SINCE the 1990s, chaotic cryptography has attracted more

Size: px
Start display at page:

Download "SINCE the 1990s, chaotic cryptography has attracted more"

Transcription

1 1 On the Securty of the Y-Tan-Sew Chaotc Cpher Shujun L, Guanrong Chen, Fellow, IEEE and Xuanqn Mou Abstract Ths paper presents a coprehensve analyss on the securty of the Y-Tan-Sew chaotc cpher proposed n [1]. A dfferental chosen-plantext attack and a dfferental chosencphertext attack are suggested to break the sub-key K, under the assupton that the te stap can be altered by the attacker, whch s reasonable n such attacks. Also, soe securty Probles about the sub-keys α and β are clarfed, fro both theoretcal and experental ponts of vew. Further analyss shows that the securty of ths cpher s ndependent of the use of the chaotc tent ap, once the sub-key K s reoved va the proposed suggested dfferental chosen-plantext attack. Index Ters chaotc cryptography, tent ap, dfferental cryptanalyss, chosen-plantext attack, chosen-cphertext attack. I. INTRODUCTION SINCE the 199s, chaotc cryptography has attracted ore and ore attenton as a prosng way to desgn novel cphers, and ths research has becoe ore ntensve n recent years [, Chap. ]. To evaluate the securty perforance of chaotc cphers and to clarfy soe desgn prncples, cryptanalyss plays an portant role. Ths paper analyzes the securty of the recently-proposed Y-Tan-Sew chaotc cpher [1] and ponts out soe defects exstng n ths cpher: 1 the sub-key K can be reoved by a dfferental chosenplantext attack and a dfferental chosen-cphertext attack, under the assupton that the te-stap t can be altered by the attacker; the sub-key β should not be contaned n the secret key due to ts poor contrbuton to the securty of the cpher; 3 the nose vectors U j } used n the encrypton/decrypton functons do not have a unfor dstrbuton, whch downgrades the securty of the cpher by ltng the value of the sub-key α; 4 when the aforeentoned dfferental chosen-plantext or chosen-cphertext attack s used, the securty of the cpher s ndependent of the chaotc ap, but depends on the xture of three operatons fro dfferent algebrac groups. The frst two defects ean that the claed key α, β, γ, K collapses to be α, γ. Note that the second and thrd defects Ths paper has been publshed n IEEE Transactons on Crcuts and Systes II: Express Brefs, vol. 51, no. 1, pp , 4, DOI: 119/TCSII Ths research was supported by the Appled R&D Center, Cty Unversty of Hong Kong, under Grants and 964. Shujun L and Guanrong Chen are wth the Departent of Electronc Engneerng, Cty Unversty of Hong Kong, Kowloon, Hong Kong, Chna. Xuanqn Mou s wth the School of Electroncs and Inforaton Engneerng, X an Jaotong Unversty, X an, Shaanx 7149, Chna. Shujun L s the correspondng author. Contact h va were plctly entoned n Sec. III-B of [1] wthout convncng explanatons. Ths paper wll gve a coprehensve analyss on all the four securty defects. The rest of ths paper s organzed as follows. The next secton gves a bref ntroducton to the Y-Tan-Sew chaotc cpher. Then, the frst two defects of the cpher are dscussed n Sec. III. The other two defects are analyzed n Secs. IV and V, respectvely. The last secton concludes the paper. II. YI-TAN-SIEW CHAOTIC CIPHER Ths proposed cpher s a te-varant block cpher based on the chaotc tent ap. Each block has 4n bts, and the encrypton functon changes as the teraton evolves. Gven a plantext P = P 1,, P j,, P r and the correspondng cphertext C = C 1, C j,, C r, where P j and C j are both 4n-bt blocks, the cpher s descrbed as follows. The eployed chaotc tent ap s an extended verson of the noral skew tent ap F α : F α x 1, f < x 1 < 1, G α,β : x = 1 β, otherwse, where F α : x = x 1 /α, x 1 α, 1 x 1 /1 α, α < x 1 1. The secret key was claed to be a 4-tuple key α, β, γ, K, where γ s used to generate a secret ntal condton x of G α,β as follows: x = F 4n γ 1 log 1 t t. 3 Here, t representes the current te-stap transtted over a publc channel. Snce γ s only used to generate x, the secret key can also be consdered as α, β, x, K. Based on the secret key, the followng secret functons are calculated for the encrypton/decrypton procedures: 1 A sequence of 4n-bt nose vectors U j = u 4jn, u 4jn+1,, u 4jn+4n 1 j =, 1,,, are generated fro the dgtal chaotc orbt 1 of the extended tent ap G α,β wth the followng rule:, x α, u = 4 1, α < x 1. A sequence of secret perutatons w j j =, 1,, ; = 1,, n are generated fro U j and the sub-key K, as follows: V j = v j1, v j,, v jn = U j K, where each v j 1 In ths paper, the ter dgtal chaotc orbt s used to denote the orbt of a chaotc ap realzed n a dgtal coputer [, Chap..5].

