Using Unification For Opacity Properties
|
|
- Ralph Parsons
- 5 years ago
- Views:
Transcription
1 Unité Mixte de Recherche 5104 CNRS - INPG - UJF Centre Equatin 2, avenue de VIGNATE F GIERES tel : fax : Using Unificatin Fr Opacity Prperties Reprt n 24 Octber 28, 2004 Reprts are dwnladable at the fllwing address
2 Using Unificatin Fr Opacity Prperties Octber 28, 2004 Abstract The mst studied prperty, secrecy, is nt always sufficient t prve the security f a prtcl. Other prperties such as annymity, privacy r pacity culd be useful. Here, we give a simple definitin f pacity by lking at the pssible traces f the prtcl. Our apprach draws n a new prperty ver messages called similarity. Then, using rewriting methds clse t thse used in unificatin, we demnstrate the decidability f ur pacity prperty. This is nly achieved in the case f atmic keys using a methd called Key Quantificatin. Keywrds: Opacity, Security, Frmal Verificatin, Dlev-Ya Cnstraints, Rewriting Systems, Decidability. Reviewers: Ntes: A cnference versin has been published in Prc. f the Wrkshp n Issues in the Thery f Security (WITS Hw t cite this { verimag-tr , title = { Using Unificatin Fr Opacity Prperties}, authrs = { }, institutin = { Verimag Technical Reprt }, number = {24}, year = { 2004}, nte = { } }
3 1 Intrductin During the last decade, verificatin f security prtcls has been widely investigated. The majrity f the studies fcussed n demnstrating secrecy prperties using frmal methds (see fr example [3], [5], [4] r [7]. These methds have lead t cncrete tls fr verifying secrecy such as these prpsed by the EVA prject [2]. Hwever, checking security prtcls requires studying ther prperties such as annymity r pacity : hiding a piece f infrmatin frm an intruder. Fr instance, in a vte prtcl, whereas the intruder is able t infer the pssible values f the vte (yes r n, it shuld be impssible fr him t guess which vte was expressed, nly by bserving a sessin f this prtcl. Checking a prtcl shuld include a way f frmalizing the infrmatin that were leaked and that the intruder culd guess. In the last few years, attempts have been made t prperly define pacity prperties, t prve their decidability in certain cases and t prpse sme verificatin algrithms. In this paper, we adpt a simple definitin fr pacity. The intruder C has a passive view f a prtcl sessin invlving tw agents A and B. He is able t read any exchanged messages but he cannt mdify, blck r create a message. A prperty will be called paque if there are tw pssible sessins f the prtcl such that : in ne f these, the prperty is true whereas it is nt in the ther, and it is impssible fr the intruder t differentiate the messages frm these tw sessins frm the messages exchanged in the riginal sessin. The starting pint is the ntin f similarity. This binary relatin nted is an equivalence relatin between messages. Tw messages are similar if it is nt feasible fr the intruder t differentiate them. A typical example is tw different messages encded by a key that the intruder culd nt infer. Frm the pint f view f the intruder, these messages will be said similar. This ntin is f curse dependent f the knwledge f the intruder given by Dlev-Ya thery [6] : if the intruder is able t infer any f the used keys, then similarity will be equivalent t syntactic equality. This ntin f similarity will allw us t express pacity prperties as cnstraints. We will then use rewriting techniques t find the set f slutins fr such cnstraints. The rewriting rules are mainly inspired by the rules used in the unificatin algrithm. The prblem is very similar t unificatin except that atmic cnstraints make use f similarity instead f syntactic equality. That is why, the rewriting rules are similar but nt exactly the same. This technique will give the same result as fr unificatin : we will be able t express the set f slutins fr any cnstraint. As the cnstraint satisfiability is exactly related t pacity, this gives the main result f this paper : decidability f the pacity prperty in ur case. With sme hypthesis (passive intruder, atmic keys, the pacity f a given prperty is decidable and there is an immediate algrithm t perfrm this checking. The remainder f this paper is rganized as fllws. In sectin 2, we recall usual definitin fr messages and prtcls. Similarity ver messages is intrduced in sectin 3 and sme useful prperties are given. Sectin 4 frmalizes the pacity hypthesis and translate the pacity prperty t a cnstraint. Then, it prvides the methd t check satisfiability fr such cnstraints. Eventually, sectin 5 shws the use f this technique n a simple example, and sectin 6 cncludes this paper. 2 Cryptgraphic Prtcls Let Atms and X be tw infinite cuntable disjint sets. Atms is the set f atmic messages a. X is a set f variables called prtcls variables x. Definitin 1 (Message Let Σ be the signature Atms {pair, encrypt} where pair and encrypt are tw binary functins. The atmic messages are suppsed cnstant functins. Then a message is a first rder term ver Σ and the set f variables X, namely an element f T(Σ, X. A message is said t be clsed if it is a clsed term f T(Σ, X, i.e. a term f T(Σ. In the rest f this paper, we will use the fllwing ntatins : m 1, m 2 = pair(m 1, m 2 {m 1 } m2 = encrypt(m 1, m 2
4 The substitutins σ frm X t T(Σ, X are defined as usual. Its applicatin t the message m will be nted mσ. If σ is defined by xσ = n and yσ = y fr any ther variables y, then we culd write m[x\n] instead f mσ. The set f variables used in a message m is called var(m. Definitin 2 (Prtcl Let Actrs be a finite set f participants called actrs. The set f prgrams P rg is given by the fllwing syntax where B is in Actrs, m 1, m 2 and m are messages. G ::= ɛ! B m.g?m.g if m 1 = m 2 then G else G fi A prtcl ver the set f actrs Actrs is a functin frm Actrs t Prgs assciating a prgram t each actr. Fr the fllwing, the set f actrs is fixed t Actrs. Let free(p be the set f free variables in the prtcl P. The functin free will easily be defined ver prgrams by inductin and culd be extended ver prtcls. An instance f the prtcl P is a prtcl P σ where σ instantiates exactly the variables in P with clsed messages. Fr that purpse, it is pssible t rename every bund variable with a fresh variable such that bund variables are distinct and nt in the free variables set. The substitutin σ is called a sessin f the prtcl P. Such prtcls are clsed, i.e. f ree(p σ =. Definitin 3 (Prtcl Semantic The semantic f a prtcl is the transitin system ver prtcls defined by the fllwing rules : If m is a clsed message and σ is the smallest unifier f m and m, Prg(A =! B m.p A Prg(B =?m.p B Prg m Prg[A P A ; B P B ]σ Nte that, if σ des nt exist, the prtcl culd be blcked. If m 1 and m 2 are the same clsed message, Prg(A = if m 1 = m 2 then P A else G fi Prg Prg[A P A ] If m 1 and m 2 are tw distinct clsed messages, Prg(A = if m 1 = m 2 then G else P A fi Prg Prg[A P A ] A prtcl terminates iff fr any Q such that P Q, it is pssible t reach the state ɛ : Q ɛ. Nte that nly clsed prtcls culd terminate. A run f a sessin σ fr a prtcl P is an rdered set f messages r = r 1.r 2...r n such that Pσ r1 r... n ɛ A prtcl sessin is deterministic if it has exactly nly ne pssible run. This run will be nted run(p σ. In the fllwing sectins, the prtcls will always be suppsed deterministic. This paper will make an extensive use f the Dlev-Ya thery. Let E be a set f messages and m be a message, then we will nte E m if m is deducible frm E using the Dlev-Ya s inferences.
