Fractional Fourier Transform Based Key Exchange for Optical Asymmetric Key Cryptography

Size: px
Start display at page:

Download "Fractional Fourier Transform Based Key Exchange for Optical Asymmetric Key Cryptography"

Transcription

1 Fractioal Fourier Trasform ased Ke Echage for Optical Asmmetric Ke Crptograph ALOKA SINHA Departmet of Phsics Idia Istitute of Techolog Delhi Hauz Khas INDIA Abstract :- Recetl several optical ecrptio techiques have bee proposed for two-dimesioal data. These techiques use radom phase masks jigsaw trasforms digital sigatures ad liear trasforms like the Fourier trasforms the fractioal Fourier trasform ad the Fresel trasform. The stregth of these ecrptio techiques is depedet o the size of the ke but is strogl limited b the securit liked with the echage of the secret ke. We propose a ew techique based o the Diffie-Hellma protocol i which the ke ca be echaged with high securit. The Diffie-Hellma protocol allows two users to echage a secret ke over a isecure chael without a prior secrets. Fractioal Fourier trasforms have bee used for the secure ke trasfer. Results of computer simulatio are preseted to verif the proposed idea ad aalse the robustess of the proposed techique. Ke-words:- Fractioal Fourier Trasform Optical ecrptio Public ke ecrptio Diffie-Hellma protocol Fourier Trasform crptograph 1 Itroductio Iformatio securit is becomig more ad more importat with the progress i the echage of data for electroic commerce. Optical iformatio processig sstems have attracted a lot of attetio i recet times for iformatio ad data securit applicatios because of their iheret parallelism ad ver high processig speed. Recetl a umber of optical securit algorithms ad optical set ups have bee proposed [1-6]. Crptograph is the stud or sciece of secret writig ad a crptosstem is a sstem i which either iformatio is trasformed ito secret writig called ciphertet. Ciphertet is trasformed back to the origial iformatio called plai tet [7-9]. The trasformatio process just metioed is cotrolled b what is called a ke. Hece to trasform i either directio the correct ke is eeded. Simmos classifies crptosstems as either smmetric i.e. secret ke or asmmetric i.e. public ke. I a secret-ke crptosstem private coversatio betwee two persos is established b usig oe ke kow to both of them. This ke is used for trasformatio to cipher tet as well as trasformatio back to plai tet. A disadvatage of this scheme is the fact that the secrec of commuicatio depeds upo the trustworthiess or reliabilit of the two persos. Aother disadvatage is that i a multi-chael sceario oe has to keep a lot of kes secret to maitai private commuicatio with differet people. I a public ke crptosstem there eist two separate kes kow as the ecipherig ke ad the decipherig ke. These kes decipher i such a wa that kowig oe of the kes it is computatioall ifeasible to determie the other ke. This cocept was first itroduced i ISSN: Issue Volume 7 Februar 008

2 1976 b Diffie-Hellma i their semial paper [10]. The Diffie-Hellma ke agreemet protocol was developed b Diffie ad Hellma i 1976 [10]. The protocol allows two users to echage a secret ke over a isecure chael without a prior secrets. The protocol has two sstem parameters p ad g. The are both public ad ma be used b all the users i a sstem. Parameter p is a prime umber ad parameter g (usuall called a geerator is a iteger less tha p which is capable of geeratig ever elemet from 1 to p-1 whe multiplied b itself a certai umber of times modulo the prime p. A primar image ecrptio techique ivolves a process i which the primar image is ecoded with two radom phase masks. Oe mask is placed i the iput plae ad the other oe is placed i the spatial frequec plae. This is kow as the double radom phase ecodig sstem [1]. Fractioal Fourier trasforms (FRT are beig used etesivel i the field of optical securit [11]. Uikrisha et al. have used the radom phase masks i the fractioal Fourier domais to ecrpt the images []. Siha ad Sigh have proposed a ew techique to ecrpt a image b usig the digital sigature of the image [3]. A ew techique based o the jigsaw trasform has bee recetl proposed for image ecrptio [4]. Aother ew method of image ecrptio has bee proposed usig the radom phase mask ad the jigsaw ecrptio i the Fresel domai [5]. A lesless optical securit sstem based o the computer geerated phase ol masks has also bee proposed recetl [6]. All of these techiques deped o the securit of the secret ke which has to be trasmitted to the recipiet for the decrptio of the data. The iheret drawback of all these techiques is that the all require secure echage of kes. Thus however secure the ecrptio procedure mabe the are still susceptible to the ke beig itercepted durig the ke trasfer process. I this paper we propose a secure method to echage the secret kes (radom phase mask required for ecrptio. FRT has bee used to desig a algorithm for the trasfer of the ke usig the DH protocol [10]. Fractioal Fourier Trasform FRT is the geeralizatio of the covetioal Fourier trasform i the fractioal order [ 11]. The two-dimesioal FRT of a fuctio f( with a separable kerel ca be defied as F α α [ f ( ]( u v = Kα ( ; u v f ( dd α with the kerel where K α ad K ( u α α ( ; u v = Kα ( u Kα ( v = A ep [ iπ ( cot u csc + u cot ] δ ( u if α = π δ ( + u if α = ( + 1 π [ i( π sg( / 4 / ] si( ep A = (1 ( if α π (3 where α π / is the agle correspodig = to the trasform alog the -ais. The kerel alog the -ais Kα ( v ca be obtaied similarl b simpl substitutig for ad v for u respectivel. FRT will reduce to the covetioal Fourier trasform whe α = α = 1. 3 Proposed Techique I the proposed techique FRT together with the Diffie-Hellma protocol has bee used for ke echage over isecure chaels. Let us assume that two persos A ad wish to echage a secret ke. First the agree o a commo image (T to begi with. This startig image is kow publicl. Perso A secretl chooses two umbers A1 ad A that lie betwee (0 1. Similarl perso secretl chooses two umbers 1 ad that lie betwee (0 1. Perso A the ISSN: Issue Volume 7 Februar 008

