Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix

Size: px
Start display at page:

Download "Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix"

Transcription

1 Proceedings of the 5th WSEAS Internationa Conference on Signa Processing, Istanbu, Turkey, May 27-29, 2006 (pp70-75) Geometric Invariant Semi-fragie Image Watermarking Using Rea Symmetric Matrix Ching-Tang Hsieh, and Yeh-Kuang Wu Dep. of Eectrica Engineering, Tamkang University, Taipei, Taiwan, 25137, R.O.C. Abstract: - In order to improve the detection of maicious tampering images, it necessary to decrease the fragiity of hidden watermarks, even for digita images which have been incidentay dtorted. In th paper, we propose a new invariant semi-fragie digita watermarking technique based on eigenvaues and eigenvectors of rea symmetric matrix generated by the four pixe pairs. A signature bit for detecting the maicious tampering of an image generated using the dominant eigenvector. And the muti-rings Zernike transform (MRZT) proposed to achieve geometric invariance. The MRZT method to the geometric dtortions even when the image under maicious attacks. Experimenta resuts show that th agorithm can rest high quaity JPEG compression, and improve the detection performance of various maicious tampering. Key-Words: fragie watermarking, Eigenvaue, Geometric invariance, Zernike moment 1 Introduction Due to advances in digita technoogies, most data are digitized and can be easiy copied or edited. Such situation hinders popuarization of digita technoogies. Image watermarking provides a soution for protecting the copyright of digita contents. Many watermarks for sti images and video content are sensitive to geometric dtortions. It cear that even very sma geometric dtortions can prevent the detection of watermarks. However, the geometric dtortion of the digita image, such as rotation and scaing, can be inverted with ossess of the image intensity. The desired geometric invariance can be achieved by using the FMT (fourier meien transform) to convert rotation and scae to spatia shifts. A og-poar transform converts rotation and scaing to spatia shifts, and permits recovery from rotation and scaing. O Ruanaidh et a. first have outined the theory of integra transform invariants and showed that are restant to rotation, scaing, and transation. However, the og-poar mapping used in th technique causes a oss of image quaity and the quaity definitey unacceptabe. Of various types of moments defined in the iteratures, Zernike moments have been shown to be superior to the others in terms of their insensitivity to image noe, information content, and abiity to provide faithfu image representation, used as the invariant watermarking [16]-[20]. Some invariant watermark schemes proposed with embedding methods based on the Zernike transform coefficients to achieve the geometric invariance, but the geometric invariance methods restricted to the proposed watermarking, not suitabe for a watermark embedding schemes [16]-[19]. Chen [20] proposed a geometric invariance watermarking based on waveet and Zernike transform where the embedding system independent to geometric invariance method. But the geometric invariance method not robust to more than two maicious attacks, such as rotation and cropping combining as a severey maicious attack. Fragie digita watermarking essentia for addressing the probem of data integrity, but most fragie digita watermarks are very fragie even for sight atering. It cannot rest any processing even some vaid processing such as high quaity JPEG compression (ossy compression) and not suitabe for factua appication. Some of semi-fragie digita watermarking [1][3][4][5] has been brought forward and researched. Typica approaches of semi-fragie digita watermarking can be categorized as signaturebased or watermark-based or a combination of both. Kundur and Hatzinakos [1] embedded a watermark vaue by moduating a seected waveet coefficient into the quantized interva determined by the corresponding watermark vaue. However, they didnot provide a mechanm to detect the combination of maicious tampering and incident dtortion. Lin

2 Proceedings of the 5th WSEAS Internationa Conference on Signa Processing, Istanbu, Turkey, May 27-29, 2006 (pp70-75) and Chang [3] stores the reation of DCT coefficients at a pairs of two random 8x8 bocks as digita signature. Their method can detect maicious tampering under JPEG compression, but the digita signature based method cannot point out tampering regions ceary or some specia tampers, such as those with background changed to pure white, and cannot be used for muti-watermarks system [6]. Fridrich[8] proposed a muti-watermarking system by embedding fragie watermarks on top of robust watermarks. The fragie watermarks detect a the tampers, and the robust watermarks can dtinguh maicious and innocuous changes in the images. The method makes a vauabe too for authentication of images and detection of a types of tamperings. In th paper, we propose a new semi-fragie digita watermarking technoogy based on the dominant eigenvaue and its corresponding eigenvector of rea symmetric matrix, the proposed method abbreviated as EVRSM. Because of the orthogona property of rea symmetric matrix, we combine both superiority of watermark-based and signature-based semi-fragie watermarking technoogy for image authentication in our method to improve the performance of maicious tampering and aso rest high quaity JPEG compression processing. The proposed watermarking system a geometric invariance system based on the proposed muti-rings Zernike transform that robust to geometric attacks even when the image under maicious or innocuous attacks. The MRZT reduce the accumuation of the attacked coefficients in the Zernike transform and avoid maiciousy attacked components. In section 2, we wi describe the proposed muti-rings Zernike transform. And the new semi-fragie watermarking shown in section 3. Section 4 describes how to embed and extract the digita watermark and anayze the deta of semi-fragie digita watermarking technique. The experimenta resuts and the evauation of the proposed agorithm are presented in section 5. Finay, in section 6, we wi make a concusion. 2 Muti-rings Zernike transform Zernike transform the mapping of an image onto a set of compex poynomias that have the rotation invariant charactertics. The rotation invariance of the feature vectors aows the feature set, the magnitude of the Zernike moments extracted from the image, to be the same at any orientation. Let the set of these poynomias be denoted by V(x,y) : V ( x, y) = V ( ρ, θ) = R ( ρ) exp( jmθ ) where R( ) the radia poynomia defined as : R ( ρ ) ( n m ) ( 1 ) / 2 ( n s ) s = s = 0 n + m s! 2 n m s! 2! s! (1) (2) n 0, n- m even, and m n. the ength of vector from origin to pixe at (x,y). the ange between vector and X ax in countercockwe direction. Unfortunatey, the moment based methods require too much computation for practica purposes and are sensitive to noe, such as cropping and compression. In th paper, we proposed a nove fast rotation and scae variance method, muti-rings Zernike transform, consting of two stages. In the first stage the image divided into 11 co-centric rings and the moments are computed based on these co-centric rings. Secondy, the candidates of the non-attacked bocks are seected by K-means method according to the density dtribution. The muti-rings method can avoid the regions with maicious attacks, ighten the dtortion from stattics of the attacked pixes and be suitabe for any watermark scheme. The image I divided into m sub-rings. I = { I1 I2 I3... Im } (3) After the partition, the moment of ring computed according to (3). For each sub-image, the origina of host image instead of the center. n + 1 * A = f, π x y ( x, y ) V ( x y ) Assume that the th sub-bock image denoted by f ( ρ,θ ), α the ange of the rotation. The rotated image denoted by f ( ρ,θ ) r. The magnitudes of Zernike moments are invariant to rotation, and scae and transation normaizations are required to achieve simiarity. The reationship between the origina image and the rotated in poar coordination : f r A ( ρ θ ) = f ( ρ, θ α ) r = A exp( jmα ), (4) (5) The geometric dtortions of image, such as rotation and scaing, can be inverted that the intensity of the images unchanged. According to above section, 11 estimated rotation anges candidates with different radius are computed consted of coefficients interfered with and without maicious tampers. The custering widey performed by an iterative agorithm that known as the crp c-means agorithm. The crp c-means agorithm assigns each feature vector to a singe custer and was adopted to separate two custers, concentrated and dtributed ones. The

