A Division Algorithm Using Bisection Method in Residue Number System

Size: px
Start display at page:

Download "A Division Algorithm Using Bisection Method in Residue Number System"

Transcription

1 International Journal of Coputer, Consuer and Control IJ3C), Vol., No. 03) 59 A Division Algorith Using Bisection Method in Residue Nuber Syste * Chin-Chen Chang and Jen-Ho Yang Abstract. Introduction Residue Nuber Syste ) has coputational advantages for large integer arithetic. It provides the benefits of parallel, carry-free, and high-speed arithetic in addition, subtraction, and ultiplication. However, overflow detection, sign detection, agnitude detection, and division are tie-consuing operations in. The ost interesting one of the above operations is division, and any related researches have been proposed to ake it ore efficient. Hiasat and Abdel-Aty-Zohdy proposed a high-speed division algorith using the highest power coparison to speed up division in. Their algorith evaluates the quotient according to the highest powers of in the dividend and the divisor. Nevertheless, the evaluated quotient is underestiated such that there are redundant execution rounds in their algorith. Thus, Yang et al. proposed a division algorith in using parity checking technique in 004. In this algorith, the evaluated quotient is estiated precisely such that the actual quotient can be found quickly. However, coputing the highest powers of in the dividend and the divisor is tie-consuing in, and this coputation ust be perfored in each execution round of Yang et al. s algorith. Consequently, we propose the bisection ethod in to design a division algorith in the paper. Our new algorith uses the bisection ethod in to find the quotient in a possible interval efficiently. Copared with Yang et al. s algorith, our algorith has less execution rounds and greatly reduces the ties of the highest-power coputation in. Keywords: Residue Nuber Syste, division, bisection ethod *Corresponding Author: Chin-Chen Chang E-ail: alan3c@gail.co). Departent of Coputer Science and Inforation Engineering, Asia University, Taichung, 43, Taiwan; Departent of Inforation Engineering and Coputer Science, Feng Chia University, Taichung, 407, Taiwan Departent of Multiedia and Mobile Coerce, Kainan University, No., Kannan Rd., Luzhu, Taoyuan County, 33857, Taiwan Nowadays, nuerous nuber systes have been utilized to ake coputers ore and ore powerful. The ost popular one of these nuber systes is Residue Nuber Syste ) because it has any advantages of coputing large nubers in coputers. In, a nuber is represented by the residues of all oduli, and the arithetic can be perfored on each odulus independently. Thus, offers the properties of parallel, carry-free, and high-speed arithetic []. However, the overflow detection, sign detection, agnitude detection, and division are tie-consuing operations in. The ost interesting research topic of the is division because it has any applications such as odular operations. Thus, several algoriths have been proposed to solve division proble in [-9]. However, all proposed algoriths have the drawbacks of long execution tie and large hardware requireents because Mixed-Radix Conversion MRC) and Chinese Reainder Theore CRT) are used. Instead of eploying MRC and CRT, Hiasat and Abdel-Aty-Zohdy used the highest power coparison between the dividend and the divisor to design a division algorith in [0]. The execution tie and hardware requireents in their algorith are less than those in other division algoriths. Their algorith coputes the evaluated quotient according to the highest powers of the dividend and the divisor, and obtains the actual quotient by coputing the su of all evaluated quotients until the product of the divisor and the evaluated quotient is less than the dividend. However, the evaluated quotient is underestiated in their algorith such that the nuber of execution rounds increases. Thus, Yang et al. proposed a division algorith in using the parity checking technique in 004 []. In the algorith, the evaluated quotient is estiated precisely such that approxiating the actual quotient

2 International Journal of Coputer, Consuer and Control IJ3C), Vol., No. 03) 60 by adding the evaluated quotients is two ties faster than that in Hisat and Abdel-Aty-Zohdy s algorith. However, coputing the highest power of of a nuber is tie-consuing in, and Yang et al. s algorith needs to perfor this coputation in each execution round. This extra load is the bottleneck of this algorith. As a result, a bisection ethod in is proposed to design a division algorith in this paper. A new algorith in this research uses the bisection ethod to find the quotient in a probable interval efficiently, and the algorith only needs to copute the highest-power coparison in in the first round. This iproveent greatly decreases the execution tie of each round in our algorith. Furtherore, Yang et al. s algorith needs to deterine the agnitudes of the dividend and the divisor by using the parity checking technique twice in each round. However, using the bisection ethod in, our algorith only perfors the parity checking technique once to deterine the agnitude of the residue in each execution round. Moreover, the proposed division algorith can be efficiently applied to any applications, such as iage processing [], cryptosystes [3], and odular exponentiation arithetic [4]. The reainder of this paper is organized as follows. A review of popular iage copression algoriths that support the ROI capability is given in Section II. In Section III, we shall address our proposed ultiple-roi iage copression schee. Then the siulation results and a further discussion are provided in Section IV. Finally, a brief conclusion is drawn in Section V.. Hiasat and Abdel-Aty-Zohdy's division algorith Given a set of relatively prie oduli B,,..., }, where gcd, ), i j, { n n M i i we copute i j. Here, B and M are called the base and the range of. In, any nuber X less than the range M can be denoted as a vector X x, x,..., x ), where i i n x X X od. According to Chinese i Reainder Theore, any X less than M has only one representation. We assue that two integers x, y [0, M) in are X x, x,..., x ) and Y y, y,..., y ), n n respectively, and copute Z X Y z, z,..., z ), where can be n addition, subtraction or ultiplication in. Then Z can be obtained by coputing X Y x n n n y, x y,..., x y ) z, z,..., z ). That is, the coputation can be perfored concurrently and independently on each residue in. Therefore, addition, subtraction, and ultiplication of two large nubers, individually converted into representations, can be efficiently coputed because of the properties of parallelis and no carries. Assue that we want to copute Q = [ X Y ] in, where X, Y, and Q are positive integers. In Hiasat and Abdel-Aty-Zohdy s algorith, h I) can be coputed the highest power of in the variable I represented by. According to [0], h I) is ipleented by a proper cobinational circuit like a priority encoder and an n-operand binary adder, where n is the nuber of the oduli in. Hiasat and Abdel-Aty-Zohdy s algorith is shown as follows. Step : Set the quotient Q 0. Step : Copute j hx ) and k hy ), where j and k are the highest powers of in X and Y, respectively. Step 3: If j k, then copute Q ' Q, X ' X * Y, Q Q', X X '. Go to Step. Step 4: If j k, then copute X' X Y Step 5: If j k and j' h X '). If j' j then Q Q. Otherwise, Q is unaltered. End the procedure. procedure., then Q is unaltered. End the n

