Research Article Image Watermarking in the Linear Canonical Transform Domain

Size: px
Start display at page:

Download "Research Article Image Watermarking in the Linear Canonical Transform Domain"

Transcription

1 Mathematical Problems in Engineering, Article ID 5059, 9 pages Research Article Image Watermarking in the Linear Canonical Transform Domain Bing-Zhao Li an Yu-Pu Shi School of Mathematics an Statistics of Beijing Institute of Technology, Beijing 0008, China Corresponence shoul be aresse to Bing-Zhao Li; li bingzhao@bit.eu.cn Receive December 0; Revise 9 February 0; Accepte 9 February 0; Publishe March 0 Acaemic Eitor: Juan J. Trujillo Copyright 0 B.-Z. Li an Y.-P. Shi. This is an open access article istribute uner the Creative Commons Attribution License, which permits unrestricte use, istribution, an reprouction in any meium, provie the original work is properly cite. The linear canonical transform, which can be looke at the generalization of the fractional Fourier transform an the Fourier transform, has receive much interest an prove to be one of the most powerful tools in fractional signal processing community. A novel watermarking metho associate with the linear canonical transform is propose in this paper. Firstly, the watermark embeing an etecting techniques are propose an iscusse base on the iscrete linear canonical transform. Then the Lena image has been use to test this watermarking technique. The simulation results emonstrate that the propose schemes are robust to several signal processing methos, incluing aition of Gaussian noise an resizing. Furthermore, the sensitivity of the single an ouble parameters of the linear canonical transform is also iscusse, an the results show that the watermark cannot be etecte when the parameters of the linear canonical transform use in the etection are not all the same as the parameters use in the embeing progress.. Introuction Over the past several ecaes, igital watermarking become more an more important in the application of copyright protection for igital meia as image, vieo, an auio [ ]. A igital watermark is a coe which embes copyright information incluing sequence number, a picture, an text into the multimeia for copyright protection. The watermark must be easily etecte by the copyright owner, the creator of the work, an the authorize consumer while is harly rea by the people who want to counterfeit the copyright of the ata without authorization. Digital watermarking is an emerging technology in signal processing an communications which is uner active evelopment. The methos use to embe the watermark influence both the robustness an the etection algorithm. One of the hottest irections of the watermarking metho is the watermarking in the transform omain, for example, in the iscrete Fourier transform (DFT) omain [ ] an in the iscrete cosine transform (DCT) omain [7, 8], an the watermark propose in [7] is two Gaussian sequences an it is embee in the magnitue of the DCT transformation coefficients. A wealth of information an references can be foun on the site of Watermarking Worl [9]. Recently, with the evelopment of the fractional signal an processing technologies, the research results of the fractional Fourier transform (FRFT) an fractional Fourier operators have shown that the fractional omain signal processingcanbelookeatasoneofthehottestresearch topics for nonstationary signals processing [0 5]. Several igital watermarking methos are propose in the FRFT Domain [ 9] base on these novel results of the FRFT. A nonsensical watermark embee in the FRFT omain was propose in [], an it has a more security because of the free parameter of the FRFT. Bultheel [8] escribes the implementation of a watermark embeing technique in the FRFT omain in etail an also iscusses the embeing several watermarks at the same time for images. The practical etecting threshol propose in [8] is one of the most important contributions of the paper. All of these results, which come from the igital watermarking technology in the FRFT omain, have shown that the watermarking metho in these transform omains can be more secure an har to be etecte compare to the traitional metho in the classical DFTanDCTomain. The linear canonical transform (LCT) [0], which can be looke at as the further generalization of the fractional

2 Mathematical Problems in Engineering Fourier transform, is introuce in the 970s with three free parameters an has been proven to be one of the most powerful tools for nonstationary signal processing. The wellknown signal processing operations, such as the Fourier transform (FT), the FRFT, the Fresnel transform, an the scaling operations, are all special cases of the LCT [0]. The igital computation methos of the LCT have been propose in [ ], an the sampling theories associate with the LCT have been stuie in [5 9], an the eigenfunction [0], the convolution an prouct function [, ], an the uncertainty principle [] havealsobeeninvestigatein etail. Therefore, unerstaning the LCT may help to gain more insight into its special cases an to carry the knowlege gaine from one subject to others [0]. However,forthebestofourknowlege,thereareno papers publishe about the watermarking in the LCT omain. So it is interesting an worthwhile to investigate the watermarkingmethoantechniqueassociatewiththelct. Focusing on this problem, a novel watermarking technique base on the iscrete LCT propose in [] isproposein this paper. The experiment results show that the embee watermarks are both perceptually invisible an robust to various image processing techniques. The remaining of this paper can be ivie into the following sections. The LCT is escribe in Section. Section evelops watermark embeing in LCT omain. Numerical examples an the iscussion of the simulation results are given in Section,an Section 5 is the conclusion.. The Linear Canonical Transform.. The Continuous LCT. The continuous LCT of a signal f(x) with parameter matrix A=( ab c ) can be efine as [0] + f A (y) = C A (f) (y) = f (x) C A (x, y) x, C A (x, y) = b e jπ/ exp {jπ [( a b )x ( b )xy+( b )y ]}, () where C A is the LCT operator an a, b, c, are real parameters. Furthermore the constraint a bc = must be satisfie to make the transform unitary. Actually the LCT has three free parameters; if we let a=γ/, b=/, c= +αγ/, =α/,thelctoff(x) canberewrittenas[] + f A (y) = C A (f) (y) = f (x) C A (x, y) x, () C A (x, y) = e jπ/ exp [jπ (γx xy+αy )], where parameter matrix γ a b A=( c )=( + αγ α ). () Two of interesting an important properties of LCT are reversibility an inex aitivity. Inex aitivity means that, if two LCTs with matrices A,A operateinasuccessive manner, then the equivalent transform is an LCT with the matrix A=A A. Because of the inex aitivity, the inverse of the LCT with matrix A is an LCT with the matrix A. With the evelopment of the fractional signal processing metho, the properties an applications of the LCT have been investigate in etail; for more information associate with the continuous LCT, one can refer to [, 5, 0]... The Discrete LCT. Besies the continuous LCT, we often encounter the computation of the iscrete LCT because we must process iscrete ata by computer. There are lots of iscrete an the fast LCT methos propose in the literature [,, ]. If we set δ x =δ y = (N ) /, x=nδ x, y=mδ y, an m,n = 0,,...,N,the N point iscrete LCT (DLCT) of f(n) canbeefineas[] where C A (m, n) = e (jπ/) N f A (m) = N n=0 f (n) C A (m, n), () exp [jπ N (αm mn+γn )]. (5) ThiskinofDLCTmethoisavailableforimageprocessing, because it is interval-inepenent an unitary. Moreover, it also has the property of inex aitivity. Following this metho, the two-imensional DLCT of a size H Nimage I(h, n) canberewrittenas I A (k, l) = N n=0 C A (l, n) H h=0 I (h, n) C A (k, m) () with k = 0,,...,H, l = 0,,...,N,anC A (k, m), C A (l, n) being the same as (). It is shown in [] thatthis kin of DLCT is analogous to the DFT an approximates the continuous LCT in the same sense that the DFT approximates the continuous Fourier transform. We will use this metho to compute the D LCT of an image in the following sections.. Watermark Embeing an Detecting It is well known that the watermarking process contains the watermark embeing an etecting steps; we propose a new kin of watermarking scheme following the iea of [8]inthis section... Watermark Embeing. The watermark itself is a sequence of M complex numbers [8], enote by s i =c i +j i, i =,,...,M, an the real an imaginary parts of s i are obtaine from a normal istribution with mean zero