2 corresponds to a functon w j that represents a perutaton of four ntegers 1,, 3, 4} followng Table 1 of [1]. 3 A sequence of secret bt-perutaton functons f j = f jn f j1 j =, 1,, are generated as follows: f j X = f j M 1, M, M 3, M 4 = [w j M 1, M, M 3, M 4 ] 1, 5 where X = M 1 3n + M n + M 3 n + M 4 and 1 s the 1-bt crcular left-shft operaton. 4 Another sequence of perutaton functons j1 jn j are generated as follows: j = 1 X = fj M 1, M, M 3, M 4 = [w 1 j M 1, M, M 3, M 4 ] 1, 6 where j s the nverse functon of f j,.e., j f j X = X, and 1 s the 1-bt crcular rght-shft operaton. The ntalzaton procedure: C = U, P = U 1. The encrypton procedure: C j = f j 1 P j C j 1 U j+1 P j 1 U j+1, 7 where denotes XOR and a b := a + b od 4n. The decrypton procedure: P j = j 1 C j P j 1 U j+1 C j 1 U j+1. 8 III. REDUCTION OF KEY SPACE Ths secton dscusses the reducton of the key space of the Y-Tan-Sew cpher,.e., ts frst two securty defects. A. The Dfferental Chosen-Plantext Attack for Reducng K To break the Y-Tan-Sew cpher va a chosen-plantext attack, the attacker has to ake t fxed durng the attack,.e., to ake the sub-key x and the nose vector sequence U j } fxed. Ths can be done by ntentonally alterng the local clock of the encrypton achne, whch s generally avalable snce the attacker can access the encrypton achne n chosen-plantext attacks [3]. If t s generated fro a publc te servce, the attacker can sply alterng the te sgnal transtted over the publc channel to alter t. In the followng, therefore, assue that t s fxed for all chosen plantexts. Assue P 1,, P j 1, P j } and P 1,, P j 1, P j } are two plantexts. The dfference of the cphertexts s as follows: C j = C j C j = f j 1 P j C j 1 U j+1 f j 1 P j C j 1 U j+1.9 Assue CU j = C j 1 U j+1. Then, Eq. 9 s reduced to C j = f j 1 P j CU j f j 1 P j CU j. 1 Now, consder such a queston: what can one observe fro C j, f P j and P j have only one dfferent bt? Assue that P j = p 4jn,, p 4jn+,, p 4jn+4n 1, P j = p 4jn,, p 4jn+,, p 4jn+4n 1, and CU j = cu,, cu 4n 1. It s obvous that P j CU j and P j CU j also have only one dfferent bt at the sae poston. Thus, further assung that one has P j CU j = p 4jn,, p 4jn+,, p 4jn+4n 1, P j CU j = p 4jn,, p 4jn+,, p 4jn+4n 1, C j = f j 1 p 4jn,, p 4jn+,, p 4jn+4n 1 f j 1 p 4jn,, p 4jn+,, p 4jn+4n 1. Consderng f j 1 s a bt-perutaton functon, one has f j 1 P j CU j = p 4jn+I,, p 4jn+I l = p 4jn+,, p 4jn+I 4n 1, and f j 1 P j CU j = p 4jn+I,, p 4jn+I l = p 4jn+,, p 4jn+I 4n 1, where I I 4n 1, 1,, 4n 1} denote the peruted postons of the 4n bts p 4jn p 4jn+4n 1. As a result, 4n l l 1 }}}} C j =,,, 1,,, = l 1, 11 whch eans that the -th bt of P = P j P j s peruted to the l-th bt of C = C j C j by f j 1. Fro the above dscusson, one can edately conclude that gven the followng 4n+1 plantexts contanng j planblocks, the secret bt-perutaton functon f j 1 can be exactly reconstructed: P = P,, P, P, P 1 = P,, P, P 1, P l = P,, P, P l, P 4n = P,, P, P 4n, where P P l = l 1. To get all r secret perutaton functons f f r 1 for the decrypton of cphertexts whose szes are not larger than r, the nuber of requred plantexts s 4n + 1 r. Snce the sub-key K s used only to deterne f j } together wth U j, the reconstructon of f f r 1 eans the reducton of K fro the whole secret key α, β, γ, K. Note that t s generally dffcult to derve V j fro f j, due to the strong xng of v j and the bt-shftng operatons. That s, t s generally dffcult to derve K fro f j, even when U j s known to the attacker. B. The Dfferental Chosen-Cphertext Attack for Reducng K Due to the slarty of the encrypton and decrypton procedures, the above dfferental chosen-plantext attack can be easly generalzed to a dfferental chosen-cphertext attack. Here, the attacker can ake x fxed durng the attack by alterng t transtted over the publc channel, whch s possble snce generally the attacker has a full control of the publc channel. In the dfferental chosen-cphertext attack, one can replace the 4n + 1 r chosen plantexts n the above dfferental chosen-plantext attack wth 4n + 1 r

3 3 chosen cphertexts. As a result, one can get all r nverses perutaton functons, f 1 fr 1 1, whch s equvalent to the r perutaton functons, f f r 1. C. Reducton of β In Sec. III-B of [1], t was sad that ost lkely, β does not act n the encrypton and decrypton processes, wthout any explanaton. Here, we wll theoretcally verfy ths cla. In the extended tent ap G α,β, β wll have to ake nfluence on the cpher only after x = or 1. However, the possblty that x = or 1 s so tny that the pact of β on the encrypton/decrypton procedures s coputatonally neglgble fro the Probablstc pont of vew. Wthout loss of generalty, assue that the ap G α,β s realzed n n-bt coputng precson and that the dgtal chaotc orbt dstrbutes unforly n the dscretzed space, whch s reasonable due to the unfor nvarant densty functon of the skew tent ap [4]. So, the Probablty that x = or 1 s p = / n = 1/ n 1. As a result, fro the atheatcal expectaton of the geoetrc dstrbuton [5], the average poston of the frst occurrence of the above event x = or 1 s 1/p = n 1. For sngle-precson floatng-pont arthetc, n = 3 two sgn bts are excluded, averagely 9 = 51M teratons are needed to actvate the nfluence of β on the encrypton/decrypton procedures. Ths eans averagely 9 /8 = 64M leadng bytes of the cphertext can be successfully decrypted wthout any knowledge of β. Slarly, when the double-precson floatng-pont arthetc n = 6 s used, the condton wll becoe uch worse: averagely 61 /8 = GG leadng cpher-bytes can be decrypted wthout knowng β. Therefore, n ost f not all cases, β s not eanngful n the key. In fact, t s just a trval paraeter not part of the secret key to avod the dgtal chaotc orbt of the noral skew tent ap F α to fall nto the fxed pont x =. As a suary, under the above dfferental chosen-plantext attack, the orgnal key α, β, γ, K collapses to be α, γ. When the dfferental chosen-plantext attack s possble, the orgnal key α, β, γ, K collapses to be α, γ, K. IV. NON-UNIFORMITY OF NOISE VECTOR U j In the encrypton procedure of the Y-Tan-Sew cpher, the nose vector U j+1 s used to ask the plantext P j together wth the prevous plantext P j 1 and the prevous cphertext C j 1. To enhance the potental capablty of resstng statstcs-based attacks [3], t s desrable that U j dstrbutes unforly n the dscrete space,, 4n 1 }. However, as entoned n Sec. III-B of [1], U j does not dstrbutes unforly when α s close to or 1. As a suggeston, 9 < α < was suggested n [1]. However, nether theoretcal nor experental analyss s gven n [1] to support ths cla. In ths secton, we nvestgate the theory underlyng the non-unforty of U j over,, 4n 1 }. In addton, t s ponted out that the non-unforty of U j s also very sgnfcant when α =, whch was not notced n [1]. frequency U j Fg. 1. The occurrence frequency of U j = a,, 55}, when α, β, x =,.7, 1 saples. A. Non-Unforty of U j when α In ths subsecton, t s shown that when α, the closer the α s to or 1, the ore severe the non-unforty of U j wll becoe. Strctly speakng, α can never lead to a unfor dstrbuton. Slar to Sec. III-C, assue agan that the dgtal chaotc orbt of the ap G α,β dstrbutes unforly n the dscretzed space. It s then easy to deduce the followng two Probabltes: Probu = } = α, Probu = 1} = 1 α. 1 The above equatons ean that U j wll contan ore - bts than 1-bts when α >, and ore 1-bts than - bts when α <. That s, U j does not have a unfor dstrbuton over,, 4n 1 } f α. When α, β, x =,.7, and n =, for exaple, under double-precson floatng-pont arthetc, Fgure 1 gves an experental curve of the occurrence frequency of U j wth dfferent values between and 4n 1 = 8 1 = 55. It can be seen that the frequency of U j = 55 = s close to but any others are alost. Under the assupton that all bts n U j are ndependent each other, a,, 4n 1}, one can theoretcally deduce the Probablty of U j = a: ProbU j = a} = α Na 1 α 4n Na, where N a,, 4n} denotes the nuber of -bts n a. In total there are 4n + 1 dfferent values n all 4n Probabltes: Prob = α 4n, Prob1 = α 4n 1 α,, Prob = α 4n 1 α,, Prob4n = 1 α 4n. The non-unforty of each U j s useful for an attacker to get ts value ore quckly va a specally-desgned guess order. Snce the secret bt-perutaton functons f j 1 } can be reconstructed under chosen-plantext attack recall Sec. III- A, the attacker can successfully decrypt any cphertext once U j } are obtaned. That s, U j }, f j } can be consdered as an equvalent of the orgnal secret key α, β, γ, K. To fnd the rght value of each U j, the followng guess order of U j = a s suggested: a A A 4n,, a A A 4n,, a A n, where A = n denotes the set of all

