SU 2 calls 4. Call arrivals occur independently as Poisson processes with mean arrival rates λ p, λ and λ 2 for PU, SU and SU 2, respectively. The service times independently follow exponential distributions with mean service rates of µ p, µ and µ 2 for PU, SU and SU 2 calls, respectively. The number of ongoing PU calls is denoted as and the number of occupied sub-channels is denoted as Y. The new calls are dropped when the system becomes full (i.e., Y = MN for SU call, Y = MN ζ for SU 2 calls and N = M for PU calls). B. Handoff Mechanism under DSA-C When a new PU call claims a channel occupied by the SUs, the handoff mechanism is initiated. During handoff, the idle sub-channels (if any) are first assigned to the displaced SU calls. Thereafter, the remaining idle sub-channels are assigned to the displaced SU 2 calls. If the required idle sub-channels are not available for SU handoff, then some ongoing SU 2 calls are terminated and the resulting idle sub-channels are assigned to the displaced SU calls. When the idle sub-channels are not enough to accommodate all the displaced SU or SU 2 calls, some of the displaced calls will be terminated. C. Handoff Mechanism under DSA-C2 DSA-C2 policy is similar to DSA-C policy except that no ongoing SU 2 calls are terminated for the sae of SU handoff. In other words, if a displaced SU call does not find an idle sub-channel, it is terminated. 4 Note that the PUs are not affected by such sub-channel reservation. M MN III. PERFORMANCE ANALYSIS In this section, we develop analytical models for the CRN corresponding to each DSA policy using continuous time Marov Chain (CTMC). The state of the CTMC (for both DSA policies) is defined as z = [i, j, ]. Here, i {,,..., MN}, j {,,..., MN ζ} and {,,..., M} represent the number of ongoing SU, SU 2, and PU calls in the system, respectively. The total number of occupied sub-channels in the state z is calculated as Y = i + j + N. For a valid state, Y should not exceed MN. Let l (where l {,,..., N}) and m (where m {,,..., N}) denote respectively the number of SU and SU 2 calls displaced by an incoming PU call when the state is [i, j, ]. l and m should satisfy the following conditions: l i, m j and l + m {,,..., N} r = MN Y (N (l + m)) and r s = (l + m) min(r, l + m). () In Eq. (), the first condition gives the maximum number of SUs that can be displaced upon a PU arrival whereas the second condition gives the number of sub-channels available for handoff (denoted as r) for the displaced SU calls. Accordingly, the total number of unsuccessful handoff calls (denoted as s) is calculated. The evolution of the state [i, j, ] of the CTMC is presented under three cases of Y : ) Y N(M ): The system has at least N idle subchannels. 2) N(M ) < Y < MN: The system has idle subchannel in the range {,..., N }. 3) Y = MN: The system has no idle sub-channel. For the case Y N(M ), all displaced SU and SU 2 calls perform successful handoff (i.e., s = ) when displaced by a PU arrival. In other words, no calls are terminated (under both DSA-C and DSA-C2) due to an incoming PU call. For the case N(M ) Y MN, s = {,..., N } number of SU calls experience unsuccessful handoff, whereas when Y = MN, s = N SU calls experience unsuccessful handoff. The exact number of terminated SU and SU 2 calls under each centralized DSA policy are explained later. Let l and m denote the number of terminated SU and SU 2 calls, respectively. Thus, l + m = s. A. State Transitions under DSA-C Policy Under the DSA-C policy, the transitions for the state [i, j, ] for different cases of Y are explained in Fig. 2. State transitions from/to the state [i, j, ] occur due to any of the six possible events, namely PU arrival, SU arrival, SU 2 arrival, PU departure, SU departure and SU 2 departure. Each state transition is represented by its corresponding rate. Taing as an example, a SU 2 arrival in state [i, j, ] causes transition to state [i, j, ] with a rate δ λ 2, where δ = (i+(j )+N<MN ζ) specifies the condition for subchannel reservation (i.e., a new SU 2 call is accepted by the system only when the condition i + (j ) + N < MN ζ 2

3 holds), where ( ) is the indicator function which returns the value when the condition given inside the parenthesis is true and returns otherwise. In Fig. 2, δ 2 = (i+j+n<mn ζ) (condition for sub-channel reservation in state [i, j, ]) and δ 3 = (i+j+( )N N(M )). The transition rate γ i,j, from state [i, j, ] to state [i l, j m, + ] is calculated as follows: ) Let N denote the set containing the valid combinations of (l, m ). 2) For every valid pair of (l, m ) in the set N, find R which represents the number of valid combinations of l, m, r and s = l + m. Valid l, m, r and s for given [i, j, ] found using Eq. (). 3) Then, the transition rate γ i,j, is given by γ i,j, = R ( ) N R λ p. (2) Taing into consideration the handoff mechanism explained in Section II-B, the variables l and m in Eq. (2) are given by l = s min(j, s) and m = min(j, s). The value of s is determined by Eq. (). i, j, δ λ 2 i, j, Fig. 2. i µ λ j µ 2 i l, j m, + γ i, j, l, m µ p δ λ p 3 λ ( j + ) µ 2 ( + ) µ p δ 2 λ 2 + i +, j, ( i + ) µ i, j +, State transitions for the DSA policies, DSA-C and DSA-C2. For the cases Y N(M ) and N(M ) < Y < MN, all the transitions shown in Fig. 2 are valid. For the case Y = MN, the transitions between the states [i, j, ] and [i+, j, ], and between [i, j, ] and [i, j +, ] are not considered as the system is full (i.e., idle sub-channels not available). Apart from the state transitions shown in Fig. 2, when Y = MN few transitions occur from the states in which the number of ongoing calls is greater than N(M ) to the state [i, j, ] due to a PU arrival. These transitions are described below. Transition from state [i, j+j, ] to state [i, j, ] occurs with rate γ i,j+j,,j, where j > and < j < N. The rate γ i,j+j, is calculated using Eq. (2) corresponding,j to the state [i, j + j, ]. During this state transition, j SU 2 calls are terminated. Transition from state [i + (s j ), j + j, ] to state [i, j, ] occurs with rate γ i+(s j ),j+j, s j,j, where j =, < s < N and j < s. The rate γ i+(s j ),j+j, s j,j is calculated using Eq. (2) corresponding to the state [i + 3 (s j ), j + j, ]. During this state transition, s j SU calls and j SU 2 calls are terminated. B. State Transitions under DSA-C2 Policy Fig. 2 also represents the state transitions under the DSA-C2 policy for the various cases of Y. According to the handoff mechanism under DSA-C2 policy, the number of terminated SU and SU 2 calls are given as l = l min(r, l) and m = max(, m max(, r l)), respectively. All state transitions shown in Fig. 2 occur similar to the DSA-C policy. Apart from the state transitions given in Fig. 2, transitions occur from states [i+i, j +j, ] (in which i+j +( )N = N(M )) to the state [i, j, ] when Y = MN, where i, j < N and < i + j < N. C. Performance Measures The performance measures for each DSA policy are expressed using the steady state probability distribution of its corresponding CTMC. We derive performance measures (for both SU and SU 2 calls) such as blocing probability, probability of forced termination, and throughput. Let Π z denote the steady state distribution of a CTMC whose state is denoted as z = [i, j, ]. To simplify the presentation, we use the same notations under all DSA policies. For any DSA policy, the corresponding steady state probability distribution Π z is obtained by finding the corresponding transition rate matrix Q and applying the Gauss-Seidel algorithm []. Each row of Q represents the transitions with respect to a specific state z, as a balance equation. For example, referring to Fig. 2, one balance equation with respect to the state [i, j, ] under the DSA-C policy is expressed as follows: [µ p + δ 2 λ 2 + λ + λ p + iµ + jµ 2 ] Π [i,j,] = λ p Π [i,j, ] + (j + )µ 2 Π [i,j+,] + (i + )µ Π [i+,j,] + ( + )µ p Π [i,j,+] + λ Π [i,j,] + δ λ 2 Π [i,j,] (3) where Π [i,j,] represents the steady state probability for state [i, j, ] under DSA-C policy. ) Blocing Probability: The blocing probability represents the probability that an incoming SU call (SU or SU 2 ) is not permitted to enter into the system. The blocing probability of SU calls denoted as P B is expressed as P B = z Π z. The blocing probability of SU 2 calls Y =MN denoted as P B2 is expressed as P B2 = Π z. z Y MN ζ 2) Probability of Forced Termination: The probability of forced termination represents the probability that an ongoing SU call (SU or SU 2 ) is terminated by an incoming PU call. The probability of forced termination for the SU calls, denoted as P F, is expressed as follows: P F = z i l, j m l γ i,j, Π z λ ( P B ). (4) In Eq. (4), the numerator denotes the rate that l SU calls are terminated in state z whereas the denominator denotes the

