Using Unification For Opacity Properties

Size: px
Start display at page:

Download "Using Unification For Opacity Properties"

Transcription

1 Unité Mixte de Recherche 5104 CNRS - INPG - UJF Centre Equatin 2, avenue de VIGNATE F GIERES tel : fax : Using Unificatin Fr Opacity Prperties Reprt n 24 Octber 28, 2004 Reprts are dwnladable at the fllwing address

2 Using Unificatin Fr Opacity Prperties Octber 28, 2004 Abstract The mst studied prperty, secrecy, is nt always sufficient t prve the security f a prtcl. Other prperties such as annymity, privacy r pacity culd be useful. Here, we give a simple definitin f pacity by lking at the pssible traces f the prtcl. Our apprach draws n a new prperty ver messages called similarity. Then, using rewriting methds clse t thse used in unificatin, we demnstrate the decidability f ur pacity prperty. This is nly achieved in the case f atmic keys using a methd called Key Quantificatin. Keywrds: Opacity, Security, Frmal Verificatin, Dlev-Ya Cnstraints, Rewriting Systems, Decidability. Reviewers: Ntes: A cnference versin has been published in Prc. f the Wrkshp n Issues in the Thery f Security (WITS Hw t cite this { verimag-tr , title = { Using Unificatin Fr Opacity Prperties}, authrs = { }, institutin = { Verimag Technical Reprt }, number = {24}, year = { 2004}, nte = { } }

3 1 Intrductin During the last decade, verificatin f security prtcls has been widely investigated. The majrity f the studies fcussed n demnstrating secrecy prperties using frmal methds (see fr example [3], [5], [4] r [7]. These methds have lead t cncrete tls fr verifying secrecy such as these prpsed by the EVA prject [2]. Hwever, checking security prtcls requires studying ther prperties such as annymity r pacity : hiding a piece f infrmatin frm an intruder. Fr instance, in a vte prtcl, whereas the intruder is able t infer the pssible values f the vte (yes r n, it shuld be impssible fr him t guess which vte was expressed, nly by bserving a sessin f this prtcl. Checking a prtcl shuld include a way f frmalizing the infrmatin that were leaked and that the intruder culd guess. In the last few years, attempts have been made t prperly define pacity prperties, t prve their decidability in certain cases and t prpse sme verificatin algrithms. In this paper, we adpt a simple definitin fr pacity. The intruder C has a passive view f a prtcl sessin invlving tw agents A and B. He is able t read any exchanged messages but he cannt mdify, blck r create a message. A prperty will be called paque if there are tw pssible sessins f the prtcl such that : in ne f these, the prperty is true whereas it is nt in the ther, and it is impssible fr the intruder t differentiate the messages frm these tw sessins frm the messages exchanged in the riginal sessin. The starting pint is the ntin f similarity. This binary relatin nted is an equivalence relatin between messages. Tw messages are similar if it is nt feasible fr the intruder t differentiate them. A typical example is tw different messages encded by a key that the intruder culd nt infer. Frm the pint f view f the intruder, these messages will be said similar. This ntin is f curse dependent f the knwledge f the intruder given by Dlev-Ya thery [6] : if the intruder is able t infer any f the used keys, then similarity will be equivalent t syntactic equality. This ntin f similarity will allw us t express pacity prperties as cnstraints. We will then use rewriting techniques t find the set f slutins fr such cnstraints. The rewriting rules are mainly inspired by the rules used in the unificatin algrithm. The prblem is very similar t unificatin except that atmic cnstraints make use f similarity instead f syntactic equality. That is why, the rewriting rules are similar but nt exactly the same. This technique will give the same result as fr unificatin : we will be able t express the set f slutins fr any cnstraint. As the cnstraint satisfiability is exactly related t pacity, this gives the main result f this paper : decidability f the pacity prperty in ur case. With sme hypthesis (passive intruder, atmic keys, the pacity f a given prperty is decidable and there is an immediate algrithm t perfrm this checking. The remainder f this paper is rganized as fllws. In sectin 2, we recall usual definitin fr messages and prtcls. Similarity ver messages is intrduced in sectin 3 and sme useful prperties are given. Sectin 4 frmalizes the pacity hypthesis and translate the pacity prperty t a cnstraint. Then, it prvides the methd t check satisfiability fr such cnstraints. Eventually, sectin 5 shws the use f this technique n a simple example, and sectin 6 cncludes this paper. 2 Cryptgraphic Prtcls Let Atms and X be tw infinite cuntable disjint sets. Atms is the set f atmic messages a. X is a set f variables called prtcls variables x. Definitin 1 (Message Let Σ be the signature Atms {pair, encrypt} where pair and encrypt are tw binary functins. The atmic messages are suppsed cnstant functins. Then a message is a first rder term ver Σ and the set f variables X, namely an element f T(Σ, X. A message is said t be clsed if it is a clsed term f T(Σ, X, i.e. a term f T(Σ. In the rest f this paper, we will use the fllwing ntatins : m 1, m 2 = pair(m 1, m 2 {m 1 } m2 = encrypt(m 1, m 2

4 The substitutins σ frm X t T(Σ, X are defined as usual. Its applicatin t the message m will be nted mσ. If σ is defined by xσ = n and yσ = y fr any ther variables y, then we culd write m[x\n] instead f mσ. The set f variables used in a message m is called var(m. Definitin 2 (Prtcl Let Actrs be a finite set f participants called actrs. The set f prgrams P rg is given by the fllwing syntax where B is in Actrs, m 1, m 2 and m are messages. G ::= ɛ! B m.g?m.g if m 1 = m 2 then G else G fi A prtcl ver the set f actrs Actrs is a functin frm Actrs t Prgs assciating a prgram t each actr. Fr the fllwing, the set f actrs is fixed t Actrs. Let free(p be the set f free variables in the prtcl P. The functin free will easily be defined ver prgrams by inductin and culd be extended ver prtcls. An instance f the prtcl P is a prtcl P σ where σ instantiates exactly the variables in P with clsed messages. Fr that purpse, it is pssible t rename every bund variable with a fresh variable such that bund variables are distinct and nt in the free variables set. The substitutin σ is called a sessin f the prtcl P. Such prtcls are clsed, i.e. f ree(p σ =. Definitin 3 (Prtcl Semantic The semantic f a prtcl is the transitin system ver prtcls defined by the fllwing rules : If m is a clsed message and σ is the smallest unifier f m and m, Prg(A =! B m.p A Prg(B =?m.p B Prg m Prg[A P A ; B P B ]σ Nte that, if σ des nt exist, the prtcl culd be blcked. If m 1 and m 2 are the same clsed message, Prg(A = if m 1 = m 2 then P A else G fi Prg Prg[A P A ] If m 1 and m 2 are tw distinct clsed messages, Prg(A = if m 1 = m 2 then G else P A fi Prg Prg[A P A ] A prtcl terminates iff fr any Q such that P Q, it is pssible t reach the state ɛ : Q ɛ. Nte that nly clsed prtcls culd terminate. A run f a sessin σ fr a prtcl P is an rdered set f messages r = r 1.r 2...r n such that Pσ r1 r... n ɛ A prtcl sessin is deterministic if it has exactly nly ne pssible run. This run will be nted run(p σ. In the fllwing sectins, the prtcls will always be suppsed deterministic. This paper will make an extensive use f the Dlev-Ya thery. Let E be a set f messages and m be a message, then we will nte E m if m is deducible frm E using the Dlev-Ya s inferences.

