On the Design of an On-line Complex Householder Transform

Size: px
Start display at page:

Download "On the Design of an On-line Complex Householder Transform"

Transcription

1 On the esign of an On-line Coplex Householder Transfor Robert McIlhenny Coputer Science epartent California State University, Northridge Northridge, CA 9330 Milo s Ercegovac Coputer Science epartent University of California, os Angeles os Angeles, CA ilos@csuclaedu Abstract In this paper, we present an ipleentation for the Coplex Householder Transfor, using coplex nuber on-line arithetic, based on adopting a redundant coplex nuber syste (RCNS) to represent coplex operands as a single nuber We present coparisons with (i) a real nuber on-line arithetic approach, and (ii) a real nuber arithetic parallel approach, to deonstrate a signi cant iproveent in cost I INTROUCTION The Householder Transfor [4] is an iportant operation in nuerous signal processing applications, including QR decoption and array processing [7] When the eleents of the atrix are coplex nubers, it is denoted the Coplex Householder Transfor (CHT) [2] The CHT is applied to a colun vector x to zero out all the eleents except the rst one Given a colun vector x =[x,,x k ] T C k, where x = x e jθ with θ R, the basic steps of the CHT algorith are: (i) de ne a colun vector u = x + e jθ x 2 e, where e T =[, 0,,0]; (ii) de ne the k k CHT B as: B = I 2 u H u uuh () (iii) apply the atrix B to the vector x to produce a colun vector y = Bx, in which all eleents are zeroed out except for the rst eleent, ie B B 2 B k B 2 B 22 B 2k B k B k2 B kk x x 2 x k = In these steps, I is the k k identity atrix and u H is the coplex conjugate transpose of u The paraeter e jθ = x, where x xx is the coplex conjugate of x The paraeter x 2 is the nor of x of degree two, in which x 2 = x x + + x kx k The product uh u produces a single real value in which u H u = u u + u 2u u ku k, since u is a colun vector and u H is a row vector The product uu H is a k k atrix V, in which each real eleent v ij = u i u j y 0 0 (2) II COMPEX NUMBER ON-INE FOATING-POINT ARITHMETIC On-line arithetic [3] is a class of arithetic operations in which all operations are perfored digit serially, in a ost signi cant digit rst (MSF) anner Several advantages, copared to conventional parallel arithetic, include: (i) ability to overlap dependent operations, since on-line algoriths produce the output serially, ost-signi cant digit rst, enabling successive operations to begin before previous operations have copleted; (ii) low-bandwidth counication, since interediate results pass to and fro odules digitserially, so connections need only be one digit wide; and (iii) support for variable precision, since once a desired precision is obtained, successive outputs can be ignored One of the key paraeters of on-line arithetic is the on-line delay, de ned as the nuber of digits of the operand(s) necessary in order to generate the rst digit of the result, which is gnerally one cycle after the result is coputed Each successive digit of the result is generated one per cycle This is illustrated in Figure, with on-line delay δ =4 The latency of an on-line arithetic operator, assuing -digit precision is then δ + input copute output Fig δ=4 On-line delay of a function Coplex nuber on-line arithetic [6] uses a class of online arithetic operators on coplex nuber operands For ef cient representation, a Redundant Coplex Nuber Syste (RCNS) [] is adopted A RCNS is a radix rj syste, in which digits are in the set { a,,0,,a}, where r 2 and r 2 /2 a r 2 Such a nuber syste can be denoted RCNS rj,a A Redundant Coplex Nuber Syste with r =2, a =3denoted RCNS 2j,3, allows ease of the de nition of priitive on-line arithetic odules, as well as ease of conversion to and fro other representations /06/$

