Kayhan CELİK. Erol KURT. x ' ay ax. y ' xz rx y. z ' xy bz

Size: px
Start display at page:

Download "Kayhan CELİK. Erol KURT. x ' ay ax. y ' xz rx y. z ' xy bz"

Transcription

1 ECAI Internatonal Conference 8th Edton Electroncs, Computers and Artfcal Intellgence 3 June -2 July, 216, Bucharest, ROMÂIA A ew Image Encrypton Algorthm Based on Lorenz System Kayhan CELİK Gaz Unversty, Faculty of Technology, Electrcal and Electroncs Engneerng, Ankara, Turkey kayhancelk@gaz.edu.tr Abstract In ths paper, a new mage encrypton algorthm has been ntroduced. The algorthm ncludes the Lorenz system n order to produce a chaotc data and uses t to mask the mages for the secure encrypton. Both the hgh senstvty to the ntal condtons and unpredctablty have ncreased the capablty of encryptng the mages. The algorthm has been tested by dfferent methods n order to evaluate the performance by varous analyses such as the secret key sze and senstvty, hstogram, correlaton, dfferental (plan mage senstvty), nformaton entropy analyss. The expermental results prove that the proposed encrypton approach provdes an effcent and secure approach for the mage encrypton. Keywords- mage encrypton; lorenz chaotc system; chaos; securty analyss. I. ITRODUCTIO The ncrease of communcaton networks and of unsecure meda n the nternet envronment cause to rase the demand on the tools for the secure communcaton and encrypton [1-3]. Ths s a requrement for the socety, whch uses the dgtzed nformaton n daly lfe. In fact, people get and send much nformaton va the nternet for the busness and prvate purposes, frequently. Thus the wde usage of the nternet enhances the securty problems on transmttng and/or recevng of nformaton, safely [4]. ot only the personal nformaton but also the mltary or governmental nformaton should be transmtted and receved. The nformaton may not be only n text format, but t can be n mage, vdeo or sound formats. In the lterature, there exst several well-approved effcent algorthms for the text message encrypton, such as: Data Encrypton Standard (DES), Advanced Encrypton Standard (AES), Internatonal Data Encrypton Algorthm (IDEA) and the Rvest-Shamr-Adleman cryptosystem (RSA). However those algorthms are not well-apprecated for mage or vdeo fle encrypton applcatons [5]. Snce the mages dffer from the text data n many aspects such as hgh redundancy and correlaton, the local structure and the characterstcs of ampltude frequency, the conventonal encrypton methods cannot be applcable to the mages [2]. In that pont, the chaotc systems can serve as a tool to generate hghly-randomzed data for the encrypton, due to ts characterstc features such as the senstve dependence on the ntal condtons, hgh number of system parameters, pseudo-random property, unpredctablty, aperodcty and topologcal Erol KURT Gaz Unversty, Faculty of Technology, Electrcal and Electroncs Engneerng, Ankara, Turkey ekurt@gaz.edu.tr transtvty [6-1]. All these features are ndeed desred for an encrypton applcaton and become necessary for an excellent encrypton system [1]. Therefore, the chaos-based mage encrypton algorthms have wdely flourshed n the last decade for the usage n mage encrypton [1,3,4]. In the present study, we ntroduce a new mage encrypton algorthm based on the chaotc Lorenz system. Accordng to the present method, the chaotc system runs for the generaton of pseudo-random sequences, then these pseudo-random sequences are used both n order to shuffle the postons of mage pxels and to change the gray values of the mage pxels. The paper s organzed as follows: The chaotc Lorenz system s explaned n the next secton. Secton III presents the new mage encrypton algorthm based on the chaotc map. Later on, the man expermental results and related securty analyss are reported n Secton IV. Fnally, the paper ends wth a concluson. II. CHAOTIC LOREZ SYSTEM The Lorenz equaton s nothng else than a model of thermally nduced flud convecton n the atmosphere. The model was frst reported and publshed by E. Lorenz n 1963 [11-13]. It s among the classcal chaotc systems and mples as the cause of the butterfly effect n the scentfc studes due to the fact that the attractor has two wngs as the butterfles [12, 14]. Therefore, t has been wdely studed n chaos theory, dynamc system modelng, chaotc control and synchronzaton phenomenon. Lorenz chaotc equaton s a 3D dynamcal system, whch s defned by x, y and z. The equaton system gves a chaotc behavor wth regard to the ntal system parameters. Apart from any 1D or 2D chaotc systems, the Lorenz system has a much complcated chaotc behavor. The equaton system contans three dfferental equatons: x ' ay ax (1) y ' xz rx y (2) z ' xy bz (3) Here x, y and z are the functons of tme wth the dervatve forms (.e. x, y and z ) and a, b, r are the system parameters for the determnstc system.