4 effective rate with which a new SU call is assigned a subchannel. Similarly, the probability of forced termination for the SU 2 calls, denoted as P F 2, is expressed as follows: P F 2 = z i l, j m m γ i,j, Π z. (5) λ 2 ( P B2 ) In Eqs. (4) and (5), l and m depend on the DSA policy. 3) Throughput: The throughput under a given SU priority class is expressed as the mean number of ongoing calls in the system. Let η and η 2 denote the throughput for SU and SU 2 calls, respectively. The throughput η is given by η = λ ( P B )( P F ) whereas The throughput η 2 is given by η 2 = λ 2 ( P B2 )( P F 2 ). IV. RESULTS AND DISCUSSION In this section, we compare the two DSA policies based on the performance measures described in Section III-C. The accuracy of the analytical models is verified through simulations. In the experiments, we set M = 3 and N = 5. The symbols (a) and (s) in the figures indicate analytical and simulation results, respectively. A. Blocing Probabilities The blocing probabilities corresponding to the DSA-C2 policy are same as that corresponding to the DSA-C policy (because the DSA policies only differ in the handoff mechanism), and hence they are not shown for brevity of paper. Fig. 3 shows the blocing probabilities of the SU and SU 2 calls under the DSA-C policy with various PU arrival rate (λ p ). The following parameters are chosen for this experiment: λ =.4, λ 2 =.4, λ p [.3,.2], µ =.8, µ 2 =.8, µ p =.9, and η = 2. It can be seen that all the blocing probabilities (i.e., for both SU classes) increase as the PU arrival rate increases. This is because the number of busy sub-channels increases with an increase in the PU arrival rate, resulting in higher blocing probabilities for the SUs. Fig. 3 also shows that the analysis results match well with the simulation results. Blocing probabilities of SU and SU2 calls.4.2. PB, PB, PB2, PB2, Fig. 3. Blocing probabilities of SU and SU 2 calls under both DSA policies. 4 B. Forced Termination Probabilities Fig. 4 and Fig. 5 respectively show the forced termination probabilities of the SU and SU 2 calls under both DSA policies with various PU arrival rate λ p. The following parameters are set for this experiment: λ =.8, λ 2 =.8, λ p [.3,.2], µ =.35, µ 2 =.35, µ p =.9 and η = 2. It can be observed that as λ p increases, the forced termination probabilities of SU and SU 2 calls also increase with both DSA policies. Fig. 4 shows that DSA- C policy has lower force termination probability for the SU calls compared to DSA-C2 policy. Fig. 5 shows higher force termination probability of the SU 2 calls using DSA- C policy compared to DSA-C2 policy. Such observations accord with our expectation. Compared to the DSA-C2 policy, DSA-C policy reduces handoff failures for the SU calls by terminating some ongoing SU 2 calls during handoff. Again, the analysis and simulation results match well. Fig. 4. Fig. 5. Forced termination probability of SU calls, PF Forced termination probability of SU2 calls, PF2 Forced termination probability of SU2 calls, PF Forced termination probability of SU calls under both DSA policies Forced termination probability of SU 2 calls under both DSA policies SU arrival rate, λ Fig. 6. Effect of SU arrival rate on forced termination probability of SU 2 calls under both DSA policies.