2 This nuber syste was introduced as Quarter-iaginary Nuber Syste in [5] At the binary level, the digits will be represented using borrow-save encoding, in which each digit x k { 3, 2,, 0,, 2, 3} is represented as 4 bits (x + k,,x k,,x+ k,0,x k,0 ) such that x k =2x + k, 2x k, + x+ k,0 x k,0 This is an extension of radix 2 borrow-save encoding, in which each digit x k {, 0, } is represented as 2 bits (x + k,x k ) such that x k = x + k x k The throughput of a radix 2j on-line arithetic operator is the sae as for the radix 2 ipleentation of a coplex arithetic operator A radix 2j on-line arithetic operator generates real and iaginary digits in alternate cycles, with each radix 2j digit corresponding to two radix 2 digits The equivalent radix 2 ipleentation of a coplex on-line arithetic operator generates real and iaginary digits in the sae cycle This is deonstrated below for the output of two radix 2j borrow-save encoded digits z =(z, +,z,,z+,0,z,0 ) and z 2 =(z 2, +,z 2,,z+ 2,0,z 2,0 ), and four radix 2 borrow-save encoded digits, consisting of real digits z R, =(z + R,,z R, ) and z R,2 =(z + R,2,z R,2 ) and iaginary digits z I, =(z + I,,z I, ) and z I,2 =(z + I,2,z I,2 ) Radix-2: RCNS z + R, z + 2j,3 : R,2 z - R, z - R,2 z + z + I, I,2 z z Ī, Ī,2 Fig 2 z +, z + 2, z -, z - 2, z + z +,0 2,0 z - z -,0 2,0 Throughput of radix 2 and radix 2j digits Since the throughputs are equal (differing only in respective on-line delays), a radix 2j output can be converted to a radix 2 forat for input to radix 2 on-line arithetic operators, and vice versa, at the digit level The algorith below deonstrates the conversion fro a radix 2j borrow-save digit z k =(z + k,,z k,,z+ k,0,z k,0 ) to equivalent individual real and iaginary radix 2 borrow-save digits z R,k =(z + R,k,z R,k ) and z I,k =(z + I,k,z I,k ) Radix 2j to Radix 2 Borrow-save Conversion if k od 4=0 then (z + R,k,z R,k )=(z+ k,0,z k,0 ) (z + I,k,z I,k )=(z+ k+,0, z k+,0 ) else if k od 4= then (z + R,k,z R,k )=(z+ k+,0, z k+,0 ) (z + I,k,z I,k )=(z+ k,0, z k,0 ) else if k od 4=2 then (z + R,k,z R,k )=(z+ k,0, z k,0 ) (z + I,k,z I,k )=(z+ k+,0,z k+,0 ) else if k od 4=3 then (z + R,k,z R,k )=(z+ k+,0,z k+,0 ) (z + I,k,z I,k )=(z+ k,0,z k,0 ) The algorith below deonstrates conversion fro real and iaginary radix 2 borrow-save digits z R,k =(z + R,k,z R,k ) and z I,k = (z + I,k,z I,k ) to a radix 2j borrow-save digit z k = (z + k,,z k,,z+ k,0,z k,0 ) Radix 2 to Radix 2j Borrow-save Conversion if k od 4=0 then (z + k,,z k,,z+ k,0,z k,0 )=(z+ R,k,z R,k,z+ R,k,z R,k ) else if k od 4= then (z + k,,z k,,z+ k,0,z k,0 )=(z+ I,k, z I,k, z+ I,k, z I,k ) else if k od 4=2 then (z + k,,z k,,z+ k,0,z k,0 )=(z+ R,k, z R,k, z+ R,k, z R,k ) else if k od 4=3 then (z + k,,z k,,z+ k,0,z k,0 )=(z+ I,k,z I,k,z+ I,k,z I,k ) Using a radix 2j representation, a oating-point coplex nuber x =(X R + jx I ) (2j) ex can be noralized with regard either to the real coponent X R or the iaginary coponent X I, depending on which has larger absolute value The exponent e x is shared between the real and iaginary coponent A radix 2j fraction x is considered noralized if 2 ax( X R, X I ) < The noralization algorith which takes as input the generated output digit z k, the output exponent e z and the on-line delay for the arithetic operation δ is shown below NORM(z k,e z,δ) done =0 while not(done) loop if k =(δ 2) and z k 0then e z = e z +2 done = if k =(δ ) and z k 0and not(done) then e z = e z + done = else if k δ and z k =0and not(done) then e z = e z else if (k δ and z k 0) then done = end if end loop Although RCNS 2j,3 allows exibility in representation, there are also several drawbacks: Handling digits 3 and 3 requires producing signi cand ultiples 3X and 3X, requiring an extra addition step A signi cand X with fractional real and iaginary coponents X R and X I can have integer digits, such as (322) 2j = j, which can coplicate ensuring coplex signi cands within the range ax( X R, X I ) < Several recoding algoriths to handle these issues are described, including: (i) digit-set recoding; and (ii) ostsigni cant-digit recoding 39

3 igit-set recoding initially recodes a RCNS 2j,3 digit x k { 3,,3} into a pair of digits (t k 2,w k ),inwhicht k 2 {, 0, } and w k { 2,,2} such that x k = 4t k 2 + w k ThenaRCNS 2j,2 digit χ k is coputed as χ k = t k +w k In order to restrict χ k { 2,,2}, two cases of pairs of values ust be prevented: (i) t k =, w k = 2, (ii) t k =, w k = 2 Todoso,x k+2 is exained If x k+2 2 and x k =2, which could allow the rst case, x k is recoded as (, 2), otherwise as (0, 2) In the sae way, if x k+2 2 and x k = 2, which could allow the second case, x k is recoded as (, 2), otherwise as (0, 2) Then it is assured that χ k { 2,,2} The digit-set recoding algorith SREC is shown below SREC(x k,x k+2 ) (, ) if x k = 3 (, 2) if x k = 2 and x k+2 2 (0, 2) if x k = 2 and x k+2 < 2 (0, ) if x k = (t k 2,w k )= (0, 0) if x k =0 (0, ) if x k = (0, 2) if x k =2and x k+2 > 2 (, 2) if x k =2and x k+2 2 (, ) if x k =3 χ k = t k + w k In order to handle carries produced when perforing operations on signi cands consisting of RCNS 2j,3 digits, ostsigni cant-digit recoding recodes ost-signi cant residual digits w,w 0 {, 0, } of respective weights (2j) =2j and (2j) 0 =, and digits w,w 2 { 3,,3}, of respective weights (2j) and (2j) 2, into digits ω,ω 2 { 3,,3} of respective weights (2j) and (2j) 2 The algorith MSREC for recoding general digits w k 2 and w k into digit ω k is shown next MSREC(w k 2,w k ) ω k = 3 if (w k 2 =0and w k = 3) or (w k 2 =and w k =) 2 if (w k 2 =0and w k = 2) or (w k 2 =and w k =2) if (w k 2 =0and w k = ) or (w k 2 =and w k =3) 0 if w k 2 =0and w k =0 if (w k 2 =0and w k =)or (w k 2 = and w k = 3) 2 if (w k 2 =0and w k =2)or (w k 2 = and w k = 2) 3 if (w k 2 =0and w k =3)or (w k 2 = and w k = ) III CHT IMPEMENTATION The CHT produces a coplex colun vector y k in which y is the only non-zero eleent Siplifying the coputation results in x y = e jθ x x 2 = x + + x kx k x x (3) The ipleentation requires k coplex ultipliers (CMUT), k real adders (RA), real divider (RIV), a real square root unit (RSQRT), a unit to negate a digit (NEG), and a coplex-real ultiplier (CRMUT) as shown in Figure 3 Since the product of a coplex-conjugate ultiplier is a real nuber, radix 2j to radix 2 converters will be used to convert the outputs into radix 2 representation for input to the real adders ikewise, radix 2 to radix 2j converters will be used to convert the output of the real square root unit to radix 2j representation for input to the coplexreal ultiplier, which produces the coplex output y The recurrence algoriths and designs of the radix 2j on-line oating-point coplex-conjugate ultiplier and the radix 2j on-line oating-point coplex-real ultiplier are described next x k x k * CMUT RA Fig 3 x 2 x 2 * CMUT RA RIV RA RSQRT x x * CMUT CRMUT y NEG Coputational graph of CHT A Radix 2j on-line oating-point coplex-conjugate ultiplication Radix 2j oating-point coplex-conjugate ultiplication (z = xx )isde ned such that given inputs x = (X R + jx I ) (2j) ex and x = (X R jx I ) (2j) ex, the output z =(Z R + jz I ) (2j) ez is produced such that Z R = XR 2 + X2 I Z I =0 (4) e z =2e x The recurrence forula for radix 2j on-line ultiplication (z = xy) is the following: W [k] = (2j)(W [k ] z [ k ]) +(2j) δ+ (X[k]y k+δ + Y [k ]x k+δ ) z k = W E [k] (5) 320