3 International Journal of Coputer, Consuer and Control IJ3C), Vol., No. 03) 6 Hiasat and Abdel-Aty-Zohdy s algorith utilizes addition, subtraction, and ultiplication according to the highest powers of in dividend and divisor to achieve division in. Besides, the algorith perfors division efficiently by avoiding the agnitude detection and overflow detection in. 3. Yang et al. s algorith Assue that we want to copute Q = [ X ] in, Y where X, Y, and Q are integers. Note that h I) denotes the highest power of in the variable I, where I is representation of an integer. For exaple, 0 = 0,, 0) and 7) =,, 3) with the oduli, 3, 5) in, then we have h 0,, 0)) 3 and h,, 3)). Besides, S X ) is defined as the sign of variable X. If S X ) S, it denotes that X and Y are with the sae sign. In addition, the parity checking technique [8] is used in this algorith to deterine the sign of a nuber in. Unlike other sign detection algoriths in using MRC or CRT, the parity checking technique can easily obtain the sign of a nuber in by checking its parity and looking up a table. This technique akes the sign detection and the agnitude coparison in ore efficient. The details of the parity checking technique are available in [8]. Yang et al. s algorith is shown in the following. Step : Set the quotient Q 0 and c 0. Step : Copute j hx ) and k hy ), where j and k are the highest power of in X and Y, respectively. Then, check the signs of X and Y by parity checking. According to the relationships between j and k, we perfor one of the following three steps. Step 3: If j k, we perfor the following operations: Set c. If S X ) S, then we copute Q Q X ' X *, jk jk ', Y Q Q', X X ' ; otherwise, we copute Q Q jk ', jk X ' X * Y, Q Q', and X X '. Go to Step. Step 4: If j k, we perfor the following operations. If S X ) S and c, then we copute X' X Y and j' h X '). If j' j then we copute Q Q. Otherwise, Q is unchanged. End procedure. If S X ) S and c, then we copute X' X Y and check the sign of X ' by parity checking. If X ' 0, then we copute Q Q. Otherwise, we set Q Q. End procedure. If S X ) S and c 0, then we set Q. End procedure. Step 5: If j k, we perfor the following operations. If c 0, then Q is unchanged. End procedure. Otherwise, we copute Q Q. End procedure. In this algorith, the evaluated quotient is jk which is larger than in Hiasat and Abdel-Aty-Zohdy s algorith such that the actual quotient can be obtained quickly in Yang et al. s algorith. Copared with Hiasat and Abdel-Aty-Zohdy s algorith, Yang et al. s algorith reduces the nuber of execution rounds by 50%.

4 International Journal of Coputer, Consuer and Control IJ3C), Vol., No. 03) 6 4. The proposed algorith After observing Yang et al. s algorith, we find h I) and the parity checking technique ust be perfored twice in each round of their algorith. If we decrease the nubers of these two coputations in each round, the execution tie can be reduced. Thus, we propose a bisection ethod in to accoplish this purpose. In the following, our algorith is shown. Input: X, Y : are expressed in ) Output: Q : is expressed in ) Step : Copute j hx ) and k hy ), where j and k are the highest powers of in X and Y, respectively. Step : If j k, then use the parity checking technique to copare X with Y. If X Y, then set Q. Otherwise, set Q 0. End the progra. If j k, then set Q 0. End the progra. j k Step 3: Copute Q u and Q l. Step 4: Copute Q' Q u Ql. If Q ' is odd, then set Q' Q',,...,). Step 5: In our algorith, we define,, and as addition, subtraction, and ultiplication in, respectively. Besides, Copute Q = Q and Z X Q Q u and Q l are the upper and the lower bound of the actual quotient in our algorith, respectively. In Step 4, we copute Q' Q to be the evaluated quotient in each round of our algorith. If all chosen oduli in are odd Y. Then, use the parity checking technique to deterine the sign and the agnitude of Z. Step 6: If Z Y 0, then set Q l Q. Go to Step 3. Step 7: If Z 0, then set Q u Q 3.. Go to Step Step 8: If Y Z 0, then Q is the quotient. End the progra integers, then coputing Q' can be directly ade in without converting it into the binary or the decial syste. For exaple, assue that the ultiplicative inverses of odulo all oduli,,..., n ) in are,,..., ), and the representation of Then, we have n Q ' is q, q,..., q ). n Q' q, q,..., qn ). n n Moreover, the ultiplicative inverses of odulo all oduli in can be precoputed to reduce the coputation tie. 5. Analyses We siulate Hiasat and Abdel-Aty-Zohdy s algorith, Yang et al. s algorith, and our algorith in Visual C++ 6.0, and run the siulation progras for the values of X and Y both ranging fro to Table shows the nubers of execution rounds in these three algoriths, and Table shows the nuber of coputing h I) and the ties of perforing the parity checking technique in these three algoriths. The analysis of the siulation results is shown as follows. In Hiasat and Abdel-Aty-Zohdy s algorith, the evaluated quotient is the power of i.e. = ), and the actual quotient is fored by these evaluated quotients. For exaple, 58 the actual quotient Q 7 33 in Table. After running Hiasat and Abdel-Aty-Zohdy s algorith, Q is fored by Note that even if 7 represented in the binary for is ) 0, Q is probably fored by or another for in Hiasat and

