Quantitative Information Leakage. Lecture 9

Size: px
Start display at page:

Download "Quantitative Information Leakage. Lecture 9"

Transcription

1 Quantitative Information Leakage Lecture 9 1

2 The baic model: Sytem = Information-Theoretic channel Secret Information Obervable 1 o1... Sytem... m on Input Output 2

3 Toward a quantitative notion of leakage A general principle: Leakage = difference between the a priori vulnerability and the a poteriori vulnerability vulnerability = vulnerability of the ecret, a priori / a poteriori = before / after the obervation Intuitively the vulnerability depend on the ditribution: the more uncertainty there i about the exact value of the ecret, the le vulnerable the ecret i. Note that the obervation update the input probability: p( o) =p() p(o ) p(o) Baye theorem 3

4 Information theoretic approach Entropy H(X) of a random variable X Information theory: H(X) meaure the degree of uncertainty of the event Security: H(X) can be ued to meaure the vulnerability of the ecret Mutual information I(S;O) Information theory: I(S;O) meaure the correlation of S and O formally I(S;O) i defined a difference between: H(S), the entropy of S before knowing, and H(S O), the entropy of S after knowing O Security: I(S;O) can be ued to meaure the leakage: Leakage = I(S;O) = H(S) H(S O) H(S) depend only on the prior; H(S O) can be computed uing the prior and the channel matrix 4

5 Shannon entropy A priori H(S) = X p() log p() A poteriori H(S O) = X o p(o) X p( o) log p( o) Leakage = Mutual Information I(S; O) =H(S) H(S O) In general H(S) H(S O) the entropy may increae after one ingle obervation, but in the average it decreae or remain the ame H(S) = H(S O) if and only if S and O are independent Thi i the cae if and only if all row of the channel matrix are the ame Thi cae correpond to trong anonymity in the ene of Chaum Shannon capacity C = max I(S;O) over all prior (wort-cae leakage) 5

6 Entropy: Alternative notion A we argued before, there i no unique notion of vulnerability. It depend on: the model of attack, and how we meaure it ucce Conider again the general model of adverary propoed by [Köpf and Bain CCS 07] that we aw before: Aume an oracle that anwer ye/no to quetion of a certain form. The adverary i defined by the form of the quetion and the meaure of ucce. In general we conider the bet trategy for the adverary, with repect to a given meaure of ucce. 6

7 We aw that if Entropy: Alternative notion the quetion are of the form: i S P?, and the meaure of ucce i: the expected number of quetion needed to find the value of S in the adverary bet trategy then the natural meaure of protection i Shannon entropy However, thi model of attack doe not eem o natural in ecurity, and alternative have been conidered. In particular, the limited-try attack The adverary ha a limited number of attempt at it dipoal The meaure of ucce i the probability that he dicover the ecret during thee attempt (in hi bet trategy) Obviouly the bet trategy for the adverary i to try firt the value which have the highet probability 7

8 One try attack: Rényi min-entropy One-try attack The quetion are of the form: The meaure of ucce i: i S =? log(max p()) The meaure of ucce i Rényi min-entropy: H 1 (S) = log(max p()) Like in the cae of Shannon entropy, H 1 (S) i highet when the ditribution i uniform, and it i 0 when the ditribution i a delta of Dirac (no uncertainty). 8

9 Toward a notion of leakage baed on min-entropy Leakage = difference between the a priori vulnerability and the a poteriori vulnerability Leakage = H ( S ) H (S O ) How hould we define the conditional minentropy H (S O )? 9

10 Let u recall the conditional entropy in Shannon cae H(S) = X p() log p() Shannon entropy An obervable o determine a new ditribution on S: p( o) =p() p(o ) p(o) Baye theorem Define the entropy of the new ditribution on S, given that O = o, a: H(S O = o) = X p( o) log p( o) Define conditional entropy a the expected value of the updated entropie: H(S O) = X p(o) H(S O = o) o X = p(o) X p( o) log p( o) o 10

11 Let u try to do the ame for the min-entropy cae H 1 (S) = log(max p()) Rényi min-entropy Define the entropy of the new ditribution on S, given that O = o, a: H 1 (S O = o) = log(max p( o)) Define conditional entropy a the expected value of the updated entropie: H 1 (S O) = X p(o) H 1 (S O = o) o X = p(o) log(max ( o)) However thi approach doe not work: we would obtain negative leakage! o 11

12 Conditional min-entropy Probability of ucce of an attack on S, given that O = o: Pr ucc (S O = o) = max p( o) The expected value of the prob. of ucce (aka convere of the Baye rik): Pr ucc (S O) = X o p(o) Pr ucc (S O = o) = X o p(o) max p( o) = X o max (p(o ) p()) Now define H 1 (S O) = log Pr ucc (S O) [Smith 2009] 12

13 Leakage in the min-entropy approach A priori H 1 (S) = log max p() A poteriori H 1 (S O) = log X o max(p(o ) p()) Leakage = min-mutual Inf. I 1 (S; O) =H 1 (S) H 1 (S O) 13

14 Example: DC net. Ring of 2 node, b = 1, biaed coin n0 Input S: n0, n1 Output O: the declaration of n1 and n0: d1d0 {01,10} n1 Biaed c.: p(0) = ⅔ p(1) = ⅓ n0 n1 ⅔ ⅓ ⅓ ⅔ x = p(n0) 14

