Image Encryption Using Chaotic Signal and Max Heap Tree

Size: px
Start display at page:

Download "Image Encryption Using Chaotic Signal and Max Heap Tree"

Transcription

1 Image Encrypton Usng Chaotc Sgnal and Max Heap Tree Farborz Mahmoud 1, Rasul Enayatfar 2, and Mohsen Mrzashaer 1 1 Electrcal and Computer Engneerng Department, Islamc Azad Unversty, Qazvn Branch, Iran {Mahmoud,Mrzashaer}@QazvnIAU.ac.r 2 Department of Electrcal and Computer Engneerng, Islamc Azad Unversty, Froozkooh Branch, Iran r.enayatfar@aufb.ac.r Abstract. In ths paper, a new method s proposed for mage encrypton usng chaotc sgnals and Max-Heap tree. In ths method, Max-Heap tree s utlzed for further complexty of the encrypton algorthm, hgher securty and changng the amount of gray scale of each pxel of the orgnal mage. Studyng the obtaned results of the performed experments, hgh resstance of the proposed method aganst brute-force and statstcal nvasons s obvously llustrated. Also, the obtaned entropy of the method whch s about s very close to the deal amount of 8. Keywords: Image Encrypton, Max-Heap Tree, Chaotc Sgnal. 1 Introducton Together wth the rapd rate of multmeda products and vast dstrbuton of dgtal products on nternet, protecton of dgtal nformaton from beng coped, llegal dstrbuton s of great mportance each day. To reach ths goal, varous algorthms have been proposed for mage encrypton [1-4]. Recently, due to the wdespread use of chaotc sgnals n dfferent areas, a consderable number of researchers have focused on these sgnals for mage encrypton [5-9]. One of the most mportant advantages of chaotc sgnals s ther senstvty to the ntal condtons and also ther nose-lke behavor whle beng certan. In [5], the method of movng pxels s proposed for mage encrypton. In [6], an algorthm s proposed whch s based on a key for the encrypton of the mage (CKBA 2 ). In ths method a chaotc sgnal s utlzed to determne the amount of gray scale of the pxels. Later researches have shown that the aforesad method s not secure enough [7]. In ths paper, a new method s proposed for mage encrypton usng chaotc sgnals and Max-Heap tree to make the encrypton algorthm more complex and secure, n whch the mplementaton of Max-Heap tree has caused that, even when the ntal value of the chaotc functon s revealed, the real amount of gray scale of each pxel cannot be accessed. In the followng secton, Max-Heap trees are prmarly ntroduced n bref, and then the proposed method s analyzed. In the expermental results M. Sorell (Ed.): e-forenscs 2009, LNICST 8, pp , ICST Insttute for Computer Scences, Socal Informatcs and Telecommuncatons Engneerng 2009

2 20 F. Mahmoud, R. Enayatfar, and M. Mrzashaer secton, the functonalty of ths method s studed through some experments. The reversblty of the method s studed n the next secton and fnally the conclusons are drawn. 2 Max-Heap Tree One of the specal trees whch s wdely appled n computer scences s Max-Heap tree. Ths tree s a complete bnary tree n whch the ntal value of each node s larger than or equal to the keys of ts chldren. Inserton of nformaton n ths tree s done as: the tree s always flled from left to rght n the last lne and then the next lne. Whle nsertng a new node, t s nserted n the far left empty space of the last lne (not flled yet), so that the tree s always complete. Then the heapfcaton s done, n whch a node n the lowest pont mght be replaced by ts parent as many tmes as t takes to be heapfed. For nstance, n case the nserton of 9 dgts s as 5, 8, 2, 3, 4, 7, 9, 20, 14, the resultng Max-Heap tree s as follows: Fg. 1. Max-Heap Tree 3 Chaotc Sgnal Chaos s a phenomenon that occurs n defnable nonlnear systems whch are hghly senstve to ntal values, and trend to show random-lke behavor. If such systems satsfy the condtons of Lapanov exponental equaton, wll contnue to be n the chaotc mode. The man reason why these sgnals are utlzed n mage encrypton s the defnablty of the system whle beng random-lke; ths caused the output of the system seem random to the nvaders. Snce t s defnable by the encrypter, t s decodable. The advantages of these functons are studed n two parts: a) Senstvty to the ntal value Ths means that mnor varaton of the ntal values can cause consderable dfferences n the next value of the functon, that s when the ntal sgnals vares a lttle, the resultng sgnal wll dffer sgnfcantly.

3 Image Encrypton Usng Chaotc Sgnal and Max Heap Tree 21 b) Random-lke behavor In comparson wth the generators of ordnary random numbers, n whch the seres of generated random numbers are capable of regeneraton, the random-numbergeneraton methods utlzed n chaotc functon algorthms are able to regenerate the same random numbers, havng the ntal value and the transform functon. Eq. (1) s one of the most well-known sgnals to have random-lke behavor and s known as Logstc Map Sgnal. ( ) X n+ 1 = rx n 1 X n (1) The Logstc Map sgnal wll have a chaotc behavor n case the ntal value s X 0 ( 0,1) and r = In fg. 2, the sgnal behavor wth ntal value s X 0 = 0. 5 and r = can be seen. The nput of the system s the scanned mage of several dfferent persons handwrtng of 26 Englsh captal letters. Fgure 2 represents sample dfferent handwrtten letters. Fg. 2. The chaotc behavor of sgnal (1) n ts 500 teratons 4 The Proposed Method In ths method, a bnary Max-Heap tree s made by non-repettve random numbers from 0 to 255, wth random order, generated by the chaotc functon of Logstc Map. Ths functon needs an ntal value to start out. To ncrease the level securty, an 80- bt key s used to generate the ntal value of the sgnal (Eq. (1)). Ths key can be defned as an ASCII character of the form: K0, K1,..., K9( ASCII ) (2) In ths key, K determnes an 8-bt block of the key. The bnary form of the mentoned key s as follows:

4 22 F. Mahmoud, R. Enayatfar, and M. Mrzashaer K01, K02, K03, K04, K05, K06, K07 K = K08,..., K91, K92, K 93 K, K, K, K, K,( Bnary) (3) The ntal value s resulted by Eq. (4). X K K K K = / 2... K 2 + K n7 n8 80 (4) On the other hand and as seen n fg. 2, the varaton range of the sgnal s [0,1].Ths range s dvde nto P parts whose sze s determnes by: ε = 1/ P (5) Based on ths segmentaton, the range of the th part s determned by: (( 1 ) ε, ε) (6) In ths method, P s 256 (the number of gray scales). In the followng part, the range n whch X 1 that s generated by Eq. (1) and the ntal value of X 0, wll be determned. The number of ths range s chosen as the frst order, provded that ths amount was not prevously located n the range; ths wll contnue as long as the sgnal magntude s located n all P parts. Fnally, non-repettve random order wll be generated n the range of (0,255) as: ( ) Iteraton = t1, t2,..., tr (7) Now, the frst value of the teraton wll be put nto the root and the second one (based on the Max-Heap tree structure) n the tree; ths wll contnue as long as all the numbers have flled the tree. Fnally, a bnary Max-Heap tree of 256 nodes wll be generated n each node of whch there s a unque number from 0 to 255. Ths tree s used to change the gray scale of the mage pxels. In the nest stage, 50 percent of the pxels of the frst row of the mage are selected by the use of Eq. (1), Eq. (2) (p=the mage wdth) and the ntal value of X r (the last number generated by the chaotc sgnal n the last stage). The root of the tree generated n the prevous stage replaces the frst pxel of the next lne. Knowng the tree structure, the chldren of the each node of the tree are put n a separate pxel of the mage. Then, the value of each node s xored wth the value of the pxel t s n. Ths wll contnue up to the last lne. In ths stage, three ponts are of great mportance: a) The poston of the chldren of a node on the pxel s ths way: f the node s n the poston (x,y) of the mage, the left-hand-sde chld s at (x+1,y-1) and the rghthand-sde chld s at (x+1,y+1).

5 Image Encrypton Usng Chaotc Sgnal and Max Heap Tree 23 b) In a pxel whch contans more than one node, the value of all nodes and the value of the pxel are xored wth each other (together) (nodes 15 and 10 n fgs. 3a and 3b). c) The mage s assumed to be a node. Fgs. 3a and 3b are examples of the proposed method, n whch a 4 4 mage and a Max-Heap tree of 6 nodes are consdered. In fg. 3b, by nsertng the root on pxel 2 and assumng the mage to be sphercal, node 3 wll be placed on pxel 12. Fg. 3. (a) The root s located n pxel 7. (b) The root s located n pxel 2. 5 Expermental Result A proper encrypton method must be resstance and secure to varous types of nvason, such as cryptanalytc nvasons, statstcal nvasons and brute-force nvasons. In ths secton, besdes the effcency of the proposed method, t s studed n terms of statstcal and senstvty analyses, n case of key changes. The results show that the method stands a hgh securty level aganst varous types of nvasons. 5.1 Hstogram Analyss Hstogram shows the numbers of pxels n each gray scale of an mage. In fg. 4, the orgnal mage s seen n frame (a) and the hstogram of the mage n red, green and blue scales are seen n frames (b), (c) and (d), respectvely. Also, n frame (e), the encrypted mage (usng key ABCDEF ABCD n a 16-scale) can be seen. In frames (f), (g) and (h), the hstogram of the encrypted mage n red, green and blue scales can be seen, respectvely. As seen n fg. 4, the hstogram of the encrypted mage s totally dfferent from that of the orgnal one, whch restrcts the possblty of statstcal nvasons.

6 24 F. Mahmoud, R. Enayatfar, and M. Mrzashaer Fg. 4. (a) the man mage, and (b), (c) and (d) respectvely show the hstogram of the lena mage of sze n red, green and blue scales, and (e) shows the encrypted mage usng the key, ABCDEF ABCD n a 16-scale. (f), (g) and (h) show the hstogram of the encrypted mage n red, green and blue scales. 5.2 Correlaton Coeffcent Analyss Statstcal analyss has been performed on the proposed mage encrypton algorthm. Ths s shown by a test of the correlaton between two adjacent pxels n plan mage and cphered mage. We randomly select 1000 pars of two-adjacent pxels (n vertcal, horzontal, and dagonal drecton) from plan mages and cphered mages, and calculate the correlaton coeffcents, respectvely by usng the followng two formulas (see table1 and Fg. 5(a) and (b)): where, cov 1 N N =1 ( x, y) = ( x E( x ))( y E( y )) r xy ( xy) ( ) D( y) cov, D x = (8) E 1 N N = 1 1 N N = 1 ( x) = x, D( x) = ( x E( x )). 2