3 WSEAS TRANSACTIONS o COMPUTERS ecrpts the image T usig the fractioal parameters { A1 A } to obtai ( ( A1 K A A T. (4 Similarl perso ecrpts the image T usig fractioal parameters { 1 } to obtai ( ( 1 K T. (5 A ad ow echage the ecoded images K A ad K over a isecure chael. Perso A ow takes the ecrpted image of perso ad further performs the FRT usig the secret parameters {A1 A } to obtai K A ( A1 A ( K ( A1 A ( 1 FRT FRT ( T = ( ( A1 + 1 A+ ( T. (6 Meawhile perso takes the ecrpted image of perso A ad performs the FRT usig his secret parameters { 1 } to obtai K A ( 1 ( K A ( 1 ( A1 A FRT FRT ( T = ( ( 1 + A1 + A ( T. (7 From (6 ad (7 it ca be see that K A = K A i.e. perso A ad perso have echaged their ke secretl. The echaged secret ke is K A = K A which is ot kow to a eavesdropper listeig i o the isecure chael. The method of echage of the secret ke is highl secure because the echaged secret ke is ukow to either part i.e. perso A or perso prior to the start of the echage procedure. It gets geerated i the process of ke echage. The actual value of the secret ke (radom phase mask depeds o the radom parameters { A1 A } chose b perso A ad the radom parameters { 1 } chose b perso idepedetl. 4 Simulatio Results Computer simulatios have bee doe i support of the proposed techique. The primar image chose for simulatios is of Lea of size piels as show i Fig. 1. Let perso A choose the fractioal orders ( ad perso choose the fractioal parameters ( Figs. (a ad (b represets the ecrpted images K A ad K. Figs. 3(a ad 3(b represet the images K A ad K A after perso A ad perso have carried out the steps as outlied i Equatio (6 ad (7. This is the echaged ke. The problem of breakig ito the proposed ke echage techique equates to fidig K A (or K A from the kowledge of K A ( + + ( ad K. A1 1 A That is fidig FRT ( 1 from FRT A A ( 1 ( ad FRT (. Let a error of Δ i the fractioal order cause a large eough error betwee the actual ke (K A ad the estimated ke usig the icorrect fractioal parameters. I order for the hacker to determie the correct value of A1 it would require (/Δ attempts sice A1 ca lie i the rage (-1 1. Idepedetl to determie the correct value of A it would require (/Δ attempts. Sice the correct combiatio of { A1 A } is required the total umber of times the hacker has to calculate the FRT will be (/Δ (/Δ = (/Δ. Let the computatioal requiremet to calculate FRT be m. The the umber of attempts to guess the correct ke will be N = m (8 Δ The computatioal compleit m depeds o the size of the image. We kow that the computatioal compleit of FRT is proportioal to FFT which is at best O(N log N where N is the legth of the iput. For D FFT it will be O(N log N. Thus the umber of attempts is ver large ad the method is highl robust to blid decrptio. The mea squared error (MSE betwee the decrpted ad the origial image has also bee evaluated to test the performace of the ke echage techique. The MSE is evaluated as a fuctio of the errors i the decrpted fractioal orders. If o(ij ad r(ij deote the values of the origial ad the recovered image at the piel (ij respectivel the the total MSE ca be defied as follows: N N 1 MSE = r o = r( i j o( i j N N i= 1 j= 1 (9 ISSN: Issue Volume 7 Februar 008

4 where N N is the size of the images. I the MSE calculatios each of the results was averaged over 10 trials. We have plotted the MSE versus the error i the fractioal order i Fig. 4. It ca be see from the figure that a error of Δ > 0.05 i the fractioal order causes a ver high MSE betwee the actual ke (K A ad the estimated ke usig icorrect fractioal parameters. For a tpical image of size ad Δ = 0.05 the computatioal requiremet is of the order of 10 9 ad for a image of size the computatioal requiremet is of the order of Coclusios I this paper for the first time a secure ke trasfer protocol has bee proposed that ca be carried out opticall. This is based o the FRT which is a ideal cadidate to be implemeted opticall. The simulatio results have show the validit of this ew algorithm. This secure ke echage algorithm i cojuctio with the ecrptio algorithms ca be used for a reall secure ad robust optical ecrptio techique. Practical applicatios would iclude optical digital sigature ad secure commuicatio over optical chaels. This work ma be further eteded b developig a optical set-up to implemet the proposed techique. [5]. M. Heell J.T. Sherida Radom phase ad jigsaw ecrptio i the Fresel domai Optical Egieerig Vol.43 No pp [6] G. Situ J. Zhag A lesless optical securit sstem based o computer geerated phase ol masks Optics Commuicatios Vol.3 No [7]. Scheider Applied CrptographJoh Wile ad Sos [8] Ku-Yua Chao Ja-Che Li Fault- Tolerat ad No-Epaded Visual Crptograph for Color Images WSEAS Trasactio o Iformatio Sciece ad Applicatios Vol. 3 No pp [9]. Otiveros I. Soto R. Carrasco A New Crptograph Algorithm usig Cab Curves ad LDPC for Wireless Commuicatio Sstems WSEAS Trasactio o Mathematics Vol. 6 No. 007 pp [10] W. Diffie M. Hellma New directios i crptograph IEEE Trasactios o Iformatio Theor Vol. No [11] H.M. Ozaktas Z. Zalevsk M. A. Kuta The Fractioal Fourier Trasform with Applicatios i Optics ad Sigal ProcessigWile 001. Refereces [1] P.Refregier. Javidi Optical image ecrptio based o iput plae ad Fourier plae radom ecodig Optics Letters Vol.0No pp [] G. Uikrisha J. Joseph K. Sigh Optical ecrptio b double radom phase ecodig i the fractioal Fourier domai Optics Letters Vol.5 No.1 000pp [3] Kehar Sigh A techique for image ecrptio usig digital sigatures Optics Commuicatios Vol. 18 No pp [4]. M. Heell J.T. Sherida Optical image ecrptio b radom shiftig i fractioal Fourier domais Optics LettersVol.8 No pp ISSN: Issue Volume 7 Februar 008

5 (a Fig. 1 The origial image of Lea of size 5656 piels for ecrptio. (b (a (b Fig. 3(a ad Fig. 3(b represet the images K A ad K A (the echaged ke after perso A ad perso have carried out steps outlied i equatios (6 ad (7 respectivel Fig. (a ad Fig. (b represet the ecrpted images K A ad K respectivel. MSE Error i Fractioal Order Fig. 4 MSE betwee the decrpted ad the ecrpted image as a fuctio of the errors i the fractioal parameters i FRT1. ISSN: Issue Volume 7 Februar 008

Frequency Domain Filtering

Frequency Domain Filtering Frequecy Domai Filterig Raga Rodrigo October 19, 2010 Outlie Cotets 1 Itroductio 1 2 Fourier Represetatio of Fiite-Duratio Sequeces: The Discrete Fourier Trasform 1 3 The 2-D Discrete Fourier Trasform

More information

Oblivious Transfer using Elliptic Curves

Oblivious Transfer using Elliptic Curves Oblivious Trasfer usig Elliptic Curves bhishek Parakh Louisiaa State Uiversity, ato Rouge, L May 4, 006 bstract: This paper proposes a algorithm for oblivious trasfer usig elliptic curves lso, we preset

