The Effectiveness of the Linear Hull Effect

Size: px
Start display at page:

Download "The Effectiveness of the Linear Hull Effect"

Transcription

1 The Effetiveness of the Linear Hull Effet S. Murphy Tehnial Report RHUL MA Otober 009 Department of Mathematis Royal Holloway, University of London Egham, Surrey TW0 0EX, England

2 Abstrat There is no linear hull effet in linear ryptanalysis. Introdution Linear ryptanalysis [7] is one of the standard tehniques of assessing the seurity of blok iphers and is based on linear approximations to the plaintext, iphertext and key. In our disussion of linear approximations, we onsider an iterated blok ipher enryption with plaintext p, iphertext and extended key k, where p, and k are binary olumn vetors. We define the extended key k as the onatenation of the the round subkeys derived from the blok ipher key through the key shedule. A linear approximation in its most basi form is usually regarded as a statement of the form α T p = α T P p + αt C = γt k with probability + ǫ γ. The vetors α, α P and α C are known respetively as the overall data mask, the plaintext mask and the iphertext mask, with α T = α T P C αt, and the vetor γ as the key mask. The value ǫ γ is known as the imbalane or orrelation of the linear approximation, and ǫ γ as the bias of the linear approximation. If the linear expression is unbiased, that is ǫ γ 0, then the linear expression an potentially be used to give an estimate of one bit γ T k of key information. The number of plaintext-iphertext pairs required to estimate this key bit to a required auray is proportional to ǫ γ. This is the proedure given by Algorithm of [7]. The more sophistiated Algorithm of [7] uses trial enryptions and deryptions of the outer rounds under various partial subkeys. Under ertain assumptions, the tehnique of Algorithm is equivalent to onstruting a method of distinguishing the distribution of the linear expression α T p + γ T k, whih is zero with probability + ǫ γ, from a uniform distribution [7,8]. As before, the number of plaintext-iphertext pairs required to make this distintion to a required auray is proportional to ǫ γ [7]. The usual method of alulating the probability that suh a single linear expression holds is to use the so-alled Piling-Up Lemma of [7]. However, in the analysis of many blok iphers, suh use of the Piling-Up Lemma an generate a number of linear expressions with the same data mask but differing key masks, that is a key mask set Γ and a olletion of expressions of the form α T p = γ T k with probability + ǫ γ [γ Γ]. The existene of a number of suh unbiased expressions ǫ γ generated by the Piling-Up Lemma appears to be the motivation for the onept of the linear

3 hull of linear expressions introdued by [8]. The linear hull for data mask α is the set of all suh above expressions for different key masks γ. It is asserted by [8] that existene of suh a linear hull ontaining many suh unbiased expressions generally inreases the effiieny of Algorithm of [7]. Furthermore, suh an assertion appears to be generally aepted and widely used in the analysis of blok iphers. For example, a standard referene work on ryptology makes the following statement about the use of the linear hull in ryptanalysis [3]. LINEAR HULLS: Estimating the bias of approximations by onstruting linear harateristis is very onvenient, but in some ases, the value derived in this way diverges signifiantly from the atual bias. The most important ause for this differene is the so-alled linear hull effet, first desribed by Nyberg in 994 [8]. The effet takes plae when the orrelation between plaintext and iphertext bits, desribed by a speifi linear approximation, an be explained by multiple linear harateristis, eah with a non-negligible bias, and eah involving a different set of key bits. Suh a set of linear harateristis with idential input and output masks is alled a linear hull. Depending on the value of the key, the different harateristis will interfere onstrutively or destrutively, or even anel out ompletely. If the set of keys used in different linear harateristis are independent, then this effet might onsiderably redue the average bias of [a single linear] expression, and thus the suess rate of the simple attak desribed above [Algorithm of [7]]. Nyberg s paper [8] shows, however, that the more effiient attaks [Algorithm ] desribed in [7], whih only use the linear approximations as a distinguisher, will typially benefit from the linear hull effet. We show that this so-alled linear hull effet [3, 8] simply does not exist. The Fundamental Probability Our analysis of the linear hull effet is based on the fundamental probability Definition, together with the related onept of the fundamental imbalane Definition. The fundamental probability is a well-defined probability for use in linear ryptanalysis, partiularly in analysing the linear hull effet. Definition. The fundamental probability qk of data mask α for blok ipher enryptions under the fixed extended key k is qk = P k α T p = 0 Definition. The fundamental imbalane of data mask α under fixed key k with fundamental probability qk = + ηk is ηk = P k α T p = 0 P k α T p = = qk.

4 3 Probabilisti Interpretation of the Linear Hull We noted that the fundamental probability Definition is well-defined. However, the probability statements made in the usual definition of a linear hull are not in general well-defined. To demonstrate this, we onsider very arefully the nature of the statements about linear expressions used in the linear hull for a data mask α. In the standard formulation of linear ryptanalysis given in Setion, a linear approximation is defined diretly in terms of a key mask γ, that is a linear approximation is a statement of the form α T p = γ T k with probability + ǫ γ, whih only depends on the key through the value of γ T k. In terms of the fundamental probability for data mask α, we have P k α T p = 0 = + ηk = { + ǫ γ [γ T k = 0] ǫ γ [γ T k = ]. Thus the fundamental imbalane ηk is given in terms of the usual form of the imbalane ǫ γ used in linear ryptanalysis by ηk = γt k ǫ γ. However, for a fixed key k, the fundamental imbalane ηk is learly a onstant. Thus for the above probability to be well-defined, we require γt k ǫ γ to be onstant for all non-trivial key masks γ for fixed k. We now disuss this issue in more detail. The linear hull is usually onsidered to be defined by several probabilisti statements suh as for γ γ p α T = γ T k with probability + ǫ γ p and α T = γ T k with probability + ǫ γ. p Aording to these linear expressions, for a fixed key k, α T has to simultaneously take the value γ T k with probability + ǫ γ and the value γ T k with probability + ǫ γ. This means there are four ases required to evaluate the p fundamental probability P k α T = 0, as given in the following Table. γ T k = 0 γ T k = γ T k = 0 + ǫ γ = + ǫ γ + ǫ γ = ǫ γ γ T k = ǫ γ = + ǫ γ ǫ γ = ǫ γ p P k α T = 0