5 International Journal of Coputer, Consuer and Control IJ3C), Vol., No. 03) 63 Abdel-Aty-Zohdy s algorith. This is because the evaluated quotient is underestiated in their algorith such that is fored by 0 0 in the above exaple. In this case, their algorith ust execute two rounds to obtain. This property causes that there are soe redundant rounds in their algorith. Thus, it can be easily observed that the nuber of execution rounds in Hiasat and Abdel-Aty-Zohdy s algorith depends on the coponents of the quotient Q represented in the binary syste. Assue that representing Q in the binary syste requires log Q bits, then the nuber of execution rounds in Hiasat and Abdel-Aty-Zohdy s algorith denoted as rounds ) ust fall in the range shown as Equation ). This is because the axiu nuber of the binary digits used to for Q is log ) Q. log Q rounds ) In our algorith, the range of the actual quotient Q is Q and we use soe techniques in to find Q in this range. With another point of view, our algorith can be regarded as perforing the bisection ethod in to find Q in the interval, ). Thus, the range of the nuber of execution rounds in our algorith denoted as rounds ) is shown as Equation ). rounds log ) ) ) To copare rounds ) with rounds ), we adjust Equations ) and ) in the following steps. Since Q obtained fro Equation )., Equation 3) can be rounds log ) 3) ) For the convenience of the analysis, Equation 3) is rewritten as Equation 4). rounds log ) 4) ) Because log ) log ) log ) log4 Equation 5) can be obtained fro Equation 4)., rounds log ) log4) 5) ) Fro Equation ), Equation 6) is obtained as follows. rounds log3 ) 6) ) Again, Equation 6) can be rewritten as Equation 7). j k rounds log 3 ) 7) Because log3 ) log3 log ) obtain Equation 8) fro Equation 7). ), we rounds log ) log3 8) ) Copared Equation 5) with Equation 8), rounds ) is the double of rounds ). The analysis confirs that Yang et al. s algorith reduces the nuber of execution rounds by 50% and also by coparing with Hiasat and Abdel-Aty-Zohdy s algorith. As the sae reason, the nuber of execution rounds in Yang et al. s algorith also depends on the coponents of the quotient Q represented in the binary syste. Each binary digit of Q in Yang et al. s algorith can be obtained by executing one round because the evaluated quotient is set larger and ore precise. Thus, assue that representing Q in the binary syste requires log Q bits, then the nuber of execution rounds in Yang et al. s algorith, denoted as rounds 3), is shown as Equation 9). 3) rounds logq 9) Using the sae thinking steps fro Equation 3) to Equation 5), Equation 0) can be obtained fro Equation 9). rounds log ) log 4 0) )3 Copared with Equation 8) and Equation 0) denoted as rounds ) is a little less than rounds 3). Table 4 also shows this fact. On the other hand, coputing h I) in is tie-consuing, but Hiasat and Abdel-Aty-Zohdy s algorith and Yang et al. s algorith both needs to copute h I) in each round. However, Our algorith only coputes h I) in the first round. This property greatly reduces the execution tie in

6 International Journal of Coputer, Consuer and Control IJ3C), Vol., No. 03) 64 each round of our algorith. Although our algorith needs to copute the evaluated quotient by Q l ' u Q Q, coputing Q ' by looking up a table is faster than coputing h I) in. As the densities and speed of RAMs increase, the use of looking up tables is beneficial. Besides, our algorith decreases the ties of perforing the parity checking technique in each round. This iproveent also reduces the execution tie in each round of our algorith. Table 5 shows the nubers of coputing h I) and the ties of perforing the parity checking techniques in Hiasat and Abdel-Aty-Zohdy s algorith, Yang et al. s algorith, and our algorith for coputing and Y are all ranging fro to X, where X Y Table : The nubers of execution rounds for the siulations Hiasat and Abdel-Aty-Zohdy s algorith Yang et al. s algorith The nuber of rounds of our algorith The percentage of the nubers of rounds X= ~0000, Y= ~0000 According to Table, our algorith greatly reduces the nuber of coputing h I) and the ties of perforing the parity checking techniques by 46% and 50%, respectively. Consequently, our algorith is uch faster than Yang et al. s algorith even if the execution rounds in our algorith are a little less than those in Yang et al. s algorith. X= ~0000, Y= ~0000 X= ~30000, Y= ~ % 49.3% 49.87% Table : The ties of coputing hi) and the parity checking techniques Hiasat and Abdel-Aty-Zo Yang et al. s hdy s algorith algorith Parity checking technique h I) Conclusions Our algorith In this paper, we propose a division algorith using the bisection ethod in. Assue that the highest powers of in the dividend and divisor are j and k, respectively, then the quotient would fall into the interval, ). Our algorith skillfully finds the quotient in the interval without converting the nubers fro into the binary or the decial syste. Copared with Yang et al. s algorith, our algorith reduces the nuber of the highest power coputation h I) and the parity checking techniques in by 46% and 50%, respectively. According to the siulation results and the analysis in Section 5, it is obvious that our algorith is ore efficient than Yang et al. s algorith. References [] N. Szabo and R. Tanaka, Residue Arithetic and Its Applications to Coputer Technology, McGraw Hill, New York, 967. [] E. Kinoshita, H. Kosako, and Y. Kojia, General Division in the Syetric Residue Nuber Syste, IEEE Transactions on Coputers, Vol., 973, pp [3] D. Banerji, T. Cheung, and V. Ganesan, A High-speed Division Method in Residue Arithetic, Proceedings of 5th IEEE Syposiu on Coputer Arithetic, Michigan, USA, 98, pp [4] W. Chren Jr., A New Residue Nuber Division Algorith, Coputer and Matheatics with Applications, Vol. 9, No. 7, 990, pp [] D. Gaberger, New Approach to Integer