5 3 Similarity The intuitive definitin f pacity is that an intruder is nt able t distinguish a run where the prperty is satisfied frm a run where it is nt. T distinguish tw messages, the intruder culd discmpse them, accrding t his knwledge but if he des nt knw the key k fr example, he wn t be able t make the difference between tw different messages encded by this key k. Tw such messages will be called similar messages. This definitin will be frmalized using inference rules. An envirnment is a finite set f clsed messages. Usually, it will dente the set f messages knwn by the intruder. Definitin 4 (Similar Messages Tw clsed messages m 1 and m 2 are said t be similar fr the envirnment env iff env m 1 m 2 where is the smallest binary relatin satisfying : a Atmes a a u 1 u 2 v 1 v 2 u 1, v 1 u 2, v 2 env k u v {u} k {v} k env k env k {u} k {v} k Intuitively, this means that an intruder with the knwledge env will nt be able t differentiate tw similar messages. The envirnment name will be mitted as sn as it is nt relevant fr the cmprehensin. The same thing will be dne fr Dlev-Ya thery, i.e. env m will be nted m. Mrever, the definitin f culd easily be extended t nn-clsed envirnments and messages by adding this inference : x X x x Prperty 1 The binary relatin is an equivalence relatin : fr every messages m 1, m 2 and m 3 : m 1 m 1 m 1 m 2 m 2 m 1 m 1 m 2 m 2 m 3 m 1 m 3 T prve that the relatin is cmpatible with the cntext peratin, we will have t suppse that nly atmic keys are allwed. This hypthesis will hld fr the rest f the dcument. Prperty 2 (Cntext Fr every messages m 1, m 2, m 3 and m 4, if m 3 and m 4 have nly ne free variable x, m 1 m 2 m 3 m 4 m 3 [x\m 1 ] m 4 [x\m 2 ] And in particular, m 1 m 2 m 3 [x\m 1 ] m 3 [x\m 2 ] Let m and n be tw messages and x a variable. Let σ be a substitutin such that xσ nσ. Then mσ m[x\n]σ An imprtant prblem with similarity is : knwing an envirnment env and a clsed message m, is it pssible t find a clsed message n such that env n and env m n Fr that purpse, the f resh functin will be intrduced. It is inductively defined ver messages by the fllwing lines where all the variables y have t be instantiated with different fresh variables (i.e. variables
6 that d nt ccur in env, m r n. We then call Keys + the set f keys such that env Keys + and Keys the set f keys such that env Keys. fresh(a = a fresh(x = x fresh( m, m = fresh(m, fresh(m fresh({m} k = {fresh(m} k if k Keys + fresh({m} k = {y} k if k Keys Prperty 3 Fr every substitutin σ, we have mσ fresh(mσ And the mst imprtant prperty is that if m is similar t n, then n is an instance f fresh(m, i.e. fresh(m where all free variables are instantiated by clsed messages. Prperty 4 If fr tw clsed messages m and n, m n, then there exists a substitutin σ that acts ver the free variables f f resh(m such that n = f resh(mσ. 4 Predicates Using Similarity and Dlev-Ya Thery We will use classical predicates ver messages using the binary relatins = (syntactic equality and (similarity, and the atmic frmulae E m where m is a message and E a set f messages. The set f these predicates will be called P red. Satisfiability ver P red is defined as usual. The set f mdels satisfying E m is the set f substitutins σ such that Eσ and mσ are clsed and Eσ mσ : mσ is deducible frm Eσ using Dlev-Ya thery. Mdels fr and = are defined in the same way. If a substitutin σ is a mdel fr a predicate P, we will write σ = P. If all the atmic frmulas in P use the same envirnment E, then E culd be mitted in the predicate P but we will nte σ = E P. 4.1 The Opacity Prblem Let us cnsider a prtcl P and a sessin σ. The pacity prblem cnsidered here needs sme hypthesis : The intruder C has a passive view f a prtcl sessin invlving tw agents A and B. Passive means that the intruder culd intercept and view any messages between A and B but is nt able t blck, mdify nr t send any message. The intruder knws the prtcl used. Only atmic keys are used fr encding. The intruder has an initial knwledge c 0, which is a predicate (fr example, c 0 = k 1 k 2 means that C knws that the keys that will instantiate k 1 and k 2 are the same. The sessin σ defines a witness run run(pσ = m 1.m 2...m n. A prperty ψ will be said paque fr this sessin σ if it is impssible t tell accrding t the knwledge f C if ψ is true r false. This means that there exist tw pssible sessins σ 1 and σ 2 f the prtcl giving messages similar t the witness messages where fr example, ψσ 1 is true and ψσ 2 is false. In this case, the intruder will nt be able t deduce any knwledge n ψ.