5 We an therefore dedue that ǫ γ = ǫ γ = 0. Thus the probability statements used in speifying a linear hull are not well-defined if there is more than one unbiased linear approximation in the linear hull. A linear hull in the sense of [3, 8], that is a olletion of several linear expressions eah with a signifiant imbalane or bias, is not a well-defined probabilisti onept. 4 Analogues in Differential Cryptanalysis of Linear Hulls A muh-repeated heuristi justifiation for the linear hull effet is given in [8] by laiming that the use of the linear hull is analogous to the use of the differential [6] in differential ryptanalysis [, ]. However, a detailed examination shows that this analogy is not sustainable. We therefore state the laim of [8] of an analogy between differential and linear ryptanalysis using our notation. We onlude that Algorithm [of [7]] makes in fat use of a family of linear approximate expressions p α P p + α T C + γt k = α T + γ T k where [the data mask] α is fixed but [the key mask] γ varies. This means that the round approximations whih uniquely determine γ and are uniquely determined by γ, an be hosen in all possible ways to form a hain of approximations from α T P p to αt C. Hene there is a lose analog with what is alled differentials in differential ryptanalysis [6]. The key mask γ does indeed determine a series of round data masks with the outer round masks onstrained by α. These data masks give a random proess [4, 5] with a state spae onsisting of two elements {0, }, in for example the manner desribed by [9]. The usual method of analysing this random proess in linear ryptanalysis is to use the Piling-Up Lemma [7], whih is appliable to this random proess if it is a Markov proess [9]. However, whether or not the Piling- Up Lemma is appliable, both states are onsidered by the Piling-Up alulation. Loosely speaking, the Piling-Up Lemma probability alulation may inorretly assign probability to the states if the Markov assumption is not valid, but all probability is assigned. There are no ignored states in linear ryptanalysis, and there is ertainly no missing probability not onsidered by the Piling-Up Lemma waiting to be found. In differential ryptanalysis, a pair of plaintexts is enrypted under the same fixed key. A random proess is derived by taking the differene of those plaintexts at every rounds, so giving a random proess with a state spae of size n. Under the assumption that this differential ryptanalysis random proess is a Markov proess, the differential [6] is alulated by using the produt of the matries of one-step round transition probabilities. The harateristi [, ] is essentially obtained by setting all but one element to 0 in eah of these one-step transition matries and then alulating the produt of these revised matries. A value for

6 a probability alulated using a differential [6] is therefore always at least that of the same value for a probability alulated using a harateristi [, ]. Thus there is a meaningful sense in differential ryptanalysis in whih the differential an be thought of as finding probabilities missed by the harateristi, as the harateristi ignores most of the states in the random proess. The orret analogue of the linear hull in differential ryptanalysis is the enhaned harateristi, onsidered in Setions 5. and 6.5 of []. The enhaned harateristi gives an enhaned differential ryptanalysis random proess in whih the state at any round is the differene between the between the data values at that round as for standard differential ryptanalysis and also a olletion of data values at ertain bit positions. Similarly, in linear ryptanalysis, the simultaneous use of two key masks with the same data mask, really defines sequenes of -dimensional data masks for the inner rounds. This gives rise to a random proess with, in general, a 4-element state spae rather than the -element state spae given by a single key mask. For both the enhaned harateristi in differential ryptanalysis and the linear hull in linear ryptanalysis, the state spae of the underlying random proess state spae is obtained by refining the standard differential ryptanalysis or linear ryptanalysis state spae. The linear hull therefore defines a new enhaned random proess beyond the standard linear ryptanalysis random proess. By ontrast, probability alulations in differential ryptanalysis using either harateristis or differentials are onduted with respet to the same standard differential ryptanalysis random proess. Thus a alulation using a linear hull and a alulation using a differential are fundamentally different in relation to their underlying standard random proess. A differential an find unused probability, whereas a linear hull simply annot. There is no analogue between linear hulls and differentials in the manner laimed by [8]. 5 Data Requirements for the Linear Hull Effet The linear hull effet supposedly redues the number of plaintext-iphertext pairs required to distinguish to a given auray a given distribution from the uniform distribution [3, 8]. Before analysing this laim, we first alulate the data requirements exatly. For a fixed extended key k, the number N k of plaintextiphertext pairs required to use the distinguisher to a required auray is asymptotially inversely proportional to qk [7]. Under the assumption that all extended keys are equally likely, then the mean number over all keys N of plaintext-iphertext pairs required to use the distinguisher to a speified degree of auray is given by N = E[N k ], for some suitably-defined expetation E. If we let K denote the set of extended keys, then the mean number N of plaintext-iphertext pairs required is proportional to [ qk ] = 4 ηk.

7 We now onsider the data requirement for the use of the linear hull given by [8]. The supposed existene of a linear hull effet depends on the assertion that this data requirement an be expressed in terms of a quantity defined by the Fundamental Theorem of [8]. We now examine this assertion. Aordingly, we let rγ, k = + γt k ηk, so rγ, k is the quantity referred to as pa, b, ; k in [8], where a, b refer to the data mask α and refers to the key mask γ. We note that pa, b, ; k is referred to as a probability by [8], but is not in general a well-defined probability Setion 3. The Fundamental Theorem onsiders the quantity ψ given by ψ = rγ, k = 4 ηk = 4 qk. Thus the quantity ψ onsidered by the Fundamental Theorem an be expressed in terms of the above expetation E as [ qk ] ψ = = 4 ηk. The laim for the redution in data omplexity given by the linear hull effet is then based on the assertion that the number N of plaintext-iphertext pairs required to distinguish the distribution from uniform is proportional to ψ, that is to say proportional to [ qk ψ ] = = 4 ηk. We now ompare these two quantities for distinguishing the speified distribution from a uniform distribution. The atual expeted number N of plaintextiphertext pairs and the number given by the appliation of the Fundamental Theorem in the manner of [8] are respetively proportional to [ qk ] [ qk ] and. These two quantities an easily be ompared by using Jensen s inequality [0], whih we state in Lemma. Lemma. Jensen s Inequality. A random variable X and onvex funtion ζ satisfy ζ E[X] E [ζx]. Inversion of the positive real numbers is a onvex funtion, so Jensen s inequality gives [ qk ] [ qk ].

8 The true data requirement is proportional to the left-hand side of the above inequality, whereas the quantity ψ onsidered by the Fundamental Theorem only addresses the right-hand side of this inequality. Thus the Fundamental Theorem an only ever be used to give a lower bound on the data omplexity. We illustrate this point in Examples and. Example. We onsider a linear ryptanalysis for data mask α where the fundamental probability is given by qk = P k α T p = 0 = + γt k ǫ γ + γ T k ǫ γ, where ǫ γ, ǫ γ 0. Thus the fundamental imbalane is given by ηk = γt k ǫ γ + γ T k ǫ γ. The true data requirement to distinguish this distribution from a uniform distribution to a given degree of auray is proportional to [ qk ] = 4 ǫ γ + ǫ γ + ǫ γ ǫ γ = ǫ γ + ǫ γ ǫ γ ǫγ. By ontrast, the approah of [8] based on the Fundamental Theorem asserts that the data requirement is proportional to [ qk ] = ǫγ + ǫ γ + ǫ γ ǫ γ = 4 ǫ γ +. ǫ γ However, ǫ γ + ǫ γ ǫ γ ǫ γ > ǫ, γ + ǫ γ as ǫ γ + ǫ γ > ǫ, γ ǫ γ so an see that [ qk ] [ qk ] >. For this example, we an easily see that the data requirement averaged over all extended keys is always larger than that asserted by the supposed linear hull effet. Example. We onsider the ryptanalysis of Example for a blok ipher where ǫ γ = ǫ γ. Suh a blok ipher would be onsidered to possess a large linear hull effet in the linear hull literature. The fundamental probability qk for data mask α is given by + ǫ γ + ǫ γ [γ T k = γ T k = 0] qk = ǫ γ + ǫ γ [γ T k = γ T k = ] [γ T k γ T k]. Clearly, for any key k kerγ + γ T, that is for half of all the extended keys, the distribution in question is uniform, so by definition is indistinguishable from