5 3 Similarity The intuitive definitin f pacity is that an intruder is nt able t distinguish a run where the prperty is satisfied frm a run where it is nt. T distinguish tw messages, the intruder culd discmpse them, accrding t his knwledge but if he des nt knw the key k fr example, he wn t be able t make the difference between tw different messages encded by this key k. Tw such messages will be called similar messages. This definitin will be frmalized using inference rules. An envirnment is a finite set f clsed messages. Usually, it will dente the set f messages knwn by the intruder. Definitin 4 (Similar Messages Tw clsed messages m 1 and m 2 are said t be similar fr the envirnment env iff env m 1 m 2 where is the smallest binary relatin satisfying : a Atmes a a u 1 u 2 v 1 v 2 u 1, v 1 u 2, v 2 env k u v {u} k {v} k env k env k {u} k {v} k Intuitively, this means that an intruder with the knwledge env will nt be able t differentiate tw similar messages. The envirnment name will be mitted as sn as it is nt relevant fr the cmprehensin. The same thing will be dne fr Dlev-Ya thery, i.e. env m will be nted m. Mrever, the definitin f culd easily be extended t nn-clsed envirnments and messages by adding this inference : x X x x Prperty 1 The binary relatin is an equivalence relatin : fr every messages m 1, m 2 and m 3 : m 1 m 1 m 1 m 2 m 2 m 1 m 1 m 2 m 2 m 3 m 1 m 3 T prve that the relatin is cmpatible with the cntext peratin, we will have t suppse that nly atmic keys are allwed. This hypthesis will hld fr the rest f the dcument. Prperty 2 (Cntext Fr every messages m 1, m 2, m 3 and m 4, if m 3 and m 4 have nly ne free variable x, m 1 m 2 m 3 m 4 m 3 [x\m 1 ] m 4 [x\m 2 ] And in particular, m 1 m 2 m 3 [x\m 1 ] m 3 [x\m 2 ] Let m and n be tw messages and x a variable. Let σ be a substitutin such that xσ nσ. Then mσ m[x\n]σ An imprtant prblem with similarity is : knwing an envirnment env and a clsed message m, is it pssible t find a clsed message n such that env n and env m n Fr that purpse, the f resh functin will be intrduced. It is inductively defined ver messages by the fllwing lines where all the variables y have t be instantiated with different fresh variables (i.e. variables

6 that d nt ccur in env, m r n. We then call Keys + the set f keys such that env Keys + and Keys the set f keys such that env Keys. fresh(a = a fresh(x = x fresh( m, m = fresh(m, fresh(m fresh({m} k = {fresh(m} k if k Keys + fresh({m} k = {y} k if k Keys Prperty 3 Fr every substitutin σ, we have mσ fresh(mσ And the mst imprtant prperty is that if m is similar t n, then n is an instance f fresh(m, i.e. fresh(m where all free variables are instantiated by clsed messages. Prperty 4 If fr tw clsed messages m and n, m n, then there exists a substitutin σ that acts ver the free variables f f resh(m such that n = f resh(mσ. 4 Predicates Using Similarity and Dlev-Ya Thery We will use classical predicates ver messages using the binary relatins = (syntactic equality and (similarity, and the atmic frmulae E m where m is a message and E a set f messages. The set f these predicates will be called P red. Satisfiability ver P red is defined as usual. The set f mdels satisfying E m is the set f substitutins σ such that Eσ and mσ are clsed and Eσ mσ : mσ is deducible frm Eσ using Dlev-Ya thery. Mdels fr and = are defined in the same way. If a substitutin σ is a mdel fr a predicate P, we will write σ = P. If all the atmic frmulas in P use the same envirnment E, then E culd be mitted in the predicate P but we will nte σ = E P. 4.1 The Opacity Prblem Let us cnsider a prtcl P and a sessin σ. The pacity prblem cnsidered here needs sme hypthesis : The intruder C has a passive view f a prtcl sessin invlving tw agents A and B. Passive means that the intruder culd intercept and view any messages between A and B but is nt able t blck, mdify nr t send any message. The intruder knws the prtcl used. Only atmic keys are used fr encding. The intruder has an initial knwledge c 0, which is a predicate (fr example, c 0 = k 1 k 2 means that C knws that the keys that will instantiate k 1 and k 2 are the same. The sessin σ defines a witness run run(pσ = m 1.m 2...m n. A prperty ψ will be said paque fr this sessin σ if it is impssible t tell accrding t the knwledge f C if ψ is true r false. This means that there exist tw pssible sessins σ 1 and σ 2 f the prtcl giving messages similar t the witness messages where fr example, ψσ 1 is true and ψσ 2 is false. In this case, the intruder will nt be able t deduce any knwledge n ψ.

7 Definitin 5 (Opacity A prperty ψ is said t be paque fr a prtcl sessin σ f P iff there exist tw sessins f the prtcl σ 1 and σ 2 such that c 0 σ 1 p 1 m 1... p n m n ψσ 1 c 0 σ 2 q 1 m 1... q n m n ψσ 2 Where p 1.p 2...p n is the run f the prtcl P related t σ 1, q 1.q 2...q n is related t σ 2 and m 1.m 2...m n is related t σ. Nte that the three runs p, q and m must have the same length n. The envirnment used in the precedent cnjunctins is {m 1,..., m n, p 1,..., p n, q 1,..., q n } and culd be augmented with an initial knwledge f the intruder env 0. Our prperty f pacity culd als be used t check annymity. Fr example, if we take a definitin f annymity clsed t the ne given in [10], we just have t add a restricted view fr the intruder, i.e. the intruder nly intercepts sme f the exchanged messages. Then the pacity f the prperty identity f such actr will be similar t what is defined as annymity. 4.2 A Decidable Fragment : Glbal Key Quantificatin A similarity cnjunctin is a predicate f the frm : P = n m i n i i=1 Namely, it is a cnjunctin f similarities. The set f such predicates will be called Cnj. The purpse f this sectin is t shw that satisfiability ver Cnj is decidable. The decisin algrithm will be based n rewriting rules inspired by these used in unificatin (see fr example [9]. This will transfrm any cnjunctin t a slved frm, and we will shw that, fr such frms, the set f slutins is cmputable. The idea, as in unificatin, is t reverse the inferences giving. An intuitive rule fr decding message wuld be : {m 1 } k1 {m 2 } k2 ( k 1 k 2 m 1 m 2 k 1 ( k1 k 2 The messages {m 1 } k1 and {m 2 } k2 are similar in tw cases : if nne f the keys are cmprmised r if the keys are equals and the encded messages are similar. Hwever, using nly unificatin-like rules will nt wrk. The main difference is that a predicate like x {x} k has sme slutins if the key k is nt deducible by the intruder. Fr example, x = {a} k satisfies the frmer predicate. The usual ccur check rule culd nt apply directly, s we will have t use a methd called key quantificatin. The idea f key quantificatin lies upn the fact that the set Keys f keys ccuring in the prtcl is finite. That is why we will make tries fr every pssible partitin Keys + Keys f Keys with the fllwing hypthesis : if σ is a slutin, then fr every k + in Keys + and k in Keys, we have envσ k + σ and envσ k σ. S we quantify ver the set Keys + f cmprmised keys. Furthermre, if the intruder knws initially sme f the keys Keys + 0, we will nly quantify fr Keys+ Keys + 0. After chsing Keys +, the first step is t substitute the cnjunctin by : n fresh(m i fresh(n i i=1 Let us call freshv ar(m i the set f fresh variables used t cmpute fresh(m i. By extensin, let us define freshv ar(p by : freshv ar(p = n (freshv ar(m i freshv ar(n i The rewriting system R ver Cnj is defined by the fllwing rules. i=1

