Research Article Image Watermarking in the Linear Canonical Transform Domain
|
|
- Rosalind Lester
- 5 years ago
- Views:
Transcription
1 Mathematical Problems in Engineering, Article ID 5059, 9 pages Research Article Image Watermarking in the Linear Canonical Transform Domain Bing-Zhao Li an Yu-Pu Shi School of Mathematics an Statistics of Beijing Institute of Technology, Beijing 0008, China Corresponence shoul be aresse to Bing-Zhao Li; li bingzhao@bit.eu.cn Receive December 0; Revise 9 February 0; Accepte 9 February 0; Publishe March 0 Acaemic Eitor: Juan J. Trujillo Copyright 0 B.-Z. Li an Y.-P. Shi. This is an open access article istribute uner the Creative Commons Attribution License, which permits unrestricte use, istribution, an reprouction in any meium, provie the original work is properly cite. The linear canonical transform, which can be looke at the generalization of the fractional Fourier transform an the Fourier transform, has receive much interest an prove to be one of the most powerful tools in fractional signal processing community. A novel watermarking metho associate with the linear canonical transform is propose in this paper. Firstly, the watermark embeing an etecting techniques are propose an iscusse base on the iscrete linear canonical transform. Then the Lena image has been use to test this watermarking technique. The simulation results emonstrate that the propose schemes are robust to several signal processing methos, incluing aition of Gaussian noise an resizing. Furthermore, the sensitivity of the single an ouble parameters of the linear canonical transform is also iscusse, an the results show that the watermark cannot be etecte when the parameters of the linear canonical transform use in the etection are not all the same as the parameters use in the embeing progress.. Introuction Over the past several ecaes, igital watermarking become more an more important in the application of copyright protection for igital meia as image, vieo, an auio [ ]. A igital watermark is a coe which embes copyright information incluing sequence number, a picture, an text into the multimeia for copyright protection. The watermark must be easily etecte by the copyright owner, the creator of the work, an the authorize consumer while is harly rea by the people who want to counterfeit the copyright of the ata without authorization. Digital watermarking is an emerging technology in signal processing an communications which is uner active evelopment. The methos use to embe the watermark influence both the robustness an the etection algorithm. One of the hottest irections of the watermarking metho is the watermarking in the transform omain, for example, in the iscrete Fourier transform (DFT) omain [ ] an in the iscrete cosine transform (DCT) omain [7, 8], an the watermark propose in [7] is two Gaussian sequences an it is embee in the magnitue of the DCT transformation coefficients. A wealth of information an references can be foun on the site of Watermarking Worl [9]. Recently, with the evelopment of the fractional signal an processing technologies, the research results of the fractional Fourier transform (FRFT) an fractional Fourier operators have shown that the fractional omain signal processingcanbelookeatasoneofthehottestresearch topics for nonstationary signals processing [0 5]. Several igital watermarking methos are propose in the FRFT Domain [ 9] base on these novel results of the FRFT. A nonsensical watermark embee in the FRFT omain was propose in [], an it has a more security because of the free parameter of the FRFT. Bultheel [8] escribes the implementation of a watermark embeing technique in the FRFT omain in etail an also iscusses the embeing several watermarks at the same time for images. The practical etecting threshol propose in [8] is one of the most important contributions of the paper. All of these results, which come from the igital watermarking technology in the FRFT omain, have shown that the watermarking metho in these transform omains can be more secure an har to be etecte compare to the traitional metho in the classical DFTanDCTomain. The linear canonical transform (LCT) [0], which can be looke at as the further generalization of the fractional
2 Mathematical Problems in Engineering Fourier transform, is introuce in the 970s with three free parameters an has been proven to be one of the most powerful tools for nonstationary signal processing. The wellknown signal processing operations, such as the Fourier transform (FT), the FRFT, the Fresnel transform, an the scaling operations, are all special cases of the LCT [0]. The igital computation methos of the LCT have been propose in [ ], an the sampling theories associate with the LCT have been stuie in [5 9], an the eigenfunction [0], the convolution an prouct function [, ], an the uncertainty principle [] havealsobeeninvestigatein etail. Therefore, unerstaning the LCT may help to gain more insight into its special cases an to carry the knowlege gaine from one subject to others [0]. However,forthebestofourknowlege,thereareno papers publishe about the watermarking in the LCT omain. So it is interesting an worthwhile to investigate the watermarkingmethoantechniqueassociatewiththelct. Focusing on this problem, a novel watermarking technique base on the iscrete LCT propose in [] isproposein this paper. The experiment results show that the embee watermarks are both perceptually invisible an robust to various image processing techniques. The remaining of this paper can be ivie into the following sections. The LCT is escribe in Section. Section evelops watermark embeing in LCT omain. Numerical examples an the iscussion of the simulation results are given in Section,an Section 5 is the conclusion.. The Linear Canonical Transform.. The Continuous LCT. The continuous LCT of a signal f(x) with parameter matrix A=( ab c ) can be efine as [0] + f A (y) = C A (f) (y) = f (x) C A (x, y) x, C A (x, y) = b e jπ/ exp {jπ [( a b )x ( b )xy+( b )y ]}, () where C A is the LCT operator an a, b, c, are real parameters. Furthermore the constraint a bc = must be satisfie to make the transform unitary. Actually the LCT has three free parameters; if we let a=γ/, b=/, c= +αγ/, =α/,thelctoff(x) canberewrittenas[] + f A (y) = C A (f) (y) = f (x) C A (x, y) x, () C A (x, y) = e jπ/ exp [jπ (γx xy+αy )], where parameter matrix γ a b A=( c )=( + αγ α ). () Two of interesting an important properties of LCT are reversibility an inex aitivity. Inex aitivity means that, if two LCTs with matrices A,A operateinasuccessive manner, then the equivalent transform is an LCT with the matrix A=A A. Because of the inex aitivity, the inverse of the LCT with matrix A is an LCT with the matrix A. With the evelopment of