3 Mathematical Problems in Engineering an variance σ /. In orer to embe this watermark into an image I of size H N, we first compute the DLCT of this image I to erive the transform coefficients {S i :i= N}an then reorere the transform coefficients in nonincreasing sequence as follows: S i =C i +jd i : S i S i+, i=,...h N. (7) Similar with the metho in [], we chose the mile reorere transform coefficients to embe the watermarks; in other wors, we embe the watermark into the coefficients S i, i=l+,l+,...,l+m. This is because if we embee the watermarks in the lowest coefficients, they woul be sensitive to noise removing or compressing operations, while if we embee the watermarks in the highest coefficients, they woul significantly affect the imperceptibility of the watermarks. So, the watermarks were embee as follows: S w i =S i +c i C i +j i D i, i=l+,...,l+m, (8) where S w i isthewatermarkeimageofi an (c i, i ) is the watermarks sequence... Watermark Detecting. When the watermark is embee intheimage,thentheimageistransferretothewatermark etection process to see whether it contains watermark. The etection of the watermark can be escribe like this: given the watermarke image I a, maybe uner some attacks such as low pass an meian filtering, aition of Gaussian noise, an resizing, we compute the DLCT of I a an obtain the transform coefficients S a an then compute the etection value []: = L+M i=l+ (c i j i )S i. (9) The threshol can be achieve accoring to the statistical performance of the propose algorithm. The expecte value of is E [] = σ L+M i=l+ ( C i + D i ). (0) In [], Djurovic et al. propose a useful an simple threshol as E[]/; when the value of is larger than the threshol, it is ecie that a watermark has been etecte. Otherwise, there is no watermark. However, it is shown in [8] thatthiskin of threshol suffers from the false conclusion; therefore we useanaaptivethresholproposein[8], because it is more practical when we eal with the image after some attacks. Therefore, the threshol can be compute by the following steps. (i) First, we compute the value of of all the ranom watermarks (maybe 000 watermarks). (ii) Then, we compute the average (say μ) an the stanar eviation (say σ)ofthese. (iii) At last, we can achieve the threshol τ=μ+pσwhere p is a suitable number.. Simulation Examples.. Watermark Embeing an Detecting. The Lena (5 5) was chosen as the test image in the simulations. Accoring to some experiments, the value of p in threshol τ = μ+pσwas chosen to be 5. The D DLCT parameters are α = α = 0., = =0., γ =γ =0.an can be escribe as (α,,γ,α,,γ ) = (0., 0., 0., 0., 0., 0.). Therefore, the D DLCT parameter matrixes can be rewritten as A =A =( γ + αγ α )=( ), () an the D DLCT is performe base on (). The simulations performe using Matlab version in Winows 8 system an the processer of the system is Intel(R) Core(TM) i5-7u;thecpuantheramofthesystemare.80ghzan.00 GB, respectively. We chose L = 9000, M = 000, σ = 0 in the simulation. In orer to test the performance of the propose metho, we use the PSNR an the elapse time of the process to measure the performance of the watermarking technology [8]. The original an watermarke images are shown in Figures an,respectively.it is shown that the watermarke picture Figure is almost the same as the original Figure. The etection of the correct watermark from the watermarke image over the other 000 ifferent watermarks, which are also Gaussian white noise with variance σ G = σ / = 0. The etection result is plotte in Figure.Inthis case, the PSNR an the elapse time are 9.7 B an.7 secons, respectively. In Figure, we can easily fin that the etection value of the correct watermark is significantly larger than the threshol an other false watermarks. So, the watermark can be etecte by the comparison... The Robustness. In this subsection, we investigate the robustness of the algorithm after the following attacks: aing noise, upper cropping, central cropping, an central cropping after aing noise. These experiments have been performe as the following. Firstly, Figures an plot the robustness of the watermarking uner the Gaussian noise. Figure is the noisy image of the watermarke image in Figure by aing mean zero an variance 00 Gaussian noise, while thevarianceoffigure is 00. Figures an are etection results of these two situations, the PSNR are 9.7 B an 5.08 B, the elapse times are 9.75 an.8 secons, respectively. This result shows that the metho is robust against noise, because the watermark can be still etecte. Seconly, wecroppethewatermarkeimagefigure from the size 5 5 to an,anobtain Figures 5 an, respectively. The etection results are shown in Figures 5 an, respectively.itisshownin Figures 5 an that the watermark can also be etecte. In this situation, the PSNR are.5 B an 0.8 B, the elapse time are 8.70 an 9.5 secons, respectively.

4 Mathematical Problems in Engineering Figure : The original image of Lena, the watermarke image of Lena Figure : The etection result from the watermarke Figure Figure : The noisy Lena, var = 00. The etection of the noisy Lena.

5 Mathematical Problems in Engineering Figure : The noisy Lena, var = 00. The etection of the noisy Lena Figure 5: The upper croppe image of Figure. The etection of upcroppe image. Thirly, we perform the upper cropping of the noisy imageinfigures an in the same way as in Figure 5 an obtain Figures 7 an 8. The etection results are plotte in Figures 7 an 8, respectively.itisshown in Figure 7 that the watermark can also be etecte for the upper croppe noisy watermarke image of variance 00. We can still etect the watermark for the upper croppe noisy imageofvariance00asshowninfigure 8.Inthissituation, the PSNR are.50 B an.8 B, an the elapse times are 8.70 an 9.88 secons, respectively. Lastly,wecentralcropthenoisyimageinFigures an in the same way as in Figure an obtain Figures 9 an 0. The etection results are plotte in Figure 9 an Figure 0,respectively.ItisshowninFigure 9 that the watermark can also be etecte for the central croppe noisy watermarke image of variance 00. We can still etect the watermark for the central croppe noisy image of variance 00 as shown in Figure 0. Inthissituation,thePSNRare 0.8 B an 0.78 B, an the elapse times are 9.5 an 9.0 secons, respectively. From these simulations, it can be conclue that the propose metho is robust uner the common image attacks, such as the noise, crops, an the crops of the noisy image. It shoul be also notice from Figures 8 an 0 that the propose metho still works uner the attack of cropping if the variance of the aing noise is about 00.