4 4 Coα = n 1 Prob H + 4n 4 = = + Probn Hn + 4n n 1 n 4n 4n 4n Prob H + + Prob4n H + + = = = = = 4n n + Probn Hn + n 1 = Prob + Prob4n H + Coα = = n 1 = 4n 4n + 1 4n Prob + Prob4n H + + Prob4n. = 4n 4n n n Probn Hn + + Probn Hn + 4n n 4n + 1 n 13 + Prob4n H + 4n 4n + 4n 4n = 4n Prob4n 4n 13 log Coα Fg.. log Coα vs. α.1,,.1,,.99}. 4n-bt bnary ntegers that contan -bts. Wth such a guess order, the average nuber of searched ntegers.e., the guess coplexty Coα can be calculated wth Eq. 13, where H denotes the nuber of prevous searched ntegers: 1 H = l= 4n l 1 + l= α 4n 4n l 1 = l= 4n l. 14 When n = 16, for nstance, the relatonshp between the calculated coplexty and the value of α s shown n Fg.. Note that there exst calculaton errors that ake each log Coα a lttle less than the real value, but ths fact does not nfluence the followng qualtatve analyss. Fro the experental data gven n Fg., one can see that the coplexty s uch less than 4n 1 = 63 the coplexty of the brute-force guess of a unforly-dstrbuted 4n-bt nteger when α s close to or 1. Apparently, the closer the α s to or 1, the weaker the sub-key α wll be. As a result, to ensure the securty of the Y-Tan-Sew cpher, the sub-key α has to be constraned n [α, 1 α ], 1, where Coα should be cryptographcally large. Ths, however, wll further reduce the key space to soe extent. In [1], 9 < α < s suggested to avod ths securty defect. In ths case, 1-bt wll always occur wth a hgher The errors are natural results of the unavodable accuulaton of the nteredate quantzaton errors. Probablty than -bt, snce Probu = 1} = 1 α > Probu = } = α. So, one can guess the value of each U j wth a dfferent order: A A 4n. Although Probu = 1} Probu = } = 1 α,. s not so uch, the guess coplexty wll stll be less than the sple brute-force search. Fro such a pont of vew, 9 < α < should be replaced by ts balanced verson: α <.1. B. Non-Unforty of U j when α = Fro the dscusson gven above, α = sees to be the best paraeter to generate unforly dstrbuted U j } that should axze the value of Coα. Unfortunately, accordng to our prevous studes on the dgtal dynacs of pecewse-lnear chaotc aps PWLCM realzed n fxedpont arthetc [, Chap. 3], α = s the worst paraeter fro the vewpont of dynacal degradaton occurrng n the dscretzed space, whch destroys the unfor dstrbuton of the generated pseudo-rando nubers. Actually, as a specal case of the dgtal PWLCM, the dgtal chaotc orbt of G,β can be theoretcally analyzed, whch s slar to but a lttle ore coplex than the orbt of F. Wthout loss of generalty, assue that the least sgnfcant bt of x s the n x -th bt after the dot,.e., x =.a 1 a a nx, where a nx = 1. To facltate the followng dscusson, n x s called the bnary precson of x. Substtutng α = nto the equaton of F, one can get x 1, x 1, F : x = 15 1 x 1, < x 1 1. It s obvous that F x ust be n the for of.a 1a a n x 1, where a n x 1 = 1. Ths eans that the bnary precson of x s decreased by 1 after one teraton. Thus, the dgtal chaotc orbt of F wll always trend to the sae fxed pont x = after n x teratons. For G,β, the ntroducton of β akes thngs a lttle coplcated: assung that the bnary precson of β s n β, the orbt of G,β wll be n the followng for: n x teratons x β n β teratons β β n β teratons β That s, the dgtal chaotc orbt of G,β enters a perodc cycle deterned by β after a transent stage deterned by x. The perod of the fnal cycle s n β + 1.