9 a uniform distribution. This is refleted in that fat that the true data requirement, proportional to ǫ γ + ǫ γ ǫ γ ǫ γ, is formally infinite. By ontrast, the supposed linear hull effet gives the data requirement as being proportional to ǫ γ + ǫ γ, a finite quantity. For this example, the supposed linear hull effet is effetively asserting that it is possible to distinguish an indistinguishable distribution given by one key beause there exists a distinguishable distribution given by some other key. 6 Conlusions The usual method of quantifying the supposed linear hull effet assumes that expetation and inversion are operations on a random variable whih ommute. Jensen s inequality shows that this assumption is generally inorret. Thus the supposed linear hull effet simply ignores Jensen s inequality, a fundamental result in probability theory and statistial inferene. Furthermore, Jensen s inequality shows that the Fundamental Theorem of [8] an only ever give a lower bound for the data requirement for using a olletion of linear approximations with the same data mask. The linear hull effet, in the usual sense [3, 8] of always improving the average effiieny of Algorithm of [7], is an illusion. Referenes. E. Biham and A. Shamir. Differential Cryptanalysis of the DES-like Cryptosystems. Journal of Cryptology, 4:3 7, 99.. E. Biham and A. Shamir. Differential Cryptanalysis of the Data Enryption Standard. Springer Verlag, A. Biryukov and C. De Cannière. Linear Cryptanalysis for Blok Ciphers. In H.C. Van Tilborg, editor, Enylopedia of Cryptography and Seurity, pages Springer, D.R. Cox and H.D. Miller. The Theory of Stohasti Proesses. Chapman and Hall, G.R. Grimmett and D.R. Stirzaker. Probability and Random Proesses. Oxford University Press, X. Lai, J.L. Massey, and S. Murphy. Markov Ciphers and Differential Cryptanalysis. In D.W. Davies, editor, Advanes in Cryptology EUROCRYPT 99, volume 547 of LNCS, pages Springer Verlag, M. Matsui. Linear Cryptanalysis for the DES Cipher. In T. Helleseth, editor, Advanes in Cryptology EUROCRYPT 993, volume 765 of LNCS, pages Springer Verlag, K. Nyberg. Linear Approximation of Blok Ciphers. In A. De Santis, editor, Advanes in Cryptology EUROCRYPT 94, volume 950 of LNCS, pages Springer Verlag, S. Murphy and F. Piper and M. Walker and P. Wild. Maximum Likelihood Estimation for Blok Cipher Keys. Tehnial Report RHUL-MA-006-3, Royal Holloway University of London, S.D. Silvey. Statistial Analysis. Chapman and Hall, 975.

Millennium Relativity Acceleration Composition. The Relativistic Relationship between Acceleration and Uniform Motion

Millennium Relativity Acceleration Composition. The Relativistic Relationship between Acceleration and Uniform Motion Millennium Relativity Aeleration Composition he Relativisti Relationship between Aeleration and niform Motion Copyright 003 Joseph A. Rybzyk Abstrat he relativisti priniples developed throughout the six

More information

Complexity of Regularization RBF Networks

Complexity of Regularization RBF Networks Complexity of Regularization RBF Networks Mark A Kon Department of Mathematis and Statistis Boston University Boston, MA 02215 mkon@buedu Leszek Plaskota Institute of Applied Mathematis University of Warsaw

More information

A variant of Coppersmith s Algorithm with Improved Complexity and Efficient Exhaustive Search

A variant of Coppersmith s Algorithm with Improved Complexity and Efficient Exhaustive Search A variant of Coppersmith s Algorithm with Improved Complexity and Effiient Exhaustive Searh Jean-Sébastien Coron 1, Jean-Charles Faugère 2, Guénaël Renault 2, and Rina Zeitoun 2,3 1 University of Luxembourg

More information

Hankel Optimal Model Order Reduction 1

Hankel Optimal Model Order Reduction 1 Massahusetts Institute of Tehnology Department of Eletrial Engineering and Computer Siene 6.245: MULTIVARIABLE CONTROL SYSTEMS by A. Megretski Hankel Optimal Model Order Redution 1 This leture overs both

More information

Optimization of Statistical Decisions for Age Replacement Problems via a New Pivotal Quantity Averaging Approach

Optimization of Statistical Decisions for Age Replacement Problems via a New Pivotal Quantity Averaging Approach Amerian Journal of heoretial and Applied tatistis 6; 5(-): -8 Published online January 7, 6 (http://www.sienepublishinggroup.om/j/ajtas) doi:.648/j.ajtas.s.65.4 IN: 36-8999 (Print); IN: 36-96 (Online)

More information

Maximum Entropy and Exponential Families

Maximum Entropy and Exponential Families Maximum Entropy and Exponential Families April 9, 209 Abstrat The goal of this note is to derive the exponential form of probability distribution from more basi onsiderations, in partiular Entropy. It

More information

Bäcklund Transformations: Some Old and New Perspectives

Bäcklund Transformations: Some Old and New Perspectives Bäklund Transformations: Some Old and New Perspetives C. J. Papahristou *, A. N. Magoulas ** * Department of Physial Sienes, Helleni Naval Aademy, Piraeus 18539, Greee E-mail: papahristou@snd.edu.gr **

More information

INTERNATIONAL JOURNAL OF CIVIL AND STRUCTURAL ENGINEERING Volume 2, No 4, 2012

INTERNATIONAL JOURNAL OF CIVIL AND STRUCTURAL ENGINEERING Volume 2, No 4, 2012 INTERNATIONAL JOURNAL OF CIVIL AND STRUCTURAL ENGINEERING Volume, No 4, 01 Copyright 010 All rights reserved Integrated Publishing servies Researh artile ISSN 0976 4399 Strutural Modelling of Stability

More information

CMSC 451: Lecture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017

CMSC 451: Lecture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017 CMSC 451: Leture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017 Reading: Chapt 11 of KT and Set 54 of DPV Set Cover: An important lass of optimization problems involves overing a ertain domain,

More information

Case I: 2 users In case of 2 users, the probability of error for user 1 was earlier derived to be 2 A1

Case I: 2 users In case of 2 users, the probability of error for user 1 was earlier derived to be 2 A1 MUTLIUSER DETECTION (Letures 9 and 0) 6:33:546 Wireless Communiations Tehnologies Instrutor: Dr. Narayan Mandayam Summary By Shweta Shrivastava (shwetash@winlab.rutgers.edu) bstrat This artile ontinues