5 Fig. 6 shows the effect of SU arrival rate (λ ) on the forced termination probability of the low priority SU 2 calls. In this experiment, we set λ p = and vary λ. It can be seen that as λ increases, the forced termination probability of SU 2 calls also increases with both DSA policies. This is because when λ increases, the number of SU 2 calls entering the system decreases. This leads to an increase in P F 2 along with λ. With DSA-C policy, apart from terminations caused by the PU arrivals, the SU 2 calls are also terminated by SU calls during handoff. Thus, P F 2 of DSA-C policy is higher than that of DSA-C2 policy. C. Optimal Sub-channel Reservation As mentioned in Section II-A, some sub-channels (ζ) are reserved for the SU call arrivals. Using the sub-channel reservation, we bloc some low priority SU calls to improve the performance of the high priority SU calls. Based on the given parameter settings and blocing probability requirement of the SU calls, an optimal number of sub-channels (ζ) to be reserved under the DSA policies can be determined from our analysis. Here, optimal number means the minimum number of sub-channels to be reserved in order to guarantee that the blocing probability requirement of the SU calls is satisfied. For instance, consider the following parameter setting: λ =.8, λ 2 =.8, λ p =, µ =.8, µ 2 =.3, µ p =.9 and a desired blocing probability of 5% for the SU calls. From the analysis, we found that the optimal value of ζ is 4 for both DSA policies. The analysis results can be verified from simulation. Fig. 7 shows the simulation results for the above parameter settings under different values of ζ. Fig. 7 shows that the desired blocing probability of 5% for the SU calls is satisfied when ζ = 4 sub-channels. Blocing probability of SU calls, PB Number of sub-channels reserved for SU calls (ζ) Fig. 7. Effect of ζ on blocing probability of SU calls under both DSA policies. D. Throughput Evaluation We verify the throughput calculated in the analysis with the simulation results. For the simulation, the throughput for a given SU priority class is calculated by taing the ratio of the total number of SU calls corresponding to that priority class completing service, to the total duration of the simulation. In our simulations, call arrivals are generated for a duration of 8 time units. For the parameter setting λ =.8, λ 2 =.8, λ p =.3, µ =.3, µ 2 =, µ p =.4 and ζ =, we obtained the following values for the throughput 5 from the analysis: η =.9975 and η 2 =.3462 for DSA-C policy whereas η =.789 and η 2 =.3997 for DSA-C2 policy. In the simulation, under DSA-C policy, SU calls and SU 2 calls completed service whereas under DSA- C2 policy, SU calls and SU 2 calls completed service. Therefore, from simulations, η =.9974 and η 2 =.3464 for DSA-C policy whereas η =.7986 and η 2 =.396 for DSA-C2 policy. The analysis results and simulation results for the throughput of the SUs correspond closely. As expected, DSA-C policy gives higher throughput for SU compared to DSA-C2 policy, at the expense of sacrificing the throughput of SU 2. This phenomenon holds under various parameter settings. V. CONCLUSION We have investigated the dynamic spectrum access in the cognitive radio networs under a special case in which the SU traffic is prioritized. Two different DSA policies have been developed to handle the spectrum assignment and handoff for the SU traffic with two priority classes. We have developed the analytical models for two proposed DSA policies. For performance evaluation, we have derived the blocing probability, the forced termination probability, and the throughput for the two priority classes of SU traffic. We have also investigated the case of sub-channel reservation for the high priority SUs and obtained the optimal sub-channel reservation. The analytical results have been verified through simulations. REFERENCES [] Federal Communications Commission, Spectrum policy tas force, in Rep. OET Docet No. 2-35, Nov.22. [2] S. D. Jones, E. Jung, X. Liu, N. Merhab and I-J. Wang, Characterization of spectrum activities in the U.S. public safety band for opportunistic spectrum access, in 2nd International Symposium on New Frontiers in Dynamic Spectrum Access Networs (DySPAN),pp , April 27. [3] S. Hayin, Cognitive radio: Brain-empowered wireless communications, in IEEE Journal on Selected Areas in Communication, vol. 23, no. 2, pp. 2 23, 25. [4] E. W. M. Wong and C. H. Foh, Analysis of cognitive radio spectrum access with finite user polulation, in IEEE Communications Letters, vol. 5, no. 5, pp , May 29. [5] X. Zhu, L. Shen and T-S. P. Yum, Analysis of cognitive radio spectrum access with optimal channel reservation, in IEEE Communications Letters, vol., no. 4, pp , April 27. [6] Y. Zhang, Dynamic spectrum access in cognitive radio wirless networs, in IEEE International Conference on Communications, pp , May 28. [7] S. M. Kannappa and M. Saquib, Performance analysis of a cognitive networ with dynamic spectrum assignment to secondary users, in IEEE International Conference on Communications, pp. 5, July 2. [8] U. Wiggins, R. Kannan, V. Charavarthy and A. V. Vasilaos, Datacentric prioritization in a cognitive radio networ: A quality-of-service based design and integration, in 3rd IEEE Symposium on on New Frontiers in Dynamic Spectrum Access Networs (DySPAN), pp., Oct. 28. [9] C. Gosh, S. Chen, D. P. Agarwal and A. M. Wyglinsi, Priority-based spectrum allocation for cognitive radio networs employing NC-OFDM transmission, in IEEE Military Communications Conference, pp. 5, Oct. 29. [] W. J. Stewart, Introduction to the numerical solution of Marov chains, Princeton University Press, 994.

Weighted Earliest Deadline Scheduling and Its Analytical Solution for Admission Control in a Wireless Emergency Network

Weighted Earliest Deadline Scheduling and Its Analytical Solution for Admission Control in a Wireless Emergency Network Weighted Earliest Deadline Scheduling and Its Analytical Solution for Admission Control in a Wireless Emergency Network Jiazhen Zhou and Cory Beard Department of Computer Science/Electrical Engineering

More information

Analysis of Distributed Reservation Protocol for UWB-based WPANs with ECMA-368 MAC

Analysis of Distributed Reservation Protocol for UWB-based WPANs with ECMA-368 MAC Analysis of Distributed Reservation Protocol for UWB-based WPANs with ECMA-368 MAC Nasim Arianpoo, Yuxia Lin, Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British

More information

1.010 Uncertainty in Engineering Fall 2008

1.010 Uncertainty in Engineering Fall 2008 MIT OpenCourseWare http://ocw.mit.edu 1.010 Uncertainty in Engineering Fall 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. Application Example 18

More information

Final exam solutions

Final exam solutions EE365 Stochastic Control / MS&E251 Stochastic Decision Models Profs. S. Lall, S. Boyd June 5 6 or June 6 7, 2013 Final exam solutions This is a 24 hour take-home final. Please turn it in to one of the

More information

Dynamic Pricing of Preemptive Service for Elastic Demand

Dynamic Pricing of Preemptive Service for Elastic Demand Dynamic Pricing of Preemptive Service for Elastic Demand Aylin Turhan, Murat Alanyali and David Starobinski Abstract We consider a service provider that accommodates two classes of users: primary users

More information

Coopetition Spectrum Trading - Creating Endogenous Spectrum Holes

Coopetition Spectrum Trading - Creating Endogenous Spectrum Holes Coopetition Spectrum Trading - Creating Endogenous Spectrum Holes Liu Cui School of Information Sciences University of Pittsburgh Email: lic49@pitt.edu Taieb Znati Department of Computer Sciences University

More information

Optimal Code Assignment and Call Admission Control for OVSF-CDMA Systems Constrained by Blocking Probabilities

Optimal Code Assignment and Call Admission Control for OVSF-CDMA Systems Constrained by Blocking Probabilities Optimal Code Assignment and Call Admission Control for OVSF-CDMA Systems Constrained by Blocking Probabilities Jun-Seong Park, Lei Huang,DanielC.Lee, and C.-C. Jay Kuo Department of Electrical Engineering,

More information

Non-Cash Auction for Spectrum Trading in Cognitive Radio Networks: A Contract Theoretical Model with Joint Adverse Selection and Moral Hazard

Non-Cash Auction for Spectrum Trading in Cognitive Radio Networks: A Contract Theoretical Model with Joint Adverse Selection and Moral Hazard arxiv:79.837v [cs.ni] 25 Sep 27 Non-Cash Auction for Spectrum Trading in Cognitive Radio Networks: A Contract Theoretical Model with Joint Adverse Selection and Moral Hazard Yanru Zhang, Student Member,

More information

The Impact of Fading on the Outage Probability in Cognitive Radio Networks

The Impact of Fading on the Outage Probability in Cognitive Radio Networks 1 The Impact of Fading on the Outage obability in Cognitive Radio Networks Yaobin Wen, Sergey Loyka and Abbas Yongacoglu Abstract This paper analyzes the outage probability in cognitive radio networks,