15 Propertie of the leakage in the min-entropy approach In general I (S;O) 0 I (S;O) = 0 if all row are the ame (but not vicevera) Define min-capacity: C = max I (S;O) over all prior. We have: 1. C = 0 if and only if all row are the ame 2. C i obtained on the uniform ditribution (but, in general, there can be other ditribution that give maximum leakage) 3. C = the log of the um of the max of each column 4. C = C in the determinitic cae 5. C C in general 15

16 Leakage in the min-entropy approach C i obtained on the uniform ditribution C = the um of the max of each column Proof (a) I 1 (S; O) = H 1 (S) H 1 (S O) = log max p() ( log( X o X max(p(o ) p()) = log apple log o X o max p() (max p(o )) (max max p() p()) max(p(o ) p()))) = log X o max p(o ) (b) Thi expreion i alo given by I (S;O) on the uniform input ditribution 16

17 More propertie of the leakage H(S) = H (S) = 0 iff S i a point probability ditribution (aka delta of Dirac), i.e., all the probability ma i in one ingle value The maximum value of H(S) and H (S) i log #S Shannon mutual information i ymmetric: I(S;O) = I(O;S) Namely: H(S) - H(S O) = H(O) - H(O S). Thi doe not hold for the min-entropy cae If the channel i determinitic, then I(S;O) = H(O) If the channel i determinitic, then C = C = log #O 17

18 Rényi min-entropy v. Shannon entropy S = {a, b} p(a) =x p(b) =1 x S = {a, b, c} p(a) = x p(b) = y p(c) = 1 (x + y) H (S) H(S) x y Rényi min entropy and conditional entropy are the log of piecewie linear function xx 18

19 Shannon capacity v. Rényi min-capacity binary channel a 1-a b 1-b Shannon capacity Rényi min-capacity In general, Rényi min capacity i an upper bound for Shannon capacity 19

20 Exercie 1. Prove that I (S;O) 0 2. Prove that if all row of the channel matrix are equal, then I (S;O) = 0 3. Prove that all row of the channel matrix are equal if and only if C = 0 4. Compute Shannon leakage and Rényi min-leakage for the paword checker (the verion where the adverary can oberve the execution time), auming a uniform ditribution on the paword 20

Quantitative Information Flow. Lecture 7

Quantitative Information Flow. Lecture 7 Quantitative Information Flow Lecture 7 1 The basic model: Systems = Information-Theoretic channels Secret Information Observables s1 o1... System... sm on Input Output 2 Probabilistic systems are noisy

More information

Quantitative Approaches to Information Protection

Quantitative Approaches to Information Protection Quantitative Approaches to Information Protection Catuscia Palamidessi INRIA Saclay 1 LOCALI meeting, Beijin 06/11/2013 Plan of the talk Motivations and Examples A General Quantitative Model Quantitative

More information

Shannon s Theory. Objectives

Shannon s Theory. Objectives Shannon Theory Debdeep Mukhopadhyay IIT Kharagpur Objective Undertand the definition of Perfect Secrecy Prove that a given crypto-ytem i perfectly ecured One Time Pad Entropy and it computation Ideal Cipher

More information

UNIT 15 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS

UNIT 15 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS UNIT 1 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS Structure 1.1 Introduction Objective 1.2 Redundancy 1.3 Reliability of k-out-of-n Sytem 1.4 Reliability of Standby Sytem 1. Summary 1.6 Solution/Anwer

More information

1 Bertrand duopoly with incomplete information

1 Bertrand duopoly with incomplete information Game Theory Solution to Problem Set 5 1 Bertrand duopoly ith incomplete information The game i de ned by I = f1; g ; et of player A i = [0; 1) T i = fb L ; b H g, ith p(b L ) = u i (b i ; p i ; p j ) =

More information

Chapter 12 Simple Linear Regression

Chapter 12 Simple Linear Regression Chapter 1 Simple Linear Regreion Introduction Exam Score v. Hour Studied Scenario Regreion Analyi ued to quantify the relation between (or more) variable o you can predict the value of one variable baed

More information

CMSC 474, Introduction to Game Theory Maxmin and Minmax Strategies

CMSC 474, Introduction to Game Theory Maxmin and Minmax Strategies CMSC 474, Introduction to Game Theory Maxmin and Minmax Strategie Mohammad T. Hajiaghayi Univerity of Maryland Wort-Cae Expected Utility For agent i, the wort-cae expected utility of a trategy i i the

More information

Suggested Answers To Exercises. estimates variability in a sampling distribution of random means. About 68% of means fall

Suggested Answers To Exercises. estimates variability in a sampling distribution of random means. About 68% of means fall Beyond Significance Teting ( nd Edition), Rex B. Kline Suggeted Anwer To Exercie Chapter. The tatitic meaure variability among core at the cae level. In a normal ditribution, about 68% of the core fall

More information

Lecture 8: Period Finding: Simon s Problem over Z N

Lecture 8: Period Finding: Simon s Problem over Z N Quantum Computation (CMU 8-859BB, Fall 205) Lecture 8: Period Finding: Simon Problem over Z October 5, 205 Lecturer: John Wright Scribe: icola Rech Problem A mentioned previouly, period finding i a rephraing

More information

ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang

ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang Proceeding of the 2008 Winter Simulation Conference S. J. Maon, R. R. Hill, L. Mönch, O. Roe, T. Jefferon, J. W. Fowler ed. ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION Xiaoqun Wang

More information

Social Studies 201 Notes for March 18, 2005

Social Studies 201 Notes for March 18, 2005 1 Social Studie 201 Note for March 18, 2005 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the

More information

μ + = σ = D 4 σ = D 3 σ = σ = All units in parts (a) and (b) are in V. (1) x chart: Center = μ = 0.75 UCL =