More information

Control Theory association of mathematics and engineering

Control Theory association of mathematics and engineering Control Theory assoiation of mathematis and engineering Wojieh Mitkowski Krzysztof Oprzedkiewiz Department of Automatis AGH Univ. of Siene & Tehnology, Craow, Poland, Abstrat In this paper a methodology

More information

Robust Recovery of Signals From a Structured Union of Subspaces

Robust Recovery of Signals From a Structured Union of Subspaces Robust Reovery of Signals From a Strutured Union of Subspaes 1 Yonina C. Eldar, Senior Member, IEEE and Moshe Mishali, Student Member, IEEE arxiv:87.4581v2 [nlin.cg] 3 Mar 29 Abstrat Traditional sampling

More information

Likelihood-confidence intervals for quantiles in Extreme Value Distributions

Likelihood-confidence intervals for quantiles in Extreme Value Distributions Likelihood-onfidene intervals for quantiles in Extreme Value Distributions A. Bolívar, E. Díaz-Franés, J. Ortega, and E. Vilhis. Centro de Investigaión en Matemátias; A.P. 42, Guanajuato, Gto. 36; Méxio

More information

A simple expression for radial distribution functions of pure fluids and mixtures

A simple expression for radial distribution functions of pure fluids and mixtures A simple expression for radial distribution funtions of pure fluids and mixtures Enrio Matteoli a) Istituto di Chimia Quantistia ed Energetia Moleolare, CNR, Via Risorgimento, 35, 56126 Pisa, Italy G.

More information

Error Bounds for Context Reduction and Feature Omission

Error Bounds for Context Reduction and Feature Omission Error Bounds for Context Redution and Feature Omission Eugen Bek, Ralf Shlüter, Hermann Ney,2 Human Language Tehnology and Pattern Reognition, Computer Siene Department RWTH Aahen University, Ahornstr.

More information

Application of the Dyson-type boson mapping for low-lying electron excited states in molecules

Application of the Dyson-type boson mapping for low-lying electron excited states in molecules Prog. Theor. Exp. Phys. 05, 063I0 ( pages DOI: 0.093/ptep/ptv068 Appliation of the Dyson-type boson mapping for low-lying eletron exited states in moleules adao Ohkido, and Makoto Takahashi Teaher-training

More information

max min z i i=1 x j k s.t. j=1 x j j:i T j

max min z i i=1 x j k s.t. j=1 x j j:i T j AM 221: Advaned Optimization Spring 2016 Prof. Yaron Singer Leture 22 April 18th 1 Overview In this leture, we will study the pipage rounding tehnique whih is a deterministi rounding proedure that an be

More information

23.1 Tuning controllers, in the large view Quoting from Section 16.7:

23.1 Tuning controllers, in the large view Quoting from Section 16.7: Lesson 23. Tuning a real ontroller - modeling, proess identifiation, fine tuning 23.0 Context We have learned to view proesses as dynami systems, taking are to identify their input, intermediate, and output

More information

Assessing the Performance of a BCI: A Task-Oriented Approach

Assessing the Performance of a BCI: A Task-Oriented Approach Assessing the Performane of a BCI: A Task-Oriented Approah B. Dal Seno, L. Mainardi 2, M. Matteui Department of Eletronis and Information, IIT-Unit, Politenio di Milano, Italy 2 Department of Bioengineering,

More information

An I-Vector Backend for Speaker Verification

An I-Vector Backend for Speaker Verification An I-Vetor Bakend for Speaker Verifiation Patrik Kenny, 1 Themos Stafylakis, 1 Jahangir Alam, 1 and Marel Kokmann 2 1 CRIM, Canada, {patrik.kenny, themos.stafylakis, jahangir.alam}@rim.a 2 VoieTrust, Canada,

More information

UPPER-TRUNCATED POWER LAW DISTRIBUTIONS

UPPER-TRUNCATED POWER LAW DISTRIBUTIONS Fratals, Vol. 9, No. (00) 09 World Sientifi Publishing Company UPPER-TRUNCATED POWER LAW DISTRIBUTIONS STEPHEN M. BURROUGHS and SARAH F. TEBBENS College of Marine Siene, University of South Florida, St.

More information

Supplementary Materials

Supplementary Materials Supplementary Materials Neural population partitioning and a onurrent brain-mahine interfae for sequential motor funtion Maryam M. Shanehi, Rollin C. Hu, Marissa Powers, Gregory W. Wornell, Emery N. Brown

More information

A Queueing Model for Call Blending in Call Centers

A Queueing Model for Call Blending in Call Centers A Queueing Model for Call Blending in Call Centers Sandjai Bhulai and Ger Koole Vrije Universiteit Amsterdam Faulty of Sienes De Boelelaan 1081a 1081 HV Amsterdam The Netherlands E-mail: {sbhulai, koole}@s.vu.nl

More information

Chapter 8 Hypothesis Testing

Chapter 8 Hypothesis Testing Leture 5 for BST 63: Statistial Theory II Kui Zhang, Spring Chapter 8 Hypothesis Testing Setion 8 Introdution Definition 8 A hypothesis is a statement about a population parameter Definition 8 The two

More information

Einstein s Three Mistakes in Special Relativity Revealed. Copyright Joseph A. Rybczyk

Einstein s Three Mistakes in Special Relativity Revealed. Copyright Joseph A. Rybczyk Einstein s Three Mistakes in Speial Relativity Revealed Copyright Joseph A. Rybzyk Abstrat When the evidene supported priniples of eletromagneti propagation are properly applied, the derived theory is

More information

Average Rate Speed Scaling

Average Rate Speed Scaling Average Rate Speed Saling Nikhil Bansal David P. Bunde Ho-Leung Chan Kirk Pruhs May 2, 2008 Abstrat Speed saling is a power management tehnique that involves dynamially hanging the speed of a proessor.