the fractional signal processing metho, the properties an applications of the LCT have been investigate in etail; for more information associate with the continuous LCT, one can refer to [, 5, 0]... The Discrete LCT. Besies the continuous LCT, we often encounter the computation of the iscrete LCT because we must process iscrete ata by computer. There are lots of iscrete an the fast LCT methos propose in the literature [,, ]. If we set δ x =δ y = (N ) /, x=nδ x, y=mδ y, an m,n = 0,,...,N,the N point iscrete LCT (DLCT) of f(n) canbeefineas[] where C A (m, n) = e (jπ/) N f A (m) = N n=0 f (n) C A (m, n), () exp [jπ N (αm mn+γn )]. (5) ThiskinofDLCTmethoisavailableforimageprocessing, because it is interval-inepenent an unitary. Moreover, it also has the property of inex aitivity. Following this metho, the two-imensional DLCT of a size H Nimage I(h, n) canberewrittenas I A (k, l) = N n=0 C A (l, n) H h=0 I (h, n) C A (k, m) () with k = 0,,...,H, l = 0,,...,N,anC A (k, m), C A (l, n) being the same as (). It is shown in [] thatthis kin of DLCT is analogous to the DFT an approximates the continuous LCT in the same sense that the DFT approximates the continuous Fourier transform. We will use this metho to compute the D LCT of an image in the following sections.. Watermark Embeing an Detecting It is well known that the watermarking process contains the watermark embeing an etecting steps; we propose a new kin of watermarking scheme following the iea of [8]inthis section... Watermark Embeing. The watermark itself is a sequence of M complex numbers [8], enote by s i =c i +j i, i =,,...,M, an the real an imaginary parts of s i are obtaine from a normal istribution with mean zero
3 Mathematical Problems in Engineering an variance σ /. In orer to embe this watermark into an image I of size H N, we first compute the DLCT of this image I to erive the transform coefficients {S i :i= N}an then reorere the transform coefficients in nonincreasing sequence as follows: S i =C i +jd i : S i S i+, i=,...h N. (7) Similar with the metho in [], we chose the mile reorere transform coefficients to embe the watermarks; in other wors, we embe the watermark into the coefficients S i, i=l+,l+,...,l+m. This is because if we embee the watermarks in the lowest coefficients, they woul be sensitive to noise removing or compressing operations, while if we embee the watermarks in the highest coefficients, they woul significantly affect the imperceptibility of the watermarks. So, the watermarks were embee as follows: S w i =S i +c i C i +j i D i, i=l+,...,l+m, (8) where S w i isthewatermarkeimageofi an (c i, i ) is the watermarks sequence... Watermark Detecting. When the watermark is embee intheimage,thentheimageistransferretothewatermark etection process to see whether it contains watermark. The etection of the watermark can be escribe like this: given the watermarke image I a, maybe uner some attacks such as low pass an meian filtering, aition of Gaussian noise, an resizing, we compute the DLCT of I a an obtain the transform coefficients S a an then compute the etection value []: = L+M i=l+ (c i j i )S i. (9) The threshol can be achieve accoring to the statistical performance of the propose algorithm. The expecte value of is E [] = σ L+M i=l+ ( C i + D i ). (0) In [], Djurovic et al. propose a useful an simple threshol as E[]/; when the value of is larger than the threshol, it is ecie that a watermark has been etecte. Otherwise, there is no watermark. However, it is shown in [8] thatthiskin of threshol suffers from the false conclusion; therefore we useanaaptivethresholproposein[8], because it is more practical when we eal with the image after some attacks. Therefore, the threshol can be compute by the following steps. (i) First, we compute the value of of all the ranom watermarks (maybe 000 watermarks). (ii) Then, we compute the average (say μ) an the stanar eviation (say σ)ofthese. (iii) At last, we can achieve the threshol τ=μ+pσwhere p is a suitable number.. Simulation Examples.. Watermark Embeing an Detecting. The Lena (5 5) was chosen as the test image in the simulations. Accoring to some experiments, the value of p in threshol τ = μ+pσwas chosen to be 5. The D DLCT parameters are α = α = 0., = =0., γ =γ =0.an can be escribe as (α,,γ,α,,γ ) = (0., 0., 0., 0., 0., 0.). Therefore, the D DLCT parameter matrixes can be rewritten as A =A =( γ + αγ α )=( ), () an the D DLCT is performe base on (). The simulations performe using Matlab version in Winows 8 system an the processer of the system is Intel(R) Core(TM) i5-7u;thecpuantheramofthesystemare.80ghzan.00 GB, respectively. We chose L = 9000, M = 000, σ = 0 in the simulation. In orer to test the performance of the propose metho, we use the PSNR an the elapse time of the process to measure the performance of the watermarking technology [8]. The original an watermarke images are shown in Figures an,respectively.it is shown that the watermarke picture Figure is almost the same as the original Figure. The etection of the correct watermark from the watermarke image over the other 000 ifferent watermarks, which are also Gaussian white noise with variance σ G = σ / = 0. The etection result is plotte in Figure.Inthis case, the PSNR an the elapse time are 9.7 B an.7 secons, respectively. In Figure, we can easily fin that the etection value of the correct watermark is significantly larger than the threshol an other false watermarks. So, the watermark can be etecte by the comparison... The Robustness. In this subsection, we investigate the robustness of the algorithm after the following attacks: aing noise, upper cropping, central cropping, an central cropping after aing noise. These experiments have been performe as the following. Firstly, Figures an plot the robustness of the watermarking uner the Gaussian noise. Figure is the noisy image of the watermarke image in Figure by aing mean zero an variance 00 Gaussian noise, while thevarianceoffigure is 00. Figures an are etection results of these two situations, the PSNR are 9.7 B an 5.08 B, the elapse times are 9.75 an.8 secons, respectively. This result shows that the metho is robust against noise, because the watermark can be still etecte. Seconly, wecroppethewatermarkeimagefigure from the size 5 5 to an,anobtain Figures 5 an, respectively. The etection results are shown in Figures 5 an, respectively.itisshownin Figures 5 an that the watermark can also be etecte. In this situation, the PSNR are.5 B an 0.8 B, the elapse time are 8.70 an 9.5 secons, respectively.
4 Mathematical Problems in Engineering Figure : The original image of Lena, the watermarke image of Lena Figure : The etection result from the watermarke Figure Figure : The noisy Lena, var = 00. The etection of the noisy Lena.