5 5 5 x Fg. 53. The dgtal chaotc orbt of G, when x = 3. frequency The queston s: Can we unquely or partally solve Uj+1 As an exaple, when x = 3, fro the above the equatons? dgtal Or, howchaotc to use the above orbt equatons. to lessen the coplexty of exhaustve guess of Uj+1? of G 5, s shown n Fg. 3. Apparently, In an experent, the curves such of a b x a degraded and fj 1x are plotted and t s observed that at ost n solutons exsts. Of chaotc orbt wll generate badly course, non-unfor only a few ones are rght U solutons, j }. snce When ost others.5 are not nteger solutons. n =, experents show that the frequency of U Now we can see t leads to the well-known j = 17 dffcult Uj proble of nteger equatons. We beleve t wll be the s about.993, whch eans that the non-unforty s even sae dffcult as other atheatcal probles used n pure Fg. 3. The occurrence frequency of Uj = a,,55}, when α = cryptography. The coplexty s expected to be O n. It worse, β =.7, x than = 1 the saples one gven n Fg. 1. One ore exaple s also s obvous that such a coplexty only reles on the xng two operatons n two dfferent felds, and s ndependent tested by changng the value of αof the nuse Fg. of the chaotc 1 fro tent ap. Fro tosuch a pont but of vew, Gven two sequent plan-blocks satsfyng Cj 1 = Pj =, the chaotc tent ap can be reoved fro the Y-Tan-Sew the we can values get the followng ofequaton: β and x are keptcpher unchanged, and be replaced by any and other pseudo-rando t s found nuber Cj = fj 1Uj+1 Pj 1 Uj+1. generator PRNG. Rewrte t n another for: Cj Pj 1 Uj+1 = fj 1Uj+1. that the dstrbuton of U j has two pronent peaks at U j = 85 and 17 the frequences are 1 and 18, respectvely. The above analyss shows that α = s also a rather bad paraeter for the generaton of U j } toward a unfor dstrbuton. So, should be excluded fro the range of α. For exaple, the range α <.1 should be replaced by < α <.1. C. How to Mend Ths Defect? Snce the non-unforty of U j } s anly caused by the fact that Probu = } = Probu = 1}, t s easy to end t by changng Eq. 4 to the followng one:, x, u = 16 1, < x 1. It has been ponted out that dynacal degradaton of G,β n the dgtal doan wll nfluence the unforty of U j }. In fact, ths Proble also exsts for any α, whch has been clarfed n [, Sec..5.1]. Followng prevous studes, the average length of all dgtal orbt of the tent ap s O L/, when L s the bt nuber of the eployed fnte-precson arthetc. For double-fnte floatng-pont arthetc, L = 6, so the average length s about 31, whch s not suffcently large fro the cryptographcal pont of vew. To overcoe ths Proble and also the non-unforty caused by the dgtal dynacal degradaton, a sall pseudo-rando sgnal s suggested to be used to perturb the dgtal chaotc orbt tely, as dscussed n Secs..5. and of []. V. INCAPABILITY OF CHAOS FOR SECURITY In Sec. IV-A above, t was entoned that U j }, f j } s an equvalent of the orgnal key. By studyng the possblty of solvng for U j } fro chosen plantext-cphertext pars, t can be shown that the securty of the Y-Tan-Sew cpher s ndependent of the use of the chaotc ap G α,β. Gven a plantext P j and the correspondng cphertext C j, one can get Eq. 7 for U j+1. Under the condton that f j 1 has been reconstructed, t s possble to solve for U j+1 wth a nuber of such equatons. Apparently, the solvablty of U j+1 s ndependent of the chaotc ap G α,β. That s, the securty of the cpher s ndependent of G α,β. In fact, one can replace the chaotc ap wth any other PRNG to generate U j, wthout nfluencng the securty of the cpher. Therefore, fro ths pont of vew, the Y-Tan-Sew cpher cannot be consdered as a typcal chaotc cpher. Next, the solvablty of Eq. 7 s dscussed. Bascally, the xture of three dfferent operatons, XOR, odulo 4n addton, and f j 1, akes t rather dffcult to get U j+1 fro Eq. 7. Rewrte Eq. 7 as follows: C j P j 1 U j+1 = f j 1 P j C j 1 U j+1, 17 whch can be splfed as a b x = f j 1 c d x. 18 The task s to fnd a 4n-bt nteger soluton of x fro a nuber of such equatons. Consderng that f j 1 contans n crcular left-shft operatons, t should have at least n separate branches. Ths ples that at least n ponts of ntersecton between the graph of a b x and that of f j 1 c d x have to be checked to fnd the only rght nteger soluton of x. That s, a lower bound of the coplexty s O n. VI. CONCLUSION Ths paper has studed the securty of the recently-proposed Y-Tan-Sew chaotc cpher [1]. Soe defects of ths cpher have been ponted out and analyzed n detal. The securty analyses gven n ths paper should provde soe useful references for better desgn of varous chaotc cphers n the future. ACKNOWLEDGEMENTS The authors would lke to thank the anonyous revewers for ther valuable coents. REFERENCES [1] X. Y, C. H. Tan, and C. K. Sew, A new block cpher based on chaotc tent aps, IEEE Trans. Crcuts Syst. I, vol. 49, no. 1, pp , Deceber. [] S. L, Analyses and new desgns of dgtal chaotc cphers, Ph.D. dssertaton, School of Electroncs and Inforaton Engneerng, X an Jaotong Unversty, X an, Chna, June 3, fulltext s avalable onlne at [3] B. Schneer, Appled Cryptography Protocols, Algorths, and Souce Code n C, nd ed. New York: John Wley & Sons, Inc., [4] A. Baranovsky and D. Daes, Desgn of one-densonal chaotc aps wth prescrbed statstcal propertes, Int. J. Bfurcaton Chaos, vol. 5, no. 6, pp , [5] E. W. Wessten, Geoetrc dstrbuton, Fro MathWorld: athworld.wolfra.co/geoetrcdstrbuton.htl, 4.

System in Weibull Distribution

System in Weibull Distribution Internatonal Matheatcal Foru 4 9 no. 9 94-95 Relablty Equvalence Factors of a Seres-Parallel Syste n Webull Dstrbuton M. A. El-Dacese Matheatcs Departent Faculty of Scence Tanta Unversty Tanta Egypt eldacese@yahoo.co

More information

Excess Error, Approximation Error, and Estimation Error

Excess Error, Approximation Error, and Estimation Error E0 370 Statstcal Learnng Theory Lecture 10 Sep 15, 011 Excess Error, Approxaton Error, and Estaton Error Lecturer: Shvan Agarwal Scrbe: Shvan Agarwal 1 Introducton So far, we have consdered the fnte saple

More information

Applied Mathematics Letters

Applied Mathematics Letters Appled Matheatcs Letters 2 (2) 46 5 Contents lsts avalable at ScenceDrect Appled Matheatcs Letters journal hoepage: wwwelseverco/locate/al Calculaton of coeffcents of a cardnal B-splne Gradr V Mlovanovć

More information

XII.3 The EM (Expectation-Maximization) Algorithm

XII.3 The EM (Expectation-Maximization) Algorithm XII.3 The EM (Expectaton-Maxzaton) Algorth Toshnor Munaata 3/7/06 The EM algorth s a technque to deal wth varous types of ncoplete data or hdden varables. It can be appled to a wde range of learnng probles

More information

Fermi-Dirac statistics

Fermi-Dirac statistics UCC/Physcs/MK/EM/October 8, 205 Fer-Drac statstcs Fer-Drac dstrbuton Matter partcles that are eleentary ostly have a type of angular oentu called spn. hese partcles are known to have a agnetc oent whch

More information

The Parity of the Number of Irreducible Factors for Some Pentanomials

The Parity of the Number of Irreducible Factors for Some Pentanomials The Party of the Nuber of Irreducble Factors for Soe Pentanoals Wolfra Koepf 1, Ryul K 1 Departent of Matheatcs Unversty of Kassel, Kassel, F. R. Gerany Faculty of Matheatcs and Mechancs K Il Sung Unversty,

More information

1 Definition of Rademacher Complexity

1 Definition of Rademacher Complexity COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture #9 Scrbe: Josh Chen March 5, 2013 We ve spent the past few classes provng bounds on the generalzaton error of PAClearnng algorths for the

More information

Computational and Statistical Learning theory Assignment 4

Computational and Statistical Learning theory Assignment 4 Coputatonal and Statstcal Learnng theory Assgnent 4 Due: March 2nd Eal solutons to : karthk at ttc dot edu Notatons/Defntons Recall the defnton of saple based Radeacher coplexty : [ ] R S F) := E ɛ {±}