μ + = σ = D 4 σ = D 3 σ = σ = All units in parts (a) and (b) are in V. (1) x chart: Center = μ = 0.75 UCL = Our online Tutor are available 4*7 to provide Help with Proce control ytem Homework/Aignment or a long term Graduate/Undergraduate Proce control ytem Project. Our Tutor being experienced and proficient

More information

Clustering Methods without Given Number of Clusters

Clustering Methods without Given Number of Clusters Clutering Method without Given Number of Cluter Peng Xu, Fei Liu Introduction A we now, mean method i a very effective algorithm of clutering. It mot powerful feature i the calability and implicity. However,

More information

into a discrete time function. Recall that the table of Laplace/z-transforms is constructed by (i) selecting to get

into a discrete time function. Recall that the table of Laplace/z-transforms is constructed by (i) selecting to get Lecture 25 Introduction to Some Matlab c2d Code in Relation to Sampled Sytem here are many way to convert a continuou time function, { h( t) ; t [0, )} into a dicrete time function { h ( k) ; k {0,,, }}

More information

EC381/MN308 Probability and Some Statistics. Lecture 7 - Outline. Chapter Cumulative Distribution Function (CDF) Continuous Random Variables

EC381/MN308 Probability and Some Statistics. Lecture 7 - Outline. Chapter Cumulative Distribution Function (CDF) Continuous Random Variables EC38/MN38 Probability and Some Statitic Yanni Pachalidi yannip@bu.edu, http://ionia.bu.edu/ Lecture 7 - Outline. Continuou Random Variable Dept. of Manufacturing Engineering Dept. of Electrical and Computer

More information

Source slideplayer.com/fundamentals of Analytical Chemistry, F.J. Holler, S.R.Crouch. Chapter 6: Random Errors in Chemical Analysis

Source slideplayer.com/fundamentals of Analytical Chemistry, F.J. Holler, S.R.Crouch. Chapter 6: Random Errors in Chemical Analysis Source lideplayer.com/fundamental of Analytical Chemitry, F.J. Holler, S.R.Crouch Chapter 6: Random Error in Chemical Analyi Random error are preent in every meaurement no matter how careful the experimenter.

More information

Social Studies 201 Notes for November 14, 2003

Social Studies 201 Notes for November 14, 2003 1 Social Studie 201 Note for November 14, 2003 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the

More information

Chapter 2 Sampling and Quantization. In order to investigate sampling and quantization, the difference between analog

Chapter 2 Sampling and Quantization. In order to investigate sampling and quantization, the difference between analog Chapter Sampling and Quantization.1 Analog and Digital Signal In order to invetigate ampling and quantization, the difference between analog and digital ignal mut be undertood. Analog ignal conit of continuou

More information

At the end of this lesson, the students should be able to understand:

At the end of this lesson, the students should be able to understand: Intructional Objective: At the end of thi leon, the tudent hould be able to undertand: Baic failure mechanim of riveted joint. Concept of deign of a riveted joint. 1. Strength of riveted joint: Strength

More information

Determination of the local contrast of interference fringe patterns using continuous wavelet transform

Determination of the local contrast of interference fringe patterns using continuous wavelet transform Determination of the local contrat of interference fringe pattern uing continuou wavelet tranform Jong Kwang Hyok, Kim Chol Su Intitute of Optic, Department of Phyic, Kim Il Sung Univerity, Pyongyang,

More information

5 Mutual Information and Channel Capacity

5 Mutual Information and Channel Capacity 5 Mutual Information and Channel Capacity In Section 2, we have seen the use of a quantity called entropy to measure the amount of randomness in a random variable. In this section, we introduce several

More information

Lecture 7: Testing Distributions

Lecture 7: Testing Distributions CSE 5: Sublinear (and Streaming) Algorithm Spring 014 Lecture 7: Teting Ditribution April 1, 014 Lecturer: Paul Beame Scribe: Paul Beame 1 Teting Uniformity of Ditribution We return today to property teting

More information

LECTURE 12: LAPLACE TRANSFORM

LECTURE 12: LAPLACE TRANSFORM LECTURE 12: LAPLACE TRANSFORM 1. Definition and Quetion The definition of the Laplace tranform could hardly be impler: For an appropriate function f(t), the Laplace tranform of f(t) i a function F () which

More information

Root Locus Diagram. Root loci: The portion of root locus when k assume positive values: that is 0

Root Locus Diagram. Root loci: The portion of root locus when k assume positive values: that is 0 Objective Root Locu Diagram Upon completion of thi chapter you will be able to: Plot the Root Locu for a given Tranfer Function by varying gain of the ytem, Analye the tability of the ytem from the root

More information

MPRI Course on Concurrency. Lecture 14. Application of probabilistic process calculi to security

MPRI Course on Concurrency. Lecture 14. Application of probabilistic process calculi to security MPRI Course on Concurrency Lecture 14 Application of probabilistic process calculi to security Catuscia Palamidessi LIX, Ecole Polytechnique kostas@lix.polytechnique.fr www.lix.polytechnique.fr/~catuscia

More information

(b) Is the game below solvable by iterated strict dominance? Does it have a unique Nash equilibrium?

