Elliptic Curve Scalar Point Multiplication Algorithm Using Radix-4 Booth s Algorithm

Size: px
Start display at page:

Download "Elliptic Curve Scalar Point Multiplication Algorithm Using Radix-4 Booth s Algorithm"

Transcription

1 Elliptic Curve Scalar Multiplication Algorith Using Radix-4 Booth s Algorith Elliptic Curve Scalar Multiplication Algorith Using Radix-4 Booth s Algorith Sangook Moon, Non-eber ABSTRACT The ain back-bone operation in elliptic curve cryptosystes is scalar point ultiplication The ost frequently used ethod ipleenting the scalar point ultiplication, which is perfored in the topost level of ultiplication and division, has been the double-and-add algorith, which is being recently challenged by NAF (Non-Adjacent Forat) algorith In this paper, we propose a ore efficient and novel approach of a scalar ultiplication ethod than the double-and-add by applying redundant recoding which originates fro the radix-4 odied Booth s algorith We call the novel algorith quad-and-add After deriving the algorith, we created a new operation, naed point quadruple, and veried with calculations of a real-world application to utilize it Derived nuerical expressions were veried using both C progras and HDL (Hardware Description Language) Proposed ethod of elliptic curve scalar point ultiplication can be utilized in any elliptic curve security applications for handling efficient and fast calculations Keywords: elliptic curve cryptosyste, scalar point ultiplication,, HDL, security 1 INTRODUCTION As an indispensable coponent of inforation technologies, security applications, such as IC cards used for personal authentication and doestic network applications, play an iportant role In fact, such data security receives constant attention, since people tend to counicate with each other by various electronic devices over networks Security applications are based upon intensive coputations of cryptographic algoriths, which generally involve in arithetic operations in large Galois Fields () [1][] Polynoial basis offers good solutions to ost coputational probles Also, polynoial basis is the easiest to use aong other representations Therefore, we focus on using the polynoial basis throughout this docuent [] 04PSI05: Manuscript received on Deceber 1, 004 ; revised on June, 005 The author is with the Departent of Inforation Security and Electronic Engineering, Mokwon University, Daejeon, Korea E-ail:soon@okwonackr The ost iportant and tie-consuing operation in calculating elliptic curve cryptography (ECC) operations is the scalar point ultiplication, which repeatedly perfors point addition operation as in expression (1) In expression (1), k is an arbitrary integer nuber on a finite field ( ) and P is an arbitrary point on an elliptic curve (EC) defined on the finite field ( ) kp = k P (k ties of point addition) (1) i=1 Figure 1 shows the hierarchical structure of an ECC operation In general, as we intend to perfor one scalar point ultiplication [4], we need a couple of point addition operation ( two points are dferent) and a couple of point double operation ( two points are identical) The ost iportant factor required in the speed-effective ipleentation of a scalar point ultiplication is proper handling of expression (1) Double-and-add algorith has been traditionally prevalent in this area, which is recently being challenged by NAF algorith [5] In this paper, we propose a scalar point ultiplication algorith with a novel approach applying radix-4 Booth s recoding and derive nuerical expressions on the point quadruple operation [6] We evaluated and veried the algoriths using real applications Derived expressions were described with both C progra and HDL to be proven, easuring its perforance iproveent The outline of the paper is as follows: We start by introducing the concept of elliptic curve scalar point ultiplication operation in Chapter In Chapter we discuss our evaluation and validation about our proposed algoriths, and will conclude in Chapter 4 ELLIPTIC CURVE SCALAR POINT - MULTIPLICATION OPERATION AL- GORITHMS In this contribution, we will propose a new approach of obtaining the scalar point ultiplication product based on an EC group First, we ll introduce the fundaental atheatics of the ECC-based cryptosyste, especially for polynoial basis arithetics In section, we discuss the previous studies which have been researched to iprove the coplex EC point ultiplication operation calculation After that, we propose the algorith and a few copleentary forulas in section