5 Mathematical Problems in Engineering Figure : The noisy Lena, var = 00. The etection of the noisy Lena Figure 5: The upper croppe image of Figure. The etection of upcroppe image. Thirly, we perform the upper cropping of the noisy imageinfigures an in the same way as in Figure 5 an obtain Figures 7 an 8. The etection results are plotte in Figures 7 an 8, respectively.itisshown in Figure 7 that the watermark can also be etecte for the upper croppe noisy watermarke image of variance 00. We can still etect the watermark for the upper croppe noisy imageofvariance00asshowninfigure 8.Inthissituation, the PSNR are.50 B an.8 B, an the elapse times are 8.70 an 9.88 secons, respectively. Lastly,wecentralcropthenoisyimageinFigures an in the same way as in Figure an obtain Figures 9 an 0. The etection results are plotte in Figure 9 an Figure 0,respectively.ItisshowninFigure 9 that the watermark can also be etecte for the central croppe noisy watermarke image of variance 00. We can still etect the watermark for the central croppe noisy image of variance 00 as shown in Figure 0. Inthissituation,thePSNRare 0.8 B an 0.78 B, an the elapse times are 9.5 an 9.0 secons, respectively. From these simulations, it can be conclue that the propose metho is robust uner the common image attacks, such as the noise, crops, an the crops of the noisy image. It shoul be also notice from Figures 8 an 0 that the propose metho still works uner the attack of cropping if the variance of the aing noise is about 00.
6 Mathematical Problems in Engineering Figure : The central croppe image of Figure. The etection of central croppe image Figure 7: The upper croppe noisy Lena of Figure. The etection of the upcroppe noisy Lena... The Parameters Sensitivity. As compare to the traitional watermarking metho, for example, the DFT an DCT omain metho [5 8], the avantage of the propose metho is that it has three more free parameters, an this can enhance the security an robustness of the watermarking images. It is well known that the parameters of the LCT are two more than the parameters of the FRFT, an for the D-LCT there are six parameters. So, when we nee to etect the watermarks, we not only nee the watermarke keys but also nee the six parameters which is three times the number of the FRFT s parameter. Therefore, it is more ifficult for the unauthorize person to etect the watermark an estroy it. In orer to show the avantage of the LCT base watermarking metho propose in this paper, the sensitivity of the parameter (α,,γ,α,,γ ) is iscusse in this subsection.weusethewatermarkeimageinfigure as teste image, we set (α,,γ ) = (0., 0., 0.), an o not know the value of α,,anγ in simulations; the value of is sensitive with the α,,anγ asplotteinfigure. It is shown in Figure that the value of is significantly larger when the value of α,,anγ are more correct than the false values of the parameters. For example, when the unauthorize people know (,γ,α,,γ ) = (0., 0., 0., 0., 0.), the correct place of the watermark, an the correct watermark but not sure about the value of α,the watermark still cannot be etecte because only the value of correct α can reach the peak accoring to Figure.We can also see that the sensitivity of α an is goo, while
7 Mathematical Problems in Engineering Figure 8: The upcroppe noisy Lena of Figure. The etection of the upcroppe noisy Lena Figure 9: The central croppe noisy Lena of Figure. The etection of the central croppe noisy Lena. the sensitivity of γ is not so gratifying especially when γ is between an in Figure (c). 5. Conclusion A novel watermarking technique base on the iscrete LCTisproposeinthispaper.Inthiskinofmetho, the watermarks are embee in the mile coefficients in the transform omain, an the etecting threshol is etermine aaptively. The simulations for the robustness of the propose metho uner the common image processing are performe, an the simulation results fit the theories well.theproposewatermarkingismoresecurethanthe watermarking base on FRFT or DCT omain because it has more free parameters. We also iscusse the parameter s sensitivity of the propose metho in the paper an showe that this kin of watermarking metho is sensitive to the parameters of the LCT. Conflict of Interests The authors eclare that there is no conflict of interests regaring the publication of this paper. Acknowlegments This work was supporte by the National Natural Science Founation of China (no an no. 795) an
8 8 Mathematical Problems in Engineering Figure 0: The central croppe noisy Lena of Figure. The etection of the central croppe noisy Lena (c) Figure : The sensitivity of parameters. The sensitivity of α,thesensitivityof, an (c) the sensitivity of γ.
9 Mathematical Problems in Engineering 9 is also supporte by Program for New Century Excellent Talents in University (no. NCET--00). References [] I.J.Cox,J.Kilian,T.Leighton,anT.Shamoon, Securesprea spectrum watermarking for images, auio an vieo, in Proceeings of the IEEE International Conference on Image Processing (ICIP 9), vol.,pp.,lausanne,switzerlan, September 99. [] K.Eckhar,J.Rinfrey,anJ.Zhao, Copyrightprotectionfor multimeia ata, in Proceeings of the International Conference on Digital Meia an Electronic Publishing,vol.,99. [] I. J. Cox, J. Kilian, F. T. Leighton, an T. Shamoon, Secure sprea spectrum watermarking for multimeia, IEEE Transactions on Image Processing,vol.,no.,pp.7 87,997. []J.J.K.O Ruanaih,W.J.Dowling,anF.M.Bolan, Phase watermarking of igital images, in Proceeings of the IEEE International Conference on Image Processing (ICIP 9), vol., pp. 9, Lausanne, Switzerlan, September 99. [5] V. Solachiis an I. Pitas, Circularly symmetric watermark embeing in -D DFT omain, IEEE Transactions on Image Processing,vol.0,no.,pp.7 75,00. []S.Liu,B.M.Hennelly,anJ.T.Sherian, Digitalimage watermarking sprea-space technique base on ouble ranom phase encoing, Optical Communications,vol.00,pp. 77, 0. [7]M.Barni,F.Bartolini,V.Cappellini,anA.Piva, ADCTomain system for robust image watermarking, Signal Processing,vol.,no.,pp.57 7,998. [8] A. Piva, M. Barni, F. Bartolini, an V. Cappellini, DCT-base watermark recovering without resorting to the uncorrupte original image, in Proceeings of the International Conference on Image Processing, vol., pp. 50 5, October 997. [9] M. Kutter, Watermarking worl, [0] C. Canan, M. A. Kutay, an H. M. Ozaktas, The iscrete fractional Fourier transform, IEEE Transactions on Signal Processing,vol.8,no.5,pp.9 7,000. [] H. M. Ozaktas, N. Erkaya, an M. A. Kutay, Effect of fractional Fourier transformation on time-frequency istributions belonging to the Cohen class, IEEE Signal Processing Letters, vol., no., pp. 0, 99. [] H. Ozaktas an D. Menlovic, Fractional Fourier transforms an their optical implementation. II, the Optical Society of America A, vol. 0, no., pp. 5 5, 99. [] S.