4 where W E [k] is the low-precision estiate of the even-indexed (real) coponent of W [k] For radix 2j on-line oating-point coplex-conjugate ultiplication (z = xx ), since { x k+δ = xk+δ if k + δ is even { x k+δ if k + δ is odd WE [k] if k + δ is even z = 0 if k + δ is odd the recurrence can be rewritten as (2j)(W [k ]) + (2j) δ+ ((2X R [k ] +x k+δ (2j) k δ+ )x k+δ ) if k + δ is even W [k] = (2j)(W [k ] z k ) +(2j) δ+ ( 2X I [k ] x k+δ (2j) k δ+ )x k+δ ) if k + δ is odd For the ipleentation, two types of odular slices are required An odd-indexed slice M 2k (k = to /2 ) consists of one borrow-save digit ultiplier, a 2: borrowsave digit adder, a digit-wide latch, a ip- op, a bit-wide ip- op, a digit-wide ip- op, a TWICE unit for coputing 2X[k ], a 3-to- for appropriately appending digit x k to vector 2X[k ], and a 2-to- for appropriately shifting the residual An even-indexed slice M 2k (k = to /2 ) consists of a digit-wide latch, a bit-wide ip- op, and a TWICE unit for coputing 2X[k ] A ag bit eo controls switching between odd-indexed and even-indexed slices (eo =for an odd-indexed slice, and eo =0for an even-indexed slice) The CONJ unit generates digits of x The digit x k is recoded into digit set { 2,,2} using one SREC unit The ost-signi cant digit of the recurrence is deterined using one MSREC unit, which perfors output digit selection as well as handles ost signi cant carry-out bits of the adder The MUT2E unit ultiplies the operand exponent by two to produce the output exponent e z The NORM unit noralizes the result by updating the output exponent e z The design of a -digit signi cand and e-bit exponent radix 2j on-line oating-point coplex-conjugate ultiplier unit is shown in Figure 4 The nuber of individual odule types utilized, the cost per odule type, and the total overall cost are suarized in Table I Assuing =24and e =8, the cost is 224 CB slices The on-line delay is δ =9 B Radix 2j on-line oating point coplex-real ultiplication Radix 2j oating-point coplex-real ultiplication (z = xy) isde ned such that given coplex input x = (X R + jx I ) (2j) ex and real input y = Y (2) ey, the output z = (Z R + jz I ) (2j) ez is produced such that (6) (7) Z R = X R Y Z I = X I Y e z = e x + e y (8) TABE I COST OF RAIX 2j ON-INE FOATING-POINT COMPEX-CONJUGATE MUTIPIER x k SREC e x CONJ MUT2E e z eo Fig 4 START NORM e z Module Count CB slices MUT2E e CONJ 4 SREC 2 3-to to- 2 BS ult ( ) 2 2 BS adder (2:) 2 2 MSREC 0 NORM 2e Total cost e +26 M MSREC z k-δ 2: "0" M 2 M 3 2: M - TWICE TWICE TWICE TWICE TWICE Radix 2j on-line oating-point coplex-conjugate ultiplier For radix 2j on-line oating-point coplex-real ultiplication, the recurrence fro Equation 5 can be rewritten as: (2j)(W [k ] z k ) +(2j) δ+ (X[k]y k+δ + Y [k ]x k+δ ) if k + δ is even W [k] = (2j)(W [k ] z k ) +(2j) δ+ (Y [k ]x k+δ ) if k + δ is odd (9) For the ipleentation two types of odular slices are required An odd-indexed slice M 2k (k = to /2 ) consists of one borrow-save digit ultiplier, a 2: borrowsave digit adder, a digit-wide latch, a bit-wide ip- op, and a digit-wide ip- op An even-indexed slice M 2k (k = to /2 ) consists of two borrow-save digit ultipliers, a 3: borrow-save digit adder, two digit-wide latches, a bit-wide ip- op, and a digit-wide ip- op The digits x k and y k are recoded into the digit set { 2,,2} using two SREC units The ost-signi cant digits of the recurrence are deterined using two MSREC units, which perfor output digit selection 2: M "" "0" 32