More information

RAINFALL PREDICTION BY WAVELET DECOMPOSITION

RAINFALL PREDICTION BY WAVELET DECOMPOSITION RAIFALL PREDICTIO BY WAVELET DECOMPOSITIO A. W. JAYAWARDEA Departmet of Civil Egieerig, The Uiversit of Hog Kog, Hog Kog, Chia P. C. XU Academ of Mathematics ad Sstem Scieces, Chiese Academ of Scieces,

More information

U8L1: Sec Equations of Lines in R 2

U8L1: Sec Equations of Lines in R 2 MCVU U8L: Sec. 8.9. Equatios of Lies i R Review of Equatios of a Straight Lie (-D) Cosider the lie passig through A (-,) with slope, as show i the diagram below. I poit slope form, the equatio of the lie

More information

Infinite Sequences and Series

Infinite Sequences and Series Chapter 6 Ifiite Sequeces ad Series 6.1 Ifiite Sequeces 6.1.1 Elemetary Cocepts Simply speakig, a sequece is a ordered list of umbers writte: {a 1, a 2, a 3,...a, a +1,...} where the elemets a i represet

More information

U8L1: Sec Equations of Lines in R 2

U8L1: Sec Equations of Lines in R 2 MCVU Thursda Ma, Review of Equatios of a Straight Lie (-D) U8L Sec. 8.9. Equatios of Lies i R Cosider the lie passig through A (-,) with slope, as show i the diagram below. I poit slope form, the equatio

More information

Warped, Chirp Z-Transform: Radar Signal Processing

Warped, Chirp Z-Transform: Radar Signal Processing arped, Chirp Z-Trasform: Radar Sigal Processig by Garimella Ramamurthy Report o: IIIT/TR// Cetre for Commuicatios Iteratioal Istitute of Iformatio Techology Hyderabad - 5 3, IDIA Jauary ARPED, CHIRP Z

More information

Fundamental Concepts: Surfaces and Curves

Fundamental Concepts: Surfaces and Curves UNDAMENTAL CONCEPTS: SURACES AND CURVES CHAPTER udametal Cocepts: Surfaces ad Curves. INTRODUCTION This chapter describes two geometrical objects, vi., surfaces ad curves because the pla a ver importat

More information

Discrete-Time Systems, LTI Systems, and Discrete-Time Convolution

Discrete-Time Systems, LTI Systems, and Discrete-Time Convolution EEL5: Discrete-Time Sigals ad Systems. Itroductio I this set of otes, we begi our mathematical treatmet of discrete-time s. As show i Figure, a discrete-time operates or trasforms some iput sequece x [

More information

Indeterminate Equation Public-key

Indeterminate Equation Public-key 4 th ASIA PQC Forum Idetermiate Equatio Public-ke TM Crptosstem Giophatus Koichiro AKIYAMA TOSHIBA Corporatio Joit work with Yasuhiro Goto, Shia Okumura, Tsuoshi Takagi, Koji Nuida, Goichiro Haaoka, Hideo

More information

Direction of Arrival Estimation Method in Underdetermined Condition Zhang Youzhi a, Li Weibo b, Wang Hanli c

Direction of Arrival Estimation Method in Underdetermined Condition Zhang Youzhi a, Li Weibo b, Wang Hanli c 4th Iteratioal Coferece o Advaced Materials ad Iformatio Techology Processig (AMITP 06) Directio of Arrival Estimatio Method i Uderdetermied Coditio Zhag Youzhi a, Li eibo b, ag Hali c Naval Aeroautical

More information

Comparison Study of Series Approximation. and Convergence between Chebyshev. and Legendre Series

Comparison Study of Series Approximation. and Convergence between Chebyshev. and Legendre Series Applied Mathematical Scieces, Vol. 7, 03, o. 6, 3-337 HIKARI Ltd, www.m-hikari.com http://d.doi.org/0.988/ams.03.3430 Compariso Study of Series Approimatio ad Covergece betwee Chebyshev ad Legedre Series

More information

Free Space Optical Wireless Communications under Turbulence Channel Effect

Free Space Optical Wireless Communications under Turbulence Channel Effect IOSR Joural of Electroics ad Commuicatio Egieerig (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue 3, Ver. III (May - Ju. 014), PP 01-08 Free Space Optical Wireless Commuicatios uder Turbulece

More information

CALCULUS BASIC SUMMER REVIEW

CALCULUS BASIC SUMMER REVIEW CALCULUS BASIC SUMMER REVIEW NAME rise y y y Slope of a o vertical lie: m ru Poit Slope Equatio: y y m( ) The slope is m ad a poit o your lie is, ). ( y Slope-Itercept Equatio: y m b slope= m y-itercept=

More information

Complex Number Theory without Imaginary Number (i)

Complex Number Theory without Imaginary Number (i) Ope Access Library Joural Complex Number Theory without Imagiary Number (i Deepak Bhalchadra Gode Directorate of Cesus Operatios, Mumbai, Idia Email: deepakm_4@rediffmail.com Received 6 July 04; revised

More information

The picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled

The picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled 1 Lecture : Area Area ad distace traveled Approximatig area by rectagles Summatio The area uder a parabola 1.1 Area ad distace Suppose we have the followig iformatio about the velocity of a particle, how

More information

Apply change-of-basis formula to rewrite x as a linear combination of eigenvectors v j.

Apply change-of-basis formula to rewrite x as a linear combination of eigenvectors v j. Eigevalue-Eigevector Istructor: Nam Su Wag eigemcd Ay vector i real Euclidea space of dimesio ca be uiquely epressed as a liear combiatio of liearly idepedet vectors (ie, basis) g j, j,,, α g α g α g α

More information

Information-based Feature Selection

Information-based Feature Selection Iformatio-based Feature Selectio Farza Faria, Abbas Kazeroui, Afshi Babveyh Email: {faria,abbask,afshib}@staford.edu 1 Itroductio Feature selectio is a topic of great iterest i applicatios dealig with

More information

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE Geeral e Image Coder Structure Motio Video (s 1,s 2,t) or (s 1,s 2 ) Natural Image Samplig A form of data compressio; usually lossless, but ca be lossy Redudacy Removal Lossless compressio: predictive

More information

CALCULATING FIBONACCI VECTORS

CALCULATING FIBONACCI VECTORS THE GENERALIZED BINET FORMULA FOR CALCULATING FIBONACCI VECTORS Stuart D Aderso Departmet of Physics, Ithaca College 953 Daby Road, Ithaca NY 14850, USA email: saderso@ithacaedu ad Dai Novak Departmet

More information

Sensitivity Analysis of Daubechies 4 Wavelet Coefficients for Reduction of Reconstructed Image Error