3 P and and and Proceedings of the 5th WSEAS Internationa Conference on Signa Processing, Istanbu, Turkey, May 27-29, 2006 (pp70-75) agorithm performs a partition for each eement in the feature space to c custer and c centers of the custers are generated. In the iterature, c equa to 2. The iterative processes continuous ti the custer center become stabe and there insignificant difference between custer centers in two consecutive iterations. One of the c custers wi be seected that the variance in th custer smaer than other ones. 3 Eigenvector and eigenvaue of rea symmetric matrix 4 Proposed watermarking method 4.1 Embedding agorithm Given an image, we divide it into severa bocks of 8x8 pixes. Each bock transformed with Dcrete Cosine Transform (DCT). We divide frequency domain into DC part and AC part, that, the DCTBDC_VaueB of DCT coefficients beongs to DC part and the DCTBAC_VaueB of DCT coefficients beong to AC part. In Eq.(7), the quantized DCTBDCB coefficient was integer rounding operation by dividing into the eigenvaue Each DCTBACB coefficient divided into the fixed quantization tabe BiB. The quantization functions BλB beow: λ DCT DC = λ = DCT _ Vaue AC _ Vaue BvB are defined V The rea symmetric matrix R defined by i (8) R = A T A λ dominant eigenvaue and BiB (8) fixed A = [ a xy ] x, y = 1,2... k 1, quantization tabe. the foor function. if f p ( i, f q ( i, + B ij 0 a xy = i, j = 0,1,.., n 1 In order to avoid the noe and artifact in JPEG m if f p ( i, f q ( i, + B ij < 0 (6) compression, Kunder et a. [1] proposed the k n T watermarking to reduce the noe competey, but where AP the transpose of matrix A, f Bp B(i, and significant information may be ignored by the f Bq B(i, are the DCT coefficients of the bock p and q, constant quantization. According to the above respectivey, and B B Bi random bias. f B Bp f Bq Bare reasoning, an adaptive quantization mode seected at the same frequency in different incorporating the eigenvaue of the rea symmetric non-overap bock. The vaues of seected bock p matrix as the quantization tabe. The adaptive and q are cose and wi be served as a secret key. k quantization tabe determined according to the the dimension of the matrix. The experimenta significance of the host image. If the watermarked resuts wi not ocate off the origina point since the image atered with maicious tampering, The random bias B B Bi added to the f B Bp f B Bq [4]. watermarking method robust, since the The argest eigenvaues are caed dominant quantization tabe wi change according to the eigenvaues and their corresponding eigenvectors maicious tampered image. are caed dominant eigenvectors. The dominant The watermark-based embedding function eigenvector with the main direction ocated in the DCTBDC_VaueB and the signature based embedding first quadrant and the rest eigenvectors are ocated in function DCTBAC_VaueB are given in Eq.(9) and the four quadrant. λ and its corresponding dominant Eq.(10), respectivey. W a binary sequence. The r eigenvector of the rea symmetric matrix R wi be checked to embed one bit at the pair of bocks. If r, evauated. Then we cacuate. For eigenvector [c, defined in Eq.(11), equa to the watermark T d]p P, the direction θ of the dominant eigenvector sequence W, the DCT coefficient remain defined by unchanged. On the other hand, the DCT coefficient wi be represented by Eq.(9) and Eq.(10) θ = tan 1 ( c d ) o where 0 θ 90. o DCT DCT ' DC. Vaue ' AC, Vaue 0 r = 1 ( λ 1) λ, if r W and λ 0 = ( λ + 1) λ, if r W and λ < 0 ( v 1) i, if r 0, r 1 and v 0 = ( v + 1) i, if r 0,r 1 and v < 0, if, if even odd (7) (9) (10) (11) The watermark 0 or 1 dependent on the decion of parameter r for the signature-based embedding function. The vaue of parameter r defined as foows. The vaue of signature bit compared with the watermarks at the procedure of the signature-based

4 Proceedings of the 5th WSEAS Internationa Conference on Signa Processing, Istanbu, Turkey, May 27-29, 2006 (pp70-75) embedding system. If they are different, the embedding system described by (9) and (10). The embedding agorithm approached as foows. a. The origina image transformed by the 8x8 bock DCT. b. We use Eq.(9) to embed watermark (W). c. We determine the corresponding signature bits of θ and embed the signature bits of θ by Eq.(10). d. Through the IDCT, we can obtain the watermarked image. The procedures of watermarks and signature bits extractions are simiar as the embedding method. The vaue of r, defined in Eq.(10), shoud be equa to the vaue of the watermark sequence W and signature bit θ from the watermarked image without any attacks. We embed the watermark to DC part and embed the signature bits, generating by the direction θ of eigenvector to the AC part. Even that θ changed, the embedding signature bits wi not be changed. If we change eigenvaue λ, the extracted watermarked image wi be changed. Thus we can detect maicious tampering of image even the image have aso been incidentay dtorted. 5. Experimenta resuts We use the Lenna, Baboon, Pepper and a natura image as the test images in our experiments with 256 * 256 pixes. And the size of digita watermark 32x32 pixes and the watermark a binary sequence in 0 s and 1 s. We embed the watermark with the mask of 8*8 pixes. The MRZT method proposed to achieve the rotation and scaing invariance and the robustness for maicious or innocuous attack simutaneousy. The framework suitabe for a kinds of watermark system. Tabe.1 shows the estimating anges when the watermarked image under quite genera kinds of manipuation with 30 degree rotating. The estimation process in Zernike transform quite sensitive to image manipuation and the error of the estimating rotation degree huge. And the estimating rotation degree by the proposed muti-ring Zernike moment method more accurate than the norma Zernike transform. During data transmsion, more than one maicious attack usua occurs. However, recenty proposed watermarking systems with geometrica invariance can not resove th probem. The MRZT method with simpe and ess computation can rest doube attacks and have the property of geometric invariance. The conception of muti-ring framework and candidate seection process reduce the accumuation of the attacked coefficients in the Zernike transform and avoid maiciousy attacked components. Fig. 1 shows the resut of digita watermarking on Lenna image by the proposed watermark embedding system. The PSNR vaue of watermarked image given in Tabe 2. Tabe.3 tabuates the bit error rate of the watermarked image compression with JPEG. We can extract the whoe watermarks when JPEG quaity 70. Some bit errors wi occur under the JPEG quaity beow 60. In Tabe.5, the vaue of PSNR given by Lin s method simiar to ours, and it s difficut to dtinguh between the two methods with subjective human eyes. But in Tabe.5, it obivious that the bit error rate of the watermark detecting using our method ess than the Lin s one. In the simuations of image authentication, we take two experiments in our simuations. One simuation gives the image authentication of the artificia manipuations. And the other one the image processing manipuations. We present the efficiency of authentication with some quite genera kinds of image processing manipuations as foows. (A). Deete (B). Deete Background textures (C). Add a ine drawing (D). Deete (E). Paste another contents (F). Desaturate (G). Change Hue (H). Deete (I). Move (J). Repace by computer generated texts (K). Deete ight coored contents (L). Add Foot (M). Skew (N). Copy The authenticated resuts for image processing manipuations are shown in Fig.2. Fig.2(a) the natura image with the fragie watermarks, and the modified image by the manipuations shown in Fig.2(b). The abes in the modified image, Fig.2(b), mark the manipuations mentioned at the above section. Fig2(c) the simuated image of image authentication with the proposed image, and Fig.2(d) the simuated image of image authentication using Lin s method. (a) Fig.1 (a) Origina Lenna image. (b) Watermarked Lenna image. (b)