More information

Least Squares Fitting of Data

Least Squares Fitting of Data Least Squares Fttng of Data Davd Eberly Geoetrc Tools, LLC http://www.geoetrctools.co/ Copyrght c 1998-2014. All Rghts Reserved. Created: July 15, 1999 Last Modfed: February 9, 2008 Contents 1 Lnear Fttng

More information

On Pfaff s solution of the Pfaff problem

On Pfaff s solution of the Pfaff problem Zur Pfaff scen Lösung des Pfaff scen Probles Mat. Ann. 7 (880) 53-530. On Pfaff s soluton of te Pfaff proble By A. MAYER n Lepzg Translated by D. H. Delpenc Te way tat Pfaff adopted for te ntegraton of

More information

BAYESIAN CURVE FITTING USING PIECEWISE POLYNOMIALS. Dariusz Biskup

BAYESIAN CURVE FITTING USING PIECEWISE POLYNOMIALS. Dariusz Biskup BAYESIAN CURVE FITTING USING PIECEWISE POLYNOMIALS Darusz Bskup 1. Introducton The paper presents a nonparaetrc procedure for estaton of an unknown functon f n the regresson odel y = f x + ε = N. (1) (

More information

Several generation methods of multinomial distributed random number Tian Lei 1, a,linxihe 1,b,Zhigang Zhang 1,c

Several generation methods of multinomial distributed random number Tian Lei 1, a,linxihe 1,b,Zhigang Zhang 1,c Internatonal Conference on Appled Scence and Engneerng Innovaton (ASEI 205) Several generaton ethods of ultnoal dstrbuted rando nuber Tan Le, a,lnhe,b,zhgang Zhang,c School of Matheatcs and Physcs, USTB,

More information

PROBABILITY AND STATISTICS Vol. III - Analysis of Variance and Analysis of Covariance - V. Nollau ANALYSIS OF VARIANCE AND ANALYSIS OF COVARIANCE

PROBABILITY AND STATISTICS Vol. III - Analysis of Variance and Analysis of Covariance - V. Nollau ANALYSIS OF VARIANCE AND ANALYSIS OF COVARIANCE ANALYSIS OF VARIANCE AND ANALYSIS OF COVARIANCE V. Nollau Insttute of Matheatcal Stochastcs, Techncal Unversty of Dresden, Gerany Keywords: Analyss of varance, least squares ethod, odels wth fxed effects,

More information

Time and Space Complexity Reduction of a Cryptanalysis Algorithm

Time and Space Complexity Reduction of a Cryptanalysis Algorithm Te and Space Coplexty Reducton of a Cryptanalyss Algorth Mohaad Ghasezadeh Electrcal and Coputer Engneerng Departent, Yazd Unversty, Yazd, Iran.ghasezadeh@yazdun.ac.r Receved: /4/6; Accepted: /5/4 Pages:

More information

An Optimal Bound for Sum of Square Roots of Special Type of Integers

An Optimal Bound for Sum of Square Roots of Special Type of Integers The Sxth Internatonal Syposu on Operatons Research and Its Applcatons ISORA 06 Xnang, Chna, August 8 12, 2006 Copyrght 2006 ORSC & APORC pp. 206 211 An Optal Bound for Su of Square Roots of Specal Type

More information

Finite Fields and Their Applications

Finite Fields and Their Applications Fnte Felds and Ther Applcatons 5 009 796 807 Contents lsts avalable at ScenceDrect Fnte Felds and Ther Applcatons www.elsever.co/locate/ffa Typcal prtve polynoals over nteger resdue rngs Tan Tan a, Wen-Feng

More information

COS 511: Theoretical Machine Learning

COS 511: Theoretical Machine Learning COS 5: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture #0 Scrbe: José Sões Ferrera March 06, 203 In the last lecture the concept of Radeacher coplexty was ntroduced, wth the goal of showng that

More information

arxiv: v2 [math.co] 3 Sep 2017

arxiv: v2 [math.co] 3 Sep 2017 On the Approxate Asyptotc Statstcal Independence of the Peranents of 0- Matrces arxv:705.0868v2 ath.co 3 Sep 207 Paul Federbush Departent of Matheatcs Unversty of Mchgan Ann Arbor, MI, 4809-043 Septeber

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Determination of the Confidence Level of PSD Estimation with Given D.O.F. Based on WELCH Algorithm

Determination of the Confidence Level of PSD Estimation with Given D.O.F. Based on WELCH Algorithm Internatonal Conference on Inforaton Technology and Manageent Innovaton (ICITMI 05) Deternaton of the Confdence Level of PSD Estaton wth Gven D.O.F. Based on WELCH Algorth Xue-wang Zhu, *, S-jan Zhang

More information

Differential Cryptanalysis of Nimbus

Differential Cryptanalysis of Nimbus Dfferental Cryptanalyss of Nmbus Vladmr Furman Computer Scence Department, Technon - Israel Insttute of Technology, Hafa 32000, Israel. vfurman@cs.technon.ac.l. Abstract. Nmbus s a block cpher submtted

More information

Centroid Uncertainty Bounds for Interval Type-2 Fuzzy Sets: Forward and Inverse Problems

Centroid Uncertainty Bounds for Interval Type-2 Fuzzy Sets: Forward and Inverse Problems Centrod Uncertanty Bounds for Interval Type-2 Fuzzy Sets: Forward and Inverse Probles Jerry M. Mendel and Hongwe Wu Sgnal and Iage Processng Insttute Departent of Electrcal Engneerng Unversty of Southern

More information

Elastic Collisions. Definition: two point masses on which no external forces act collide without losing any energy.

Elastic Collisions. Definition: two point masses on which no external forces act collide without losing any energy. Elastc Collsons Defnton: to pont asses on hch no external forces act collde thout losng any energy v Prerequstes: θ θ collsons n one denson conservaton of oentu and energy occurs frequently n everyday

More information

1 Review From Last Time

1 Review From Last Time COS 5: Foundatons of Machne Learnng Rob Schapre Lecture #8 Scrbe: Monrul I Sharf Aprl 0, 2003 Revew Fro Last Te Last te, we were talkng about how to odel dstrbutons, and we had ths setup: Gven - exaples

More information

Study of the possibility of eliminating the Gibbs paradox within the framework of classical thermodynamics *

Study of the possibility of eliminating the Gibbs paradox within the framework of classical thermodynamics * tudy of the possblty of elnatng the Gbbs paradox wthn the fraework of classcal therodynacs * V. Ihnatovych Departent of Phlosophy, Natonal echncal Unversty of Ukrane Kyv Polytechnc Insttute, Kyv, Ukrane

More information

Revision: December 13, E Main Suite D Pullman, WA (509) Voice and Fax

Revision: December 13, E Main Suite D Pullman, WA (509) Voice and Fax .9.1: AC power analyss Reson: Deceber 13, 010 15 E Man Sute D Pullan, WA 99163 (509 334 6306 Voce and Fax Oerew n chapter.9.0, we ntroduced soe basc quanttes relate to delery of power usng snusodal sgnals.