Sensitivity Analysis of Daubechies 4 Wavelet Coefficients for Reduction of Reconstructed Image Error Proceedigs of the 6th WSEAS Iteratioal Coferece o SIGNAL PROCESSING, Dallas, Texas, USA, March -4, 7 67 Sesitivity Aalysis of Daubechies 4 Wavelet Coefficiets for Reductio of Recostructed Image Error DEVINDER

More information

Chapter 2 Feedback Control Theory Continued

Chapter 2 Feedback Control Theory Continued Chapter Feedback Cotrol Theor Cotiued. Itroductio I the previous chapter, the respose characteristic of simple first ad secod order trasfer fuctios were studied. It was show that first order trasfer fuctio,

More information

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary

Recursive Algorithm for Generating Partitions of an Integer. 1 Preliminary Recursive Algorithm for Geeratig Partitios of a Iteger Sug-Hyuk Cha Computer Sciece Departmet, Pace Uiversity 1 Pace Plaza, New York, NY 10038 USA scha@pace.edu Abstract. This article first reviews the

More information

OPTIMAL PIECEWISE UNIFORM VECTOR QUANTIZATION OF THE MEMORYLESS LAPLACIAN SOURCE

OPTIMAL PIECEWISE UNIFORM VECTOR QUANTIZATION OF THE MEMORYLESS LAPLACIAN SOURCE Joural of ELECTRICAL EGIEERIG, VOL. 56, O. 7-8, 2005, 200 204 OPTIMAL PIECEWISE UIFORM VECTOR QUATIZATIO OF THE MEMORYLESS LAPLACIA SOURCE Zora H. Perić Veljo Lj. Staović Alesadra Z. Jovaović Srdja M.

More information

Similarity Solutions to Unsteady Pseudoplastic. Flow Near a Moving Wall

Similarity Solutions to Unsteady Pseudoplastic. Flow Near a Moving Wall Iteratioal Mathematical Forum, Vol. 9, 04, o. 3, 465-475 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/0.988/imf.04.48 Similarity Solutios to Usteady Pseudoplastic Flow Near a Movig Wall W. Robi Egieerig

More information

Polynomial Multiplication and Fast Fourier Transform

Polynomial Multiplication and Fast Fourier Transform Polyomial Multiplicatio ad Fast Fourier Trasform Com S 477/577 Notes Ya-Bi Jia Sep 19, 2017 I this lecture we will describe the famous algorithm of fast Fourier trasform FFT, which has revolutioized digital

More information

577. Estimation of surface roughness using high frequency vibrations

577. Estimation of surface roughness using high frequency vibrations 577. Estimatio of surface roughess usig high frequecy vibratios V. Augutis, M. Sauoris, Kauas Uiversity of Techology Electroics ad Measuremets Systems Departmet Studetu str. 5-443, LT-5368 Kauas, Lithuaia

More information

A Block Cipher Using Linear Congruences

A Block Cipher Using Linear Congruences Joural of Computer Sciece 3 (7): 556-560, 2007 ISSN 1549-3636 2007 Sciece Publicatios A Block Cipher Usig Liear Cogrueces 1 V.U.K. Sastry ad 2 V. Jaaki 1 Academic Affairs, Sreeidhi Istitute of Sciece &

More information

Modified Ratio Estimators Using Known Median and Co-Efficent of Kurtosis

Modified Ratio Estimators Using Known Median and Co-Efficent of Kurtosis America Joural of Mathematics ad Statistics 01, (4): 95-100 DOI: 10.593/j.ajms.01004.05 Modified Ratio s Usig Kow Media ad Co-Efficet of Kurtosis J.Subramai *, G.Kumarapadiya Departmet of Statistics, Podicherry

More information

A New Class of Ternary Zero Correlation Zone Sequence Sets Based on Mutually Orthogonal Complementary Sets

A New Class of Ternary Zero Correlation Zone Sequence Sets Based on Mutually Orthogonal Complementary Sets IOSR Joural of Electroics ad Commuicatio Egieerig (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 0, Issue 3, Ver. I (May - Ju.205), PP 08-3 www.iosrjourals.org A New Class of Terary Zero Correlatio

More information

Numerical Conformal Mapping via a Fredholm Integral Equation using Fourier Method ABSTRACT INTRODUCTION

Numerical Conformal Mapping via a Fredholm Integral Equation using Fourier Method ABSTRACT INTRODUCTION alaysia Joural of athematical Scieces 3(1): 83-93 (9) umerical Coformal appig via a Fredholm Itegral Equatio usig Fourier ethod 1 Ali Hassa ohamed urid ad Teh Yua Yig 1, Departmet of athematics, Faculty

More information

62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 +

62. Power series Definition 16. (Power series) Given a sequence {c n }, the series. c n x n = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + 62. Power series Defiitio 16. (Power series) Give a sequece {c }, the series c x = c 0 + c 1 x + c 2 x 2 + c 3 x 3 + is called a power series i the variable x. The umbers c are called the coefficiets of

More information

Section 5.1 The Basics of Counting

Section 5.1 The Basics of Counting 1 Sectio 5.1 The Basics of Coutig Combiatorics, the study of arragemets of objects, is a importat part of discrete mathematics. I this chapter, we will lear basic techiques of coutig which has a lot of

More information

Generating Functions for Laguerre Type Polynomials. Group Theoretic method

Generating Functions for Laguerre Type Polynomials. Group Theoretic method It. Joural of Math. Aalysis, Vol. 4, 2010, o. 48, 257-266 Geeratig Fuctios for Laguerre Type Polyomials α of Two Variables L ( xy, ) by Usig Group Theoretic method Ajay K. Shula* ad Sriata K. Meher** *Departmet

More information

FACULTY OF MATHEMATICAL STUDIES MATHEMATICS FOR PART I ENGINEERING. Lectures

FACULTY OF MATHEMATICAL STUDIES MATHEMATICS FOR PART I ENGINEERING. Lectures FACULTY OF MATHEMATICAL STUDIES MATHEMATICS FOR PART I ENGINEERING Lectures MODULE 5 STATISTICS II. Mea ad stadard error of sample data. Biomial distributio. Normal distributio 4. Samplig 5. Cofidece itervals

More information

September 2012 C1 Note. C1 Notes (Edexcel) Copyright - For AS, A2 notes and IGCSE / GCSE worksheets 1

September 2012 C1 Note. C1 Notes (Edexcel) Copyright   - For AS, A2 notes and IGCSE / GCSE worksheets 1 September 0 s (Edecel) Copyright www.pgmaths.co.uk - For AS, A otes ad IGCSE / GCSE worksheets September 0 Copyright www.pgmaths.co.uk - For AS, A otes ad IGCSE / GCSE worksheets September 0 Copyright