More information

A Simple Method for Solving Multiperiod Mean-Variance Asset-Liability Management Problem

A Simple Method for Solving Multiperiod Mean-Variance Asset-Liability Management Problem Available online at wwwsciencedirectcom Procedia Engineering 3 () 387 39 Power Electronics and Engineering Application A Simple Method for Solving Multiperiod Mean-Variance Asset-Liability Management Problem

More information

Sequential and Concurrent Auction Mechanisms for Dynamic Spectrum Access

Sequential and Concurrent Auction Mechanisms for Dynamic Spectrum Access Sequential and Concurrent Auction Mechanisms for Dynamic Spectrum Access Shamik Sengupta and Mainak Chatterjee School of Electrical Engineering and Computer Science University of Central Florida Orlando,

More information

Indoor Measurement And Propagation Prediction Of WLAN At

Indoor Measurement And Propagation Prediction Of WLAN At Indoor Measurement And Propagation Prediction Of WLAN At.4GHz Oguejiofor O. S, Aniedu A. N, Ejiofor H. C, Oechuwu G. N Department of Electronic and Computer Engineering, Nnamdi Aziiwe University, Awa Abstract

More information

Dynamic Contract Trading in Spectrum Markets

Dynamic Contract Trading in Spectrum Markets 1 Dynamic Contract Trading in Spectrum Markets G. Kasbekar, S. Sarkar, K. Kar, P. Muthusamy, A. Gupta Abstract We address the question of optimal trading of bandwidth (service) contracts in wireless spectrum

More information

206 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 1, JANUARY 2017

206 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 1, JANUARY 2017 206 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 1, JANUARY 2017 Spectrum Auction for Differential Secondary Wireless Service Provisioning With Time-Dependent Valuation Information Changyan

More information

DISRUPTION MANAGEMENT FOR SUPPLY CHAIN COORDINATION WITH EXPONENTIAL DEMAND FUNCTION

DISRUPTION MANAGEMENT FOR SUPPLY CHAIN COORDINATION WITH EXPONENTIAL DEMAND FUNCTION Acta Mathematica Scientia 2006,26B(4):655 669 www.wipm.ac.cn/publish/ ISRUPTION MANAGEMENT FOR SUPPLY CHAIN COORINATION WITH EXPONENTIAL EMAN FUNCTION Huang Chongchao ( ) School of Mathematics and Statistics,

More information

Combined Preemption and Queuing Policies for a Cellular Emergency Network

Combined Preemption and Queuing Policies for a Cellular Emergency Network Combined Preemption and Queuing Policies for a Cellular Emergency Network Jiazhen Zhou and Cory Beard Department of Computer Science/Electrical Engineering University of Missouri-Kansas City Email: {jzmpc,beardc}@umkc.edu

More information

THE proliferation of mobile devices is leading to an

THE proliferation of mobile devices is leading to an IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 35, NO. 1, JANUARY 2017 79 Auction-Based Coopetition Between LTE Unlicensed and Wi-Fi Haoran Yu, George Iosifidis, Jianwei Huang, Fellow, IEEE, and

More information

Solutions of Bimatrix Coalitional Games

Solutions of Bimatrix Coalitional Games Applied Mathematical Sciences, Vol. 8, 2014, no. 169, 8435-8441 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.410880 Solutions of Bimatrix Coalitional Games Xeniya Grigorieva St.Petersburg

More information

The Effect of Trading Volume on PIN's Anomaly around Information Disclosure

The Effect of Trading Volume on PIN's Anomaly around Information Disclosure 2011 3rd International Conference on Information and Financial Engineering IPEDR vol.12 (2011) (2011) IACSIT Press, Singapore The Effect of Trading Volume on PIN's Anomaly around Information Disclosure

More information

Handout 4: Deterministic Systems and the Shortest Path Problem

Handout 4: Deterministic Systems and the Shortest Path Problem SEEM 3470: Dynamic Optimization and Applications 2013 14 Second Term Handout 4: Deterministic Systems and the Shortest Path Problem Instructor: Shiqian Ma January 27, 2014 Suggested Reading: Bertsekas

More information

arxiv: v1 [math.pr] 6 Apr 2015

arxiv: v1 [math.pr] 6 Apr 2015 Analysis of the Optimal Resource Allocation for a Tandem Queueing System arxiv:1504.01248v1 [math.pr] 6 Apr 2015 Liu Zaiming, Chen Gang, Wu Jinbiao School of Mathematics and Statistics, Central South University,

More information

Competition with Dynamic Spectrum Leasing

Competition with Dynamic Spectrum Leasing 1 Competition with Dynamic Spectrum Leasing Lingjie Duan, Jianwei Huang, and Biying Shou Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong Department of Management Sciences,

More information

Revenue Management Under the Markov Chain Choice Model

Revenue Management Under the Markov Chain Choice Model Revenue Management Under the Markov Chain Choice Model Jacob B. Feldman School of Operations Research and Information Engineering, Cornell University, Ithaca, New York 14853, USA jbf232@cornell.edu Huseyin

More information

Forecasting prices from level-i quotes in the presence of hidden liquidity

Forecasting prices from level-i quotes in the presence of hidden liquidity Forecasting prices from level-i quotes in the presence of hidden liquidity S. Stoikov, M. Avellaneda and J. Reed December 5, 2011 Background Automated or computerized trading Accounts for 70% of equity

More information

Dynamic Pricing in Ridesharing Platforms

Dynamic Pricing in Ridesharing Platforms Dynamic Pricing in Ridesharing Platforms A Queueing Approach Sid Banerjee Ramesh Johari Carlos Riquelme Cornell Stanford Stanford rjohari@stanford.edu With thanks to Chris Pouliot, Chris Sholley, and Lyft

More information

A THREE-FACTOR CONVERGENCE MODEL OF INTEREST RATES

A THREE-FACTOR CONVERGENCE MODEL OF INTEREST RATES Proceedings of ALGORITMY 01 pp. 95 104 A THREE-FACTOR CONVERGENCE MODEL OF INTEREST RATES BEÁTA STEHLÍKOVÁ AND ZUZANA ZÍKOVÁ Abstract. A convergence model of interest rates explains the evolution of the

More information

Call Admission Control for Preemptive and Partially Blocking Service Integration Schemes in ATM Networks

Call Admission Control for Preemptive and Partially Blocking Service Integration Schemes in ATM Networks Call Admission Control for Preemptive and Partially Blocking Service Integration Schemes in ATM Networks Ernst Nordström Department of Computer Systems, Information Technology, Uppsala University, Box

More information

Markov Decision Processes (MDPs) CS 486/686 Introduction to AI University of Waterloo

Markov Decision Processes (MDPs) CS 486/686 Introduction to AI University of Waterloo Markov Decision Processes (MDPs) CS 486/686 Introduction to AI University of Waterloo Outline Sequential Decision Processes Markov chains Highlight Markov property Discounted rewards Value iteration Markov