5 as well as handling the ost signi cant carry-out bits of the adder The AE unit adds the operand exponents to produce the output exponent e z The NORM unit noralizes the result by updating the output exponent e z The design of a -digit signi cand and e-bit exponent radix 2j on-line oating-point coplex-real ultiplier unit is shown in Figure 5 The nuber of individual odule types utilized, the cost per odule type, and the total overall cost are suarized in Table II Assuing =24and e =8, the cost is 356 CB slices The on-line delay is δ =9 TABE II COST OF RAIX 2j ON-INE FOATING-POINT COMPEX-REA MUTIPIER Module Count CB slices AE e SREC BS ult ( ) 2 6 BS adder (3:) 2 4 BS adder (2:) 2 2 MSREC 2 20 NORM 2e Total cost 2 +3e digit (or bit) signi cands and 8-bit exponents, as shown in Table III TABE III COMPARISON OF CB COSTS FOR CHT k Radix 2j Radix 2 Radix 2 on-line on-line parallel The delay of the proposed radix 2j on-line network, and the alternative radix 2 on-line network and the radix 2 parallel network are copared for the ipleentation of CHT unit for various values of k In each case, we assue oatingpoint operands consisting of 24-digit (or bit) signi cands and 8-bit exponents, as shown in Table IV TABE IV COMPARISON OF CYCE ATENCIES FOR CHT k Radix 2j Radix 2 Radix 2 on-line on-line parallel IV CONCUSION We have deonstrated a new approach for the ipleentation of a CHT unit, based on using coplex nuber online arithetic odules which adopt a redundant coplex nuber syste (RCNS) for ef cient representation Signi cant iproveent in cost in coparison to a radix 2 on-line approach and a radix 2 parallel approach, as well as a significant reduction in latency in coparison to a radix 2 parallel approach have been shown This otivates the research into other application to utilize coplex on-line arithetic Fig 5 Radix 2j on-line oating-point coplex-real ultiplier Three approaches for the design of the CHT are copared: (i) a radix 2j approach which uses a cobination of radix 2j on-line arithetic odules for coplex inputs and radix 2 online arithetic odules for real inputs; (ii) a radix 2 approach which strictly uses radix 2 on-line arithetic odules; and (iii) a radix 2 parallel approach which uses the Xilinx library of oating-point parallel arithetic operators [8] The results in ters of cost and latency are shown next The cost of the proposed radix 2j on-line network, and the alternative radix 2 on-line network and the radix 2 parallel network are copared for the ipleentation of CHT unit which operates on a k-digit vector x, for various values of k In each case, we assue oating-point operands consisting of REFERENCES [] T Aoki, Y Ohi, and T Higuchi, Redundant coplex nuber arithetic for high-speed signal processing, 995 IEEE Workshop on VSI Signal Processing, Oct 995, pp [2] K- Chung and W-M Yan, The coplex householder transfor, IEEE transactions on signal processing, Vol 45, no 9, Sept 997, pp [3] M Ercegovac and T ang, igital arithetic, Morgan Kaufann Publishers, 2004 [4] AS Householder, Unitary triangularization of a nonsyetric atrix, Journal of the ACM, 5 (4), 58, pp [5] E Knuth, The art of coputer prograing, Vol 2, 973 [6] R McIlhenny, Coplex nuber on-line arithetic for recon gurable hardware: algoriths, ipleentations, and applications, Ph issertation, University of California, os Angeles, 2002 [7] CFT Tang, KJR iu, SF Hsieh, and K Yao, VSI algoriths and architectures for coplex householder transforation with applications to array processing, University of Maryland, College Park, Technical Report TR 9-84, 99, pp -36 [8] Xilinx Corporation, Xilinx ata Book,

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials

Low complexity bit parallel multiplier for GF(2 m ) generated by equally-spaced trinomials Inforation Processing Letters 107 008 11 15 www.elsevier.co/locate/ipl Low coplexity bit parallel ultiplier for GF generated by equally-spaced trinoials Haibin Shen a,, Yier Jin a,b a Institute of VLSI

More information

Arithmetic Unit for Complex Number Processing

Arithmetic Unit for Complex Number Processing Abstract Arithetic Unit or Coplex Nuber Processing Dr. Soloon Khelnik, Dr. Sergey Selyutin, Alexandr Viduetsky, Inna Doubson, Seion Khelnik This paper presents developent o a coplex nuber arithetic unit

More information

Elliptic Curve Scalar Point Multiplication Algorithm Using Radix-4 Booth s Algorithm

Elliptic Curve Scalar Point Multiplication Algorithm Using Radix-4 Booth s Algorithm Elliptic Curve Scalar Multiplication Algorith Using Radix-4 Booth s Algorith Elliptic Curve Scalar Multiplication Algorith Using Radix-4 Booth s Algorith Sangook Moon, Non-eber ABSTRACT The ain back-bone

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Ch 12: Variations on Backpropagation

Ch 12: Variations on Backpropagation Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith

More information

Design and FPGA Implementation of Radix-10 Algorithm for Division with Limited Precision Primitives

Design and FPGA Implementation of Radix-10 Algorithm for Division with Limited Precision Primitives Design and FPGA Implementation of Radix-10 Algorithm for Division with Limited Precision Primitives Miloš D. Ercegovac Computer Science Department Univ. of California at Los Angeles California Robert McIlhenny

More information

A New Algorithm for Reactive Electric Power Measurement

A New Algorithm for Reactive Electric Power Measurement A. Abiyev, GAU J. Soc. & Appl. Sci., 2(4), 7-25, 27 A ew Algorith for Reactive Electric Power Measureent Adalet Abiyev Girne Aerican University, Departernt of Electrical Electronics Engineering, Mersin,

More information

Using a De-Convolution Window for Operating Modal Analysis

Using a De-Convolution Window for Operating Modal Analysis Using a De-Convolution Window for Operating Modal Analysis Brian Schwarz Vibrant Technology, Inc. Scotts Valley, CA Mark Richardson Vibrant Technology, Inc. Scotts Valley, CA Abstract Operating Modal Analysis

More information

Efficient Filter Banks And Interpolators

Efficient Filter Banks And Interpolators Efficient Filter Banks And Interpolators A. G. DEMPSTER AND N. P. MURPHY Departent of Electronic Systes University of Westinster 115 New Cavendish St, London W1M 8JS United Kingdo Abstract: - Graphical

More information

A Division Algorithm Using Bisection Method in Residue Number System

A Division Algorithm Using Bisection Method in Residue Number System International Journal of Coputer, Consuer and Control IJ3C), Vol., No. 03) 59 A Division Algorith Using Bisection Method in Residue Nuber Syste * Chin-Chen Chang and Jen-Ho Yang Abstract. Introduction

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information

Lecture 9 November 23, 2015

Lecture 9 November 23, 2015 CSC244: Discrepancy Theory in Coputer Science Fall 25 Aleksandar Nikolov Lecture 9 Noveber 23, 25 Scribe: Nick Spooner Properties of γ 2 Recall that γ 2 (A) is defined for A R n as follows: γ 2 (A) = in{r(u)

More information

COS 424: Interacting with Data. Written Exercises

COS 424: Interacting with Data. Written Exercises COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

a a a a a a a m a b a b

a a a a a a a m a b a b Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice

More information

Generalized Sampling Theorem for Bandpass Signals

Generalized Sampling Theorem for Bandpass Signals Hindawi Publishing Corporation EURASIP Journal on Applied Signal Processing Volue 26, Article ID 59587, Pages 6 DOI 55/ASP/26/59587 Generalized Sapling Theore for Bandpass Signals Ales Prokes Departent