7 International Journal of Coputer, Consuer and Control IJ3C), Vol., No. 03) 65 Division in Residue Nuber Syste, Proceedings of 0th Syposiu on Coputer Arithetic, Grenoble, France, 99, pp [] Y. Kier, P. Cheney, and M. Tannenbau, Division and Overflow Detection in Residue Nuber Systes, IRE Transactions on Electronic Coputers, Vol., 96, pp [3] L. Lin, E. Leiss, and B. Mcinnis, Division and Sign Detection Algorith for Residue Nuber Systes, Coputer and Matheatics with Applications, Vol. 0, 984, pp [4] M. Lu and J. S. Chiang, A Novel Division Algorith for the Residue Nuber Syste, IEEE Transactions on Coputers, Vol. 4, No. 8, 99, pp [5] A. A. Hiasat, and H. S. Abdel-Aty-Zohdy, A High-speed Division Algorith for Residue Nuber Syste, Proceedings of IEEE International Syposiu on Circuits and Systes, Vol. 3, Washington, USA, 995, pp [6] A. A. Hiasat, and H. S. Abdel-Aty-Zohdy, Design and Ipleentation of an Division Algorith, Proceedings of 3th IEEE Syposiu on Coputer Arithetic, California, USA, 997, pp [] J. H. Yang, C. C. Chang, and C. Y. Chen, A High-Speed Division Algorith in Residue Nuber Syste Using Parity-Checking Technique, International Journal of Coputer Matheatics, Vol.8, No. 6, pp , 004. [] D.K.Taleshekaeil and A. Mousavi, The Use of Residue Nuber Syste for Iproving the Digital Iage Processing, Proceedings of 0th IEEE International Conference on Signal Processing, Beijing, China, pp , 00. [3] J. Adikari, V. S. Diitrov, and L. Ibert, Hybrid Binary-Ternary Nuber Syste for Elliptic Curve Cryptosystes, IEEE Transactions on Coputers, Vol. 60, No., pp.54-65, 0. [4] F. Gandino, F. Laberti, P. Montuschi, and J. Bajard, A General Approach for Iproving Montgoery Exponentiation Using Pre-processing, Proceedings of 0th IEEE Syposiu on Coputer Arithetic, Tübingen, Gerany, pp , 0. Chin-Chen Chang received his Ph.D. degree in coputer engineering fro National Chiao Tung University. His first degree is Bachelor of Science in Applied Matheatics and aster degree is Master of Science in coputer and decision sciences. Both were awarded in National Tsing Hua University. Dr. Chang served in National Chung Cheng University fro 989 to 005. His current title is Chair Professor in Departent of Inforation Engineering and Coputer Science, Feng Chia University, fro Feb Prior to joining Feng Chia University, Professor Chang was an associate professor in Chiao Tung University, professor in National Chung Hsing University, chair professor in National Chung Cheng University. He had also been Visiting Researcher and Visiting Scientist to Tokyo University and Kyoto University, Japan. During his service in Chung Cheng, Professor Chang served as Chairan of the Institute of Coputer Science and Inforation Engineering, Dean of College of Engineering, Provost and then Acting President of Chung Cheng University and Director of Advisory Office in Ministry of Education, Taiwan. Professor Chang has won any research awards and honorary positions by and in prestigious organizations both nationally and internationally. He is currently a Fellow of IEEE and a Fellow of IEE, UK. And since his early years of career developent, he consecutively won Outstanding Talent in Inforation Sciences of the R. O. C., AceR Dragon Award of the Ten Most Outstanding Talents, Outstanding Scholar Award of the R. O. C., Outstanding Engineering Professor Award of the R. O. C., Distinguished Research Awards of National Science Council of the R. O. C., Top Fifteen Scholars in Systes and Software Engineering of the Journal of Systes and Software, and so on. On nuerous occasions, he was invited to serve as Visiting Professor, Chair Professor, Honorary Professor, Honorary Director, Honorary Chairan, Distinguished Alunus, Distinguished Researcher, Research Fellow by universities and research institutes. His current research interests include database design, coputer cryptography, iage copression and data structures. Jen-Ho Yang received the B.S. degree in coputer science and inforation engineering fro I-Shou University, Kaoshiung in 00, and the Ph.D. degree in coputer science and inforation

8 International Journal of Coputer, Consuer and Control IJ3C), Vol., No. 03) 66 engineering fro National Chung Cheng University, Chiayi County in 009. Since 009, he has been an assistant professor with the Departent of Multiedia and Mobile Coerce in Kainan University, Taoyuan. His current research interests include electronic coerce, inforation security, cryptography, authentication for wireless environents, digital right anageent, and fast odular ultiplication algorith.

GENERALIZED ARYABHATA REMAINDER THEOREM

GENERALIZED ARYABHATA REMAINDER THEOREM International Journal of Innovative Computing, Information and Control ICIC International c 2010 ISSN 1349-4198 Volume 6, Number 4, April 2010 pp. 1865 1871 GENERALIZED ARYABHATA REMAINDER THEOREM Chin-Chen

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Arithmetic Unit for Complex Number Processing

Arithmetic Unit for Complex Number Processing Abstract Arithetic Unit or Coplex Nuber Processing Dr. Soloon Khelnik, Dr. Sergey Selyutin, Alexandr Viduetsky, Inna Doubson, Seion Khelnik This paper presents developent o a coplex nuber arithetic unit

More information

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China 6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith

More information

Elliptic Curve Scalar Point Multiplication Algorithm Using Radix-4 Booth s Algorithm

Elliptic Curve Scalar Point Multiplication Algorithm Using Radix-4 Booth s Algorithm Elliptic Curve Scalar Multiplication Algorith Using Radix-4 Booth s Algorith Elliptic Curve Scalar Multiplication Algorith Using Radix-4 Booth s Algorith Sangook Moon, Non-eber ABSTRACT The ain back-bone

More information

Finite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields

Finite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields Finite fields I talked in class about the field with two eleents F 2 = {, } and we ve used it in various eaples and hoework probles. In these notes I will introduce ore finite fields F p = {,,...,p } for