More information

PHYS 1443 Section 002 Lecture #20

PHYS 1443 Section 002 Lecture #20 PHYS 1443 Secton 002 Lecture #20 Dr. Jae Condtons for Equlbru & Mechancal Equlbru How to Solve Equlbru Probles? A ew Exaples of Mechancal Equlbru Elastc Propertes of Solds Densty and Specfc Gravty lud

More information

Designing Fuzzy Time Series Model Using Generalized Wang s Method and Its application to Forecasting Interest Rate of Bank Indonesia Certificate

Designing Fuzzy Time Series Model Using Generalized Wang s Method and Its application to Forecasting Interest Rate of Bank Indonesia Certificate The Frst Internatonal Senar on Scence and Technology, Islac Unversty of Indonesa, 4-5 January 009. Desgnng Fuzzy Te Seres odel Usng Generalzed Wang s ethod and Its applcaton to Forecastng Interest Rate

More information

Denote the function derivatives f(x) in given points. x a b. Using relationships (1.2), polynomials (1.1) are written in the form

Denote the function derivatives f(x) in given points. x a b. Using relationships (1.2), polynomials (1.1) are written in the form SET OF METHODS FO SOUTION THE AUHY POBEM FO STIFF SYSTEMS OF ODINAY DIFFEENTIA EUATIONS AF atypov and YuV Nulchev Insttute of Theoretcal and Appled Mechancs SB AS 639 Novosbrs ussa Introducton A constructon

More information

LECTURE :FACTOR ANALYSIS

LECTURE :FACTOR ANALYSIS LCUR :FACOR ANALYSIS Rta Osadchy Based on Lecture Notes by A. Ng Motvaton Dstrbuton coes fro MoG Have suffcent aount of data: >>n denson Use M to ft Mture of Gaussans nu. of tranng ponts If

More information

AN ANALYSIS OF A FRACTAL KINETICS CURVE OF SAVAGEAU

AN ANALYSIS OF A FRACTAL KINETICS CURVE OF SAVAGEAU AN ANALYI OF A FRACTAL KINETIC CURE OF AAGEAU by John Maloney and Jack Hedel Departent of Matheatcs Unversty of Nebraska at Oaha Oaha, Nebraska 688 Eal addresses: aloney@unoaha.edu, jhedel@unoaha.edu Runnng

More information

Chapter 12 Lyes KADEM [Thermodynamics II] 2007

Chapter 12 Lyes KADEM [Thermodynamics II] 2007 Chapter 2 Lyes KDEM [Therodynacs II] 2007 Gas Mxtures In ths chapter we wll develop ethods for deternng therodynac propertes of a xture n order to apply the frst law to systes nvolvng xtures. Ths wll be

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Least Squares Fitting of Data

Least Squares Fitting of Data Least Squares Fttng of Data Davd Eberly Geoetrc Tools, LLC http://www.geoetrctools.co/ Copyrght c 1998-2015. All Rghts Reserved. Created: July 15, 1999 Last Modfed: January 5, 2015 Contents 1 Lnear Fttng

More information

Xiangwen Li. March 8th and March 13th, 2001

Xiangwen Li. March 8th and March 13th, 2001 CS49I Approxaton Algorths The Vertex-Cover Proble Lecture Notes Xangwen L March 8th and March 3th, 00 Absolute Approxaton Gven an optzaton proble P, an algorth A s an approxaton algorth for P f, for an

More information

A Radon-Nikodym Theorem for Completely Positive Maps

A Radon-Nikodym Theorem for Completely Positive Maps A Radon-Nody Theore for Copletely Postve Maps V P Belavn School of Matheatcal Scences, Unversty of Nottngha, Nottngha NG7 RD E-al: vpb@aths.nott.ac.u and P Staszews Insttute of Physcs, Ncholas Coperncus

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

Slobodan Lakić. Communicated by R. Van Keer

Slobodan Lakić. Communicated by R. Van Keer Serdca Math. J. 21 (1995), 335-344 AN ITERATIVE METHOD FOR THE MATRIX PRINCIPAL n-th ROOT Slobodan Lakć Councated by R. Van Keer In ths paper we gve an teratve ethod to copute the prncpal n-th root and

More information

ON THE NUMBER OF PRIMITIVE PYTHAGOREAN QUINTUPLES

ON THE NUMBER OF PRIMITIVE PYTHAGOREAN QUINTUPLES Journal of Algebra, Nuber Theory: Advances and Applcatons Volue 3, Nuber, 05, Pages 3-8 ON THE NUMBER OF PRIMITIVE PYTHAGOREAN QUINTUPLES Feldstrasse 45 CH-8004, Zürch Swtzerland e-al: whurlann@bluewn.ch

More information

Three Algorithms for Flexible Flow-shop Scheduling

Three Algorithms for Flexible Flow-shop Scheduling Aercan Journal of Appled Scences 4 (): 887-895 2007 ISSN 546-9239 2007 Scence Publcatons Three Algorths for Flexble Flow-shop Schedulng Tzung-Pe Hong, 2 Pe-Yng Huang, 3 Gwoboa Horng and 3 Chan-Lon Wang

More information

Gadjah Mada University, Indonesia. Yogyakarta State University, Indonesia Karangmalang Yogyakarta 55281

Gadjah Mada University, Indonesia. Yogyakarta State University, Indonesia Karangmalang Yogyakarta 55281 Reducng Fuzzy Relatons of Fuzzy Te Seres odel Usng QR Factorzaton ethod and Its Applcaton to Forecastng Interest Rate of Bank Indonesa Certfcate Agus aan Abad Subanar Wdodo 3 Sasubar Saleh 4 Ph.D Student

More information

arxiv: v2 [cs.cr] 29 Sep 2016

arxiv: v2 [cs.cr] 29 Sep 2016 Internatonal Journal of Bfurcaton and Chaos c World Scentfc Publshng Company Breakng a chaotc mage encrypton algorthm based on modulo addton and XOR operaton arxv:107.6536v [cs.cr] 9 Sep 016 Chengqng L

More information

Worst Case Interrupt Response Time Draft, Fall 2007

Worst Case Interrupt Response Time Draft, Fall 2007 Worst Case Interrupt esponse Te Draft, Fall 7 Phlp Koopan Carnege Mellon Unversty Copyrght 7, Phlp Koopan eproducton and dssenaton beyond students of CMU ECE 8-348 s prohbted.. Overvew: Interrupt Servce

More information

Solutions for Homework #9

Solutions for Homework #9 Solutons for Hoewor #9 PROBEM. (P. 3 on page 379 n the note) Consder a sprng ounted rgd bar of total ass and length, to whch an addtonal ass s luped at the rghtost end. he syste has no dapng. Fnd the natural