5 Proceedings of the 5th WSEAS Internationa Conference on Signa Processing, Istanbu, Turkey, May 27-29, 2006 (pp70-75) Tabe.1 The estimating ange by Zernike transform and proposed muti-ring Zernike transform. Zernike Transform Muti-Ring Zernike Transform Estimating ange ( degree ) Noe JPEG Pinch Burring Sharpening Mosaic Twir Tabe.2 PSNR vaue with different dimension of the rea symmetric matrix. PSNR Lenna Baboon Peppers 2x x Fig2 (a) Watermarked natura image. (b) Modified natura image. (c) Modified areas are detected by proposed method. (d) Modified areas are detected by Lin [3] method. Tabe. 3 Bit error rate of the watermarked image under different quaity of JPEG compression. JPEG uaity Lenna Baboon Peppers Tabe.4 PSNR vaue of watermarked image. PSNR Lenna Baboon Peppers Proposed method Lin [3] method Concusion In th paper, we successfuy put forward a semi-fragie digita watermark based on the eigvenvectors and eigenvaues of rea symmetric matrix. The muti-ring Zernike moment proposed to be robust to the geometric dtortions with maicious attacks. The experimenta resuts show that th agorithm can rest high quaity JPEG compression, avoid the maicious attacks and detect the maicious tampering correcty. In the proposed method, we can choose a good resut for bit error rate after the JPEG compression robustness and maicious tampering detection. References: [1] Deepa Kundur and Dimitrios Hatzinakos, Digita Watermarking for Tetae Tamper Proofing and Authentication, Proceedings of IEEE, Vo. 87, No.7, 1999, pp [2] Eugene T.Lin and Edward J.Dep, A Review of Fragie Image Watermarks, Proceedings of the Mutimedia and Security Workshop, 1999, pp [3] C.-Y. Lin and S.-F. Chang, Semi-fragie watermarking for authenticating JPEG vua content, Proceeding of the SPIE, Security and Watermarking of Mutimedia Contents, 2000, pp [4] K. Maeno,. Sun, S-F Chang, M. Suto, New Semi-fragie Image Authentication Watermarking Techniques Using Random Bias and Non-Uniform uantization, Proceeding of the SPIE, Security and Watermarking of Mutimedia Contents, 2002, pp [5]Yuichi Nakai, Mutivaued Semi Fragie Watermarking Proceeding of the SPIE, Security and Watermarking of Mutimedia Contents, 2002, pp [6] C.S. Lu, L.Y. Liao, Mutipurpose watermarking for image authentication and protection IEEE Trans. on image Processing, Vo. 10, 2001, pp [7]. Sun, S.-F. Chang, K. Maeno and M. Suto, A new semi-fragie imageauthentication framework combining ECC and PKI infrastructures,

6 Proceedings of the 5th WSEAS Internationa Conference on Signa Processing, Istanbu, Turkey, May 27-29, 2006 (pp70-75) Proceedings of the IEEE Circuits and Systems, 2002, pp [8] J. Fridrich, A hybrid watermark for tamper detection in digita images, in Proceedings of the Signa Processing and Its Appications, 1999, pp [9] P. W. Wong, A Pubic key watermark for image verification and authentication, Proceedings of the ICIP, Vo.2, 1998, pp [10] D. Coppersmith, F. Mintzer, C. Tresser, C-W. Wu, and M. M. Yeung, Fragie imperceptibe digita watermark with privacy contro Proceedings SPIE, Security and Watermarking of Mutimedia Contents, San Jose, Caifornia, 1999, pp [11] J. Dittmann, A. Steietz, and R. Steietz, Content-based digita signature for motion pictures authentication and content-fragie watermarking, Proceedings of IEEE Mutimedia Computing and Systems, Vo.2, 1999, pp [12] R. B. Wofgang and E. J. Dep, Fragie Watermarking Using the VW2D Watermark, Proceedings of SPIE, Security and Watermarking of Mutimedia Contents, 1999, pp [13] P. Yin and H. H. Yu, A semi-fragie watermarking system for MPEG video authentication, Proceedings of IEEE ICASSP, 2002, pp [14] T. Chen, J. Wang and Y. Zhou, Combined Digita Signature and Digita Watermark Scheme for Image Authentication, 2001, pp [15] G.J. Yu, C.S. Lu, H.Y. M. Liao and J.P. Sheu, Mean quantization bind watermarking for image authentication, Proceedings of Image Processing, 2000, pp [16] H. S. Kim, H. K. Lee, Invariant image watermark using Zernike moments, IEEE Transactions on Circuits and Systems for Video Technoogy, 2003, pp [17] Y. Xin; S. Liao.; M. Pawak; A mutibit geometricay robust image watermark based on Zernike moments, in Proceedings of Pattern Recognition, 2004, pp [18] H. Liu; J. Lin; J. Huang;; Image authentication using content based watermark, in Proceedings of Circuits and Systems, IEEE, 2005, pp [19] Farzam, M., Shirani, S., A robust mutimedia watermarking technique using Zernike transform, Proceedings of Mutimedia Signa Processing, IEEE, 2004, pp [20] J. Chen, H. Yao, W. Gao, S. Liu, A robust watermarking method based on waveet and Zernike transform, Proceedings of Circuits and Systems, 2004, pp

Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix

Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix Tamkang Journal of Science and Engineering, Vol. 10, No. 3, pp. 211220 (2007) 211 Geometric Invariant Semi-fragile Image Watermarking Using Real Symmetric Matrix Ching-Tang Hsieh 1 *, Yeh-Kuang Wu 1 and

More information

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai

More information

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron Neura Information Processing - Letters and Reviews Vo. 5, No. 2, November 2004 LETTER A Soution to the 4-bit Parity Probem with a Singe Quaternary Neuron Tohru Nitta Nationa Institute of Advanced Industria

More information

Fast and Automatic Watermark Resynchronization based on Zernike. Moments

Fast and Automatic Watermark Resynchronization based on Zernike. Moments Fast and Automatic Watermark Resynchronization based on Zernike Moments Xiangui Kang a, Chunhui Liu a, Wenjun Zeng b, Jiwu Huang a, Congbai Liu a a Dept. of ECE., Sun Yat-Sen Univ. (Zhongshan Univ.), Guangzhou

More information

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network

More information

FRST Multivariate Statistics. Multivariate Discriminant Analysis (MDA)

FRST Multivariate Statistics. Multivariate Discriminant Analysis (MDA) 1 FRST 531 -- Mutivariate Statistics Mutivariate Discriminant Anaysis (MDA) Purpose: 1. To predict which group (Y) an observation beongs to based on the characteristics of p predictor (X) variabes, using

More information

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance Send Orders for Reprints to reprints@benthamscience.ae 340 The Open Cybernetics & Systemics Journa, 015, 9, 340-344 Open Access Research of Data Fusion Method of Muti-Sensor Based on Correation Coefficient

More information

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c) A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,

More information

Study on Fusion Algorithm of Multi-source Image Based on Sensor and Computer Image Processing Technology

Study on Fusion Algorithm of Multi-source Image Based on Sensor and Computer Image Processing Technology Sensors & Transducers 3 by IFSA http://www.sensorsporta.com Study on Fusion Agorithm of Muti-source Image Based on Sensor and Computer Image Processing Technoogy Yao NAN, Wang KAISHENG, 3 Yu JIN The Information

More information

The influence of temperature of photovoltaic modules on performance of solar power plant

The influence of temperature of photovoltaic modules on performance of solar power plant IOSR Journa of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vo. 05, Issue 04 (Apri. 2015), V1 PP 09-15 www.iosrjen.org The infuence of temperature of photovotaic modues on performance

More information

Melodic contour estimation with B-spline models using a MDL criterion

Melodic contour estimation with B-spline models using a MDL criterion Meodic contour estimation with B-spine modes using a MDL criterion Damien Loive, Ney Barbot, Oivier Boeffard IRISA / University of Rennes 1 - ENSSAT 6 rue de Kerampont, B.P. 80518, F-305 Lannion Cedex

More information

DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM

DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM MIKAEL NILSSON, MATTIAS DAHL AND INGVAR CLAESSON Bekinge Institute of Technoogy Department of Teecommunications and Signa Processing

More information

High-order approximations to the Mie series for electromagnetic scattering in three dimensions

High-order approximations to the Mie series for electromagnetic scattering in three dimensions Proceedings of the 9th WSEAS Internationa Conference on Appied Mathematics Istanbu Turkey May 27-29 2006 (pp199-204) High-order approximations to the Mie series for eectromagnetic scattering in three dimensions

More information

Problem set 6 The Perron Frobenius theorem.

Problem set 6 The Perron Frobenius theorem. Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator

More information

Some Measures for Asymmetry of Distributions

Some Measures for Asymmetry of Distributions Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester

More information

Haar Decomposition and Reconstruction Algorithms

Haar Decomposition and Reconstruction Algorithms Jim Lambers MAT 773 Fa Semester 018-19 Lecture 15 and 16 Notes These notes correspond to Sections 4.3 and 4.4 in the text. Haar Decomposition and Reconstruction Agorithms Decomposition Suppose we approximate

More information

(This is a sample cover image for this issue. The actual cover is not yet available at this time.)

(This is a sample cover image for this issue. The actual cover is not yet available at this time.) (This is a sampe cover image for this issue The actua cover is not yet avaiabe at this time) This artice appeared in a journa pubished by Esevier The attached copy is furnished to the author for interna

More information

A Novel Learning Method for Elman Neural Network Using Local Search

A Novel Learning Method for Elman Neural Network Using Local Search Neura Information Processing Letters and Reviews Vo. 11, No. 8, August 2007 LETTER A Nove Learning Method for Eman Neura Networ Using Loca Search Facuty of Engineering, Toyama University, Gofuu 3190 Toyama

More information

Related Topics Maxwell s equations, electrical eddy field, magnetic field of coils, coil, magnetic flux, induced voltage

Related Topics Maxwell s equations, electrical eddy field, magnetic field of coils, coil, magnetic flux, induced voltage Magnetic induction TEP Reated Topics Maxwe s equations, eectrica eddy fied, magnetic fied of cois, coi, magnetic fux, induced votage Principe A magnetic fied of variabe frequency and varying strength is

More information

Gauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law

Gauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law Gauss Law 1. Review on 1) Couomb s Law (charge and force) 2) Eectric Fied (fied and force) 2. Gauss s Law: connects charge and fied 3. Appications of Gauss s Law Couomb s Law and Eectric Fied Couomb s

More information

Approach to Identifying Raindrop Vibration Signal Detected by Optical Fiber

Approach to Identifying Raindrop Vibration Signal Detected by Optical Fiber Sensors & Transducers, o. 6, Issue, December 3, pp. 85-9 Sensors & Transducers 3 by IFSA http://www.sensorsporta.com Approach to Identifying Raindrop ibration Signa Detected by Optica Fiber ongquan QU,

More information

Lecture Note 3: Stationary Iterative Methods

Lecture Note 3: Stationary Iterative Methods MATH 5330: Computationa Methods of Linear Agebra Lecture Note 3: Stationary Iterative Methods Xianyi Zeng Department of Mathematica Sciences, UTEP Stationary Iterative Methods The Gaussian eimination (or

More information

Target Location Estimation in Wireless Sensor Networks Using Binary Data

Target Location Estimation in Wireless Sensor Networks Using Binary Data Target Location stimation in Wireess Sensor Networks Using Binary Data Ruixin Niu and Pramod K. Varshney Department of ectrica ngineering and Computer Science Link Ha Syracuse University Syracuse, NY 344

More information

General Certificate of Education Advanced Level Examination June 2010

General Certificate of Education Advanced Level Examination June 2010 Genera Certificate of Education Advanced Leve Examination June 2010 Human Bioogy HBI6T/Q10/task Unit 6T A2 Investigative Skis Assignment Task Sheet The effect of using one or two eyes on the perception