2 2 Kayhan CELIK and Erol KURT between and 255 are converted to a 8-bt bnary data for the pxel value transformaton. Secondly, the double values of chaotc sequences are preprocessed as follows: k(, j) mod (( abs( k(, j)) 15 floor( abs( k(, j)))) x 1, 256) (4) a) b) c) Fgure 1. The projectons of attractor on the planes (a) x-y, (b) x-z and (c) y-z. In order to obtan chaos, a, b and r are usually defned as 1, 8/3 and 28, respectvely. However, dfferent dynamcal behavors can be observed, when these parameters are changed. Fg. 1 (a, b, c) presents a typcal chaotc attractor for the ntal condtons (x, y, z) = (1.2, 1.3, 1.6). In the smulatons, dt s adjusted as.5. III. IMAGE ECRYPTIO ALGORITHM The proposed mage encrypton algorthm conssts of varous steps. Step 1: Frstly, the ntal condtons x, y z and, system parameters a, b, r are determned as a secret key. Then, tme teratons of Eqs. (1, 2, 3) are realzed. In order to obtan a more pseudo-random sequence and to remove the transent effect, the results of frst n teratons (.e. n=34) have been gnored. Then 6 dfferent pseudo-random sequences have been produced by usng dfferent teratons as a double value wth 15 1 precson for cryptography. Step 2: In ths step, x, y, z chaotc sequences are used for rotatng pxel values of red, green and blue channels of the plan mage respectvely. The szes of chaotc sequences are M x, where M and are row and column numbers of the plan mage, respectvely. Intally, the pxel values of the plan mage changng Here, k shows x, y or z sequence and k (, j) s the (,j) th element of the sequence whch sze s Mx and abs(k(,j)) returns the absolute value. floor(k(,j)) gves the value of k(, j) to the nearest ntegers less than or equal to k(, j). mod(x, y) gves the remander after dvson as usual. Thrdly, l(,j) value s calculated for each k(,j), whch shows the sum of the dgts of k(,j). Then one can defne m, n and p(,j) as follows: m mod ( l(, j), 2) (5) n mod ( l(, j), 9) (6) p (, j ) ( p (, j ), m, n ) (7) n o All new color values from the orgnal mage s calculated accordng to Eq. 7. Here, p (, j ) shows the o orgnal and p (, j ) s the transformed color value. If n m=, the color s rotated to left and f m=1, the color s rotated to rght. Here n denotes the rotaton amount n terms of bts. Step 3: Intal column vectors have been generated from the chaotc system for red, green and blue color maps. Therefore, ther szes are Mx1. Then, all elements of the frst columns of red, green and blue components of mage have been made xor wth the elements of ntal column vector mutually. Xor results were adjusted to frst column of the mage. Later on, the frst column was made xor wth the second one and adjusted to the second column and all columns were made xor n smlar manner as n Fg 2. Step 4: For the pxel shufflng process, two chaotc sequences (szes M and ) have been used. Ther values are, of course, unrepeatable n the range -M and -, respectvely. These two sequences have been used for the creaton of Mx sze matrx, whch leads to new pxel postons. Thus, all the color values of red, green and blue channels are transformed randomly to new postons. Fgure 2. Xor operatons appled to the columns

3 A ew Image Encrypton Algorthm Based on Lorenz System 3 Step 5: In ths step, the pxel value transformaton s made one more tme as n step 2. All of the pxel values of the plan mage have been rotated randomly by usng new chaotc sequences. Step 6: Row xor operaton s the same as n step 3. Frstly, the ntal row vectors have been generated from the chaotc system for red, green and blue color maps wth the szes 1x. Then, xor has been appled to all elements of the frst row of mage wth the ntal row vector s elements mutually. After that, xor has been appled to the frst row wth the second row and adjusted to second row and all rows have been made xor respectvely as n Fg. 3. Fgure 4. Plan Lena Image Fgure 5. Cphered Lena Image In fact, the secret key sze, secret key senstvty, hstogram, correlaton, dfferental (plan mage senstvty), nformaton entropy analyss are appled. The results show that the proposed encrypton algorthm can be mplemented n real-tme applcatons wth good securty results. Fgure 6. Plan Baboon Image Fgure 7. Cphered Baboon Image Fgure 3. Xor operatons appled to the rows Step 7: In ths step, pxel shufflng has been appled one more tme for the dffuson and confuson processes as n step 4. As a result, the last form of the encrypted mage s obtaned. The decrypton algorthm s just the nverse process of encrypton. Therefore for decryptng the mage, same parameters and the ntal values have been used. The encrypton and the decrypton processes have same algorthmc complexty. At the end of the decrypton process, the output of the decrypton system has gven the orgnal mage as we expect. IV. EXPERIMETAL RESULTS For ths study, the ntal values and the parameters are adjusted as follows wth a good accuracy: a 1., b , r 28., dt.5, x 1.1, y 1.3, z 1.5. In ths study, we used 512x512 colorful Lena and Baboon mages for the demonstraton of the effcency of the proposed mage encrypton algorthm. Whle Fgs. 4 and 6 present these orgnal mages, the cphered mages are gven n Fgs. 5 and 7, respectvely. Below, the robustness of the proposed algorthm s verfed wth the results of certan analyss by applyng the cphered mages (Fgs. 5 and 7). A. The Secret Key And Secret Key Senstvty Analyss In order to test the proposed mage encrypton scheme, the secret key analyss s mportant. In ths analyss, the key space should be large enough to make the brute-force attack nfeasble. In the algorthm, the ntal condtons of the chaotc system have been used as the secret keys wth the precson The key space of the proposed system s The key space should be more than 2 to provde a suffcent securty n order to avod brute-force attacks [1]. Accordng to ths, the key space s large enough for the secret keys. Ths s enough to resst all knds of brute-force attacks. An deal mage encrypton algorthm should be senstve to the secret key. It means that the small change n the secret key must produce a completely dfferent encrypted and decrypted mages n order to hde the mage [1]. The plan mage n Fg. 6 has been encrypted and decrypted wth the same ntal condtons except x. A very small change has been appled to x (.e. x =1.1, x =1.11 ) for the key and encrypted and decrypted Baboon mages of these keys are shown n Fg. 8 and Fg. 9. The dfference between these mages has been measured wth Mean Square Error (MSE) metrc as follows: M MSE f ( x, y) h( x, y) (8) M x y Here f and h are the mages and (x,y) shows the pxel coordnates. 2