More information

THE TWIN PARADOX A RELATIVISTIC DOMAIN RESOLUTION

THE TWIN PARADOX A RELATIVISTIC DOMAIN RESOLUTION THE TWIN PARADOX A RELATIVISTIC DOMAIN RESOLUTION Peter G.Bass P.G.Bass www.relativitydomains.om January 0 ABSTRACT This short paper shows that the so alled "Twin Paradox" of Speial Relativity, is in fat

More information

Non-Markovian study of the relativistic magnetic-dipole spontaneous emission process of hydrogen-like atoms

Non-Markovian study of the relativistic magnetic-dipole spontaneous emission process of hydrogen-like atoms NSTTUTE OF PHYSCS PUBLSHNG JOURNAL OF PHYSCS B: ATOMC, MOLECULAR AND OPTCAL PHYSCS J. Phys. B: At. Mol. Opt. Phys. 39 ) 7 85 doi:.88/953-75/39/8/ Non-Markovian study of the relativisti magneti-dipole spontaneous

More information

arxiv: v1 [physics.gen-ph] 5 Jan 2018

arxiv: v1 [physics.gen-ph] 5 Jan 2018 The Real Quaternion Relativity Viktor Ariel arxiv:1801.03393v1 [physis.gen-ph] 5 Jan 2018 In this work, we use real quaternions and the basi onept of the final speed of light in an attempt to enhane the

More information

Sensitivity Analysis in Markov Networks

Sensitivity Analysis in Markov Networks Sensitivity Analysis in Markov Networks Hei Chan and Adnan Darwihe Computer Siene Department University of California, Los Angeles Los Angeles, CA 90095 {hei,darwihe}@s.ula.edu Abstrat This paper explores

More information

Perturbation Analyses for the Cholesky Factorization with Backward Rounding Errors

Perturbation Analyses for the Cholesky Factorization with Backward Rounding Errors Perturbation Analyses for the holesky Fatorization with Bakward Rounding Errors Xiao-Wen hang Shool of omputer Siene, MGill University, Montreal, Quebe, anada, H3A A7 Abstrat. This paper gives perturbation

More information

arxiv:cond-mat/ v1 [cond-mat.stat-mech] 16 Aug 2004

arxiv:cond-mat/ v1 [cond-mat.stat-mech] 16 Aug 2004 Computational omplexity and fundamental limitations to fermioni quantum Monte Carlo simulations arxiv:ond-mat/0408370v1 [ond-mat.stat-meh] 16 Aug 2004 Matthias Troyer, 1 Uwe-Jens Wiese 2 1 Theoretishe

More information

REFINED UPPER BOUNDS FOR THE LINEAR DIOPHANTINE PROBLEM OF FROBENIUS. 1. Introduction

REFINED UPPER BOUNDS FOR THE LINEAR DIOPHANTINE PROBLEM OF FROBENIUS. 1. Introduction Version of 5/2/2003 To appear in Advanes in Applied Mathematis REFINED UPPER BOUNDS FOR THE LINEAR DIOPHANTINE PROBLEM OF FROBENIUS MATTHIAS BECK AND SHELEMYAHU ZACKS Abstrat We study the Frobenius problem:

More information

The Laws of Acceleration

The Laws of Acceleration The Laws of Aeleration The Relationships between Time, Veloity, and Rate of Aeleration Copyright 2001 Joseph A. Rybzyk Abstrat Presented is a theory in fundamental theoretial physis that establishes the

More information

arxiv: v2 [math.pr] 9 Dec 2016

arxiv: v2 [math.pr] 9 Dec 2016 Omnithermal Perfet Simulation for Multi-server Queues Stephen B. Connor 3th Deember 206 arxiv:60.0602v2 [math.pr] 9 De 206 Abstrat A number of perfet simulation algorithms for multi-server First Come First

More information

Wave Propagation through Random Media

Wave Propagation through Random Media Chapter 3. Wave Propagation through Random Media 3. Charateristis of Wave Behavior Sound propagation through random media is the entral part of this investigation. This hapter presents a frame of referene

More information

3 Tidal systems modelling: ASMITA model

3 Tidal systems modelling: ASMITA model 3 Tidal systems modelling: ASMITA model 3.1 Introdution For many pratial appliations, simulation and predition of oastal behaviour (morphologial development of shorefae, beahes and dunes) at a ertain level

More information

Symmetric Cryptanalytic Techniques. Sean Murphy ショーン マーフィー Royal Holloway

Symmetric Cryptanalytic Techniques. Sean Murphy ショーン マーフィー Royal Holloway Symmetric Cryptanalytic Techniques Sean Murphy ショーン マーフィー Royal Holloway Block Ciphers Encrypt blocks of data using a key Iterative process ( rounds ) Modified by Modes of Operation Data Encryption Standard

More information

Array Design for Superresolution Direction-Finding Algorithms

Array Design for Superresolution Direction-Finding Algorithms Array Design for Superresolution Diretion-Finding Algorithms Naushad Hussein Dowlut BEng, ACGI, AMIEE Athanassios Manikas PhD, DIC, AMIEE, MIEEE Department of Eletrial Eletroni Engineering Imperial College

More information

Modeling Probabilistic Measurement Correlations for Problem Determination in Large-Scale Distributed Systems

Modeling Probabilistic Measurement Correlations for Problem Determination in Large-Scale Distributed Systems 009 9th IEEE International Conferene on Distributed Computing Systems Modeling Probabilisti Measurement Correlations for Problem Determination in Large-Sale Distributed Systems Jing Gao Guofei Jiang Haifeng

More information

The Hanging Chain. John McCuan. January 19, 2006

The Hanging Chain. John McCuan. January 19, 2006 The Hanging Chain John MCuan January 19, 2006 1 Introdution We onsider a hain of length L attahed to two points (a, u a and (b, u b in the plane. It is assumed that the hain hangs in the plane under a

More information

The Concept of Mass as Interfering Photons, and the Originating Mechanism of Gravitation D.T. Froedge

The Concept of Mass as Interfering Photons, and the Originating Mechanism of Gravitation D.T. Froedge The Conept of Mass as Interfering Photons, and the Originating Mehanism of Gravitation D.T. Froedge V04 Formerly Auburn University Phys-dtfroedge@glasgow-ky.om Abstrat For most purposes in physis the onept

More information

LOGISTIC REGRESSION IN DEPRESSION CLASSIFICATION

LOGISTIC REGRESSION IN DEPRESSION CLASSIFICATION LOGISIC REGRESSIO I DEPRESSIO CLASSIFICAIO J. Kual,. V. ran, M. Bareš KSE, FJFI, CVU v Praze PCP, CS, 3LF UK v Praze Abstrat Well nown logisti regression and the other binary response models an be used

More information

DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS

DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS CHAPTER 4 DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS 4.1 INTRODUCTION Around the world, environmental and ost onsiousness are foring utilities to install

More information

Test of General Relativity Theory by Investigating the Conservation of Energy in a Relativistic Free Fall in the Uniform Gravitational Field

Test of General Relativity Theory by Investigating the Conservation of Energy in a Relativistic Free Fall in the Uniform Gravitational Field Test of General Relatiity Theory by Inestigating the Conseration of Energy in a Relatiisti Free Fall in the Uniform Graitational Field By Jarosla Hyneek 1 Abstrat: This paper inestigates the General Relatiity

More information

A NETWORK SIMPLEX ALGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM

A NETWORK SIMPLEX ALGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM NETWORK SIMPLEX LGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM Cen Çalışan, Utah Valley University, 800 W. University Parway, Orem, UT 84058, 801-863-6487, en.alisan@uvu.edu BSTRCT The minimum