6 Mathematical Problems in Engineering Figure : The central croppe image of Figure. The etection of central croppe image Figure 7: The upper croppe noisy Lena of Figure. The etection of the upcroppe noisy Lena... The Parameters Sensitivity. As compare to the traitional watermarking metho, for example, the DFT an DCT omain metho [5 8], the avantage of the propose metho is that it has three more free parameters, an this can enhance the security an robustness of the watermarking images. It is well known that the parameters of the LCT are two more than the parameters of the FRFT, an for the D-LCT there are six parameters. So, when we nee to etect the watermarks, we not only nee the watermarke keys but also nee the six parameters which is three times the number of the FRFT s parameter. Therefore, it is more ifficult for the unauthorize person to etect the watermark an estroy it. In orer to show the avantage of the LCT base watermarking metho propose in this paper, the sensitivity of the parameter (α,,γ,α,,γ ) is iscusse in this subsection.weusethewatermarkeimageinfigure as teste image, we set (α,,γ ) = (0., 0., 0.), an o not know the value of α,,anγ in simulations; the value of is sensitive with the α,,anγ asplotteinfigure. It is shown in Figure that the value of is significantly larger when the value of α,,anγ are more correct than the false values of the parameters. For example, when the unauthorize people know (,γ,α,,γ ) = (0., 0., 0., 0., 0.), the correct place of the watermark, an the correct watermark but not sure about the value of α,the watermark still cannot be etecte because only the value of correct α can reach the peak accoring to Figure.We can also see that the sensitivity of α an is goo, while

7 Mathematical Problems in Engineering Figure 8: The upcroppe noisy Lena of Figure. The etection of the upcroppe noisy Lena Figure 9: The central croppe noisy Lena of Figure. The etection of the central croppe noisy Lena. the sensitivity of γ is not so gratifying especially when γ is between an in Figure (c). 5. Conclusion A novel watermarking technique base on the iscrete LCTisproposeinthispaper.Inthiskinofmetho, the watermarks are embee in the mile coefficients in the transform omain, an the etecting threshol is etermine aaptively. The simulations for the robustness of the propose metho uner the common image processing are performe, an the simulation results fit the theories well.theproposewatermarkingismoresecurethanthe watermarking base on FRFT or DCT omain because it has more free parameters. We also iscusse the parameter s sensitivity of the propose metho in the paper an showe that this kin of watermarking metho is sensitive to the parameters of the LCT. Conflict of Interests The authors eclare that there is no conflict of interests regaring the publication of this paper. Acknowlegments This work was supporte by the National Natural Science Founation of China (no an no. 795) an

8 8 Mathematical Problems in Engineering Figure 0: The central croppe noisy Lena of Figure. The etection of the central croppe noisy Lena (c) Figure : The sensitivity of parameters. The sensitivity of α,thesensitivityof, an (c) the sensitivity of γ.

9 Mathematical Problems in Engineering 9 is also supporte by Program for New Century Excellent Talents in University (no. NCET--00). References [] I.J.Cox,J.Kilian,T.Leighton,anT.Shamoon, Securesprea spectrum watermarking for images, auio an vieo, in Proceeings of the IEEE International Conference on Image Processing (ICIP 9), vol.,pp.,lausanne,switzerlan, September 99. [] K.Eckhar,J.Rinfrey,anJ.Zhao, Copyrightprotectionfor multimeia ata, in Proceeings of the International Conference on Digital Meia an Electronic Publishing,vol.,99. [] I. J. Cox, J. Kilian, F. T. Leighton, an T. Shamoon, Secure sprea spectrum watermarking for multimeia, IEEE Transactions on Image Processing,vol.,no.,pp.7 87,997. []J.J.K.O Ruanaih,W.J.Dowling,anF.M.Bolan, Phase watermarking of igital images, in Proceeings of the IEEE International Conference on Image Processing (ICIP 9), vol., pp. 9, Lausanne, Switzerlan, September 99. [5] V. Solachiis an I. Pitas, Circularly symmetric watermark embeing in -D DFT omain, IEEE Transactions on Image Processing,vol.0,no.,pp.7 75,00. []S.Liu,B.M.Hennelly,anJ.T.Sherian, Digitalimage watermarking sprea-space technique base on ouble ranom phase encoing, Optical Communications,vol.00,pp. 77, 0. [7]M.Barni,F.Bartolini,V.Cappellini,anA.Piva, ADCTomain system for robust image watermarking, Signal Processing,vol.,no.,pp.57 7,998. [8] A. Piva, M. Barni, F. Bartolini, an V. Cappellini, DCT-base watermark recovering without resorting to the uncorrupte original image, in Proceeings of the International Conference on Image Processing, vol., pp. 50 5, October 997. [9] M. Kutter, Watermarking worl, [0] C. Canan, M. A. Kutay, an H. M. Ozaktas, The iscrete fractional Fourier transform, IEEE Transactions on Signal Processing,vol.8,no.5,pp.9 7,000. [] H. M. Ozaktas, N. Erkaya, an M. A. Kutay, Effect of fractional Fourier transformation on time-frequency istributions belonging to the Cohen class, IEEE Signal Processing Letters, vol., no., pp. 0, 99. [] H. Ozaktas an D. Menlovic, Fractional Fourier transforms an their optical implementation. II, the Optical Society of America A, vol. 0, no., pp. 5 5, 99. [] S.-C. Pei, C.-C. Tseng, M.-H. Yeh, an J.-J. Shyu, Discrete fractional hartley an fourier transforms, IEEE Transactions on Circuits an Systems II: Analog an Digital Signal Processing,vol. 5, no., pp. 5 75, 998. [] H. M. Ozaktas, M. A. Kutay, an Z. Zalevsky, The Fractional Fourier Transform With Applications in Optics an Signal Processing, Wiley, New York, NY, USA, 000. [5] R.Tao,B.Deng,anY.Wang,Fractional Fourier Transform an Its Applications, University Press, Beijing, China, 009. [] I. Djurovic, S. Stankovic, an I. Pitas, Digital watermarking in the fractional Fourier transformation omain, Network an Computer Applications,vol.,no.,pp.7 7, 00. [7] M. A. Savelonas an S. Chountasis, Noise-resistant watermarking in the fractional Fourier omain utilizing moment-base image representation, Signal Processing, vol. 90, no. 8, pp. 5 58, 00. [8] A. Bultheel, Digital watermarking of images in the fractional Fourier omain, TW Report TW97, 007. [9] N. K. Nishchal, Hierarchical encrypte image watermarking using fractional Fourier omain ranom phase encoing, Optical Engineering, vol. 50, no. 9, Article ID 09700, 0. [0] T.-Z. Xu an B.-Z. Li, Linear Canonical Transform an Its Applications, Science Press, Beijing, China, 0. [] S.-C. Pei an J.-J. Ding, Close-form iscrete fractional an affine Fourier transforms, IEEE Transactions on Signal Processing,vol.8,no.5,pp.8 5,000. [] A. Koç, H. M. Ozaktas, C. Canan, an M. A. Kutay, Digital computation of linear canonical transforms, IEEE Transactions on Signal Processing,vol.5,no.,pp.8 9,008. [] F. S. Oktem an H. M. Ozaktas, Exact relation between continuous an iscrete linear canonical transforms, IEEE Signal Processing Letters,vol.,no.8,pp.77 70,009. [] J. J. Healy an J. T. Sherian, Sampling an iscretization of the linear canonical transform, Signal Processing,vol.89,no.,pp. 8, 009. [5] B.-Z. Li, R. Tao, an Y. Wang, New sampling formulae relate to linear canonical transform, Signal Processing, vol.87,no.5, pp , 007. [] A. Stern, Sampling of linear canonical transforme signals, Signal Processing,vol.8,no.7,pp. 5,00. [7] R. Tao, B.-Z. Li, Y. Wang, an G. K. Aggrey, On sampling of ban-limite signals associate with the linear canonical transform, IEEE Transactions on Signal Processing, vol.5,no., pp. 55 5, 008. [8] B.-Z. Li an T.-Z. Xu, Spectral analysis of sample signals in the linear canonical transform omain, Mathematical Problems in Engineering,vol.0,ArticleID5,9pages,0. [9] B.-Z. Li an T.-Z. Xu, Sampling in the linear canonical transform omain, Mathematical Problems in Engineering,vol. 0,ArticleID50580,pages,0. [0] S.-C. Pei an J.-J. Ding, Eigenfunctions of linear canonical transform, IEEE Transactions on Signal Processing, vol.50,no., pp., 00. [] D. Wei, Q. Ran, Y. Li, J. Ma, an L. Tan, A convolution an prouct theorem for the linear canonical transform, IEEE Signal Processing Letters,vol.,no.0,pp.85 85,009. [] B. Deng, R. Tao, an Y. Wang, Convolution theorems for the linear canonical transform an their applications, Science in China. Series F. Information Sciences,vol.9,no.5,pp.59 0, 00. [] J. Zhao, R. Tao, Y.-L. Li, an Y. Wang, Uncertainty principles for linear canonical transform, IEEE Transactions on Signal Processing,vol.57,no.7,pp ,009.