7 Definitin 5 (Opacity A prperty ψ is said t be paque fr a prtcl sessin σ f P iff there exist tw sessins f the prtcl σ 1 and σ 2 such that c 0 σ 1 p 1 m 1... p n m n ψσ 1 c 0 σ 2 q 1 m 1... q n m n ψσ 2 Where p 1.p 2...p n is the run f the prtcl P related t σ 1, q 1.q 2...q n is related t σ 2 and m 1.m 2...m n is related t σ. Nte that the three runs p, q and m must have the same length n. The envirnment used in the precedent cnjunctins is {m 1,..., m n, p 1,..., p n, q 1,..., q n } and culd be augmented with an initial knwledge f the intruder env 0. Our prperty f pacity culd als be used t check annymity. Fr example, if we take a definitin f annymity clsed t the ne given in [10], we just have t add a restricted view fr the intruder, i.e. the intruder nly intercepts sme f the exchanged messages. Then the pacity f the prperty identity f such actr will be similar t what is defined as annymity. 4.2 A Decidable Fragment : Glbal Key Quantificatin A similarity cnjunctin is a predicate f the frm : P = n m i n i i=1 Namely, it is a cnjunctin f similarities. The set f such predicates will be called Cnj. The purpse f this sectin is t shw that satisfiability ver Cnj is decidable. The decisin algrithm will be based n rewriting rules inspired by these used in unificatin (see fr example [9]. This will transfrm any cnjunctin t a slved frm, and we will shw that, fr such frms, the set f slutins is cmputable. The idea, as in unificatin, is t reverse the inferences giving. An intuitive rule fr decding message wuld be : {m 1 } k1 {m 2 } k2 ( k 1 k 2 m 1 m 2 k 1 ( k1 k 2 The messages {m 1 } k1 and {m 2 } k2 are similar in tw cases : if nne f the keys are cmprmised r if the keys are equals and the encded messages are similar. Hwever, using nly unificatin-like rules will nt wrk. The main difference is that a predicate like x {x} k has sme slutins if the key k is nt deducible by the intruder. Fr example, x = {a} k satisfies the frmer predicate. The usual ccur check rule culd nt apply directly, s we will have t use a methd called key quantificatin. The idea f key quantificatin lies upn the fact that the set Keys f keys ccuring in the prtcl is finite. That is why we will make tries fr every pssible partitin Keys + Keys f Keys with the fllwing hypthesis : if σ is a slutin, then fr every k + in Keys + and k in Keys, we have envσ k + σ and envσ k σ. S we quantify ver the set Keys + f cmprmised keys. Furthermre, if the intruder knws initially sme f the keys Keys + 0, we will nly quantify fr Keys+ Keys + 0. After chsing Keys +, the first step is t substitute the cnjunctin by : n fresh(m i fresh(n i i=1 Let us call freshv ar(m i the set f fresh variables used t cmpute fresh(m i. By extensin, let us define freshv ar(p by : freshv ar(p = n (freshv ar(m i freshv ar(n i The rewriting system R ver Cnj is defined by the fllwing rules. i=1
8 Variable Reslutin (Res : if the variable x ccurs in C and nt in m, x m C x m C[x\m] If m is the variable x, Else, if the variable x ccurs in m, x x C C x m C Pair Decmpsitin (Pair : m 1, m 2 n 1, n 2 C m 1 n 1 m 2 n 2 C Axim (Ax : fr a and b tw distinct atms a a C C a b C Type Mismatch (Type : m 1, m 2 {m} k C a m 1, m 2 C a {m} k C Cde Decmpsitin (Cde : if k 1 and k 2 are in Keys +, {m 1 } k1 {m 2 } k2 C C k 1 k 2 m 1 m 2 If k 1 and k 2 are in Keys, Else, {m 1 } k1 {m 2 } k2 C C {m 1 } k1 {m 2 } k2 C Definitin 6 (Slved Variable/Frm A variable x frm X is slved in a predicate P iff x appears exactly in ne similarity f P and this similarity has the frm x m where m is a message that des nt cntain x. A slved frm is an element P f the set Cnj f the frm Where fr every i, the variable x i is slved. P = n x i m i i=1 Nte that, in a slved frm, sme f the free variables culd be unslved. This will be the case, in particular, fr ur fresh variables. Therem 1 The rewriting system R terminates and the nrmal frms are slved frms and. Mrever, R is crrect and cmplete, i.e. the slutins f a predicate are exactly the slutins f its nrmal frms. Prf 1 T prve the terminatin f the rewriting system, we will use the lexicgraphic rder (sf, sp, sc, np lex where sf is the number f nn-slved variables, sp is the number f pair used in the predicate, sc is the number f encryptins and np is the number f atmic frmulas. Then the values decreases strictly during rewriting as shwn in the fllwing array. This prves the terminatin f the rewriting system.
9 Rule sf sp sc np Res 1 < Res 2 < Res 3 < Pair < Ax 1 2 < Type < Cde < Fr the cmpleteness and crrectin f rewriting, we have t prve fr each rule P 1 P 2 that P 1 and P 2 have exactly the same sets f slutins. The predicate is equivalent t a slved frm : n x i m i i=1 We culd nw describe the set Σ f pssible substitutins σ satisfying ur predicate P by : fr any variable x that is nt slved, xσ ranges ver all the pssible messages. These variables includes in particular sme f the fresh variables included in the sets freshv ar(m i. Fr the slved variables x i, x i σ = m i σ As m i culd nly cntain unslved variables, the frmer definitin is nt recursive. At last, we have t check that the hypthesis we made ver Keys + and Keys is crrect, i.e. there exists a σ amng Σ such that envσ Keys σ. We will nt cnsider the hypthesis ver Keys + as sn as the keys f Keys + σ culd be cnsidered as part f the initial knwledge f the intruder. T check that Keys is nt deducible, it is pssible t try with the wrst slutin (fr Dlev-Ya thery, i.e. use the same fresh atm a fr all the xσ where x is nt a key and use different fresh atms fr keys. Prperty 5 The σ defined abve is the wrst accrding t Dlev-Ya thery, frmally fr every cuple f messages m and n, ( η Σ, envη mη nη envσ mσ nσ ( η Σ, envη mη envσ mσ Prf 2 We suppse that there exists η Σ such that envη mη nη. By inductin n the prf s structure f envη mη nη, the prperty is easy t prve using the fllwing lemma : fr every key variable k : envη kη envσ kσ As kσ is atmic and keys are atmic, kσ culd be btained frm envσ using nly decmpsitin rules. Then, given the nature f σ, we have that env k which prves that envη kη. T finish ur check, we just have t prve envσ Keys fr ur wrst σ. This last check is f curse decidable. T cnclude this sectin, let us recall the main steps f ur decisin algrithm : Write the pacity prperty as tw cnstraints. Prcess these cnstraints ne after the ther. Chse a set Keys + included in K (finite number f pssibilities. Rewrite the cnstraints using the given rules. Check that the set Keys \ Keys + culd nt be inferred by the intruder using the wrst slutin. If fr the tw cnstraints, there exists a set Keys + such that the wrst slutin is valid, then the studied prperty is paque. Otherwise, the prperty is nt paque.