More information

arxiv:gr-qc/ v2 6 Feb 2004

arxiv:gr-qc/ v2 6 Feb 2004 Hubble Red Shift and the Anomalous Aeleration of Pioneer 0 and arxiv:gr-q/0402024v2 6 Feb 2004 Kostadin Trenčevski Faulty of Natural Sienes and Mathematis, P.O.Box 62, 000 Skopje, Maedonia Abstrat It this

More information

22.54 Neutron Interactions and Applications (Spring 2004) Chapter 6 (2/24/04) Energy Transfer Kernel F(E E')

22.54 Neutron Interactions and Applications (Spring 2004) Chapter 6 (2/24/04) Energy Transfer Kernel F(E E') 22.54 Neutron Interations and Appliations (Spring 2004) Chapter 6 (2/24/04) Energy Transfer Kernel F(E E') Referenes -- J. R. Lamarsh, Introdution to Nulear Reator Theory (Addison-Wesley, Reading, 1966),

More information

Ordered fields and the ultrafilter theorem

Ordered fields and the ultrafilter theorem F U N D A M E N T A MATHEMATICAE 59 (999) Ordered fields and the ultrafilter theorem by R. B e r r (Dortmund), F. D e l o n (Paris) and J. S h m i d (Dortmund) Abstrat. We prove that on the basis of ZF

More information

UTC. Engineering 329. Proportional Controller Design. Speed System. John Beverly. Green Team. John Beverly Keith Skiles John Barker.

UTC. Engineering 329. Proportional Controller Design. Speed System. John Beverly. Green Team. John Beverly Keith Skiles John Barker. UTC Engineering 329 Proportional Controller Design for Speed System By John Beverly Green Team John Beverly Keith Skiles John Barker 24 Mar 2006 Introdution This experiment is intended test the variable

More information

Integration of the Finite Toda Lattice with Complex-Valued Initial Data

Integration of the Finite Toda Lattice with Complex-Valued Initial Data Integration of the Finite Toda Lattie with Complex-Valued Initial Data Aydin Huseynov* and Gusein Sh Guseinov** *Institute of Mathematis and Mehanis, Azerbaijan National Aademy of Sienes, AZ4 Baku, Azerbaijan

More information

On the Bit Error Probability of Noisy Channel Networks With Intermediate Node Encoding I. INTRODUCTION

On the Bit Error Probability of Noisy Channel Networks With Intermediate Node Encoding I. INTRODUCTION 5188 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 11, NOVEMBER 2008 [8] A. P. Dempster, N. M. Laird, and D. B. Rubin, Maximum likelihood estimation from inomplete data via the EM algorithm, J.

More information

The gravitational phenomena without the curved spacetime

The gravitational phenomena without the curved spacetime The gravitational phenomena without the urved spaetime Mirosław J. Kubiak Abstrat: In this paper was presented a desription of the gravitational phenomena in the new medium, different than the urved spaetime,

More information

RESEARCH ON RANDOM FOURIER WAVE-NUMBER SPECTRUM OF FLUCTUATING WIND SPEED

RESEARCH ON RANDOM FOURIER WAVE-NUMBER SPECTRUM OF FLUCTUATING WIND SPEED The Seventh Asia-Paifi Conferene on Wind Engineering, November 8-1, 9, Taipei, Taiwan RESEARCH ON RANDOM FORIER WAVE-NMBER SPECTRM OF FLCTATING WIND SPEED Qi Yan 1, Jie Li 1 Ph D. andidate, Department

More information

7 Max-Flow Problems. Business Computing and Operations Research 608

7 Max-Flow Problems. Business Computing and Operations Research 608 7 Max-Flow Problems Business Computing and Operations Researh 68 7. Max-Flow Problems In what follows, we onsider a somewhat modified problem onstellation Instead of osts of transmission, vetor now indiates

More information

The universal model of error of active power measuring channel

The universal model of error of active power measuring channel 7 th Symposium EKO TC 4 3 rd Symposium EKO TC 9 and 5 th WADC Workshop nstrumentation for the CT Era Sept. 8-2 Kosie Slovakia The universal model of error of ative power measuring hannel Boris Stogny Evgeny

More information

Gluing Potential Energy Surfaces with Rare Event Simulations

Gluing Potential Energy Surfaces with Rare Event Simulations This is an open aess artile published under an ACS AuthorChoie Liense, whih permits opying and redistribution of the artile or any adaptations for non-ommerial purposes. pubs.as.org/jctc Gluing Potential

More information

CONDITIONAL CONFIDENCE INTERVAL FOR THE SCALE PARAMETER OF A WEIBULL DISTRIBUTION. Smail Mahdi

CONDITIONAL CONFIDENCE INTERVAL FOR THE SCALE PARAMETER OF A WEIBULL DISTRIBUTION. Smail Mahdi Serdia Math. J. 30 (2004), 55 70 CONDITIONAL CONFIDENCE INTERVAL FOR THE SCALE PARAMETER OF A WEIBULL DISTRIBUTION Smail Mahdi Communiated by N. M. Yanev Abstrat. A two-sided onditional onfidene interval

More information

An Adaptive Optimization Approach to Active Cancellation of Repeated Transient Vibration Disturbances

An Adaptive Optimization Approach to Active Cancellation of Repeated Transient Vibration Disturbances An aptive Optimization Approah to Ative Canellation of Repeated Transient Vibration Disturbanes David L. Bowen RH Lyon Corp / Aenteh, 33 Moulton St., Cambridge, MA 138, U.S.A., owen@lyonorp.om J. Gregory

More information

Wavetech, LLC. Ultrafast Pulses and GVD. John O Hara Created: Dec. 6, 2013

Wavetech, LLC. Ultrafast Pulses and GVD. John O Hara Created: Dec. 6, 2013 Ultrafast Pulses and GVD John O Hara Created: De. 6, 3 Introdution This doument overs the basi onepts of group veloity dispersion (GVD) and ultrafast pulse propagation in an optial fiber. Neessarily, it

More information

Analysis of discretization in the direct simulation Monte Carlo

Analysis of discretization in the direct simulation Monte Carlo PHYSICS OF FLUIDS VOLUME 1, UMBER 1 OCTOBER Analysis of disretization in the diret simulation Monte Carlo iolas G. Hadjionstantinou a) Department of Mehanial Engineering, Massahusetts Institute of Tehnology,

More information

Multi-version Coding for Consistent Distributed Storage of Correlated Data Updates

Multi-version Coding for Consistent Distributed Storage of Correlated Data Updates Multi-version Coding for Consistent Distributed Storage of Correlated Data Updates Ramy E. Ali and Vivek R. Cadambe 1 arxiv:1708.06042v1 [s.it] 21 Aug 2017 Abstrat Motivated by appliations of distributed

More information

Use of prior information in the form of interval constraints for the improved estimation of linear regression models with some missing responses

Use of prior information in the form of interval constraints for the improved estimation of linear regression models with some missing responses Journal of Statistial Planning and Inferene 136 (2006) 2430 2445 www.elsevier.om/loate/jspi Use of prior information in the form of interval onstraints for the improved estimation of linear regression