More information

Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction

Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Cryptology, Tuesday, February 27th, 2007 Nils Andersen. Complexity Theoretic Reduction Attacks on RSA The Rabn Cryptosystem Semantc Securty of RSA Cryptology, Tuesday, February 27th, 2007 Nls Andersen Square Roots modulo n Complexty Theoretc Reducton Factorng Algorthms Pollard s p 1 Pollard

More information

1.3 Hence, calculate a formula for the force required to break the bond (i.e. the maximum value of F)

1.3 Hence, calculate a formula for the force required to break the bond (i.e. the maximum value of F) EN40: Dynacs and Vbratons Hoework 4: Work, Energy and Lnear Moentu Due Frday March 6 th School of Engneerng Brown Unversty 1. The Rydberg potental s a sple odel of atoc nteractons. It specfes the potental

More information

Lecture 12: Discrete Laplacian

Lecture 12: Discrete Laplacian Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

Irregular vibrations in multi-mass discrete-continuous systems torsionally deformed

Irregular vibrations in multi-mass discrete-continuous systems torsionally deformed (2) 4 48 Irregular vbratons n mult-mass dscrete-contnuous systems torsonally deformed Abstract In the paper rregular vbratons of dscrete-contnuous systems consstng of an arbtrary number rgd bodes connected

More information

Our focus will be on linear systems. A system is linear if it obeys the principle of superposition and homogenity, i.e.

Our focus will be on linear systems. A system is linear if it obeys the principle of superposition and homogenity, i.e. SSTEM MODELLIN In order to solve a control syste proble, the descrptons of the syste and ts coponents ust be put nto a for sutable for analyss and evaluaton. The followng ethods can be used to odel physcal

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

On the number of regions in an m-dimensional space cut by n hyperplanes

On the number of regions in an m-dimensional space cut by n hyperplanes 6 On the nuber of regons n an -densonal space cut by n hyperplanes Chungwu Ho and Seth Zeran Abstract In ths note we provde a unfor approach for the nuber of bounded regons cut by n hyperplanes n general

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

TOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION

TOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION 1 2 MULTIPLIERLESS FILTER DESIGN Realzaton of flters wthout full-fledged multplers Some sldes based on support materal by W. Wolf for hs book Modern VLSI Desgn, 3 rd edton. Partly based on followng papers:

More information

halftoning Journal of Electronic Imaging, vol. 11, no. 4, Oct Je-Ho Lee and Jan P. Allebach

halftoning Journal of Electronic Imaging, vol. 11, no. 4, Oct Je-Ho Lee and Jan P. Allebach olorant-based drect bnary search» halftonng Journal of Electronc Iagng, vol., no. 4, Oct. 22 Je-Ho Lee and Jan P. Allebach School of Electrcal Engneerng & oputer Scence Kyungpook Natonal Unversty Abstract

More information

Recover plaintext attack to block ciphers

Recover plaintext attack to block ciphers Recover plantext attac to bloc cphers L An-Png Bejng 100085, P.R.Chna apl0001@sna.com Abstract In ths paper, we wll present an estmaton for the upper-bound of the amount of 16-bytes plantexts for Englsh

More information

Quantum Particle Motion in Physical Space

Quantum Particle Motion in Physical Space Adv. Studes Theor. Phys., Vol. 8, 014, no. 1, 7-34 HIKARI Ltd, www.-hkar.co http://dx.do.org/10.1988/astp.014.311136 Quantu Partcle Moton n Physcal Space A. Yu. Saarn Dept. of Physcs, Saara State Techncal

More information

Reliability estimation in Pareto-I distribution based on progressively type II censored sample with binomial removals

Reliability estimation in Pareto-I distribution based on progressively type II censored sample with binomial removals Journal of Scentfc esearch Developent (): 08-3 05 Avalable onlne at wwwjsradorg ISSN 5-7569 05 JSAD elablty estaton n Pareto-I dstrbuton based on progressvely type II censored saple wth bnoal reovals Ilhan

More information

Formulas for the Determinant

Formulas for the Determinant page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use

More information

Scattering by a perfectly conducting infinite cylinder

Scattering by a perfectly conducting infinite cylinder Scatterng by a perfectly conductng nfnte cylnder Reeber that ths s the full soluton everywhere. We are actually nterested n the scatterng n the far feld lt. We agan use the asyptotc relatonshp exp exp

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

Statistical analysis of Accelerated life testing under Weibull distribution based on fuzzy theory

Statistical analysis of Accelerated life testing under Weibull distribution based on fuzzy theory Statstcal analyss of Accelerated lfe testng under Webull dstrbuton based on fuzzy theory Han Xu, Scence & Technology on Relablty & Envronental Engneerng Laboratory, School of Relablty and Syste Engneerng,

More information

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Scroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator

Scroll Generation with Inductorless Chua s Circuit and Wien Bridge Oscillator Latest Trends on Crcuts, Systems and Sgnals Scroll Generaton wth Inductorless Chua s Crcut and Wen Brdge Oscllator Watcharn Jantanate, Peter A. Chayasena, and Sarawut Sutorn * Abstract An nductorless Chua

More information

Affine transformations and convexity

Affine transformations and convexity Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/

More information

Introduction to Vapor/Liquid Equilibrium, part 2. Raoult s Law:

Introduction to Vapor/Liquid Equilibrium, part 2. Raoult s Law: CE304, Sprng 2004 Lecture 4 Introducton to Vapor/Lqud Equlbrum, part 2 Raoult s Law: The smplest model that allows us do VLE calculatons s obtaned when we assume that the vapor phase s an deal gas, and

More information

Class: Life-Science Subject: Physics

Class: Life-Science Subject: Physics Class: Lfe-Scence Subject: Physcs Frst year (6 pts): Graphc desgn of an energy exchange A partcle (B) of ass =g oves on an nclned plane of an nclned angle α = 3 relatve to the horzontal. We want to study

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Uncertainty and auto-correlation in. Measurement

Uncertainty and auto-correlation in. Measurement Uncertanty and auto-correlaton n arxv:1707.03276v2 [physcs.data-an] 30 Dec 2017 Measurement Markus Schebl Federal Offce of Metrology and Surveyng (BEV), 1160 Venna, Austra E-mal: markus.schebl@bev.gv.at

More information

Description of the Force Method Procedure. Indeterminate Analysis Force Method 1. Force Method con t. Force Method con t

Description of the Force Method Procedure. Indeterminate Analysis Force Method 1. Force Method con t. Force Method con t Indeternate Analyss Force Method The force (flexblty) ethod expresses the relatonshps between dsplaceents and forces that exst n a structure. Prary objectve of the force ethod s to deterne the chosen set