-C. Pei, C.-C. Tseng, M.-H. Yeh, an J.-J. Shyu, Discrete fractional hartley an fourier transforms, IEEE Transactions on Circuits an Systems II: Analog an Digital Signal Processing,vol. 5, no., pp. 5 75, 998. [] H. M. Ozaktas, M. A. Kutay, an Z. Zalevsky, The Fractional Fourier Transform With Applications in Optics an Signal Processing, Wiley, New York, NY, USA, 000. [5] R.Tao,B.Deng,anY.Wang,Fractional Fourier Transform an Its Applications, University Press, Beijing, China, 009. [] I. Djurovic, S. Stankovic, an I. Pitas, Digital watermarking in the fractional Fourier transformation omain, Network an Computer Applications,vol.,no.,pp.7 7, 00. [7] M. A. Savelonas an S. Chountasis, Noise-resistant watermarking in the fractional Fourier omain utilizing moment-base image representation, Signal Processing, vol. 90, no. 8, pp. 5 58, 00. [8] A. Bultheel, Digital watermarking of images in the fractional Fourier omain, TW Report TW97, 007. [9] N. K. Nishchal, Hierarchical encrypte image watermarking using fractional Fourier omain ranom phase encoing, Optical Engineering, vol. 50, no. 9, Article ID 09700, 0. [0] T.-Z. Xu an B.-Z. Li, Linear Canonical Transform an Its Applications, Science Press, Beijing, China, 0. [] S.-C. Pei an J.-J. Ding, Close-form iscrete fractional an affine Fourier transforms, IEEE Transactions on Signal Processing,vol.8,no.5,pp.8 5,000. [] A. Koç, H. M. Ozaktas, C. Canan, an M. A. Kutay, Digital computation of linear canonical transforms, IEEE Transactions on Signal Processing,vol.5,no.,pp.8 9,008. [] F. S. Oktem an H. M. Ozaktas, Exact relation between continuous an iscrete linear canonical transforms, IEEE Signal Processing Letters,vol.,no.8,pp.77 70,009. [] J. J. Healy an J. T. Sherian, Sampling an iscretization of the linear canonical transform, Signal Processing,vol.89,no.,pp. 8, 009. [5] B.-Z. Li, R. Tao, an Y. Wang, New sampling formulae relate to linear canonical transform, Signal Processing, vol.87,no.5, pp , 007. [] A. Stern, Sampling of linear canonical transforme signals, Signal Processing,vol.8,no.7,pp. 5,00. [7] R. Tao, B.-Z. Li, Y. Wang, an G. K. Aggrey, On sampling of ban-limite signals associate with the linear canonical transform, IEEE Transactions on Signal Processing, vol.5,no., pp. 55 5, 008. [8] B.-Z. Li an T.-Z. Xu, Spectral analysis of sample signals in the linear canonical transform omain, Mathematical Problems in Engineering,vol.0,ArticleID5,9pages,0. [9] B.-Z. Li an T.-Z. Xu, Sampling in the linear canonical transform omain, Mathematical Problems in Engineering,vol. 0,ArticleID50580,pages,0. [0] S.-C. Pei an J.-J. Ding, Eigenfunctions of linear canonical transform, IEEE Transactions on Signal Processing, vol.50,no., pp., 00. [] D. Wei, Q. Ran, Y. Li, J. Ma, an L. Tan, A convolution an prouct theorem for the linear canonical transform, IEEE Signal Processing Letters,vol.,no.0,pp.85 85,009. [] B. Deng, R. Tao, an Y. Wang, Convolution theorems for the linear canonical transform an their applications, Science in China. Series F. Information Sciences,vol.9,no.5,pp.59 0, 00. [] J. Zhao, R. Tao, Y.-L. Li, an Y. Wang, Uncertainty principles for linear canonical transform, IEEE Transactions on Signal Processing,vol.57,no.7,pp ,009.
10 Avances in Operations Research Avances in Decision Sciences Applie Mathematics Algebra Probability an Statistics The Scientific Worl Journal International Differential Equations Submit your manuscripts at International Avances in Combinatorics Mathematical Physics Complex Analysis International Mathematics an Mathematical Sciences Mathematical Problems in Engineering Mathematics Discrete Mathematics Discrete Dynamics in Nature an Society Function Spaces Abstract an Applie Analysis International Stochastic Analysis Optimization
Image Denoising Using Spatial Adaptive Thresholding
International Journal of Engineering Technology, Management an Applie Sciences Image Denoising Using Spatial Aaptive Thresholing Raneesh Mishra M. Tech Stuent, Department of Electronics & Communication,
More informationSurvey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013
Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing
More informationLeast-Squares Regression on Sparse Spaces
Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction
More informationResearch Article When Inflation Causes No Increase in Claim Amounts
Probability an Statistics Volume 2009, Article ID 943926, 10 pages oi:10.1155/2009/943926 Research Article When Inflation Causes No Increase in Claim Amounts Vytaras Brazauskas, 1 Bruce L. Jones, 2 an
More informationResearch Article Wigner-Ville Distribution Associated with the Linear Canonical Transform
Applied Mathematics Volume 2, Article ID 746, 4 pages doi:.55/2/746 Research Article Wigner-Ville Distribution Associated with the Linear Canonical Transform Rui-Feng Bai, Bing-Zhao Li, and Qi-Yuan Cheng
More informationAPPLICATION of compressed sensing (CS) in radar signal
A Novel Joint Compressive Single Target Detection an Parameter Estimation in Raar without Signal Reconstruction Alireza Hariri, Massou Babaie-Zaeh Department of Electrical Engineering, Sharif University
More informationA Weak First Digit Law for a Class of Sequences
International Mathematical Forum, Vol. 11, 2016, no. 15, 67-702 HIKARI Lt, www.m-hikari.com http://x.oi.org/10.1288/imf.2016.6562 A Weak First Digit Law for a Class of Sequences M. A. Nyblom School of
More informationTime-of-Arrival Estimation in Non-Line-Of-Sight Environments
2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor
More informationHybrid Fusion for Biometrics: Combining Score-level and Decision-level Fusion
Hybri Fusion for Biometrics: Combining Score-level an Decision-level Fusion Qian Tao Raymon Velhuis Signals an Systems Group, University of Twente Postbus 217, 7500AE Enschee, the Netherlans {q.tao,r.n.j.velhuis}@ewi.utwente.nl
More informationIntegration Review. May 11, 2013
Integration Review May 11, 2013 Goals: Review the funamental theorem of calculus. Review u-substitution. Review integration by parts. Do lots of integration eamples. 1 Funamental Theorem of Calculus In
More informationResearch Article Global and Blow-Up Solutions for Nonlinear Hyperbolic Equations with Initial-Boundary Conditions
International Differential Equations Volume 24, Article ID 724837, 5 pages http://x.oi.org/.55/24/724837 Research Article Global an Blow-Up Solutions for Nonlinear Hyperbolic Equations with Initial-Bounary
More informationConstruction of the Electronic Radial Wave Functions and Probability Distributions of Hydrogen-like Systems