8 Variable Reslutin (Res : if the variable x ccurs in C and nt in m, x m C x m C[x\m] If m is the variable x, Else, if the variable x ccurs in m, x x C C x m C Pair Decmpsitin (Pair : m 1, m 2 n 1, n 2 C m 1 n 1 m 2 n 2 C Axim (Ax : fr a and b tw distinct atms a a C C a b C Type Mismatch (Type : m 1, m 2 {m} k C a m 1, m 2 C a {m} k C Cde Decmpsitin (Cde : if k 1 and k 2 are in Keys +, {m 1 } k1 {m 2 } k2 C C k 1 k 2 m 1 m 2 If k 1 and k 2 are in Keys, Else, {m 1 } k1 {m 2 } k2 C C {m 1 } k1 {m 2 } k2 C Definitin 6 (Slved Variable/Frm A variable x frm X is slved in a predicate P iff x appears exactly in ne similarity f P and this similarity has the frm x m where m is a message that des nt cntain x. A slved frm is an element P f the set Cnj f the frm Where fr every i, the variable x i is slved. P = n x i m i i=1 Nte that, in a slved frm, sme f the free variables culd be unslved. This will be the case, in particular, fr ur fresh variables. Therem 1 The rewriting system R terminates and the nrmal frms are slved frms and. Mrever, R is crrect and cmplete, i.e. the slutins f a predicate are exactly the slutins f its nrmal frms. Prf 1 T prve the terminatin f the rewriting system, we will use the lexicgraphic rder (sf, sp, sc, np lex where sf is the number f nn-slved variables, sp is the number f pair used in the predicate, sc is the number f encryptins and np is the number f atmic frmulas. Then the values decreases strictly during rewriting as shwn in the fllwing array. This prves the terminatin f the rewriting system.

9 Rule sf sp sc np Res 1 < Res 2 < Res 3 < Pair < Ax 1 2 < Type < Cde < Fr the cmpleteness and crrectin f rewriting, we have t prve fr each rule P 1 P 2 that P 1 and P 2 have exactly the same sets f slutins. The predicate is equivalent t a slved frm : n x i m i i=1 We culd nw describe the set Σ f pssible substitutins σ satisfying ur predicate P by : fr any variable x that is nt slved, xσ ranges ver all the pssible messages. These variables includes in particular sme f the fresh variables included in the sets freshv ar(m i. Fr the slved variables x i, x i σ = m i σ As m i culd nly cntain unslved variables, the frmer definitin is nt recursive. At last, we have t check that the hypthesis we made ver Keys + and Keys is crrect, i.e. there exists a σ amng Σ such that envσ Keys σ. We will nt cnsider the hypthesis ver Keys + as sn as the keys f Keys + σ culd be cnsidered as part f the initial knwledge f the intruder. T check that Keys is nt deducible, it is pssible t try with the wrst slutin (fr Dlev-Ya thery, i.e. use the same fresh atm a fr all the xσ where x is nt a key and use different fresh atms fr keys. Prperty 5 The σ defined abve is the wrst accrding t Dlev-Ya thery, frmally fr every cuple f messages m and n, ( η Σ, envη mη nη envσ mσ nσ ( η Σ, envη mη envσ mσ Prf 2 We suppse that there exists η Σ such that envη mη nη. By inductin n the prf s structure f envη mη nη, the prperty is easy t prve using the fllwing lemma : fr every key variable k : envη kη envσ kσ As kσ is atmic and keys are atmic, kσ culd be btained frm envσ using nly decmpsitin rules. Then, given the nature f σ, we have that env k which prves that envη kη. T finish ur check, we just have t prve envσ Keys fr ur wrst σ. This last check is f curse decidable. T cnclude this sectin, let us recall the main steps f ur decisin algrithm : Write the pacity prperty as tw cnstraints. Prcess these cnstraints ne after the ther. Chse a set Keys + included in K (finite number f pssibilities. Rewrite the cnstraints using the given rules. Check that the set Keys \ Keys + culd nt be inferred by the intruder using the wrst slutin. If fr the tw cnstraints, there exists a set Keys + such that the wrst slutin is valid, then the studied prperty is paque. Otherwise, the prperty is nt paque.

10 5 Example : The Limited Cryptgraphs Dinner T give a simple applicatin f pacity, the example f the cryptgraphs dinner will be taken. In this example, nly tw cryptgraphs will be present : Alice (A and Bb (B. They have dinner tgether in a restaurant. When cmes the time t pay, the waiter tells them that smene already paid the bill. A and B want t knw if the persn wh paid is ne f them r nt, but if this is the case, they als want that name t remain annymus. They suppse that an intruder Charlie (C culd listen t whatever they say. They decide t flip tw cins (C can t see the result, if bth are head r bth are tail, A have t tell 1 if he didn t pay, 0 else, same thing fr B. If the cins gives tw different results, then A and B act in the ppsite way. Obviusly A and B culd knw with that prtcl wh paid the dinner. C culd als knw if A r B paid. Nw we want t check that C cannt deduce wh paid. Let us frmalize this prtcl. They will tss tw cins p 1 and p 2 with result the bleans x 1 and x 2. The predicate x A is true iff A paid, the predicate x B is true iff B paid. The first step f the prtcl is the distributin f x 1 and x 2 by a third actr S using a key k nt deducible by C. S A : { x 1, x 2 } k S B : { x 1, x 2 } k The fllwing f the prtcl is detailed belw with respect t the pssible values fr the different variables. x A x B x x A B impssible B A impssible Let us suppse the trace f the prtcl is : S A, B : { 0, 1 } k A B : 1 B A : 0 S ne f A and B paid the dinner. Intuitively, we culd cnclude immediately. Let us cnsider the tw bld clumns, they prpse the right executin trace but in ne case A paid, in the ther ne, it is B. The identity f the payer remains annymus. The pacity prperty is the fllwing with the envirnment {0, 1}. σ 1, ( { x 1, x 2 } k { 0, 1 } k A B = 1 B A = 0 x A σ1 σ 2, ( x 1, x 2 } k { 0, 1 } k A B = 1 B A = 0 x A σ2 Let suppse that k is in Keys (therwise, the prperty is nt paque. By develping, we btain that the pssible sessins fr that trace are : [x A \0, x B \1, x 1 \0, x 2 \0], [x A \0, x B \1, x 1 \1, x 2 \1], [x A \1, x B \0, x 1 \0, x 2 \1] r [x A \1, x B \0, x 1 \1, x 2 \0]. And we culd take fr example : This prves the annymity f the payer fr this trace. σ 1 = [x A \0, x B \1, x 1 \0, x 2 \0] σ 2 = [x A \1, x B \0, x 1 \1, x 2 \0]

11 6 Cnclusin In this paper, we presented a new simple and intuitive definitin fr pacity. With that definitin, the pacity f a given prperty is decidable. The decisin algrithm has been implemented and tested in sme example cases. As far as we knw, ther versins f pacity ([1], [8] have been given in the literature but nne f these criterin were implemented. This wrk has sme limitatin, in particular, the hypthesis made ver the sessin between A and B : nly atmic keys are used and public key cryptgraphy is nt allwed. This gives sme natural extensin t this paper that will be explred later. Fr example, using tree autmata techniques shuld allw the use f nn-atmic keys. Anther interesting extensin wuld be t make the intruder active. If C culd intercept and mdify the messages, culd he find the right messages t alter such that the prperty is nt paque any mre? Anther interesting extensin wuld be t add syntactic equality t cnstraints : this equality means that the intruder has receive tw exactly identical messages. With that knwledge, the intruder culd make new deductins. References [1] A. Bisseau. Abstractins pur la vérificatin de prpriétés de sécurité de prtcles cryptgraphiques. PhD thesis, Labratire Spécificatin et Vérificatin (LSV, ENS de Cachan, [2] L. Bzga, Y. Lakhnech, and M. Périn. Abstract interpretatin fr secrecy using patterns. Technical reprt, EVA : [3] E.M. Clarke, S. Jha, and W. Marrer. Using state space explratin and a natural deductin style message derivatin engine t verify security prtcls. In IFIP Wrking Cnference n Prgramming Cncepts and Methds, [4] H. Cmn-Lundh. and V. Crtier. Security prperties: Tw agents are sufficient. Technical reprt, LSV, [5] H. Cmn-Lundh and V. Crtier. New decidability results fr fragments f first-rder lgic and applicatin t cryptgraphic prtcls. In 14th Int. Cnf. Rewriting Techniques and Applicatins (RTA 2003, vlume 2706 f LNCS, [6] D. Dlev and A. C. Ya. On the security f public key prtcls. IEEE Transactins n Infrmatin Thery, 29(2: , [7] Jean Gubault-Larrecq. A methd fr autmatic cryptgraphic prtcl verificatin. In Internatinal Wrkshp n Frmal Methds fr Parallel Prgramming: Thery and Applicatins, vlume 1800 f LNCS, [8] Dminic Hughes and Vitaly Shmatikv. Infrmatin hiding, annymity and privacy: A mdular apprach. Jurnal f Cmputer Security, 12(1:3 36, [9] Claude Kirchner and Hélène Kirchner. Rewriting, slving, prving. A preliminary versin f a bk available at ckirchne/rsp.ps.gz, [10] Steve Schneider and Abraham Sidirpuls. CSP and annymity. In ESORICS, pages ,