10 5 Example : The Limited Cryptgraphs Dinner T give a simple applicatin f pacity, the example f the cryptgraphs dinner will be taken. In this example, nly tw cryptgraphs will be present : Alice (A and Bb (B. They have dinner tgether in a restaurant. When cmes the time t pay, the waiter tells them that smene already paid the bill. A and B want t knw if the persn wh paid is ne f them r nt, but if this is the case, they als want that name t remain annymus. They suppse that an intruder Charlie (C culd listen t whatever they say. They decide t flip tw cins (C can t see the result, if bth are head r bth are tail, A have t tell 1 if he didn t pay, 0 else, same thing fr B. If the cins gives tw different results, then A and B act in the ppsite way. Obviusly A and B culd knw with that prtcl wh paid the dinner. C culd als knw if A r B paid. Nw we want t check that C cannt deduce wh paid. Let us frmalize this prtcl. They will tss tw cins p 1 and p 2 with result the bleans x 1 and x 2. The predicate x A is true iff A paid, the predicate x B is true iff B paid. The first step f the prtcl is the distributin f x 1 and x 2 by a third actr S using a key k nt deducible by C. S A : { x 1, x 2 } k S B : { x 1, x 2 } k The fllwing f the prtcl is detailed belw with respect t the pssible values fr the different variables. x A x B x x A B impssible B A impssible Let us suppse the trace f the prtcl is : S A, B : { 0, 1 } k A B : 1 B A : 0 S ne f A and B paid the dinner. Intuitively, we culd cnclude immediately. Let us cnsider the tw bld clumns, they prpse the right executin trace but in ne case A paid, in the ther ne, it is B. The identity f the payer remains annymus. The pacity prperty is the fllwing with the envirnment {0, 1}. σ 1, ( { x 1, x 2 } k { 0, 1 } k A B = 1 B A = 0 x A σ1 σ 2, ( x 1, x 2 } k { 0, 1 } k A B = 1 B A = 0 x A σ2 Let suppse that k is in Keys (therwise, the prperty is nt paque. By develping, we btain that the pssible sessins fr that trace are : [x A \0, x B \1, x 1 \0, x 2 \0], [x A \0, x B \1, x 1 \1, x 2 \1], [x A \1, x B \0, x 1 \0, x 2 \1] r [x A \1, x B \0, x 1 \1, x 2 \0]. And we culd take fr example : This prves the annymity f the payer fr this trace. σ 1 = [x A \0, x B \1, x 1 \0, x 2 \0] σ 2 = [x A \1, x B \0, x 1 \1, x 2 \0]
11 6 Cnclusin In this paper, we presented a new simple and intuitive definitin fr pacity. With that definitin, the pacity f a given prperty is decidable. The decisin algrithm has been implemented and tested in sme example cases. As far as we knw, ther versins f pacity ([1], [8] have been given in the literature but nne f these criterin were implemented. This wrk has sme limitatin, in particular, the hypthesis made ver the sessin between A and B : nly atmic keys are used and public key cryptgraphy is nt allwed. This gives sme natural extensin t this paper that will be explred later. Fr example, using tree autmata techniques shuld allw the use f nn-atmic keys. Anther interesting extensin wuld be t make the intruder active. If C culd intercept and mdify the messages, culd he find the right messages t alter such that the prperty is nt paque any mre? Anther interesting extensin wuld be t add syntactic equality t cnstraints : this equality means that the intruder has receive tw exactly identical messages. With that knwledge, the intruder culd make new deductins. References [1] A. Bisseau. Abstractins pur la vérificatin de prpriétés de sécurité de prtcles cryptgraphiques. PhD thesis, Labratire Spécificatin et Vérificatin (LSV, ENS de Cachan, [2] L. Bzga, Y. Lakhnech, and M. Périn. Abstract interpretatin fr secrecy using patterns. Technical reprt, EVA : [3] E.M. Clarke, S. Jha, and W. Marrer. Using state space explratin and a natural deductin style message derivatin engine t verify security prtcls. In IFIP Wrking Cnference n Prgramming Cncepts and Methds, [4] H. Cmn-Lundh. and V. Crtier. Security prperties: Tw agents are sufficient. Technical reprt, LSV, [5] H. Cmn-Lundh and V. Crtier. New decidability results fr fragments f first-rder lgic and applicatin t cryptgraphic prtcls. In 14th Int. Cnf. Rewriting Techniques and Applicatins (RTA 2003, vlume 2706 f LNCS, [6] D. Dlev and A. C. Ya. On the security f public key prtcls. IEEE Transactins n Infrmatin Thery, 29(2: , [7] Jean Gubault-Larrecq. A methd fr autmatic cryptgraphic prtcl verificatin. In Internatinal Wrkshp n Frmal Methds fr Parallel Prgramming: Thery and Applicatins, vlume 1800 f LNCS, [8] Dminic Hughes and Vitaly Shmatikv. Infrmatin hiding, annymity and privacy: A mdular apprach. Jurnal f Cmputer Security, 12(1:3 36, [9] Claude Kirchner and Hélène Kirchner. Rewriting, slving, prving. A preliminary versin f a bk available at ckirchne/rsp.ps.gz, [10] Steve Schneider and Abraham Sidirpuls. CSP and annymity. In ESORICS, pages ,
Introduction to Models and Properties
Intrductin t Mdels and Prperties Cmputer Science and Artificial Intelligence Labratry MIT Armand Slar-Lezama Nv 23, 2015 Nvember 23, 2015 1 Recap Prperties Prperties f variables Prperties at prgram pints
More informationChapter Summary. Mathematical Induction Strong Induction Recursive Definitions Structural Induction Recursive Algorithms
Chapter 5 1 Chapter Summary Mathematical Inductin Strng Inductin Recursive Definitins Structural Inductin Recursive Algrithms Sectin 5.1 3 Sectin Summary Mathematical Inductin Examples f Prf by Mathematical
More informationHypothesis Tests for One Population Mean
Hypthesis Tests fr One Ppulatin Mean Chapter 9 Ala Abdelbaki Objective Objective: T estimate the value f ne ppulatin mean Inferential statistics using statistics in rder t estimate parameters We will be
More informationRevisiting the Socrates Example
Sectin 1.6 Sectin Summary Valid Arguments Inference Rules fr Prpsitinal Lgic Using Rules f Inference t Build Arguments Rules f Inference fr Quantified Statements Building Arguments fr Quantified Statements
More informationPublic Key Cryptography. Tim van der Horst & Kent Seamons
Public Key Cryptgraphy Tim van der Hrst & Kent Seamns Last Updated: Oct 5, 2017 Asymmetric Encryptin Why Public Key Crypt is Cl Has a linear slutin t the key distributin prblem Symmetric crypt has an expnential
More informationWRITING THE REPORT. Organizing the report. Title Page. Table of Contents
WRITING THE REPORT Organizing the reprt Mst reprts shuld be rganized in the fllwing manner. Smetime there is a valid reasn t include extra chapters in within the bdy f the reprt. 1. Title page 2. Executive
More informationDifferentiation Applications 1: Related Rates
Differentiatin Applicatins 1: Related Rates 151 Differentiatin Applicatins 1: Related Rates Mdel 1: Sliding Ladder 10 ladder y 10 ladder 10 ladder A 10 ft ladder is leaning against a wall when the bttm
More informationMath Foundations 20 Work Plan
Math Fundatins 20 Wrk Plan Units / Tpics 20.8 Demnstrate understanding f systems f linear inequalities in tw variables. Time Frame December 1-3 weeks 6-10 Majr Learning Indicatrs Identify situatins relevant
More informationAdmissibility Conditions and Asymptotic Behavior of Strongly Regular Graphs
Admissibility Cnditins and Asympttic Behavir f Strngly Regular Graphs VASCO MOÇO MANO Department f Mathematics University f Prt Oprt PORTUGAL vascmcman@gmailcm LUÍS ANTÓNIO DE ALMEIDA VIEIRA Department
More informationApplication Of Mealy Machine And Recurrence Relations In Cryptography
Applicatin Of Mealy Machine And Recurrence Relatins In Cryptgraphy P. A. Jytirmie 1, A. Chandra Sekhar 2, S. Uma Devi 3 1 Department f Engineering Mathematics, Andhra University, Visakhapatnam, IDIA 2
More informationCAUSAL INFERENCE. Technical Track Session I. Phillippe Leite. The World Bank
CAUSAL INFERENCE Technical Track Sessin I Phillippe Leite The Wrld Bank These slides were develped by Christel Vermeersch and mdified by Phillippe Leite fr the purpse f this wrkshp Plicy questins are causal
More informationCS 477/677 Analysis of Algorithms Fall 2007 Dr. George Bebis Course Project Due Date: 11/29/2007
CS 477/677 Analysis f Algrithms Fall 2007 Dr. Gerge Bebis Curse Prject Due Date: 11/29/2007 Part1: Cmparisn f Srting Algrithms (70% f the prject grade) The bjective f the first part f the assignment is
More informationA proposition is a statement that can be either true (T) or false (F), (but not both).