Construction of the Electronic Raial Wave Functions an Probability Distributions of Hyrogen-like Systems Thomas S. Kuntzleman, Department of Chemistry Spring Arbor University, Spring Arbor MI 498 tkuntzle@arbor.eu
More informationA Novel Decoupled Iterative Method for Deep-Submicron MOSFET RF Circuit Simulation
A Novel ecouple Iterative Metho for eep-submicron MOSFET RF Circuit Simulation CHUAN-SHENG WANG an YIMING LI epartment of Mathematics, National Tsing Hua University, National Nano evice Laboratories, an
More informationInverse Theory Course: LTU Kiruna. Day 1
Inverse Theory Course: LTU Kiruna. Day Hugh Pumphrey March 6, 0 Preamble These are the notes for the course Inverse Theory to be taught at LuleåTekniska Universitet, Kiruna in February 00. They are not
More informationIntroduction to Markov Processes
Introuction to Markov Processes Connexions moule m44014 Zzis law Gustav) Meglicki, Jr Office of the VP for Information Technology Iniana University RCS: Section-2.tex,v 1.24 2012/12/21 18:03:08 gustav
More informationResearch Article Poisson Summation Formulae Associated with the Special Affine Fourier Transform and Offset Hilbert Transform
Hindawi Mathematical Problems in Engineering Volume 017, Article ID 135419, 5 pages https://doi.org/10.1155/017/135419 Research Article Poisson Summation Formulae Associated with the Special Affine Fourier
More informationImproving Estimation Accuracy in Nonrandomized Response Questioning Methods by Multiple Answers
International Journal of Statistics an Probability; Vol 6, No 5; September 207 ISSN 927-7032 E-ISSN 927-7040 Publishe by Canaian Center of Science an Eucation Improving Estimation Accuracy in Nonranomize
More informationOptimized Signal De-noising Algorithm for Acoustic Emission Leakage
1009 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Eitors: Peiyu Ren, Yancang Li, Huiping Song Copyright 2015, AIDIC Servizi S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The
More informationComputing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions
Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5
More informationA Modification of the Jarque-Bera Test. for Normality
Int. J. Contemp. Math. Sciences, Vol. 8, 01, no. 17, 84-85 HIKARI Lt, www.m-hikari.com http://x.oi.org/10.1988/ijcms.01.9106 A Moification of the Jarque-Bera Test for Normality Moawa El-Fallah Ab El-Salam
More informationTEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE
TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS Yannick DEVILLE Université Paul Sabatier Laboratoire Acoustique, Métrologie, Instrumentation Bât. 3RB2, 8 Route e Narbonne,
More informationConcentration of Measure Inequalities for Compressive Toeplitz Matrices with Applications to Detection and System Identification
Concentration of Measure Inequalities for Compressive Toeplitz Matrices with Applications to Detection an System Ientification Borhan M Sananaji, Tyrone L Vincent, an Michael B Wakin Abstract In this paper,
More informationTHE VAN KAMPEN EXPANSION FOR LINKED DUFFING LINEAR OSCILLATORS EXCITED BY COLORED NOISE
Journal of Soun an Vibration (1996) 191(3), 397 414 THE VAN KAMPEN EXPANSION FOR LINKED DUFFING LINEAR OSCILLATORS EXCITED BY COLORED NOISE E. M. WEINSTEIN Galaxy Scientific Corporation, 2500 English Creek
More informationParameter estimation: A new approach to weighting a priori information
Parameter estimation: A new approach to weighting a priori information J.L. Mea Department of Mathematics, Boise State University, Boise, ID 83725-555 E-mail: jmea@boisestate.eu Abstract. We propose a
More informationThermal conductivity of graded composites: Numerical simulations and an effective medium approximation
JOURNAL OF MATERIALS SCIENCE 34 (999)5497 5503 Thermal conuctivity of grae composites: Numerical simulations an an effective meium approximation P. M. HUI Department of Physics, The Chinese University
More informationSituation awareness of power system based on static voltage security region
The 6th International Conference on Renewable Power Generation (RPG) 19 20 October 2017 Situation awareness of power system base on static voltage security region Fei Xiao, Zi-Qing Jiang, Qian Ai, Ran
More informationSeparation of Variables
Physics 342 Lecture 1 Separation of Variables Lecture 1 Physics 342 Quantum Mechanics I Monay, January 25th, 2010 There are three basic mathematical tools we nee, an then we can begin working on the physical
More informationMath Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors
Math 18.02 Notes on ifferentials, the Chain Rule, graients, irectional erivative, an normal vectors Tangent plane an linear approximation We efine the partial erivatives of f( xy, ) as follows: f f( x+
More informationMulti-View Clustering via Canonical Correlation Analysis
Technical Report TTI-TR-2008-5 Multi-View Clustering via Canonical Correlation Analysis Kamalika Chauhuri UC San Diego Sham M. Kakae Toyota Technological Institute at Chicago ABSTRACT Clustering ata in
More informationFast image compression using matrix K-L transform
Fast image compression using matrix K-L transform Daoqiang Zhang, Songcan Chen * Department of Computer Science an Engineering, Naning University of Aeronautics & Astronautics, Naning 2006, P.R. China.
More informationOne-dimensional I test and direction vector I test with array references by induction variable
Int. J. High Performance Computing an Networking, Vol. 3, No. 4, 2005 219 One-imensional I test an irection vector I test with array references by inuction variable Minyi Guo School of Computer Science
More informationALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS
ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an
More informationEvent based Kalman filter observer for rotary high speed on/off valve
28 American Control Conference Westin Seattle Hotel, Seattle, Washington, USA June 11-13, 28 WeC9.6 Event base Kalman filter observer for rotary high spee on/off valve Meng Wang, Perry Y. Li ERC for Compact
More informationSYNCHRONOUS SEQUENTIAL CIRCUITS
CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents
More informationJournal of Engineering Science and Technology Review 7 (1) (2014) Research Article
Jestr Journal of Engineering Science an Technology Review 7 () (04) 8 Research Article JOURNA OF Engineering Science an Technology Review www.jestr.org Research on the Measurement Error of MWIR Average
More informationELEC3114 Control Systems 1
ELEC34 Control Systems Linear Systems - Moelling - Some Issues Session 2, 2007 Introuction Linear systems may be represente in a number of ifferent ways. Figure shows the relationship between various representations.