(b) Is the game below solvable by iterated strict dominance? Does it have a unique Nash equilibrium? 14.1 Final Exam Anwer all quetion. You have 3 hour in which to complete the exam. 1. (60 Minute 40 Point) Anwer each of the following ubquetion briefly. Pleae how your calculation and provide rough explanation

More information

NCAAPMT Calculus Challenge Challenge #3 Due: October 26, 2011

NCAAPMT Calculus Challenge Challenge #3 Due: October 26, 2011 NCAAPMT Calculu Challenge 011 01 Challenge #3 Due: October 6, 011 A Model of Traffic Flow Everyone ha at ome time been on a multi-lane highway and encountered road contruction that required the traffic

More information

Jul 4, 2005 turbo_code_primer Revision 0.0. Turbo Code Primer

Jul 4, 2005 turbo_code_primer Revision 0.0. Turbo Code Primer Jul 4, 5 turbo_code_primer Reviion. Turbo Code Primer. Introduction Thi document give a quick tutorial on MAP baed turbo coder. Section develop the background theory. Section work through a imple numerical

More information

Chapter 5 Consistency, Zero Stability, and the Dahlquist Equivalence Theorem

Chapter 5 Consistency, Zero Stability, and the Dahlquist Equivalence Theorem Chapter 5 Conitency, Zero Stability, and the Dahlquit Equivalence Theorem In Chapter 2 we dicued convergence of numerical method and gave an experimental method for finding the rate of convergence (aka,

More information

On the Robustness of the Characteristics Related to (M\M\1) ( \FCFS) Queue System Model

On the Robustness of the Characteristics Related to (M\M\1) ( \FCFS) Queue System Model www.ijemr.net ISSN (ONINE): 5-758, ISSN (PRINT): 394-696 Volume-5, Iue-3, June 5 International Journal of Engineering and Management Reearch Page Number: 839-847 On the Robutne of the haracteritic Related

More information

Lecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004

Lecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004 18.997 Topic in Combinatorial Optimization April 29th, 2004 Lecture 21 Lecturer: Michel X. Goeman Scribe: Mohammad Mahdian 1 The Lovaz plitting-off lemma Lovaz plitting-off lemma tate the following. Theorem

More information

e st t u(t 2) dt = lim t dt = T 2 2 e st = T e st lim + e st

e st t u(t 2) dt = lim t dt = T 2 2 e st = T e st lim + e st Math 46, Profeor David Levermore Anwer to Quetion for Dicuion Friday, 7 October 7 Firt Set of Quetion ( Ue the definition of the Laplace tranform to compute Lf]( for the function f(t = u(t t, where u i

More information

Approximating discrete probability distributions with Bayesian networks

Approximating discrete probability distributions with Bayesian networks Approximating dicrete probability ditribution with Bayeian network Jon Williamon Department of Philoophy King College, Str and, London, WC2R 2LS, UK Abtract I generalie the argument of [Chow & Liu 1968]

More information

No-load And Blocked Rotor Test On An Induction Machine

No-load And Blocked Rotor Test On An Induction Machine No-load And Blocked Rotor Tet On An Induction Machine Aim To etimate magnetization and leakage impedance parameter of induction machine uing no-load and blocked rotor tet Theory An induction machine in

More information

1 year n0tes chemistry new st CHAPTER 7 THERMOCHEMISTRY MCQs Q.1 Which of the following statements is contrary to the first law of thermodynamics?

1 year n0tes chemistry new st CHAPTER 7 THERMOCHEMISTRY MCQs Q.1 Which of the following statements is contrary to the first law of thermodynamics? year n0te chemitry new t CHAPTER 7 THERMOCHEMISTRY MCQ Q.1 Which of the following tatement i contrary to the firt law of thermodynamic? (a) energy can neither be created nor detroyed (b) one form of energy

More information

Given the following circuit with unknown initial capacitor voltage v(0): X(s) Immediately, we know that the transfer function H(s) is

Given the following circuit with unknown initial capacitor voltage v(0): X(s) Immediately, we know that the transfer function H(s) is EE 4G Note: Chapter 6 Intructor: Cheung More about ZSR and ZIR. Finding unknown initial condition: Given the following circuit with unknown initial capacitor voltage v0: F v0/ / Input xt 0Ω Output yt -

More information

Introduction to Laplace Transform Techniques in Circuit Analysis

Introduction to Laplace Transform Techniques in Circuit Analysis Unit 6 Introduction to Laplace Tranform Technique in Circuit Analyi In thi unit we conider the application of Laplace Tranform to circuit analyi. A relevant dicuion of the one-ided Laplace tranform i found

More information

Problem Set 8 Solutions

Problem Set 8 Solutions Deign and Analyi of Algorithm April 29, 2015 Maachuett Intitute of Technology 6.046J/18.410J Prof. Erik Demaine, Srini Devada, and Nancy Lynch Problem Set 8 Solution Problem Set 8 Solution Thi problem

More information

RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS

RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS www.arpapre.com/volume/vol29iue1/ijrras_29_1_01.pdf RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS Sevcan Demir Atalay 1,* & Özge Elmataş Gültekin

More information

Feedback Control Systems (FCS)

Feedback Control Systems (FCS) Feedback Control Sytem (FCS) Lecture19-20 Routh-Herwitz Stability Criterion Dr. Imtiaz Huain email: imtiaz.huain@faculty.muet.edu.pk URL :http://imtiazhuainkalwar.weebly.com/ Stability of Higher Order

More information

c n b n 0. c k 0 x b n < 1 b k b n = 0. } of integers between 0 and b 1 such that x = b k. b k c k c k

c n b n 0. c k 0 x b n < 1 b k b n = 0. } of integers between 0 and b 1 such that x = b k. b k c k c k 1. Exitence Let x (0, 1). Define c k inductively. Suppoe c 1,..., c k 1 are already defined. We let c k be the leat integer uch that x k An eay proof by induction give that and for all k. Therefore c n

More information

ME 375 FINAL EXAM Wednesday, May 6, 2009

ME 375 FINAL EXAM Wednesday, May 6, 2009 ME 375 FINAL EXAM Wedneday, May 6, 9 Diviion Meckl :3 / Adam :3 (circle one) Name_ Intruction () Thi i a cloed book examination, but you are allowed three ingle-ided 8.5 crib heet. A calculator i NOT allowed.