Introduction to Models and Properties

Introduction to Models and Properties Intrductin t Mdels and Prperties Cmputer Science and Artificial Intelligence Labratry MIT Armand Slar-Lezama Nv 23, 2015 Nvember 23, 2015 1 Recap Prperties Prperties f variables Prperties at prgram pints

More information

Chapter Summary. Mathematical Induction Strong Induction Recursive Definitions Structural Induction Recursive Algorithms

Chapter Summary. Mathematical Induction Strong Induction Recursive Definitions Structural Induction Recursive Algorithms Chapter 5 1 Chapter Summary Mathematical Inductin Strng Inductin Recursive Definitins Structural Inductin Recursive Algrithms Sectin 5.1 3 Sectin Summary Mathematical Inductin Examples f Prf by Mathematical

More information

Hypothesis Tests for One Population Mean

Hypothesis Tests for One Population Mean Hypthesis Tests fr One Ppulatin Mean Chapter 9 Ala Abdelbaki Objective Objective: T estimate the value f ne ppulatin mean Inferential statistics using statistics in rder t estimate parameters We will be

More information

Revisiting the Socrates Example

Revisiting the Socrates Example Sectin 1.6 Sectin Summary Valid Arguments Inference Rules fr Prpsitinal Lgic Using Rules f Inference t Build Arguments Rules f Inference fr Quantified Statements Building Arguments fr Quantified Statements

More information

Public Key Cryptography. Tim van der Horst & Kent Seamons

Public Key Cryptography. Tim van der Horst & Kent Seamons Public Key Cryptgraphy Tim van der Hrst & Kent Seamns Last Updated: Oct 5, 2017 Asymmetric Encryptin Why Public Key Crypt is Cl Has a linear slutin t the key distributin prblem Symmetric crypt has an expnential

More information

WRITING THE REPORT. Organizing the report. Title Page. Table of Contents

WRITING THE REPORT. Organizing the report. Title Page. Table of Contents WRITING THE REPORT Organizing the reprt Mst reprts shuld be rganized in the fllwing manner. Smetime there is a valid reasn t include extra chapters in within the bdy f the reprt. 1. Title page 2. Executive

More information

Differentiation Applications 1: Related Rates

Differentiation Applications 1: Related Rates Differentiatin Applicatins 1: Related Rates 151 Differentiatin Applicatins 1: Related Rates Mdel 1: Sliding Ladder 10 ladder y 10 ladder 10 ladder A 10 ft ladder is leaning against a wall when the bttm

More information

Math Foundations 20 Work Plan

Math Foundations 20 Work Plan Math Fundatins 20 Wrk Plan Units / Tpics 20.8 Demnstrate understanding f systems f linear inequalities in tw variables. Time Frame December 1-3 weeks 6-10 Majr Learning Indicatrs Identify situatins relevant

More information

Admissibility Conditions and Asymptotic Behavior of Strongly Regular Graphs

Admissibility Conditions and Asymptotic Behavior of Strongly Regular Graphs Admissibility Cnditins and Asympttic Behavir f Strngly Regular Graphs VASCO MOÇO MANO Department f Mathematics University f Prt Oprt PORTUGAL vascmcman@gmailcm LUÍS ANTÓNIO DE ALMEIDA VIEIRA Department

More information

Application Of Mealy Machine And Recurrence Relations In Cryptography

Application Of Mealy Machine And Recurrence Relations In Cryptography Applicatin Of Mealy Machine And Recurrence Relatins In Cryptgraphy P. A. Jytirmie 1, A. Chandra Sekhar 2, S. Uma Devi 3 1 Department f Engineering Mathematics, Andhra University, Visakhapatnam, IDIA 2

More information

CAUSAL INFERENCE. Technical Track Session I. Phillippe Leite. The World Bank

CAUSAL INFERENCE. Technical Track Session I. Phillippe Leite. The World Bank CAUSAL INFERENCE Technical Track Sessin I Phillippe Leite The Wrld Bank These slides were develped by Christel Vermeersch and mdified by Phillippe Leite fr the purpse f this wrkshp Plicy questins are causal

More information

CS 477/677 Analysis of Algorithms Fall 2007 Dr. George Bebis Course Project Due Date: 11/29/2007

CS 477/677 Analysis of Algorithms Fall 2007 Dr. George Bebis Course Project Due Date: 11/29/2007 CS 477/677 Analysis f Algrithms Fall 2007 Dr. Gerge Bebis Curse Prject Due Date: 11/29/2007 Part1: Cmparisn f Srting Algrithms (70% f the prject grade) The bjective f the first part f the assignment is

More information

A proposition is a statement that can be either true (T) or false (F), (but not both).

A proposition is a statement that can be either true (T) or false (F), (but not both). 400 lecture nte #1 [Ch 2, 3] Lgic and Prfs 1.1 Prpsitins (Prpsitinal Lgic) A prpsitin is a statement that can be either true (T) r false (F), (but nt bth). "The earth is flat." -- F "March has 31 days."

More information

A New Evaluation Measure. J. Joiner and L. Werner. The problems of evaluation and the needed criteria of evaluation

A New Evaluation Measure. J. Joiner and L. Werner. The problems of evaluation and the needed criteria of evaluation III-l III. A New Evaluatin Measure J. Jiner and L. Werner Abstract The prblems f evaluatin and the needed criteria f evaluatin measures in the SMART system f infrmatin retrieval are reviewed and discussed.

More information

We can see from the graph above that the intersection is, i.e., [ ).

We can see from the graph above that the intersection is, i.e., [ ). MTH 111 Cllege Algebra Lecture Ntes July 2, 2014 Functin Arithmetic: With nt t much difficulty, we ntice that inputs f functins are numbers, and utputs f functins are numbers. S whatever we can d with

More information

CHAPTER 3 INEQUALITIES. Copyright -The Institute of Chartered Accountants of India

CHAPTER 3 INEQUALITIES. Copyright -The Institute of Chartered Accountants of India CHAPTER 3 INEQUALITIES Cpyright -The Institute f Chartered Accuntants f India INEQUALITIES LEARNING OBJECTIVES One f the widely used decisin making prblems, nwadays, is t decide n the ptimal mix f scarce

More information

Thermodynamics Partial Outline of Topics

Thermodynamics Partial Outline of Topics Thermdynamics Partial Outline f Tpics I. The secnd law f thermdynamics addresses the issue f spntaneity and invlves a functin called entrpy (S): If a prcess is spntaneus, then Suniverse > 0 (2 nd Law!)