400 lecture nte #1 [Ch 2, 3] Lgic and Prfs 1.1 Prpsitins (Prpsitinal Lgic) A prpsitin is a statement that can be either true (T) r false (F), (but nt bth). "The earth is flat." -- F "March has 31 days."
More informationA New Evaluation Measure. J. Joiner and L. Werner. The problems of evaluation and the needed criteria of evaluation
III-l III. A New Evaluatin Measure J. Jiner and L. Werner Abstract The prblems f evaluatin and the needed criteria f evaluatin measures in the SMART system f infrmatin retrieval are reviewed and discussed.
More informationWe can see from the graph above that the intersection is, i.e., [ ).
MTH 111 Cllege Algebra Lecture Ntes July 2, 2014 Functin Arithmetic: With nt t much difficulty, we ntice that inputs f functins are numbers, and utputs f functins are numbers. S whatever we can d with
More informationCHAPTER 3 INEQUALITIES. Copyright -The Institute of Chartered Accountants of India
CHAPTER 3 INEQUALITIES Cpyright -The Institute f Chartered Accuntants f India INEQUALITIES LEARNING OBJECTIVES One f the widely used decisin making prblems, nwadays, is t decide n the ptimal mix f scarce
More informationThermodynamics Partial Outline of Topics
Thermdynamics Partial Outline f Tpics I. The secnd law f thermdynamics addresses the issue f spntaneity and invlves a functin called entrpy (S): If a prcess is spntaneus, then Suniverse > 0 (2 nd Law!)
More informationDataflow Analysis and Abstract Interpretation
Dataflw Analysis and Abstract Interpretatin Cmputer Science and Artificial Intelligence Labratry MIT Nvember 9, 2015 Recap Last time we develped frm first principles an algrithm t derive invariants. Key
More information1996 Engineering Systems Design and Analysis Conference, Montpellier, France, July 1-4, 1996, Vol. 7, pp
THE POWER AND LIMIT OF NEURAL NETWORKS T. Y. Lin Department f Mathematics and Cmputer Science San Jse State University San Jse, Califrnia 959-003 tylin@cs.ssu.edu and Bereley Initiative in Sft Cmputing*
More informationTHE LIFE OF AN OBJECT IT SYSTEMS
THE LIFE OF AN OBJECT IT SYSTEMS Persns, bjects, r cncepts frm the real wrld, which we mdel as bjects in the IT system, have "lives". Actually, they have tw lives; the riginal in the real wrld has a life,
More informationBootstrap Method > # Purpose: understand how bootstrap method works > obs=c(11.96, 5.03, 67.40, 16.07, 31.50, 7.73, 11.10, 22.38) > n=length(obs) >
Btstrap Methd > # Purpse: understand hw btstrap methd wrks > bs=c(11.96, 5.03, 67.40, 16.07, 31.50, 7.73, 11.10, 22.38) > n=length(bs) > mean(bs) [1] 21.64625 > # estimate f lambda > lambda = 1/mean(bs);
More informationLead/Lag Compensator Frequency Domain Properties and Design Methods
Lectures 6 and 7 Lead/Lag Cmpensatr Frequency Dmain Prperties and Design Methds Definitin Cnsider the cmpensatr (ie cntrller Fr, it is called a lag cmpensatr s K Fr s, it is called a lead cmpensatr Ntatin
More informationFloating Point Method for Solving Transportation. Problems with Additional Constraints
Internatinal Mathematical Frum, Vl. 6, 20, n. 40, 983-992 Flating Pint Methd fr Slving Transprtatin Prblems with Additinal Cnstraints P. Pandian and D. Anuradha Department f Mathematics, Schl f Advanced
More informationBASD HIGH SCHOOL FORMAL LAB REPORT
BASD HIGH SCHOOL FORMAL LAB REPORT *WARNING: After an explanatin f what t include in each sectin, there is an example f hw the sectin might lk using a sample experiment Keep in mind, the sample lab used
More informationNUROP CONGRESS PAPER CHINESE PINYIN TO CHINESE CHARACTER CONVERSION
NUROP Chinese Pinyin T Chinese Character Cnversin NUROP CONGRESS PAPER CHINESE PINYIN TO CHINESE CHARACTER CONVERSION CHIA LI SHI 1 AND LUA KIM TENG 2 Schl f Cmputing, Natinal University f Singapre 3 Science
More informationPattern Recognition 2014 Support Vector Machines
Pattern Recgnitin 2014 Supprt Vectr Machines Ad Feelders Universiteit Utrecht Ad Feelders ( Universiteit Utrecht ) Pattern Recgnitin 1 / 55 Overview 1 Separable Case 2 Kernel Functins 3 Allwing Errrs (Sft
More informationLab 1 The Scientific Method
INTRODUCTION The fllwing labratry exercise is designed t give yu, the student, an pprtunity t explre unknwn systems, r universes, and hypthesize pssible rules which may gvern the behavir within them. Scientific
More information, which yields. where z1. and z2
The Gaussian r Nrmal PDF, Page 1 The Gaussian r Nrmal Prbability Density Functin Authr: Jhn M Cimbala, Penn State University Latest revisin: 11 September 13 The Gaussian r Nrmal Prbability Density Functin
More informationChecking the resolved resonance region in EXFOR database
Checking the reslved resnance regin in EXFOR database Gttfried Bertn Sciété de Calcul Mathématique (SCM) Oscar Cabells OECD/NEA Data Bank JEFF Meetings - Sessin JEFF Experiments Nvember 0-4, 017 Bulgne-Billancurt,
More informationSection 6-2: Simplex Method: Maximization with Problem Constraints of the Form ~
Sectin 6-2: Simplex Methd: Maximizatin with Prblem Cnstraints f the Frm ~ Nte: This methd was develped by Gerge B. Dantzig in 1947 while n assignment t the U.S. Department f the Air Frce. Definitin: Standard
More informationCHAPTER 24: INFERENCE IN REGRESSION. Chapter 24: Make inferences about the population from which the sample data came.