2 4 ECTI TRANSACTIONS ON COMPUTER AND INFORMATION THEORY VOL1, NO1 MAY 005 Multiplication Multiplication/ Squaring Division Double Multiplication/ Squaring Division Fig1: Hierarchical structure of an elliptic curve operation 1 Matheatics of the ECC-based cryptosyste Two ain operations are required to ultiply an EC group eleent by a constant when encrypting a essage: point addition and pointdouble operations We also include point negation (Neg) as a iscellaneous operation and point quadruple (Quad) operation, which is about to be suggested for fast ipleentation algorith of kp The elliptic curve E is defined as the set of all solutions (x, y) to the equation y +xy = x +ax +b together with the point at infinity O, where b is not 0 This extra point O is needed to represent the group identity Rules for the above atheatical operation routines except for Quad operation are presented below Rules for the Quad operation are given in section addition: Let P (x 1, y 1 ) and Q(x, y ) be two dferent points on the curve If either point is O, the result is the other point If P = Q, use point double routine If x 1 = x and y 1 y, P + Q = O If P Q, then P + Q = R(x, y ), where x = λ + λ + x 1 + x + a, y = λ(x 1 + x + x + y 1, ( y1 + y ) and λ = x 1 + x () double: Let P (x 1, y 1 ) = Q(x 1, y 1 ) be a point on the curve If x 1 = 0, the result of P is O If x 1 0, (x 1, y 1 ) = R(x, y ), where negation: x = λ + λ + a, y = x 1 + (λ + 1)x, ( and λ = x 1 + y ) 1 x 1 Let P (x 1, y 1 ) be a point on the curve -P = R(x, y ), or () (x, y ) = (x 1, y 1 ) = (x 1, x 1 + y 1 ) (4) Fro the rules above, we can discern the nuber of field operations required to carry out the routine In the point addition routine, 8 additions, 1 ultiplication, 1 division, and 1 squaring are required We should check that the divider of λ, or (x 1 +x ) is not zero The point double routine requires 4 additions, 1 ultiplication, squarings, and 1 division Also, we should check that the divider of λ or x 1 is not zero The point negation routine requires just one addition This operation is needed when ipleenting the fast algorith for the calculation of kp As explained later in section, the values of ( P ) and ( P ) are needed in the algorith we developed As basic atheatics for the ECC-based cryptosyste, ultiplication and division occupy indispensable positions, with the greatest iportance of utilizing the scalarpointultiplication operation, which is to discussed fro below Recent studies Double-and-add algorith has been the leading algorith in ipleenting the scalar point ultiplication in ECC [7] Double-and-add is siilar to the square-and-ultiply algorith in the RSA cryptosyste [8], in which odular exponentiation is ipleented with the algorith Double-and-add algorith is represented in expression (5) as below, when k = 1 i=0 b i i (b i 0, 1) Fro this point on, we will use soe notations The point addition operation will be represented as add( ) and the point double as double( ) Double-and-add algorith for coputing kp kp: k = 1 i=0 b i i (b i 0, 1) P := P (x 1, y 1 ) Q := P for i fro 1 downto 0 do Q := double{q) b i = 1 then

3 Elliptic Curve Scalar Multiplication Algorith Using Radix-4 Booth s Algorith 5 Q := add(p, Q) end (Q = kp ) (5) Note that we need as any nuber of add( ) operations as the nuber of Haing weight in the binary representation of k in addition to at least 1 ties of double( ) In order to iprove the perforance of the algorith above, several algoriths have been suggested One of the algoriths is NAF (Non-Adjacent Forat), as described below in expression (6) ultiplication/ squaring Multiplication Double ultiplication/ squaring Quadruple ultiplication/ squaring Binary NAF ethod for coputing kp kp: division division division Q := 0 NAF (k) = t 1 k i i i=0 for i fro t 1 downto 0 do Q := Q k i = 1 then Q := Q + P k i = 1 then Q := Q P end (Q := kp ) (6) In the above ethod, the concept of redundancy of the binary representation of k is used in calculating kp However, it has a weak point that k should be converted into NAF forat in advance As an iproved approach of the concept of redundancy, we propose a tricky algorith naed quad-and-add algorith which utilizes point quadruple operation, both of which will be discussed in detail in the next section Quad-and-add algorith In order to obtain two ties as fast calculations as double-and-add algorith, we applied radix-4 redundant recoding to the binary presentation of EC point Q Expression (7) shows the concept of using radix- 4 redundancy in pseudo code representation Due to the characteristic of radix-4 redundancy recoding, to- [ tal nuber of steps reduces by half down to ] 1 According to the result of radix-4 recoding of point Q in each step, one out of the adders 0P, ±P, ±P is chosen so that we get the final scalar ultiplication [ ] result in 1 cycles, which is ties as fast as the double-and-add algorith Quad-and-add algorith using radix-4 redundancy kp: [ ] k = 1 i=0 r i4 i (r i is the value of redundancy recoding) P := P (x 1, y 1 ) addition/ negation addition/ negation addition/ negation Fig: Hierarchical structure of elliptic curve operations in suggested algorith P := double(p ) Q := one of {0P, +P, +P, P, P } [ ] for i fro 1 downto 0 do Q := quad(q) (r i == +P ) then Q := add(p, Q) (r i == +P ) then Q := add(p, Q) tepp := neg(p ) tepp := neg(p ) (r i == P ) then (r i == P ) then Q := add(tepp, Q) end (Q := kp) (7) Here, in order to get the quadruple point of a point P on the given EC without using the double( ) operation two consecutive ties, we derived the point quadruple operation (hereafter quad( )) cobining the point addition and point double operation, as in expression (8) Then, the hierarchy shown in Figure 1 becoes slightly odied as Figure quadruple operation (quad( )) P (x 1, y 1 ) = Q(x 1, y 1 ) is identical on an EC x 1 = 0, the result 4P is O (zero at infinity) x 1 0, the result 4P (x 1, y 1 ) = R(x, y ), where x and y are as follows, x = λ + λ + a,