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

BP neural network-based sports performance prediction model applied research

BP neural network-based sports performance prediction model applied research Avaiabe onine www.jocpr.com Journa of Chemica and Pharmaceutica Research, 204, 6(7:93-936 Research Artice ISSN : 0975-7384 CODEN(USA : JCPRC5 BP neura networ-based sports performance prediction mode appied

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

arxiv: v3 [math.sp] 2 Nov 2017

arxiv: v3 [math.sp] 2 Nov 2017 A Fast Agorithm for Computing the Fourier Spectrum of a Fractiona Period arxiv:1604.01589v3 [math.sp] 2 Nov 2017 Jiasong Wang 1, Changchuan Yin 2, 1.Department of Mathematics, Nanjing University, Nanjing,

More information

Numerical Simulation for Optimizing Temperature Gradients during Single Crystal Casting Process

Numerical Simulation for Optimizing Temperature Gradients during Single Crystal Casting Process ISIJ Internationa Vo 54 (2014) No 2 pp 254 258 Numerica Simuation for Optimizing Temperature Gradients during Singe Crysta Casting Process Aeksandr Aeksandrovich INOZEMTSEV 1) Aeksandra Sergeevna DUBROVSKAYA

More information

A Robust Voice Activity Detection based on Noise Eigenspace Projection

A Robust Voice Activity Detection based on Noise Eigenspace Projection A Robust Voice Activity Detection based on Noise Eigenspace Projection Dongwen Ying 1, Yu Shi 2, Frank Soong 2, Jianwu Dang 1, and Xugang Lu 1 1 Japan Advanced Institute of Science and Technoogy, Nomi

More information

12.2. Maxima and Minima. Introduction. Prerequisites. Learning Outcomes

12.2. Maxima and Minima. Introduction. Prerequisites. Learning Outcomes Maima and Minima 1. Introduction In this Section we anayse curves in the oca neighbourhood of a stationary point and, from this anaysis, deduce necessary conditions satisfied by oca maima and oca minima.

More information

Algorithms to solve massively under-defined systems of multivariate quadratic equations

Algorithms to solve massively under-defined systems of multivariate quadratic equations Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations

More information

$, (2.1) n="# #. (2.2)

$, (2.1) n=# #. (2.2) Chapter. Eectrostatic II Notes: Most of the materia presented in this chapter is taken from Jackson, Chap.,, and 4, and Di Bartoo, Chap... Mathematica Considerations.. The Fourier series and the Fourier

More information

Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1

Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1 Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rues 1 R.J. Marks II, S. Oh, P. Arabshahi Λ, T.P. Caude, J.J. Choi, B.G. Song Λ Λ Dept. of Eectrica Engineering Boeing Computer Services University

More information

C. Fourier Sine Series Overview

C. Fourier Sine Series Overview 12 PHILIP D. LOEWEN C. Fourier Sine Series Overview Let some constant > be given. The symboic form of the FSS Eigenvaue probem combines an ordinary differentia equation (ODE) on the interva (, ) with a

More information

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is

More information

HYDROGEN ATOM SELECTION RULES TRANSITION RATES

HYDROGEN ATOM SELECTION RULES TRANSITION RATES DOING PHYSICS WITH MATLAB QUANTUM PHYSICS Ian Cooper Schoo of Physics, University of Sydney ian.cooper@sydney.edu.au HYDROGEN ATOM SELECTION RULES TRANSITION RATES DOWNLOAD DIRECTORY FOR MATLAB SCRIPTS

More information

Wavelet Packet Based Digital Image Watermarking

Wavelet Packet Based Digital Image Watermarking Wavelet Packet Based Digital Image ing A.Adhipathi Reddy, B.N.Chatterji Department of Electronics and Electrical Communication Engg. Indian Institute of Technology, Kharagpur 72 32 {aar, bnc}@ece.iitkgp.ernet.in

More information

Symbolic models for nonlinear control systems using approximate bisimulation

Symbolic models for nonlinear control systems using approximate bisimulation Symboic modes for noninear contro systems using approximate bisimuation Giordano Poa, Antoine Girard and Pauo Tabuada Abstract Contro systems are usuay modeed by differentia equations describing how physica

More information

Identification of macro and micro parameters in solidification model

Identification of macro and micro parameters in solidification model BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vo. 55, No. 1, 27 Identification of macro and micro parameters in soidification mode B. MOCHNACKI 1 and E. MAJCHRZAK 2,1 1 Czestochowa University

More information

Simplified analysis of EXAFS data and determination of bond lengths

Simplified analysis of EXAFS data and determination of bond lengths Indian Journa of Pure & Appied Physics Vo. 49, January 0, pp. 5-9 Simpified anaysis of EXAFS data and determination of bond engths A Mishra, N Parsai & B D Shrivastava * Schoo of Physics, Devi Ahiya University,

More information

2M2. Fourier Series Prof Bill Lionheart

2M2. Fourier Series Prof Bill Lionheart M. Fourier Series Prof Bi Lionheart 1. The Fourier series of the periodic function f(x) with period has the form f(x) = a 0 + ( a n cos πnx + b n sin πnx ). Here the rea numbers a n, b n are caed the Fourier

More information

BALANCING REGULAR MATRIX PENCILS

BALANCING REGULAR MATRIX PENCILS BALANCING REGULAR MATRIX PENCILS DAMIEN LEMONNIER AND PAUL VAN DOOREN Abstract. In this paper we present a new diagona baancing technique for reguar matrix pencis λb A, which aims at reducing the sensitivity

More information

Unconditional security of differential phase shift quantum key distribution

Unconditional security of differential phase shift quantum key distribution Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice

More information

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity

More information

Theory and implementation behind: Universal surface creation - smallest unitcell

Theory and implementation behind: Universal surface creation - smallest unitcell Teory and impementation beind: Universa surface creation - smaest unitce Bjare Brin Buus, Jaob Howat & Tomas Bigaard September 15, 218 1 Construction of surface sabs Te aim for tis part of te project is

More information

DYNAMIC RESPONSE OF CIRCULAR FOOTINGS ON SATURATED POROELASTIC HALFSPACE

DYNAMIC RESPONSE OF CIRCULAR FOOTINGS ON SATURATED POROELASTIC HALFSPACE 3 th Word Conference on Earthquake Engineering Vancouver, B.C., Canada August -6, 4 Paper No. 38 DYNAMIC RESPONSE OF CIRCULAR FOOTINGS ON SATURATED POROELASTIC HALFSPACE Bo JIN SUMMARY The dynamic responses

More information

FREQUENCY modulated differential chaos shift key (FM-

FREQUENCY modulated differential chaos shift key (FM- Accepted in IEEE 83rd Vehicuar Technoogy Conference VTC, 16 1 SNR Estimation for FM-DCS System over Mutipath Rayeigh Fading Channes Guofa Cai, in Wang, ong ong, Georges addoum Dept. of Communication Engineering,