10 Avances in Operations Research Avances in Decision Sciences Applie Mathematics Algebra Probability an Statistics The Scientific Worl Journal International Differential Equations Submit your manuscripts at International Avances in Combinatorics Mathematical Physics Complex Analysis International Mathematics an Mathematical Sciences Mathematical Problems in Engineering Mathematics Discrete Mathematics Discrete Dynamics in Nature an Society Function Spaces Abstract an Applie Analysis International Stochastic Analysis Optimization

Image Denoising Using Spatial Adaptive Thresholding

Image Denoising Using Spatial Adaptive Thresholding International Journal of Engineering Technology, Management an Applie Sciences Image Denoising Using Spatial Aaptive Thresholing Raneesh Mishra M. Tech Stuent, Department of Electronics & Communication,

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

Research Article When Inflation Causes No Increase in Claim Amounts

Research Article When Inflation Causes No Increase in Claim Amounts Probability an Statistics Volume 2009, Article ID 943926, 10 pages oi:10.1155/2009/943926 Research Article When Inflation Causes No Increase in Claim Amounts Vytaras Brazauskas, 1 Bruce L. Jones, 2 an

More information

Research Article Wigner-Ville Distribution Associated with the Linear Canonical Transform

Research Article Wigner-Ville Distribution Associated with the Linear Canonical Transform Applied Mathematics Volume 2, Article ID 746, 4 pages doi:.55/2/746 Research Article Wigner-Ville Distribution Associated with the Linear Canonical Transform Rui-Feng Bai, Bing-Zhao Li, and Qi-Yuan Cheng

More information

APPLICATION of compressed sensing (CS) in radar signal

APPLICATION of compressed sensing (CS) in radar signal A Novel Joint Compressive Single Target Detection an Parameter Estimation in Raar without Signal Reconstruction Alireza Hariri, Massou Babaie-Zaeh Department of Electrical Engineering, Sharif University

More information

A Weak First Digit Law for a Class of Sequences

A Weak First Digit Law for a Class of Sequences International Mathematical Forum, Vol. 11, 2016, no. 15, 67-702 HIKARI Lt, www.m-hikari.com http://x.oi.org/10.1288/imf.2016.6562 A Weak First Digit Law for a Class of Sequences M. A. Nyblom School of

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

Hybrid Fusion for Biometrics: Combining Score-level and Decision-level Fusion

Hybrid Fusion for Biometrics: Combining Score-level and Decision-level Fusion Hybri Fusion for Biometrics: Combining Score-level an Decision-level Fusion Qian Tao Raymon Velhuis Signals an Systems Group, University of Twente Postbus 217, 7500AE Enschee, the Netherlans {q.tao,r.n.j.velhuis}@ewi.utwente.nl

More information

Integration Review. May 11, 2013

Integration Review. May 11, 2013 Integration Review May 11, 2013 Goals: Review the funamental theorem of calculus. Review u-substitution. Review integration by parts. Do lots of integration eamples. 1 Funamental Theorem of Calculus In

More information

Research Article Global and Blow-Up Solutions for Nonlinear Hyperbolic Equations with Initial-Boundary Conditions

Research Article Global and Blow-Up Solutions for Nonlinear Hyperbolic Equations with Initial-Boundary Conditions International Differential Equations Volume 24, Article ID 724837, 5 pages http://x.oi.org/.55/24/724837 Research Article Global an Blow-Up Solutions for Nonlinear Hyperbolic Equations with Initial-Bounary

More information

Construction of the Electronic Radial Wave Functions and Probability Distributions of Hydrogen-like Systems

Construction of the Electronic Radial Wave Functions and Probability Distributions of Hydrogen-like Systems Construction of the Electronic Raial Wave Functions an Probability Distributions of Hyrogen-like Systems Thomas S. Kuntzleman, Department of Chemistry Spring Arbor University, Spring Arbor MI 498 tkuntzle@arbor.eu

More information

A Novel Decoupled Iterative Method for Deep-Submicron MOSFET RF Circuit Simulation

A Novel Decoupled Iterative Method for Deep-Submicron MOSFET RF Circuit Simulation A Novel ecouple Iterative Metho for eep-submicron MOSFET RF Circuit Simulation CHUAN-SHENG WANG an YIMING LI epartment of Mathematics, National Tsing Hua University, National Nano evice Laboratories, an

More information

Inverse Theory Course: LTU Kiruna. Day 1

Inverse Theory Course: LTU Kiruna. Day 1 Inverse Theory Course: LTU Kiruna. Day Hugh Pumphrey March 6, 0 Preamble These are the notes for the course Inverse Theory to be taught at LuleåTekniska Universitet, Kiruna in February 00. They are not

More information

Introduction to Markov Processes

Introduction to Markov Processes Introuction to Markov Processes Connexions moule m44014 Zzis law Gustav) Meglicki, Jr Office of the VP for Information Technology Iniana University RCS: Section-2.tex,v 1.24 2012/12/21 18:03:08 gustav

More information

Research Article Poisson Summation Formulae Associated with the Special Affine Fourier Transform and Offset Hilbert Transform

Research Article Poisson Summation Formulae Associated with the Special Affine Fourier Transform and Offset Hilbert Transform Hindawi Mathematical Problems in Engineering Volume 017, Article ID 135419, 5 pages https://doi.org/10.1155/017/135419 Research Article Poisson Summation Formulae Associated with the Special Affine Fourier

More information

Improving Estimation Accuracy in Nonrandomized Response Questioning Methods by Multiple Answers

Improving Estimation Accuracy in Nonrandomized Response Questioning Methods by Multiple Answers International Journal of Statistics an Probability; Vol 6, No 5; September 207 ISSN 927-7032 E-ISSN 927-7040 Publishe by Canaian Center of Science an Eucation Improving Estimation Accuracy in Nonranomize