4 4 Kayhan CELIK and Erol KURT Fgure 8. The encrypted Baboon wth the closed ntal condtons of x =1.1 and x =1.11 respectvely. TABLE I. MSE RESULTS OF RED, GREE AD BLUE COMPOETS OF THE ECRYPTED BABOO AD LEA IMAGES WITH THE CLOSED IITIAL VALUES. Lena Image Baboon Image Red Green Blue Fgure 1. The hstograms of Lena mage: red, green and blue components from top to bottom respectvely Fg. 9. The encrypted and decrypted Baboon wth the closed ntal condtons of x 1.1 and The hstogram of the orgnal mage contans several peaks. However, the hstogram of the cphered mage s unform. Hence, t s proven that the hstograms of the encrypted mage do not gve any clue to operate any statstcal attack to recover the orgnal one. x =1.11 respectvely. TABLE II. MSE RESULTS OF RED, GREE AD BLUE COMPOETS OF THE DECRYPTED BABOO AD LEA IMAGES WITH THE WROG IITIAL VALUES. Lena Image Baboon Image Red Green Blue The encrypted mages wth the closed ntal condtons are shown n Fg. 8 and decrypted mage wth wrong ntal condton s shown n Fg. 9. It s obvous from Tables 1 and 2 that the mages are completely dstnctve from each other. As a result, the proposed algorthm s hghly senstve to secret key. B. Hstogram Analyss The mage hstogram determnes the dstrbuton of each color ntensty level of the ndvdual pxels of an mage. An deal hstogram for an encrypted mage should be flat, mplyng the unform dstrbuton on the mage range and the complete randomness. In fact, the flatness of a hstogram could better prevent the leakage of the nformaton by the statstcal attacks. Fgs. 1 and 11 show the hstograms of the orgnal Lena mage and ts encrypted one. Fgure 11. The hstograms of cphered Lena mage: red, green and blue components from top to bottom respectvely C. Correlaton analyss In ths secton, the horzontal, vertcal and dagonal correlaton coeffcents of the cphered pxels have been calculated. In ths manner, 3 pars of the adjacent pxels (horzontal, vertcal and dagonal) have been selected from the orgnal and the encrypted

5 A ew Image Encrypton Algorthm Based on Lorenz System 5 mages. To test the correlaton between two adjacent pxels n the orgnal and the encrypted mage, the followng equatons have been used [15]: 1 E( x) x (9) 1 D 1 ( x ) x E ( x ) 2 (1) 1 Cov 1 ( x, y ) x E ( x ) y E ( y ) (11) 1 ( xy, ) Cov( x, y) D( x). D( y) (12) Here x and y are color value of two adjacent pxels. Cov(x,y), D(x) and E(x) denote the covarance, varance and the mean. For nstance, Fgs. 12 and 13 show the correlatons of two horzontal pxels of the orgnal mage and the encrypted mage, respectvely. It s obvous that the correlaton between the adjacent pxels s totally reduced. The detals of the analyss are presented n Table 3. Accordng to Table 3, the correlaton coeffcents of the adjacent pxels n the encrypted mage are very small. It s clear that the proposed mage encrypton algorthm has strong ablty to resst the statstcal attacks. TABLE III. Drecton Horzontal Vertcal Dagonal CORRELATIO COEFFICIETS OF THE ORIGIAL AD CIPHERED IMAGES. RGB Plan mage Cphered mage R G B R G B R G B Fgure 13. Correlaton analyss of the cphered Lena mage: Red, green and blue components from top to bottom respectvely. mages as follows: Fgure 12. Correlaton analyss of the Lena mage: Red, green and blue components from top to bottom respectvely. D. Dfferental analyss A good cryptography system should be senstve to small changes (for nstance, one bt) n the plan mage and that must create bg dfference n the encrypted mage. If the encrypton has ths feature, the cryptosystem can resst toward the dfferental attack, whch s bascally a chosen plan mage attack amed to fnd the secret key. Two metrcs are used to measure how much the cryptosystem at the plan mage s senstve: et Pxel Change Rate (PCR) and Unfed Average Changng Intensty (UACI). Whle PCR represents the change rate of the cphered mage va only one pxel of plan mage changes, UACI measures the average ntensty of the dfferences between the orgnal and cphered PCR 1 UACI Mx D (, j ) j 1% Mx, (13) x, j C (, j C (, j) 1 2 x1% 255 (14) where M and denote the row and column numbers of the mages, respectvely. C and C 1 2are two cphered mages of the correspondng orgnal mages havng only one pxel dfference. D(,j) s determned by C 1 (, j) and C 2 (, j ). amely, f C (, j) C (, j) 1 2 exst, then D(,j)=1, otherwse, D(,j) = stands. PCR and UACI are tested on two Lena and Baboon mages by a pxel dfference, respectvely. Ther testng results are shown n Table 4. From these results, t can be concluded that our algorthm s not