More information

Global Sensitivity. Tuesday 20 th February, 2018

Global Sensitivity. Tuesday 20 th February, 2018 Global Senstvty Tuesday 2 th February, 28 ) Local Senstvty Most senstvty analyses [] are based on local estmates of senstvty, typcally by expandng the response n a Taylor seres about some specfc values

More information

Handling Overload (G. Buttazzo, Hard Real-Time Systems, Ch. 9) Causes for Overload

Handling Overload (G. Buttazzo, Hard Real-Time Systems, Ch. 9) Causes for Overload PS-663: Real-Te Systes Handlng Overloads Handlng Overload (G Buttazzo, Hard Real-Te Systes, h 9) auses for Overload Bad syste desgn eg poor estaton of worst-case executon tes Sultaneous arrval of unexpected

More information

Topics in Probability Theory and Stochastic Processes Steven R. Dunbar. Classes of States and Stationary Distributions

Topics in Probability Theory and Stochastic Processes Steven R. Dunbar. Classes of States and Stationary Distributions Steven R. Dunbar Department of Mathematcs 203 Avery Hall Unversty of Nebraska-Lncoln Lncoln, NE 68588-0130 http://www.math.unl.edu Voce: 402-472-3731 Fax: 402-472-8466 Topcs n Probablty Theory and Stochastc

More information

On Syndrome Decoding of Punctured Reed-Solomon and Gabidulin Codes 1

On Syndrome Decoding of Punctured Reed-Solomon and Gabidulin Codes 1 Ffteenth Internatonal Workshop on Algebrac and Cobnatoral Codng Theory June 18-24, 2016, Albena, Bulgara pp. 35 40 On Syndroe Decodng of Punctured Reed-Soloon and Gabduln Codes 1 Hannes Bartz hannes.bartz@tu.de

More information

Chapter 13. Gas Mixtures. Study Guide in PowerPoint. Thermodynamics: An Engineering Approach, 5th edition by Yunus A. Çengel and Michael A.

Chapter 13. Gas Mixtures. Study Guide in PowerPoint. Thermodynamics: An Engineering Approach, 5th edition by Yunus A. Çengel and Michael A. Chapter 3 Gas Mxtures Study Gude n PowerPont to accopany Therodynacs: An Engneerng Approach, 5th edton by Yunus A. Çengel and Mchael A. Boles The dscussons n ths chapter are restrcted to nonreactve deal-gas

More information

On the Construction of Polar Codes

On the Construction of Polar Codes On the Constructon of Polar Codes Ratn Pedarsan School of Coputer and Councaton Systes, Lausanne, Swtzerland. ratn.pedarsan@epfl.ch S. Haed Hassan School of Coputer and Councaton Systes, Lausanne, Swtzerland.

More information

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng

More information

Department of Statistics University of Toronto STA305H1S / 1004 HS Design and Analysis of Experiments Term Test - Winter Solution

Department of Statistics University of Toronto STA305H1S / 1004 HS Design and Analysis of Experiments Term Test - Winter Solution Department of Statstcs Unversty of Toronto STA35HS / HS Desgn and Analyss of Experments Term Test - Wnter - Soluton February, Last Name: Frst Name: Student Number: Instructons: Tme: hours. Ads: a non-programmable

More information

Random Partitions of Samples

Random Partitions of Samples Random Parttons of Samples Klaus Th. Hess Insttut für Mathematsche Stochastk Technsche Unverstät Dresden Abstract In the present paper we construct a decomposton of a sample nto a fnte number of subsamples

More information

,..., k N. , k 2. ,..., k i. The derivative with respect to temperature T is calculated by using the chain rule: & ( (5) dj j dt = "J j. k i.

,..., k N. , k 2. ,..., k i. The derivative with respect to temperature T is calculated by using the chain rule: & ( (5) dj j dt = J j. k i. Suppleentary Materal Dervaton of Eq. 1a. Assue j s a functon of the rate constants for the N coponent reactons: j j (k 1,,..., k,..., k N ( The dervatve wth respect to teperature T s calculated by usng

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

Case A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k.

Case A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k. THE CELLULAR METHOD In ths lecture, we ntroduce the cellular method as an approach to ncdence geometry theorems lke the Szemeréd-Trotter theorem. The method was ntroduced n the paper Combnatoral complexty

More information

On the Construction of Polar Codes

On the Construction of Polar Codes On the Constructon of Polar Codes Ratn Pedarsan School of Coputer and Councaton Systes, Lausanne, Swtzerland. ratn.pedarsan@epfl.ch S. Haed Hassan School of Coputer and Councaton Systes, Lausanne, Swtzerland.

More information

Lossy Compression. Compromise accuracy of reconstruction for increased compression.

Lossy Compression. Compromise accuracy of reconstruction for increased compression. Lossy Compresson Compromse accuracy of reconstructon for ncreased compresson. The reconstructon s usually vsbly ndstngushable from the orgnal mage. Typcally, one can get up to 0:1 compresson wth almost

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

Message modification, neutral bits and boomerangs

Message modification, neutral bits and boomerangs Message modfcaton, neutral bts and boomerangs From whch round should we start countng n SHA? Antone Joux DGA and Unversty of Versalles St-Quentn-en-Yvelnes France Jont work wth Thomas Peyrn 1 Dfferental

More information

Week3, Chapter 4. Position and Displacement. Motion in Two Dimensions. Instantaneous Velocity. Average Velocity

Week3, Chapter 4. Position and Displacement. Motion in Two Dimensions. Instantaneous Velocity. Average Velocity Week3, Chapter 4 Moton n Two Dmensons Lecture Quz A partcle confned to moton along the x axs moves wth constant acceleraton from x =.0 m to x = 8.0 m durng a 1-s tme nterval. The velocty of the partcle

More information

Chapter One Mixture of Ideal Gases

Chapter One Mixture of Ideal Gases herodynacs II AA Chapter One Mxture of Ideal Gases. Coposton of a Gas Mxture: Mass and Mole Fractons o deterne the propertes of a xture, we need to now the coposton of the xture as well as the propertes

More information

Numerical Heat and Mass Transfer

Numerical Heat and Mass Transfer Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and

More information

/ n ) are compared. The logic is: if the two

/ n ) are compared. The logic is: if the two STAT C141, Sprng 2005 Lecture 13 Two sample tests One sample tests: examples of goodness of ft tests, where we are testng whether our data supports predctons. Two sample tests: called as tests of ndependence

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

Online Classification: Perceptron and Winnow

Online Classification: Perceptron and Winnow E0 370 Statstcal Learnng Theory Lecture 18 Nov 8, 011 Onlne Classfcaton: Perceptron and Wnnow Lecturer: Shvan Agarwal Scrbe: Shvan Agarwal 1 Introducton In ths lecture we wll start to study the onlne learnng

More information

Assortment Optimization under MNL

Assortment Optimization under MNL Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.

More information

EEE 241: Linear Systems

EEE 241: Linear Systems EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they

More information