More informationMulti-View Clustering via Canonical Correlation Analysis
Keywors: multi-view learning, clustering, canonical correlation analysis Abstract Clustering ata in high-imensions is believe to be a har problem in general. A number of efficient clustering algorithms
More informationRobust Low Rank Kernel Embeddings of Multivariate Distributions
Robust Low Rank Kernel Embeings of Multivariate Distributions Le Song, Bo Dai College of Computing, Georgia Institute of Technology lsong@cc.gatech.eu, boai@gatech.eu Abstract Kernel embeing of istributions
More informationA Note on Exact Solutions to Linear Differential Equations by the Matrix Exponential
Avances in Applie Mathematics an Mechanics Av. Appl. Math. Mech. Vol. 1 No. 4 pp. 573-580 DOI: 10.4208/aamm.09-m0946 August 2009 A Note on Exact Solutions to Linear Differential Equations by the Matrix
More informationTIME-DELAY ESTIMATION USING FARROW-BASED FRACTIONAL-DELAY FIR FILTERS: FILTER APPROXIMATION VS. ESTIMATION ERRORS
TIME-DEAY ESTIMATION USING FARROW-BASED FRACTIONA-DEAY FIR FITERS: FITER APPROXIMATION VS. ESTIMATION ERRORS Mattias Olsson, Håkan Johansson, an Per öwenborg Div. of Electronic Systems, Dept. of Electrical
More informationNecessary and Sufficient Conditions for Sketched Subspace Clustering
Necessary an Sufficient Conitions for Sketche Subspace Clustering Daniel Pimentel-Alarcón, Laura Balzano 2, Robert Nowak University of Wisconsin-Maison, 2 University of Michigan-Ann Arbor Abstract This
More informationA nonlinear inverse problem of the Korteweg-de Vries equation
Bull. Math. Sci. https://oi.org/0.007/s3373-08-025- A nonlinear inverse problem of the Korteweg-e Vries equation Shengqi Lu Miaochao Chen 2 Qilin Liu 3 Receive: 0 March 207 / Revise: 30 April 208 / Accepte:
More informationExamining Geometric Integration for Propagating Orbit Trajectories with Non-Conservative Forcing
Examining Geometric Integration for Propagating Orbit Trajectories with Non-Conservative Forcing Course Project for CDS 05 - Geometric Mechanics John M. Carson III California Institute of Technology June
More informationA NONLINEAR SOURCE SEPARATION APPROACH FOR THE NICOLSKY-EISENMAN MODEL
6th European Signal Processing Conference EUSIPCO 28, Lausanne, Switzerlan, August 25-29, 28, copyright by EURASIP A NONLINEAR SOURCE SEPARATION APPROACH FOR THE NICOLSKY-EISENMAN MODEL Leonaro Tomazeli
More informationOutline. Introduction Definition of fractional fourier transform Linear canonical transform Implementation of FRFT/LCT
04//5 Outline Introduction Definition of fractional fourier transform Linear canonical transform Implementation of FRFT/LCT The Direct Computation DFT-like Method Chirp Convolution Method Discrete fractional
More informationFractional Geometric Calculus: Toward A Unified Mathematical Language for Physics and Engineering
Fractional Geometric Calculus: Towar A Unifie Mathematical Language for Physics an Engineering Xiong Wang Center of Chaos an Complex Network, Department of Electronic Engineering, City University of Hong
More informationA Constructive Inversion Framework for Twisted Convolution
A Constructive Inversion Framework for Twiste Convolution Yonina C. Elar, Ewa Matusiak, Tobias Werther June 30, 2006 Subject Classification: 44A35, 15A30, 42C15 Key Wors: Twiste convolution, Wiener s Lemma,
More informationSturm-Liouville Theory
LECTURE 5 Sturm-Liouville Theory In the three preceing lectures I emonstrate the utility of Fourier series in solving PDE/BVPs. As we ll now see, Fourier series are just the tip of the iceberg of the theory
More information2Algebraic ONLINE PAGE PROOFS. foundations
Algebraic founations. Kick off with CAS. Algebraic skills.3 Pascal s triangle an binomial expansions.4 The binomial theorem.5 Sets of real numbers.6 Surs.7 Review . Kick off with CAS Playing lotto Using
More informationAgmon Kolmogorov Inequalities on l 2 (Z d )
Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,
More informationMulti-View Clustering via Canonical Correlation Analysis
Kamalika Chauhuri ITA, UC San Diego, 9500 Gilman Drive, La Jolla, CA Sham M. Kakae Karen Livescu Karthik Sriharan Toyota Technological Institute at Chicago, 6045 S. Kenwoo Ave., Chicago, IL kamalika@soe.ucs.eu
More informationEIGEN-ANALYSIS OF KERNEL OPERATORS FOR NONLINEAR DIMENSION REDUCTION AND DISCRIMINATION
EIGEN-ANALYSIS OF KERNEL OPERATORS FOR NONLINEAR DIMENSION REDUCTION AND DISCRIMINATION DISSERTATION Presente in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Grauate
More informationSemiclassical analysis of long-wavelength multiphoton processes: The Rydberg atom
PHYSICAL REVIEW A 69, 063409 (2004) Semiclassical analysis of long-wavelength multiphoton processes: The Ryberg atom Luz V. Vela-Arevalo* an Ronal F. Fox Center for Nonlinear Sciences an School of Physics,
More informationTopic 7: Convergence of Random Variables
Topic 7: Convergence of Ranom Variables Course 003, 2016 Page 0 The Inference Problem So far, our starting point has been a given probability space (S, F, P). We now look at how to generate information
More informationKNN Particle Filters for Dynamic Hybrid Bayesian Networks