6 6 Kayhan CELIK and Erol KURT very robust aganst the dfferental attacks, however, t can be mproved further to gve hgher dfferental analyss results. TABLE IV. LEA BABOO DIFFERETIAL AALYSIS OF THE IMAGES I FIGS. 4 AD 6. PCR UACI R G B R G B E. Informaton Entropy Analyss The nformaton entropy measures the strength of the cryptosystem and gves the equally probable gray levels for a good mage encrypton algorthm by applyng t to the encrypted mage. In ths sense, entropy s gven by, 2 1 H( m) p( m )log 2 1 pm ( ) (15) Here s the number of bts of the pxel value (m) and p(m) represents the probablty of m. If there are 256 state of m and they have the same probablty, H(m) wll be theoretcally equal to 8. The smaller entropy value means greater degree of predctablty, whch threatens the encrypton system securty. TABLE V. I FIGS. 4 R G B Orgnal lena THE RESULTS OF ETROPY AALYSIS FOR IMAGES Cphered lena Orgnal baboon Cphered baboon Table 5 gves the entropy values of two orgnal mages and ther encrypted ones. Accordng to the results, the nformaton entropy s ncreased by the encrypton system and the nformaton entropes of the encrypted mages are nearly 8. Ths proves that the proposed encrypton algorthm s hghly resstve to the nformaton leakage. V. COCLUSIOS A new mage encrypton algorthm based on the Lorenz chaotc system has been ntroduced. The man features of the chaotc systems, namely the unpredctablty and the senstvty to the ntal condtons, have contrbuted at the results of the cphered mages. The man tests have been performed n order to prove the strength of the new algorthm. Whle the secret key analyses gve dfference between the mages, thereby prevent the predcton of orgnal mage, the color-dependent correlaton tests yeld to uncorrelated results. The nformaton entropy values and the hstogram results have proven the unpredctablty of the cphered mages. Regardng the dfferental analyss tests, the results are not as good as we expect. The proposed algorthm therefore should be mproved further to get hgher scores from dfferental analyss tests. To conclude, ths new chaotc based algorthm can be used n encrypton studes n ts current form due to the good results obtaned from the other analyses. REFERECES [1] Alvarez, G., & L, S. (26). Some basc cryptographc requrements for chaos-based cryptosystems. Internatonal Journal of Bfurcaton and Chaos, 16(8), [2] Lu, H., Kadr, A., & u, Y. (214). Chaos-based color mage block encrypton scheme usng S-box. AEU- Internatonal Journal of Electroncs and Communcatons, 68(7), [3] L, J., & Lu, H. (213). Colour mage encrypton based on advanced encrypton standard algorthm wth twodmensonal chaotc map. Informaton Securty, IET, 7(4), [4] Akhshan, A., Behna, S., Akhavan, A., Lm, S. C., & Hassan, Z. (214), An Image Encrypton Approach Usng Quantum Chaotc Map. Int. J. Adv. Computer Sc. Appl. ( ).4. [5] Sngh, K., & Kaur, K. (211). Image Encrypton usng Chaotc Maps and DA Addton Operaton and ose Effects on t, Int. J. Computer Applcatons ( ) Vol, 23. [6] Moon, F. C. (28). Chaotc and Fractal Dynamcs: Introducton for Appled Scentsts and Engneers. John Wley & Sons. [7] Kurt, E. (26). onlneartes from a non-autonomous chaotc crcut wth a non-autonomous model of Chua's dode. Physca Scrpta, 74(1), 22. [8] Kurt, E., & Canturk, M. (29). Chaotc dynamcs of resstvely coupled DC-drven dstnct Josephson junctons and the effects of crcut parameters. Physca D: onlnear Phenomena, 238(22), [9] Kurt, E., & Canturk, M. (21). Bfurcatons and Hyperchaos from a DC Drven ondentcal Josephson Juncton System. Int. J. Bfurcaton and Chaos, 2(11), [1] Kurt, E., Cylan, B., Taskan, O. O., & Kurt, H. H. (214). Bfurcaton analyss of a resstor-double nductor and double dode crcut and a comparson wth a resstor-nductor-dode crcut n phase space and parametrcal responses. Scenta Iranca Trans. D: Computer Scence & Engneerng, Electrcal, 21(3), 935. [11] Song, W., & Lang, J. (213). Dfference equaton of Lorenz system. Internatonal Journal of Pure and Appled Mathematcs, 83(1), [12] Kurt, E., Kasap, R. (211), Karmasanın Blm Kaos, obel Publ., Ankara, Turkey, [13] Ott, E. (22). Chaos n dynamcal systems. Cambrdge unversty press. [14] Psarchk, A.., Flores-Carmona,. J., & Carpo-Valadez, M. (26). Encrypton and decrypton of mages wth chaotc map lattces. Chaos: An Interdscplnary Journal of onlnear Scence, 16(3), [15] El-Same, F. E. A., Ahmed, H. E. H., Elashry, I. F., Shaheen, M. H., Faragallah, O. S., El-Rabae, E. S. M., & Alshebel, S. A. (213). Image Encrypton: A Communcaton Perspectve, CRC Press.

Image Encryption Using Chaotic Signal and Max Heap Tree

Image Encryption Using Chaotic Signal and Max Heap Tree Image Encrypton Usng Chaotc Sgnal and Max Heap Tree Farborz Mahmoud 1, Rasul Enayatfar 2, and Mohsen Mrzashaer 1 1 Electrcal and Computer Engneerng Department, Islamc Azad Unversty, Qazvn Branch, Iran

More information

Department of Mathematics, Shantou University, Shantou, Guangdong, , China.

Department of Mathematics, Shantou University, Shantou, Guangdong, , China. 205 Internatonal Conference on Computer Scence and Communcaton Engneerng (CSCE 205) ISN: 978--60595-249-9 A Novel Color Image Encrypton Scheme ased on Permutaton-substtuton Archtecture Ru-Song Ye,a, Mng

More information

An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems

An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems I. J. Computer Network and Informaton Securty 5 5 5-33 Publshed Onlne Aprl 5 n MECS (http://www.mecs-press.org/) DOI:.585/jcns.5.5.4 An Image Encrypton Scheme Based on Hybrd Orbt of Hyper-chaotc Systems

More information

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Faster Image Encryption: A Semi-Tensor Product Approach

Faster Image Encryption: A Semi-Tensor Product Approach 207 Internatonal Conference on Computer Scence and Applcaton Engneerng (CSAE 207) ISBN: 978--60595-505-6 Faster Image Encrypton: A Sem-Tensor Product Approach Shpng Ye, Jnmng Wang *, Zhenyu Xu and Chaoxang

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Scroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator

Scroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator Latest Trends on Crcuts, Systems and Sgnals Scroll Generaton wth Inductorless Chua s Crcut and Wen Brdge Oscllator Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * Abstract An nductorless Chua

More information

Regularized Discriminant Analysis for Face Recognition

Regularized Discriminant Analysis for Face Recognition 1 Regularzed Dscrmnant Analyss for Face Recognton Itz Pma, Mayer Aladem Department of Electrcal and Computer Engneerng, Ben-Guron Unversty of the Negev P.O.Box 653, Beer-Sheva, 845, Israel. Abstract Ths

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

Performing Modulation Scheme of Chaos Shift Keying with Hyperchaotic Chen System

Performing Modulation Scheme of Chaos Shift Keying with Hyperchaotic Chen System 6 th Internatonal Advanced echnologes Symposum (IAS 11), 16-18 May 011, Elazığ, urkey Performng Modulaton Scheme of Chaos Shft Keyng wth Hyperchaotc Chen System H. Oğraş 1, M. ürk 1 Unversty of Batman,