More information

Quantum secret sharing without entanglement

Quantum secret sharing without entanglement Quantum seret sharing without entanglement Guo-Ping Guo, Guang-Can Guo Key Laboratory of Quantum Information, University of Siene and Tehnology of China, Chinese Aademy of Sienes, Hefei, Anhui, P.R.China,

More information

arxiv:physics/ v1 [physics.class-ph] 8 Aug 2003

arxiv:physics/ v1 [physics.class-ph] 8 Aug 2003 arxiv:physis/0308036v1 [physis.lass-ph] 8 Aug 003 On the meaning of Lorentz ovariane Lszl E. Szab Theoretial Physis Researh Group of the Hungarian Aademy of Sienes Department of History and Philosophy

More information

JAST 2015 M.U.C. Women s College, Burdwan ISSN a peer reviewed multidisciplinary research journal Vol.-01, Issue- 01

JAST 2015 M.U.C. Women s College, Burdwan ISSN a peer reviewed multidisciplinary research journal Vol.-01, Issue- 01 JAST 05 M.U.C. Women s College, Burdwan ISSN 395-353 -a peer reviewed multidisiplinary researh journal Vol.-0, Issue- 0 On Type II Fuzzy Parameterized Soft Sets Pinaki Majumdar Department of Mathematis,

More information

A Spatiotemporal Approach to Passive Sound Source Localization

A Spatiotemporal Approach to Passive Sound Source Localization A Spatiotemporal Approah Passive Sound Soure Loalization Pasi Pertilä, Mikko Parviainen, Teemu Korhonen and Ari Visa Institute of Signal Proessing Tampere University of Tehnology, P.O.Box 553, FIN-330,

More information

The ESO method revisited

The ESO method revisited Noname manusript No. (will be inserted by the editor) The ESO method revisited Kazem Ghabraie the date of reeipt and aeptane should be inserted later Abstrat This paper examines the evolutionary strutural

More information

Nonreversibility of Multiple Unicast Networks

Nonreversibility of Multiple Unicast Networks Nonreversibility of Multiple Uniast Networks Randall Dougherty and Kenneth Zeger September 27, 2005 Abstrat We prove that for any finite direted ayli network, there exists a orresponding multiple uniast

More information

Counting Idempotent Relations

Counting Idempotent Relations Counting Idempotent Relations Beriht-Nr. 2008-15 Florian Kammüller ISSN 1436-9915 2 Abstrat This artile introdues and motivates idempotent relations. It summarizes haraterizations of idempotents and their

More information

A Functional Representation of Fuzzy Preferences

A Functional Representation of Fuzzy Preferences Theoretial Eonomis Letters, 017, 7, 13- http://wwwsirporg/journal/tel ISSN Online: 16-086 ISSN Print: 16-078 A Funtional Representation of Fuzzy Preferenes Susheng Wang Department of Eonomis, Hong Kong

More information

Singular Event Detection

Singular Event Detection Singular Event Detetion Rafael S. Garía Eletrial Engineering University of Puerto Rio at Mayagüez Rafael.Garia@ee.uprm.edu Faulty Mentor: S. Shankar Sastry Researh Supervisor: Jonathan Sprinkle Graduate

More information

Remark 4.1 Unlike Lyapunov theorems, LaSalle s theorem does not require the function V ( x ) to be positive definite.

Remark 4.1 Unlike Lyapunov theorems, LaSalle s theorem does not require the function V ( x ) to be positive definite. Leture Remark 4.1 Unlike Lyapunov theorems, LaSalle s theorem does not require the funtion V ( x ) to be positive definite. ost often, our interest will be to show that x( t) as t. For that we will need

More information

Probabilistic Graphical Models

Probabilistic Graphical Models Probabilisti Graphial Models David Sontag New York University Leture 12, April 19, 2012 Aknowledgement: Partially based on slides by Eri Xing at CMU and Andrew MCallum at UMass Amherst David Sontag (NYU)

More information

Taste for variety and optimum product diversity in an open economy

Taste for variety and optimum product diversity in an open economy Taste for variety and optimum produt diversity in an open eonomy Javier Coto-Martínez City University Paul Levine University of Surrey Otober 0, 005 María D.C. Garía-Alonso University of Kent Abstrat We

More information

Computer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1

Computer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1 Computer Siene 786S - Statistial Methods in Natural Language Proessing and Data Analysis Page 1 Hypothesis Testing A statistial hypothesis is a statement about the nature of the distribution of a random

More information

Improvements in the Modeling of the Self-ignition of Tetrafluoroethylene

Improvements in the Modeling of the Self-ignition of Tetrafluoroethylene Exerpt from the Proeedings of the OMSOL onferene 010 Paris Improvements in the Modeling of the Self-ignition of Tetrafluoroethylene M. Bekmann-Kluge 1 *,. errero 1, V. Shröder 1, A. Aikalin and J. Steinbah

More information

Advanced Computational Fluid Dynamics AA215A Lecture 4

Advanced Computational Fluid Dynamics AA215A Lecture 4 Advaned Computational Fluid Dynamis AA5A Leture 4 Antony Jameson Winter Quarter,, Stanford, CA Abstrat Leture 4 overs analysis of the equations of gas dynamis Contents Analysis of the equations of gas

More information

Privately Constraining and Programming PRFs, the LWE Way

Privately Constraining and Programming PRFs, the LWE Way Privately Constraining and Programming PRFs, the LWE Way Chris Peikert Sina Shiehian January 10, 2018 Abstrat Constrained pseudorandom funtions allow for delegating onstrained seret keys that let one ompute

More information

LECTURE NOTES FOR , FALL 2004

LECTURE NOTES FOR , FALL 2004 LECTURE NOTES FOR 18.155, FALL 2004 83 12. Cone support and wavefront set In disussing the singular support of a tempered distibution above, notie that singsupp(u) = only implies that u C (R n ), not as

More information

A Characterization of Wavelet Convergence in Sobolev Spaces

A Characterization of Wavelet Convergence in Sobolev Spaces A Charaterization of Wavelet Convergene in Sobolev Spaes Mark A. Kon 1 oston University Louise Arakelian Raphael Howard University Dediated to Prof. Robert Carroll on the oasion of his 70th birthday. Abstrat

More information

On scaling laws at the phase transition of systems with divergent order parameter and/or internal length : the example of DNA denaturation

On scaling laws at the phase transition of systems with divergent order parameter and/or internal length : the example of DNA denaturation On saling laws at the phase transition of systems with divergent order parameter and/or internal length : the example of DNA denaturation Sahin BUYUKDAGLI and Mar JOYEUX (a) Laboratoire de Spetrométrie