More information

MATRIX CONDITIONING AND MINIMAX ESTIMATIO~ George Casella Biometrics Unit, Cornell University, Ithaca, N.Y. Abstract

MATRIX CONDITIONING AND MINIMAX ESTIMATIO~ George Casella Biometrics Unit, Cornell University, Ithaca, N.Y. Abstract MATRIX CONDITIONING AND MINIMAX ESTIMATIO~ George Casea Biometrics Unit, Corne University, Ithaca, N.Y. BU-732-Mf March 98 Abstract Most of the research concerning ridge regression methods has deat with

More information

Wavelet Galerkin Solution for Boundary Value Problems

Wavelet Galerkin Solution for Boundary Value Problems Internationa Journa of Engineering Research and Deveopment e-issn: 2278-67X, p-issn: 2278-8X, www.ijerd.com Voume, Issue 5 (May 24), PP.2-3 Waveet Gaerkin Soution for Boundary Vaue Probems D. Pate, M.K.

More information

CONCHOID OF NICOMEDES AND LIMACON OF PASCAL AS ELECTRODE OF STATIC FIELD AND AS WAVEGUIDE OF HIGH FREQUENCY WAVE

CONCHOID OF NICOMEDES AND LIMACON OF PASCAL AS ELECTRODE OF STATIC FIELD AND AS WAVEGUIDE OF HIGH FREQUENCY WAVE Progress In Eectromagnetics Research, PIER 30, 73 84, 001 CONCHOID OF NICOMEDES AND LIMACON OF PASCAL AS ELECTRODE OF STATIC FIELD AND AS WAVEGUIDE OF HIGH FREQUENCY WAVE W. Lin and Z. Yu University of

More information

AALBORG UNIVERSITY. The distribution of communication cost for a mobile service scenario. Jesper Møller and Man Lung Yiu. R June 2009

AALBORG UNIVERSITY. The distribution of communication cost for a mobile service scenario. Jesper Møller and Man Lung Yiu. R June 2009 AALBORG UNIVERSITY The distribution of communication cost for a mobie service scenario by Jesper Møer and Man Lung Yiu R-29-11 June 29 Department of Mathematica Sciences Aaborg University Fredrik Bajers

More information

THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE

THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE KATIE L. MAY AND MELISSA A. MITCHELL Abstract. We show how to identify the minima path network connecting three fixed points on

More information

Introduction to Simulation - Lecture 13. Convergence of Multistep Methods. Jacob White. Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy

Introduction to Simulation - Lecture 13. Convergence of Multistep Methods. Jacob White. Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy Introduction to Simuation - Lecture 13 Convergence of Mutistep Methods Jacob White Thans to Deepa Ramaswamy, Micha Rewiensi, and Karen Veroy Outine Sma Timestep issues for Mutistep Methods Loca truncation

More information

Higher dimensional PDEs and multidimensional eigenvalue problems

Higher dimensional PDEs and multidimensional eigenvalue problems Higher dimensiona PEs and mutidimensiona eigenvaue probems 1 Probems with three independent variabes Consider the prototypica equations u t = u (iffusion) u tt = u (W ave) u zz = u (Lapace) where u = u

More information

A proposed nonparametric mixture density estimation using B-spline functions

A proposed nonparametric mixture density estimation using B-spline functions A proposed nonparametric mixture density estimation using B-spine functions Atizez Hadrich a,b, Mourad Zribi a, Afif Masmoudi b a Laboratoire d Informatique Signa et Image de a Côte d Opae (LISIC-EA 4491),

More information

8 Digifl'.11 Cth:uits and devices

8 Digifl'.11 Cth:uits and devices 8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,

More information

Adjustment of automatic control systems of production facilities at coal processing plants using multivariant physico- mathematical models

Adjustment of automatic control systems of production facilities at coal processing plants using multivariant physico- mathematical models IO Conference Series: Earth and Environmenta Science AER OEN ACCESS Adjustment of automatic contro systems of production faciities at coa processing pants using mutivariant physico- mathematica modes To

More information

Numerical solution of one dimensional contaminant transport equation with variable coefficient (temporal) by using Haar wavelet

Numerical solution of one dimensional contaminant transport equation with variable coefficient (temporal) by using Haar wavelet Goba Journa of Pure and Appied Mathematics. ISSN 973-1768 Voume 1, Number (16), pp. 183-19 Research India Pubications http://www.ripubication.com Numerica soution of one dimensiona contaminant transport

More information

TM Electromagnetic Scattering from 2D Multilayered Dielectric Bodies Numerical Solution

TM Electromagnetic Scattering from 2D Multilayered Dielectric Bodies Numerical Solution TM Eectromagnetic Scattering from D Mutiayered Dieectric Bodies Numerica Soution F. Seydou,, R. Duraiswami, N.A. Gumerov & T. Seppänen. Department of Eectrica and Information Engineering University of

More information

Soft Clustering on Graphs

Soft Clustering on Graphs Soft Custering on Graphs Kai Yu 1, Shipeng Yu 2, Voker Tresp 1 1 Siemens AG, Corporate Technoogy 2 Institute for Computer Science, University of Munich kai.yu@siemens.com, voker.tresp@siemens.com spyu@dbs.informatik.uni-muenchen.de

More information

A simple reliability block diagram method for safety integrity verification

A simple reliability block diagram method for safety integrity verification Reiabiity Engineering and System Safety 92 (2007) 1267 1273 www.esevier.com/ocate/ress A simpe reiabiity bock diagram method for safety integrity verification Haitao Guo, Xianhui Yang epartment of Automation,

More information

Construction of Supersaturated Design with Large Number of Factors by the Complementary Design Method

Construction of Supersaturated Design with Large Number of Factors by the Complementary Design Method Acta Mathematicae Appicatae Sinica, Engish Series Vo. 29, No. 2 (2013) 253 262 DOI: 10.1007/s10255-013-0214-6 http://www.appmath.com.cn & www.springerlink.com Acta Mathema cae Appicatae Sinica, Engish

More information

Minimizing Total Weighted Completion Time on Uniform Machines with Unbounded Batch

Minimizing Total Weighted Completion Time on Uniform Machines with Unbounded Batch The Eighth Internationa Symposium on Operations Research and Its Appications (ISORA 09) Zhangiaie, China, September 20 22, 2009 Copyright 2009 ORSC & APORC, pp. 402 408 Minimizing Tota Weighted Competion

More information

FFTs in Graphics and Vision. Spherical Convolution and Axial Symmetry Detection

FFTs in Graphics and Vision. Spherical Convolution and Axial Symmetry Detection FFTs in Graphics and Vision Spherica Convoution and Axia Symmetry Detection Outine Math Review Symmetry Genera Convoution Spherica Convoution Axia Symmetry Detection Math Review Symmetry: Given a unitary

More information

Course 2BA1, Section 11: Periodic Functions and Fourier Series

Course 2BA1, Section 11: Periodic Functions and Fourier Series Course BA, 8 9 Section : Periodic Functions and Fourier Series David R. Wikins Copyright c David R. Wikins 9 Contents Periodic Functions and Fourier Series 74. Fourier Series of Even and Odd Functions...........