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

Tutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant

Tutorial 2. COMP4134 Biometrics Authentication. February 9, Jun Xu, Teaching Asistant Tutoral 2 COMP434 ometrcs uthentcaton Jun Xu, Teachng sstant csjunxu@comp.polyu.edu.hk February 9, 207 Table of Contents Problems Problem : nswer the questons Problem 2: Power law functon Problem 3: Convoluton

More information

Robust Image Encryption Based on Balanced Cellular Automaton and Pixel Separation

Robust Image Encryption Based on Balanced Cellular Automaton and Pixel Separation 548 D. TRALIC, S. GRGIC, ROBUST IMAGE ENCRYPTION BASED ON BALANCED CA AND PIXEL SEPARATION Robust Image Encrypton Based on Balanced Cellular Automaton and Pxel Separaton Djana TRALIC, Sonja GRGIC Dept.

More information

Odd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits

Odd/Even Scroll Generation with Inductorless Chua s and Wien Bridge Oscillator Circuits Watcharn Jantanate, Peter A. Chayasena, Sarawut Sutorn Odd/Even Scroll Generaton wth Inductorless Chua s and Wen Brdge Oscllator Crcuts Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * School

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

The Improved Montgomery Scalar Multiplication Algorithm with DPA Resistance Yanqi Xu, Lin Chen, Moran Li

The Improved Montgomery Scalar Multiplication Algorithm with DPA Resistance Yanqi Xu, Lin Chen, Moran Li nd Internatonal Conference on Electrcal, Computer Engneerng and Electroncs (ICECEE 015) The Improved Montgomery Scalar Multplcaton Algorthm wth DPA Resstance Yanq Xu, Ln Chen, Moran L Informaton Scence

More information

(Online First)A Lattice Boltzmann Scheme for Diffusion Equation in Spherical Coordinate

(Online First)A Lattice Boltzmann Scheme for Diffusion Equation in Spherical Coordinate Internatonal Journal of Mathematcs and Systems Scence (018) Volume 1 do:10.494/jmss.v1.815 (Onlne Frst)A Lattce Boltzmann Scheme for Dffuson Equaton n Sphercal Coordnate Debabrata Datta 1 *, T K Pal 1

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING N. Phanthuna 1,2, F. Cheevasuvt 2 and S. Chtwong 2 1 Department of Electrcal Engneerng, Faculty of Engneerng Rajamangala

More information

Hiding data in images by simple LSB substitution

Hiding data in images by simple LSB substitution Pattern Recognton 37 (004) 469 474 www.elsever.com/locate/patcog Hdng data n mages by smple LSB substtuton Ch-Kwong Chan, L.M. Cheng Department of Computer Engneerng and Informaton Technology, Cty Unversty

More information

Big Data Fast Encryption Algorithm in the Cloud Environment Based on the Constraints of the Shared Resources

Big Data Fast Encryption Algorithm in the Cloud Environment Based on the Constraints of the Shared Resources Revsta de la Facultad de Ingenería U.C.V., Vol. 32, N 0, pp. 796-805, 207 Bg Data Fast Encrypton Algorthm n the Cloud Envronment Based on the Constrants of the Shared Resources Yng Wang Informaton Engneerng

More information

Chapter 11: Simple Linear Regression and Correlation

Chapter 11: Simple Linear Regression and Correlation Chapter 11: Smple Lnear Regresson and Correlaton 11-1 Emprcal Models 11-2 Smple Lnear Regresson 11-3 Propertes of the Least Squares Estmators 11-4 Hypothess Test n Smple Lnear Regresson 11-4.1 Use of t-tests

More information

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm Desgn and Optmzaton of Fuzzy Controller for Inverse Pendulum System Usng Genetc Algorthm H. Mehraban A. Ashoor Unversty of Tehran Unversty of Tehran h.mehraban@ece.ut.ac.r a.ashoor@ece.ut.ac.r Abstract:

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

arxiv: v2 [cs.cr] 29 Sep 2016

arxiv: v2 [cs.cr] 29 Sep 2016 Internatonal Journal of Bfurcaton and Chaos c World Scentfc Publshng Company Breakng a chaotc mage encrypton algorthm based on modulo addton and XOR operaton arxv:107.6536v [cs.cr] 9 Sep 016 Chengqng L

More information

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,

More information

Lecture 10: May 6, 2013

Lecture 10: May 6, 2013 TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

A new Approach for Solving Linear Ordinary Differential Equations

A new Approach for Solving Linear Ordinary Differential Equations , ISSN 974-57X (Onlne), ISSN 974-5718 (Prnt), Vol. ; Issue No. 1; Year 14, Copyrght 13-14 by CESER PUBLICATIONS A new Approach for Solvng Lnear Ordnary Dfferental Equatons Fawz Abdelwahd Department of

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Uncertainty and auto-correlation in. Measurement

Uncertainty and auto-correlation in. Measurement Uncertanty and auto-correlaton n arxv:1707.03276v2 [physcs.data-an] 30 Dec 2017 Measurement Markus Schebl Federal Offce of Metrology and Surveyng (BEV), 1160 Venna, Austra E-mal: markus.schebl@bev.gv.at

More information

Recover plaintext attack to block ciphers

Recover plaintext attack to block ciphers Recover plantext attac to bloc cphers L An-Png Bejng 100085, P.R.Chna apl0001@sna.com Abstract In ths paper, we wll present an estmaton for the upper-bound of the amount of 16-bytes plantexts for Englsh

More information

Chapter 13: Multiple Regression

Chapter 13: Multiple Regression Chapter 13: Multple Regresson 13.1 Developng the multple-regresson Model The general model can be descrbed as: It smplfes for two ndependent varables: The sample ft parameter b 0, b 1, and b are used to