More information

Optimized Signal De-noising Algorithm for Acoustic Emission Leakage

Optimized Signal De-noising Algorithm for Acoustic Emission Leakage 1009 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Eitors: Peiyu Ren, Yancang Li, Huiping Song Copyright 2015, AIDIC Servizi S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The

More information

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5

More information

A Modification of the Jarque-Bera Test. for Normality

A Modification of the Jarque-Bera Test. for Normality Int. J. Contemp. Math. Sciences, Vol. 8, 01, no. 17, 84-85 HIKARI Lt, www.m-hikari.com http://x.oi.org/10.1988/ijcms.01.9106 A Moification of the Jarque-Bera Test for Normality Moawa El-Fallah Ab El-Salam

More information

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS Yannick DEVILLE Université Paul Sabatier Laboratoire Acoustique, Métrologie, Instrumentation Bât. 3RB2, 8 Route e Narbonne,

More information

Concentration of Measure Inequalities for Compressive Toeplitz Matrices with Applications to Detection and System Identification

Concentration of Measure Inequalities for Compressive Toeplitz Matrices with Applications to Detection and System Identification Concentration of Measure Inequalities for Compressive Toeplitz Matrices with Applications to Detection an System Ientification Borhan M Sananaji, Tyrone L Vincent, an Michael B Wakin Abstract In this paper,

More information

THE VAN KAMPEN EXPANSION FOR LINKED DUFFING LINEAR OSCILLATORS EXCITED BY COLORED NOISE

THE VAN KAMPEN EXPANSION FOR LINKED DUFFING LINEAR OSCILLATORS EXCITED BY COLORED NOISE Journal of Soun an Vibration (1996) 191(3), 397 414 THE VAN KAMPEN EXPANSION FOR LINKED DUFFING LINEAR OSCILLATORS EXCITED BY COLORED NOISE E. M. WEINSTEIN Galaxy Scientific Corporation, 2500 English Creek

More information

Parameter estimation: A new approach to weighting a priori information

Parameter estimation: A new approach to weighting a priori information Parameter estimation: A new approach to weighting a priori information J.L. Mea Department of Mathematics, Boise State University, Boise, ID 83725-555 E-mail: jmea@boisestate.eu Abstract. We propose a

More information

Thermal conductivity of graded composites: Numerical simulations and an effective medium approximation

Thermal conductivity of graded composites: Numerical simulations and an effective medium approximation JOURNAL OF MATERIALS SCIENCE 34 (999)5497 5503 Thermal conuctivity of grae composites: Numerical simulations an an effective meium approximation P. M. HUI Department of Physics, The Chinese University

More information

Situation awareness of power system based on static voltage security region

Situation awareness of power system based on static voltage security region The 6th International Conference on Renewable Power Generation (RPG) 19 20 October 2017 Situation awareness of power system base on static voltage security region Fei Xiao, Zi-Qing Jiang, Qian Ai, Ran

More information

Separation of Variables

Separation of Variables Physics 342 Lecture 1 Separation of Variables Lecture 1 Physics 342 Quantum Mechanics I Monay, January 25th, 2010 There are three basic mathematical tools we nee, an then we can begin working on the physical

More information

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors Math 18.02 Notes on ifferentials, the Chain Rule, graients, irectional erivative, an normal vectors Tangent plane an linear approximation We efine the partial erivatives of f( xy, ) as follows: f f( x+

More information

Multi-View Clustering via Canonical Correlation Analysis

Multi-View Clustering via Canonical Correlation Analysis Technical Report TTI-TR-2008-5 Multi-View Clustering via Canonical Correlation Analysis Kamalika Chauhuri UC San Diego Sham M. Kakae Toyota Technological Institute at Chicago ABSTRACT Clustering ata in

More information

Fast image compression using matrix K-L transform

Fast image compression using matrix K-L transform Fast image compression using matrix K-L transform Daoqiang Zhang, Songcan Chen * Department of Computer Science an Engineering, Naning University of Aeronautics & Astronautics, Naning 2006, P.R. China.

More information

One-dimensional I test and direction vector I test with array references by induction variable

One-dimensional I test and direction vector I test with array references by induction variable Int. J. High Performance Computing an Networking, Vol. 3, No. 4, 2005 219 One-imensional I test an irection vector I test with array references by inuction variable Minyi Guo School of Computer Science

More information

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an

More information

Event based Kalman filter observer for rotary high speed on/off valve

Event based Kalman filter observer for rotary high speed on/off valve 28 American Control Conference Westin Seattle Hotel, Seattle, Washington, USA June 11-13, 28 WeC9.6 Event base Kalman filter observer for rotary high spee on/off valve Meng Wang, Perry Y. Li ERC for Compact

More information

SYNCHRONOUS SEQUENTIAL CIRCUITS

SYNCHRONOUS SEQUENTIAL CIRCUITS CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents

More information

Journal of Engineering Science and Technology Review 7 (1) (2014) Research Article

Journal of Engineering Science and Technology Review 7 (1) (2014) Research Article Jestr Journal of Engineering Science an Technology Review 7 () (04) 8 Research Article JOURNA OF Engineering Science an Technology Review www.jestr.org Research on the Measurement Error of MWIR Average

More information

ELEC3114 Control Systems 1

ELEC3114 Control Systems 1 ELEC34 Control Systems Linear Systems - Moelling - Some Issues Session 2, 2007 Introuction Linear systems may be represente in a number of ifferent ways. Figure shows the relationship between various representations.

More information

Multi-View Clustering via Canonical Correlation Analysis

Multi-View Clustering via Canonical Correlation Analysis Keywors: multi-view learning, clustering, canonical correlation analysis Abstract Clustering ata in high-imensions is believe to be a har problem in general. A number of efficient clustering algorithms

More information

Robust Low Rank Kernel Embeddings of Multivariate Distributions

Robust Low Rank Kernel Embeddings of Multivariate Distributions Robust Low Rank Kernel Embeings of Multivariate Distributions Le Song, Bo Dai College of Computing, Georgia Institute of Technology lsong@cc.gatech.eu, boai@gatech.eu Abstract Kernel embeing of istributions

More information

A Note on Exact Solutions to Linear Differential Equations by the Matrix Exponential

A Note on Exact Solutions to Linear Differential Equations by the Matrix Exponential Avances in Applie Mathematics an Mechanics Av. Appl. Math. Mech. Vol. 1 No. 4 pp. 573-580 DOI: 10.4208/aamm.09-m0946 August 2009 A Note on Exact Solutions to Linear Differential Equations by the Matrix

More information

TIME-DELAY ESTIMATION USING FARROW-BASED FRACTIONAL-DELAY FIR FILTERS: FILTER APPROXIMATION VS. ESTIMATION ERRORS

TIME-DELAY ESTIMATION USING FARROW-BASED FRACTIONAL-DELAY FIR FILTERS: FILTER APPROXIMATION VS. ESTIMATION ERRORS TIME-DEAY ESTIMATION USING FARROW-BASED FRACTIONA-DEAY FIR FITERS: FITER APPROXIMATION VS. ESTIMATION ERRORS Mattias Olsson, Håkan Johansson, an Per öwenborg Div. of Electronic Systems, Dept. of Electrical