4 6 ECTI TRANSACTIONS ON COMPUTER AND INFORMATION THEORY VOL1, NO1 MAY 005 y = x + ( λ + 1)x, λ = x + λ x 1, (8) x x = λ + λ + a, ( λ = x 1 + y ) 1 x 1 Fro this forula, we can deterine the nuber of field operations The quad( ) routine will require 10 additions, 1 ultiplication, divisions, and 4 squarings Fig shows a siple exaple of coparison between the traditional double-and-add algorith and our proposed new algorith using radix-4 redundant recoding [ Making unsigned nuber Booth s recoding : select aong 0P, +1P, +P, -1P, -P Exaple 1010P 1 P P (P) +P 4 ((P) +P) = 10P Fig: k P ( 0kt 1kt kt k1k0 ) P k k k k k ) P ( b 1 b b 1 0 P -P -P 01010P = P (1P) 4-1P = P (4P-1P) 4 P = 10P Coparison exaple of two algoriths The ] nuber of iterations decreases fro to + 1 steps Table 1 suarizes the iproveent in the nuber of steps and required EC operations The nuber of operations in Table 1 is calculated based on the probability that is dependent on the haing weight of the prie polynoial The probability of the existence of 1 in the binary representation of k during steps in the double-and-add algorith is 05, and the probability of the existence of non-zero Booth s recoding ter is 6/8 The new algorith exhibits a reduction of about 15% in handling Add operations Furtherore, the new algorith is also advantageous because of using Quad operations The Quad routine is induced fro anipulating the expressions in the Double routine resulting in a reduction of 1 field ultiplication, and the proposed algorith can be far ore efficient by enhancing the Quad routine using higher atheatics in future The proposed algorith requires Booth s recoding circuit and eory space for storing the values of P, P, P, and P additionally The nuber of field operations for calculating kp are represented in detail in Table, which deonstrates the efficiency of our proposed algorith We achieved perforance iproveent of about 19% in ultiplication considering that our ultiplier can be used as a squarer, and about 9% in division Table 1: Double- and-add Proposed algorith Coparison of Nuber of operations # of steps Add Double Neg Quad [ ] + 1 [ ] EVALUATION AND VALIDATION We divided the entire scalar ultiplication process into sub-blocks to very the derived expressions of quad( ) operation algorith Sub-blocks were roughly categorized as ultiplier block and divider block Entire prototype processor was siulated using digital control unit designed fro finite state achines, integrating teporary register blocks Overall perforance of the pilot EC processor was veried through siulation using both C test bench progras and HDL at algorithic level Firstly, we ipleented Mastrovito s serial ultiplier [9], which is undoubtedly reliable for verication, in C language level and applied -bit rando binary nubers as test vectors C languagedescribed serial ultiplier does not produce error due to its algorithic originality Result was confired by checking the value of partial results during each step of algorithic process Also, we used divider which was also veried in [1] We used the fact that we ultiply a point by the order of given EC, we get the point at infinity (O), as a special characteristic of EC operations [10], to very the entire scalar point ultiplication process The upper part of Figure represents the process of obtaining the point at infinity using double-and-add algorith at 19 nd level In the lower part of Figure 4, we can see that we get the expected point at infinity at 96th step using quad( ) operation Evaluation was perfored at the level of highest hierarchy, or scalar point ultiplication, in the HDL-described -bit elliptic curve cryptoprocessor Figure 5 shows the block diagra of HDL-described -bit elliptic curve processor We evaluated the perforance focusing on the suggested quad( ) operation Table represents the perforance iproveent Measureent on our -bit cryptoprocessor showed ore than 40% reduction of ultiplication operation and a sall aount of increase in the nuber of division and addition applying sectr as EC paraeters which is suggested by SEG [4] in bit scalar ultiplication Overall perforance gain over the architecture using doubleand-add algorith was about 0%, considering speed and area