More information

RESEARCH ARTICLE. The Penalized Biclustering Model And Related Algorithms Supplemental Online Material

RESEARCH ARTICLE. The Penalized Biclustering Model And Related Algorithms Supplemental Online Material Journal of Applied Statistics Vol. 00, No. 00, Month 00x, 8 RESEARCH ARTICLE The Penalized Biclustering Model And Related Algorithms Supplemental Online Material Thierry Cheouo and Alejandro Murua Département

More information

Scheduling arrivals to queues: a model with no-shows

Scheduling arrivals to queues: a model with no-shows TEL-AVIV UNIVERSITY RAYMOND AND BEVERLY SACKLER FACULTY OF EXACT SCIENCES SCHOOL OF MATHEMATICAL SCIENCES, DEPARTMENT OF STATISTICS AND OPERATIONS RESEARCH Scheduling arrivals to queues: a model with no-shows

More information

The Viability of Spectrum Trading Markets

The Viability of Spectrum Trading Markets TOPICS IN RADIO COMMUNICATIONS The Viability of Spectrum Trading Markets Carlos E. Caicedo, Syracuse University Martin B. H. Weiss, University of Pittsburgh ABSTRACT Spectrum trading markets are of growing

More information

Lecture Outline. Scheduling aperiodic jobs (cont d) Scheduling sporadic jobs

Lecture Outline. Scheduling aperiodic jobs (cont d) Scheduling sporadic jobs Priority Driven Scheduling of Aperiodic and Sporadic Tasks (2) Embedded Real-Time Software Lecture 8 Lecture Outline Scheduling aperiodic jobs (cont d) Sporadic servers Constant utilization servers Total

More information

Optimal Scheduling Policy Determination in HSDPA Networks

Optimal Scheduling Policy Determination in HSDPA Networks Optimal Scheduling Policy Determination in HSDPA Networks Hussein Al-Zubaidy, Jerome Talim, Ioannis Lambadaris SCE-Carleton University 1125 Colonel By Drive, Ottawa, ON, Canada Email: {hussein, jtalim,

More information

An Approximation Algorithm for Capacity Allocation over a Single Flight Leg with Fare-Locking

An Approximation Algorithm for Capacity Allocation over a Single Flight Leg with Fare-Locking An Approximation Algorithm for Capacity Allocation over a Single Flight Leg with Fare-Locking Mika Sumida School of Operations Research and Information Engineering, Cornell University, Ithaca, New York

More information

Assembly systems with non-exponential machines: Throughput and bottlenecks

Assembly systems with non-exponential machines: Throughput and bottlenecks Nonlinear Analysis 69 (2008) 911 917 www.elsevier.com/locate/na Assembly systems with non-exponential machines: Throughput and bottlenecks ShiNung Ching, Semyon M. Meerkov, Liang Zhang Department of Electrical

More information

6.262: Discrete Stochastic Processes 3/2/11. Lecture 9: Markov rewards and dynamic prog.

6.262: Discrete Stochastic Processes 3/2/11. Lecture 9: Markov rewards and dynamic prog. 6.262: Discrete Stochastic Processes 3/2/11 Lecture 9: Marov rewards and dynamic prog. Outline: Review plus of eigenvalues and eigenvectors Rewards for Marov chains Expected first-passage-times Aggregate

More information

Sequential Bandwidth and Power Auctions. for Spectrum Sharing

Sequential Bandwidth and Power Auctions. for Spectrum Sharing Sequential Bandwidth and Power Auctions 1 for Spectrum Sharing Junjik Bae, Eyal Beigman, Randall Berry, Michael L. Honig, and Rakesh Vohra Abstract We study a sequential auction for sharing a wireless

More information

Appendix A: Introduction to Queueing Theory

Appendix A: Introduction to Queueing Theory Appendix A: Introduction to Queueing Theory Queueing theory is an advanced mathematical modeling technique that can estimate waiting times. Imagine customers who wait in a checkout line at a grocery store.

More information

Prediction Models of Financial Markets Based on Multiregression Algorithms

Prediction Models of Financial Markets Based on Multiregression Algorithms Computer Science Journal of Moldova, vol.19, no.2(56), 2011 Prediction Models of Financial Markets Based on Multiregression Algorithms Abstract The paper presents the results of simulations performed for

More information

Game-Theoretic Risk Analysis in Decision-Theoretic Rough Sets

Game-Theoretic Risk Analysis in Decision-Theoretic Rough Sets Game-Theoretic Risk Analysis in Decision-Theoretic Rough Sets Joseph P. Herbert JingTao Yao Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: [herbertj,jtyao]@cs.uregina.ca

More information

Handout 8: Introduction to Stochastic Dynamic Programming. 2 Examples of Stochastic Dynamic Programming Problems

Handout 8: Introduction to Stochastic Dynamic Programming. 2 Examples of Stochastic Dynamic Programming Problems SEEM 3470: Dynamic Optimization and Applications 2013 14 Second Term Handout 8: Introduction to Stochastic Dynamic Programming Instructor: Shiqian Ma March 10, 2014 Suggested Reading: Chapter 1 of Bertsekas,

More information

An optimal policy for joint dynamic price and lead-time quotation

An optimal policy for joint dynamic price and lead-time quotation Lingnan University From the SelectedWorks of Prof. LIU Liming November, 2011 An optimal policy for joint dynamic price and lead-time quotation Jiejian FENG Liming LIU, Lingnan University, Hong Kong Xianming

More information

Incentivizing Secondary Spectrum Trading: A Profit Perspective

Incentivizing Secondary Spectrum Trading: A Profit Perspective Incentivizing Secondary Spectrum Trading: A Profit Perspective by Shang-Pin Sheng A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Electrical

More information

Modelling Anti-Terrorist Surveillance Systems from a Queueing Perspective

Modelling Anti-Terrorist Surveillance Systems from a Queueing Perspective Systems from a Queueing Perspective September 7, 2012 Problem A surveillance resource must observe several areas, searching for potential adversaries. Problem A surveillance resource must observe several

More information

A Rollout-based Joint Spectrum Sensing and Access Policy for Cognitive Radio Networks with Hardware Limitations

A Rollout-based Joint Spectrum Sensing and Access Policy for Cognitive Radio Networks with Hardware Limitations A Rollout-based Joint Spectrum Sensing and Access Policy for Cognitive Radio Networks with ardware Limitations Lingcen Wu, Wei Wang, Zhaoyang Zhang, Lin Chen Department of Information Science and Electronic

More information

PERFORMANCE ANALYSIS OF TANDEM QUEUES WITH SMALL BUFFERS

PERFORMANCE ANALYSIS OF TANDEM QUEUES WITH SMALL BUFFERS PRFORMNC NLYSIS OF TNDM QUUS WITH SMLL BUFFRS Marcel van Vuuren and Ivo J.B.F. dan indhoven University of Technology P.O. Box 13 600 MB indhoven The Netherlands -mail: m.v.vuuren@tue.nl i.j.b.f.adan@tue.nl