MATH 1342 Ch. 24 April 25 and 27, 2013 Page 1 f 5 CHAPTER 24: INFERENCE IN REGRESSION Chapters 4 and 5: Relatinships between tw quantitative variables. Be able t Make a graph (scatterplt) Summarize the
More informationRECHERCHES Womcodes constructed with projective geometries «Womcodes» construits à partir de géométries projectives Frans MERKX (') École Nationale Su
Wmcdes cnstructed with prjective gemetries «Wmcdes» cnstruits à partir de gémétries prjectives Frans MERKX (') Écle Natinale Supérieure de Télécmmunicatins (ENST), 46, rue Barrault, 75013 PARIS Étudiant
More informationYou need to be able to define the following terms and answer basic questions about them:
CS440/ECE448 Sectin Q Fall 2017 Midterm Review Yu need t be able t define the fllwing terms and answer basic questins abut them: Intr t AI, agents and envirnments Pssible definitins f AI, prs and cns f
More informationAIP Logic Chapter 4 Notes
AIP Lgic Chapter 4 Ntes Sectin 4.1 Sectin 4.2 Sectin 4.3 Sectin 4.4 Sectin 4.5 Sectin 4.6 Sectin 4.7 4.1 The Cmpnents f Categrical Prpsitins There are fur types f categrical prpsitins. Prpsitin Letter
More informationNUMBERS, MATHEMATICS AND EQUATIONS
AUSTRALIAN CURRICULUM PHYSICS GETTING STARTED WITH PHYSICS NUMBERS, MATHEMATICS AND EQUATIONS An integral part t the understanding f ur physical wrld is the use f mathematical mdels which can be used t
More informationREADING STATECHART DIAGRAMS
READING STATECHART DIAGRAMS Figure 4.48 A Statechart diagram with events The diagram in Figure 4.48 shws all states that the bject plane can be in during the curse f its life. Furthermre, it shws the pssible
More informationHomology groups of disks with holes
Hmlgy grups f disks with hles THEOREM. Let p 1,, p k } be a sequence f distinct pints in the interir unit disk D n where n 2, and suppse that fr all j the sets E j Int D n are clsed, pairwise disjint subdisks.
More informationB. Definition of an exponential
Expnents and Lgarithms Chapter IV - Expnents and Lgarithms A. Intrductin Starting with additin and defining the ntatins fr subtractin, multiplicatin and divisin, we discvered negative numbers and fractins.
More informationRevision: August 19, E Main Suite D Pullman, WA (509) Voice and Fax
.7.4: Direct frequency dmain circuit analysis Revisin: August 9, 00 5 E Main Suite D Pullman, WA 9963 (509) 334 6306 ice and Fax Overview n chapter.7., we determined the steadystate respnse f electrical
More informationLyapunov Stability Stability of Equilibrium Points
Lyapunv Stability Stability f Equilibrium Pints 1. Stability f Equilibrium Pints - Definitins In this sectin we cnsider n-th rder nnlinear time varying cntinuus time (C) systems f the frm x = f ( t, x),
More informationThe Law of Total Probability, Bayes Rule, and Random Variables (Oh My!)
The Law f Ttal Prbability, Bayes Rule, and Randm Variables (Oh My!) Administrivia Hmewrk 2 is psted and is due tw Friday s frm nw If yu didn t start early last time, please d s this time. Gd Milestnes:
More informationo o IMPORTANT REMINDERS Reports will be graded largely on their ability to clearly communicate results and important conclusions.
BASD High Schl Frmal Lab Reprt GENERAL INFORMATION 12 pt Times New Rman fnt Duble-spaced, if required by yur teacher 1 inch margins n all sides (tp, bttm, left, and right) Always write in third persn (avid
More informationA Few Basic Facts About Isothermal Mass Transfer in a Binary Mixture
Few asic Facts but Isthermal Mass Transfer in a inary Miture David Keffer Department f Chemical Engineering University f Tennessee first begun: pril 22, 2004 last updated: January 13, 2006 dkeffer@utk.edu
More informationAssessment Primer: Writing Instructional Objectives
Assessment Primer: Writing Instructinal Objectives (Based n Preparing Instructinal Objectives by Mager 1962 and Preparing Instructinal Objectives: A critical tl in the develpment f effective instructin
More informationMODULAR DECOMPOSITION OF THE NOR-TSUM MULTIPLE-VALUED PLA
MODUAR DECOMPOSITION OF THE NOR-TSUM MUTIPE-AUED PA T. KAGANOA, N. IPNITSKAYA, G. HOOWINSKI k Belarusian State University f Infrmatics and Radielectrnics, abratry f Image Prcessing and Pattern Recgnitin.
More informationTermination analysis of floating-point programs using parameterizable rational approximations
Terminatin analysis f flating-pint prgrams using parameterizable ratinal apprximatins Fnenantsa Maurica Université de La Réunin LIM France fnenantsa.maurica@ gmail.cm Frédéric Mesnard Université de La
More informationDistributions, spatial statistics and a Bayesian perspective
Distributins, spatial statistics and a Bayesian perspective Dug Nychka Natinal Center fr Atmspheric Research Distributins and densities Cnditinal distributins and Bayes Thm Bivariate nrmal Spatial statistics
More informationENSC Discrete Time Systems. Project Outline. Semester
ENSC 49 - iscrete Time Systems Prject Outline Semester 006-1. Objectives The gal f the prject is t design a channel fading simulatr. Upn successful cmpletin f the prject, yu will reinfrce yur understanding
More informationFive Whys How To Do It Better
Five Whys Definitin. As explained in the previus article, we define rt cause as simply the uncvering f hw the current prblem came int being. Fr a simple causal chain, it is the entire chain. Fr a cmplex
More informationComputational modeling techniques
Cmputatinal mdeling techniques Lecture 4: Mdel checing fr ODE mdels In Petre Department f IT, Åb Aademi http://www.users.ab.fi/ipetre/cmpmd/ Cntent Stichimetric matrix Calculating the mass cnservatin relatins
More informationOptimization Programming Problems For Control And Management Of Bacterial Disease With Two Stage Growth/Spread Among Plants
Internatinal Jurnal f Engineering Science Inventin ISSN (Online): 9 67, ISSN (Print): 9 676 www.ijesi.rg Vlume 5 Issue 8 ugust 06 PP.0-07 Optimizatin Prgramming Prblems Fr Cntrl nd Management Of Bacterial
More informationSequential Allocation with Minimal Switching
In Cmputing Science and Statistics 28 (1996), pp. 567 572 Sequential Allcatin with Minimal Switching Quentin F. Stut 1 Janis Hardwick 1 EECS Dept., University f Michigan Statistics Dept., Purdue University
More informationDetermining the Accuracy of Modal Parameter Estimation Methods
Determining the Accuracy f Mdal Parameter Estimatin Methds by Michael Lee Ph.D., P.E. & Mar Richardsn Ph.D. Structural Measurement Systems Milpitas, CA Abstract The mst cmmn type f mdal testing system
More informationMODULE FOUR. This module addresses functions. SC Academic Elementary Algebra Standards:
MODULE FOUR This mdule addresses functins SC Academic Standards: EA-3.1 Classify a relatinship as being either a functin r nt a functin when given data as a table, set f rdered pairs, r graph. EA-3.2 Use
More informationThis section is primarily focused on tools to aid us in finding roots/zeros/ -intercepts of polynomials. Essentially, our focus turns to solving.