5 Elliptic Curve Scalar Multiplication Algorith Using Radix-4 Booth s Algorith 7 double-and-add step# 0:double-and-add 0_D9B67D19_E067C8_0F9E1A_7E8CA14_A65150A_AE617E8F 1_CE9456_07C04AC_9E7DEFB_D9CA01F5_96F97_4CDECF6C step# 1:double 1_756FF0DC_810F7856_0C5F5C_B14481F_A66857B_B151DA 1_07188B7_5B044A9_17ADAC_A9EF8CDC_89CDEBA_F9165 step# :double 1_1549FE4_A8980E6_C9AF6F_4C81D415_00B09840_85FB447 1_C0DDD61E_0CD1960A_59F7FE6_A8660A5_4D9F41E_4BC989F step#190:double-and-add 1_654EB57_65586DB_05FDEBC_511BC95F_D995691_E0E95F9F 0_9CBCACD_87A6A81_97F978_D088E_179790E_589F97 step#191:double 1_5AE784C_9954F598_ C_069EE79_FAA9E_465F8E7 1_BC551A_6D7AE79_4E5EDF9_FA6FB66_DB5D58D_1BC8CAA step#19:double-and-add quad-and-add step# 0: quad-and-add(p) 0_D9B67D19_E067C8_0F9E1A_7E8CA14_A65150A_AE617E8F 1_CE9456_07C04AC_9E7DEFB_D9CA01F5_96F97_4CDECF6C step# 1: quad 1_1549FE4_A8980E6_C9AF6F_4C81D415_00B09840_85FB447 1_C0DDD61E_0CD1960A_59F7FE6_A8660A5_4D9F41E_4BC989F step# 94 : quad -and-add(p) 0_4771CC_8EF4A9_81965AC9_5FBC8DE_4A0FC90_608E77D 0_905C0FE8_0E90B8D0_59C068_C561E98C_495E74_9A87F1D step# 95 : quad -and-add(p) 1_654EB57_65586DB_05FDEBC_511BC95F_D995691_E0E95F9F 0_9CBCACD_87A6A81_97F978_D088E_179790E_589F97 step# 96 : quad -and-add(p) Fig4: Scalar ultiplication coparison using double-and-add and quad-and-add Table : Coparison of Nuber of operations Doubld- Quad-and-add Reduction and-add ratio Multiplication Division Square DISCUSSION AND CONCLUSION We proposed an iproved version of a scalar point ultiplication algorith using the concept of radix-4 redundancy, or point quadruple scalar operation useful in coputing coplex EC operations We applied the test environent in an Elgaal EC cryptosyste using the proposed algorith Designed prototype was veried with both C progra language and HDL Evaluation result showed about ore than 0% perforance enhanceent over the algorith using double-and-add ethod Fast scalar point ultiplication operation can be used in various applications such as encryption / de- serial in encrypted_point (x t, y t ) Fig5: Paraeter registers k f a b x P y P x P y P Add 194 ux sqr_reg ux Sht/ decode ula_in ul_inb ( ) Multiplier 194 div_in 0 ( ) Divider CTL_ROM Teporary registers x t y t div_sel Control Block -bit EC cryptoprocessor prototype cryption using EC operations and electronic signature authentication as well as secure key exchange, and the iportance of its versatility can be too uch ephasized Also, by utilizing the point quadruple operation suggested in this paper, we can expect faster and efficient coputation in ost finite field operations References [1] E R Berlekap, Bit-Serial Reed-Soloon Encoders, IEEE Transactions on Inforation Theory, Vol IT-8, No 6, pp , Nov 198 [] C Paar, P Fleischann, P S-Rodriguez: Fast Arithetic for Public-Key Algoriths in Galois Fields with Coposite Exponents, IEEE Transactions on Coputers, October 1999, Vol 48, No 10, pp [] E Mastrovito : VLSI Architectures for Coputation in Galois Fields, PhD thesis, Dept of Electrical Eng, Linkoping Univ, Sweden, 1991 [4] Neal Koblitz, Elliptic Curve Cryptosystes, Matheatics of Coputation, 48 n177 (1987), pp 0-09 [5] D Hankerson, J L Hernandez, and A Menezes, Software Ipleentation of Elliptic Curve Cryptography over Binary Fields, Crypto95 (1995) [6] Israel Koren, Coputer Arithetic Algoriths, Chapter 6, pp Prentice Hall International, 199 [7] N Koblitz, A Course in Nuber Theory and Cryptography, Springer-Verlag (1991) [8] R L Rivest, A Shair, and L M Adlean,

6 8 ECTI TRANSACTIONS ON COMPUTER AND INFORMATION THEORY VOL1, NO1 MAY 005 A Method for Obtaining Digital Signatures and Public-key Cryptosystes, Counications of the ACM, vol 1, pp (Feb 1978) [9] E D Mastrovito, VLSI Design for ultiplication over finite fields ( ), in Lecture notes in Coputer Science 57, Springer-Verlag, Berlin, pp (Mar 1989) [10] Certico research, SEG: Recoended Elliptic Curve Doain Paraeters (Oct 1999) Sangook Moon was born in Korea, in 1971 He received the BS, MS and PhD degree in electronic engineering fro Yonsei University, Korea in 1995, 1997, and 00 respectively In 004, he joined the Departent of Electronic Engineering at Mokwon University, where he is currently an assistant professor His current research interests include VLSI, crypto-processors, icroprocessors, coputer arithetic, and security-related SoC

s = (Y Q Y P)/(X Q - X P)

s = (Y Q Y P)/(X Q - X P) Elliptic Curves and their Applications in Cryptography Preeti Shara M.Tech Student Mody University of Science and Technology, Lakshangarh Abstract This paper gives an introduction to elliptic curves. The

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials Inforation Processing Letters 107 008 11 15 www.elsevier.co/locate/ipl Low coplexity bit parallel ultiplier for GF generated by equally-spaced trinoials Haibin Shen a,, Yier Jin a,b a Institute of VLSI

More information

Arithmetic Unit for Complex Number Processing

Arithmetic Unit for Complex Number Processing Abstract Arithetic Unit or Coplex Nuber Processing Dr. Soloon Khelnik, Dr. Sergey Selyutin, Alexandr Viduetsky, Inna Doubson, Seion Khelnik This paper presents developent o a coplex nuber arithetic unit

More information

Efficient Filter Banks And Interpolators

Efficient Filter Banks And Interpolators Efficient Filter Banks And Interpolators A. G. DEMPSTER AND N. P. MURPHY Departent of Electronic Systes University of Westinster 115 New Cavendish St, London W1M 8JS United Kingdo Abstract: - Graphical