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Learning Yihay Manour Google Inc. & Tel-Aviv Univerity Outline Goal of Reinforcement Learning Mathematical Model (MDP) Planning Learning Current Reearch iue 2 Goal of Reinforcement Learning

More information

Chapter 4. The Laplace Transform Method

Chapter 4. The Laplace Transform Method Chapter 4. The Laplace Tranform Method The Laplace Tranform i a tranformation, meaning that it change a function into a new function. Actually, it i a linear tranformation, becaue it convert a linear combination

More information

Chapter #4 EEE8013. Linear Controller Design and State Space Analysis. Design of control system in state space using Matlab

Chapter #4 EEE8013. Linear Controller Design and State Space Analysis. Design of control system in state space using Matlab EEE83 hapter #4 EEE83 Linear ontroller Deign and State Space nalyi Deign of control ytem in tate pace uing Matlab. ontrollabilty and Obervability.... State Feedback ontrol... 5 3. Linear Quadratic Regulator

More information

Asymptotics of ABC. Paul Fearnhead 1, Correspondence: Abstract

Asymptotics of ABC. Paul Fearnhead 1, Correspondence: Abstract Aymptotic of ABC Paul Fearnhead 1, 1 Department of Mathematic and Statitic, Lancater Univerity Correpondence: p.fearnhead@lancater.ac.uk arxiv:1706.07712v1 [tat.me] 23 Jun 2017 Abtract Thi document i due

More information

Laplace Transformation

Laplace Transformation Univerity of Technology Electromechanical Department Energy Branch Advance Mathematic Laplace Tranformation nd Cla Lecture 6 Page of 7 Laplace Tranformation Definition Suppoe that f(t) i a piecewie continuou

More information

Bogoliubov Transformation in Classical Mechanics

Bogoliubov Transformation in Classical Mechanics Bogoliubov Tranformation in Claical Mechanic Canonical Tranformation Suppoe we have a et of complex canonical variable, {a j }, and would like to conider another et of variable, {b }, b b ({a j }). How

More information

EE Control Systems LECTURE 14

EE Control Systems LECTURE 14 Updated: Tueday, March 3, 999 EE 434 - Control Sytem LECTURE 4 Copyright FL Lewi 999 All right reerved ROOT LOCUS DESIGN TECHNIQUE Suppoe the cloed-loop tranfer function depend on a deign parameter k We

More information

An estimation approach for autotuning of event-based PI control systems

An estimation approach for autotuning of event-based PI control systems Acta de la XXXIX Jornada de Automática, Badajoz, 5-7 de Septiembre de 08 An etimation approach for autotuning of event-baed PI control ytem Joé Sánchez Moreno, María Guinaldo Loada, Sebatián Dormido Departamento

More information

Departure Time and Route Choices with Bottleneck Congestion: User Equilibrium under Risk and Ambiguity

Departure Time and Route Choices with Bottleneck Congestion: User Equilibrium under Risk and Ambiguity Departure Time and Route Choice with Bottleneck Congetion: Uer Equilibrium under Rik and Ambiguity Yang Liu, Yuanyuan Li and Lu Hu Department of Indutrial Sytem Engineering and Management National Univerity

More information

EE 508 Lecture 16. Filter Transformations. Lowpass to Bandpass Lowpass to Highpass Lowpass to Band-reject

EE 508 Lecture 16. Filter Transformations. Lowpass to Bandpass Lowpass to Highpass Lowpass to Band-reject EE 508 Lecture 6 Filter Tranformation Lowpa to Bandpa Lowpa to Highpa Lowpa to Band-reject Review from Lat Time Theorem: If the perimeter variation and contact reitance are neglected, the tandard deviation

More information

Confusion matrices. True / False positives / negatives. INF 4300 Classification III Anne Solberg The agenda today: E.g., testing for cancer

Confusion matrices. True / False positives / negatives. INF 4300 Classification III Anne Solberg The agenda today: E.g., testing for cancer INF 4300 Claification III Anne Solberg 29.10.14 The agenda today: More on etimating claifier accuracy Cure of dimenionality knn-claification K-mean clutering x i feature vector for pixel i i- The cla label

More information

Finite Element Analysis of a Fiber Bragg Grating Accelerometer for Performance Optimization

Finite Element Analysis of a Fiber Bragg Grating Accelerometer for Performance Optimization Finite Element Analyi of a Fiber Bragg Grating Accelerometer for Performance Optimization N. Baumallick*, P. Biwa, K. Dagupta and S. Bandyopadhyay Fiber Optic Laboratory, Central Gla and Ceramic Reearch

More information

III.9. THE HYSTERESIS CYCLE OF FERROELECTRIC SUBSTANCES

III.9. THE HYSTERESIS CYCLE OF FERROELECTRIC SUBSTANCES III.9. THE HYSTERESIS CYCLE OF FERROELECTRIC SBSTANCES. Work purpoe The analyi of the behaviour of a ferroelectric ubtance placed in an eternal electric field; the dependence of the electrical polariation

More information

Reliability Analysis of Embedded System with Different Modes of Failure Emphasizing Reboot Delay