7 Image Encrypton Usng Chaotc Sgnal and Max Heap Tree 25 Here, E(x) s the estmaton of mathematcal expectatons of x, D(x) s the estmaton of varance of x, and cov(x, y) s the estmaton of covarance between x and y, where x and y are grey-scale values of two adjacent pxels n the mage. Fg. 5. (a) Correlaton analyss of plan mage; (b) Correlaton analyss of cphered mage Table 1. Correlaton coeffcent of two adjacent pxels n two mages Plan Cphered Horzontal Vertcal Dagonal Plan Cphered Informaton Entropy Analyss The entropy s the most outstandng feature of the randomness [13]. Informaton theory s a mathematcal theory of data communcaton and storage founded by Claude E. Shannon n 1949 [14]. There s a well-known formula for calculatng ths entropy: 2N 1 1 = log = 0 Ps ( ) P( s ) H S (9) where P (s) represents the probablty of symbol s and the entropy s expressed n bts. Actually, gven that a real nformaton source seldom transmts random messages, n general, the entropy value of the source s smaller than the deal one. However, when these messages are encrypted, ther deal entropy should be 8. If the output of such a cpher emts symbols wth an entropy of less than 8, then, there would be a possblty of predctablty whch threatens ts securty. The value obtaned s very close to the theoretcal value 8. Ths means that nformaton leakage n the encrypton process s neglgble and the encrypton system s secure aganst the entropy attack. Usng the above-mentoned formula, we have got the entropy H(S) = , for the source s= 256. ( )

8 26 F. Mahmoud, R. Enayatfar, and M. Mrzashaer 5.4 Key Space Analyss In a proper method, key should have enough space so that the method s resstant aganst brute-force nvasons. In the proposed method, there can be 2 80 ( ) dfferent combnatons of keys. Scentfc results have shown that ths number of key combnatons s suffcent for a proper resstance aganst brute-force nvasons. 5.5 Key Senstvty Analyss In fg. 6b, the encrypton of the mage for fg. 6a, usng the encrypton key of ABCDEF ABCD s seen. The encrypton of the same mage s also done usng the keys BBCDEF ABCD and ABCDEF ABCE, respectvely seen n fgs. 6c and 6d. Fg. 6. The result of mage encrypton for an mage (fg. 6a): usng the encrypton key of ABCDEF ABCD n 7b, the encrypton keys BBCDEF ABCD and ABCDEF ABCE, respectvely seen n 7c and 7d In order to compare the obtaned results, the average of correlaton coeffcent (horzontal, vertcal and dagonal) of some specfc ponts s calculated for each par of encrypted mages (table 2). The obtaned results show that ths method s senstve to even small changes of the key. For nstance, the effect of the change n a pxel of the orgnal mage on the encrypted mage was measured usng two standards of NPCR and UACI [10,11]; NPCR s defned as the varance rate of pxels n the encrypted mage caused by the change of a sngle pxel n the orgnal mage. UACI s also defned as the average of these changes. These two standards are as follows: D (, j) j NPCR = 100% W H 1 C1(, j) C2(, j) UACI = 100% W H, j 255 where H and W are respectvely the length and wdth of the mages, and C 1 and C 2 are two encrypted mages of two mages whch are dfferent n one pxel. D s defned as: (10)

9 Image Encrypton Usng Chaotc Sgnal and Max Heap Tree 27 1 f C1 = D(, j) = 0 otherwse (, j) C (, j) The obtaned values of an mage wth the sze are as follows: NPCR=0.9952%, UACI=0.339% The value obtaned n table 2 clearly shows that ths method s resstant to dfferental attacks. 2 Table 2. The average of correlaton coeffcent (horzontal, vertcal and dagonal) of some specfc ponts for each par of the mages encrypted mage-fg 6b and 6c 6c and 6d 6b and 6d correlaton coeffcent Decodng an Encrypted Image One of the vtaltes of an mage encrypton method s ts reversblty of the encrypted mage to the orgnal one. Usng the proposed method, decodng an encrypted mage takes place as follows: As mentoned n secton 3, one of the sgnfcant propertes of chaotc functons s that, havng the ntal value and the transform functon, the seres of the numbers generated by the functon can be regenerated. In ths paper, havng the key, the ntal value of the chaotc functon can be generated; therefore, the requred seres of numbers for the generaton of Max-Heap tree s provded. Then, the last generated value by the chaotc functon of the prevous stage s used to choose the frst pxel of the frst lne. Unlke the encrypton method, the tree s not transformed on the chosen pxel; nstead, the poston of the pxel s saved n the PosPxel seres. Then the poston of the second pxel of the frst lne s determned by the chaotc functon. Thereby, the poston of half of the pxels of the frst lne s saved n PosPxel. Ths wll contnue through the last lne, where the followng seres s produced: n ( 1,1), ( 1,2 ),..., 1, 2 n ( 2,1), ( 2,2),..., 2, PosPxel = n ( n,1), ( n,2),..., n, 2 n n 2 In PosPxel, n each element of j, I determnes the row number and j the normalzed form of the frst generated number by the Logstc Map n the range of [0,n]. In the next step, the pxel n the poston of the last value of PosPxel, (n, n/2), s used as the frst pxel to be transformed and gone under Xor operaton (as explaned