KNN Particle Filters for Dynamic Hybri Bayesian Networs H. D. Chen an K. C. Chang Dept. of Systems Engineering an Operations Research George Mason University MS 4A6, 4400 University Dr. Fairfax, VA 22030
More informationDissipative numerical methods for the Hunter-Saxton equation
Dissipative numerical methos for the Hunter-Saton equation Yan Xu an Chi-Wang Shu Abstract In this paper, we present further evelopment of the local iscontinuous Galerkin (LDG) metho esigne in [] an a
More informationDesign A Robust Power System Stabilizer on SMIB Using Lyapunov Theory
Design A Robust Power System Stabilizer on SMIB Using Lyapunov Theory Yin Li, Stuent Member, IEEE, Lingling Fan, Senior Member, IEEE Abstract This paper proposes a robust power system stabilizer (PSS)
More informationResearch Article A Formula for the Reliability of a d-dimensional Consecutive-k-out-of-n:F System
International Combinatorics Volume 2015, Article ID 140909, 5 pages http://x.oi.org/10.1155/2015/140909 Research Article A Formula for the Reliability of a -Dimensional Consecutive-k-out-of-n:F System
More informationSwitching Time Optimization in Discretized Hybrid Dynamical Systems
Switching Time Optimization in Discretize Hybri Dynamical Systems Kathrin Flaßkamp, To Murphey, an Sina Ober-Blöbaum Abstract Switching time optimization (STO) arises in systems that have a finite set
More informationAn Approach for Design of Multi-element USBL Systems
An Approach for Design of Multi-element USBL Systems MIKHAIL ARKHIPOV Department of Postgrauate Stuies Technological University of the Mixteca Carretera a Acatlima Km. 2.5 Huajuapan e Leon Oaxaca 69000
More informationCascaded redundancy reduction
Network: Comput. Neural Syst. 9 (1998) 73 84. Printe in the UK PII: S0954-898X(98)88342-5 Cascae reunancy reuction Virginia R e Sa an Geoffrey E Hinton Department of Computer Science, University of Toronto,
More informationThe Press-Schechter mass function
The Press-Schechter mass function To state the obvious: It is important to relate our theories to what we can observe. We have looke at linear perturbation theory, an we have consiere a simple moel for
More informationA simple model for the small-strain behaviour of soils
A simple moel for the small-strain behaviour of soils José Jorge Naer Department of Structural an Geotechnical ngineering, Polytechnic School, University of São Paulo 05508-900, São Paulo, Brazil, e-mail:
More informationMathcad Lecture #5 In-class Worksheet Plotting and Calculus
Mathca Lecture #5 In-class Worksheet Plotting an Calculus At the en of this lecture, you shoul be able to: graph expressions, functions, an matrices of ata format graphs with titles, legens, log scales,
More informationNonlinear Dielectric Response of Periodic Composite Materials
onlinear Dielectric Response of Perioic Composite aterials A.G. KOLPAKOV 3, Bl.95, 9 th ovember str., ovosibirsk, 639 Russia the corresponing author e-mail: agk@neic.nsk.su, algk@ngs.ru A. K.TAGATSEV Ceramics
More informationCONTROL CHARTS FOR VARIABLES
UNIT CONTOL CHATS FO VAIABLES Structure.1 Introuction Objectives. Control Chart Technique.3 Control Charts for Variables.4 Control Chart for Mean(-Chart).5 ange Chart (-Chart).6 Stanar Deviation Chart
More informationThe new concepts of measurement error s regularities and effect characteristics
The new concepts of measurement error s regularities an effect characteristics Ye Xiaoming[1,] Liu Haibo [3,,] Ling Mo[3] Xiao Xuebin [5] [1] School of Geoesy an Geomatics, Wuhan University, Wuhan, Hubei,
More informationMulti-View Clustering via Canonical Correlation Analysis
Kamalika Chauhuri ITA, UC San Diego, 9500 Gilman Drive, La Jolla, CA Sham M. Kakae Karen Livescu Karthik Sriharan Toyota Technological Institute at Chicago, 6045 S. Kenwoo Ave., Chicago, IL kamalika@soe.ucs.eu
More informationThe Principle of Least Action
Chapter 7. The Principle of Least Action 7.1 Force Methos vs. Energy Methos We have so far stuie two istinct ways of analyzing physics problems: force methos, basically consisting of the application of
More informationApplication of Measurement System R&R Analysis in Ultrasonic Testing
17th Worl Conference on Nonestructive Testing, 5-8 Oct 8, Shanghai, China Alication of Measurement System & Analysis in Ultrasonic Testing iao-hai ZHANG, Bing-ya CHEN, Yi ZHU Deartment of Testing an Control
More informationStable and compact finite difference schemes
Center for Turbulence Research Annual Research Briefs 2006 2 Stable an compact finite ifference schemes By K. Mattsson, M. Svär AND M. Shoeybi. Motivation an objectives Compact secon erivatives have long
More informationLinear and quadratic approximation
Linear an quaratic approximation November 11, 2013 Definition: Suppose f is a function that is ifferentiable on an interval I containing the point a. The linear approximation to f at a is the linear function
More informationWavelet-based Local Tomography
Inian Society for Non-Destructive Testing Hyeraba Chapter Proc. National Seminar on Non-Destructive Evaluation Dec. 7-9, 006, Hyeraba Wavelet-base Local Tomography M.V. Gopala Rao, E.M.L. Tanua an S. Vathsal
More information. Using a multinomial model gives us the following equation for P d. , with respect to same length term sequences.