More information

Necessary and Sufficient Conditions for Sketched Subspace Clustering

Necessary and Sufficient Conditions for Sketched Subspace Clustering Necessary an Sufficient Conitions for Sketche Subspace Clustering Daniel Pimentel-Alarcón, Laura Balzano 2, Robert Nowak University of Wisconsin-Maison, 2 University of Michigan-Ann Arbor Abstract This

More information

A nonlinear inverse problem of the Korteweg-de Vries equation

A nonlinear inverse problem of the Korteweg-de Vries equation Bull. Math. Sci. https://oi.org/0.007/s3373-08-025- A nonlinear inverse problem of the Korteweg-e Vries equation Shengqi Lu Miaochao Chen 2 Qilin Liu 3 Receive: 0 March 207 / Revise: 30 April 208 / Accepte:

More information

Examining Geometric Integration for Propagating Orbit Trajectories with Non-Conservative Forcing

Examining Geometric Integration for Propagating Orbit Trajectories with Non-Conservative Forcing Examining Geometric Integration for Propagating Orbit Trajectories with Non-Conservative Forcing Course Project for CDS 05 - Geometric Mechanics John M. Carson III California Institute of Technology June

More information

A NONLINEAR SOURCE SEPARATION APPROACH FOR THE NICOLSKY-EISENMAN MODEL

A NONLINEAR SOURCE SEPARATION APPROACH FOR THE NICOLSKY-EISENMAN MODEL 6th European Signal Processing Conference EUSIPCO 28, Lausanne, Switzerlan, August 25-29, 28, copyright by EURASIP A NONLINEAR SOURCE SEPARATION APPROACH FOR THE NICOLSKY-EISENMAN MODEL Leonaro Tomazeli

More information

Outline. Introduction Definition of fractional fourier transform Linear canonical transform Implementation of FRFT/LCT

Outline. Introduction Definition of fractional fourier transform Linear canonical transform Implementation of FRFT/LCT 04//5 Outline Introduction Definition of fractional fourier transform Linear canonical transform Implementation of FRFT/LCT The Direct Computation DFT-like Method Chirp Convolution Method Discrete fractional

More information

Fractional Geometric Calculus: Toward A Unified Mathematical Language for Physics and Engineering

Fractional Geometric Calculus: Toward A Unified Mathematical Language for Physics and Engineering Fractional Geometric Calculus: Towar A Unifie Mathematical Language for Physics an Engineering Xiong Wang Center of Chaos an Complex Network, Department of Electronic Engineering, City University of Hong

More information

A Constructive Inversion Framework for Twisted Convolution

A Constructive Inversion Framework for Twisted Convolution A Constructive Inversion Framework for Twiste Convolution Yonina C. Elar, Ewa Matusiak, Tobias Werther June 30, 2006 Subject Classification: 44A35, 15A30, 42C15 Key Wors: Twiste convolution, Wiener s Lemma,

More information

Sturm-Liouville Theory

Sturm-Liouville Theory LECTURE 5 Sturm-Liouville Theory In the three preceing lectures I emonstrate the utility of Fourier series in solving PDE/BVPs. As we ll now see, Fourier series are just the tip of the iceberg of the theory

More information

2Algebraic ONLINE PAGE PROOFS. foundations

2Algebraic ONLINE PAGE PROOFS. foundations Algebraic founations. Kick off with CAS. Algebraic skills.3 Pascal s triangle an binomial expansions.4 The binomial theorem.5 Sets of real numbers.6 Surs.7 Review . Kick off with CAS Playing lotto Using

More information

Agmon Kolmogorov Inequalities on l 2 (Z d )

Agmon Kolmogorov Inequalities on l 2 (Z d ) Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,

More information

Multi-View Clustering via Canonical Correlation Analysis

Multi-View Clustering via Canonical Correlation Analysis Kamalika Chauhuri ITA, UC San Diego, 9500 Gilman Drive, La Jolla, CA Sham M. Kakae Karen Livescu Karthik Sriharan Toyota Technological Institute at Chicago, 6045 S. Kenwoo Ave., Chicago, IL kamalika@soe.ucs.eu

More information

EIGEN-ANALYSIS OF KERNEL OPERATORS FOR NONLINEAR DIMENSION REDUCTION AND DISCRIMINATION

EIGEN-ANALYSIS OF KERNEL OPERATORS FOR NONLINEAR DIMENSION REDUCTION AND DISCRIMINATION EIGEN-ANALYSIS OF KERNEL OPERATORS FOR NONLINEAR DIMENSION REDUCTION AND DISCRIMINATION DISSERTATION Presente in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Grauate

More information

Semiclassical analysis of long-wavelength multiphoton processes: The Rydberg atom

Semiclassical analysis of long-wavelength multiphoton processes: The Rydberg atom PHYSICAL REVIEW A 69, 063409 (2004) Semiclassical analysis of long-wavelength multiphoton processes: The Ryberg atom Luz V. Vela-Arevalo* an Ronal F. Fox Center for Nonlinear Sciences an School of Physics,

More information

Topic 7: Convergence of Random Variables

Topic 7: Convergence of Random Variables Topic 7: Convergence of Ranom Variables Course 003, 2016 Page 0 The Inference Problem So far, our starting point has been a given probability space (S, F, P). We now look at how to generate information

More information

KNN Particle Filters for Dynamic Hybrid Bayesian Networks

KNN Particle Filters for Dynamic Hybrid Bayesian Networks KNN Particle Filters for Dynamic Hybri Bayesian Networs H. D. Chen an K. C. Chang Dept. of Systems Engineering an Operations Research George Mason University MS 4A6, 4400 University Dr. Fairfax, VA 22030

More information

Dissipative numerical methods for the Hunter-Saxton equation

Dissipative numerical methods for the Hunter-Saxton equation Dissipative numerical methos for the Hunter-Saton equation Yan Xu an Chi-Wang Shu Abstract In this paper, we present further evelopment of the local iscontinuous Galerkin (LDG) metho esigne in [] an a

More information

Design A Robust Power System Stabilizer on SMIB Using Lyapunov Theory

Design A Robust Power System Stabilizer on SMIB Using Lyapunov Theory Design A Robust Power System Stabilizer on SMIB Using Lyapunov Theory Yin Li, Stuent Member, IEEE, Lingling Fan, Senior Member, IEEE Abstract This paper proposes a robust power system stabilizer (PSS)

More information

Research Article A Formula for the Reliability of a d-dimensional Consecutive-k-out-of-n:F System

Research Article A Formula for the Reliability of a d-dimensional Consecutive-k-out-of-n:F System International Combinatorics Volume 2015, Article ID 140909, 5 pages http://x.oi.org/10.1155/2015/140909 Research Article A Formula for the Reliability of a -Dimensional Consecutive-k-out-of-n:F System

More information

Switching Time Optimization in Discretized Hybrid Dynamical Systems

Switching Time Optimization in Discretized Hybrid Dynamical Systems Switching Time Optimization in Discretize Hybri Dynamical Systems Kathrin Flaßkamp, To Murphey, an Sina Ober-Blöbaum Abstract Switching time optimization (STO) arises in systems that have a finite set