More information

arxiv: v1 [quant-ph] 23 Jun 2017

arxiv: v1 [quant-ph] 23 Jun 2017 A generic construction of quantum-obivious-key-transfer-based private query with idea database security and zero faiure Chun-Yan Wei 1,2, Xiao-Qiu Cai 2, Bin Liu 3, Tian-Yin Wang 1, and Fei Gao 2 1 Coege

More information

DISTRIBUTION OF TEMPERATURE IN A SPATIALLY ONE- DIMENSIONAL OBJECT AS A RESULT OF THE ACTIVE POINT SOURCE

DISTRIBUTION OF TEMPERATURE IN A SPATIALLY ONE- DIMENSIONAL OBJECT AS A RESULT OF THE ACTIVE POINT SOURCE DISTRIBUTION OF TEMPERATURE IN A SPATIALLY ONE- DIMENSIONAL OBJECT AS A RESULT OF THE ACTIVE POINT SOURCE Yury Iyushin and Anton Mokeev Saint-Petersburg Mining University, Vasiievsky Isand, 1 st ine, Saint-Petersburg,

More information

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient

More information

Appendix A: MATLAB commands for neural networks

Appendix A: MATLAB commands for neural networks Appendix A: MATLAB commands for neura networks 132 Appendix A: MATLAB commands for neura networks p=importdata('pn.xs'); t=importdata('tn.xs'); [pn,meanp,stdp,tn,meant,stdt]=prestd(p,t); for m=1:10 net=newff(minmax(pn),[m,1],{'tansig','purein'},'trainm');

More information

Minimum Enclosing Circle of a Set of Fixed Points and a Mobile Point

Minimum Enclosing Circle of a Set of Fixed Points and a Mobile Point Minimum Encosing Circe of a Set of Fixed Points and a Mobie Point Aritra Banik 1, Bhaswar B. Bhattacharya 2, and Sandip Das 1 1 Advanced Computing and Microeectronics Unit, Indian Statistica Institute,

More information

Separation of Variables and a Spherical Shell with Surface Charge

Separation of Variables and a Spherical Shell with Surface Charge Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation

More information

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems Convergence Property of the Iri-Imai Agorithm for Some Smooth Convex Programming Probems S. Zhang Communicated by Z.Q. Luo Assistant Professor, Department of Econometrics, University of Groningen, Groningen,

More information

A Comparison Study of the Test for Right Censored and Grouped Data

A Comparison Study of the Test for Right Censored and Grouped Data Communications for Statistica Appications and Methods 2015, Vo. 22, No. 4, 313 320 DOI: http://dx.doi.org/10.5351/csam.2015.22.4.313 Print ISSN 2287-7843 / Onine ISSN 2383-4757 A Comparison Study of the

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

SHEARLET-BASED INVERSE HALFTONING

SHEARLET-BASED INVERSE HALFTONING Journa of Theoretica and Appied Information Technoog 3 st March 3. Vo. 49 No.3 5-3 JATIT & LLS. A rights reserved. ISSN: 99-8645 www.atit.org E-ISSN: 87-395 SHEARLET-BASED INVERSE HALFTONING CHENGZHI DENG,

More information

Mode in Output Participation Factors for Linear Systems

Mode in Output Participation Factors for Linear Systems 2010 American ontro onference Marriott Waterfront, Batimore, MD, USA June 30-Juy 02, 2010 WeB05.5 Mode in Output Participation Factors for Linear Systems Li Sheng, yad H. Abed, Munther A. Hassouneh, Huizhong

More information

Theory of Generalized k-difference Operator and Its Application in Number Theory

Theory of Generalized k-difference Operator and Its Application in Number Theory Internationa Journa of Mathematica Anaysis Vo. 9, 2015, no. 19, 955-964 HIKARI Ltd, www.m-hiari.com http://dx.doi.org/10.12988/ijma.2015.5389 Theory of Generaized -Difference Operator and Its Appication

More information

The EM Algorithm applied to determining new limit points of Mahler measures

The EM Algorithm applied to determining new limit points of Mahler measures Contro and Cybernetics vo. 39 (2010) No. 4 The EM Agorithm appied to determining new imit points of Maher measures by Souad E Otmani, Georges Rhin and Jean-Marc Sac-Épée Université Pau Veraine-Metz, LMAM,

More information

A unified framework for Regularization Networks and Support Vector Machines. Theodoros Evgeniou, Massimiliano Pontil, Tomaso Poggio

A unified framework for Regularization Networks and Support Vector Machines. Theodoros Evgeniou, Massimiliano Pontil, Tomaso Poggio MASSACHUSETTS INSTITUTE OF TECHNOLOGY ARTIFICIAL INTELLIGENCE LABORATORY and CENTER FOR BIOLOGICAL AND COMPUTATIONAL LEARNING DEPARTMENT OF BRAIN AND COGNITIVE SCIENCES A.I. Memo No. 1654 March23, 1999

More information

Keywords: Rayleigh scattering, Mie scattering, Aerosols, Lidar, Lidar equation

Keywords: Rayleigh scattering, Mie scattering, Aerosols, Lidar, Lidar equation CEReS Atmospheric Report, Vo., pp.9- (007 Moecuar and aeroso scattering process in reation to idar observations Hiroaki Kue Center for Environmenta Remote Sensing Chiba University -33 Yayoi-cho, Inage-ku,

More information

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems Source and Reay Matrices Optimization for Mutiuser Muti-Hop MIMO Reay Systems Yue Rong Department of Eectrica and Computer Engineering, Curtin University, Bentey, WA 6102, Austraia Abstract In this paper,

More information

Physics 127c: Statistical Mechanics. Fermi Liquid Theory: Collective Modes. Boltzmann Equation. The quasiparticle energy including interactions

Physics 127c: Statistical Mechanics. Fermi Liquid Theory: Collective Modes. Boltzmann Equation. The quasiparticle energy including interactions Physics 27c: Statistica Mechanics Fermi Liquid Theory: Coective Modes Botzmann Equation The quasipartice energy incuding interactions ε p,σ = ε p + f(p, p ; σ, σ )δn p,σ, () p,σ with ε p ε F + v F (p p