More information

Optimal Production-Inventory Policy under Energy Buy-Back Program

Optimal Production-Inventory Policy under Energy Buy-Back Program The inth International Symposium on Operations Research and Its Applications (ISORA 10) Chengdu-Jiuzhaigou, China, August 19 23, 2010 Copyright 2010 ORSC & APORC, pp. 526 532 Optimal Production-Inventory

More information

INTER-ORGANIZATIONAL COOPERATIVE INNOVATION OF PROJECT-BASED SUPPLY CHAINS UNDER CONSIDERATION OF MONITORING SIGNALS

INTER-ORGANIZATIONAL COOPERATIVE INNOVATION OF PROJECT-BASED SUPPLY CHAINS UNDER CONSIDERATION OF MONITORING SIGNALS ISSN 176-459 Int j simul model 14 (015) 3, 539-550 Original scientific paper INTER-ORGANIZATIONAL COOPERATIVE INNOVATION OF PROJECT-BASED SUPPLY CHAINS UNDER CONSIDERATION OF MONITORING SIGNALS Wu, G.-D.

More information

Optimal rebalancing of portfolios with transaction costs assuming constant risk aversion

Optimal rebalancing of portfolios with transaction costs assuming constant risk aversion Optimal rebalancing of portfolios with transaction costs assuming constant risk aversion Lars Holden PhD, Managing director t: +47 22852672 Norwegian Computing Center, P. O. Box 114 Blindern, NO 0314 Oslo,

More information

AN ABSTRACT OF THE THESIS OF

AN ABSTRACT OF THE THESIS OF AN ABSTRACT OF THE THESIS OF Pingan Zhu for the degree of Master of Science incomputer Science and Mathematics presented on September 23, 2013. Title: Revenue-Based Spectrum Management Via Markov Decision

More information

Cognitive Interference Management in Retransmission-Based Wireless Networks

Cognitive Interference Management in Retransmission-Based Wireless Networks Cognitive Interference Management in Retransmission-Based Wireless Networks Marco Levorato, Member, IEEE, Urbashi Mitra, Fellow, IEEE, Michele Zorzi, Fellow, IEEE arxiv:1004.0542v3 [cs.it] 22 Nov 2011

More information

ISSN: Guizhen * et al., 6(11): November, 2017] Impact Factor: 4.116

ISSN: Guizhen * et al., 6(11): November, 2017] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY OPTIMIZATION MODEL OF WAVE PROPAGATION IN COMPLEX ENVIRONMENTS Cao Zhi, Lu Guizhen* *Communication University of China DOI: 10.581/zenodo.104066

More information

How Much Competition is a Secondary Market? Online Appendixes (Not for Publication)

How Much Competition is a Secondary Market? Online Appendixes (Not for Publication) How Much Competition is a Secondary Market? Online Appendixes (Not for Publication) Jiawei Chen, Susanna Esteban, and Matthew Shum March 12, 2011 1 The MPEC approach to calibration In calibrating the model,

More information

State Switching in US Equity Index Returns based on SETAR Model with Kalman Filter Tracking

State Switching in US Equity Index Returns based on SETAR Model with Kalman Filter Tracking State Switching in US Equity Index Returns based on SETAR Model with Kalman Filter Tracking Timothy Little, Xiao-Ping Zhang Dept. of Electrical and Computer Engineering Ryerson University 350 Victoria

More information

Dynamic Resource Allocation for Spot Markets in Cloud Computi

Dynamic Resource Allocation for Spot Markets in Cloud Computi Dynamic Resource Allocation for Spot Markets in Cloud Computing Environments Qi Zhang 1, Quanyan Zhu 2, Raouf Boutaba 1,3 1 David. R. Cheriton School of Computer Science University of Waterloo 2 Department

More information

Application of the Collateralized Debt Obligation (CDO) Approach for Managing Inventory Risk in the Classical Newsboy Problem

Application of the Collateralized Debt Obligation (CDO) Approach for Managing Inventory Risk in the Classical Newsboy Problem Isogai, Ohashi, and Sumita 35 Application of the Collateralized Debt Obligation (CDO) Approach for Managing Inventory Risk in the Classical Newsboy Problem Rina Isogai Satoshi Ohashi Ushio Sumita Graduate

More information

A Model of Coverage Probability under Shadow Fading

A Model of Coverage Probability under Shadow Fading A Model of Coverage Probability under Shadow Fading Kenneth L. Clarkson John D. Hobby August 25, 23 Abstract We give a simple analytic model of coverage probability for CDMA cellular phone systems under

More information

Mandatory Social Security Regime, C Retirement Behavior of Quasi-Hyperb

Mandatory Social Security Regime, C Retirement Behavior of Quasi-Hyperb Title Mandatory Social Security Regime, C Retirement Behavior of Quasi-Hyperb Author(s) Zhang, Lin Citation 大阪大学経済学. 63(2) P.119-P.131 Issue 2013-09 Date Text Version publisher URL http://doi.org/10.18910/57127

More information

Sequential Investment, Hold-up, and Strategic Delay

Sequential Investment, Hold-up, and Strategic Delay Sequential Investment, Hold-up, and Strategic Delay Juyan Zhang and Yi Zhang February 20, 2011 Abstract We investigate hold-up in the case of both simultaneous and sequential investment. We show that if

More information

Elif Özge Özdamar T Reinforcement Learning - Theory and Applications February 14, 2006

Elif Özge Özdamar T Reinforcement Learning - Theory and Applications February 14, 2006 On the convergence of Q-learning Elif Özge Özdamar elif.ozdamar@helsinki.fi T-61.6020 Reinforcement Learning - Theory and Applications February 14, 2006 the covergence of stochastic iterative algorithms

More information

Hedging with Life and General Insurance Products

Hedging with Life and General Insurance Products Hedging with Life and General Insurance Products June 2016 2 Hedging with Life and General Insurance Products Jungmin Choi Department of Mathematics East Carolina University Abstract In this study, a hybrid

More information

High Frequency Trading in a Regime-switching Model. Yoontae Jeon

High Frequency Trading in a Regime-switching Model. Yoontae Jeon High Frequency Trading in a Regime-switching Model by Yoontae Jeon A thesis submitted in conformity with the requirements for the degree of Master of Science Graduate Department of Mathematics University

More information

X(t) = B(t), t 0,

X(t) = B(t), t 0, IEOR 4106: Introduction to Operations Research: Stochastic Models Spring 2007, Professor Whitt, Final Exam Chapters 4-7 and 10 in Ross, Wednesday, May 9, 1:10pm-4:00pm Open Book: but only the Ross textbook,

More information

DECISION MAKING. Decision making under conditions of uncertainty

DECISION MAKING. Decision making under conditions of uncertainty DECISION MAKING Decision making under conditions of uncertainty Set of States of nature: S 1,..., S j,..., S n Set of decision alternatives: d 1,...,d i,...,d m The outcome of the decision C ij depends