More information

An Approach for Design of Multi-element USBL Systems

An Approach for Design of Multi-element USBL Systems An Approach for Design of Multi-element USBL Systems MIKHAIL ARKHIPOV Department of Postgrauate Stuies Technological University of the Mixteca Carretera a Acatlima Km. 2.5 Huajuapan e Leon Oaxaca 69000

More information

Cascaded redundancy reduction

Cascaded redundancy reduction Network: Comput. Neural Syst. 9 (1998) 73 84. Printe in the UK PII: S0954-898X(98)88342-5 Cascae reunancy reuction Virginia R e Sa an Geoffrey E Hinton Department of Computer Science, University of Toronto,

More information

The Press-Schechter mass function

The Press-Schechter mass function The Press-Schechter mass function To state the obvious: It is important to relate our theories to what we can observe. We have looke at linear perturbation theory, an we have consiere a simple moel for

More information

A simple model for the small-strain behaviour of soils

A simple model for the small-strain behaviour of soils A simple moel for the small-strain behaviour of soils José Jorge Naer Department of Structural an Geotechnical ngineering, Polytechnic School, University of São Paulo 05508-900, São Paulo, Brazil, e-mail:

More information

Mathcad Lecture #5 In-class Worksheet Plotting and Calculus

Mathcad Lecture #5 In-class Worksheet Plotting and Calculus Mathca Lecture #5 In-class Worksheet Plotting an Calculus At the en of this lecture, you shoul be able to: graph expressions, functions, an matrices of ata format graphs with titles, legens, log scales,

More information

Nonlinear Dielectric Response of Periodic Composite Materials

Nonlinear Dielectric Response of Periodic Composite Materials onlinear Dielectric Response of Perioic Composite aterials A.G. KOLPAKOV 3, Bl.95, 9 th ovember str., ovosibirsk, 639 Russia the corresponing author e-mail: agk@neic.nsk.su, algk@ngs.ru A. K.TAGATSEV Ceramics

More information

CONTROL CHARTS FOR VARIABLES

CONTROL CHARTS FOR VARIABLES UNIT CONTOL CHATS FO VAIABLES Structure.1 Introuction Objectives. Control Chart Technique.3 Control Charts for Variables.4 Control Chart for Mean(-Chart).5 ange Chart (-Chart).6 Stanar Deviation Chart

More information

The new concepts of measurement error s regularities and effect characteristics

The new concepts of measurement error s regularities and effect characteristics The new concepts of measurement error s regularities an effect characteristics Ye Xiaoming[1,] Liu Haibo [3,,] Ling Mo[3] Xiao Xuebin [5] [1] School of Geoesy an Geomatics, Wuhan University, Wuhan, Hubei,

More information

Multi-View Clustering via Canonical Correlation Analysis

Multi-View Clustering via Canonical Correlation Analysis Kamalika Chauhuri ITA, UC San Diego, 9500 Gilman Drive, La Jolla, CA Sham M. Kakae Karen Livescu Karthik Sriharan Toyota Technological Institute at Chicago, 6045 S. Kenwoo Ave., Chicago, IL kamalika@soe.ucs.eu

More information

The Principle of Least Action

The Principle of Least Action Chapter 7. The Principle of Least Action 7.1 Force Methos vs. Energy Methos We have so far stuie two istinct ways of analyzing physics problems: force methos, basically consisting of the application of

More information

Application of Measurement System R&R Analysis in Ultrasonic Testing

Application of Measurement System R&R Analysis in Ultrasonic Testing 17th Worl Conference on Nonestructive Testing, 5-8 Oct 8, Shanghai, China Alication of Measurement System & Analysis in Ultrasonic Testing iao-hai ZHANG, Bing-ya CHEN, Yi ZHU Deartment of Testing an Control

More information

Stable and compact finite difference schemes

Stable and compact finite difference schemes Center for Turbulence Research Annual Research Briefs 2006 2 Stable an compact finite ifference schemes By K. Mattsson, M. Svär AND M. Shoeybi. Motivation an objectives Compact secon erivatives have long

More information

Linear and quadratic approximation

Linear and quadratic approximation Linear an quaratic approximation November 11, 2013 Definition: Suppose f is a function that is ifferentiable on an interval I containing the point a. The linear approximation to f at a is the linear function

More information

Wavelet-based Local Tomography

Wavelet-based Local Tomography Inian Society for Non-Destructive Testing Hyeraba Chapter Proc. National Seminar on Non-Destructive Evaluation Dec. 7-9, 006, Hyeraba Wavelet-base Local Tomography M.V. Gopala Rao, E.M.L. Tanua an S. Vathsal

More information

. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences.

. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences. S 63 Lecture 8 2/2/26 Lecturer Lillian Lee Scribes Peter Babinski, Davi Lin Basic Language Moeling Approach I. Special ase of LM-base Approach a. Recap of Formulas an Terms b. Fixing θ? c. About that Multinomial

More information

FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS. 1. Introduction

FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS. 1. Introduction FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS ALINA BUCUR, CHANTAL DAVID, BROOKE FEIGON, MATILDE LALÍN 1 Introuction In this note, we stuy the fluctuations in the number

More information

A medical image encryption algorithm based on synchronization of time-delay chaotic system

A medical image encryption algorithm based on synchronization of time-delay chaotic system Av. Manuf. (1) 5:15 1 DOI 1.1/s3-1-1-5 A meical image encryption algorithm base on synchronization of time-elay chaotic system Hua Wang 1 Jian-Min Ye 1 Hang-Feng Liang 1 Zhong-Hua Miao 1 Receive: 9 October

More information

arxiv: v1 [cs.lg] 22 Mar 2014

arxiv: v1 [cs.lg] 22 Mar 2014 CUR lgorithm with Incomplete Matrix Observation Rong Jin an Shenghuo Zhu Dept. of Computer Science an Engineering, Michigan State University, rongjin@msu.eu NEC Laboratories merica, Inc., zsh@nec-labs.com

More information

Research Article Chaotic Dynamics-Based Analysis of Broadband Piezoelectric Vibration Energy Harvesting Enhanced by Using Nonlinearity

Research Article Chaotic Dynamics-Based Analysis of Broadband Piezoelectric Vibration Energy Harvesting Enhanced by Using Nonlinearity Shock an Vibration Volume 16, Article ID 3587, 11 pages http://x.oi.org/1.1155/16/3587 Research Article Chaotic Dynamics-Base Analysis of Broaban Piezoelectric Vibration Energy Harvesting Enhance by Using

More information

The canonical controllers and regular interconnection

The canonical controllers and regular interconnection Systems & Control Letters ( www.elsevier.com/locate/sysconle The canonical controllers an regular interconnection A.A. Julius a,, J.C. Willems b, M.N. Belur c, H.L. Trentelman a Department of Applie Mathematics,

More information

Calculus and optimization

Calculus and optimization Calculus an optimization These notes essentially correspon to mathematical appenix 2 in the text. 1 Functions of a single variable Now that we have e ne functions we turn our attention to calculus. A function