S 63 Lecture 8 2/2/26 Lecturer Lillian Lee Scribes Peter Babinski, Davi Lin Basic Language Moeling Approach I. Special ase of LM-base Approach a. Recap of Formulas an Terms b. Fixing θ? c. About that Multinomial
More informationFLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS. 1. Introduction
FLUCTUATIONS IN THE NUMBER OF POINTS ON SMOOTH PLANE CURVES OVER FINITE FIELDS ALINA BUCUR, CHANTAL DAVID, BROOKE FEIGON, MATILDE LALÍN 1 Introuction In this note, we stuy the fluctuations in the number
More informationA medical image encryption algorithm based on synchronization of time-delay chaotic system
Av. Manuf. (1) 5:15 1 DOI 1.1/s3-1-1-5 A meical image encryption algorithm base on synchronization of time-elay chaotic system Hua Wang 1 Jian-Min Ye 1 Hang-Feng Liang 1 Zhong-Hua Miao 1 Receive: 9 October
More informationarxiv: v1 [cs.lg] 22 Mar 2014
CUR lgorithm with Incomplete Matrix Observation Rong Jin an Shenghuo Zhu Dept. of Computer Science an Engineering, Michigan State University, rongjin@msu.eu NEC Laboratories merica, Inc., zsh@nec-labs.com
More informationResearch Article Chaotic Dynamics-Based Analysis of Broadband Piezoelectric Vibration Energy Harvesting Enhanced by Using Nonlinearity
Shock an Vibration Volume 16, Article ID 3587, 11 pages http://x.oi.org/1.1155/16/3587 Research Article Chaotic Dynamics-Base Analysis of Broaban Piezoelectric Vibration Energy Harvesting Enhance by Using
More informationThe canonical controllers and regular interconnection
Systems & Control Letters ( www.elsevier.com/locate/sysconle The canonical controllers an regular interconnection A.A. Julius a,, J.C. Willems b, M.N. Belur c, H.L. Trentelman a Department of Applie Mathematics,
More informationCalculus and optimization
Calculus an optimization These notes essentially correspon to mathematical appenix 2 in the text. 1 Functions of a single variable Now that we have e ne functions we turn our attention to calculus. A function
More informationIPA Derivatives for Make-to-Stock Production-Inventory Systems With Backorders Under the (R,r) Policy
IPA Derivatives for Make-to-Stock Prouction-Inventory Systems With Backorers Uner the (Rr) Policy Yihong Fan a Benamin Melame b Yao Zhao c Yorai Wari Abstract This paper aresses Infinitesimal Perturbation
More informationOn the Cauchy Problem for Von Neumann-Landau Wave Equation
Journal of Applie Mathematics an Physics 4 4-3 Publishe Online December 4 in SciRes http://wwwscirporg/journal/jamp http://xoiorg/436/jamp4343 On the Cauchy Problem for Von Neumann-anau Wave Equation Chuangye
More informationNon-Linear Bayesian CBRN Source Term Estimation
Non-Linear Bayesian CBRN Source Term Estimation Peter Robins Hazar Assessment, Simulation an Preiction Group Dstl Porton Down, UK. probins@stl.gov.uk Paul Thomas Hazar Assessment, Simulation an Preiction
More informationLie symmetry and Mei conservation law of continuum system
Chin. Phys. B Vol. 20, No. 2 20 020 Lie symmetry an Mei conservation law of continuum system Shi Shen-Yang an Fu Jing-Li Department of Physics, Zhejiang Sci-Tech University, Hangzhou 3008, China Receive
More informationAdjustable Fractional-Delay Filters Utilizing the Farrow Structure and Multirate Techniques
Ajustable Fractional-Delay Filters Utilizing the Farrow Structure an Multirate Techniques Håkan Johansson (hakanj@isy.liu.se)* an Ewa Hermanowicz (hewa@eti.pg.ga.pl)** *Division of Electronics Systems,
More informationThe analysis of decimation and interpolation in the linear canonical transform domain
DOI 0.86/s40064-06-3479-4 RESEARCH Open Access The analysis of decimation and interpolation in the linear canonical transform domain Shuiqing Xu *, Yi Chai,, Youqiang Hu, Lei Huang and Li Feng *Correspondence:
More informationRobust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k
A Proof of Lemma 2 B Proof of Lemma 3 Proof: Since the support of LL istributions is R, two such istributions are equivalent absolutely continuous with respect to each other an the ivergence is well-efine
More informationSharp Thresholds. Zachary Hamaker. March 15, 2010
Sharp Threshols Zachary Hamaker March 15, 2010 Abstract The Kolmogorov Zero-One law states that for tail events on infinite-imensional probability spaces, the probability must be either zero or one. Behavior
More informationConsider for simplicity a 3rd-order IIR filter with a transfer function. where
Basic IIR Digital Filter The causal IIR igital filters we are concerne with in this course are characterie by a real rational transfer function of or, equivalently by a constant coefficient ifference equation
More informationOn Characterizing the Delay-Performance of Wireless Scheduling Algorithms
On Characterizing the Delay-Performance of Wireless Scheuling Algorithms Xiaojun Lin Center for Wireless Systems an Applications School of Electrical an Computer Engineering, Purue University West Lafayette,
More informationEVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION OF UNIVARIATE TAYLOR SERIES
MATHEMATICS OF COMPUTATION Volume 69, Number 231, Pages 1117 1130 S 0025-5718(00)01120-0 Article electronically publishe on February 17, 2000 EVALUATING HIGHER DERIVATIVE TENSORS BY FORWARD PROPAGATION
More informationCritical consideration on the Freeman and Carroll method for evaluating global mass loss kinetics of polymer thermal degradation
Thermochimica Acta 338 (1999) 85±94 Critical consieration on the Freeman an Carroll metho for evaluating global mass loss kinetics of polymer thermal egraation N.A. Liu *, W.C. Fan State Key Laboratory
More information28.1 Parametric Yield Estimation Considering Leakage Variability
8.1 Parametric Yiel Estimation Consiering Leakage Variability Rajeev R. Rao, Aniruh Devgan*, Davi Blaauw, Dennis Sylvester University of Michigan, Ann Arbor, MI, *IBM Corporation, Austin, TX {rrrao, blaauw,
More informationBasic IIR Digital Filter Structures
Basic IIR Digital Filter Structures The causal IIR igital filters we are concerne with in this course are characterie by a real rational transfer function of or, equivalently by a constant coefficient
More informationGeneralizing Kronecker Graphs in order to Model Searchable Networks
Generalizing Kronecker Graphs in orer to Moel Searchable Networks Elizabeth Boine, Babak Hassibi, Aam Wierman California Institute of Technology Pasaena, CA 925 Email: {eaboine, hassibi, aamw}@caltecheu
More informationIntroduction to variational calculus: Lecture notes 1
October 10, 2006 Introuction to variational calculus: Lecture notes 1 Ewin Langmann Mathematical Physics, KTH Physics, AlbaNova, SE-106 91 Stockholm, Sween Abstract I give an informal summary of variational
More informationWe G Model Reduction Approaches for Solution of Wave Equations for Multiple Frequencies
We G15 5 Moel Reuction Approaches for Solution of Wave Equations for Multiple Frequencies M.Y. Zaslavsky (Schlumberger-Doll Research Center), R.F. Remis* (Delft University) & V.L. Druskin (Schlumberger-Doll
More informationResearch Article U-Statistic for Multivariate Stable Distributions
Hinawi Probability an Statistics Volume 2017, Article ID 3483827, 12 pages https://oiorg/101155/2017/3483827 Research Article U-Statistic for Multivariate Stable Distributions Mahi Teimouri, Saei Rezakhah,
More informationA Random Graph Model for Massive Graphs
A Ranom Graph Moel for Massive Graphs William Aiello AT&T Labs Florham Park, New Jersey aiello@research.att.com Fan Chung University of California, San Diego fan@ucs.eu Linyuan Lu University of Pennsylvania,
More informationCalculus Class Notes for the Combined Calculus and Physics Course Semester I
Calculus Class Notes for the Combine Calculus an Physics Course Semester I Kelly Black December 14, 2001 Support provie by the National Science Founation - NSF-DUE-9752485 1 Section 0 2 Contents 1 Average
More information