More information

THe recent explosive growth of wireless networks, with

THe recent explosive growth of wireless networks, with Designing Truthful Spectrum Double Auctions with Local Markets Wei Wang, Student Member, IEEE, Ben Liang, Senior Member, IEEE, and Baochun Li, Senior Member, IEEE Abstract Market-driven spectrum auctions

More information

BEHAVIOUR OF PASSAGE TIME FOR A QUEUEING NETWORK MODEL WITH FEEDBACK: A SIMULATION STUDY

BEHAVIOUR OF PASSAGE TIME FOR A QUEUEING NETWORK MODEL WITH FEEDBACK: A SIMULATION STUDY IJMMS 24:24, 1267 1278 PII. S1611712426287 http://ijmms.hindawi.com Hindawi Publishing Corp. BEHAVIOUR OF PASSAGE TIME FOR A QUEUEING NETWORK MODEL WITH FEEDBACK: A SIMULATION STUDY BIDYUT K. MEDYA Received

More information

Finite-length analysis of the TEP decoder for LDPC ensembles over the BEC

Finite-length analysis of the TEP decoder for LDPC ensembles over the BEC Finite-length analysis of the TEP decoder for LDPC ensembles over the BEC Pablo M. Olmos, Fernando Pérez-Cruz Departamento de Teoría de la Señal y Comunicaciones. Universidad Carlos III in Madrid. email:

More information

A Linear Programming Approach for Optimum Project Scheduling Taking Into Account Overhead Expenses and Tardiness Penalty Function

A Linear Programming Approach for Optimum Project Scheduling Taking Into Account Overhead Expenses and Tardiness Penalty Function A Linear Programming Approach for Optimum Project Scheduling Taking Into Account Overhead Expenses and Tardiness Penalty Function Mohammed Woyeso Geda, Industrial Engineering Department Ethiopian Institute

More information

Measurement of Radio Propagation Path Loss over the Sea for Wireless Multimedia

Measurement of Radio Propagation Path Loss over the Sea for Wireless Multimedia Measurement of Radio Propagation Path Loss over the Sea for Wireless Multimedia Dong You Choi Division of Electronics & Information Engineering, Cheongju University, #36 Naedok-dong, Sangdang-gu, Cheongju-city

More information

Algorithmic and High-Frequency Trading

Algorithmic and High-Frequency Trading LOBSTER June 2 nd 2016 Algorithmic and High-Frequency Trading Julia Schmidt Overview Introduction Market Making Grossman-Miller Market Making Model Trading Costs Measuring Liquidity Market Making using

More information

NUMERICAL METHODS OF PARTIAL INTEGRO-DIFFERENTIAL EQUATIONS FOR OPTION PRICE

NUMERICAL METHODS OF PARTIAL INTEGRO-DIFFERENTIAL EQUATIONS FOR OPTION PRICE Trends in Mathematics - New Series Information Center for Mathematical Sciences Volume 13, Number 1, 011, pages 1 5 NUMERICAL METHODS OF PARTIAL INTEGRO-DIFFERENTIAL EQUATIONS FOR OPTION PRICE YONGHOON

More information

Fairness concept in terms of the utilization Hakyong Kim, Yongtak Lee, and Kiseon Kim Indexing terms: fairness, fairness index In this Letter, we disc

Fairness concept in terms of the utilization Hakyong Kim, Yongtak Lee, and Kiseon Kim Indexing terms: fairness, fairness index In this Letter, we disc Fairness concept in terms of the utilization Hakyong Kim, Yongtak Lee, and Kiseon Kim Indexing terms: fairness, fairness index In this Letter, we discuss the concept of the fairness and dene a fairness

More information

Eindhoven University of Technology BACHELOR. Price directed control of bike sharing systems. van der Schoot, Femke A.

Eindhoven University of Technology BACHELOR. Price directed control of bike sharing systems. van der Schoot, Femke A. Eindhoven University of Technology BACHELOR Price directed control of bike sharing systems van der Schoot, Femke A. Award date: 2017 Link to publication Disclaimer This document contains a student thesis

More information

Growth and Distributional Effects of Inflation with Progressive Taxation

Growth and Distributional Effects of Inflation with Progressive Taxation MPRA Munich Personal RePEc Archive Growth and Distributional Effects of Inflation with Progressive Taxation Fujisaki Seiya and Mino Kazuo Institute of Economic Research, Kyoto University 20. October 2010

More information

Term Structure of Credit Spreads of A Firm When Its Underlying Assets are Discontinuous

Term Structure of Credit Spreads of A Firm When Its Underlying Assets are Discontinuous www.sbm.itb.ac.id/ajtm The Asian Journal of Technology Management Vol. 3 No. 2 (2010) 69-73 Term Structure of Credit Spreads of A Firm When Its Underlying Assets are Discontinuous Budhi Arta Surya *1 1

More information

Lecture 7: Bayesian approach to MAB - Gittins index

Lecture 7: Bayesian approach to MAB - Gittins index Advanced Topics in Machine Learning and Algorithmic Game Theory Lecture 7: Bayesian approach to MAB - Gittins index Lecturer: Yishay Mansour Scribe: Mariano Schain 7.1 Introduction In the Bayesian approach

More information

Department of Social Systems and Management. Discussion Paper Series

Department of Social Systems and Management. Discussion Paper Series Department of Social Systems and Management Discussion Paper Series No.1252 Application of Collateralized Debt Obligation Approach for Managing Inventory Risk in Classical Newsboy Problem by Rina Isogai,

More information

Pricing Problems under the Markov Chain Choice Model

Pricing Problems under the Markov Chain Choice Model Pricing Problems under the Markov Chain Choice Model James Dong School of Operations Research and Information Engineering, Cornell University, Ithaca, New York 14853, USA jd748@cornell.edu A. Serdar Simsek

More information

A Hybrid Importance Sampling Algorithm for VaR

A Hybrid Importance Sampling Algorithm for VaR A Hybrid Importance Sampling Algorithm for VaR No Author Given No Institute Given Abstract. Value at Risk (VaR) provides a number that measures the risk of a financial portfolio under significant loss.