More information

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Backorders Under the (R,r) Policy

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Backorders Under the (R,r) Policy IPA Derivatives for Make-to-Stock Prouction-Inventory Systems With Backorers Uner the (Rr) Policy Yihong Fan a Benamin Melame b Yao Zhao c Yorai Wari Abstract This paper aresses Infinitesimal Perturbation

More information

On the Cauchy Problem for Von Neumann-Landau Wave Equation

On the Cauchy Problem for Von Neumann-Landau Wave Equation Journal of Applie Mathematics an Physics 4 4-3 Publishe Online December 4 in SciRes http://wwwscirporg/journal/jamp http://xoiorg/436/jamp4343 On the Cauchy Problem for Von Neumann-anau Wave Equation Chuangye

More information

Non-Linear Bayesian CBRN Source Term Estimation

Non-Linear Bayesian CBRN Source Term Estimation Non-Linear Bayesian CBRN Source Term Estimation Peter Robins Hazar Assessment, Simulation an Preiction Group Dstl Porton Down, UK. probins@stl.gov.uk Paul Thomas Hazar Assessment, Simulation an Preiction

More information

Lie symmetry and Mei conservation law of continuum system

Lie symmetry and Mei conservation law of continuum system Chin. Phys. B Vol. 20, No. 2 20 020 Lie symmetry an Mei conservation law of continuum system Shi Shen-Yang an Fu Jing-Li Department of Physics, Zhejiang Sci-Tech University, Hangzhou 3008, China Receive

More information

Adjustable Fractional-Delay Filters Utilizing the Farrow Structure and Multirate Techniques

Adjustable Fractional-Delay Filters Utilizing the Farrow Structure and Multirate Techniques Ajustable Fractional-Delay Filters Utilizing the Farrow Structure an Multirate Techniques Håkan Johansson (hakanj@isy.liu.se)* an Ewa Hermanowicz (hewa@eti.pg.ga.pl)** *Division of Electronics Systems,

More information

The analysis of decimation and interpolation in the linear canonical transform domain

The analysis of decimation and interpolation in the linear canonical transform domain DOI 0.86/s40064-06-3479-4 RESEARCH Open Access The analysis of decimation and interpolation in the linear canonical transform domain Shuiqing Xu *, Yi Chai,, Youqiang Hu, Lei Huang and Li Feng *Correspondence:

More information

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k A Proof of Lemma 2 B Proof of Lemma 3 Proof: Since the support of LL istributions is R, two such istributions are equivalent absolutely continuous with respect to each other an the ivergence is well-efine

More information

Sharp Thresholds. Zachary Hamaker. March 15, 2010

Sharp Thresholds. Zachary Hamaker. March 15, 2010 Sharp Threshols Zachary Hamaker March 15, 2010 Abstract The Kolmogorov Zero-One law states that for tail events on infinite-imensional probability spaces, the probability must be either zero or one. Behavior

More information

Consider for simplicity a 3rd-order IIR filter with a transfer function. where

Consider for simplicity a 3rd-order IIR filter with a transfer function. where Basic IIR Digital Filter The causal IIR igital filters we are concerne with in this course are characterie by a real rational transfer function of or, equivalently by a constant coefficient ifference equation

More information

On Characterizing the Delay-Performance of Wireless Scheduling Algorithms

On Characterizing the Delay-Performance of Wireless Scheduling Algorithms On Characterizing the Delay-Performance of Wireless Scheuling Algorithms Xiaojun Lin Center for Wireless Systems an Applications School of Electrical an Computer Engineering, Purue University West Lafayette,

More information

EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION OF UNIVARIATE TAYLOR SERIES

EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION OF UNIVARIATE TAYLOR SERIES MATHEMATICS OF COMPUTATION Volume 69, Number 231, Pages 1117 1130 S 0025-5718(00)01120-0 Article electronically publishe on February 17, 2000 EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION

More information

Critical consideration on the Freeman and Carroll method for evaluating global mass loss kinetics of polymer thermal degradation

Critical consideration on the Freeman and Carroll method for evaluating global mass loss kinetics of polymer thermal degradation Thermochimica Acta 338 (1999) 85±94 Critical consieration on the Freeman an Carroll metho for evaluating global mass loss kinetics of polymer thermal egraation N.A. Liu *, W.C. Fan State Key Laboratory

More information

28.1 Parametric Yield Estimation Considering Leakage Variability

28.1 Parametric Yield Estimation Considering Leakage Variability 8.1 Parametric Yiel Estimation Consiering Leakage Variability Rajeev R. Rao, Aniruh Devgan*, Davi Blaauw, Dennis Sylvester University of Michigan, Ann Arbor, MI, *IBM Corporation, Austin, TX {rrrao, blaauw,

More information

Basic IIR Digital Filter Structures

Basic IIR Digital Filter Structures Basic IIR Digital Filter Structures The causal IIR igital filters we are concerne with in this course are characterie by a real rational transfer function of or, equivalently by a constant coefficient

More information

Generalizing Kronecker Graphs in order to Model Searchable Networks

Generalizing Kronecker Graphs in order to Model Searchable Networks Generalizing Kronecker Graphs in orer to Moel Searchable Networks Elizabeth Boine, Babak Hassibi, Aam Wierman California Institute of Technology Pasaena, CA 925 Email: {eaboine, hassibi, aamw}@caltecheu

More information

Introduction to variational calculus: Lecture notes 1

Introduction to variational calculus: Lecture notes 1 October 10, 2006 Introuction to variational calculus: Lecture notes 1 Ewin Langmann Mathematical Physics, KTH Physics, AlbaNova, SE-106 91 Stockholm, Sween Abstract I give an informal summary of variational

More information

We G Model Reduction Approaches for Solution of Wave Equations for Multiple Frequencies

We G Model Reduction Approaches for Solution of Wave Equations for Multiple Frequencies We G15 5 Moel Reuction Approaches for Solution of Wave Equations for Multiple Frequencies M.Y. Zaslavsky (Schlumberger-Doll Research Center), R.F. Remis* (Delft University) & V.L. Druskin (Schlumberger-Doll

More information

Research Article U-Statistic for Multivariate Stable Distributions

Research Article U-Statistic for Multivariate Stable Distributions Hinawi Probability an Statistics Volume 2017, Article ID 3483827, 12 pages https://oiorg/101155/2017/3483827 Research Article U-Statistic for Multivariate Stable Distributions Mahi Teimouri, Saei Rezakhah,

More information

A Random Graph Model for Massive Graphs

A Random Graph Model for Massive Graphs A Ranom Graph Moel for Massive Graphs William Aiello AT&T Labs Florham Park, New Jersey aiello@research.att.com Fan Chung University of California, San Diego fan@ucs.eu Linyuan Lu University of Pennsylvania,

More information

Calculus Class Notes for the Combined Calculus and Physics Course Semester I

Calculus Class Notes for the Combined Calculus and Physics Course Semester I Calculus Class Notes for the Combine Calculus an Physics Course Semester I Kelly Black December 14, 2001 Support provie by the National Science Founation - NSF-DUE-9752485 1 Section 0 2 Contents 1 Average

More information