More information

CALCULATION OF FIBONACCI VECTORS

CALCULATION OF FIBONACCI VECTORS CALCULATION OF FIBONACCI VECTORS Stuart D. Aderso Departmet of Physics, Ithaca College 953 Daby Road, Ithaca NY 14850, USA email: saderso@ithaca.edu ad Dai Novak Departmet of Mathematics, Ithaca College

More information

Discrete Orthogonal Moment Features Using Chebyshev Polynomials

Discrete Orthogonal Moment Features Using Chebyshev Polynomials Discrete Orthogoal Momet Features Usig Chebyshev Polyomials R. Mukuda, 1 S.H.Og ad P.A. Lee 3 1 Faculty of Iformatio Sciece ad Techology, Multimedia Uiversity 75450 Malacca, Malaysia. Istitute of Mathematical

More information

A New Simulation Model of Rician Fading Channel Xinxin Jin 1,2,a, Yu Zhang 1,3,b, Changyong Pan 4,c

A New Simulation Model of Rician Fading Channel Xinxin Jin 1,2,a, Yu Zhang 1,3,b, Changyong Pan 4,c 6 Iteratioal Coferece o Iformatio Egieerig ad Commuicatios Techology (IECT 6 ISB: 978--6595-375-5 A ew Simulatio Model of Ricia Fadig Chael Xixi Ji,,a, Yu Zhag,3,b, Chagyog Pa 4,c Tsighua atioal Laboratory

More information

PAijpam.eu ON TENSOR PRODUCT DECOMPOSITION

PAijpam.eu ON TENSOR PRODUCT DECOMPOSITION Iteratioal Joural of Pure ad Applied Mathematics Volume 103 No 3 2015, 537-545 ISSN: 1311-8080 (prited versio); ISSN: 1314-3395 (o-lie versio) url: http://wwwijpameu doi: http://dxdoiorg/1012732/ijpamv103i314

More information

Approximating the ruin probability of finite-time surplus process with Adaptive Moving Total Exponential Least Square

Approximating the ruin probability of finite-time surplus process with Adaptive Moving Total Exponential Least Square WSEAS TRANSACTONS o BUSNESS ad ECONOMCS S. Khotama, S. Boothiem, W. Klogdee Approimatig the rui probability of fiite-time surplus process with Adaptive Movig Total Epoetial Least Square S. KHOTAMA, S.

More information

EE260: Digital Design, Spring n MUX Gate n Rudimentary functions n Binary Decoders. n Binary Encoders n Priority Encoders

EE260: Digital Design, Spring n MUX Gate n Rudimentary functions n Binary Decoders. n Binary Encoders n Priority Encoders EE260: Digital Desig, Sprig 2018 EE 260: Itroductio to Digital Desig MUXs, Ecoders, Decoders Yao Zheg Departmet of Electrical Egieerig Uiversity of Hawaiʻi at Māoa Overview of Ecoder ad Decoder MUX Gate

More information

The Sample Variance Formula: A Detailed Study of an Old Controversy

The Sample Variance Formula: A Detailed Study of an Old Controversy The Sample Variace Formula: A Detailed Study of a Old Cotroversy Ky M. Vu PhD. AuLac Techologies Ic. c 00 Email: kymvu@aulactechologies.com Abstract The two biased ad ubiased formulae for the sample variace

More information

Estimation of Population Mean Using Co-Efficient of Variation and Median of an Auxiliary Variable

Estimation of Population Mean Using Co-Efficient of Variation and Median of an Auxiliary Variable Iteratioal Joural of Probability ad Statistics 01, 1(4: 111-118 DOI: 10.593/j.ijps.010104.04 Estimatio of Populatio Mea Usig Co-Efficiet of Variatio ad Media of a Auxiliary Variable J. Subramai *, G. Kumarapadiya

More information

Optimum LMSE Discrete Transform

Optimum LMSE Discrete Transform Image Trasformatio Two-dimesioal image trasforms are extremely importat areas of study i image processig. The image output i the trasformed space may be aalyzed, iterpreted, ad further processed for implemetig

More information

Recursive Algorithms. Recurrences. Recursive Algorithms Analysis

Recursive Algorithms. Recurrences. Recursive Algorithms Analysis Recursive Algorithms Recurreces Computer Sciece & Egieerig 35: Discrete Mathematics Christopher M Bourke cbourke@cseuledu A recursive algorithm is oe i which objects are defied i terms of other objects

More information

FIR Filter Design: Part II

FIR Filter Design: Part II EEL335: Discrete-Time Sigals ad Systems. Itroductio I this set of otes, we cosider how we might go about desigig FIR filters with arbitrary frequecy resposes, through compositio of multiple sigle-peak

More information

Exponential Moving Average Pieter P

Exponential Moving Average Pieter P Expoetial Movig Average Pieter P Differece equatio The Differece equatio of a expoetial movig average lter is very simple: y[] x[] + (1 )y[ 1] I this equatio, y[] is the curret output, y[ 1] is the previous

More information

Summary: CORRELATION & LINEAR REGRESSION. GC. Students are advised to refer to lecture notes for the GC operations to obtain scatter diagram.

Summary: CORRELATION & LINEAR REGRESSION. GC. Students are advised to refer to lecture notes for the GC operations to obtain scatter diagram. Key Cocepts: 1) Sketchig of scatter diagram The scatter diagram of bivariate (i.e. cotaiig two variables) data ca be easily obtaied usig GC. Studets are advised to refer to lecture otes for the GC operatios

More information

Sequences, Mathematical Induction, and Recursion. CSE 2353 Discrete Computational Structures Spring 2018

Sequences, Mathematical Induction, and Recursion. CSE 2353 Discrete Computational Structures Spring 2018 CSE 353 Discrete Computatioal Structures Sprig 08 Sequeces, Mathematical Iductio, ad Recursio (Chapter 5, Epp) Note: some course slides adopted from publisher-provided material Overview May mathematical

More information

Module 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur

Module 5 EMBEDDED WAVELET CODING. Version 2 ECE IIT, Kharagpur Module 5 EMBEDDED WAVELET CODING Versio ECE IIT, Kharagpur Lesso 4 SPIHT algorithm Versio ECE IIT, Kharagpur Istructioal Objectives At the ed of this lesso, the studets should be able to:. State the limitatios

More information

3. Z Transform. Recall that the Fourier transform (FT) of a DT signal xn [ ] is ( ) [ ] = In order for the FT to exist in the finite magnitude sense,