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

On Concurrent Detection of Errors in Polynomial Basis Multiplication

On Concurrent Detection of Errors in Polynomial Basis Multiplication 1 On Concurrent Detection of Errors in Polynoial Basis Multiplication Siavash Bayat-Saradi and M. Anwar Hasan Abstract The detection of errors in arithetic operations is an iportant issue. This paper discusses

More information

A Division Algorithm Using Bisection Method in Residue Number System

A Division Algorithm Using Bisection Method in Residue Number System International Journal of Coputer, Consuer and Control IJ3C), Vol., No. 03) 59 A Division Algorith Using Bisection Method in Residue Nuber Syste * Chin-Chen Chang and Jen-Ho Yang Abstract. Introduction

More information

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers

FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers FPGA Ipleentation of Point Multiplication on Koblitz Curves Using Kleinian Integers V.S. Diitrov 1 K.U. Järvinen 2 M.J. Jacobson, Jr. 3 W.F. Chan 3 Z. Huang 1 February 28, 2012 Diitrov et al. (Univ. Calgary)

More information

Combinatorial Primality Test

Combinatorial Primality Test Cobinatorial Priality Test Maheswara Rao Valluri School of Matheatical and Coputing Sciences Fiji National University, Derrick Capus, Suva, Fiji E-ail: aheswara.valluri@fnu.ac.fj Abstract This paper provides

More information

On the Design of an On-line Complex Householder Transform

On the Design of an On-line Complex Householder Transform On the esign of an On-line Coplex Householder Transfor Robert McIlhenny Coputer Science epartent California State University, Northridge Northridge, CA 9330 rcilhen@csunedu Milo s Ercegovac Coputer Science

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

An Attack Bound for Small Multiplicative Inverse of ϕ(n) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques

An Attack Bound for Small Multiplicative Inverse of ϕ(n) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques Article An Attack Bound for Sall Multiplicative Inverse of ϕn) od e with a Coposed Prie Su p + q Using Sublattice Based Techniques Pratha Anuradha Kaeswari * and Labadi Jyotsna Departent of Matheatics,

More information

A New Algorithm for Reactive Electric Power Measurement

A New Algorithm for Reactive Electric Power Measurement A. Abiyev, GAU J. Soc. & Appl. Sci., 2(4), 7-25, 27 A ew Algorith for Reactive Electric Power Measureent Adalet Abiyev Girne Aerican University, Departernt of Electrical Electronics Engineering, Mersin,

More information

Revisiting the security model for aggregate signature schemes

Revisiting the security model for aggregate signature schemes Revisiting the security odel for aggregate signature schees by Marie-Sarah Lacharité A thesis presented to the University of Waterloo in fulfillent of the thesis requireent for the degree of Master of

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Short Papers. Test Data Compression and Decompression Based on Internal Scan Chains and Golomb Coding

Short Papers. Test Data Compression and Decompression Based on Internal Scan Chains and Golomb Coding IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 1, NO. 6, JUNE 00 715 Short Papers Test Data Copression and Decopression Based on Internal Scan Chains and Golob Coding

More information

Ensemble Based on Data Envelopment Analysis

Ensemble Based on Data Envelopment Analysis Enseble Based on Data Envelopent Analysis So Young Sohn & Hong Choi Departent of Coputer Science & Industrial Systes Engineering, Yonsei University, Seoul, Korea Tel) 82-2-223-404, Fax) 82-2- 364-7807

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lesson 1 4 October 2017 Outline Learning and Evaluation for Pattern Recognition Notation...2 1. The Pattern Recognition

More information

Comparison of Stability of Selected Numerical Methods for Solving Stiff Semi- Linear Differential Equations

Comparison of Stability of Selected Numerical Methods for Solving Stiff Semi- Linear Differential Equations International Journal of Applied Science and Technology Vol. 7, No. 3, Septeber 217 Coparison of Stability of Selected Nuerical Methods for Solving Stiff Sei- Linear Differential Equations Kwaku Darkwah

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

Ştefan ŞTEFĂNESCU * is the minimum global value for the function h (x)

Ştefan ŞTEFĂNESCU * is the minimum global value for the function h (x) 7Applying Nelder Mead s Optiization Algorith APPLYING NELDER MEAD S OPTIMIZATION ALGORITHM FOR MULTIPLE GLOBAL MINIMA Abstract Ştefan ŞTEFĂNESCU * The iterative deterinistic optiization ethod could not

More information

Genetic Quantum Algorithm and its Application to Combinatorial Optimization Problem

Genetic Quantum Algorithm and its Application to Combinatorial Optimization Problem Genetic Quantu Algorith and its Application to Cobinatorial Optiization Proble Kuk-Hyun Han Dept. of Electrical Engineering, KAIST, 373-, Kusong-dong Yusong-gu Taejon, 305-70, Republic of Korea khhan@vivaldi.kaist.ac.kr

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words) 1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu

More information

a a a a a a a m a b a b

a a a a a a a m a b a b Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice

More information

DTTF/NB479: Dszquphsbqiz Day 27

DTTF/NB479: Dszquphsbqiz Day 27 DTTF/NB479: Dszquphsbqiz Day 27 Announceents: Questions? This week: Discrete Logs, Diffie-Hellan, ElGaal Hash Functions and SHA-1 Birthday attacks Hash Functions Message (long) Cryptographic hash Function,