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Rotation Invariant Shape Contexts based on Feature-space Fourier Transformation

Rotation Invariant Shape Contexts based on Feature-space Fourier Transformation Fourth Internatonal Conference on Image and Graphcs Rotaton Invarant Shape Contexts based on Feature-space Fourer Transformaton Su Yang 1, Yuanyuan Wang Dept of Computer Scence and Engneerng, Fudan Unversty,

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

Turbulence classification of load data by the frequency and severity of wind gusts. Oscar Moñux, DEWI GmbH Kevin Bleibler, DEWI GmbH

Turbulence classification of load data by the frequency and severity of wind gusts. Oscar Moñux, DEWI GmbH Kevin Bleibler, DEWI GmbH Turbulence classfcaton of load data by the frequency and severty of wnd gusts Introducton Oscar Moñux, DEWI GmbH Kevn Blebler, DEWI GmbH Durng the wnd turbne developng process, one of the most mportant

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

An Algorithm to Solve the Inverse Kinematics Problem of a Robotic Manipulator Based on Rotation Vectors

An Algorithm to Solve the Inverse Kinematics Problem of a Robotic Manipulator Based on Rotation Vectors An Algorthm to Solve the Inverse Knematcs Problem of a Robotc Manpulator Based on Rotaton Vectors Mohamad Z. Al-az*, Mazn Z. Othman**, and Baker B. Al-Bahr* *AL-Nahran Unversty, Computer Eng. Dep., Baghdad,

More information

Chapter - 2. Distribution System Power Flow Analysis

Chapter - 2. Distribution System Power Flow Analysis Chapter - 2 Dstrbuton System Power Flow Analyss CHAPTER - 2 Radal Dstrbuton System Load Flow 2.1 Introducton Load flow s an mportant tool [66] for analyzng electrcal power system network performance. Load

More information

Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction

Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction Attacks on RSA The Rabn Cryptosystem Semantc Securty of RSA Cryptology, Tuesday, February 27th, 2007 Nls Andersen Square Roots modulo n Complexty Theoretc Reducton Factorng Algorthms Pollard s p 1 Pollard

More information

RELIABILITY ASSESSMENT

RELIABILITY ASSESSMENT CHAPTER Rsk Analyss n Engneerng and Economcs RELIABILITY ASSESSMENT A. J. Clark School of Engneerng Department of Cvl and Envronmental Engneerng 4a CHAPMAN HALL/CRC Rsk Analyss for Engneerng Department

More information

On an Extension of Stochastic Approximation EM Algorithm for Incomplete Data Problems. Vahid Tadayon 1

On an Extension of Stochastic Approximation EM Algorithm for Incomplete Data Problems. Vahid Tadayon 1 On an Extenson of Stochastc Approxmaton EM Algorthm for Incomplete Data Problems Vahd Tadayon Abstract: The Stochastc Approxmaton EM (SAEM algorthm, a varant stochastc approxmaton of EM, s a versatle tool

More information

Operating conditions of a mine fan under conditions of variable resistance

Operating conditions of a mine fan under conditions of variable resistance Paper No. 11 ISMS 216 Operatng condtons of a mne fan under condtons of varable resstance Zhang Ynghua a, Chen L a, b, Huang Zhan a, *, Gao Yukun a a State Key Laboratory of Hgh-Effcent Mnng and Safety

More information

Tensor Smooth Length for SPH Modelling of High Speed Impact

Tensor Smooth Length for SPH Modelling of High Speed Impact Tensor Smooth Length for SPH Modellng of Hgh Speed Impact Roman Cherepanov and Alexander Gerasmov Insttute of Appled mathematcs and mechancs, Tomsk State Unversty 634050, Lenna av. 36, Tomsk, Russa RCherepanov82@gmal.com,Ger@npmm.tsu.ru

More information

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method

More information

A New Refinement of Jacobi Method for Solution of Linear System Equations AX=b

A New Refinement of Jacobi Method for Solution of Linear System Equations AX=b Int J Contemp Math Scences, Vol 3, 28, no 17, 819-827 A New Refnement of Jacob Method for Soluton of Lnear System Equatons AX=b F Naem Dafchah Department of Mathematcs, Faculty of Scences Unversty of Gulan,

More information

is the calculated value of the dependent variable at point i. The best parameters have values that minimize the squares of the errors

is the calculated value of the dependent variable at point i. The best parameters have values that minimize the squares of the errors Multple Lnear and Polynomal Regresson wth Statstcal Analyss Gven a set of data of measured (or observed) values of a dependent varable: y versus n ndependent varables x 1, x, x n, multple lnear regresson

More information

Quadratic speedup for unstructured search - Grover s Al-

Quadratic speedup for unstructured search - Grover s Al- Quadratc speedup for unstructured search - Grover s Al- CS 94- gorthm /8/07 Sprng 007 Lecture 11 001 Unstructured Search Here s the problem: You are gven a boolean functon f : {1,,} {0,1}, and are promsed

More information

j) = 1 (note sigma notation) ii. Continuous random variable (e.g. Normal distribution) 1. density function: f ( x) 0 and f ( x) dx = 1

j) = 1 (note sigma notation) ii. Continuous random variable (e.g. Normal distribution) 1. density function: f ( x) 0 and f ( x) dx = 1 Random varables Measure of central tendences and varablty (means and varances) Jont densty functons and ndependence Measures of assocaton (covarance and correlaton) Interestng result Condtonal dstrbutons

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

Introduction to Information Theory, Data Compression,

Introduction to Information Theory, Data Compression, Introducton to Informaton Theory, Data Compresson, Codng Mehd Ibm Brahm, Laura Mnkova Aprl 5, 208 Ths s the augmented transcrpt of a lecture gven by Luc Devroye on the 3th of March 208 for a Data Structures