More information

UNCERTAINTY RELATIONS AS A CONSEQUENCE OF THE LORENTZ TRANSFORMATIONS. V. N. Matveev and O. V. Matvejev

UNCERTAINTY RELATIONS AS A CONSEQUENCE OF THE LORENTZ TRANSFORMATIONS. V. N. Matveev and O. V. Matvejev UNCERTAINTY RELATIONS AS A CONSEQUENCE OF THE LORENTZ TRANSFORMATIONS V. N. Matveev and O. V. Matvejev Joint-Stok Company Sinerta Savanoriu pr., 159, Vilnius, LT-315, Lithuania E-mail: matwad@mail.ru Abstrat

More information

Advances in Radio Science

Advances in Radio Science Advanes in adio Siene 2003) 1: 99 104 Copernius GmbH 2003 Advanes in adio Siene A hybrid method ombining the FDTD and a time domain boundary-integral equation marhing-on-in-time algorithm A Beker and V

More information

Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting

Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting Better Seurity for Deterministi Publi-Key Enryption: The Auxiliary-Input Setting Zvika Brakerski Gil Segev Abstrat Deterministi publi-key enryption, introdued by Bellare, Boldyreva, and O Neill CRYPTO

More information

Predicting the confirmation time of Bitcoin transactions

Predicting the confirmation time of Bitcoin transactions Prediting the onfirmation time of Bitoin transations D.T. Koops Korteweg-de Vries Institute, University of Amsterdam arxiv:189.1596v1 [s.dc] 21 Sep 218 September 28, 218 Abstrat We study the probabilisti

More information

Breakdown of the Special Theory of Relativity as Proven by Synchronization of Clocks

Breakdown of the Special Theory of Relativity as Proven by Synchronization of Clocks Breakdown of the Speial Theory of Relativity as Proven by Synhronization of Cloks Koshun Suto Koshun_suto19@mbr.nifty.om Abstrat In this paper, a hypothetial preferred frame of referene is presumed, and

More information

Scalable Positivity Preserving Model Reduction Using Linear Energy Functions

Scalable Positivity Preserving Model Reduction Using Linear Energy Functions Salable Positivity Preserving Model Redution Using Linear Energy Funtions Sootla, Aivar; Rantzer, Anders Published in: IEEE 51st Annual Conferene on Deision and Control (CDC), 2012 DOI: 10.1109/CDC.2012.6427032

More information

Determination of the reaction order

Determination of the reaction order 5/7/07 A quote of the wee (or amel of the wee): Apply yourself. Get all the eduation you an, but then... do something. Don't just stand there, mae it happen. Lee Iaoa Physial Chemistry GTM/5 reation order

More information

IMPEDANCE EFFECTS OF LEFT TURNERS FROM THE MAJOR STREET AT A TWSC INTERSECTION

IMPEDANCE EFFECTS OF LEFT TURNERS FROM THE MAJOR STREET AT A TWSC INTERSECTION 09-1289 Citation: Brilon, W. (2009): Impedane Effets of Left Turners from the Major Street at A TWSC Intersetion. Transportation Researh Reord Nr. 2130, pp. 2-8 IMPEDANCE EFFECTS OF LEFT TURNERS FROM THE

More information

Multicomponent analysis on polluted waters by means of an electronic tongue

Multicomponent analysis on polluted waters by means of an electronic tongue Sensors and Atuators B 44 (1997) 423 428 Multiomponent analysis on polluted waters by means of an eletroni tongue C. Di Natale a, *, A. Maagnano a, F. Davide a, A. D Amio a, A. Legin b, Y. Vlasov b, A.

More information

Probabilistic and nondeterministic aspects of Anonymity 1

Probabilistic and nondeterministic aspects of Anonymity 1 MFPS XX1 Preliminary Version Probabilisti and nondeterministi aspets of Anonymity 1 Catusia Palamidessi 2 INRIA and LIX Éole Polytehnique, Rue de Salay, 91128 Palaiseau Cedex, FRANCE Abstrat Anonymity

More information

General solution to a higher-order linear difference equation and existence of bounded solutions

General solution to a higher-order linear difference equation and existence of bounded solutions Stević Advanes in Differene Equations 2017 2017:377 DOI 101186/s13662-017-1432-7 R E S E A R C H Open Aess General solution to a higher-order linear differene equation and existene of bounded solutions

More information

Lightpath routing for maximum reliability in optical mesh networks

Lightpath routing for maximum reliability in optical mesh networks Vol. 7, No. 5 / May 2008 / JOURNAL OF OPTICAL NETWORKING 449 Lightpath routing for maximum reliability in optial mesh networks Shengli Yuan, 1, * Saket Varma, 2 and Jason P. Jue 2 1 Department of Computer

More information

Reliability Guaranteed Energy-Aware Frame-Based Task Set Execution Strategy for Hard Real-Time Systems

Reliability Guaranteed Energy-Aware Frame-Based Task Set Execution Strategy for Hard Real-Time Systems Reliability Guaranteed Energy-Aware Frame-Based ask Set Exeution Strategy for Hard Real-ime Systems Zheng Li a, Li Wang a, Shuhui Li a, Shangping Ren a, Gang Quan b a Illinois Institute of ehnology, Chiago,

More information

QCLAS Sensor for Purity Monitoring in Medical Gas Supply Lines

QCLAS Sensor for Purity Monitoring in Medical Gas Supply Lines DOI.56/sensoren6/P3. QLAS Sensor for Purity Monitoring in Medial Gas Supply Lines Henrik Zimmermann, Mathias Wiese, Alessandro Ragnoni neoplas ontrol GmbH, Walther-Rathenau-Str. 49a, 7489 Greifswald, Germany

More information

Seismic dip estimation based on the two-dimensional Hilbert transform and its application in random noise attenuation a

Seismic dip estimation based on the two-dimensional Hilbert transform and its application in random noise attenuation a Seismi dip estimation based on the two-dimensional Hilbert transform and its appliation in random noise attenuation a a Published in Applied Geophysis, 1, 55-63 (Marh 015) Cai Liu, Changle Chen, Dian Wang,

More information

FNSN 2 - Chapter 11 Searches and limits

FNSN 2 - Chapter 11 Searches and limits FS 2 - Chapter 11 Searhes and limits Paolo Bagnaia last mod. 19-May-17 11 Searhes and limits 1. Probability 2. Searhes and limits 3. Limits 4. Maximum likelihood 5. Interpretation of results methods ommonly

More information

Measuring & Inducing Neural Activity Using Extracellular Fields I: Inverse systems approach

Measuring & Inducing Neural Activity Using Extracellular Fields I: Inverse systems approach Measuring & Induing Neural Ativity Using Extraellular Fields I: Inverse systems approah Keith Dillon Department of Eletrial and Computer Engineering University of California San Diego 9500 Gilman Dr. La

More information

Relativity in Classical Physics

Relativity in Classical Physics Relativity in Classial Physis Main Points Introdution Galilean (Newtonian) Relativity Relativity & Eletromagnetism Mihelson-Morley Experiment Introdution The theory of relativity deals with the study of

More information