More information

Determining The Degree of Generalization Using An Incremental Learning Algorithm

Determining The Degree of Generalization Using An Incremental Learning Algorithm Determining The Degree of Generaization Using An Incrementa Learning Agorithm Pabo Zegers Facutad de Ingeniería, Universidad de os Andes San Caros de Apoquindo 22, Las Condes, Santiago, Chie pzegers@uandes.c

More information

Formulas for Angular-Momentum Barrier Factors Version II

Formulas for Angular-Momentum Barrier Factors Version II BNL PREPRINT BNL-QGS-06-101 brfactor1.tex Formuas for Anguar-Momentum Barrier Factors Version II S. U. Chung Physics Department, Brookhaven Nationa Laboratory, Upton, NY 11973 March 19, 2015 abstract A

More information

1D Heat Propagation Problems

1D Heat Propagation Problems Chapter 1 1D Heat Propagation Probems If the ambient space of the heat conduction has ony one dimension, the Fourier equation reduces to the foowing for an homogeneous body cρ T t = T λ 2 + Q, 1.1) x2

More information

A MODEL FOR ESTIMATING THE LATERAL OVERLAP PROBABILITY OF AIRCRAFT WITH RNP ALERTING CAPABILITY IN PARALLEL RNAV ROUTES

A MODEL FOR ESTIMATING THE LATERAL OVERLAP PROBABILITY OF AIRCRAFT WITH RNP ALERTING CAPABILITY IN PARALLEL RNAV ROUTES 6 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES A MODEL FOR ESTIMATING THE LATERAL OVERLAP PROBABILITY OF AIRCRAFT WITH RNP ALERTING CAPABILITY IN PARALLEL RNAV ROUTES Sakae NAGAOKA* *Eectronic

More information

In-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017

In-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017 In-pane shear stiffness of bare stee deck through she finite eement modes G. Bian, B.W. Schafer June 7 COLD-FORMED STEEL RESEARCH CONSORTIUM REPORT SERIES CFSRC R-7- SDII Stee Diaphragm Innovation Initiative

More information

Compression Ratio Expansion for Complementary Code Set Compressing a Signal to a Width of Several Sub-pulses

Compression Ratio Expansion for Complementary Code Set Compressing a Signal to a Width of Several Sub-pulses Compression Ratio Expansion for Compementary Code Set Compressing a Signa to a Width of Severa Sub-puses Reiji Sato 2nd Research Center, Technica R and D Institute Japan Defense Agency 1-2-24 Ikejiri,

More information

School of Electrical Engineering, University of Bath, Claverton Down, Bath BA2 7AY

School of Electrical Engineering, University of Bath, Claverton Down, Bath BA2 7AY The ogic of Booean matrices C. R. Edwards Schoo of Eectrica Engineering, Universit of Bath, Caverton Down, Bath BA2 7AY A Booean matrix agebra is described which enabes man ogica functions to be manipuated

More information

PHYS 110B - HW #1 Fall 2005, Solutions by David Pace Equations referenced as Eq. # are from Griffiths Problem statements are paraphrased

PHYS 110B - HW #1 Fall 2005, Solutions by David Pace Equations referenced as Eq. # are from Griffiths Problem statements are paraphrased PHYS 110B - HW #1 Fa 2005, Soutions by David Pace Equations referenced as Eq. # are from Griffiths Probem statements are paraphrased [1.] Probem 6.8 from Griffiths A ong cyinder has radius R and a magnetization

More information

Distributed average consensus: Beyond the realm of linearity

Distributed average consensus: Beyond the realm of linearity Distributed average consensus: Beyond the ream of inearity Usman A. Khan, Soummya Kar, and José M. F. Moura Department of Eectrica and Computer Engineering Carnegie Meon University 5 Forbes Ave, Pittsburgh,

More information

On Stretching Gaussian Noises with the Phase Vocoder

On Stretching Gaussian Noises with the Phase Vocoder On Stretching Gaussian oises with the Phase Vocoder Wei-Hsiang Liao, Axe Roebe, Avin Su To cite this version: Wei-Hsiang Liao, Axe Roebe, Avin Su. On Stretching Gaussian oises with the Phase Vocoder. Proc.

More information

Converting Z-number to Fuzzy Number using. Fuzzy Expected Value

Converting Z-number to Fuzzy Number using. Fuzzy Expected Value ISSN 1746-7659, Engand, UK Journa of Information and Computing Science Vo. 1, No. 4, 017, pp.91-303 Converting Z-number to Fuzzy Number using Fuzzy Expected Vaue Mahdieh Akhbari * Department of Industria

More information

Math 124B January 17, 2012

Math 124B January 17, 2012 Math 124B January 17, 212 Viktor Grigoryan 3 Fu Fourier series We saw in previous ectures how the Dirichet and Neumann boundary conditions ead to respectivey sine and cosine Fourier series of the initia

More information

ASummaryofGaussianProcesses Coryn A.L. Bailer-Jones

ASummaryofGaussianProcesses Coryn A.L. Bailer-Jones ASummaryofGaussianProcesses Coryn A.L. Baier-Jones Cavendish Laboratory University of Cambridge caj@mrao.cam.ac.uk Introduction A genera prediction probem can be posed as foows. We consider that the variabe

More information

School of Electrical Engineering, University of Bath, Claverton Down, Bath BA2 7AY

School of Electrical Engineering, University of Bath, Claverton Down, Bath BA2 7AY The ogic of Booean matrices C. R. Edwards Schoo of Eectrica Engineering, Universit of Bath, Caverton Down, Bath BA2 7AY A Booean matrix agebra is described which enabes man ogica functions to be manipuated

More information

MONTE CARLO SIMULATIONS

MONTE CARLO SIMULATIONS MONTE CARLO SIMULATIONS Current physics research 1) Theoretica 2) Experimenta 3) Computationa Monte Caro (MC) Method (1953) used to study 1) Discrete spin systems 2) Fuids 3) Poymers, membranes, soft matter

More information

arxiv: v1 [math.ca] 6 Mar 2017

arxiv: v1 [math.ca] 6 Mar 2017 Indefinite Integras of Spherica Besse Functions MIT-CTP/487 arxiv:703.0648v [math.ca] 6 Mar 07 Joyon K. Boomfied,, Stephen H. P. Face,, and Zander Moss, Center for Theoretica Physics, Laboratory for Nucear

More information

STABILITY OF A PARAMETRICALLY EXCITED DAMPED INVERTED PENDULUM 1. INTRODUCTION

STABILITY OF A PARAMETRICALLY EXCITED DAMPED INVERTED PENDULUM 1. INTRODUCTION Journa of Sound and Vibration (996) 98(5), 643 65 STABILITY OF A PARAMETRICALLY EXCITED DAMPED INVERTED PENDULUM G. ERDOS AND T. SINGH Department of Mechanica and Aerospace Engineering, SUNY at Buffao,

More information