More information

FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers

FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers FPGA Ipleentation of Point Multiplication on Koblitz Curves Using Kleinian Integers V.S. Diitrov 1 K.U. Järvinen 2 M.J. Jacobson, Jr. 3 W.F. Chan 3 Z. Huang 1 February 28, 2012 Diitrov et al. (Univ. Calgary)

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

A Model for the Selection of Internet Service Providers

A Model for the Selection of Internet Service Providers ISSN 0146-4116, Autoatic Control and Coputer Sciences, 2008, Vol. 42, No. 5, pp. 249 254. Allerton Press, Inc., 2008. Original Russian Text I.M. Aliev, 2008, published in Avtoatika i Vychislitel naya Tekhnika,

More information

Lecture 13 Eigenvalue Problems

Lecture 13 Eigenvalue Problems Lecture 13 Eigenvalue Probles MIT 18.335J / 6.337J Introduction to Nuerical Methods Per-Olof Persson October 24, 2006 1 The Eigenvalue Decoposition Eigenvalue proble for atrix A: Ax = λx with eigenvalues

More information

Linear Transformations

Linear Transformations Linear Transforations Hopfield Network Questions Initial Condition Recurrent Layer p S x W S x S b n(t + ) a(t + ) S x S x D a(t) S x S S x S a(0) p a(t + ) satlins (Wa(t) + b) The network output is repeatedly

More information

arxiv: v1 [math.nt] 14 Sep 2014

arxiv: v1 [math.nt] 14 Sep 2014 ROTATION REMAINDERS P. JAMESON GRABER, WASHINGTON AND LEE UNIVERSITY 08 arxiv:1409.411v1 [ath.nt] 14 Sep 014 Abstract. We study properties of an array of nubers, called the triangle, in which each row

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

Construction of the Electronic Angular Wave Functions and Probability Distributions of the Hydrogen Atom

Construction of the Electronic Angular Wave Functions and Probability Distributions of the Hydrogen Atom Construction of the Electronic Angular Wave Functions and Probability Distributions of the Hydrogen Ato Thoas S. Kuntzlean Mark Ellison John Tippin Departent of Cheistry Departent of Cheistry Departent

More information

NBN Algorithm Introduction Computational Fundamentals. Bogdan M. Wilamoswki Auburn University. Hao Yu Auburn University

NBN Algorithm Introduction Computational Fundamentals. Bogdan M. Wilamoswki Auburn University. Hao Yu Auburn University NBN Algorith Bogdan M. Wilaoswki Auburn University Hao Yu Auburn University Nicholas Cotton Auburn University. Introduction. -. Coputational Fundaentals - Definition of Basic Concepts in Neural Network

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

Finite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields

Finite fields. and we ve used it in various examples and homework problems. In these notes I will introduce more finite fields Finite fields I talked in class about the field with two eleents F 2 = {, } and we ve used it in various eaples and hoework probles. In these notes I will introduce ore finite fields F p = {,,...,p } for

More information

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe

. The univariate situation. It is well-known for a long tie that denoinators of Pade approxiants can be considered as orthogonal polynoials with respe PROPERTIES OF MULTIVARIATE HOMOGENEOUS ORTHOGONAL POLYNOMIALS Brahi Benouahane y Annie Cuyt? Keywords Abstract It is well-known that the denoinators of Pade approxiants can be considered as orthogonal

More information

Explicit solution of the polynomial least-squares approximation problem on Chebyshev extrema nodes

Explicit solution of the polynomial least-squares approximation problem on Chebyshev extrema nodes Explicit solution of the polynoial least-squares approxiation proble on Chebyshev extrea nodes Alfredo Eisinberg, Giuseppe Fedele Dipartiento di Elettronica Inforatica e Sisteistica, Università degli Studi

More information

Ufuk Demirci* and Feza Kerestecioglu**

Ufuk Demirci* and Feza Kerestecioglu** 1 INDIRECT ADAPTIVE CONTROL OF MISSILES Ufuk Deirci* and Feza Kerestecioglu** *Turkish Navy Guided Missile Test Station, Beykoz, Istanbul, TURKEY **Departent of Electrical and Electronics Engineering,

More information

Order Recursion Introduction Order versus Time Updates Matrix Inversion by Partitioning Lemma Levinson Algorithm Interpretations Examples

Order Recursion Introduction Order versus Time Updates Matrix Inversion by Partitioning Lemma Levinson Algorithm Interpretations Examples Order Recursion Introduction Order versus Tie Updates Matrix Inversion by Partitioning Lea Levinson Algorith Interpretations Exaples Introduction Rc d There are any ways to solve the noral equations Solutions

More information

A Newton Raphson Divider Based on Improved Reciprocal Approximation Algorithm

A Newton Raphson Divider Based on Improved Reciprocal Approximation Algorithm EE38N High Speed Coputer Arithetic Fall 6 Project Report A Newton Raphson ivider Based on Iproved Reciprocal Approxiation Algorith Gaurav Agrawal Ankit Khandelwal Subitted On ec 4, 6 Abstract Newton Raphson

More information

DIGIT-SERIAL ARITHMETIC

DIGIT-SERIAL ARITHMETIC DIGIT-SERIAL ARITHMETIC 1 Modes of operation:lsdf and MSDF Algorithm and implementation models LSDF arithmetic MSDF: Online arithmetic TIMING PARAMETERS 2 radix-r number system: conventional and redundant

More information

Detection and Estimation Theory

Detection and Estimation Theory ESE 54 Detection and Estiation Theory Joseph A. O Sullivan Sauel C. Sachs Professor Electronic Systes and Signals Research Laboratory Electrical and Systes Engineering Washington University 11 Urbauer