Reliability Analysis of Embedded System with Different Modes of Failure Emphasizing Reboot Delay International Journal of Applied Science and Engineering 3., 4: 449-47 Reliability Analyi of Embedded Sytem with Different Mode of Failure Emphaizing Reboot Delay Deepak Kumar* and S. B. Singh Department

More information

TRANSITION PROBABILITY MATRIX OF BRIDGE MEMBERS DAMAGE RATING

TRANSITION PROBABILITY MATRIX OF BRIDGE MEMBERS DAMAGE RATING TRANSITION PROBABILITY MATRIX OF BRIDGE MEMBERS DAMAGE RATING Hirohi Sato and Ryoji Hagiwara 2 Abtract Bridge member damage characteritic were tudied uing the inpection record. Damage can be claified into

More information

EE 508 Lecture 16. Filter Transformations. Lowpass to Bandpass Lowpass to Highpass Lowpass to Band-reject

EE 508 Lecture 16. Filter Transformations. Lowpass to Bandpass Lowpass to Highpass Lowpass to Band-reject EE 508 Lecture 6 Filter Tranformation Lowpa to Bandpa Lowpa to Highpa Lowpa to Band-reject Review from Lat Time Theorem: If the perimeter variation and contact reitance are neglected, the tandard deviation

More information

Lecture 4 (Fuzzy Set Operations)

Lecture 4 (Fuzzy Set Operations) http://experty.4t.com Lecture 4 (Fuzzy Set Operation) We need a radically different kind of mathematic, the mathematic of fuzzy or cloudy quantitie which are not decribable in term of probability ditribution

More information

OPTIMIZATION OF INTERDEPENDENT QUEUEING MODEL WITH BULK SERVICE HAVING VARIABLE CAPACITY

OPTIMIZATION OF INTERDEPENDENT QUEUEING MODEL WITH BULK SERVICE HAVING VARIABLE CAPACITY International Releae of Mathematic and Mathematical Science Available at http://irmm.org OPTIMIZATION OF INTERDEPENDENT QUEUEING MODEL WITH BULK SERVICE HAVING VARIABLE CAPACITY Shavej Ali Siddiqui Sagar

More information

On the Bayes Risk in Information-Hiding Protocols

On the Bayes Risk in Information-Hiding Protocols On the Bayes Risk in Information-Hiding Protocols Konstantinos Chatzikokolakis Catuscia Palamidessi INRIA and LIX, École Polytechnique Palaiseau, France {kostas,catuscia}@lix.polytechnique.fr Prakash Panangaden

More information

Secretary problems with competing employers

Secretary problems with competing employers Secretary problem with competing employer Nicole Immorlica 1, Robert Kleinberg 2, and Mohammad Mahdian 1 1 Microoft Reearch, One Microoft Way, Redmond, WA. {nickle,mahdian}@microoft.com 2 UC Berkeley Computer

More information

Comparing Means: t-tests for Two Independent Samples

Comparing Means: t-tests for Two Independent Samples Comparing ean: t-tet for Two Independent Sample Independent-eaure Deign t-tet for Two Independent Sample Allow reearcher to evaluate the mean difference between two population uing data from two eparate

More information

Question 1 Equivalent Circuits

Question 1 Equivalent Circuits MAE 40 inear ircuit Fall 2007 Final Intruction ) Thi exam i open book You may ue whatever written material you chooe, including your cla note and textbook You may ue a hand calculator with no communication

More information

skipping section 6.6 / 5.6 (generating permutations and combinations) concludes basic counting in Chapter 6 / 5

skipping section 6.6 / 5.6 (generating permutations and combinations) concludes basic counting in Chapter 6 / 5 kiing ection 6.6 / 5.6 generating ermutation and combination conclude baic counting in Chater 6 / 5 on to Chater 7 / 6: Dicrete robability before we go to trickier counting in Chater 8 / 7 age 431-475

More information

Cumulative Review of Calculus

Cumulative Review of Calculus Cumulative Review of Calculu. Uing the limit definition of the lope of a tangent, determine the lope of the tangent to each curve at the given point. a. f 5,, 5 f,, f, f 5,,,. The poition, in metre, of

More information

Logic, Automata and Games

Logic, Automata and Games Logic, Automata and Game Jacque Duparc EJCIM 27 EJCIM, 23-27 January 27 J. Duparc ( & ) Logic, Automata and Game Lyon, 23-27 January 27 / 97 Reference [] K. R. Apt and E. Grädel. Lecture in game theory

More information

Week 3 Statistics for bioinformatics and escience

Week 3 Statistics for bioinformatics and escience Week 3 Statitic for bioinformatic and escience Line Skotte 28. november 2008 2.9.3-4) In thi eercie we conider microrna data from Human and Moue. The data et repreent 685 independent realiation of the

More information

Multicolor Sunflowers

Multicolor Sunflowers Multicolor Sunflower Dhruv Mubayi Lujia Wang October 19, 2017 Abtract A unflower i a collection of ditinct et uch that the interection of any two of them i the ame a the common interection C of all of

More information

( 1) EE 313 Linear Signals & Systems (Fall 2018) Solution Set for Homework #10 on Laplace Transforms

( 1) EE 313 Linear Signals & Systems (Fall 2018) Solution Set for Homework #10 on Laplace Transforms EE 33 Linear Signal & Sytem (Fall 08) Solution Set for Homework #0 on Laplace Tranform By: Mr. Houhang Salimian & Prof. Brian L. Evan Problem. a) xt () = ut () ut ( ) From lecture Lut { ()} = and { } t

More information

Learning Multiplicative Interactions

Learning Multiplicative Interactions CSC2535 2011 Lecture 6a Learning Multiplicative Interaction Geoffrey Hinton Two different meaning of multiplicative If we take two denity model and multiply together their probability ditribution at each