More information

Dataflow Analysis and Abstract Interpretation

Dataflow Analysis and Abstract Interpretation Dataflw Analysis and Abstract Interpretatin Cmputer Science and Artificial Intelligence Labratry MIT Nvember 9, 2015 Recap Last time we develped frm first principles an algrithm t derive invariants. Key

More information

1996 Engineering Systems Design and Analysis Conference, Montpellier, France, July 1-4, 1996, Vol. 7, pp

1996 Engineering Systems Design and Analysis Conference, Montpellier, France, July 1-4, 1996, Vol. 7, pp THE POWER AND LIMIT OF NEURAL NETWORKS T. Y. Lin Department f Mathematics and Cmputer Science San Jse State University San Jse, Califrnia 959-003 tylin@cs.ssu.edu and Bereley Initiative in Sft Cmputing*

More information

THE LIFE OF AN OBJECT IT SYSTEMS

THE LIFE OF AN OBJECT IT SYSTEMS THE LIFE OF AN OBJECT IT SYSTEMS Persns, bjects, r cncepts frm the real wrld, which we mdel as bjects in the IT system, have "lives". Actually, they have tw lives; the riginal in the real wrld has a life,

More information

Bootstrap Method > # Purpose: understand how bootstrap method works > obs=c(11.96, 5.03, 67.40, 16.07, 31.50, 7.73, 11.10, 22.38) > n=length(obs) >

Bootstrap Method > # Purpose: understand how bootstrap method works > obs=c(11.96, 5.03, 67.40, 16.07, 31.50, 7.73, 11.10, 22.38) > n=length(obs) > Btstrap Methd > # Purpse: understand hw btstrap methd wrks > bs=c(11.96, 5.03, 67.40, 16.07, 31.50, 7.73, 11.10, 22.38) > n=length(bs) > mean(bs) [1] 21.64625 > # estimate f lambda > lambda = 1/mean(bs);

More information

Lead/Lag Compensator Frequency Domain Properties and Design Methods

Lead/Lag Compensator Frequency Domain Properties and Design Methods Lectures 6 and 7 Lead/Lag Cmpensatr Frequency Dmain Prperties and Design Methds Definitin Cnsider the cmpensatr (ie cntrller Fr, it is called a lag cmpensatr s K Fr s, it is called a lead cmpensatr Ntatin

More information

Floating Point Method for Solving Transportation. Problems with Additional Constraints

Floating Point Method for Solving Transportation. Problems with Additional Constraints Internatinal Mathematical Frum, Vl. 6, 20, n. 40, 983-992 Flating Pint Methd fr Slving Transprtatin Prblems with Additinal Cnstraints P. Pandian and D. Anuradha Department f Mathematics, Schl f Advanced

More information

BASD HIGH SCHOOL FORMAL LAB REPORT

BASD HIGH SCHOOL FORMAL LAB REPORT BASD HIGH SCHOOL FORMAL LAB REPORT *WARNING: After an explanatin f what t include in each sectin, there is an example f hw the sectin might lk using a sample experiment Keep in mind, the sample lab used

More information

NUROP CONGRESS PAPER CHINESE PINYIN TO CHINESE CHARACTER CONVERSION

NUROP CONGRESS PAPER CHINESE PINYIN TO CHINESE CHARACTER CONVERSION NUROP Chinese Pinyin T Chinese Character Cnversin NUROP CONGRESS PAPER CHINESE PINYIN TO CHINESE CHARACTER CONVERSION CHIA LI SHI 1 AND LUA KIM TENG 2 Schl f Cmputing, Natinal University f Singapre 3 Science

More information

Pattern Recognition 2014 Support Vector Machines

Pattern Recognition 2014 Support Vector Machines Pattern Recgnitin 2014 Supprt Vectr Machines Ad Feelders Universiteit Utrecht Ad Feelders ( Universiteit Utrecht ) Pattern Recgnitin 1 / 55 Overview 1 Separable Case 2 Kernel Functins 3 Allwing Errrs (Sft

More information

Lab 1 The Scientific Method

Lab 1 The Scientific Method INTRODUCTION The fllwing labratry exercise is designed t give yu, the student, an pprtunity t explre unknwn systems, r universes, and hypthesize pssible rules which may gvern the behavir within them. Scientific

More information

, which yields. where z1. and z2

, which yields. where z1. and z2 The Gaussian r Nrmal PDF, Page 1 The Gaussian r Nrmal Prbability Density Functin Authr: Jhn M Cimbala, Penn State University Latest revisin: 11 September 13 The Gaussian r Nrmal Prbability Density Functin

More information

Checking the resolved resonance region in EXFOR database

Checking the resolved resonance region in EXFOR database Checking the reslved resnance regin in EXFOR database Gttfried Bertn Sciété de Calcul Mathématique (SCM) Oscar Cabells OECD/NEA Data Bank JEFF Meetings - Sessin JEFF Experiments Nvember 0-4, 017 Bulgne-Billancurt,

More information

Section 6-2: Simplex Method: Maximization with Problem Constraints of the Form ~

Section 6-2: Simplex Method: Maximization with Problem Constraints of the Form ~ Sectin 6-2: Simplex Methd: Maximizatin with Prblem Cnstraints f the Frm ~ Nte: This methd was develped by Gerge B. Dantzig in 1947 while n assignment t the U.S. Department f the Air Frce. Definitin: Standard

More information

CHAPTER 24: INFERENCE IN REGRESSION. Chapter 24: Make inferences about the population from which the sample data came.

CHAPTER 24: INFERENCE IN REGRESSION. Chapter 24: Make inferences about the population from which the sample data came. MATH 1342 Ch. 24 April 25 and 27, 2013 Page 1 f 5 CHAPTER 24: INFERENCE IN REGRESSION Chapters 4 and 5: Relatinships between tw quantitative variables. Be able t Make a graph (scatterplt) Summarize the

More information

RECHERCHES Womcodes constructed with projective geometries «Womcodes» construits à partir de géométries projectives Frans MERKX (') École Nationale Su

RECHERCHES Womcodes constructed with projective geometries «Womcodes» construits à partir de géométries projectives Frans MERKX (') École Nationale Su Wmcdes cnstructed with prjective gemetries «Wmcdes» cnstruits à partir de gémétries prjectives Frans MERKX (') Écle Natinale Supérieure de Télécmmunicatins (ENST), 46, rue Barrault, 75013 PARIS Étudiant

More information

You need to be able to define the following terms and answer basic questions about them:

You need to be able to define the following terms and answer basic questions about them: CS440/ECE448 Sectin Q Fall 2017 Midterm Review Yu need t be able t define the fllwing terms and answer basic questins abut them: Intr t AI, agents and envirnments Pssible definitins f AI, prs and cns f

More information

AIP Logic Chapter 4 Notes

AIP Logic Chapter 4 Notes AIP Lgic Chapter 4 Ntes Sectin 4.1 Sectin 4.2 Sectin 4.3 Sectin 4.4 Sectin 4.5 Sectin 4.6 Sectin 4.7 4.1 The Cmpnents f Categrical Prpsitins There are fur types f categrical prpsitins. Prpsitin Letter

More information

NUMBERS, MATHEMATICS AND EQUATIONS

NUMBERS, MATHEMATICS AND EQUATIONS AUSTRALIAN CURRICULUM PHYSICS GETTING STARTED WITH PHYSICS NUMBERS, MATHEMATICS AND EQUATIONS An integral part t the understanding f ur physical wrld is the use f mathematical mdels which can be used t

More information

READING STATECHART DIAGRAMS

READING STATECHART DIAGRAMS READING STATECHART DIAGRAMS Figure 4.48 A Statechart diagram with events The diagram in Figure 4.48 shws all states that the bject plane can be in during the curse f its life. Furthermre, it shws the pssible

More information

Homology groups of disks with holes

Homology groups of disks with holes Hmlgy grups f disks with hles THEOREM. Let p 1,, p k } be a sequence f distinct pints in the interir unit disk D n where n 2, and suppse that fr all j the sets E j Int D n are clsed, pairwise disjint subdisks.