More information

Supporting Information for Supression of Auger Processes in Confined Structures

Supporting Information for Supression of Auger Processes in Confined Structures Supporting Inforation for Supression of Auger Processes in Confined Structures George E. Cragg and Alexander. Efros Naval Research aboratory, Washington, DC 20375, USA 1 Solution of the Coupled, Two-band

More information

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians Using EM To Estiate A Probablity Density With A Mixture Of Gaussians Aaron A. D Souza adsouza@usc.edu Introduction The proble we are trying to address in this note is siple. Given a set of data points

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

Chapter 10: Sinusoidal Steady-State Analysis

Chapter 10: Sinusoidal Steady-State Analysis Chapter 0: Sinusoidal Steady-State Analysis Sinusoidal Sources If a circuit is driven by a sinusoidal source, after 5 tie constants, the circuit reaches a steady-state (reeber the RC lab with t τ). Consequently,

More information

Chapter 5: Solutions to Exercises

Chapter 5: Solutions to Exercises 1 DIGITAL ARITHMETIC Miloš D. Ercegovac and Tomás Lang Morgan Kaufmann Publishers, an imprint of Elsevier Science, c 2004 Updated: September 9, 2003 Chapter 5: Solutions to Selected Exercises With contributions

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

Low-complexity, Low-memory EMS algorithm for non-binary LDPC codes

Low-complexity, Low-memory EMS algorithm for non-binary LDPC codes Low-coplexity, Low-eory EMS algorith for non-binary LDPC codes Adrian Voicila,David Declercq, François Verdier ETIS ENSEA/CP/CNRS MR-85 954 Cergy-Pontoise, (France) Marc Fossorier Dept. Electrical Engineering

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

N-Point. DFTs of Two Length-N Real Sequences

N-Point. DFTs of Two Length-N Real Sequences Coputation of the DFT of In ost practical applications, sequences of interest are real In such cases, the syetry properties of the DFT given in Table 5. can be exploited to ake the DFT coputations ore

More information

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition

Pattern Recognition and Machine Learning. Learning and Evaluation for Pattern Recognition Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lesson 1 4 October 2017 Outline Learning and Evaluation for Pattern Recognition Notation...2 1. The Pattern Recognition

More information

VLSI Arithmetic. Lecture 9: Carry-Save and Multi-Operand Addition. Prof. Vojin G. Oklobdzija University of California

VLSI Arithmetic. Lecture 9: Carry-Save and Multi-Operand Addition. Prof. Vojin G. Oklobdzija University of California VLSI Arithmetic Lecture 9: Carry-Save and Multi-Operand Addition Prof. Vojin G. Oklobdzija University of California http://www.ece.ucdavis.edu/acsel Carry-Save Addition* *from Parhami 2 June 18, 2003 Carry-Save

More information

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words) 1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu

More information

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat

More information

Chapter 6: Solutions to Exercises

Chapter 6: Solutions to Exercises 1 DIGITAL ARITHMETIC Miloš D. Ercegovac and Tomás Lang Morgan Kaufmann Publishers, an imprint of Elsevier Science, c 00 Updated: September 3, 003 With contributions by Elisardo Antelo and Fabrizio Lamberti

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

Chapter 10: Sinusoidal Steady-State Analysis

Chapter 10: Sinusoidal Steady-State Analysis Chapter 0: Sinusoidal Steady-State Analysis Sinusoidal Sources If a circuit is driven by a sinusoidal source, after 5 tie constants, the circuit reaches a steady-state (reeber the RC lab with t = τ). Consequently,

More information

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters

Complexity reduction in low-delay Farrowstructure-based. filters utilizing linear-phase subfilters Coplexity reduction in low-delay Farrowstructure-based variable fractional delay FIR filters utilizing linear-phase subfilters Air Eghbali and Håkan Johansson Linköping University Post Print N.B.: When

More information

Divisibility of Polynomials over Finite Fields and Combinatorial Applications

Divisibility of Polynomials over Finite Fields and Combinatorial Applications Designs, Codes and Cryptography anuscript No. (will be inserted by the editor) Divisibility of Polynoials over Finite Fields and Cobinatorial Applications Daniel Panario Olga Sosnovski Brett Stevens Qiang

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2017 Lessons 7 20 Dec 2017 Outline Artificial Neural networks Notation...2 Introduction...3 Key Equations... 3 Artificial

More information

Curious Bounds for Floor Function Sums

Curious Bounds for Floor Function Sums 1 47 6 11 Journal of Integer Sequences, Vol. 1 (018), Article 18.1.8 Curious Bounds for Floor Function Sus Thotsaporn Thanatipanonda and Elaine Wong 1 Science Division Mahidol University International

More information

Multi-Scale/Multi-Resolution: Wavelet Transform

Multi-Scale/Multi-Resolution: Wavelet Transform Multi-Scale/Multi-Resolution: Wavelet Transfor Proble with Fourier Fourier analysis -- breaks down a signal into constituent sinusoids of different frequencies. A serious drawback in transforing to the

More information

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate

The Simplex Method is Strongly Polynomial for the Markov Decision Problem with a Fixed Discount Rate The Siplex Method is Strongly Polynoial for the Markov Decision Proble with a Fixed Discount Rate Yinyu Ye April 20, 2010 Abstract In this note we prove that the classic siplex ethod with the ost-negativereduced-cost

More information

1 Proof of learning bounds

1 Proof of learning bounds COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #4 Scribe: Akshay Mittal February 13, 2013 1 Proof of learning bounds For intuition of the following theore, suppose there exists a

More information

(t, m, s)-nets and Maximized Minimum Distance, Part II

(t, m, s)-nets and Maximized Minimum Distance, Part II (t,, s)-nets and Maxiized Miniu Distance, Part II Leonhard Grünschloß and Alexander Keller Abstract The quality paraeter t of (t,, s)-nets controls extensive stratification properties of the generated

More information

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product.

Reed-Muller Codes. m r inductive definition. Later, we shall explain how to construct Reed-Muller codes using the Kronecker product. Coding Theory Massoud Malek Reed-Muller Codes An iportant class of linear block codes rich in algebraic and geoetric structure is the class of Reed-Muller codes, which includes the Extended Haing code.