More information

Dynamic Market Making and Asset Pricing

Dynamic Market Making and Asset Pricing Dynamic Market Making and Asset Pricing Wen Chen 1 Yajun Wang 2 1 The Chinese University of Hong Kong, Shenzhen 2 Baruch College Institute of Financial Studies Southwestern University of Finance and Economics

More information

Statistic Microwave Path Loss Modeling in Urban Line-of-Sight Area Using Fuzzy Linear Regression

Statistic Microwave Path Loss Modeling in Urban Line-of-Sight Area Using Fuzzy Linear Regression ICCAS2005 June 2-5, KINTEX, Gyeonggi-Do, Korea Statistic Microwave Path Loss Modeling in Urban Line-of-Sight Area Using Fuzzy Linear Regression SUPACHAI PHAIBOON, PISIT PHOKHARATKUL Faculty of Engineering,

More information

Design of Information Sharing Mechanisms

Design of Information Sharing Mechanisms Design of Information Sharing Mechanisms Krishnamurthy Iyer ORIE, Cornell University Oct 2018, IMA Based on joint work with David Lingenbrink, Cornell University Motivation Many instances in the service

More information

Analytical Option Pricing under an Asymmetrically Displaced Double Gamma Jump-Diffusion Model

Analytical Option Pricing under an Asymmetrically Displaced Double Gamma Jump-Diffusion Model Analytical Option Pricing under an Asymmetrically Displaced Double Gamma Jump-Diffusion Model Advances in Computational Economics and Finance Univerity of Zürich, Switzerland Matthias Thul 1 Ally Quan

More information

Market MicroStructure Models. Research Papers

Market MicroStructure Models. Research Papers Market MicroStructure Models Jonathan Kinlay Summary This note summarizes some of the key research in the field of market microstructure and considers some of the models proposed by the researchers. Many

More information

Sequential Investment, Hold-up, and Strategic Delay

Sequential Investment, Hold-up, and Strategic Delay Sequential Investment, Hold-up, and Strategic Delay Juyan Zhang and Yi Zhang December 20, 2010 Abstract We investigate hold-up with simultaneous and sequential investment. We show that if the encouragement

More information

Continuous time Markov chains (week 9) Solution

Continuous time Markov chains (week 9) Solution Continuous time Markov chains (week 9) Solution 1 Determining the number of channels to provide service in cellular communications. A Departure process. Defining T k as the random time until the next departure

More information

Competition in Private Commons: Price War or Market Sharing?

Competition in Private Commons: Price War or Market Sharing? Competition in Private Commons: Price War or Market Sharing? Emir Kavurmacioglu, Murat Alanyali and David Starobinski Division of Systems Engineering, Department of Electrical Engineering Boston University

More information

Collateralized capital and news-driven cycles. Abstract

Collateralized capital and news-driven cycles. Abstract Collateralized capital and news-driven cycles Keiichiro Kobayashi Research Institute of Economy, Trade, and Industry Kengo Nutahara Graduate School of Economics, University of Tokyo, and the JSPS Research

More information

Singular Stochastic Control Models for Optimal Dynamic Withdrawal Policies in Variable Annuities

Singular Stochastic Control Models for Optimal Dynamic Withdrawal Policies in Variable Annuities 1/ 46 Singular Stochastic Control Models for Optimal Dynamic Withdrawal Policies in Variable Annuities Yue Kuen KWOK Department of Mathematics Hong Kong University of Science and Technology * Joint work

More information

Forecasting Prices in the Presence of Hidden Liquidity

Forecasting Prices in the Presence of Hidden Liquidity Forecasting Prices in the Presence of Hidden Liquidity Marco Avellaneda, Josh Reed & Sasha Stoikov December 14, 2010 Abstract Bid and ask sizes at the top of the order book provide information on short-term

More information

Chapter 6 Money, Inflation and Economic Growth

Chapter 6 Money, Inflation and Economic Growth George Alogoskoufis, Dynamic Macroeconomic Theory, 2015 Chapter 6 Money, Inflation and Economic Growth In the models we have presented so far there is no role for money. Yet money performs very important

More information

A No-Arbitrage Theorem for Uncertain Stock Model

A No-Arbitrage Theorem for Uncertain Stock Model Fuzzy Optim Decis Making manuscript No (will be inserted by the editor) A No-Arbitrage Theorem for Uncertain Stock Model Kai Yao Received: date / Accepted: date Abstract Stock model is used to describe

More information

OPTIMAL PORTFOLIO CONTROL WITH TRADING STRATEGIES OF FINITE

OPTIMAL PORTFOLIO CONTROL WITH TRADING STRATEGIES OF FINITE Proceedings of the 44th IEEE Conference on Decision and Control, and the European Control Conference 005 Seville, Spain, December 1-15, 005 WeA11.6 OPTIMAL PORTFOLIO CONTROL WITH TRADING STRATEGIES OF

More information

The Procyclical Effects of Basel II

The Procyclical Effects of Basel II 9TH JACQUES POLAK ANNUAL RESEARCH CONFERENCE NOVEMBER 13-14, 2008 The Procyclical Effects of Basel II Rafael Repullo CEMFI and CEPR, Madrid, Spain and Javier Suarez CEMFI and CEPR, Madrid, Spain Presented

More information

arxiv: v5 [quant-ph] 16 Oct 2008

arxiv: v5 [quant-ph] 16 Oct 2008 Violation of Equalities in Bipartite Qutrits Systems Hossein Movahhedian Department of Physics, Shahrood University of Technology, Seventh Tir Square, Shahrood, Iran We have recently shown that for the

More information

An Adjusted Trinomial Lattice for Pricing Arithmetic Average Based Asian Option

An Adjusted Trinomial Lattice for Pricing Arithmetic Average Based Asian Option American Journal of Applied Mathematics 2018; 6(2): 28-33 http://www.sciencepublishinggroup.com/j/ajam doi: 10.11648/j.ajam.20180602.11 ISSN: 2330-0043 (Print); ISSN: 2330-006X (Online) An Adjusted Trinomial

More information

Optimally Thresholded Realized Power Variations for Lévy Jump Diffusion Models

Optimally Thresholded Realized Power Variations for Lévy Jump Diffusion Models Optimally Thresholded Realized Power Variations for Lévy Jump Diffusion Models José E. Figueroa-López 1 1 Department of Statistics Purdue University University of Missouri-Kansas City Department of Mathematics

More information

Trinomial Tree. Set up a trinomial approximation to the geometric Brownian motion ds/s = r dt + σ dw. a

Trinomial Tree. Set up a trinomial approximation to the geometric Brownian motion ds/s = r dt + σ dw. a Trinomial Tree Set up a trinomial approximation to the geometric Brownian motion ds/s = r dt + σ dw. a The three stock prices at time t are S, Su, and Sd, where ud = 1. Impose the matching of mean and

More information

Valuation of Exit Strategy under Decaying Abandonment Value

Valuation of Exit Strategy under Decaying Abandonment Value Communications in Mathematical Finance, vol. 4, no., 05, 3-4 ISSN: 4-95X (print version), 4-968 (online) Scienpress Ltd, 05 Valuation of Exit Strategy under Decaying Abandonment Value Ming-Long Wang and

More information

Public Pension Reform in Japan

Public Pension Reform in Japan ECONOMIC ANALYSIS & POLICY, VOL. 40 NO. 2, SEPTEMBER 2010 Public Pension Reform in Japan Akira Okamoto Professor, Faculty of Economics, Okayama University, Tsushima, Okayama, 700-8530, Japan. (Email: okamoto@e.okayama-u.ac.jp)

More information