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

Qualitative Modelling of Time Series Using Self-Organizing Maps: Application to Animal Science

Qualitative Modelling of Time Series Using Self-Organizing Maps: Application to Animal Science Proceedings of the 6th WSEAS International Conference on Applied Coputer Science, Tenerife, Canary Islands, Spain, Deceber 16-18, 2006 183 Qualitative Modelling of Tie Series Using Self-Organizing Maps:

More information

Multicollision Attacks on Some Generalized Sequential Hash Functions

Multicollision Attacks on Some Generalized Sequential Hash Functions Multicollision Attacks on Soe Generalized Sequential Hash Functions M. Nandi David R. Cheriton School of Coputer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada 2nandi@uwaterloo.ca D.

More information

NBN Algorithm Introduction Computational Fundamentals. Bogdan M. Wilamoswki Auburn University. Hao Yu Auburn University

NBN Algorithm Introduction Computational Fundamentals. Bogdan M. Wilamoswki Auburn University. Hao Yu Auburn University NBN Algorith Bogdan M. Wilaoswki Auburn University Hao Yu Auburn University Nicholas Cotton Auburn University. Introduction. -. Coputational Fundaentals - Definition of Basic Concepts in Neural Network

More information

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters Coplexity reduction in low-delay Farrowstructure-based variable fractional delay FIR filters utilizing linear-phase subfilters Air Eghbali and Håkan Johansson Linköping University Post Print N.B.: When

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lessons 7 20 Dec 2017 Outline Artificial Neural networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

Parallel stream cipher for secure high-speed communications

Parallel stream cipher for secure high-speed communications Signal Processing 82 (2002 259 265 www.elsevier.co/locate/sigpro Parallel strea cipher for secure high-speed counications Hoonjae Lee a;, Sangjae Moon b a Departent of Coputer Engineering, Kyungwoon University,

More information

LONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES

LONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES Journal of Marine Science and Technology, Vol 19, No 5, pp 509-513 (2011) 509 LONG-TERM PREDICTIVE VALUE INTERVAL WITH THE FUZZY TIME SERIES Ming-Tao Chou* Key words: fuzzy tie series, fuzzy forecasting,

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

IN modern society that various systems have become more

IN modern society that various systems have become more Developent of Reliability Function in -Coponent Standby Redundant Syste with Priority Based on Maxiu Entropy Principle Ryosuke Hirata, Ikuo Arizono, Ryosuke Toohiro, Satoshi Oigawa, and Yasuhiko Takeoto

More information

Low-complexity, Low-memory EMS algorithm for non-binary LDPC codes

Low-complexity, Low-memory EMS algorithm for non-binary LDPC codes Low-coplexity, Low-eory EMS algorith for non-binary LDPC codes Adrian Voicila,David Declercq, François Verdier ETIS ENSEA/CP/CNRS MR-85 954 Cergy-Pontoise, (France) Marc Fossorier Dept. Electrical Engineering

More information

A remark on a success rate model for DPA and CPA

A remark on a success rate model for DPA and CPA A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

A Generalized Permanent Estimator and its Application in Computing Multi- Homogeneous Bézout Number

A Generalized Permanent Estimator and its Application in Computing Multi- Homogeneous Bézout Number Research Journal of Applied Sciences, Engineering and Technology 4(23): 5206-52, 202 ISSN: 2040-7467 Maxwell Scientific Organization, 202 Subitted: April 25, 202 Accepted: May 3, 202 Published: Deceber

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS

EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS EXPLICIT CONGRUENCES FOR EULER POLYNOMIALS Zhi-Wei Sun Departent of Matheatics, Nanjing University Nanjing 10093, People s Republic of China zwsun@nju.edu.cn Abstract In this paper we establish soe explicit

More information

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS A Thesis Presented to The Faculty of the Departent of Matheatics San Jose State University In Partial Fulfillent of the Requireents

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

Birthday Paradox Calculations and Approximation

Birthday Paradox Calculations and Approximation Birthday Paradox Calculations and Approxiation Joshua E. Hill InfoGard Laboratories -March- v. Birthday Proble In the birthday proble, we have a group of n randoly selected people. If we assue that birthdays

More information

A Model for the Selection of Internet Service Providers

A Model for the Selection of Internet Service Providers ISSN 0146-4116, Autoatic Control and Coputer Sciences, 2008, Vol. 42, No. 5, pp. 249 254. Allerton Press, Inc., 2008. Original Russian Text I.M. Aliev, 2008, published in Avtoatika i Vychislitel naya Tekhnika,

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

Homework 3 Solutions CSE 101 Summer 2017

Homework 3 Solutions CSE 101 Summer 2017 Hoework 3 Solutions CSE 0 Suer 207. Scheduling algoriths The following n = 2 jobs with given processing ties have to be scheduled on = 3 parallel and identical processors with the objective of iniizing