10 28 F. Mahmoud, R. Enayatfar, and M. Mrzashaer n secton 4). Ths wll contnue up to the frst value of the PosPxel seres, (1, 1). And fnally, the decoded mage s regenerated. 7 Concluson In ths paper, a new method of mage encrypton has been proposed, whch utlzes chaotc sgnals and the Max-Heap tree for hgher complexty. As seen n the expermental results, ths method shows a very proper stablty aganst dfferent types of nvasons such as decodng nvasons, statstcal nvasons and brute-force ones. The hgh entropy of the method (7.9931) shows the capabltes of the proposed method. References 1. Mtra, A., Subba Rao, Y.V., Prasanna, S.R.M.: A New Image Encrypton Approach usng Combnatonal Permutaton Technques. Internatonal Journal of Computer Scence, (2006) 2. Chang, C.-C., Yu, T.-X.: Cryptanalyss of an encrypton scheme for bnary mages. Pattern Recognton Letters, (2002) 3. Josh, M., Chandrashaker, Sngh, K.: Color mage encrypton and decrypton usng fractonal Fourer transform. Optcs Communcatons, (2007) 4. Roterman, Y., Porat, M.: Color mage codng usng regonal correlaton of prmary colors. Image and Vson Computng, (2007) 5. Alsultanny, Y.A.: Random-bt sequence generaton from mage data. Image and Vson Computng, (2007) 6. Yen, J.-C., Guo, J.-I.: A New Chaotc Key-Based Desgn for Image Encrypton and Decrypton. In: Proceedngs IEEE Internatonal Conference on Crcuts and Systems, vol. 4, pp (2000) 7. L, S., Zheng, X.: Cryptanalyss of a Chaotc Image Encrypton Method. In: Proceedngs IEEE Internatonal Symposum on Crcuts and Systems, Scottsdale, AZ, USA, vol. 2, pp (2002) 8. Kwok, H.S., Tang, W.K.S.: A fast mage encrypton system based on chaotc maps wth fnte precson representaton. In: Chaos, Soltons and Fractals, pp (2007) 9. Behna, S., Akhshan, A., Ahadpour, S., Mahmod, H., Akhavan, A.: A fast chaotc encrypton scheme based on pecewse nonlnear chaotc maps. Physcs Letters A, (2007) 10. Chen, G., Mao, Y.B., Chu, C.K.: A symmetrc mage encrypton scheme based on 3D chaotc cat maps. In: Chaos, Soltons & Fractals, pp (2004) 11. Mao, Y.B., Chen, G., Lan, S.G.: A novel fast mage encrypton scheme based on the 3D chaotc baker map. In: Int. Bfurcat Chaos, pp (2004) 12. Pareek, N.K., Patdar, V., Sud, K.K.: Image encrypton usng chaotc logstc map. Image and Vson Computng, (2006) 13. Young, L.-S.: In: Branner, B., Hjorth, P. (eds.): NATO ASI Seres, p Kluwer Academc Publshers, Dordrecht (1995) 14. Shannon, C.E.: Bell Syst. Tech. J. 28, 656 (1949)

Department of Mathematics, Shantou University, Shantou, Guangdong, , China.

Department of Mathematics, Shantou University, Shantou, Guangdong, , China. 205 Internatonal Conference on Computer Scence and Communcaton Engneerng (CSCE 205) ISN: 978--60595-249-9 A Novel Color Image Encrypton Scheme ased on Permutaton-substtuton Archtecture Ru-Song Ye,a, Mng

More information

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,

More information

Kayhan CELİK. Erol KURT. x ' ay ax. y ' xz rx y. z ' xy bz

Kayhan CELİK. Erol KURT. x ' ay ax. y ' xz rx y. z ' xy bz ECAI 216 - Internatonal Conference 8th Edton Electroncs, Computers and Artfcal Intellgence 3 June -2 July, 216, Bucharest, ROMÂIA A ew Image Encrypton Algorthm Based on Lorenz System Kayhan CELİK Gaz Unversty,

More information

An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems

An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems I. J. Computer Network and Informaton Securty 5 5 5-33 Publshed Onlne Aprl 5 n MECS (http://www.mecs-press.org/) DOI:.585/jcns.5.5.4 An Image Encrypton Scheme Based on Hybrd Orbt of Hyper-chaotc Systems

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Introduction to Information Theory, Data Compression,

Introduction to Information Theory, Data Compression, Introducton to Informaton Theory, Data Compresson, Codng Mehd Ibm Brahm, Laura Mnkova Aprl 5, 208 Ths s the augmented transcrpt of a lecture gven by Luc Devroye on the 3th of March 208 for a Data Structures

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

Improvement of Histogram Equalization for Minimum Mean Brightness Error

Improvement of Histogram Equalization for Minimum Mean Brightness Error Proceedngs of the 7 WSEAS Int. Conference on Crcuts, Systems, Sgnal and elecommuncatons, Gold Coast, Australa, January 7-9, 7 3 Improvement of Hstogram Equalzaton for Mnmum Mean Brghtness Error AAPOG PHAHUA*,

More information

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

Faster Image Encryption: A Semi-Tensor Product Approach

Faster Image Encryption: A Semi-Tensor Product Approach 207 Internatonal Conference on Computer Scence and Applcaton Engneerng (CSAE 207) ISBN: 978--60595-505-6 Faster Image Encrypton: A Sem-Tensor Product Approach Shpng Ye, Jnmng Wang *, Zhenyu Xu and Chaoxang

More information

Parameter Estimation for Dynamic System using Unscented Kalman filter

Parameter Estimation for Dynamic System using Unscented Kalman filter Parameter Estmaton for Dynamc System usng Unscented Kalman flter Jhoon Seung 1,a, Amr Atya F. 2,b, Alexander G.Parlos 3,c, and Klto Chong 1,4,d* 1 Dvson of Electroncs Engneerng, Chonbuk Natonal Unversty,

More information

3) Surrogate Responses

3) Surrogate Responses 1) Introducton Vsual neurophysology has benefted greatly for many years through the use of smple, controlled stmul lke bars and gratngs. One common characterzaton of the responses elcted by these stmul

More information

Global Sensitivity. Tuesday 20 th February, 2018

Global Sensitivity. Tuesday 20 th February, 2018 Global Senstvty Tuesday 2 th February, 28 ) Local Senstvty Most senstvty analyses [] are based on local estmates of senstvty, typcally by expandng the response n a Taylor seres about some specfc values