More information

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials Inforation Processing Letters 107 008 11 15 www.elsevier.co/locate/ipl Low coplexity bit parallel ultiplier for GF generated by equally-spaced trinoials Haibin Shen a,, Yier Jin a,b a Institute of VLSI

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS

EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS Zhi-Wei Sun Departent of Matheatics, Nanjing University Nanjing 10093, People s Republic of China zwsun@nju.edu.cn Abstract In this paper we establish soe explicit

More information

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters Coplexity reduction in low-delay Farrowstructure-based variable fractional delay FIR filters utilizing linear-phase subfilters Air Eghbali and Håkan Johansson Linköping University Post Print N.B.: When

More information

Efficient Filter Banks And Interpolators

Efficient Filter Banks And Interpolators Efficient Filter Banks And Interpolators A. G. DEMPSTER AND N. P. MURPHY Departent of Electronic Systes University of Westinster 115 New Cavendish St, London W1M 8JS United Kingdo Abstract: - Graphical

More information

s = (Y Q Y P)/(X Q - X P)

s = (Y Q Y P)/(X Q - X P) Elliptic Curves and their Applications in Cryptography Preeti Shara M.Tech Student Mody University of Science and Technology, Lakshangarh Abstract This paper gives an introduction to elliptic curves. The

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

On Concurrent Detection of Errors in Polynomial Basis Multiplication

On Concurrent Detection of Errors in Polynomial Basis Multiplication 1 On Concurrent Detection of Errors in Polynoial Basis Multiplication Siavash Bayat-Saradi and M. Anwar Hasan Abstract The detection of errors in arithetic operations is an iportant issue. This paper discusses

More information

FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers

FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers FPGA Ipleentation of Point Multiplication on Koblitz Curves Using Kleinian Integers V.S. Diitrov 1 K.U. Järvinen 2 M.J. Jacobson, Jr. 3 W.F. Chan 3 Z. Huang 1 February 28, 2012 Diitrov et al. (Univ. Calgary)

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

Short Papers. Test Data Compression and Decompression Based on Internal Scan Chains and Golomb Coding

Short Papers. Test Data Compression and Decompression Based on Internal Scan Chains and Golomb Coding IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 1, NO. 6, JUNE 00 715 Short Papers Test Data Copression and Decopression Based on Internal Scan Chains and Golob Coding

More information

On the Design of an On-line Complex Householder Transform

On the Design of an On-line Complex Householder Transform On the esign of an On-line Coplex Householder Transfor Robert McIlhenny Coputer Science epartent California State University, Northridge Northridge, CA 9330 rcilhen@csunedu Milo s Ercegovac Coputer Science

More information

LONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES

LONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES Journal of Marine Science and Technology, Vol 19, No 5, pp 509-513 (2011) 509 LONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES Ming-Tao Chou* Key words: fuzzy tie series, fuzzy forecasting,

More information

Polynomial Division By Convolution

Polynomial Division By Convolution Applied Matheatics E-Notes, (0), 9 c ISSN 0-0 Available free at irror sites of http://wwwathnthuedutw/aen/ Polynoial Division By Convolution Feng Cheng Chang y Received 9 March 0 Abstract The division

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

LogLog-Beta and More: A New Algorithm for Cardinality Estimation Based on LogLog Counting

LogLog-Beta and More: A New Algorithm for Cardinality Estimation Based on LogLog Counting LogLog-Beta and More: A New Algorith for Cardinality Estiation Based on LogLog Counting Jason Qin, Denys Ki, Yuei Tung The AOLP Core Data Service, AOL, 22000 AOL Way Dulles, VA 20163 E-ail: jasonqin@teaaolco

More information

OBJECTIVES INTRODUCTION

OBJECTIVES INTRODUCTION M7 Chapter 3 Section 1 OBJECTIVES Suarize data using easures of central tendency, such as the ean, edian, ode, and idrange. Describe data using the easures of variation, such as the range, variance, and

More information

Lec 05 Arithmetic Coding

Lec 05 Arithmetic Coding Outline CS/EE 5590 / ENG 40 Special Topics (7804, 785, 7803 Lec 05 Arithetic Coding Lecture 04 ReCap Arithetic Coding About Hoework- and Lab Zhu Li Course Web: http://l.web.ukc.edu/lizhu/teaching/06sp.video-counication/ain.htl

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

Ştefan ŞTEFĂNESCU * is the minimum global value for the function h (x)

Ştefan ŞTEFĂNESCU * is the minimum global value for the function h (x) 7Applying Nelder Mead s Optiization Algorith APPLYING NELDER MEAD S OPTIMIZATION ALGORITHM FOR MULTIPLE GLOBAL MINIMA Abstract Ştefan ŞTEFĂNESCU * The iterative deterinistic optiization ethod could not

More information

An Effective New CRT Based Reverse Converter for a Novel Moduli Set { 2 2n+1 1, 2 2n+1, 2 2n 1 }

An Effective New CRT Based Reverse Converter for a Novel Moduli Set { 2 2n+1 1, 2 2n+1, 2 2n 1 } An Effective New CRT Based Reverse Converter for a Novel Moduli Set +1 1, +1, 1 } Edem Kwedzo Bankas, Kazeem Alagbe Gbolagade Department of Computer Science, Faculty of Mathematical Sciences, University

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

Defect-Aware SOC Test Scheduling

Defect-Aware SOC Test Scheduling Defect-Aware SOC Test Scheduling Erik Larsson +, Julien Pouget*, and Zebo Peng + Ebedded Systes Laboratory + LIRMM* Departent of Coputer Science Montpellier 2 University Linköpings universitet CNRS Sweden

More information

EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS

EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS EMPIRICAL COMPLEXITY ANALYSIS OF A MILP-APPROACH FOR OPTIMIZATION OF HYBRID SYSTEMS Jochen Till, Sebastian Engell, Sebastian Panek, and Olaf Stursberg Process Control Lab (CT-AST), University of Dortund,