More information

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests Smulated of the Cramér-von Mses Goodness-of-Ft Tests Steele, M., Chaselng, J. and 3 Hurst, C. School of Mathematcal and Physcal Scences, James Cook Unversty, Australan School of Envronmental Studes, Grffth

More information

The equation of motion of a dynamical system is given by a set of differential equations. That is (1)

The equation of motion of a dynamical system is given by a set of differential equations. That is (1) Dynamcal Systems Many engneerng and natural systems are dynamcal systems. For example a pendulum s a dynamcal system. State l The state of the dynamcal system specfes t condtons. For a pendulum n the absence

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

System in Weibull Distribution

System in Weibull Distribution Internatonal Matheatcal Foru 4 9 no. 9 94-95 Relablty Equvalence Factors of a Seres-Parallel Syste n Webull Dstrbuton M. A. El-Dacese Matheatcs Departent Faculty of Scence Tanta Unversty Tanta Egypt eldacese@yahoo.co

More information

COMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD

COMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD COMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD Ákos Jósef Lengyel, István Ecsed Assstant Lecturer, Professor of Mechancs, Insttute of Appled Mechancs, Unversty of Mskolc, Mskolc-Egyetemváros,

More information

A Fast Computer Aided Design Method for Filters

A Fast Computer Aided Design Method for Filters 2017 Asa-Pacfc Engneerng and Technology Conference (APETC 2017) ISBN: 978-1-60595-443-1 A Fast Computer Aded Desgn Method for Flters Gang L ABSTRACT *Ths paper presents a fast computer aded desgn method

More information

Markov Chain Monte Carlo Lecture 6

Markov Chain Monte Carlo Lecture 6 where (x 1,..., x N ) X N, N s called the populaton sze, f(x) f (x) for at least one {1, 2,..., N}, and those dfferent from f(x) are called the tral dstrbutons n terms of mportance samplng. Dfferent ways

More information

x = , so that calculated

x = , so that calculated Stat 4, secton Sngle Factor ANOVA notes by Tm Plachowsk n chapter 8 we conducted hypothess tests n whch we compared a sngle sample s mean or proporton to some hypotheszed value Chapter 9 expanded ths to

More information

NON-CENTRAL 7-POINT FORMULA IN THE METHOD OF LINES FOR PARABOLIC AND BURGERS' EQUATIONS

NON-CENTRAL 7-POINT FORMULA IN THE METHOD OF LINES FOR PARABOLIC AND BURGERS' EQUATIONS IJRRAS 8 (3 September 011 www.arpapress.com/volumes/vol8issue3/ijrras_8_3_08.pdf NON-CENTRAL 7-POINT FORMULA IN THE METHOD OF LINES FOR PARABOLIC AND BURGERS' EQUATIONS H.O. Bakodah Dept. of Mathematc

More information

The Jacobsthal and Jacobsthal-Lucas Numbers via Square Roots of Matrices

The Jacobsthal and Jacobsthal-Lucas Numbers via Square Roots of Matrices Internatonal Mathematcal Forum, Vol 11, 2016, no 11, 513-520 HIKARI Ltd, wwwm-hkarcom http://dxdoorg/1012988/mf20166442 The Jacobsthal and Jacobsthal-Lucas Numbers va Square Roots of Matrces Saadet Arslan

More information

Lecture 5 Decoding Binary BCH Codes

Lecture 5 Decoding Binary BCH Codes Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Homework Assignment 3 Due in class, Thursday October 15

Homework Assignment 3 Due in class, Thursday October 15 Homework Assgnment 3 Due n class, Thursday October 15 SDS 383C Statstcal Modelng I 1 Rdge regresson and Lasso 1. Get the Prostrate cancer data from http://statweb.stanford.edu/~tbs/elemstatlearn/ datasets/prostate.data.

More information

COMPLEX NUMBERS AND QUADRATIC EQUATIONS

COMPLEX NUMBERS AND QUADRATIC EQUATIONS COMPLEX NUMBERS AND QUADRATIC EQUATIONS INTRODUCTION We know that x 0 for all x R e the square of a real number (whether postve, negatve or ero) s non-negatve Hence the equatons x, x, x + 7 0 etc are not

More information

Annexes. EC.1. Cycle-base move illustration. EC.2. Problem Instances

Annexes. EC.1. Cycle-base move illustration. EC.2. Problem Instances ec Annexes Ths Annex frst llustrates a cycle-based move n the dynamc-block generaton tabu search. It then dsplays the characterstcs of the nstance sets, followed by detaled results of the parametercalbraton

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

EEE 241: Linear Systems

EEE 241: Linear Systems EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they

More information

Lab 2e Thermal System Response and Effective Heat Transfer Coefficient

Lab 2e Thermal System Response and Effective Heat Transfer Coefficient 58:080 Expermental Engneerng 1 OBJECTIVE Lab 2e Thermal System Response and Effectve Heat Transfer Coeffcent Warnng: though the experment has educatonal objectves (to learn about bolng heat transfer, etc.),

More information

ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EQUATION

ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EQUATION Advanced Mathematcal Models & Applcatons Vol.3, No.3, 2018, pp.215-222 ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EUATION

More information

MULTISPECTRAL IMAGE CLASSIFICATION USING BACK-PROPAGATION NEURAL NETWORK IN PCA DOMAIN

MULTISPECTRAL IMAGE CLASSIFICATION USING BACK-PROPAGATION NEURAL NETWORK IN PCA DOMAIN MULTISPECTRAL IMAGE CLASSIFICATION USING BACK-PROPAGATION NEURAL NETWORK IN PCA DOMAIN S. Chtwong, S. Wtthayapradt, S. Intajag, and F. Cheevasuvt Faculty of Engneerng, Kng Mongkut s Insttute of Technology

More information

FREQUENCY DISTRIBUTIONS Page 1 of The idea of a frequency distribution for sets of observations will be introduced,