More information

EGR 544 Communication Theory

EGR 544 Communication Theory EGR 544 Communcaton Theory. Informaton Sources Z. Alyazcoglu Electrcal and Computer Engneerng Department Cal Poly Pomona Introducton Informaton Source x n Informaton sources Analog sources Dscrete sources

More information

DETERMINATION OF TEMPERATURE DISTRIBUTION FOR ANNULAR FINS WITH TEMPERATURE DEPENDENT THERMAL CONDUCTIVITY BY HPM

DETERMINATION OF TEMPERATURE DISTRIBUTION FOR ANNULAR FINS WITH TEMPERATURE DEPENDENT THERMAL CONDUCTIVITY BY HPM Ganj, Z. Z., et al.: Determnaton of Temperature Dstrbuton for S111 DETERMINATION OF TEMPERATURE DISTRIBUTION FOR ANNULAR FINS WITH TEMPERATURE DEPENDENT THERMAL CONDUCTIVITY BY HPM by Davood Domr GANJI

More information

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING N. Phanthuna 1,2, F. Cheevasuvt 2 and S. Chtwong 2 1 Department of Electrcal Engneerng, Faculty of Engneerng Rajamangala

More information

Robust Image Encryption Based on Balanced Cellular Automaton and Pixel Separation

Robust Image Encryption Based on Balanced Cellular Automaton and Pixel Separation 548 D. TRALIC, S. GRGIC, ROBUST IMAGE ENCRYPTION BASED ON BALANCED CA AND PIXEL SEPARATION Robust Image Encrypton Based on Balanced Cellular Automaton and Pxel Separaton Djana TRALIC, Sonja GRGIC Dept.

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Adiabatic Sorption of Ammonia-Water System and Depicting in p-t-x Diagram

Adiabatic Sorption of Ammonia-Water System and Depicting in p-t-x Diagram Adabatc Sorpton of Ammona-Water System and Depctng n p-t-x Dagram J. POSPISIL, Z. SKALA Faculty of Mechancal Engneerng Brno Unversty of Technology Techncka 2, Brno 61669 CZECH REPUBLIC Abstract: - Absorpton

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

Lossy Compression. Compromise accuracy of reconstruction for increased compression.

Lossy Compression. Compromise accuracy of reconstruction for increased compression. Lossy Compresson Compromse accuracy of reconstructon for ncreased compresson. The reconstructon s usually vsbly ndstngushable from the orgnal mage. Typcally, one can get up to 0:1 compresson wth almost

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

A new Approach for Solving Linear Ordinary Differential Equations

A new Approach for Solving Linear Ordinary Differential Equations , ISSN 974-57X (Onlne), ISSN 974-5718 (Prnt), Vol. ; Issue No. 1; Year 14, Copyrght 13-14 by CESER PUBLICATIONS A new Approach for Solvng Lnear Ordnary Dfferental Equatons Fawz Abdelwahd Department of

More information

Regularized Discriminant Analysis for Face Recognition

Regularized Discriminant Analysis for Face Recognition 1 Regularzed Dscrmnant Analyss for Face Recognton Itz Pma, Mayer Aladem Department of Electrcal and Computer Engneerng, Ben-Guron Unversty of the Negev P.O.Box 653, Beer-Sheva, 845, Israel. Abstract Ths

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family IOSR Journal of Mathematcs IOSR-JM) ISSN: 2278-5728. Volume 3, Issue 3 Sep-Oct. 202), PP 44-48 www.osrjournals.org Usng T.O.M to Estmate Parameter of dstrbutons that have not Sngle Exponental Famly Jubran

More information

j) = 1 (note sigma notation) ii. Continuous random variable (e.g. Normal distribution) 1. density function: f ( x) 0 and f ( x) dx = 1

j) = 1 (note sigma notation) ii. Continuous random variable (e.g. Normal distribution) 1. density function: f ( x) 0 and f ( x) dx = 1 Random varables Measure of central tendences and varablty (means and varances) Jont densty functons and ndependence Measures of assocaton (covarance and correlaton) Interestng result Condtonal dstrbutons

More information

arxiv: v2 [cs.cr] 29 Sep 2016

arxiv: v2 [cs.cr] 29 Sep 2016 Internatonal Journal of Bfurcaton and Chaos c World Scentfc Publshng Company Breakng a chaotc mage encrypton algorthm based on modulo addton and XOR operaton arxv:107.6536v [cs.cr] 9 Sep 016 Chengqng L

More information

Amusing Properties of Odd Numbers Derived From Valuated Binary Tree

Amusing Properties of Odd Numbers Derived From Valuated Binary Tree IOSR Journal of Mathematcs (IOSR-JM) e-iss: 78-578, p-iss: 19-765X. Volume 1, Issue 6 Ver. V (ov. - Dec.016), PP 5-57 www.osrjournals.org Amusng Propertes of Odd umbers Derved From Valuated Bnary Tree

More information

arxiv:cs.cv/ Jun 2000

arxiv:cs.cv/ Jun 2000 Correlaton over Decomposed Sgnals: A Non-Lnear Approach to Fast and Effectve Sequences Comparson Lucano da Fontoura Costa arxv:cs.cv/0006040 28 Jun 2000 Cybernetc Vson Research Group IFSC Unversty of São

More information

Odd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits

Odd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits Watcharn Jantanate, Peter A. Chayasena, Sarawut Sutorn Odd/Even Scroll Generaton wth Inductorless Chua s and Wen Brdge Oscllator Crcuts Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * School