3. Z Transform. Recall that the Fourier transform (FT) of a DT signal xn [ ] is ( ) [ ] = In order for the FT to exist in the finite magnitude sense, 3. Z Trasform Referece: Etire Chapter 3 of text. Recall that the Fourier trasform (FT) of a DT sigal x [ ] is ω ( ) [ ] X e = j jω k = xe I order for the FT to exist i the fiite magitude sese, S = x [

More information

Complex Numbers Solutions

Complex Numbers Solutions Complex Numbers Solutios Joseph Zoller February 7, 06 Solutios. (009 AIME I Problem ) There is a complex umber with imagiary part 64 ad a positive iteger such that Fid. [Solutio: 697] 4i + + 4i. 4i 4i

More information

NUMERICAL METHODS FOR SOLVING EQUATIONS

NUMERICAL METHODS FOR SOLVING EQUATIONS Mathematics Revisio Guides Numerical Methods for Solvig Equatios Page 1 of 11 M.K. HOME TUITION Mathematics Revisio Guides Level: GCSE Higher Tier NUMERICAL METHODS FOR SOLVING EQUATIONS Versio:. Date:

More information

Review of Elementary Cryptography. For more material, see my notes of CSE 5351, available on my webpage

Review of Elementary Cryptography. For more material, see my notes of CSE 5351, available on my webpage Review of Elemetary Cryptography For more material, see my otes of CSE 5351, available o my webpage Outlie Security (CPA, CCA, sematic security, idistiguishability) RSA ElGamal Homomorphic ecryptio 2 Two

More information

Most text will write ordinary derivatives using either Leibniz notation 2 3. y + 5y= e and y y. xx tt t

Most text will write ordinary derivatives using either Leibniz notation 2 3. y + 5y= e and y y. xx tt t Itroductio to Differetial Equatios Defiitios ad Termiolog Differetial Equatio: A equatio cotaiig the derivatives of oe or more depedet variables, with respect to oe or more idepedet variables, is said

More information

Course Outline. Designing Control Systems. Proportional Controller. Amme 3500 : System Dynamics and Control. Root Locus. Dr. Stefan B.

Course Outline. Designing Control Systems. Proportional Controller. Amme 3500 : System Dynamics and Control. Root Locus. Dr. Stefan B. Amme 3500 : System Dyamics ad Cotrol Root Locus Course Outlie Week Date Cotet Assigmet Notes Mar Itroductio 8 Mar Frequecy Domai Modellig 3 5 Mar Trasiet Performace ad the s-plae 4 Mar Block Diagrams Assig

More information

Nonlinear regression

Nonlinear regression oliear regressio How to aalyse data? How to aalyse data? Plot! How to aalyse data? Plot! Huma brai is oe the most powerfull computatioall tools Works differetly tha a computer What if data have o liear

More information

ANOTHER WEIGHTED WEIBULL DISTRIBUTION FROM AZZALINI S FAMILY

ANOTHER WEIGHTED WEIBULL DISTRIBUTION FROM AZZALINI S FAMILY ANOTHER WEIGHTED WEIBULL DISTRIBUTION FROM AZZALINI S FAMILY Sulema Nasiru, MSc. Departmet of Statistics, Faculty of Mathematical Scieces, Uiversity for Developmet Studies, Navrogo, Upper East Regio, Ghaa,

More information

SCALING OF NUMBERS IN RESIDUE ARITHMETIC WITH THE FLEXIBLE SELECTION OF SCALING FACTOR

SCALING OF NUMBERS IN RESIDUE ARITHMETIC WITH THE FLEXIBLE SELECTION OF SCALING FACTOR POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 76 Electrical Egieerig 203 Zeo ULMAN* Macie CZYŻAK* Robert SMYK* SCALING OF NUMBERS IN RESIDUE ARITHMETIC WITH THE FLEXIBLE SELECTION OF SCALING

More information

2D DSP Basics: 2D Systems

2D DSP Basics: 2D Systems - Digital Image Processig ad Compressio D DSP Basics: D Systems D Systems T[ ] y = T [ ] Liearity Additivity: If T y = T [ ] The + T y = y + y Homogeeity: If The T y = T [ ] a T y = ay = at [ ] Liearity

More information

A statistical method to determine sample size to estimate characteristic value of soil parameters

A statistical method to determine sample size to estimate characteristic value of soil parameters A statistical method to determie sample size to estimate characteristic value of soil parameters Y. Hojo, B. Setiawa 2 ad M. Suzuki 3 Abstract Sample size is a importat factor to be cosidered i determiig

More information

Lecture 8: Solving the Heat, Laplace and Wave equations using finite difference methods

Lecture 8: Solving the Heat, Laplace and Wave equations using finite difference methods Itroductory lecture otes o Partial Differetial Equatios - c Athoy Peirce. Not to be copied, used, or revised without explicit writte permissio from the copyright ower. 1 Lecture 8: Solvig the Heat, Laplace

More information

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence

Sequences A sequence of numbers is a function whose domain is the positive integers. We can see that the sequence Sequeces A sequece of umbers is a fuctio whose domai is the positive itegers. We ca see that the sequece 1, 1, 2, 2, 3, 3,... is a fuctio from the positive itegers whe we write the first sequece elemet

More information

INF Introduction to classifiction Anne Solberg Based on Chapter 2 ( ) in Duda and Hart: Pattern Classification

INF Introduction to classifiction Anne Solberg Based on Chapter 2 ( ) in Duda and Hart: Pattern Classification INF 4300 90 Itroductio to classifictio Ae Solberg ae@ifiuioo Based o Chapter -6 i Duda ad Hart: atter Classificatio 90 INF 4300 Madator proect Mai task: classificatio You must implemet a classificatio

More information

Four-dimensional Vector Matrix Determinant and Inverse

Four-dimensional Vector Matrix Determinant and Inverse I.J. Egieerig ad Maufacturig 013 30-37 Published Olie Jue 01 i MECS (http://www.mecs-press.et) DOI: 10.5815/iem.01.03.05 vailable olie at http://www.mecs-press.et/iem Four-dimesioal Vector Matrix Determiat

More information

TMA4205 Numerical Linear Algebra. The Poisson problem in R 2 : diagonalization methods

TMA4205 Numerical Linear Algebra. The Poisson problem in R 2 : diagonalization methods TMA4205 Numerical Liear Algebra The Poisso problem i R 2 : diagoalizatio methods September 3, 2007 c Eiar M Røquist Departmet of Mathematical Scieces NTNU, N-749 Trodheim, Norway All rights reserved A

More information

6.003 Homework #12 Solutions

6.003 Homework #12 Solutions 6.003 Homework # Solutios Problems. Which are rue? For each of the D sigals x [] through x 4 [] below), determie whether the coditios listed i the followig table are satisfied, ad aswer for true or F for