More information

Synergy, Redundancy, and Independence in Population Codes

Synergy, Redundancy, and Independence in Population Codes The Journal of Neurocience, December 17, 2003 23(37):11539 11553 11539 Behavioral/Sytem/Cognitive Synergy, Redundancy, and Independence in Population Code Elad Schneidman, 1,2 William Bialek, 2 and Michael

More information

arxiv: v1 [cond-mat.stat-mech] 22 Sep 2009

arxiv: v1 [cond-mat.stat-mech] 22 Sep 2009 Exact and limit ditribution of the larget fitne on correlated fitne landcape arxiv:99.3933v [cond-mat.tat-mech] 22 Sep 29 Kavita Jain, Abhihek Dagupta 2 and Gayatri Da 3 Theoretical Science Unit and Evolutionary

More information

Convex Hulls of Curves Sam Burton

Convex Hulls of Curves Sam Burton Convex Hull of Curve Sam Burton 1 Introduction Thi paper will primarily be concerned with determining the face of convex hull of curve of the form C = {(t, t a, t b ) t [ 1, 1]}, a < b N in R 3. We hall

More information

Estimating floor acceleration in nonlinear multi-story moment-resisting frames

Estimating floor acceleration in nonlinear multi-story moment-resisting frames Etimating floor acceleration in nonlinear multi-tory moment-reiting frame R. Karami Mohammadi Aitant Profeor, Civil Engineering Department, K.N.Tooi Univerity M. Mohammadi M.Sc. Student, Civil Engineering

More information

1. The F-test for Equality of Two Variances

1. The F-test for Equality of Two Variances . The F-tet for Equality of Two Variance Previouly we've learned how to tet whether two population mean are equal, uing data from two independent ample. We can alo tet whether two population variance are

More information

A Study on Simulating Convolutional Codes and Turbo Codes

A Study on Simulating Convolutional Codes and Turbo Codes A Study on Simulating Convolutional Code and Turbo Code Final Report By Daniel Chang July 27, 2001 Advior: Dr. P. Kinman Executive Summary Thi project include the deign of imulation of everal convolutional

More information

Design By Emulation (Indirect Method)

Design By Emulation (Indirect Method) Deign By Emulation (Indirect Method he baic trategy here i, that Given a continuou tranfer function, it i required to find the bet dicrete equivalent uch that the ignal produced by paing an input ignal

More information

Physics 741 Graduate Quantum Mechanics 1 Solutions to Final Exam, Fall 2014

Physics 741 Graduate Quantum Mechanics 1 Solutions to Final Exam, Fall 2014 Phyic 7 Graduate Quantum Mechanic Solution to inal Eam all 0 Each quetion i worth 5 point with point for each part marked eparately Some poibly ueful formula appear at the end of the tet In four dimenion

More information

Z a>2 s 1n = X L - m. X L = m + Z a>2 s 1n X L = The decision rule for this one-tail test is

Z a>2 s 1n = X L - m. X L = m + Z a>2 s 1n X L = The decision rule for this one-tail test is M09_BERE8380_12_OM_C09.QD 2/21/11 3:44 PM Page 1 9.6 The Power of a Tet 9.6 The Power of a Tet 1 Section 9.1 defined Type I and Type II error and their aociated rik. Recall that a repreent the probability

More information

Chapter K - Problems

Chapter K - Problems Chapter K - Problem Blinn College - Phyic 2426 - Terry Honan Problem K. A He-Ne (helium-neon) laer ha a wavelength of 632.8 nm. If thi i hot at an incident angle of 55 into a gla block with index n =.52

More information

TAYLOR POLYNOMIALS FOR NABLA DYNAMIC EQUATIONS ON TIME SCALES

TAYLOR POLYNOMIALS FOR NABLA DYNAMIC EQUATIONS ON TIME SCALES TAYLOR POLYNOMIALS FOR NABLA DYNAMIC EQUATIONS ON TIME SCALES DOUGLAS R. ANDERSON Abtract. We are concerned with the repreentation of polynomial for nabla dynamic equation on time cale. Once etablihed,

More information

is defined in the half plane Re ( z ) >0 as follows.

is defined in the half plane Re ( z ) >0 as follows. 0 Abolute Value of Dirichlet Eta Function. Dirichlet Eta Function.. Definition Dirichlet Eta Function ( z) i defined in the half plane Re( z ) >0 a follow. () z = r- r z Thi erie i analytically continued

More information

Example: Amplifier Distortion

Example: Amplifier Distortion 4/6/2011 Example Amplifier Ditortion 1/9 Example: Amplifier Ditortion Recall thi circuit from a previou handout: 15.0 R C =5 K v ( t) = v ( t) o R B =5 K β = 100 _ vi( t ) 58. R E =5 K CUS We found that

More information

Research Article Reliability of Foundation Pile Based on Settlement and a Parameter Sensitivity Analysis

Research Article Reliability of Foundation Pile Based on Settlement and a Parameter Sensitivity Analysis Mathematical Problem in Engineering Volume 2016, Article ID 1659549, 7 page http://dxdoiorg/101155/2016/1659549 Reearch Article Reliability of Foundation Pile Baed on Settlement and a Parameter Senitivity

More information

IEOR 3106: Fall 2013, Professor Whitt Topics for Discussion: Tuesday, November 19 Alternating Renewal Processes and The Renewal Equation