FREQUENCY DISTRIBUTIONS Page 1 of The idea of a frequency distribution for sets of observations will be introduced, FREQUENCY DISTRIBUTIONS Page 1 of 6 I. Introducton 1. The dea of a frequency dstrbuton for sets of observatons wll be ntroduced, together wth some of the mechancs for constructng dstrbutons of data. Then

More information

Cryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm

Cryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm www.ijcsi.org 110 Cryptanalyss of a Publc-key Cryptosystem Usng Lattce Bass Reducton Algorthm Roohallah Rastagh 1, Hamd R. Dall Oskoue 2 1,2 Department of Electrcal Engneerng, Aeronautcal Unversty of Snce

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

Irregular vibrations in multi-mass discrete-continuous systems torsionally deformed

Irregular vibrations in multi-mass discrete-continuous systems torsionally deformed (2) 4 48 Irregular vbratons n mult-mass dscrete-contnuous systems torsonally deformed Abstract In the paper rregular vbratons of dscrete-contnuous systems consstng of an arbtrary number rgd bodes connected

More information

Transfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system

Transfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system Transfer Functons Convenent representaton of a lnear, dynamc model. A transfer functon (TF) relates one nput and one output: x t X s y t system Y s The followng termnology s used: x y nput output forcng

More information

Over-Temperature protection for IGBT modules

Over-Temperature protection for IGBT modules Over-Temperature protecton for IGBT modules Ke Wang 1, Yongjun Lao 2, Gaosheng Song 1, Xanku Ma 1 1 Mtsubsh Electrc & Electroncs (Shangha) Co., Ltd., Chna Room2202, Tower 3, Kerry Plaza, No.1-1 Zhongxns

More information

Nodal analysis of finite square resistive grids and the teaching effectiveness of students projects

Nodal analysis of finite square resistive grids and the teaching effectiveness of students projects 2 nd World Conference on Technology and Engneerng Educaton 2 WIETE Lublana Slovena 5-8 September 2 Nodal analyss of fnte square resstve grds and the teachng effectveness of students proects P. Zegarmstrz

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

The binomial transforms of the generalized (s, t )-Jacobsthal matrix sequence

The binomial transforms of the generalized (s, t )-Jacobsthal matrix sequence Int. J. Adv. Appl. Math. and Mech. 6(3 (2019 14 20 (ISSN: 2347-2529 Journal homepage: www.jaamm.com IJAAMM Internatonal Journal of Advances n Appled Mathematcs and Mechancs The bnomal transforms of the

More information

Lecture 3. Ax x i a i. i i

Lecture 3. Ax x i a i. i i 18.409 The Behavor of Algorthms n Practce 2/14/2 Lecturer: Dan Spelman Lecture 3 Scrbe: Arvnd Sankar 1 Largest sngular value In order to bound the condton number, we need an upper bound on the largest

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong

More information

A Bayes Algorithm for the Multitask Pattern Recognition Problem Direct Approach

A Bayes Algorithm for the Multitask Pattern Recognition Problem Direct Approach A Bayes Algorthm for the Multtask Pattern Recognton Problem Drect Approach Edward Puchala Wroclaw Unversty of Technology, Char of Systems and Computer etworks, Wybrzeze Wyspanskego 7, 50-370 Wroclaw, Poland

More information

Note 10. Modeling and Simulation of Dynamic Systems

Note 10. Modeling and Simulation of Dynamic Systems Lecture Notes of ME 475: Introducton to Mechatroncs Note 0 Modelng and Smulaton of Dynamc Systems Department of Mechancal Engneerng, Unversty Of Saskatchewan, 57 Campus Drve, Saskatoon, SK S7N 5A9, Canada

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

arxiv: v1 [math.co] 12 Sep 2014

arxiv: v1 [math.co] 12 Sep 2014 arxv:1409.3707v1 [math.co] 12 Sep 2014 On the bnomal sums of Horadam sequence Nazmye Ylmaz and Necat Taskara Department of Mathematcs, Scence Faculty, Selcuk Unversty, 42075, Campus, Konya, Turkey March

More information

Multiple Sound Source Location in 3D Space with a Synchronized Neural System

Multiple Sound Source Location in 3D Space with a Synchronized Neural System Multple Sound Source Locaton n D Space wth a Synchronzed Neural System Yum Takzawa and Atsush Fukasawa Insttute of Statstcal Mathematcs Research Organzaton of Informaton and Systems 0- Mdor-cho, Tachkawa,

More information

PERFORMANCE OF HEAVY-DUTY PLANETARY GEARS

PERFORMANCE OF HEAVY-DUTY PLANETARY GEARS THE INTERNATIONAL CONFERENCE OF THE CARPATHIAN EURO-REGION SPECIALISTS IN INDUSTRIAL SYSTEMS 6 th edton PERFORMANCE OF HEAVY-DUTY PLANETARY GEARS Attla Csobán, Mhály Kozma 1, 1 Professor PhD., Eng. Budapest

More information

Short Term Load Forecasting using an Artificial Neural Network

Short Term Load Forecasting using an Artificial Neural Network Short Term Load Forecastng usng an Artfcal Neural Network D. Kown 1, M. Km 1, C. Hong 1,, S. Cho 2 1 Department of Computer Scence, Sangmyung Unversty, Seoul, Korea 2 Department of Energy Grd, Sangmyung

More information

/ n ) are compared. The logic is: if the two

/ n ) are compared. The logic is: if the two STAT C141, Sprng 2005 Lecture 13 Two sample tests One sample tests: examples of goodness of ft tests, where we are testng whether our data supports predctons. Two sample tests: called as tests of ndependence

More information

Parameter Estimation for Dynamic System using Unscented Kalman filter

Parameter Estimation for Dynamic System using Unscented Kalman filter Parameter Estmaton for Dynamc System usng Unscented Kalman flter Jhoon Seung 1,a, Amr Atya F. 2,b, Alexander G.Parlos 3,c, and Klto Chong 1,4,d* 1 Dvson of Electroncs Engneerng, Chonbuk Natonal Unversty,

More information