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

N-Point. DFTs of Two Length-N Real Sequences

N-Point. DFTs of Two Length-N Real Sequences Coputation of the DFT of In ost practical applications, sequences of interest are real In such cases, the syetry properties of the DFT given in Table 5. can be exploited to ake the DFT coputations ore

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information

A Newton Raphson Divider Based on Improved Reciprocal Approximation Algorithm

A Newton Raphson Divider Based on Improved Reciprocal Approximation Algorithm EE38N High Speed Coputer Arithetic Fall 6 Project Report A Newton Raphson ivider Based on Iproved Reciprocal Approxiation Algorith Gaurav Agrawal Ankit Khandelwal Subitted On ec 4, 6 Abstract Newton Raphson

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

Lecture 21. Interior Point Methods Setup and Algorithm

Lecture 21. Interior Point Methods Setup and Algorithm Lecture 21 Interior Point Methods In 1984, Kararkar introduced a new weakly polynoial tie algorith for solving LPs [Kar84a], [Kar84b]. His algorith was theoretically faster than the ellipsoid ethod and

More information

Revisiting the performance of the modular clock algorithm for distributed blind rendezvous in cognitive radio networks

Revisiting the performance of the modular clock algorithm for distributed blind rendezvous in cognitive radio networks Revisiting the perforance of the odular clock algorith for distributed blind rendezvous in cognitive radio networks Michel Barbeau, Gier Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis To cite this

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

Algebraic Montgomery-Yang problem: the log del Pezzo surface case

Algebraic Montgomery-Yang problem: the log del Pezzo surface case c 2014 The Matheatical Society of Japan J. Math. Soc. Japan Vol. 66, No. 4 (2014) pp. 1073 1089 doi: 10.2969/jsj/06641073 Algebraic Montgoery-Yang proble: the log del Pezzo surface case By DongSeon Hwang

More information

A New Algorithm for Reactive Electric Power Measurement

A New Algorithm for Reactive Electric Power Measurement A. Abiyev, GAU J. Soc. & Appl. Sci., 2(4), 7-25, 27 A ew Algorith for Reactive Electric Power Measureent Adalet Abiyev Girne Aerican University, Departernt of Electrical Electronics Engineering, Mersin,

More information

IN modern society that various systems have become more

IN modern society that various systems have become more Developent of Reliability Function in -Coponent Standby Redundant Syste with Priority Based on Maxiu Entropy Principle Ryosuke Hirata, Ikuo Arizono, Ryosuke Toohiro, Satoshi Oigawa, and Yasuhiko Takeoto

More information

Character analysis on linear elementary algebra with max-plus operation

Character analysis on linear elementary algebra with max-plus operation Available online at www.worldscientificnews.co WSN 100 (2018) 110-123 EISSN 2392-2192 Character analysis on linear eleentary algebra with ax-plus operation ABSTRACT Kalfin 1, Jufra 2, Nora Muhtar 2, Subiyanto

More information

ESE 523 Information Theory

ESE 523 Information Theory ESE 53 Inforation Theory Joseph A. O Sullivan Sauel C. Sachs Professor Electrical and Systes Engineering Washington University 11 Urbauer Hall 10E Green Hall 314-935-4173 (Lynda Marha Answers) jao@wustl.edu

More information

3.3 Variational Characterization of Singular Values

3.3 Variational Characterization of Singular Values 3.3. Variational Characterization of Singular Values 61 3.3 Variational Characterization of Singular Values Since the singular values are square roots of the eigenvalues of the Heritian atrices A A and

More information

A Model for the Selection of Internet Service Providers

A Model for the Selection of Internet Service Providers ISSN 0146-4116, Autoatic Control and Coputer Sciences, 2008, Vol. 42, No. 5, pp. 249 254. Allerton Press, Inc., 2008. Original Russian Text I.M. Aliev, 2008, published in Avtoatika i Vychislitel naya Tekhnika,

More information

Parallel stream cipher for secure high-speed communications

Parallel stream cipher for secure high-speed communications Signal Processing 82 (2002 259 265 www.elsevier.co/locate/sigpro Parallel strea cipher for secure high-speed counications Hoonjae Lee a;, Sangjae Moon b a Departent of Coputer Engineering, Kyungwoon University,

More information

3D acoustic wave modeling with a time-space domain dispersion-relation-based Finite-difference scheme

3D acoustic wave modeling with a time-space domain dispersion-relation-based Finite-difference scheme P-8 3D acoustic wave odeling with a tie-space doain dispersion-relation-based Finite-difference schee Yang Liu * and rinal K. Sen State Key Laboratory of Petroleu Resource and Prospecting (China University

More information

COS 424: Interacting with Data. Written Exercises

COS 424: Interacting with Data. Written Exercises COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well

More information

Handwriting Detection Model Based on Four-Dimensional Vector Space Model

Handwriting Detection Model Based on Four-Dimensional Vector Space Model Journal of Matheatics Research; Vol. 10, No. 4; August 2018 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education Handwriting Detection Model Based on Four-Diensional Vector

More information

(t, m, s)-nets and Maximized Minimum Distance, Part II

(t, m, s)-nets and Maximized Minimum Distance, Part II (t,, s)-nets and Maxiized Miniu Distance, Part II Leonhard Grünschloß and Alexander Keller Abstract The quality paraeter t of (t,, s)-nets controls extensive stratification properties of the generated

More information

Ph 20.3 Numerical Solution of Ordinary Differential Equations

Ph 20.3 Numerical Solution of Ordinary Differential Equations Ph 20.3 Nuerical Solution of Ordinary Differential Equations Due: Week 5 -v20170314- This Assignent So far, your assignents have tried to failiarize you with the hardware and software in the Physics Coputing

More information

An Attack Bound for Small Multiplicative Inverse of ϕ(n) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques

An Attack Bound for Small Multiplicative Inverse of ϕ(n) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques Article An Attack Bound for Sall Multiplicative Inverse of ϕn) od e with a Coposed Prie Su p + q Using Sublattice Based Techniques Pratha Anuradha Kaeswari * and Labadi Jyotsna Departent of Matheatics,

More information

a a a a a a a m a b a b

a a a a a a a m a b a b Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice

More information

Solving initial value problems by residual power series method

Solving initial value problems by residual power series method Theoretical Matheatics & Applications, vol.3, no.1, 13, 199-1 ISSN: 179-9687 (print), 179-979 (online) Scienpress Ltd, 13 Solving initial value probles by residual power series ethod Mohaed H. Al-Sadi

More information

Figure 1: Equivalent electric (RC) circuit of a neurons membrane

Figure 1: Equivalent electric (RC) circuit of a neurons membrane Exercise: Leaky integrate and fire odel of neural spike generation This exercise investigates a siplified odel of how neurons spike in response to current inputs, one of the ost fundaental properties of

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

Structured Illumination Super-Resolution Imaging Achieved by Two Steps based on the Modulation of Background Light Field

Structured Illumination Super-Resolution Imaging Achieved by Two Steps based on the Modulation of Background Light Field 017 nd International Seinar on Applied Physics, Optoelectronics and Photonics (APOP 017) ISBN: 978-1-60595-5-3 Structured Illuination Super-Resolution Iaging Achieved by Two Steps based on the Modulation

More information

Applying Genetic Algorithms to Solve the Fuzzy Optimal Profit Problem

Applying Genetic Algorithms to Solve the Fuzzy Optimal Profit Problem JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 8, 563-58 () Applying Genetic Algoriths to Solve the Fuzzy Optial Profit Proble FENG-TSE LIN AND JING-SHING YAO Departent of Applied Matheatics Chinese Culture

More information

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE Proceeding of the ASME 9 International Manufacturing Science and Engineering Conference MSEC9 October 4-7, 9, West Lafayette, Indiana, USA MSEC9-8466 MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL

More information

Research Article Rapidly-Converging Series Representations of a Mutual-Information Integral

Research Article Rapidly-Converging Series Representations of a Mutual-Information Integral International Scholarly Research Network ISRN Counications and Networking Volue 11, Article ID 5465, 6 pages doi:1.54/11/5465 Research Article Rapidly-Converging Series Representations of a Mutual-Inforation

More information

Combinatorial Primality Test

Combinatorial Primality Test Cobinatorial Priality Test Maheswara Rao Valluri School of Matheatical and Coputing Sciences Fiji National University, Derrick Capus, Suva, Fiji E-ail: aheswara.valluri@fnu.ac.fj Abstract This paper provides

More information

Finite Time Synchronization between Two Different Chaotic Systems with Uncertain Parameters

Finite Time Synchronization between Two Different Chaotic Systems with Uncertain Parameters www.ccsenet.org/cis Coputer and Inforation Science Vol., No. ; August 00 Finite Tie Synchronization between Two Different Chaotic Systes with Uncertain Paraeters Abstract Wanli Yang, Xiaodong Xia, Yucai

More information

Topic 5a Introduction to Curve Fitting & Linear Regression

Topic 5a Introduction to Curve Fitting & Linear Regression /7/08 Course Instructor Dr. Rayond C. Rup Oice: A 337 Phone: (95) 747 6958 E ail: rcrup@utep.edu opic 5a Introduction to Curve Fitting & Linear Regression EE 4386/530 Coputational ethods in EE Outline

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

Explicit Approximate Solution for Finding the. Natural Frequency of the Motion of Pendulum. by Using the HAM

Explicit Approximate Solution for Finding the. Natural Frequency of the Motion of Pendulum. by Using the HAM Applied Matheatical Sciences Vol. 3 9 no. 1 13-13 Explicit Approxiate Solution for Finding the Natural Frequency of the Motion of Pendulu by Using the HAM Ahad Doosthoseini * Mechanical Engineering Departent

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

An improved self-adaptive harmony search algorithm for joint replenishment problems

An improved self-adaptive harmony search algorithm for joint replenishment problems An iproved self-adaptive harony search algorith for joint replenishent probles Lin Wang School of Manageent, Huazhong University of Science & Technology zhoulearner@gail.co Xiaojian Zhou School of Manageent,

More information

C na (1) a=l. c = CO + Clm + CZ TWO-STAGE SAMPLE DESIGN WITH SMALL CLUSTERS. 1. Introduction

C na (1) a=l. c = CO + Clm + CZ TWO-STAGE SAMPLE DESIGN WITH SMALL CLUSTERS. 1. Introduction TWO-STGE SMPLE DESIGN WITH SMLL CLUSTERS Robert G. Clark and David G. Steel School of Matheatics and pplied Statistics, University of Wollongong, NSW 5 ustralia. (robert.clark@abs.gov.au) Key Words: saple

More information

A remark on a success rate model for DPA and CPA

A remark on a success rate model for DPA and CPA A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

Exponential sums and the distribution of inversive congruential pseudorandom numbers with prime-power modulus

Exponential sums and the distribution of inversive congruential pseudorandom numbers with prime-power modulus ACTA ARITHMETICA XCII1 (2000) Exponential sus and the distribution of inversive congruential pseudorando nubers with prie-power odulus by Harald Niederreiter (Vienna) and Igor E Shparlinski (Sydney) 1

More information

Genetic Quantum Algorithm and its Application to Combinatorial Optimization Problem

Genetic Quantum Algorithm and its Application to Combinatorial Optimization Problem Genetic Quantu Algorith and its Application to Cobinatorial Optiization Proble Kuk-Hyun Han Dept. of Electrical Engineering, KAIST, 373-, Kusong-dong Yusong-gu Taejon, 305-70, Republic of Korea khhan@vivaldi.kaist.ac.kr