IEOR 3106: Fall 2013, Professor Whitt Topics for Discussion: Tuesday, November 19 Alternating Renewal Processes and The Renewal Equation IEOR 316: Fall 213, Profeor Whitt Topic for Dicuion: Tueday, November 19 Alternating Renewal Procee and The Renewal Equation 1 Alternating Renewal Procee An alternating renewal proce alternate between

More information

Figure 1 Siemens PSSE Web Site

Figure 1 Siemens PSSE Web Site Stability Analyi of Dynamic Sytem. In the lat few lecture we have een how mall ignal Lalace domain model may be contructed of the dynamic erformance of ower ytem. The tability of uch ytem i a matter of

More information

EE Control Systems LECTURE 6

EE Control Systems LECTURE 6 Copyright FL Lewi 999 All right reerved EE - Control Sytem LECTURE 6 Updated: Sunday, February, 999 BLOCK DIAGRAM AND MASON'S FORMULA A linear time-invariant (LTI) ytem can be repreented in many way, including:

More information

Math 273 Solutions to Review Problems for Exam 1

Math 273 Solutions to Review Problems for Exam 1 Math 7 Solution to Review Problem for Exam True or Fale? Circle ONE anwer for each Hint: For effective tudy, explain why if true and give a counterexample if fale (a) T or F : If a b and b c, then a c

More information

Midterm Test Nov 10, 2010 Student Number:

Midterm Test Nov 10, 2010 Student Number: Mathematic 265 Section: 03 Verion A Full Name: Midterm Tet Nov 0, 200 Student Number: Intruction: There are 6 page in thi tet (including thi cover page).. Caution: There may (or may not) be more than one

More information

A Simple Example Binary Hypothesis Testing Optimal Receiver Frontend M-ary Signal Sets Message Sequences. = 4 for QPSK) E b Q 2. 2E b.

A Simple Example Binary Hypothesis Testing Optimal Receiver Frontend M-ary Signal Sets Message Sequences. = 4 for QPSK) E b Q 2. 2E b. Exercie: QPSK I Find the error rate for the ignal et n (t) = p 2E /T co(2pf c t + n p/2 + p/4), for n = 0,, 3 I Anwer: (Recall h P = d min 2 E b = 4 for QPSK) E Pr{e} = 2Q Q 2 = 2Q = 2Q 2E b h P E b 2

More information

Chapter Landscape of an Optimization Problem. Local Search. Coping With NP-Hardness. Gradient Descent: Vertex Cover

Chapter Landscape of an Optimization Problem. Local Search. Coping With NP-Hardness. Gradient Descent: Vertex Cover Coping With NP-Hardne Chapter 12 Local Search Q Suppoe I need to olve an NP-hard problem What hould I do? A Theory ay you're unlikely to find poly-time algorithm Mut acrifice one of three deired feature

More information

CHAPTER 6. Estimation

CHAPTER 6. Estimation CHAPTER 6 Etimation Definition. Statitical inference i the procedure by which we reach a concluion about a population on the bai of information contained in a ample drawn from that population. Definition.

More information

List coloring hypergraphs

List coloring hypergraphs Lit coloring hypergraph Penny Haxell Jacque Vertraete Department of Combinatoric and Optimization Univerity of Waterloo Waterloo, Ontario, Canada pehaxell@uwaterloo.ca Department of Mathematic Univerity

More information

A NEW LOAD MODEL OF THE PEDESTRIANS LATERAL ACTION

A NEW LOAD MODEL OF THE PEDESTRIANS LATERAL ACTION A NEW LOAD MODEL OF THE PEDESTRIANS LATERAL ACTION Fiammetta VENUTI PhD Politecnico di Torino Torino, IT Luca Bruno Aociate Profeor Politecnico di Torino Torino, IT Summary Thi paper propoe a new load

More information

Theoretical Computer Science. Optimal algorithms for online scheduling with bounded rearrangement at the end

Theoretical Computer Science. Optimal algorithms for online scheduling with bounded rearrangement at the end Theoretical Computer Science 4 (0) 669 678 Content lit available at SciVere ScienceDirect Theoretical Computer Science journal homepage: www.elevier.com/locate/tc Optimal algorithm for online cheduling

More information

Lecture 12 - Non-isolated DC-DC Buck Converter

Lecture 12 - Non-isolated DC-DC Buck Converter ecture 12 - Non-iolated DC-DC Buck Converter Step-Down or Buck converter deliver DC power from a higher voltage DC level ( d ) to a lower load voltage o. d o ene ref + o v c Controller Figure 12.1 The

More information

Homework #7 Solution. Solutions: ΔP L Δω. Fig. 1

Homework #7 Solution. Solutions: ΔP L Δω. Fig. 1 Homework #7 Solution Aignment:. through.6 Bergen & Vittal. M Solution: Modified Equation.6 becaue gen. peed not fed back * M (.0rad / MW ec)(00mw) rad /ec peed ( ) (60) 9.55r. p. m. 3600 ( 9.55) 3590.45r.

More information

Bayesian-Based Decision Making for Object Search and Characterization

Bayesian-Based Decision Making for Object Search and Characterization 9 American Control Conference Hyatt Regency Riverfront, St. Loui, MO, USA June -, 9 WeC9. Bayeian-Baed Deciion Making for Object Search and Characterization Y. Wang and I. I. Huein Abtract Thi paper focue

More information

On General Binary Relation Based Rough Set

On General Binary Relation Based Rough Set SSN 1746-7659, England, K Journal of nformation and Computing Science Vol. 7, No. 1, 2012, pp. 054-066 On General Binary Relation Baed Rough Set Weihua Xu 1,+, Xiantao Zhang 1, Qiaorong Wang 1 and Shuai

More information