More information

arxiv: v3 [cs.ds] 22 Mar 2016

arxiv: v3 [cs.ds] 22 Mar 2016 A Shifting Bloo Filter Fraewor for Set Queries arxiv:1510.03019v3 [cs.ds] Mar 01 ABSTRACT Tong Yang Peing University, China yangtongeail@gail.co Yuanun Zhong Nanjing University, China un@sail.nju.edu.cn

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks 1 Optial Resource Allocation in Multicast Device-to-Device Counications Underlaying LTE Networks Hadi Meshgi 1, Dongei Zhao 1 and Rong Zheng 2 1 Departent of Electrical and Coputer Engineering, McMaster

More information

Analyzing Simulation Results

Analyzing Simulation Results Analyzing Siulation Results Dr. John Mellor-Cruey Departent of Coputer Science Rice University johnc@cs.rice.edu COMP 528 Lecture 20 31 March 2005 Topics for Today Model verification Model validation Transient

More information

Handwriting Detection Model Based on Four-Dimensional Vector Space Model

Handwriting Detection Model Based on Four-Dimensional Vector Space Model Journal of Matheatics Research; Vol. 10, No. 4; August 2018 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education Handwriting Detection Model Based on Four-Diensional Vector

More information

CHAPTER 19: Single-Loop IMC Control

CHAPTER 19: Single-Loop IMC Control When I coplete this chapter, I want to be able to do the following. Recognize that other feedback algoriths are possible Understand the IMC structure and how it provides the essential control features

More information

NUMERICAL MODELLING OF THE TYRE/ROAD CONTACT

NUMERICAL MODELLING OF THE TYRE/ROAD CONTACT NUMERICAL MODELLING OF THE TYRE/ROAD CONTACT PACS REFERENCE: 43.5.LJ Krister Larsson Departent of Applied Acoustics Chalers University of Technology SE-412 96 Sweden Tel: +46 ()31 772 22 Fax: +46 ()31

More information

Using a De-Convolution Window for Operating Modal Analysis

Using a De-Convolution Window for Operating Modal Analysis Using a De-Convolution Window for Operating Modal Analysis Brian Schwarz Vibrant Technology, Inc. Scotts Valley, CA Mark Richardson Vibrant Technology, Inc. Scotts Valley, CA Abstract Operating Modal Analysis

More information

Quantum public-key cryptosystems based on induced trapdoor one-way transformations

Quantum public-key cryptosystems based on induced trapdoor one-way transformations Quantu public-key cryptosystes based on induced trapdoor one-way transforations Li Yang a, Min Liang a, Bao Li a, Lei Hu a, Deng-Guo Feng b arxiv:1012.5249v2 [quant-ph] 12 Jul 2011 a State Key Laboratory

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October

More information

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks

Intelligent Systems: Reasoning and Recognition. Artificial Neural Networks Intelligent Systes: Reasoning and Recognition Jaes L. Crowley MOSIG M1 Winter Seester 2018 Lesson 7 1 March 2018 Outline Artificial Neural Networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

Kinematics and dynamics, a computational approach

Kinematics and dynamics, a computational approach Kineatics and dynaics, a coputational approach We begin the discussion of nuerical approaches to echanics with the definition for the velocity r r ( t t) r ( t) v( t) li li or r( t t) r( t) v( t) t for

More information

Research Article Rapidly-Converging Series Representations of a Mutual-Information Integral

Research Article Rapidly-Converging Series Representations of a Mutual-Information Integral International Scholarly Research Network ISRN Counications and Networking Volue 11, Article ID 5465, 6 pages doi:1.54/11/5465 Research Article Rapidly-Converging Series Representations of a Mutual-Inforation

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

Estimation of ADC Nonlinearities from the Measurement in Input Voltage Intervals

Estimation of ADC Nonlinearities from the Measurement in Input Voltage Intervals Estiation of ADC Nonlinearities fro the Measureent in Input Voltage Intervals M. Godla, L. Michaeli, 3 J. Šaliga, 4 R. Palenčár,,3 Deptartent of Electronics and Multiedia Counications, FEI TU of Košice,

More information

PEA: Polymorphic Encryption Algorithm based on quantum computation. Nikos Komninos* and Georgios Mantas

PEA: Polymorphic Encryption Algorithm based on quantum computation. Nikos Komninos* and Georgios Mantas Int. J. Systes, Control and Counications, Vol. 3, No., PEA: Polyorphic Encryption Algorith based on quantu coputation Nikos Koninos* and Georgios Mantas Algoriths and Security Group, Athens Inforation

More information

Ph 20.3 Numerical Solution of Ordinary Differential Equations

Ph 20.3 Numerical Solution of Ordinary Differential Equations Ph 20.3 Nuerical Solution of Ordinary Differential Equations Due: Week 5 -v20170314- This Assignent So far, your assignents have tried to failiarize you with the hardware and software in the Physics Coputing

More information

Recovering Data from Underdetermined Quadratic Measurements (CS 229a Project: Final Writeup)

Recovering Data from Underdetermined Quadratic Measurements (CS 229a Project: Final Writeup) Recovering Data fro Underdeterined Quadratic Measureents (CS 229a Project: Final Writeup) Mahdi Soltanolkotabi Deceber 16, 2011 1 Introduction Data that arises fro engineering applications often contains