More information

B. Definition of an exponential

B. Definition of an exponential Expnents and Lgarithms Chapter IV - Expnents and Lgarithms A. Intrductin Starting with additin and defining the ntatins fr subtractin, multiplicatin and divisin, we discvered negative numbers and fractins.

More information

Revision: August 19, E Main Suite D Pullman, WA (509) Voice and Fax

Revision: August 19, E Main Suite D Pullman, WA (509) Voice and Fax .7.4: Direct frequency dmain circuit analysis Revisin: August 9, 00 5 E Main Suite D Pullman, WA 9963 (509) 334 6306 ice and Fax Overview n chapter.7., we determined the steadystate respnse f electrical

More information

Lyapunov Stability Stability of Equilibrium Points

Lyapunov Stability Stability of Equilibrium Points Lyapunv Stability Stability f Equilibrium Pints 1. Stability f Equilibrium Pints - Definitins In this sectin we cnsider n-th rder nnlinear time varying cntinuus time (C) systems f the frm x = f ( t, x),

More information

The Law of Total Probability, Bayes Rule, and Random Variables (Oh My!)

The Law of Total Probability, Bayes Rule, and Random Variables (Oh My!) The Law f Ttal Prbability, Bayes Rule, and Randm Variables (Oh My!) Administrivia Hmewrk 2 is psted and is due tw Friday s frm nw If yu didn t start early last time, please d s this time. Gd Milestnes:

More information

o o IMPORTANT REMINDERS Reports will be graded largely on their ability to clearly communicate results and important conclusions.

o o IMPORTANT REMINDERS Reports will be graded largely on their ability to clearly communicate results and important conclusions. BASD High Schl Frmal Lab Reprt GENERAL INFORMATION 12 pt Times New Rman fnt Duble-spaced, if required by yur teacher 1 inch margins n all sides (tp, bttm, left, and right) Always write in third persn (avid

More information

A Few Basic Facts About Isothermal Mass Transfer in a Binary Mixture

A Few Basic Facts About Isothermal Mass Transfer in a Binary Mixture Few asic Facts but Isthermal Mass Transfer in a inary Miture David Keffer Department f Chemical Engineering University f Tennessee first begun: pril 22, 2004 last updated: January 13, 2006 dkeffer@utk.edu

More information

Assessment Primer: Writing Instructional Objectives

Assessment Primer: Writing Instructional Objectives Assessment Primer: Writing Instructinal Objectives (Based n Preparing Instructinal Objectives by Mager 1962 and Preparing Instructinal Objectives: A critical tl in the develpment f effective instructin

More information

MODULAR DECOMPOSITION OF THE NOR-TSUM MULTIPLE-VALUED PLA

MODULAR DECOMPOSITION OF THE NOR-TSUM MULTIPLE-VALUED PLA MODUAR DECOMPOSITION OF THE NOR-TSUM MUTIPE-AUED PA T. KAGANOA, N. IPNITSKAYA, G. HOOWINSKI k Belarusian State University f Infrmatics and Radielectrnics, abratry f Image Prcessing and Pattern Recgnitin.

More information

Termination analysis of floating-point programs using parameterizable rational approximations

Termination analysis of floating-point programs using parameterizable rational approximations Terminatin analysis f flating-pint prgrams using parameterizable ratinal apprximatins Fnenantsa Maurica Université de La Réunin LIM France fnenantsa.maurica@ gmail.cm Frédéric Mesnard Université de La

More information

Distributions, spatial statistics and a Bayesian perspective

Distributions, spatial statistics and a Bayesian perspective Distributins, spatial statistics and a Bayesian perspective Dug Nychka Natinal Center fr Atmspheric Research Distributins and densities Cnditinal distributins and Bayes Thm Bivariate nrmal Spatial statistics

More information

ENSC Discrete Time Systems. Project Outline. Semester

ENSC Discrete Time Systems. Project Outline. Semester ENSC 49 - iscrete Time Systems Prject Outline Semester 006-1. Objectives The gal f the prject is t design a channel fading simulatr. Upn successful cmpletin f the prject, yu will reinfrce yur understanding

More information

Five Whys How To Do It Better

Five Whys How To Do It Better Five Whys Definitin. As explained in the previus article, we define rt cause as simply the uncvering f hw the current prblem came int being. Fr a simple causal chain, it is the entire chain. Fr a cmplex

More information

Computational modeling techniques

Computational modeling techniques Cmputatinal mdeling techniques Lecture 4: Mdel checing fr ODE mdels In Petre Department f IT, Åb Aademi http://www.users.ab.fi/ipetre/cmpmd/ Cntent Stichimetric matrix Calculating the mass cnservatin relatins

More information

Optimization Programming Problems For Control And Management Of Bacterial Disease With Two Stage Growth/Spread Among Plants

Optimization Programming Problems For Control And Management Of Bacterial Disease With Two Stage Growth/Spread Among Plants Internatinal Jurnal f Engineering Science Inventin ISSN (Online): 9 67, ISSN (Print): 9 676 www.ijesi.rg Vlume 5 Issue 8 ugust 06 PP.0-07 Optimizatin Prgramming Prblems Fr Cntrl nd Management Of Bacterial

More information

Sequential Allocation with Minimal Switching

Sequential Allocation with Minimal Switching In Cmputing Science and Statistics 28 (1996), pp. 567 572 Sequential Allcatin with Minimal Switching Quentin F. Stut 1 Janis Hardwick 1 EECS Dept., University f Michigan Statistics Dept., Purdue University

More information

Determining the Accuracy of Modal Parameter Estimation Methods

Determining the Accuracy of Modal Parameter Estimation Methods Determining the Accuracy f Mdal Parameter Estimatin Methds by Michael Lee Ph.D., P.E. & Mar Richardsn Ph.D. Structural Measurement Systems Milpitas, CA Abstract The mst cmmn type f mdal testing system

More information

MODULE FOUR. This module addresses functions. SC Academic Elementary Algebra Standards:

MODULE FOUR. This module addresses functions. SC Academic Elementary Algebra Standards: MODULE FOUR This mdule addresses functins SC Academic Standards: EA-3.1 Classify a relatinship as being either a functin r nt a functin when given data as a table, set f rdered pairs, r graph. EA-3.2 Use

More information

This section is primarily focused on tools to aid us in finding roots/zeros/ -intercepts of polynomials. Essentially, our focus turns to solving.

This section is primarily focused on tools to aid us in finding roots/zeros/ -intercepts of polynomials. Essentially, our focus turns to solving. Sectin 3.2: Many f yu WILL need t watch the crrespnding vides fr this sectin n MyOpenMath! This sectin is primarily fcused n tls t aid us in finding rts/zers/ -intercepts f plynmials. Essentially, ur fcus

More information

COMP 551 Applied Machine Learning Lecture 11: Support Vector Machines

COMP 551 Applied Machine Learning Lecture 11: Support Vector Machines COMP 551 Applied Machine Learning Lecture 11: Supprt Vectr Machines Instructr: (jpineau@cs.mcgill.ca) Class web page: www.cs.mcgill.ca/~jpineau/cmp551 Unless therwise nted, all material psted fr this curse

More information

Kinetic Model Completeness

Kinetic Model Completeness 5.68J/10.652J Spring 2003 Lecture Ntes Tuesday April 15, 2003 Kinetic Mdel Cmpleteness We say a chemical kinetic mdel is cmplete fr a particular reactin cnditin when it cntains all the species and reactins

More information

Preparation work for A2 Mathematics [2017]

Preparation work for A2 Mathematics [2017] Preparatin wrk fr A2 Mathematics [2017] The wrk studied in Y12 after the return frm study leave is frm the Cre 3 mdule f the A2 Mathematics curse. This wrk will nly be reviewed during Year 13, it will

More information

Automaton-based Non-interference Monitoring

Automaton-based Non-interference Monitoring Autmatn-based Nn-interference Mnitring Gurvan Le Guernic, Anindya Banerjee, David Schmidt T cite this versin: Gurvan Le Guernic, Anindya Banerjee, David Schmidt. Autmatn-based Nn-interference Mnitring.