Sectin 3.2: Many f yu WILL need t watch the crrespnding vides fr this sectin n MyOpenMath! This sectin is primarily fcused n tls t aid us in finding rts/zers/ -intercepts f plynmials. Essentially, ur fcus
More informationCOMP 551 Applied Machine Learning Lecture 11: Support Vector Machines
COMP 551 Applied Machine Learning Lecture 11: Supprt Vectr Machines Instructr: (jpineau@cs.mcgill.ca) Class web page: www.cs.mcgill.ca/~jpineau/cmp551 Unless therwise nted, all material psted fr this curse
More informationKinetic Model Completeness
5.68J/10.652J Spring 2003 Lecture Ntes Tuesday April 15, 2003 Kinetic Mdel Cmpleteness We say a chemical kinetic mdel is cmplete fr a particular reactin cnditin when it cntains all the species and reactins
More informationPreparation work for A2 Mathematics [2017]
Preparatin wrk fr A2 Mathematics [2017] The wrk studied in Y12 after the return frm study leave is frm the Cre 3 mdule f the A2 Mathematics curse. This wrk will nly be reviewed during Year 13, it will
More informationAutomaton-based Non-interference Monitoring
Autmatn-based Nn-interference Mnitring Gurvan Le Guernic, Anindya Banerjee, David Schmidt T cite this versin: Gurvan Le Guernic, Anindya Banerjee, David Schmidt. Autmatn-based Nn-interference Mnitring.
More informationThe steps of the engineering design process are to:
The engineering design prcess is a series f steps that engineers fllw t cme up with a slutin t a prblem. Many times the slutin invlves designing a prduct (like a machine r cmputer cde) that meets certain
More informationThe blessing of dimensionality for kernel methods
fr kernel methds Building classifiers in high dimensinal space Pierre Dupnt Pierre.Dupnt@ucluvain.be Classifiers define decisin surfaces in sme feature space where the data is either initially represented
More informationA new Type of Fuzzy Functions in Fuzzy Topological Spaces
IOSR Jurnal f Mathematics (IOSR-JM e-issn: 78-578, p-issn: 39-765X Vlume, Issue 5 Ver I (Sep - Oct06, PP 8-4 wwwisrjurnalsrg A new Type f Fuzzy Functins in Fuzzy Tplgical Spaces Assist Prf Dr Munir Abdul
More informationCOMP 551 Applied Machine Learning Lecture 9: Support Vector Machines (cont d)
COMP 551 Applied Machine Learning Lecture 9: Supprt Vectr Machines (cnt d) Instructr: Herke van Hf (herke.vanhf@mail.mcgill.ca) Slides mstly by: Class web page: www.cs.mcgill.ca/~hvanh2/cmp551 Unless therwise
More informationMath Foundations 10 Work Plan
Math Fundatins 10 Wrk Plan Units / Tpics 10.1 Demnstrate understanding f factrs f whle numbers by: Prime factrs Greatest Cmmn Factrs (GCF) Least Cmmn Multiple (LCM) Principal square rt Cube rt Time Frame
More informationA Transition to Advanced Mathematics. Mathematics and Computer Sciences Department. o Work Experience, General. o Open Entry/Exit
SECTION A - Curse Infrmatin 1. Curse ID: 2. Curse Title: 3. Divisin: 4. Department: MATH 245 A Transitin t Advanced Mathematics Natural Sciences Divisin Mathematics and Cmputer Sciences Department 5. Subject:
More informationDepartment: MATHEMATICS
Cde: MATH 022 Title: ALGEBRA SKILLS Institute: STEM Department: MATHEMATICS Curse Descriptin: This curse prvides students wh have cmpleted MATH 021 with the necessary skills and cncepts t cntinue the study
More informationEEO 401 Digital Signal Processing Prof. Mark Fowler
EEO 401 Digital Signal Prcessing Prf. Mark Fwler Intrductin Nte Set #1 ading Assignment: Ch. 1 f Prakis & Manlakis 1/13 Mdern systems generally DSP Scenari get a cntinuus-time signal frm a sensr a cnt.-time
More informationOn Topological Structures and. Fuzzy Sets
L - ZHR UNIVERSIT - GZ DENSHIP OF GRDUTE STUDIES & SCIENTIFIC RESERCH On Tplgical Structures and Fuzzy Sets y Nashaat hmed Saleem Raab Supervised by Dr. Mhammed Jamal Iqelan Thesis Submitted in Partial
More informationLast Updated: Oct 14, 2017
RSA Last Updated: Oct 14, 2017 Recap Number thery What is a prime number? What is prime factrizatin? What is a GCD? What des relatively prime mean? What des c-prime mean? What des cngruence mean? What
More informationDead-beat controller design
J. Hetthéssy, A. Barta, R. Bars: Dead beat cntrller design Nvember, 4 Dead-beat cntrller design In sampled data cntrl systems the cntrller is realised by an intelligent device, typically by a PLC (Prgrammable
More informationInternal vs. external validity. External validity. This section is based on Stock and Watson s Chapter 9.
Sectin 7 Mdel Assessment This sectin is based n Stck and Watsn s Chapter 9. Internal vs. external validity Internal validity refers t whether the analysis is valid fr the ppulatin and sample being studied.
More informationSUPPLEMENTARY MATERIAL GaGa: a simple and flexible hierarchical model for microarray data analysis
SUPPLEMENTARY MATERIAL GaGa: a simple and flexible hierarchical mdel fr micrarray data analysis David Rssell Department f Bistatistics M.D. Andersn Cancer Center, Hustn, TX 77030, USA rsselldavid@gmail.cm
More informationFall 2013 Physics 172 Recitation 3 Momentum and Springs
Fall 03 Physics 7 Recitatin 3 Mmentum and Springs Purpse: The purpse f this recitatin is t give yu experience wrking with mmentum and the mmentum update frmula. Readings: Chapter.3-.5 Learning Objectives:.3.