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

Finite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields

Finite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields Finite fields I talked in class about the field with two eleents F 2 = {, } and we ve used it in various eaples and hoework probles. In these notes I will introduce ore finite fields F p = {,,...,p } for

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases

A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases A New Bit-Serial Architecture for Field Multiplication Using Polynomial Bases Arash Reyhani-Masoleh Department of Electrical and Computer Engineering The University of Western Ontario London, Ontario,

More information

Lecture 21. Interior Point Methods Setup and Algorithm

Lecture 21. Interior Point Methods Setup and Algorithm Lecture 21 Interior Point Methods In 1984, Kararkar introduced a new weakly polynoial tie algorith for solving LPs [Kar84a], [Kar84b]. His algorith was theoretically faster than the ellipsoid ethod and

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

Linear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions

Linear recurrences and asymptotic behavior of exponential sums of symmetric boolean functions Linear recurrences and asyptotic behavior of exponential sus of syetric boolean functions Francis N. Castro Departent of Matheatics University of Puerto Rico, San Juan, PR 00931 francis.castro@upr.edu

More information

Goals of Cryptography. Definition of a Cryptosystem. Security Kerckhoff's Requirements

Goals of Cryptography. Definition of a Cryptosystem. Security Kerckhoff's Requirements Goals of Cryptography Chapter : Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network Transport Layer Chapter 4: Security

More information

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China 6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

Accuracy of the Scaling Law for Experimental Natural Frequencies of Rectangular Thin Plates

Accuracy of the Scaling Law for Experimental Natural Frequencies of Rectangular Thin Plates The 9th Conference of Mechanical Engineering Network of Thailand 9- October 005, Phuket, Thailand Accuracy of the caling Law for Experiental Natural Frequencies of Rectangular Thin Plates Anawat Na songkhla

More information

A High-Speed Processor for Digital Sine/Cosine Generation and Angle Rotation*

A High-Speed Processor for Digital Sine/Cosine Generation and Angle Rotation* Copyright IEEE 998: Published the proceedgs of the nd Asiloar Conference on Signals, Systes and Coputers, Nov -4, 998, at Asiloar, California, USA A High-Speed Processor for Digital Se/Cose Generation

More information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub

More information

SUPERIOR-ORDER CURVATURE-CORRECTED PROGRAMMABLE VOLTAGE REFERENCES

SUPERIOR-ORDER CURVATURE-CORRECTED PROGRAMMABLE VOLTAGE REFERENCES SUPEIO-ODE CUATUE-COECTED POGAMMABLE OLTAGE EFEENCES Cosin Popa e-ail: cosin@golanapubro Faculty of Electronics and Telecounications, University Politehnica of Bucharest, B dul Iuliu Maniu 1-3, Bucuresti,

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

Polynomial Division By Convolution

Polynomial Division By Convolution Applied Matheatics E-Notes, (0), 9 c ISSN 0-0 Available free at irror sites of http://wwwathnthuedutw/aen/ Polynoial Division By Convolution Feng Cheng Chang y Received 9 March 0 Abstract The division

More information

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models 2014 IEEE International Syposiu on Inforation Theory Copression and Predictive Distributions for Large Alphabet i.i.d and Markov odels Xiao Yang Departent of Statistics Yale University New Haven, CT, 06511

More information

Jitter Estimation with High Accuracy for Oscillator-Based TRNGs

Jitter Estimation with High Accuracy for Oscillator-Based TRNGs Jitter Estiation with High Accuracy for Oscillator-Based TRNGs Shaofeng Zhu 1,2, Hua Chen 1, Liin Fan 1, Meihui Chen 1,2, Wei Xi 3, and Dengguo Feng 1 1 Trusted Coputing and Inforation Assurance Laboratory,

More information

Genetic Algorithm Search for Stent Design Improvements

Genetic Algorithm Search for Stent Design Improvements Genetic Algorith Search for Stent Design Iproveents K. Tesch, M.A. Atherton & M.W. Collins, South Bank University, London, UK Abstract This paper presents an optiisation process for finding iproved stent

More information

Analytical solution for nonlinear Gas Dynamic equation by Homotopy Analysis Method

Analytical solution for nonlinear Gas Dynamic equation by Homotopy Analysis Method Available at http://pvau.edu/aa Appl. Appl. Math. ISSN: 932-9466 Vol. 4, Issue (June 29) pp. 49 54 (Previously, Vol. 4, No. ) Applications and Applied Matheatics: An International Journal (AAM) Analytical

More information

Multi-Scale/Multi-Resolution: Wavelet Transform

Multi-Scale/Multi-Resolution: Wavelet Transform Multi-Scale/Multi-Resolution: Wavelet Transfor Proble with Fourier Fourier analysis -- breaks down a signal into constituent sinusoids of different frequencies. A serious drawback in transforing to the

More information

lecture 36: Linear Multistep Mehods: Zero Stability

lecture 36: Linear Multistep Mehods: Zero Stability 95 lecture 36: Linear Multistep Mehods: Zero Stability 5.6 Linear ultistep ethods: zero stability Does consistency iply convergence for linear ultistep ethods? This is always the case for one-step ethods,

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering

More information