More information

Microwave Diversity Imaging Compression Using Bioinspired

Microwave Diversity Imaging Compression Using Bioinspired Mcrowave Dversty Imagng Compresson Usng Bonspred Neural Networks Youwe Yuan 1, Yong L 1, Wele Xu 1, Janghong Yu * 1 School of Computer Scence and Technology, Hangzhou Danz Unversty, Hangzhou, Zhejang,

More information

The equation of motion of a dynamical system is given by a set of differential equations. That is (1)

The equation of motion of a dynamical system is given by a set of differential equations. That is (1) Dynamcal Systems Many engneerng and natural systems are dynamcal systems. For example a pendulum s a dynamcal system. State l The state of the dynamcal system specfes t condtons. For a pendulum n the absence

More information

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

Week3, Chapter 4. Position and Displacement. Motion in Two Dimensions. Instantaneous Velocity. Average Velocity

Week3, Chapter 4. Position and Displacement. Motion in Two Dimensions. Instantaneous Velocity. Average Velocity Week3, Chapter 4 Moton n Two Dmensons Lecture Quz A partcle confned to moton along the x axs moves wth constant acceleraton from x =.0 m to x = 8.0 m durng a 1-s tme nterval. The velocty of the partcle

More information

Homework Assignment 3 Due in class, Thursday October 15

Homework Assignment 3 Due in class, Thursday October 15 Homework Assgnment 3 Due n class, Thursday October 15 SDS 383C Statstcal Modelng I 1 Rdge regresson and Lasso 1. Get the Prostrate cancer data from http://statweb.stanford.edu/~tbs/elemstatlearn/ datasets/prostate.data.

More information

NON-CENTRAL 7-POINT FORMULA IN THE METHOD OF LINES FOR PARABOLIC AND BURGERS' EQUATIONS

NON-CENTRAL 7-POINT FORMULA IN THE METHOD OF LINES FOR PARABOLIC AND BURGERS' EQUATIONS IJRRAS 8 (3 September 011 www.arpapress.com/volumes/vol8issue3/ijrras_8_3_08.pdf NON-CENTRAL 7-POINT FORMULA IN THE METHOD OF LINES FOR PARABOLIC AND BURGERS' EQUATIONS H.O. Bakodah Dept. of Mathematc

More information

A Fast Fractal Image Compression Algorithm Using Predefined Values for Contrast Scaling

A Fast Fractal Image Compression Algorithm Using Predefined Values for Contrast Scaling Proceedngs of the World Congress on Engneerng and Computer Scence 007 WCECS 007, October 4-6, 007, San Francsco, USA A Fast Fractal Image Compresson Algorthm Usng Predefned Values for Contrast Scalng H.

More information

Scroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator

Scroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator Latest Trends on Crcuts, Systems and Sgnals Scroll Generaton wth Inductorless Chua s Crcut and Wen Brdge Oscllator Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * Abstract An nductorless Chua

More information

Generalized Linear Methods

Generalized Linear Methods Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set

More information

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests Smulated of the Cramér-von Mses Goodness-of-Ft Tests Steele, M., Chaselng, J. and 3 Hurst, C. School of Mathematcal and Physcal Scences, James Cook Unversty, Australan School of Envronmental Studes, Grffth

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Wreless Informaton Transmsson System Lab. Chapter 7 Channel Capacty and Codng Insttute of Communcatons Engneerng atonal Sun Yat-sen Unversty Contents 7. Channel models and channel capacty 7.. Channel models

More information

Statistics Chapter 4

Statistics Chapter 4 Statstcs Chapter 4 "There are three knds of les: les, damned les, and statstcs." Benjamn Dsrael, 1895 (Brtsh statesman) Gaussan Dstrbuton, 4-1 If a measurement s repeated many tmes a statstcal treatment

More information

Appendix B: Resampling Algorithms

Appendix B: Resampling Algorithms 407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

An Improved multiple fractal algorithm

An Improved multiple fractal algorithm Advanced Scence and Technology Letters Vol.31 (MulGraB 213), pp.184-188 http://dx.do.org/1.1427/astl.213.31.41 An Improved multple fractal algorthm Yun Ln, Xaochu Xu, Jnfeng Pang College of Informaton

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

RELIABILITY ASSESSMENT

RELIABILITY ASSESSMENT CHAPTER Rsk Analyss n Engneerng and Economcs RELIABILITY ASSESSMENT A. J. Clark School of Engneerng Department of Cvl and Envronmental Engneerng 4a CHAPMAN HALL/CRC Rsk Analyss for Engneerng Department

More information

Transform Coding. Transform Coding Principle

Transform Coding. Transform Coding Principle Transform Codng Prncple of block-wse transform codng Propertes of orthonormal transforms Dscrete cosne transform (DCT) Bt allocaton for transform coeffcents Entropy codng of transform coeffcents Typcal

More information

Transfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system

Transfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system Transfer Functons Convenent representaton of a lnear, dynamc model. A transfer functon (TF) relates one nput and one output: x t X s y t system Y s The followng termnology s used: x y nput output forcng

More information

Analysis of the Magnetomotive Force of a Three-Phase Winding with Concentrated Coils and Different Symmetry Features

Analysis of the Magnetomotive Force of a Three-Phase Winding with Concentrated Coils and Different Symmetry Features Analyss of the Magnetomotve Force of a Three-Phase Wndng wth Concentrated Cols and Dfferent Symmetry Features Deter Gerlng Unversty of Federal Defense Munch, Neubberg, 85579, Germany Emal: Deter.Gerlng@unbw.de