More information

A remark on a success rate model for DPA and CPA

A remark on a success rate model for DPA and CPA A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance

More information

OBJECTIVES INTRODUCTION

OBJECTIVES INTRODUCTION M7 Chapter 3 Section 1 OBJECTIVES Suarize data using easures of central tendency, such as the ean, edian, ode, and idrange. Describe data using the easures of variation, such as the range, variance, and

More information

Comparison of Stability of Selected Numerical Methods for Solving Stiff Semi- Linear Differential Equations

Comparison of Stability of Selected Numerical Methods for Solving Stiff Semi- Linear Differential Equations International Journal of Applied Science and Technology Vol. 7, No. 3, Septeber 217 Coparison of Stability of Selected Nuerical Methods for Solving Stiff Sei- Linear Differential Equations Kwaku Darkwah

More information

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China 6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith

More information

lecture 36: Linear Multistep Mehods: Zero Stability

lecture 36: Linear Multistep Mehods: Zero Stability 95 lecture 36: Linear Multistep Mehods: Zero Stability 5.6 Linear ultistep ethods: zero stability Does consistency iply convergence for linear ultistep ethods? This is always the case for one-step ethods,

More information

NUMERICAL MODELLING OF THE TYRE/ROAD CONTACT

NUMERICAL MODELLING OF THE TYRE/ROAD CONTACT NUMERICAL MODELLING OF THE TYRE/ROAD CONTACT PACS REFERENCE: 43.5.LJ Krister Larsson Departent of Applied Acoustics Chalers University of Technology SE-412 96 Sweden Tel: +46 ()31 772 22 Fax: +46 ()31

More information

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13

CSE525: Randomized Algorithms and Probabilistic Analysis May 16, Lecture 13 CSE55: Randoied Algoriths and obabilistic Analysis May 6, Lecture Lecturer: Anna Karlin Scribe: Noah Siegel, Jonathan Shi Rando walks and Markov chains This lecture discusses Markov chains, which capture

More information

Seismic Analysis of Structures by TK Dutta, Civil Department, IIT Delhi, New Delhi.

Seismic Analysis of Structures by TK Dutta, Civil Department, IIT Delhi, New Delhi. Seisic Analysis of Structures by K Dutta, Civil Departent, II Delhi, New Delhi. Module 5: Response Spectru Method of Analysis Exercise Probles : 5.8. or the stick odel of a building shear frae shown in

More information

BINARY extension fields GF (2 m ) are heavily used

BINARY extension fields GF (2 m ) are heavily used This article has been accepte for publication in a future issue of this journal, but has not been fully eite. Content ay change prior to final publication. Citation inforation: DOI 0.09/TC.205.248408,

More information

i ij j ( ) sin cos x y z x x x interchangeably.)

i ij j ( ) sin cos x y z x x x interchangeably.) Tensor Operators Michael Fowler,2/3/12 Introduction: Cartesian Vectors and Tensors Physics is full of vectors: x, L, S and so on Classically, a (three-diensional) vector is defined by its properties under

More information

INTELLECTUAL DATA ANALYSIS IN AIRCRAFT DESIGN

INTELLECTUAL DATA ANALYSIS IN AIRCRAFT DESIGN INTELLECTUAL DATA ANALYSIS IN AIRCRAFT DESIGN V.A. Koarov 1, S.A. Piyavskiy 2 1 Saara National Research University, Saara, Russia 2 Saara State Architectural University, Saara, Russia Abstract. This article

More information

RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS

RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS BIT Nuerical Matheatics 43: 459 466, 2003. 2003 Kluwer Acadeic Publishers. Printed in The Netherlands 459 RESTARTED FULL ORTHOGONALIZATION METHOD FOR SHIFTED LINEAR SYSTEMS V. SIMONCINI Dipartiento di

More information

3.3 Variational Characterization of Singular Values

3.3 Variational Characterization of Singular Values 3.3. Variational Characterization of Singular Values 61 3.3 Variational Characterization of Singular Values Since the singular values are square roots of the eigenvalues of the Heritian atrices A A and

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

Matrix Inversion-Less Signal Detection Using SOR Method for Uplink Large-Scale MIMO Systems

Matrix Inversion-Less Signal Detection Using SOR Method for Uplink Large-Scale MIMO Systems Matrix Inversion-Less Signal Detection Using SOR Method for Uplin Large-Scale MIMO Systes Xinyu Gao, Linglong Dai, Yuting Hu, Zhongxu Wang, and Zhaocheng Wang Tsinghua National Laboratory for Inforation

More information

On Concurrent Detection of Errors in Polynomial Basis Multiplication

On Concurrent Detection of Errors in Polynomial Basis Multiplication 1 On Concurrent Detection of Errors in Polynoial Basis Multiplication Siavash Bayat-Saradi and M. Anwar Hasan Abstract The detection of errors in arithetic operations is an iportant issue. This paper discusses

More information

INNER CONSTRAINTS FOR A 3-D SURVEY NETWORK

INNER CONSTRAINTS FOR A 3-D SURVEY NETWORK eospatial Science INNER CONSRAINS FOR A 3-D SURVEY NEWORK hese notes follow closely the developent of inner constraint equations by Dr Willie an, Departent of Building, School of Design and Environent,

More information

Finding Rightmost Eigenvalues of Large Sparse. Non-symmetric Parameterized Eigenvalue Problems. Abstract. Introduction

Finding Rightmost Eigenvalues of Large Sparse. Non-symmetric Parameterized Eigenvalue Problems. Abstract. Introduction Finding Rightost Eigenvalues of Large Sparse Non-syetric Paraeterized Eigenvalue Probles Applied Matheatics and Scientific Coputation Progra Departent of Matheatics University of Maryland, College Par,

More information

A High-Speed Processor for Digital Sine/Cosine Generation and Angle Rotation*

A High-Speed Processor for Digital Sine/Cosine Generation and Angle Rotation* Copyright IEEE 998: Published the proceedgs of the nd Asiloar Conference on Signals, Systes and Coputers, Nov -4, 998, at Asiloar, California, USA A High-Speed Processor for Digital Se/Cose Generation