More informationMedium Scale Integrated (MSI) devices [Sections 2.9 and 2.10]
EECS 270, Winter 2017, Lecture 3 Page 1 f 6 Medium Scale Integrated (MSI) devices [Sectins 2.9 and 2.10] As we ve seen, it s smetimes nt reasnable t d all the design wrk at the gate-level smetimes we just
More informationLab #3: Pendulum Period and Proportionalities
Physics 144 Chwdary Hw Things Wrk Spring 2006 Name: Partners Name(s): Intrductin Lab #3: Pendulum Perid and Prprtinalities Smetimes, it is useful t knw the dependence f ne quantity n anther, like hw the
More informationPhysics 2B Chapter 23 Notes - Faraday s Law & Inductors Spring 2018
Michael Faraday lived in the Lndn area frm 1791 t 1867. He was 29 years ld when Hand Oersted, in 1820, accidentally discvered that electric current creates magnetic field. Thrugh empirical bservatin and
More informationTuring Machines. Human-aware Robotics. 2017/10/17 & 19 Chapter 3.2 & 3.3 in Sipser Ø Announcement:
Turing Machines Human-aware Rbtics 2017/10/17 & 19 Chapter 3.2 & 3.3 in Sipser Ø Annuncement: q q q q Slides fr this lecture are here: http://www.public.asu.edu/~yzhan442/teaching/cse355/lectures/tm-ii.pdf
More informationFinite State Automata that Recurrent Cascade-Correlation Cannot Represent
Finite State Autmata that Recurrent Cascade-Crrelatin Cannt Represent Stefan C. Kremer Department f Cmputing Science University f Alberta Edmntn, Alberta, CANADA T6H 5B5 Abstract This paper relates the
More informationFinite Automata. Human-aware Robo.cs. 2017/08/22 Chapter 1.1 in Sipser
Finite Autmata 2017/08/22 Chapter 1.1 in Sipser 1 Last time Thery f cmputatin Autmata Thery Cmputability Thery Cmplexity Thery Finite autmata Pushdwn autmata Turing machines 2 Outline fr tday Finite autmata
More informationBroadcast Program Generation for Unordered Queries with Data Replication
Bradcast Prgram Generatin fr Unrdered Queries with Data Replicatin Jiun-Lng Huang and Ming-Syan Chen Department f Electrical Engineering Natinal Taiwan University Taipei, Taiwan, ROC E-mail: jlhuang@arbr.ee.ntu.edu.tw,
More informationA solution of certain Diophantine problems
A slutin f certain Diphantine prblems Authr L. Euler* E7 Nvi Cmmentarii academiae scientiarum Petrplitanae 0, 1776, pp. 8-58 Opera Omnia: Series 1, Vlume 3, pp. 05-17 Reprinted in Cmmentat. arithm. 1,
More informationIntroduction to Spacetime Geometry
Intrductin t Spacetime Gemetry Let s start with a review f a basic feature f Euclidean gemetry, the Pythagrean therem. In a twdimensinal crdinate system we can relate the length f a line segment t the
More informationAdmin. MDP Search Trees. Optimal Quantities. Reinforcement Learning
Admin Reinfrcement Learning Cntent adapted frm Berkeley CS188 MDP Search Trees Each MDP state prjects an expectimax-like search tree Optimal Quantities The value (utility) f a state s: V*(s) = expected
More informationLesson Plan. Recode: They will do a graphic organizer to sequence the steps of scientific method.
Lessn Plan Reach: Ask the students if they ever ppped a bag f micrwave ppcrn and nticed hw many kernels were unppped at the bttm f the bag which made yu wnder if ther brands pp better than the ne yu are
More informationCambridge Assessment International Education Cambridge Ordinary Level. Published
Cambridge Assessment Internatinal Educatin Cambridge Ordinary Level ADDITIONAL MATHEMATICS 4037/1 Paper 1 Octber/Nvember 017 MARK SCHEME Maximum Mark: 80 Published This mark scheme is published as an aid
More informationT Algorithmic methods for data mining. Slide set 6: dimensionality reduction
T-61.5060 Algrithmic methds fr data mining Slide set 6: dimensinality reductin reading assignment LRU bk: 11.1 11.3 PCA tutrial in mycurses (ptinal) ptinal: An Elementary Prf f a Therem f Jhnsn and Lindenstrauss,
More informationTree Structured Classifier
Tree Structured Classifier Reference: Classificatin and Regressin Trees by L. Breiman, J. H. Friedman, R. A. Olshen, and C. J. Stne, Chapman & Hall, 98. A Medical Eample (CART): Predict high risk patients
More informationSupport-Vector Machines
Supprt-Vectr Machines Intrductin Supprt vectr machine is a linear machine with sme very nice prperties. Haykin chapter 6. See Alpaydin chapter 13 fr similar cntent. Nte: Part f this lecture drew material
More informationTrigonometric Ratios Unit 5 Tentative TEST date
1 U n i t 5 11U Date: Name: Trignmetric Ratis Unit 5 Tentative TEST date Big idea/learning Gals In this unit yu will extend yur knwledge f SOH CAH TOA t wrk with btuse and reflex angles. This extensin
More informationOn small defining sets for some SBIBD(4t - 1, 2t - 1, t - 1)
University f Wllngng Research Online Faculty f Infrmatics - Papers (Archive) Faculty f Engineering and Infrmatin Sciences 992 On small defining sets fr sme SBIBD(4t -, 2t -, t - ) Jennifer Seberry University
More informationMATCHING TECHNIQUES. Technical Track Session VI. Emanuela Galasso. The World Bank
MATCHING TECHNIQUES Technical Track Sessin VI Emanuela Galass The Wrld Bank These slides were develped by Christel Vermeersch and mdified by Emanuela Galass fr the purpse f this wrkshp When can we use
More informationMATHEMATICS SYLLABUS SECONDARY 5th YEAR
Eurpean Schls Office f the Secretary-General Pedaggical Develpment Unit Ref. : 011-01-D-8-en- Orig. : EN MATHEMATICS SYLLABUS SECONDARY 5th YEAR 6 perid/week curse APPROVED BY THE JOINT TEACHING COMMITTEE
More information8 th Grade Math: Pre-Algebra
Hardin Cunty Middle Schl (2013-2014) 1 8 th Grade Math: Pre-Algebra Curse Descriptin The purpse f this curse is t enhance student understanding, participatin, and real-life applicatin f middle-schl mathematics
More informationAerodynamic Separability in Tip Speed Ratio and Separability in Wind Speed- a Comparison
Jurnal f Physics: Cnference Series OPEN ACCESS Aerdynamic Separability in Tip Speed Rati and Separability in Wind Speed- a Cmparisn T cite this article: M L Gala Sants et al 14 J. Phys.: Cnf. Ser. 555
More informationDepartment of Electrical Engineering, University of Waterloo. Introduction
Sectin 4: Sequential Circuits Majr Tpics Types f sequential circuits Flip-flps Analysis f clcked sequential circuits Mre and Mealy machines Design f clcked sequential circuits State transitin design methd
More informationDesign and Simulation of Dc-Dc Voltage Converters Using Matlab/Simulink
American Jurnal f Engineering Research (AJER) 016 American Jurnal f Engineering Research (AJER) e-issn: 30-0847 p-issn : 30-0936 Vlume-5, Issue-, pp-9-36 www.ajer.rg Research Paper Open Access Design and
More informationAristotle I PHIL301 Prof. Oakes Winthrop University updated: 3/14/14 8:48 AM
Aristtle I PHIL301 Prf. Oakes Winthrp University updated: 3/14/14 8:48 AM The Categries - The Categries is ne f several imprtant wrks by Aristtle n metaphysics. His tpic here is the classificatin f beings
More informationA Matrix Representation of Panel Data
web Extensin 6 Appendix 6.A A Matrix Representatin f Panel Data Panel data mdels cme in tw brad varieties, distinct intercept DGPs and errr cmpnent DGPs. his appendix presents matrix algebra representatins
More informationDocument for ENES5 meeting
HARMONISATION OF EXPOSURE SCENARIO SHORT TITLES Dcument fr ENES5 meeting Paper jintly prepared by ECHA Cefic DUCC ESCOM ES Shrt Titles Grup 13 Nvember 2013 OBJECTIVES FOR ENES5 The bjective f this dcument
More information