More information

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method

More information

Tutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant

Tutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant Tutoral 2 COMP434 ometrcs uthentcaton Jun Xu, Teachng sstant csjunxu@comp.polyu.edu.hk February 9, 207 Table of Contents Problems Problem : nswer the questons Problem 2: Power law functon Problem 3: Convoluton

More information

/ n ) are compared. The logic is: if the two

/ n ) are compared. The logic is: if the two STAT C141, Sprng 2005 Lecture 13 Two sample tests One sample tests: examples of goodness of ft tests, where we are testng whether our data supports predctons. Two sample tests: called as tests of ndependence

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

Nodal analysis of finite square resistive grids and the teaching effectiveness of students projects

Nodal analysis of finite square resistive grids and the teaching effectiveness of students projects 2 nd World Conference on Technology and Engneerng Educaton 2 WIETE Lublana Slovena 5-8 September 2 Nodal analyss of fnte square resstve grds and the teachng effectveness of students proects P. Zegarmstrz

More information

BOOTSTRAP METHOD FOR TESTING OF EQUALITY OF SEVERAL MEANS. M. Krishna Reddy, B. Naveen Kumar and Y. Ramu

BOOTSTRAP METHOD FOR TESTING OF EQUALITY OF SEVERAL MEANS. M. Krishna Reddy, B. Naveen Kumar and Y. Ramu BOOTSTRAP METHOD FOR TESTING OF EQUALITY OF SEVERAL MEANS M. Krshna Reddy, B. Naveen Kumar and Y. Ramu Department of Statstcs, Osmana Unversty, Hyderabad -500 007, Inda. nanbyrozu@gmal.com, ramu0@gmal.com

More information

Grid Generation around a Cylinder by Complex Potential Functions

Grid Generation around a Cylinder by Complex Potential Functions Research Journal of Appled Scences, Engneerng and Technolog 4(): 53-535, 0 ISSN: 040-7467 Mawell Scentfc Organzaton, 0 Submtted: December 0, 0 Accepted: Januar, 0 Publshed: June 0, 0 Grd Generaton around

More information

EEE 241: Linear Systems

EEE 241: Linear Systems EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they

More information

Chapter 13: Multiple Regression

Chapter 13: Multiple Regression Chapter 13: Multple Regresson 13.1 Developng the multple-regresson Model The general model can be descrbed as: It smplfes for two ndependent varables: The sample ft parameter b 0, b 1, and b are used to

More information

Recover plaintext attack to block ciphers

Recover plaintext attack to block ciphers Recover plantext attac to bloc cphers L An-Png Bejng 100085, P.R.Chna apl0001@sna.com Abstract In ths paper, we wll present an estmaton for the upper-bound of the amount of 16-bytes plantexts for Englsh

More information

Comparison of Regression Lines

Comparison of Regression Lines STATGRAPHICS Rev. 9/13/2013 Comparson of Regresson Lnes Summary... 1 Data Input... 3 Analyss Summary... 4 Plot of Ftted Model... 6 Condtonal Sums of Squares... 6 Analyss Optons... 7 Forecasts... 8 Confdence

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

Chapter 11: Simple Linear Regression and Correlation

Chapter 11: Simple Linear Regression and Correlation Chapter 11: Smple Lnear Regresson and Correlaton 11-1 Emprcal Models 11-2 Smple Lnear Regresson 11-3 Propertes of the Least Squares Estmators 11-4 Hypothess Test n Smple Lnear Regresson 11-4.1 Use of t-tests

More information

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification Desgn Project Specfcaton Medan Flter Department of Electrcal & Electronc Engneeng Imperal College London E4.20 Dgtal IC Desgn Medan Flter Project Specfcaton A medan flter s used to remove nose from a sampled

More information

Motion Perception Under Uncertainty. Hongjing Lu Department of Psychology University of Hong Kong

Motion Perception Under Uncertainty. Hongjing Lu Department of Psychology University of Hong Kong Moton Percepton Under Uncertanty Hongjng Lu Department of Psychology Unversty of Hong Kong Outlne Uncertanty n moton stmulus Correspondence problem Qualtatve fttng usng deal observer models Based on sgnal

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng

More information

Error Probability for M Signals

Error Probability for M Signals Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal

More information

Uncertainty and auto-correlation in. Measurement

Uncertainty and auto-correlation in. Measurement Uncertanty and auto-correlaton n arxv:1707.03276v2 [physcs.data-an] 30 Dec 2017 Measurement Markus Schebl Federal Offce of Metrology and Surveyng (BEV), 1160 Venna, Austra E-mal: markus.schebl@bev.gv.at

More information

Operating conditions of a mine fan under conditions of variable resistance

Operating conditions of a mine fan under conditions of variable resistance Paper No. 11 ISMS 216 Operatng condtons of a mne fan under condtons of varable resstance Zhang Ynghua a, Chen L a, b, Huang Zhan a, *, Gao Yukun a a State Key Laboratory of Hgh-Effcent Mnng and Safety

More information

2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period

2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period -Adc Comlexty of a Seuence Obtaned from a Perodc Bnary Seuence by Ether Insertng or Deletng Symbols wthn One Perod ZHAO Lu, WEN Qao-yan (State Key Laboratory of Networng and Swtchng echnology, Bejng Unversty

More information

Research Article Green s Theorem for Sign Data

Research Article Green s Theorem for Sign Data Internatonal Scholarly Research Network ISRN Appled Mathematcs Volume 2012, Artcle ID 539359, 10 pages do:10.5402/2012/539359 Research Artcle Green s Theorem for Sgn Data Lous M. Houston The Unversty of

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

Suppose that there s a measured wndow of data fff k () ; :::; ff k g of a sze w, measured dscretely wth varable dscretzaton step. It s convenent to pl