More information

ROLL CUTTING PROBLEMS UNDER STOCHASTIC DEMAND

ROLL CUTTING PROBLEMS UNDER STOCHASTIC DEMAND Pacific-Asia Joural of Mathematics, Volume 5, No., Jauary-Jue 20 ROLL CUTTING PROBLEMS UNDER STOCHASTIC DEMAND SHAKEEL JAVAID, Z. H. BAKHSHI & M. M. KHALID ABSTRACT: I this paper, the roll cuttig problem

More information

1 1 2 = show that: over variables x and y. [2 marks] Write down necessary conditions involving first and second-order partial derivatives for ( x0, y

1 1 2 = show that: over variables x and y. [2 marks] Write down necessary conditions involving first and second-order partial derivatives for ( x0, y Questio (a) A square matrix A= A is called positive defiite if the quadratic form waw > 0 for every o-zero vector w [Note: Here (.) deotes the traspose of a matrix or a vector]. Let 0 A = 0 = show that:

More information

Power Comparison of Some Goodness-of-fit Tests

Power Comparison of Some Goodness-of-fit Tests Florida Iteratioal Uiversity FIU Digital Commos FIU Electroic Theses ad Dissertatios Uiversity Graduate School 7-6-2016 Power Compariso of Some Goodess-of-fit Tests Tiayi Liu tliu019@fiu.edu DOI: 10.25148/etd.FIDC000750

More information

CHAPTER I: Vector Spaces

CHAPTER I: Vector Spaces CHAPTER I: Vector Spaces Sectio 1: Itroductio ad Examples This first chapter is largely a review of topics you probably saw i your liear algebra course. So why cover it? (1) Not everyoe remembers everythig

More information

CO-LOCATED DIFFUSE APPROXIMATION METHOD FOR TWO DIMENSIONAL INCOMPRESSIBLE CHANNEL FLOWS

CO-LOCATED DIFFUSE APPROXIMATION METHOD FOR TWO DIMENSIONAL INCOMPRESSIBLE CHANNEL FLOWS CO-LOCATED DIFFUSE APPROXIMATION METHOD FOR TWO DIMENSIONAL INCOMPRESSIBLE CHANNEL FLOWS C.PRAX ad H.SADAT Laboratoire d'etudes Thermiques,URA CNRS 403 40, Aveue du Recteur Pieau 86022 Poitiers Cedex,

More information

The z-transform. 7.1 Introduction. 7.2 The z-transform Derivation of the z-transform: x[n] = z n LTI system, h[n] z = re j

The z-transform. 7.1 Introduction. 7.2 The z-transform Derivation of the z-transform: x[n] = z n LTI system, h[n] z = re j The -Trasform 7. Itroductio Geeralie the complex siusoidal represetatio offered by DTFT to a represetatio of complex expoetial sigals. Obtai more geeral characteristics for discrete-time LTI systems. 7.

More information

Last time: Moments of the Poisson distribution from its generating function. Example: Using telescope to measure intensity of an object

Last time: Moments of the Poisson distribution from its generating function. Example: Using telescope to measure intensity of an object 6.3 Stochastic Estimatio ad Cotrol, Fall 004 Lecture 7 Last time: Momets of the Poisso distributio from its geeratig fuctio. Gs () e dg µ e ds dg µ ( s) µ ( s) µ ( s) µ e ds dg X µ ds X s dg dg + ds ds

More information

The Random Walk For Dummies

The Random Walk For Dummies The Radom Walk For Dummies Richard A Mote Abstract We look at the priciples goverig the oe-dimesioal discrete radom walk First we review five basic cocepts of probability theory The we cosider the Beroulli

More information

Invariability of Remainder Based Reversible Watermarking

Invariability of Remainder Based Reversible Watermarking Joural of Network Itelligece c 16 ISSN 21-8105 (Olie) Taiwa Ubiquitous Iformatio Volume 1, Number 1, February 16 Ivariability of Remaider Based Reversible Watermarkig Shao-Wei Weg School of Iformatio Egieerig

More information

Machine Learning Regression I Hamid R. Rabiee [Slides are based on Bishop Book] Spring

Machine Learning Regression I Hamid R. Rabiee [Slides are based on Bishop Book] Spring Machie Learig Regressio I Hamid R. Rabiee [Slides are based o Bishop Book] Sprig 015 http://ce.sharif.edu/courses/93-94//ce717-1 Liear Regressio Liear regressio: ivolves a respose variable ad a sigle predictor

More information

. (24) If we consider the geometry of Figure 13 the signal returned from the n th scatterer located at x, y is

. (24) If we consider the geometry of Figure 13 the signal returned from the n th scatterer located at x, y is .5 SAR SIGNA CHARACTERIZATION I order to formulate a SAR processor we first eed to characterize the sigal that the SAR processor will operate upo. Although our previous discussios treated SAR cross-rage

More information

New Definition of Density on Knapsack Cryptosystems

New Definition of Density on Knapsack Cryptosystems Africacryt008@Casablaca 008.06.1 New Defiitio of Desity o Kasac Crytosystems Noboru Kuihiro The Uiversity of Toyo, Jaa 1/31 Kasac Scheme rough idea Public Key: asac: a={a 1, a,, a } Ecrytio: message m=m

More information

NEW IDENTIFICATION AND CONTROL METHODS OF SINE-FUNCTION JULIA SETS

NEW IDENTIFICATION AND CONTROL METHODS OF SINE-FUNCTION JULIA SETS Joural of Applied Aalysis ad Computatio Volume 5, Number 2, May 25, 22 23 Website:http://jaac-olie.com/ doi:.948/252 NEW IDENTIFICATION AND CONTROL METHODS OF SINE-FUNCTION JULIA SETS Jie Su,2, Wei Qiao

More information

ADVANCED SOFTWARE ENGINEERING

ADVANCED SOFTWARE ENGINEERING ADVANCED SOFTWARE ENGINEERING COMP 3705 Exercise Usage-based Testig ad Reliability Versio 1.0-040406 Departmet of Computer Ssciece Sada Narayaappa, Aeliese Adrews Versio 1.1-050405 Departmet of Commuicatio

More information

CEE 522 Autumn Uncertainty Concepts for Geotechnical Engineering

CEE 522 Autumn Uncertainty Concepts for Geotechnical Engineering CEE 5 Autum 005 Ucertaity Cocepts for Geotechical Egieerig Basic Termiology Set A set is a collectio of (mutually exclusive) objects or evets. The sample space is the (collectively exhaustive) collectio

More information

It is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function.