More information

The steps of the engineering design process are to:

The steps of the engineering design process are to: The engineering design prcess is a series f steps that engineers fllw t cme up with a slutin t a prblem. Many times the slutin invlves designing a prduct (like a machine r cmputer cde) that meets certain

More information

The blessing of dimensionality for kernel methods

The blessing of dimensionality for kernel methods fr kernel methds Building classifiers in high dimensinal space Pierre Dupnt Pierre.Dupnt@ucluvain.be Classifiers define decisin surfaces in sme feature space where the data is either initially represented

More information

A new Type of Fuzzy Functions in Fuzzy Topological Spaces

A new Type of Fuzzy Functions in Fuzzy Topological Spaces IOSR Jurnal f Mathematics (IOSR-JM e-issn: 78-578, p-issn: 39-765X Vlume, Issue 5 Ver I (Sep - Oct06, PP 8-4 wwwisrjurnalsrg A new Type f Fuzzy Functins in Fuzzy Tplgical Spaces Assist Prf Dr Munir Abdul

More information

COMP 551 Applied Machine Learning Lecture 9: Support Vector Machines (cont d)

COMP 551 Applied Machine Learning Lecture 9: Support Vector Machines (cont d) COMP 551 Applied Machine Learning Lecture 9: Supprt Vectr Machines (cnt d) Instructr: Herke van Hf (herke.vanhf@mail.mcgill.ca) Slides mstly by: Class web page: www.cs.mcgill.ca/~hvanh2/cmp551 Unless therwise

More information

Math Foundations 10 Work Plan

Math Foundations 10 Work Plan Math Fundatins 10 Wrk Plan Units / Tpics 10.1 Demnstrate understanding f factrs f whle numbers by: Prime factrs Greatest Cmmn Factrs (GCF) Least Cmmn Multiple (LCM) Principal square rt Cube rt Time Frame

More information

A Transition to Advanced Mathematics. Mathematics and Computer Sciences Department. o Work Experience, General. o Open Entry/Exit

A Transition to Advanced Mathematics. Mathematics and Computer Sciences Department. o Work Experience, General. o Open Entry/Exit SECTION A - Curse Infrmatin 1. Curse ID: 2. Curse Title: 3. Divisin: 4. Department: MATH 245 A Transitin t Advanced Mathematics Natural Sciences Divisin Mathematics and Cmputer Sciences Department 5. Subject:

More information

Department: MATHEMATICS

Department: MATHEMATICS Cde: MATH 022 Title: ALGEBRA SKILLS Institute: STEM Department: MATHEMATICS Curse Descriptin: This curse prvides students wh have cmpleted MATH 021 with the necessary skills and cncepts t cntinue the study

More information

EEO 401 Digital Signal Processing Prof. Mark Fowler

EEO 401 Digital Signal Processing Prof. Mark Fowler EEO 401 Digital Signal Prcessing Prf. Mark Fwler Intrductin Nte Set #1 ading Assignment: Ch. 1 f Prakis & Manlakis 1/13 Mdern systems generally DSP Scenari get a cntinuus-time signal frm a sensr a cnt.-time

More information

On Topological Structures and. Fuzzy Sets

On Topological Structures and. Fuzzy Sets L - ZHR UNIVERSIT - GZ DENSHIP OF GRDUTE STUDIES & SCIENTIFIC RESERCH On Tplgical Structures and Fuzzy Sets y Nashaat hmed Saleem Raab Supervised by Dr. Mhammed Jamal Iqelan Thesis Submitted in Partial

More information

Last Updated: Oct 14, 2017

Last Updated: Oct 14, 2017 RSA Last Updated: Oct 14, 2017 Recap Number thery What is a prime number? What is prime factrizatin? What is a GCD? What des relatively prime mean? What des c-prime mean? What des cngruence mean? What

More information

Dead-beat controller design

Dead-beat controller design J. Hetthéssy, A. Barta, R. Bars: Dead beat cntrller design Nvember, 4 Dead-beat cntrller design In sampled data cntrl systems the cntrller is realised by an intelligent device, typically by a PLC (Prgrammable

More information

Internal vs. external validity. External validity. This section is based on Stock and Watson s Chapter 9.

Internal vs. external validity. External validity. This section is based on Stock and Watson s Chapter 9. Sectin 7 Mdel Assessment This sectin is based n Stck and Watsn s Chapter 9. Internal vs. external validity Internal validity refers t whether the analysis is valid fr the ppulatin and sample being studied.

More information

SUPPLEMENTARY MATERIAL GaGa: a simple and flexible hierarchical model for microarray data analysis

SUPPLEMENTARY MATERIAL GaGa: a simple and flexible hierarchical model for microarray data analysis SUPPLEMENTARY MATERIAL GaGa: a simple and flexible hierarchical mdel fr micrarray data analysis David Rssell Department f Bistatistics M.D. Andersn Cancer Center, Hustn, TX 77030, USA rsselldavid@gmail.cm

More information

Fall 2013 Physics 172 Recitation 3 Momentum and Springs

Fall 2013 Physics 172 Recitation 3 Momentum and Springs Fall 03 Physics 7 Recitatin 3 Mmentum and Springs Purpse: The purpse f this recitatin is t give yu experience wrking with mmentum and the mmentum update frmula. Readings: Chapter.3-.5 Learning Objectives:.3.

More information

Medium Scale Integrated (MSI) devices [Sections 2.9 and 2.10]

Medium Scale Integrated (MSI) devices [Sections 2.9 and 2.10] EECS 270, Winter 2017, Lecture 3 Page 1 f 6 Medium Scale Integrated (MSI) devices [Sectins 2.9 and 2.10] As we ve seen, it s smetimes nt reasnable t d all the design wrk at the gate-level smetimes we just

More information

Lab #3: Pendulum Period and Proportionalities

Lab #3: Pendulum Period and Proportionalities Physics 144 Chwdary Hw Things Wrk Spring 2006 Name: Partners Name(s): Intrductin Lab #3: Pendulum Perid and Prprtinalities Smetimes, it is useful t knw the dependence f ne quantity n anther, like hw the

More information

Physics 2B Chapter 23 Notes - Faraday s Law & Inductors Spring 2018

Physics 2B Chapter 23 Notes - Faraday s Law & Inductors Spring 2018 Michael Faraday lived in the Lndn area frm 1791 t 1867. He was 29 years ld when Hand Oersted, in 1820, accidentally discvered that electric current creates magnetic field. Thrugh empirical bservatin and

More information

Turing Machines. Human-aware Robotics. 2017/10/17 & 19 Chapter 3.2 & 3.3 in Sipser Ø Announcement:

Turing Machines. Human-aware Robotics. 2017/10/17 & 19 Chapter 3.2 & 3.3 in Sipser Ø Announcement: Turing Machines Human-aware Rbtics 2017/10/17 & 19 Chapter 3.2 & 3.3 in Sipser Ø Annuncement: q q q q Slides fr this lecture are here: http://www.public.asu.edu/~yzhan442/teaching/cse355/lectures/tm-ii.pdf

More information

Finite State Automata that Recurrent Cascade-Correlation Cannot Represent

Finite State Automata that Recurrent Cascade-Correlation Cannot Represent Finite State Autmata that Recurrent Cascade-Crrelatin Cannt Represent Stefan C. Kremer Department f Cmputing Science University f Alberta Edmntn, Alberta, CANADA T6H 5B5 Abstract This paper relates the