Suppose that there s a measured wndow of data fff k () ; :::; ff k g of a sze w, measured dscretely wth varable dscretzaton step. It s convenent to pl RECURSIVE SPLINE INTERPOLATION METHOD FOR REAL TIME ENGINE CONTROL APPLICATIONS A. Stotsky Volvo Car Corporaton Engne Desgn and Development Dept. 97542, HA1N, SE- 405 31 Gothenburg Sweden. Emal: astotsky@volvocars.com

More information

UNIVERSITY OF TORONTO Faculty of Arts and Science. December 2005 Examinations STA437H1F/STA1005HF. Duration - 3 hours

UNIVERSITY OF TORONTO Faculty of Arts and Science. December 2005 Examinations STA437H1F/STA1005HF. Duration - 3 hours UNIVERSITY OF TORONTO Faculty of Arts and Scence December 005 Examnatons STA47HF/STA005HF Duraton - hours AIDS ALLOWED: (to be suppled by the student) Non-programmable calculator One handwrtten 8.5'' x

More information

Introduction to information theory and data compression

Introduction to information theory and data compression Introducton to nformaton theory and data compresson Adel Magra, Emma Gouné, Irène Woo March 8, 207 Ths s the augmented transcrpt of a lecture gven by Luc Devroye on March 9th 207 for a Data Structures

More information

A New Evolutionary Computation Based Approach for Learning Bayesian Network

A New Evolutionary Computation Based Approach for Learning Bayesian Network Avalable onlne at www.scencedrect.com Proceda Engneerng 15 (2011) 4026 4030 Advanced n Control Engneerng and Informaton Scence A New Evolutonary Computaton Based Approach for Learnng Bayesan Network Yungang

More information

Department of Statistics University of Toronto STA305H1S / 1004 HS Design and Analysis of Experiments Term Test - Winter Solution

Department of Statistics University of Toronto STA305H1S / 1004 HS Design and Analysis of Experiments Term Test - Winter Solution Department of Statstcs Unversty of Toronto STA35HS / HS Desgn and Analyss of Experments Term Test - Wnter - Soluton February, Last Name: Frst Name: Student Number: Instructons: Tme: hours. Ads: a non-programmable

More information

IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER

IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER Sgnal & Image Processng : An Internatonal Journal (SIPIJ) Vol.5, No.4, August 2014 IMAGE DENOISING USING NEW ADAPTIVE BASED MEDIAN FILTER Suman Shrestha 1, 2 1 Unversty of Massachusetts Medcal School,

More information

Application of B-Spline to Numerical Solution of a System of Singularly Perturbed Problems

Application of B-Spline to Numerical Solution of a System of Singularly Perturbed Problems Mathematca Aeterna, Vol. 1, 011, no. 06, 405 415 Applcaton of B-Splne to Numercal Soluton of a System of Sngularly Perturbed Problems Yogesh Gupta Department of Mathematcs Unted College of Engneerng &

More information

2016 Wiley. Study Session 2: Ethical and Professional Standards Application

2016 Wiley. Study Session 2: Ethical and Professional Standards Application 6 Wley Study Sesson : Ethcal and Professonal Standards Applcaton LESSON : CORRECTION ANALYSIS Readng 9: Correlaton and Regresson LOS 9a: Calculate and nterpret a sample covarance and a sample correlaton

More information

High resolution entropy stable scheme for shallow water equations

High resolution entropy stable scheme for shallow water equations Internatonal Symposum on Computers & Informatcs (ISCI 05) Hgh resoluton entropy stable scheme for shallow water equatons Xaohan Cheng,a, Yufeng Ne,b, Department of Appled Mathematcs, Northwestern Polytechncal

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

Digital Signal Processing

Digital Signal Processing Dgtal Sgnal Processng Dscrete-tme System Analyss Manar Mohasen Offce: F8 Emal: manar.subh@ut.ac.r School of IT Engneerng Revew of Precedent Class Contnuous Sgnal The value of the sgnal s avalable over

More information

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen

More information

A Particle Filter Algorithm based on Mixing of Prior probability density and UKF as Generate Importance Function

A Particle Filter Algorithm based on Mixing of Prior probability density and UKF as Generate Importance Function Advanced Scence and Technology Letters, pp.83-87 http://dx.do.org/10.14257/astl.2014.53.20 A Partcle Flter Algorthm based on Mxng of Pror probablty densty and UKF as Generate Importance Functon Lu Lu 1,1,

More information

General theory of fuzzy connectedness segmentations: reconciliation of two tracks of FC theory

General theory of fuzzy connectedness segmentations: reconciliation of two tracks of FC theory General theory of fuzzy connectedness segmentatons: reconclaton of two tracks of FC theory Krzysztof Chrs Ceselsk Department of Mathematcs, West Vrgna Unversty and MIPG, Department of Radology, Unversty

More information

Comparative Studies of Law of Conservation of Energy. and Law Clusters of Conservation of Generalized Energy

Comparative Studies of Law of Conservation of Energy. and Law Clusters of Conservation of Generalized Energy Comparatve Studes of Law of Conservaton of Energy and Law Clusters of Conservaton of Generalzed Energy No.3 of Comparatve Physcs Seres Papers Fu Yuhua (CNOOC Research Insttute, E-mal:fuyh1945@sna.com)

More information

Mathematical Preparations

Mathematical Preparations 1 Introducton Mathematcal Preparatons The theory of relatvty was developed to explan experments whch studed the propagaton of electromagnetc radaton n movng coordnate systems. Wthn expermental error the

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information