It is always the case that unions, intersections, complements, and set differences are preserved by the inverse image of a function. MATH 532 Measurable Fuctios Dr. Neal, WKU Throughout, let ( X, F, µ) be a measure space ad let (!, F, P ) deote the special case of a probability space. We shall ow begi to study real-valued fuctios defied

More information

Vassilis Katsouros, Vassilis Papavassiliou and Christos Emmanouilidis

Vassilis Katsouros, Vassilis Papavassiliou and Christos Emmanouilidis Vassilis Katsouros, Vassilis Papavassiliou ad Christos Emmaouilidis ATHENA Research & Iovatio Cetre, Greece www.athea-iovatio.gr www.ceti.athea-iovatio.gr/compsys e-mail: christosem AT ieee.org Problem

More information

4.3 Growth Rates of Solutions to Recurrences

4.3 Growth Rates of Solutions to Recurrences 4.3. GROWTH RATES OF SOLUTIONS TO RECURRENCES 81 4.3 Growth Rates of Solutios to Recurreces 4.3.1 Divide ad Coquer Algorithms Oe of the most basic ad powerful algorithmic techiques is divide ad coquer.

More information

Finite-length Discrete Transforms. Chapter 5, Sections

Finite-length Discrete Transforms. Chapter 5, Sections Fiite-legth Discrete Trasforms Chapter 5, Sectios 5.2-50 5.0 Dr. Iyad djafar Outlie The Discrete Fourier Trasform (DFT) Matrix Represetatio of DFT Fiite-legth Sequeces Circular Covolutio DFT Symmetry Properties

More information

Generating Functions. 1 Operations on generating functions

Generating Functions. 1 Operations on generating functions Geeratig Fuctios The geeratig fuctio for a sequece a 0, a,..., a,... is defied to be the power series fx a x. 0 We say that a 0, a,... is the sequece geerated by fx ad a is the coefficiet of x. Example

More information

6.003 Homework #12 Solutions

6.003 Homework #12 Solutions 6.003 Homework # Solutios Problems. Which are rue? For each of the D sigals x [] through x 4 [] (below), determie whether the coditios listed i the followig table are satisfied, ad aswer for true or F

More information

Subject: Differential Equations & Mathematical Modeling-III

Subject: Differential Equations & Mathematical Modeling-III Power Series Solutios of Differetial Equatios about Sigular poits Subject: Differetial Equatios & Mathematical Modelig-III Lesso: Power series solutios of differetial equatios about Sigular poits Lesso

More information

PH 425 Quantum Measurement and Spin Winter SPINS Lab 1

PH 425 Quantum Measurement and Spin Winter SPINS Lab 1 PH 425 Quatum Measuremet ad Spi Witer 23 SPIS Lab Measure the spi projectio S z alog the z-axis This is the experimet that is ready to go whe you start the program, as show below Each atom is measured

More information

TEACHER CERTIFICATION STUDY GUIDE

TEACHER CERTIFICATION STUDY GUIDE COMPETENCY 1. ALGEBRA SKILL 1.1 1.1a. ALGEBRAIC STRUCTURES Kow why the real ad complex umbers are each a field, ad that particular rigs are ot fields (e.g., itegers, polyomial rigs, matrix rigs) Algebra

More information

A Family of Unbiased Estimators of Population Mean Using an Auxiliary Variable

A Family of Unbiased Estimators of Population Mean Using an Auxiliary Variable Advaces i Computatioal Scieces ad Techolog ISSN 0973-6107 Volume 10, Number 1 (017 pp. 19-137 Research Idia Publicatios http://www.ripublicatio.com A Famil of Ubiased Estimators of Populatio Mea Usig a

More information

arxiv: v1 [math.nt] 5 Jan 2017 IBRAHIM M. ALABDULMOHSIN

arxiv: v1 [math.nt] 5 Jan 2017 IBRAHIM M. ALABDULMOHSIN FRACTIONAL PARTS AND THEIR RELATIONS TO THE VALUES OF THE RIEMANN ZETA FUNCTION arxiv:70.04883v [math.nt 5 Ja 07 IBRAHIM M. ALABDULMOHSIN Kig Abdullah Uiversity of Sciece ad Techology (KAUST, Computer,

More information

6.003 Homework #3 Solutions

6.003 Homework #3 Solutions 6.00 Homework # Solutios Problems. Complex umbers a. Evaluate the real ad imagiary parts of j j. π/ Real part = Imagiary part = 0 e Euler s formula says that j = e jπ/, so jπ/ j π/ j j = e = e. Thus the

More information

Some New Iterative Methods for Solving Nonlinear Equations

Some New Iterative Methods for Solving Nonlinear Equations World Applied Scieces Joural 0 (6): 870-874, 01 ISSN 1818-495 IDOSI Publicatios, 01 DOI: 10.589/idosi.wasj.01.0.06.830 Some New Iterative Methods for Solvig Noliear Equatios Muhammad Aslam Noor, Khalida

More information

Solution of Differential Equation from the Transform Technique

Solution of Differential Equation from the Transform Technique Iteratioal Joural of Computatioal Sciece ad Mathematics ISSN 0974-3189 Volume 3, Number 1 (2011), pp 121-125 Iteratioal Research Publicatio House http://wwwirphousecom Solutio of Differetial Equatio from

More information

REGRESSION (Physics 1210 Notes, Partial Modified Appendix A)

REGRESSION (Physics 1210 Notes, Partial Modified Appendix A) REGRESSION (Physics 0 Notes, Partial Modified Appedix A) HOW TO PERFORM A LINEAR REGRESSION Cosider the followig data poits ad their graph (Table I ad Figure ): X Y 0 3 5 3 7 4 9 5 Table : Example Data

More information

Excellent Performances of The Third-level Disturbed Chaos in The Cryptography Algorithm and The Spread Spectrum Communication

Excellent Performances of The Third-level Disturbed Chaos in The Cryptography Algorithm and The Spread Spectrum Communication Joural of Iformatio Hidig ad Multimedia Sigal Processig c 26 ISSN 273-422 Ubiquitous Iteratioal Volume 7, Number 4, July 26 Excellet Performaces of The Third-level Disturbed Chaos i The Cryptography Algorithm

More information

POWER SERIES SOLUTION OF FIRST ORDER MATRIX DIFFERENTIAL EQUATIONS

POWER SERIES SOLUTION OF FIRST ORDER MATRIX DIFFERENTIAL EQUATIONS Joural of Applied Mathematics ad Computatioal Mechaics 4 3(3) 3-8 POWER SERIES SOLUION OF FIRS ORDER MARIX DIFFERENIAL EQUAIONS Staisław Kukla Izabela Zamorska Istitute of Mathematics Czestochowa Uiversity

More information