More information

Finite Automata. Human-aware Robo.cs. 2017/08/22 Chapter 1.1 in Sipser

Finite Automata. Human-aware Robo.cs. 2017/08/22 Chapter 1.1 in Sipser Finite Autmata 2017/08/22 Chapter 1.1 in Sipser 1 Last time Thery f cmputatin Autmata Thery Cmputability Thery Cmplexity Thery Finite autmata Pushdwn autmata Turing machines 2 Outline fr tday Finite autmata

More information

Broadcast Program Generation for Unordered Queries with Data Replication

Broadcast Program Generation for Unordered Queries with Data Replication Bradcast Prgram Generatin fr Unrdered Queries with Data Replicatin Jiun-Lng Huang and Ming-Syan Chen Department f Electrical Engineering Natinal Taiwan University Taipei, Taiwan, ROC E-mail: jlhuang@arbr.ee.ntu.edu.tw,

More information

A solution of certain Diophantine problems

A solution of certain Diophantine problems A slutin f certain Diphantine prblems Authr L. Euler* E7 Nvi Cmmentarii academiae scientiarum Petrplitanae 0, 1776, pp. 8-58 Opera Omnia: Series 1, Vlume 3, pp. 05-17 Reprinted in Cmmentat. arithm. 1,

More information

Introduction to Spacetime Geometry

Introduction to Spacetime Geometry Intrductin t Spacetime Gemetry Let s start with a review f a basic feature f Euclidean gemetry, the Pythagrean therem. In a twdimensinal crdinate system we can relate the length f a line segment t the

More information

Admin. MDP Search Trees. Optimal Quantities. Reinforcement Learning

Admin. MDP Search Trees. Optimal Quantities. Reinforcement Learning Admin Reinfrcement Learning Cntent adapted frm Berkeley CS188 MDP Search Trees Each MDP state prjects an expectimax-like search tree Optimal Quantities The value (utility) f a state s: V*(s) = expected

More information

Lesson Plan. Recode: They will do a graphic organizer to sequence the steps of scientific method.

Lesson Plan. Recode: They will do a graphic organizer to sequence the steps of scientific method. Lessn Plan Reach: Ask the students if they ever ppped a bag f micrwave ppcrn and nticed hw many kernels were unppped at the bttm f the bag which made yu wnder if ther brands pp better than the ne yu are

More information

Cambridge Assessment International Education Cambridge Ordinary Level. Published

Cambridge Assessment International Education Cambridge Ordinary Level. Published Cambridge Assessment Internatinal Educatin Cambridge Ordinary Level ADDITIONAL MATHEMATICS 4037/1 Paper 1 Octber/Nvember 017 MARK SCHEME Maximum Mark: 80 Published This mark scheme is published as an aid

More information

T Algorithmic methods for data mining. Slide set 6: dimensionality reduction

T Algorithmic methods for data mining. Slide set 6: dimensionality reduction T-61.5060 Algrithmic methds fr data mining Slide set 6: dimensinality reductin reading assignment LRU bk: 11.1 11.3 PCA tutrial in mycurses (ptinal) ptinal: An Elementary Prf f a Therem f Jhnsn and Lindenstrauss,

More information

Tree Structured Classifier

Tree Structured Classifier Tree Structured Classifier Reference: Classificatin and Regressin Trees by L. Breiman, J. H. Friedman, R. A. Olshen, and C. J. Stne, Chapman & Hall, 98. A Medical Eample (CART): Predict high risk patients

More information

Support-Vector Machines

Support-Vector Machines Supprt-Vectr Machines Intrductin Supprt vectr machine is a linear machine with sme very nice prperties. Haykin chapter 6. See Alpaydin chapter 13 fr similar cntent. Nte: Part f this lecture drew material

More information

Trigonometric Ratios Unit 5 Tentative TEST date

Trigonometric Ratios Unit 5 Tentative TEST date 1 U n i t 5 11U Date: Name: Trignmetric Ratis Unit 5 Tentative TEST date Big idea/learning Gals In this unit yu will extend yur knwledge f SOH CAH TOA t wrk with btuse and reflex angles. This extensin

More information

On small defining sets for some SBIBD(4t - 1, 2t - 1, t - 1)

On small defining sets for some SBIBD(4t - 1, 2t - 1, t - 1) University f Wllngng Research Online Faculty f Infrmatics - Papers (Archive) Faculty f Engineering and Infrmatin Sciences 992 On small defining sets fr sme SBIBD(4t -, 2t -, t - ) Jennifer Seberry University

More information

MATCHING TECHNIQUES. Technical Track Session VI. Emanuela Galasso. The World Bank

MATCHING TECHNIQUES. Technical Track Session VI. Emanuela Galasso. The World Bank MATCHING TECHNIQUES Technical Track Sessin VI Emanuela Galass The Wrld Bank These slides were develped by Christel Vermeersch and mdified by Emanuela Galass fr the purpse f this wrkshp When can we use

More information

MATHEMATICS SYLLABUS SECONDARY 5th YEAR

MATHEMATICS SYLLABUS SECONDARY 5th YEAR Eurpean Schls Office f the Secretary-General Pedaggical Develpment Unit Ref. : 011-01-D-8-en- Orig. : EN MATHEMATICS SYLLABUS SECONDARY 5th YEAR 6 perid/week curse APPROVED BY THE JOINT TEACHING COMMITTEE

More information

8 th Grade Math: Pre-Algebra

8 th Grade Math: Pre-Algebra Hardin Cunty Middle Schl (2013-2014) 1 8 th Grade Math: Pre-Algebra Curse Descriptin The purpse f this curse is t enhance student understanding, participatin, and real-life applicatin f middle-schl mathematics

More information

Aerodynamic Separability in Tip Speed Ratio and Separability in Wind Speed- a Comparison

Aerodynamic Separability in Tip Speed Ratio and Separability in Wind Speed- a Comparison Jurnal f Physics: Cnference Series OPEN ACCESS Aerdynamic Separability in Tip Speed Rati and Separability in Wind Speed- a Cmparisn T cite this article: M L Gala Sants et al 14 J. Phys.: Cnf. Ser. 555

More information

Department of Electrical Engineering, University of Waterloo. Introduction

Department of Electrical Engineering, University of Waterloo. Introduction Sectin 4: Sequential Circuits Majr Tpics Types f sequential circuits Flip-flps Analysis f clcked sequential circuits Mre and Mealy machines Design f clcked sequential circuits State transitin design methd

More information

Design and Simulation of Dc-Dc Voltage Converters Using Matlab/Simulink

Design and Simulation of Dc-Dc Voltage Converters Using Matlab/Simulink American Jurnal f Engineering Research (AJER) 016 American Jurnal f Engineering Research (AJER) e-issn: 30-0847 p-issn : 30-0936 Vlume-5, Issue-, pp-9-36 www.ajer.rg Research Paper Open Access Design and

More information

Aristotle I PHIL301 Prof. Oakes Winthrop University updated: 3/14/14 8:48 AM

Aristotle I PHIL301 Prof. Oakes Winthrop University updated: 3/14/14 8:48 AM Aristtle I PHIL301 Prf. Oakes Winthrp University updated: 3/14/14 8:48 AM The Categries - The Categries is ne f several imprtant wrks by Aristtle n metaphysics. His tpic here is the classificatin f beings

More information

A Matrix Representation of Panel Data

A Matrix Representation of Panel Data web Extensin 6 Appendix 6.A A Matrix Representatin f Panel Data Panel data mdels cme in tw brad varieties, distinct intercept DGPs and errr cmpnent DGPs. his appendix presents matrix algebra representatins

More information

Document for ENES5 meeting

Document for ENES5 meeting HARMONISATION OF EXPOSURE SCENARIO SHORT TITLES Dcument fr ENES5 meeting Paper jintly prepared by ECHA Cefic DUCC ESCOM ES Shrt Titles Grup 13 Nvember 2013 OBJECTIVES FOR ENES5 The bjective f this dcument

More information