More information

A method to determine relative stroke detection efficiencies from multiplicity distributions

A method to determine relative stroke detection efficiencies from multiplicity distributions A ethod to deterine relative stroke detection eiciencies ro ultiplicity distributions Schulz W. and Cuins K. 2. Austrian Lightning Detection and Inoration Syste (ALDIS), Kahlenberger Str.2A, 90 Vienna,

More information

An Adaptive UKF Algorithm for the State and Parameter Estimations of a Mobile Robot

An Adaptive UKF Algorithm for the State and Parameter Estimations of a Mobile Robot Vol. 34, No. 1 ACTA AUTOMATICA SINICA January, 2008 An Adaptive UKF Algorith for the State and Paraeter Estiations of a Mobile Robot SONG Qi 1, 2 HAN Jian-Da 1 Abstract For iproving the estiation accuracy

More information

Use of PSO in Parameter Estimation of Robot Dynamics; Part One: No Need for Parameterization

Use of PSO in Parameter Estimation of Robot Dynamics; Part One: No Need for Parameterization Use of PSO in Paraeter Estiation of Robot Dynaics; Part One: No Need for Paraeterization Hossein Jahandideh, Mehrzad Navar Abstract Offline procedures for estiating paraeters of robot dynaics are practically

More information

Quantum Chemistry Exam 2 Take-home Solutions

Quantum Chemistry Exam 2 Take-home Solutions Cheistry 60 Fall 07 Dr Jean M Standard Nae KEY Quantu Cheistry Exa Take-hoe Solutions 5) (0 points) In this proble, the nonlinear variation ethod will be used to deterine an approxiate solution for the

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2016 Lessons 7 14 Dec 2016 Outline Artificial Neural networks Notation...2 1. Introduction...3... 3 The Artificial

More information

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,

More information

Bootstrapping Dependent Data

Bootstrapping Dependent Data Bootstrapping Dependent Data One of the key issues confronting bootstrap resapling approxiations is how to deal with dependent data. Consider a sequence fx t g n t= of dependent rando variables. Clearly

More information

An Attack Bound for Small Multiplicative Inverse of ϕ(n) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques

An Attack Bound for Small Multiplicative Inverse of ϕ(n) mod e with a Composed Prime Sum p + q Using Sublattice Based Techniques Article An Attack Bound for Sall Multiplicative Inverse of ϕn) od e with a Coposed Prie Su p + q Using Sublattice Based Techniques Pratha Anuradha Kaeswari * and Labadi Jyotsna Departent of Matheatics,

More information

arxiv: v1 [cs.ds] 29 Jan 2012

arxiv: v1 [cs.ds] 29 Jan 2012 A parallel approxiation algorith for ixed packing covering seidefinite progras arxiv:1201.6090v1 [cs.ds] 29 Jan 2012 Rahul Jain National U. Singapore January 28, 2012 Abstract Penghui Yao National U. Singapore

More information

LogLog-Beta and More: A New Algorithm for Cardinality Estimation Based on LogLog Counting

LogLog-Beta and More: A New Algorithm for Cardinality Estimation Based on LogLog Counting LogLog-Beta and More: A New Algorith for Cardinality Estiation Based on LogLog Counting Jason Qin, Denys Ki, Yuei Tung The AOLP Core Data Service, AOL, 22000 AOL Way Dulles, VA 20163 E-ail: jasonqin@teaaolco

More information

Birthday Paradox Calculations and Approximation

Birthday Paradox Calculations and Approximation Birthday Paradox Calculations and Approxiation Joshua E. Hill InfoGard Laboratories -March- v. Birthday Proble In the birthday proble, we have a group of n randoly selected people. If we assue that birthdays

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

Polynomial Division By Convolution

Polynomial Division By Convolution Applied Matheatics E-Notes, (0), 9 c ISSN 0-0 Available free at irror sites of http://wwwathnthuedutw/aen/ Polynoial Division By Convolution Feng Cheng Chang y Received 9 March 0 Abstract The division

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

Page 1 Lab 1 Elementary Matrix and Linear Algebra Spring 2011

Page 1 Lab 1 Elementary Matrix and Linear Algebra Spring 2011 Page Lab Eleentary Matri and Linear Algebra Spring 0 Nae Due /03/0 Score /5 Probles through 4 are each worth 4 points.. Go to the Linear Algebra oolkit site ransforing a atri to reduced row echelon for

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

Torsion Experiment. Encoder #3 ( 3 ) Third encoder/disk for Model 205a only. Figure 1: ECP Torsion Experiment

Torsion Experiment. Encoder #3 ( 3 ) Third encoder/disk for Model 205a only. Figure 1: ECP Torsion Experiment Torsion Experient Introduction For the Torsion lab, there are two required experients to perfor and one extra credit assignent at the end. In experient 1, the syste paraeters need to be identified so that

More information

A VARIABLE STEP-SIZE FREQUENCY-DOMAIN ADAPTIVE FILTERING ALGORITHM FOR STEREOPHONIC ACOUSTIC ECHO CANCELLATION

A VARIABLE STEP-SIZE FREQUENCY-DOMAIN ADAPTIVE FILTERING ALGORITHM FOR STEREOPHONIC ACOUSTIC ECHO CANCELLATION 18th European Signal Processing Conference EUSIPCO-2010 Aalborg, Denark, August 23-27, 2010 A VARIABLE STEP-SIZE FREQUENCY-DOMAIN ADAPTIVE FILTERING ALGORITHM FOR STEREOPHONIC ACOUSTIC ECHO CANCELLATION

More information

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3

A1. Find all ordered pairs (a, b) of positive integers for which 1 a + 1 b = 3 A. Find all ordered pairs a, b) of positive integers for which a + b = 3 08. Answer. The six ordered pairs are 009, 08), 08, 009), 009 337, 674) = 35043, 674), 009 346, 673) = 3584, 673), 674, 009 337)

More information