More information

Congruences and Modular Arithmetic

Congruences and Modular Arithmetic Congruenes and Modular Aritheti 6-17-2016 a is ongruent to b od n eans that n a b. Notation: a = b (od n). Congruene od n is an equivalene relation. Hene, ongruenes have any of the sae properties as ordinary

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October

More information

Bootstrapping Dependent Data

Bootstrapping Dependent Data Bootstrapping Dependent Data One of the key issues confronting bootstrap resapling approxiations is how to deal with dependent data. Consider a sequence fx t g n t= of dependent rando variables. Clearly

More information

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3 A. Find all ordered pairs a, b) of positive integers for which a + b = 3 08. Answer. The six ordered pairs are 009, 08), 08, 009), 009 337, 674) = 35043, 674), 009 346, 673) = 3584, 673), 674, 009 337)

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

Beyond Mere Convergence

Beyond Mere Convergence Beyond Mere Convergence Jaes A. Sellers Departent of Matheatics The Pennsylvania State University 07 Whitore Laboratory University Park, PA 680 sellers@ath.psu.edu February 5, 00 REVISED Abstract In this

More information

Closed-form evaluations of Fibonacci Lucas reciprocal sums with three factors

Closed-form evaluations of Fibonacci Lucas reciprocal sums with three factors Notes on Nuber Theory Discrete Matheatics Print ISSN 30-32 Online ISSN 2367-827 Vol. 23 207 No. 2 04 6 Closed-for evaluations of Fibonacci Lucas reciprocal sus with three factors Robert Frontczak Lesbank

More information

Recovering Data from Underdetermined Quadratic Measurements (CS 229a Project: Final Writeup)

Recovering Data from Underdetermined Quadratic Measurements (CS 229a Project: Final Writeup) Recovering Data fro Underdeterined Quadratic Measureents (CS 229a Project: Final Writeup) Mahdi Soltanolkotabi Deceber 16, 2011 1 Introduction Data that arises fro engineering applications often contains

More information

A note on the realignment criterion

A note on the realignment criterion A note on the realignent criterion Chi-Kwong Li 1, Yiu-Tung Poon and Nung-Sing Sze 3 1 Departent of Matheatics, College of Willia & Mary, Williasburg, VA 3185, USA Departent of Matheatics, Iowa State University,

More information

CHAPTER ONE. Physics and the Life Sciences

CHAPTER ONE. Physics and the Life Sciences Solution anual for Physics for the Life Sciences 2nd Edition by Allang Link download full: http://testbankair.co/download/solution-anual-forphysics-for-the-life-sciences-2nd-edition-by-allang/ CHAPTER

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

Svoboda-Tung Division With No Compensation

Svoboda-Tung Division With No Compensation Svoboda-Tung Division With No Compensation Luis MONTALVO (IEEE Student Member), Alain GUYOT Integrated Systems Design Group, TIMA/INPG 46, Av. Félix Viallet, 38031 Grenoble Cedex, France. E-mail: montalvo@archi.imag.fr

More information

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with

More information

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

Keywords: Estimator, Bias, Mean-squared error, normality, generalized Pareto distribution

Keywords: Estimator, Bias, Mean-squared error, normality, generalized Pareto distribution Testing approxiate norality of an estiator using the estiated MSE and bias with an application to the shape paraeter of the generalized Pareto distribution J. Martin van Zyl Abstract In this work the norality

More information

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat

More information

arxiv: v1 [cs.ds] 29 Jan 2012

arxiv: v1 [cs.ds] 29 Jan 2012 A parallel approxiation algorith for ixed packing covering seidefinite progras arxiv:1201.6090v1 [cs.ds] 29 Jan 2012 Rahul Jain National U. Singapore January 28, 2012 Abstract Penghui Yao National U. Singapore

More information

Introduction to Discrete Optimization

Introduction to Discrete Optimization Prof. Friedrich Eisenbrand Martin Nieeier Due Date: March 9 9 Discussions: March 9 Introduction to Discrete Optiization Spring 9 s Exercise Consider a school district with I neighborhoods J schools and

More information

The Methods of Solution for Constrained Nonlinear Programming

The Methods of Solution for Constrained Nonlinear Programming Research Inventy: International Journal Of Engineering And Science Vol.4, Issue 3(March 2014), PP 01-06 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.co The Methods of Solution for Constrained

More information

Ocean 420 Physical Processes in the Ocean Project 1: Hydrostatic Balance, Advection and Diffusion Answers

Ocean 420 Physical Processes in the Ocean Project 1: Hydrostatic Balance, Advection and Diffusion Answers Ocean 40 Physical Processes in the Ocean Project 1: Hydrostatic Balance, Advection and Diffusion Answers 1. Hydrostatic Balance a) Set all of the levels on one of the coluns to the lowest possible density.

More information

Weighted- 1 minimization with multiple weighting sets

Weighted- 1 minimization with multiple weighting sets Weighted- 1 iniization with ultiple weighting sets Hassan Mansour a,b and Özgür Yılaza a Matheatics Departent, University of British Colubia, Vancouver - BC, Canada; b Coputer Science Departent, University

More information

MODULAR HYPERBOLAS AND THE CONGRUENCE ax 1 x 2 x k + bx k+1 x k+2 x 2k c (mod m)

MODULAR HYPERBOLAS AND THE CONGRUENCE ax 1 x 2 x k + bx k+1 x k+2 x 2k c (mod m) #A37 INTEGERS 8 (208) MODULAR HYPERBOLAS AND THE CONGRUENCE ax x 2 x k + bx k+ x k+2 x 2k c (od ) Anwar Ayyad Departent of Matheatics, Al Azhar University, Gaza Strip, Palestine anwarayyad@yahoo.co Todd

More information

Kinematics and dynamics, a computational approach

Kinematics and dynamics, a computational approach Kineatics and dynaics, a coputational approach We begin the discussion of nuerical approaches to echanics with the definition for the velocity r r ( t t) r ( t) v( t) li li or r( t t) r( t) v( t) t for

More information